Integration of VANET and 5G Security: A review of design and implementation issues (English)
- New search for: Hussain, Rasheed
- New search for: Hussain, Fatima
- New search for: Zeadally, Sherali
- New search for: Hussain, Rasheed
- New search for: Hussain, Fatima
- New search for: Zeadally, Sherali
In:
Future Generation Computer Systems
;
101
;
843-864
;
2019
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Integration of VANET and 5G Security: A review of design and implementation issues
-
Contributors:
-
Published in:Future Generation Computer Systems ; 101 ; 843-864
-
Publisher:
- New search for: Elsevier B.V.
-
Publication date:2019-07-04
-
Size:22 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 101
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Mapping heterogeneous research infrastructure metadata into a unified catalogue for use in a generic virtual research environmentMartin, Paul / Remy, Laurent / Theodoridou, Maria / Jeffery, Keith / Zhao, Zhiming et al. | 2019
- 14
-
Modified deep residual network architecture deployed on serverless framework of IoT platform based on human activity recognition applicationKeshavarzian, Alireza / Sharifian, Saeed / Seyedin, Sanaz et al. | 2019
- 29
-
An efficient linkable group signature for payer tracing in anonymous cryptocurrenciesZhang, Lingyue / Li, Huilin / Li, Yannan / Yu, Yong / Au, Man Ho / Wang, Baocang et al. | 2019
- 39
-
Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in cloudsWen, Yiping / Wang, Zhibin / Zhang, Yu / Liu, Jianxun / Cao, Buqing / Chen, Jinjun et al. | 2019
- 51
-
A Relevance-based approach for Big Data ExplorationBagozi, Ada / Bianchini, Devis / De Antonellis, Valeria / Garda, Massimiliano / Marini, Alessandro et al. | 2019
- 70
-
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networksZhou, Jun / Cao, Zhenfu / Dong, Xiaolei / Vasilakos, Thanos et al. | 2019
- 83
-
Evaluating impacts of traffic migration and virtual network functions consolidation on power aware resource allocation algorithmsHejja, Khaled / Hesselbach, Xavier et al. | 2019
- 99
-
A cloud-agnostic queuing system to support the implementation of deadline-based application execution policiesKiss, Tamas / DesLauriers, James / Gesmier, Gregoire / Terstyanszky, Gabor / Pierantoni, Gabriele / Oun, Osama Abu / Taylor, Simon J.E. / Anagnostou, Anastasia / Kovacs, Jozsef et al. | 2019
- 112
-
Dynamic digest based authentication for client–server systems using biometric verificationBabamir, Faezeh Sadat / Kirci, Murvet et al. | 2019
- 127
-
A secure privacy preserving deduplication scheme for cloud computingFan, Yongkai / Lin, Xiaodong / Liang, Wei / Tan, Gang / Nanda, Priyadarsi et al. | 2019
- 136
-
Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniquesSyed, Liyakathunisa / Jabeen, Saima / S., Manimala / Alsaeedi, Abdullah et al. | 2019
- 152
-
Deep convolutional tree networksAmory, Abduljawad A. / Muhammad, Ghulam / Mathkour, Hassan et al. | 2019
- 169
-
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic modelJie, Yingmo / Choo, Kim-Kwang Raymond / Li, Mingchu / Chen, Ling / Guo, Cheng et al. | 2019
- 180
-
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authenticationHammad, Mohamed / Zhang, Shanzhuo / Wang, Kuanquan et al. | 2019
- 197
-
Data-driven ontology generation and evolution towards intelligent service in manufacturing systemsHuang, Chengxi / Cai, Hongming / Xu, Lida / Xu, Boyi / Gu, Yizhi / Jiang, Lihong et al. | 2019
- 208
-
Measuring the impact of burst buffers on data-intensive scientific workflowsFerreira da Silva, Rafael / Callaghan, Scott / Do, Tu Mai Anh / Papadimitriou, George / Deelman, Ewa et al. | 2019
- 221
-
