Home // ICSNC
ICSNC 2015, The Tenth International Conference on Systems and Networks Communications
Type: conference
Notes: IARIA Conference.
Editors:
Carlos Becker Westphall, University of Santa Catarina, Brazil
Eugen Borcoci, University Politehnica of Bucarest, Romania
Sathiamoorthy Manoharan, University of Auckland, New Zealand
ISSN: 2163-9027
ISBN: 978-1-61208-439-8
Location: Barcelona, Spain
Dates: from November 15, 2015 to November 20, 2015
Articles: there are 25 articles
Detecting Malicious Mobile Applications in Android OS
Sun Teck Tan and Choon Rui Tan
keywords: malicious applications; Android OS; Pattern matching.
A Two-Tiered User Feedback-based Approach for Spam Detection
Malik Feroze, Zubair Baig, and Michael Johnstone
keywords: Spam detection, user feedback, classification
Supporting a Variety of Secure Services Based on MTM
Seungyong Yoon, Yongsung Jeon, and Jeongnyeo Kim
keywords: secure service; mobile security
Implementation of Netflow based Interactive Connection Traceback System
Jung-Tae Kim, Ik-Kyun Kim, and Koo-Hong Kang
keywords: Peer-to-Peer; Connection Traceback; Interactive Hacking; Timing-based Traceback
Conducting and Identifying Penetration Attacks Using Linux Based Systems
Aparicio Carranza, German Calle, Gin Pena, Jose Camacho, Harrison Carranza, and Yeraldina Estrella
keywords: Kali Linux, CAINE, Pentesting, Computer Forensics, Metasploit
Adaptive Bitstream Prioritization for Dual TCP/UDP Streaming of HD Video
Arul N Dhamodaran, Mohammed Sinky, and Ben Lee
keywords: Bitstream Prioritization; HD Video Streaming; TCP; UDP.
Jitter Analysis of LTE Traffic over MPLS Based Evolved Packet Core Network
Hussien Mahmoud and Hussein Elsayed
keywords: LTE; EPC;MPLS; NS-3; Jitter
Choosing Multicast Configuration with Forward Error Correction for Mobile Multiaccess Heterogeneous Users
Svetlana Boudko and Wolfgang Leister
keywords: Wireless networking, mobile network selection, multicast, forward error correction
Classification of Node Localization Techniques in Wireless Sensor Networks
Mekelleche Fatiha and Haffaf Hafid
keywords: wireless sensor networks; localization; location nodes; multilateration.
Development of an IoT-based System for Real Time Occupational Exposure Monitoring
Houssem Eddine Fathallah, Vincent Lecuire, Eric Rondeau, and Stéphane Le Calvé
keywords: Air quality; sensor networks; Internet of Things; personal exposure; real time monitoring.
Fault-Tolerant Breach-Free Sensor Networks
Jorge Cobb and Chin-Tser Huang
keywords: Stabilization; Sensor networks; Sensor barriers
Performance Analysis of Association Procedure in IEEE 802.11ah
Pranesh Sthapit, Santosh Subedi, Goo-Rak Kwon, and Jae-Young Pyun
keywords: IEEE 802.11ah; association delay; Machine-to-Machine communication
Secure Dynamic Access Control Mechanism for Shared Wireless Sensor Networks
Nelka Perera, Kasun Zoysa, Jeevani Goonathillake, and Asanka Sayakkara
keywords: Shared wireless sensor networks; user access control; public key cryptography; symmetric cryptography
CAMAW: A Clustering Algorithm for Multiple Applications in WSAN
Elton Alves da Costa, Claudio Miceli de Farias, Luci Pirmez, and Flávia Coimbra Delicato
keywords: Application-aware; Wireless sensor networks; multiple applications
Intelligent Vehicular Security System using Sensors and GPS
Ahmed Zuhair, Mansoor Ali, and Ali Al-Humairi
keywords: Microcontroller; Security; GPS; GSM.
A k-Resilient Node Deployment Scheme Using an Air Vehicle in Wireless Sensor Networks
Daehee Kim and Sunshin An
keywords: node deployment; k-resilience; air vehicle; WSNs
Efficient Partial Decoding Algorithm for High Efficiency Video Coding
Dokyung Lee and Jechang Jeong
keywords: HEVC; Video codec; Partial decoding; Low resolution decoding
Categorization of Technologies used for Fingerprint-Based Indoor Localization
Mário Melo and Gibeon Aquino
keywords: indoor localization;fingerprint; technologies;
SDL Implementation of LTE UE Non-Seamless Random Access Procedure Handling
Mohamed Yousef, Hussein Elsayed, and Abdelhalim Zekry
keywords: LTE; random access procedure; MAC Sub-layer; non successful random access response; non successful contention resolution; SDL
Bulk Data Transfers through an Airline Delay-Tolerant Network
Christina M. Malliou, Nikolaos Bezirgiannidis, and Vassilis Tsaoussidis
keywords: Delay/Disruption Tolerant Networking; Airport network; Sneakernet; Bulk data; Contact Graph Routing.
Intelligence-based Routing for Smarter and Enhanced Opportunistic Network Operations
Bassem Mokhtar and Mostafa Mokhtar
keywords: Opportunistic Networks; Semantic-driven Operation; Routing Protocol; Context Awareness; Network Semantic, Information Management.
An Experimental Study of RFID Adoption for Maritime Activities
Yasuhiro Sato, Akira Nishikiyama, Kohei Shimada, and Yoshinori Matsuura
keywords: Radiofrequency identification, RFID tags, Marine safety, Marine accidents
Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces
Toshihiko Kato, Atsushi Oda, Celimuga Wu, and Satoshi Ohzahata
keywords: TCP congestion control; passive monitoring; congestion window.
Middleware Architectures for RFID Systems: A Survey
Haitham Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, and Kamilia Hosny
keywords: Middleware; Semantic middleware; Interoperability, Internet of Things (IoT)
A Novel Path Computing Framework under QoX Constraints Based on N&PV Functions Embedding.
Xavier Hesselbach, Juan Felipe Botero, and Jose Roberto Amazonas
keywords: Network functions virtualization; software defined network; paths algebra; QoX constraints.