CS & IT
Conference Proceedings
menu
Home
Current issue
Archives
Contact
search
CS&IT Conference Proceedings
Home
Current issue
Archives
Contact
search
Search
×
search
keyboard_arrow_up
Volume 6, Number 15, December 2016
Eighth International Conference on Networks & Communications (NETCOM - 2016), December 23 ~ 24, 2016, Sydney, Australia
Volume Editors : Natarajan Meghanathan, David C. Wyld
ISBN : 978-1-921987-60-1
Design of a Secure Disaster Notification System Using the Smartphone Based Beacon
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Security for Software-Defined (Cloud, SDN and NFV) Infrastructures - Issues and Challenges
Sara Farahmandian and Doan B Hoang, University of Technology Sydney, Australia
Return Oriented Obfuscation
Vivek Balachandran
1
, Sabu Emmanuel
2
and Ng Wee Keong
3
,
1
Singapore Institute of Technology, Singapore,
2
Kuwait University, Kuwait and
3
Nanyang Technological University, Singapore
RITA Secure Communication Protocol : Application to SCADA
Fadi Obeid and Philippe Dhaussy, Ensta Bretagne, France
Exploring Critical Success Factors for Cybersecurity in Bhutan's Government Organizations
Pema Choejey, David Murray and Chun Che Fung, Murdoch University, Australia
DMIA : A Malware Detection System on IOS Platform
Hongliang Liang, Yilun Xie and Yan Song, Beijing University of Posts and Telecommunications, China
Performance Comparison DCM versus QPSK for High Data Rates in the MBOFDM UWB System
Naziha NOURI, Asma MESSAOUDI and Ridha BOUALLEGUE, Higher School of Communications of Tunis, Tunisia
Waveform Comparison and Nonlinearity Sensitivities of FBMC, UFMC and W-OFDM Systems
Changyoung An, Byeongjae Kim and Heung-Gyoon Ryu, Chungbuk National University, Korea
Interference Suppressing Receiver Technique for Wireless Ad Hoc Networks
Sunho Park and Byonghyo Shim, Seoul National University, Korea
A Dynamic Route Discovery Scheme for Heterogeneous Wireless Sensor Networks Based on Polychromatic Sets Theory
Dong Wang
1
, Xinheng Wang
1
and Hong-Hsu Yen
2
,
1
University of the West of Scotland, UK and
2
Shih Hsin University, Taiwan
An Efficient Deployment Approach for Improved Coverage in Wireless Sensor Networks Based on Flower Pollination Algorithm
Faten Hajjej, Ridha Ejbali and Mourad Zaied, Research Group on Intelligent Machines (REGIM-Lab) Sfax, Tunisia
Sharp or Blur : A Fast No-Reference Quality Metric for Realistic Photos
Fan Zhang, Lenovo Research, China
A Binary to Residue Conversion Using New Proposed Non-Coprime Moduli Set
Mansour Bader
1
, Andraws Swidan
1
, Mazin Al-hadidi
2
and Baha Rababah
3
,
1
Jordan University, Jordan,
2
Al-Balqa'a Applied University, Jordan and
3
University of Portsmouth, UK
Albay Emergency Response and Report Tool (Alerrt)
Elmer Figuracion, Thelma Palaoag, Dennis Ignacio and Mary Jane Doblon, University of the Cordilleras, Philippines
An Efficient Recovery Scheme for Buffer-Based B-Tree Indexes on Flash Memory
VanPhi Ho, Seung-Joo Jeong, Dong-Joo Park, Soongsil University, Korea
Live Virtual Machine Migration Using Shadow Paging in Cloud Computing
SangWook Han and HwaMin Lee, Soonchunhyang University, South Korea
An Empirical Study of Using Cloud-Based Services in Capstone Project Development
Zhiguang Xu, Valdosta State University, USA
Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack
Hyeokchan Kwon, Sokjoon Lee and Byung-ho Chung, Electronics and Telecommunications Research Institute, Republic of Korea
settings
Editorial Board
book
Most Cited Articels
list
Indexing
help
FAQ