Multilayer overlapping community detection using multi-objective optimizationShahmoradi, M.R. / Ebrahimi, M. / Heshmati, Z. / Salehi, M. et al. | 2019
- 236
-
Cross-platform rating prediction method based on review topicZhang, Huibing / Zhong, Hao / Bai, Weihua / Pan, Fang et al. | 2019
- 246
-
A PUF-based mutual authentication scheme for Cloud-Edges IoT systemsBarbareschi, Mario / De Benedictis, Alessandra / La Montagna, Erasmo / Mazzeo, Antonino / Mazzocca, Nicola et al. | 2019
- 262
-
Meteor: Optimizing spark-on-yarn for short applicationsZhang, Hong / Huang, Hai / Wang, Liqiang et al. | 2019
- 272
-
Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloadingMartins, Rolando / Correia, Manuel E. / Antunes, Luís / Silva, Fernando et al. | 2019
- 293
-
Mono and multi-modal biometric systems assessment by a common black box testing frameworkCabana, Antoine / Charrier, Christophe / Louis, Alain et al. | 2019
- 304
-
Socio-spatial influence maximization in location-based social networksHosseinpour, Mohammad / Malek, Mohammad Reza / Claramunt, Christophe et al. | 2019
- 315
-
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactionsWang, Haiyu / Li, Xuelian / Gao, Juntao / Li, Wei et al. | 2019
- 327
-
Edge cloud resource expansion and shrinkage based on workload for minimizing the costLi, Chunlin / Sun, Hezhi / Chen, Yi / Luo, Youlong et al. | 2019
- 341
-
A comparative analysis of machine learning models for quality pillar assessment of SaaS services by multi-class text classification of users’ reviewsRaza, Muhammad / Hussain, Farookh Khadeer / Hussain, Omar Khadeer / Zhao, Ming / Rehman, Zia ur et al. | 2019
- 372
-
REMEDI central — expanding and sustaining a medical device communityStirm, Claire / Zink, Rich / Gesing, Sandra / Zentner, Michael / Junk, Damion et al. | 2019
- 381
-
Developing an ontology schema for enriching and linking digital media assetsGutiérrez, Yoan / Tomás, David / Moreno, Isabel et al. | 2019
- 398
-
SciSpace: A scientific collaboration workspace for geo-distributed HPC data centersKhan, Awais / Kim, Taeuk / Byun, Hyunki / Kim, Youngjae et al. | 2019
- 410
-
Verifiable ranked search over encrypted data with forward and backward privacyNajafi, Aniseh / Javadi, Hamid Haj Seyyed / Bayat, Majid et al. | 2019
- 420
-
Privacy aware decentralized access control systemShafeeq, Sehrish / Alam, Masoom / Khan, Abid et al. | 2019
- 434
-
Performance analysis and optimization for coverage enhancement strategy of Narrow-band Internet of ThingsWang, Xiangming / Yang, Dong / Jian, Xin / Chen, Min / Guna, Jože et al. | 2019
- 444
-
A short-term energy prediction system based on edge computing for smart cityLuo, Haidong / Cai, Hongming / Yu, Han / Sun, Yan / Bi, Zhuming / Jiang, Lihong et al. | 2019
- 458
-
Seal imprint verification via feature analysis and classificationsChung, Wei-Ho / Wu, Mu-En / Ueng, Yeong-Luh / Su, Yu-Hsuan et al. | 2019
- 467
-
Two-in-one oblivious signaturesTso, Raylin et al. | 2019
- 476
-
Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selectionAl-rimy, Bander Ali Saleh / Maarof, Mohd Aizaini / Shaid, Syed Zainudeen Mohd et al. | 2019
- 492
-
Analysis and modeling of wireless channel characteristics for Internet of Things scene based on geometric featuresShi, Guolong / He, Yigang / Li, Bing / Zuo, Lei / Yin, Baiqiang / Zeng, Wenbo / Ali, Farhan et al. | 2019
- 502
-
Value-based cloud price modeling for segmented business to business marketWu, Caesar / Buyya, Rajkumar / Ramamohanarao, Kotagiri et al. | 2019
- 524
-
A blockchain-based clock synchronization Scheme in IoTFan, Kai / Sun, Shili / Yan, Zheng / Pan, Qiang / Li, Hui / Yang, Yintang et al. | 2019
- 534
-
