Academy & Industry Research Collaboration Center (AIRCC)

Volume 6, Number 15, December 2016

Eighth International Conference on Networks & Communications (NETCOM - 2016), Sydney, Australia, December 23~24, 2016
Volume Editors : Natarajan Meghanathan, David C. Wyld
ISBN: 978-1-921987-60-1                                                                                                                             Download full Proceedings

Design of a Secure Disaster Notification System Using the Smartphone Based Beacon 
Jae Pil Lee, Jae Gwang Lee, Jun hyeon Lee, Ki-su Yoon and Jae Kwang Lee, Han Nam University, Korea

Security for Software-Defined (Cloud, SDN and NFV) Infrastructures - Issues and Challenges 
Sara Farahmandian and Doan B Hoang, University of Technology Sydney, Australia

Return Oriented Obfuscation 
Vivek Balachandran1, Sabu Emmanuel2 and Ng Wee Keong3, 1Singapore Institute of Technology, Singapore,
2Kuwait University, Kuwait and 3Nanyang Technological University, Singapore

RITA Secure Communication Protocol : Application to SCADA 
Fadi Obeid and Philippe Dhaussy, Ensta Bretagne, France

Exploring Critical Success Factors for Cybersecurity in Bhutan's Government Organizations 
Pema Choejey, David Murray and Chun Che Fung, Murdoch University, Australia

DMIA : A Malware Detection System on IOS Platform 
Hongliang Liang, Yilun Xie and Yan Song, Beijing University of Posts and Telecommunications, China

Performance Comparison DCM versus QPSK for High Data Rates in the MBOFDM UWB System 
Naziha NOURI, Asma MESSAOUDI and Ridha BOUALLEGUE, Higher School of Communications of Tunis, Tunisia

Waveform Comparison and Nonlinearity Sensitivities of FBMC, UFMC and W-OFDM Systems 
Changyoung An, Byeongjae Kim and Heung-Gyoon Ryu, Chungbuk National University, Korea

Interference Suppressing Receiver Technique for Wireless Ad Hoc Networks 
Sunho Park and Byonghyo Shim, Seoul National University, Korea

A Dynamic Route Discovery Scheme for Heterogeneous Wireless Sensor Networks Based on Polychromatic Sets
Dong Wang1, Xinheng Wang1 and Hong-Hsu Yen2, 1University of the West of Scotland, UK and 2Shih Hsin
University, Taiwan

An Efficient Deployment Approach for Improved Coverage in Wireless Sensor Networks Based on Flower
Pollination Algorithm
Faten Hajjej, Ridha Ejbali and Mourad Zaied, Research Group on Intelligent Machines (REGIM-Lab) Sfax, Tunisia

Sharp or Blur : A Fast No-Reference Quality Metric for Realistic Photos 
Fan Zhang, Lenovo Research, China

A Binary to Residue Conversion Using New Proposed Non-Coprime Moduli Set 
Mansour Bader1, Andraws Swidan1, Mazin Al-hadidi2 and Baha Rababah3, 1Jordan University, Jordan,
2Al-Balqa'a Applied University, Jordan and 3University of Portsmouth, UK

Albay Emergency Response and Report Tool (Alerrt) 
Elmer Figuracion, Thelma Palaoag, Dennis Ignacio and Mary Jane Doblon, University of the Cordilleras,

An Efficient Recovery Scheme for Buffer-Based B-Tree Indexes on Flash Memory 
VanPhi Ho, Seung-Joo Jeong, Dong-Joo Park, Soongsil University, Korea

Live Virtual Machine Migration Using Shadow Paging in Cloud Computing 
SangWook Han and HwaMin Lee, Soonchunhyang University, South Korea

An Empirical Study of Using Cloud-Based Services in Capstone Project Development 
Zhiguang Xu, Valdosta State University, USA

Wi-Fi Fingerprint Based Approach to Securing the Connected Vehicle Against Wireless Attack 
Hyeokchan Kwon, Sokjoon Lee and Byung-ho Chung, Electronics and Telecommunications Research Institute,
Republic of Korea