Home // ICSNC

ICSNC 2015, The Tenth International Conference on Systems and Networks Communications

Type: conference

Notes: IARIA Conference.

Editors:
Carlos Becker Westphall, University of Santa Catarina, Brazil
Eugen Borcoci, University Politehnica of Bucarest, Romania
Sathiamoorthy Manoharan, University of Auckland, New Zealand

ISSN: 2163-9027

ISBN: 978-1-61208-439-8

Location: Barcelona, Spain

Dates: from November 15, 2015 to November 20, 2015

Articles: there are 25 articles

Detecting Malicious Mobile Applications in Android OS
Sun Teck Tan and Choon Rui Tan
keywords: malicious applications; Android OS; Pattern matching.

A Two-Tiered User Feedback-based Approach for Spam Detection
Malik Feroze, Zubair Baig, and Michael Johnstone
keywords: Spam detection, user feedback, classification

Supporting a Variety of Secure Services Based on MTM
Seungyong Yoon, Yongsung Jeon, and Jeongnyeo Kim
keywords: secure service; mobile security

Implementation of Netflow based Interactive Connection Traceback System
Jung-Tae Kim, Ik-Kyun Kim, and Koo-Hong Kang
keywords: Peer-to-Peer; Connection Traceback; Interactive Hacking; Timing-based Traceback

Conducting and Identifying Penetration Attacks Using Linux Based Systems
Aparicio Carranza, German Calle, Gin Pena, Jose Camacho, Harrison Carranza, and Yeraldina Estrella
keywords: Kali Linux, CAINE, Pentesting, Computer Forensics, Metasploit

Adaptive Bitstream Prioritization for Dual TCP/UDP Streaming of HD Video
Arul N Dhamodaran, Mohammed Sinky, and Ben Lee
keywords: Bitstream Prioritization; HD Video Streaming; TCP; UDP.

Jitter Analysis of LTE Traffic over MPLS Based Evolved Packet Core Network
Hussien Mahmoud and Hussein Elsayed
keywords: LTE; EPC;MPLS; NS-3; Jitter

Choosing Multicast Configuration with Forward Error Correction for Mobile Multiaccess Heterogeneous Users
Svetlana Boudko and Wolfgang Leister
keywords: Wireless networking, mobile network selection, multicast, forward error correction

Classification of Node Localization Techniques in Wireless Sensor Networks
Mekelleche Fatiha and Haffaf Hafid
keywords: wireless sensor networks; localization; location nodes; multilateration.

Development of an IoT-based System for Real Time Occupational Exposure Monitoring
Houssem Eddine Fathallah, Vincent Lecuire, Eric Rondeau, and Stéphane Le Calvé
keywords: Air quality; sensor networks; Internet of Things; personal exposure; real time monitoring.

Fault-Tolerant Breach-Free Sensor Networks
Jorge Cobb and Chin-Tser Huang
keywords: Stabilization; Sensor networks; Sensor barriers

Performance Analysis of Association Procedure in IEEE 802.11ah
Pranesh Sthapit, Santosh Subedi, Goo-Rak Kwon, and Jae-Young Pyun
keywords: IEEE 802.11ah; association delay; Machine-to-Machine communication

Secure Dynamic Access Control Mechanism for Shared Wireless Sensor Networks
Nelka Perera, Kasun Zoysa, Jeevani Goonathillake, and Asanka Sayakkara
keywords: Shared wireless sensor networks; user access control; public key cryptography; symmetric cryptography

CAMAW: A Clustering Algorithm for Multiple Applications in WSAN
Elton Alves da Costa, Claudio Miceli de Farias, Luci Pirmez, and Flávia Coimbra Delicato
keywords: Application-aware; Wireless sensor networks; multiple applications

Intelligent Vehicular Security System using Sensors and GPS
Ahmed Zuhair, Mansoor Ali, and Ali Al-Humairi
keywords: Microcontroller; Security; GPS; GSM.

A k-Resilient Node Deployment Scheme Using an Air Vehicle in Wireless Sensor Networks
Daehee Kim and Sunshin An
keywords: node deployment; k-resilience; air vehicle; WSNs

Efficient Partial Decoding Algorithm for High Efficiency Video Coding
Dokyung Lee and Jechang Jeong
keywords: HEVC; Video codec; Partial decoding; Low resolution decoding

Categorization of Technologies used for Fingerprint-Based Indoor Localization
Mário Melo and Gibeon Aquino
keywords: indoor localization;fingerprint; technologies;

SDL Implementation of LTE UE Non-Seamless Random Access Procedure Handling
Mohamed Yousef, Hussein Elsayed, and Abdelhalim Zekry
keywords: LTE; random access procedure; MAC Sub-layer; non successful random access response; non successful contention resolution; SDL

Bulk Data Transfers through an Airline Delay-Tolerant Network
Christina M. Malliou, Nikolaos Bezirgiannidis, and Vassilis Tsaoussidis
keywords: Delay/Disruption Tolerant Networking; Airport network; Sneakernet; Bulk data; Contact Graph Routing.

Intelligence-based Routing for Smarter and Enhanced Opportunistic Network Operations
Bassem Mokhtar and Mostafa Mokhtar
keywords: Opportunistic Networks; Semantic-driven Operation; Routing Protocol; Context Awareness; Network Semantic, Information Management.

An Experimental Study of RFID Adoption for Maritime Activities
Yasuhiro Sato, Akira Nishikiyama, Kohei Shimada, and Yoshinori Matsuura
keywords: Radiofrequency identification, RFID tags, Marine safety, Marine accidents

Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces
Toshihiko Kato, Atsushi Oda, Celimuga Wu, and Satoshi Ohzahata
keywords: TCP congestion control; passive monitoring; congestion window.

Middleware Architectures for RFID Systems: A Survey
Haitham Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, and Kamilia Hosny
keywords: Middleware; Semantic middleware; Interoperability, Internet of Things (IoT)

A Novel Path Computing Framework under QoX Constraints Based on N&PV Functions Embedding.
Xavier Hesselbach, Juan Felipe Botero, and Jose Roberto Amazonas
keywords: Network functions virtualization; software defined network; paths algebra; QoX constraints.