Biometric data on the edge for secure, smart and user tailored access to cloud servicesBarra, Silvio / Castiglione, Aniello / Narducci, Fabio / De Marsico, Maria / Nappi, Michele et al. | 2019
- 542
-
Deep Learning for EEG motor imagery classification based on multi-layer CNNs feature fusionAmin, Syed Umar / Alsulaiman, Mansour / Muhammad, Ghulam / Mekhtiche, Mohamed Amine / Shamim Hossain, M. et al. | 2019
- 555
-
Enacting open science by D4ScienceAssante, M. / Candela, L. / Castelli, D. / Cirillo, R. / Coro, G. / Frosini, L. / Lelii, L. / Mangiacrapa, F. / Pagano, P. / Panichi, G. et al. | 2019
- 564
-
uBaaS: A unified blockchain as a service platformLu, Qinghua / Xu, Xiwei / Liu, Yue / Weber, Ingo / Zhu, Liming / Zhang, Weishan et al. | 2019
- 576
-
MPI jobs within MPI jobs: A practical way of enabling task-level fault-tolerance in HPC workflowsWozniak, Justin M. / Dorier, Matthieu / Ross, Robert / Shu, Tong / Kurc, Tahsin / Tang, Li / Podhorszki, Norbert / Wolf, Matthew et al. | 2019
- 590
-
Scalable and dynamic replica consistency maintenance for edge-cloud systemLi, Chunlin / Wang, Chengyi / Tang, Hengliang / Luo, Youlong et al. | 2019
- 605
-
Adaptive interface ecosystems in smart cities control systemsSánchez, Antonio J. / Rodríguez, Sara / de la Prieta, Fernando / González, Alfonso et al. | 2019
- 621
-
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoTAghili, Seyed Farhad / Mala, Hamid / Kaliyar, Pallavi / Conti, Mauro et al. | 2019
- 635
-
Research on logistics supply chain of iron and steel enterprises based on block chain technologyYang, Aimin / Li, Yifan / Liu, Chenshuai / Li, Jie / Zhang, Yuzhu / Wang, Jiahao et al. | 2019
- 646
-
Henry gas solubility optimization: A novel physics-based algorithmHashim, Fatma A. / Houssein, Essam H. / Mabrouk, Mai S. / Al-Atabany, Walid / Mirjalili, Seyedali et al. | 2019
- 668
-
Breast mass detection from the digitized X-ray mammograms based on the combination of deep active learning and self-paced learningShen, Rongbo / Yan, Kezhou / Tian, Kuan / Jiang, Cheng / Zhou, Ke et al. | 2019
- 680
-
A scalable method of parallel tasks after the extension of machine systems based on equal change rateZeng, Guosun / Xiong, Huanliang / Wu, Canghai et al. | 2019
- 694
-
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new constructionLi, Wenting / Wang, Ping et al. | 2019
- 709
-
Sensor-based activity recognition: One picture is worth a thousand wordsRiboni, Daniele / Murtas, Marta et al. | 2019
- 723
-
Securing Spatial Data Infrastructures for Distributed Smart City applications and servicesChaturvedi, Kanishk / Matheus, Andreas / Nguyen, Son H. / Kolbe, Thomas H. et al. | 2019
- 737
-
Value-based utility implementation in software-defined testbed for sensor data traffic managementAlipio, Melchizedek I. / Co, Alex Gyran A. / Hilario, Melinda Faye C. / Pama, Christian Miguel C. et al. | 2019
- 747
-
Trust management in a blockchain based fog computing platform with trustless smart oraclesKochovski, Petar / Gec, Sandi / Stankovski, Vlado / Bajec, Marko / Drobintsev, Pavel D. et al. | 2019
- 760
-
A novel cascaded deep neural network for analyzing smart phone data for indoor localizationHassan, Md Rafiul / Haque, Md Sarwar M. / Hossain, Muhammad Imtiaz / Hassan, Mohammad Mehedi / Alelaiwi, Abdulhameed et al. | 2019
- 770
-
CMSS: Sketching based reliable tracking of large network flowsCafaro, Massimo / Epicoco, Italo / Pulimeno, Marco et al. | 2019
- 785
-
A novel framework for data acquisition and ubiquitous communication provisioning in smart citiesAhuja, Kiran / Khosla, Arun et al. | 2019
- 804
-
TSH: Easy-to-be distributed partitioning for large-scale graphsWang, Ning / Wang, Zhigang / Gu, Yu / Bao, Yubin / Yu, Ge et al. | 2019
