


default search action
CommNet 2019: Rabat, Morocco
- Faissal El Bouanani, Fouad Ayoub, Paschalis C. Sofotasios, Daniel Benevides da Costa:

International Conference on Advanced Communication Technologies and Networking, CommNet 2019, Rabat, Morocco, April 12-14, 2019. IEEE 2019, ISBN 978-1-5386-8317-0 - Sara Farrag, Wassim Alexan

, Hisham H. Hussein
:
Triple-Layer Image Security Using a Zigzag Embedding Pattern. 1-8 - Sara Farrag, Wassim Alexan

:
A High Capacity Geometrical Domain Based 3D Image Steganography Scheme. 1-7 - Meryeme Ayache, Ahmed Khoumsi, Mohammed Erradi:

Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines. 1-10 - Mohammed Sabiri

:
Maximal Codes for Finite Chain Rings. 1-5 - Madjed Bencheikh Lehocine, Salim Djaaboub

, Mohamed Batouche
:
Routing-Plan duplicator: A reliable assistant for safe and seamless migration toward SDN. 1-10 - Mounia Bouabdellah, Faissal El Bouanani

, Daniel Benevides da Costa
, Paschalis C. Sofotasios
, Hussain Ben-Azza, Kahtan A. Mezher, Sami Muhaidat
:
On the Secrecy Analysis of Dual-Hop Underlay Multi-Source CRNs with Multi-Eavesdroppers and a Multi-Antenna Destination. 1-7 - Elmehdi Illi, Faissal El Bouanani

, Daniel Benevides da Costa
, Paschalis C. Sofotasios
, Fouad Ayoub, Kahtan A. Mezher, Sami Muhaidat
:
On the Physical Layer Security of a Regenerative Relay-Based mixed RF/UOWC. 1-7 - Yaye Sarr, Bamba Gueye

, Cheikh Sarr:
Performance Analysis of a Smart Street Lighting Application Using LoRa Wan. 1-6 - Jules Merlin Mouatcho Moualeu

, Paschalis C. Sofotasios
, Daniel B. da Costa
, Walaa Hamouda, Ugo Silva Dias, Sami Muhaidat
:
Physical-Layer Security over Generalized SIMO Multipath Fading Channels. 1-6 - Maggie Shammaa

, Hendrik Vogt, Ahmed El-Mahdy, Aydin Sezgin:
Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary Receiver. 1-8 - Mohamed Saleh Al Breiki, Suiping Zhou, Yuan Roger Luo:

A Meter Band Rate Mechanism to Improve the Native QoS Capability of OpenFlow and OpenDaylight. 1-6 - Zyad Elkhadir

, Archi Taha
, Mohammed Benattou
:
Improve R2L Attack Detection Using Trimmed PCA. 1-5 - Mohamed Saad Azizi, Moulay Lahcen Hasnaoui:

Software Defined Networking for Energy Efficient Wireless Sensor Network. 1-7 - Yusuf Acar

, Sultan Aldirmaz Çolak:
Receiver Design for Dual-Mode Index Modulation Aided OFDM. 1-5 - Sezer Can Tokgoz, Noha Anous, Serhan Yarkan, Diaa A. Khalil

, Khalid A. Qaraqe
:
Performance Improvement of White LED-Based VLC Systems Using Blue and Flattening Filters. 1-6 - Fatma Elmahmoudi, Oum Elkheir Abra, Abdelhadi Raihani

, Ouafae Serrar, Lhousine Bahatti
:
GIS Based Fuzzy Analytic Hierarchy Process for wind Energy Sites Selection. 1-8 - Renzhi Yuan, Jianshe Ma, Ping Su, Yuhan Dong

, Julian Cheng:
An Importance Sampling Method for Monte-Carlo Integration Model for Ultraviolet Communication. 1-6 - Zhuo Yi, Xuehui Du, Ying Liao, Xin Lu:

An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network. 1-9 - Sara Farrag, Wassim Alexan

:
Secure 2D Image Steganography Using Recamán's Sequence. 1-6 - Apri Siswanto, Abdul Syukur

, Evizal Abdul Kadir
, Suratin:
Network Traffic Monitoring and Analysis Using Packet Sniffer. 1-4 - Marwa Tarek Elkandoz, Wassim Alexan

