


default search action
39th AINA 2025: Barcelona, Spain
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 39th International Conference on Advanced Information Networking and Applications, AINA 2025, Barcelona, Spain, 9-11 April 2025, Volume 8. Lecture Notes on Data Engineering and Communications Technologies 252, Springer 2025, ISBN 978-3-031-87783-4 - Maroua Ben Gharbia, Ridha Bouallegue:
Adaptive Handover Decision Parameters in Femtocell-Macrocell Networks. 1-12 - Badia Bouhdid, Mohamed Aissa:
Reliable and Energy-Efficient Clustering Approach for FANETs Using a Fuzzy Logic System. 13-24 - Ameni Mersani, Mintoua Toupkandi, Hiba Jouini:
Design and Implementation of an Energy-Autonomous IoT Sensor Node for Smart Agriculture. 25-34 - Swarnamouli Majumdar, Anjali Awasthi, Sonny E. Kirkley, Lorant Andras Szolga, Mayur Srivastava:
Smart IoT-Enabled Autonomous Vehicles for Next-Generation Public Safety. 35-46 - Rania Jadlaoui, Wided Hadj Alouane, Hatem Boujemaa:
Reconfigurable Intelligent Surfaces in Two-Way NOMA-AF Relaying Networks. 47-58 - Djamila Talbi, Zoltán Gál:
Analysis of High-Speed Radio Communication in THz Bands: Topological Impacts and Signal Decomposition Using Empirical Mode Decomposition and Marginal Hilbert Spectrum. 59-71 - Akram Hamdi, Ammar Bouallegue, Sameh Najeh:
Age of Information in Hybrid NOMA/OMA Systems Based on Particle Swarm Optimization. 72-85 - Evjola Spaho, Orjola Jaupi:
A Framework for Integrating 5G and Vehicular Delay Tolerant Networks in Smart Cities. 86-95 - Sourour Dhifaoui, Chiraz Houaidia
, Leïla Azouz Saïdane:
ELSA: Energy and Link Stability Aware Routing Protocol for FANETs. 96-107 - Junichi Honda:
Concept of Performance Monitor for ADS-B in Japan. 108-118 - Raffaele Pizzolante, Arcangelo Castiglione, Michele Mastroianni
, Francesco Palmieri:
A Mobile Forensic Tool for Enhancing Cyber-Physical Security by Detecting XSS Attacks Through Web Server Access Log Analysis. 119-129 - Manuel Fabiano, Francesco Longo, Giovanni Merlino, Davide Aloisio, Giovanni Brunaccini, Francesco Sergi:
Proxy-Based Approach for Securing Modbus Communication with Post-quantum Cryptography: A Hydrogen-Based Smart Grid Case Study. 130-139 - Leila Moradi, Eslam Farsimadan, Gianni D'Angelo, Bruno Carpentieri, Francesco Palmieri:
Epidemic Analysis of the Propagation of Multiple Malware Infectious in Wireless Sensor Networks. 140-148 - Hadis Rezaei, Massimo Ficco, Francesco Palmieri:
CTAT: A Blockchain-Driven Conditional Traceable Access Token for Enhancing Performance and Security in the Supply Chain of Sensitive Pharmaceuticals. 149-160 - Gennaro Pio Rimoli, Luigi Gallo, Pietro Fusco, Massimo Ficco:
Power Analysis of Post-quantum Cryptography NIST Algorithms in Resource-Constrained Microcontroller. 161-169 - Attaullah Buriro
, Flaminia L. Luccio
:
Mobile Biometrics: Innovations, Challenges, and Emerging Trends. 170-180 - Massimiliano Rak, Umberto Barbato, Antonio Liberti:
Enhancing Security in E-Sports Events: Approach to Cheating Mitigation Using Kiosk Systems. 181-190 - Massimiliano Rak, Umberto Barbato, Francesco Grimaldi:
Biomechanical Data for Activity Recognition in E-Sports and the Metaverse: An Agnostic Model and Analysis Framework. 191-202 - Gnana Prakash Goli, Mauro Migliardi
, Isil Atabek, Irem Gorksu Celik:
QR Code Scanning as a Highly Available Surrogate of NFC for Verifiable Presentation Exchange. 203-212 - Sahar Ben Yaala, Leonel Feukouo Fosting, Ridha Bouallegue:
Enhancing Kubernetes Security: Comprehensive Strategies for a Robust Containerized Infrastructure. 213-223 - Imen Aouini:
SG-BC: Evaluating Latency Blockchain Enabling SmartGrid. 224-233 - Smriti Smriti, K. HariBabu, Sanyam Garg:
DDoS Attack Detection in Data Plane. 234-244 - Moinul Alam, Mostafa Hasan, Arvil Nath Akash, Md Junayed Hossain, Ashraful Islam, Sanzar Adnan Alam:
A Theoretical Framework for Decentralized Intrusion Detection in Smart Networks Using Blockchain and Machine Learning. 245-256 - Kaustubh Dwivedi, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
A Layered Framework for Blockchain Security: Classification of Threats and the Quantum Computing Impact. 257-269 - Shayma Wail Nourildean, Wafa Mefteh, Ali Mohsen Frihida:
Hybrid Deep Learning Model-Based Intrusion Detection System to Improve Artificial Internet of Things Against Cyber Attacks. 270-280 - Ankit Agrawal, Aditi Bansal, Ashutosh Bhatia, Kamlesh Tiwari:
Layered Blockchain-Based Mobile CrowdSensing Architecture: Exploring Privacy and Scalability Challenges Across Layers. 281-292 - Naser Abbas Hussein
, Jihene Khoualdi, Hella Kaffel Ben Ayed:
Optimizing Supply Chain Coordination and Information Sharing Using Blockchain Technology. 293-304 - Amine Hedfi, Aida Ben Chehida, Ryma Abassi, Mohamed Aymen Chalouf, Omessaad Hamdi:
Collusion Attacks in the Internet of Drones: A Fog Computing Approach for Detection and Prevention. 305-316 - Ahmed Saidane, Ali El Kamel, Habib Youssef:
CHC-DDoS: A DDoS Attacks Detection Scheme Using Host-Connection Graph Representation and GCN. 317-325 - Luís Nascimento, André Luíz de Oliveira, Regina Villela, Edelberto Franco Silva, Ran Wei, Richard Hawkins, Tim Kelly:
Model-Based Security Assurance Cases for Open and Adaptive Cyber-Physical Systems. 326-340 - Marwa Faydi, Amira Zrelli
, Tahar Ezzedine
:
Prediction of Water Quality Using Machine Learning Models in IoT Environment. 341-352 - Cathryn Peoples, Bibin Babu, Joseph Rafferty, Adrian Moore, Nektarios Georgalas:
The Simulation of a Service Orchestration Engine for the Smart City Internet of Things. 353-362 - Dongwei Wang, Sally I. McClean, Ian R. McChesney, Zeeshan Tariq:
Autonomous Management of IoT Devices in Smart Homes Using Semi-Markov Models. 363-373 - Sergey Butakov:
Security Focus Areas for Digital Twin Development Projects. 374-384 - Vazgken Vanian, Georgios Petmezas, Konstantinos Konstantoudakis, Dimitrios Zarpalas:
ReenactFaces: A Specialized Dataset for Reenactment-Based Deepfake Detection. 385-394 - Alberto Postiglione
:
A Text Mining Approach to Sentiment-Based Fake News Detection Using Finite Automata. 395-406 - Muhammad Khurram Zahur Bajwa, Aniello Castiglione, Chiara Pero:
Mel Spectrogram-Based CNN Framework for Explainable Audio Deepfake Detection. 407-416 - Gennaro Junior Pezzullo, Alba Amato
, Beniamino Di Martino, Daniele Granata, Massimiliano Rak, Salvatore Venticinque:
NLP-Driven Analysis of Users' Reaction for Estimation of Information Disorder Propagation. 417-425 - Andrea F. Abate, Lucia Cimmino, Matteo Polsinelli:
Comparative Evaluation of Synthetic Image Detectors: Insights from Generative Adversarial Networks and Stable Diffusion Generators. 426-436 - Béatrix-May Balaban
, Ioan Stefan Sacala, Claudia Alina Petrescu-Nita:
Telemedicine in MCPS: A Proposed Design and Implementation of a Secure and Transparent Healthcare Blockchain Application to Ensure Data Security and Integrity. 437-449 - Ronghua Xu, Xinyun Liu, Deeraj Nagothu, Qian Qu, Yu Chen:
Detecting Manipulated Digital Entities Through Real-World Anchors. 450-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.