Search Results - "2020 International Symposium on Networks, Computers and Communications (ISNCC)"

Refine Results
  1. 1

    Polymorphic Adversarial DDoS attack on IDS using GAN by Chauhan, Ravi, Shah Heydari, Shahram

    “…Intrusion Detection systems are important tools in preventing malicious traffic from penetrating into networks and systems. Recently, Intrusion Detection…”
    Get full text
    Conference Proceeding
  2. 2

    Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs by Khamis, Rana Abou, Matrawy, Ashraf

    “…Network security applications, including Intrusion Detection Systems (IDS) of deep neural networks (DNN), are increasing rapidly to make detection task of…”
    Get full text
    Conference Proceeding
  3. 3

    PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks by Ibrahem, Mohamed I., Badr, Mahmoud M., Fouda, Mostafa M., Mahmoud, Mohamed, Alasmary, Waleed, Fadlullah, Zubair Md

    “…Preserving the customers' privacy, while collecting their power consumption for monitoring and billing, is a prime concern in an Advanced Metering…”
    Get full text
    Conference Proceeding
  4. 4

    Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks by Hachimi, Marouane, Kaddoum, Georges, Gagnon, Ghyslain, Illy, Poulmanogo

    “…In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future architecture in terms of minimizing energy consumption and allocating…”
    Get full text
    Conference Proceeding
  5. 5

    Detecting Abnormal Traffic in Large-Scale Networks by Elsayed, Mahmoud Said, Le-Khac, Nhien-An, Dev, Soumyabrata, Jurcut, Anca Delia

    “…With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and…”
    Get full text
    Conference Proceeding
  6. 6

    On the Use of Graph Neural Networks for Virtual Network Embedding by Rkhami, Anouar, Quang Pham, Tran Anh, Hadjadj-Aoul, Yassine, Outtagarts, Abdelkader, Rubino, Gerardo

    “…Resource allocation of 5G network slices is one of the most important challenges for network operators. It can be formulated using the Virtual Network…”
    Get full text
    Conference Proceeding
  7. 7

    Joint Placement Latency Optimization of the Control Plane by Rasol Rasol, Kurdman Abdulrahman, Domingo-Pascual, Jordi

    “…Software Defined Networking (SDN) is a programmable network architecture that decouples the control plane (controller logic) from the data plane (forwarding…”
    Get full text
    Conference Proceeding
  8. 8

    Reconfiguration of LoRa Networks Parameters using Fuzzy C-Means Clustering by Djoudi, Aghiles, Zitouni, Rafik, Zangar, Nawel, George, Laurent

    “…Long Range Wireless Access Network (LoRaWAN) emerged as one of the promising Low Power Wide Area Networks (LPWAN) for IoT applications. It allows end-devices…”
    Get full text
    Conference Proceeding
  9. 9

    Building a Fintech Ecosystem: Design and Development of a Fintech API Gateway by Unsal, Ersin, Oztekin, Bilgehan, Cavus, Murat, Ozdemir, Suat

    “…With the rise of financial technology startups (so called fintechs) and the adoption of open banking business models, the banking industry is witnessing…”
    Get full text
    Conference Proceeding
  10. 10

    PubChain: A Decentralized Open-Access Publication Platform with Participants Incentivized by Blockchain Technology by Wang, Taotao, Chang Liew, Soung, Zhang, Shengli

    “…We design and implement Publication Chain (PubChain), a decentralized open-access publication platform built on decentralized and distributed technologies of…”
    Get full text
    Conference Proceeding
  11. 11

    Cognitive CQI/5QI Based Scheme for Software Defined 5G Hybrid Satellite-Terrestrial Network: Slicing for Ultra Reliability And Video Congestion Offloading by Hendaoui, Saloua, Mannai, Aza, Zangar, Nawel

    “…This paper addresses the efficiency of the hybrid terrestrial-satellite network to maintain service continuity and to resolve coverage challenges for the…”
    Get full text
    Conference Proceeding
  12. 12

    The Security Ingredients for Correct and Byzantine Fault-tolerant Blockchain Consensus Algorithms by Altarawneh, Amani, Skjellum, Anthony

    “…The blockchain technology revolution and the use of blockchains in various applications have resulted in many companies and programmers developing and…”
    Get full text
    Conference Proceeding
  13. 13

    Multiuser Visible Light Communication System using Hybrid OFDM-PWM by Affan, Affan, Khan, Usama, Asif, Hafiz Muhammad, Raahemifar, Kammran

    “…Visible Light Communication (VLC) is an emerging wireless optical technology in the field of data communication. The VLC systems have a wide light spectrum,…”
    Get full text
    Conference Proceeding
  14. 14

    Construction Safety Surveillance Using Machine Learning by Kamal, Ruksin, Chemmanam, Ajai John, Jose, Bijoy A., Mathews, Sunil, Varghese, Eldho

    “…Safety has always been a matter of concern in all industrial activities, especially construction. Hard hats or safety helmets act as the first line of…”
    Get full text
    Conference Proceeding
  15. 15

    Decentralized and Privacy-Preserving Key Management Model by Soltani, Reza, Nguyen, Uyen Trang, An, Aijun

    “…Data centralization and the growing rate of security breaches and identity fraud have led us to seek privacy-preserving and decentralized identity management…”
    Get full text
    Conference Proceeding
  16. 16

    Recent Advances on 5G Resource Allocation Problem using PD-NOMA by Ismail, Sally, D'Andreagiovanni, Fabio, Lakhlef, Hicham, Imine, Youcef

    “…5G is the fifth generation technology standard for cellular networks, which is already being deployed and offering many advantages for communications, such as…”
    Get full text
    Conference Proceeding
  17. 17

    DeepFlow: Towards Network-Wide Ingress Traffic Prediction Using Machine Learning At Large Scale by Fischer, Sebastian, Katsarou, Katerina, Holschke, Oliver

    “…Describing incoming web traffic - as seen from large eyeball networks, i.e. ingress traffic - and estimating it into the future, are necessary operations for…”
    Get full text
    Conference Proceeding
  18. 18

    An IoT Based Smart Farming System Using Machine Learning by Dahane, A., Benameur, R., Kechar, B., Benyamina, A.

    “…Smart farming allows to analyze the growth of plants and to influence the parameters of our system in real time in order to optimize plant growth and support…”
    Get full text
    Conference Proceeding
  19. 19

    Towards IoT Slicing for Centralized WLANs in Enterprise Networks by Fami, Foroutan, Pham, Chuan, Nguyen, Kim-Khoa

    “…Emergence of Internet of Things (IoT) and its affiliated services brought new challenges, such as diversity of service requirements, massive connectivity,…”
    Get full text
    Conference Proceeding
  20. 20

    Automation System for Six-minute Walk Test Using RFID Technology by Oliveira, Vinicius, Duarte, Lucas, Costa, Gabriel, Macedo, Marcielly, Silveira, Tagleorge

    “…The main objective of this work was to develop a low-cost monitoring system based on radio frequency identifi-cation (RFID) to automatize six-minute walk tests…”
    Get full text
    Conference Proceeding