, Hisham H. Hussein
:
Double-Layer Image Security Scheme with Aggregated Mathematical Sequences. 1-7 - Evizal Abdul Kadir

, Apri Siswanto, Sri Listia Rosa
, Abdul Syukur
, Hitoshi Irie, Mahmod Othman
:
Smart Sensor Node of WSNs for River Water Pollution Monitoring System. 1-5 - Abdiddaim Katkout, Ahmed Essadki

, Tamou Nasser:
An Improved Multi-Objective Finite Control Set Model Predictive Control for Grid Connected Three-Level Neutral-Point Clamped Inverter. 1-6 - Driss Riane

, Ahmed Ettalbi:
Towards a Clustering-Based Approach to Speed up IaaS Service Discovery Process. 1-5 - Samia El Haddouti

, Mohamed Dafir Ech-Cherif El Kettani:
Analysis of Identity Management Systems Using Blockchain Technology. 1-7 - Amna Aliaberi, Paschalis C. Sofotasios

, Sami Muhaidat
:
Modulation Schemes for Visible Light Communications. 1-10 - Paschalis C. Sofotasios

, Seong Ki Yoo
, Simon L. Cotton, Sami Muhaidat
, Francisco Javier López-Martínez, Juan M. Romero-Jerez, Kahtan A. Mezher, George K. Karagiannidis
:
Achievable Ergodic Capacity Under F Composite Fading Conditions. 1-6 - Brahim Bakkas

, Idriss Chana
, Hussain Ben-Azza
:
PAPR Reduction in MIMO-OFDM Based on Polar Codes and Companding Technique. 1-6 - Mouad Zouina

, Benaceur Outtai:
Towards a distributed token based payment system using blockchain technology. 1-10 - Paschalis C. Sofotasios

, Seong Ki Yoo
, Sami Muhaidat
, Simon L. Cotton, Francisco Javier López-Martínez, Juan M. Romero-Jerez, Kahtan A. Mezher, George K. Karagiannidis
:
Achievable Fixed Rate Capacity in Emerging Wireless Systems (Invited Paper). 1-9 - Asma Ben Abdallah, Amin Zribi, Ali Dziri, Fethi Tlili, Michel Terré:

H.264/AVC Video Transmission over UWB AV PHY IEEE 802.15.3c using UEP and Adaptive Modulation Techniques. 1-6 - Wisani Salani

, Gbolahan Aiyetoro, Fambirai Takawira
:
Packet Scheduling in 4G and Beyond Networks Using Cross-Layer Design Approach. 1-6 - Tri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell:

Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service. 1-8 - Rajalekshmi Kishore, Sanjeev Gurugopinath, Sami Muhaidat

, Paschalis C. Sofotasios
, Kahtan A. Mezher, Octavia A. Dobre
, Naofal Al-Dhahir:
Superior Selective Reporting-Based Spectrum Sensing in Energy Harvesting-Aided HCRNs. 1-7 - Ashraf A. Tahat, Talal A. Edwan

, Dana Mbaideen, Nada Murrar, Ola Al-Qutob, Leen Ayman:
Optimal Decision on Placement of an Auxiliary Aerial Wireless Base Station Using the Artificial Bee Colony Algorithm. 1-6 - Elmehdi Illi, Faissal El Bouanani

, Fouad Ayoub:
Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW System. 1-8 - Mamoun F. Al-Mistarihi, Rami Mohaisen

, Khalid A. Darabkh
:
BER Analysis in Relay-Based DF Cooperative Diversity Systems Over Rayleigh Fading Channels with Non-Identical Interferers Near the Destination. 1-5 - Mao Ye

, Lin Guan, Mohammed Quddus:
MPBRP- Mobility Prediction Based Routing Protocol in VANETs. 1-7 - Zouhair Chiba

, Noreddine Abghour
, Khalid Moussaid
, Amina El Omri
, Mohamed Rida
:
A Clever Approach to Develop an Efficient Deep Neural Network Based IDS for Cloud Environments Using a Self-Adaptive Genetic Algorithm. 1-9 - Tanveer Akhtar, Nizamud Din, Jamal Uddin:

Substitution Box Design Based on Chaotic Maps and Cuckoo Search Algorithm. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














