Volume 6, Number 15, December 2016
Eighth International Conference on Networks & Communications (NETCOM - 2016), Sydney, Australia, December 23~24, 2016
Volume Editors : Natarajan Meghanathan, David C. Wyld
ISBN: 978-1-921987-60-1 Download full Proceedings
Design of a Secure Disaster Notification System Using the Smartphone Based Beacon
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea
Security for Software-Defined (Cloud, SDN and NFV) Infrastructures - Issues and Challenges
Sara Farahmandian and Doan B Hoang, University of Technology Sydney, Australia
Return Oriented Obfuscation
Vivek Balachandran1, Sabu Emmanuel2 and Ng Wee Keong3, 1Singapore Institute of Technology, Singapore, 2Kuwait University, Kuwait and 3Nanyang Technological University, Singapore
RITA Secure Communication Protocol : Application to SCADA
Fadi Obeid and Philippe Dhaussy, Ensta Bretagne, France
Exploring Critical Success Factors for Cybersecurity in Bhutan's Government Organizations
Pema Choejey, David Murray and Chun Che Fung, Murdoch University, Australia
DMIA : A Malware Detection System on IOS Platform
Hongliang Liang, Yilun Xie and Yan Song, Beijing University of Posts and Telecommunications, China
Performance Comparison DCM versus QPSK for High Data Rates in the MBOFDM UWB System
Naziha NOURI, Asma MESSAOUDI and Ridha BOUALLEGUE, Higher School of Communications of Tunis, Tunisia
Waveform Comparison and Nonlinearity Sensitivities of FBMC, UFMC and W-OFDM Systems
Changyoung An, Byeongjae Kim and Heung-Gyoon Ryu, Chungbuk National University, Korea
Interference Suppressing Receiver Technique for Wireless Ad Hoc Networks
Sunho Park and Byonghyo Shim, Seoul National University, Korea
A Dynamic Route Discovery Scheme for Heterogeneous Wireless Sensor Networks Based on Polychromatic Sets Theory
Dong Wang1, Xinheng Wang1 and Hong-Hsu Yen2, 1University of the West of Scotland, UK and 2Shih Hsin University, Taiwan
An Efficient Deployment Approach for Improved Coverage in Wireless Sensor Networks Based on Flower Pollination Algorithm
Faten Hajjej, Ridha Ejbali and Mourad Zaied, Research Group on Intelligent Machines (REGIM-Lab) Sfax, Tunisia
Sharp or Blur : A Fast No-Reference Quality Metric for Realistic Photos
Fan Zhang, Lenovo Research, China
A Binary to Residue Conversion Using New Proposed Non-Coprime Moduli Set
Mansour Bader1, Andraws Swidan1, Mazin Al-hadidi2 and Baha Rababah3, 1Jordan University, Jordan, 2Al-Balqa'a Applied University, Jordan and 3University of Portsmouth, UK
Albay Emergency Response and Report Tool (Alerrt)
Elmer Figuracion, Thelma Palaoag, Dennis Ignacio and Mary Jane Doblon, University of the Cordilleras, Philippines
An Efficient Recovery Scheme for Buffer-Based B-Tree Indexes on Flash Memory
VanPhi Ho, Seung-Joo Jeong, Dong-Joo Park, Soongsil University, Korea
Live Virtual Machine Migration Using Shadow Paging in Cloud Computing
SangWook Han and HwaMin Lee, Soonchunhyang University, South Korea
An Empirical Study of Using Cloud-Based Services in Capstone Project Development
Zhiguang Xu, Valdosta State University, USA
Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack
Hyeokchan Kwon, Sokjoon Lee and Byung-ho Chung, Electronics and Telecommunications Research Institute, Republic of Korea