- 819
-
GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templatesAtighehchi, Kevin / Ghammam, Loubna / Barbier, Morgan / Rosenberger, Christophe et al. | 2019
- 831
-
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklistingOuyang, Xue / Wang, Changjian / Xu, Jie et al. | 2019
- 843
-
Integration of VANET and 5G Security: A review of design and implementation issuesHussain, Rasheed / Hussain, Fatima / Zeadally, Sherali et al. | 2019
- 865
-
Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networksLiu, Liang / Ma, Zuchao / Meng, Weizhi et al. | 2019
- 880
-
Deadline-constrained workflow scheduling in IaaS clouds with multi-resource packingZhu, Zhaomeng / Tang, Xueyan et al. | 2019
- 894
-
Tiered data management system: Accelerating data processing on HPC systemsCheng, Peng / Lu, Yutong / Du, Yunfei / Chen, Zhiguang et al. | 2019
- 909
-
Optimizing the performance of optimization in the cloud environment–An intelligent auto-scaling approachSimic, Visnja / Stojanovic, Boban / Ivanovic, Milos et al. | 2019
- 921
-
An improved differential evolution algorithm using Archimedean spiral and neighborhood search based mutation approach for cluster analysisTarkhaneh, Omid / Moser, Irene et al. | 2019
- 940
-
Composing WoT services with uncertain dataAwad, Samir / Malki, Abdelhamid / Malki, Mimoun / Barhamgi, Mahmoud / Benslimane, Djamal et al. | 2019
- 951
-
The Science Gateways Community Institute: Collaborations and efforts on international scaleGesing, Sandra / Dahan, Maytal / Zentner, Michael / Wilkins-Diehr, Nancy / Lawrence, Katherine et al. | 2019
- 959
-
SLA-aware optimal resource allocation for service-oriented networksBaktır, Ahmet Cihat / Ahat, Betül / Aras, Necati / Özgövde, Atay / Ersoy, Cem et al. | 2019
- 975
-
Support for full life cycle cloud-native application management: Dynamic TOSCA and SWITCH IDEŠtefanič, Polona / Cigale, Matej / Jones, Andrew C. / Knight, Louise / Taylor, Ian et al. | 2019
- 983
-
Understanding the composition and evolution of terrorist group networks: A rough set approachLoia, Vincenzo / Orciuoli, Francesco et al. | 2019
- 993
-
Predicting supply chain risks using machine learning: The trade-off between performance and interpretabilityBaryannis, George / Dani, Samir / Antoniou, Grigoris et al. | 2019
- 1005
-
Iterated two-phase local search for the Set-Union Knapsack ProblemWei, Zequn / Hao, Jin-Kao et al. | 2019
- 1018
-
Enhancing the security of FinTech applications with map-based graphical password authenticationMeng, Weizhi / Zhu, Liqiu / Li, Wenjuan / Han, Jinguang / Li, Yan et al. | 2019
- 1028
-
IoT information sharing security mechanism based on blockchain technologySi, Haiping / Sun, Changxia / Li, Yanling / Qiao, Hongbo / Shi, Lei et al. | 2019
- 1041
-
A conceptual model for quality of experience management to provide context-aware eHealth servicesda Silva, Madalena Pereira / Gonçalves, Alexandre Leopoldo / Dantas, Mário Antônio Ribeiro et al. | 2019
- 1062
-
A survey on quality-assurance approximate stream processing and applicationsWei, Xiaohui / Liu, Yuanyuan / Wang, Xingwang / Sun, Bingyi / Gao, Shang / Rokne, Jon et al. | 2019
- 1081
-
Latency-aware failover strategies for containerized web applications in distributed cloudsAldwyan, Yasser / Sinnott, Richard O. et al. | 2019
- 1096
-
Context-aware System for Dynamic Privacy Risk InferenceBou Chaaya, Karam / Barhamgi, Mahmoud / Chbeir, Richard / Arnould, Philippe / Benslimane, Djamal et al. | 2019
- 1112
-
Energy and performance aware fog computing: A case of DVFS and green renewable energyToor, Asfa / Islam, Saif ul / Sohail, Nimra / Akhunzada, Adnan / Boudjadar, Jalil / Khattak, Hasan Ali / Din, Ikram Ud / Rodrigues, Joel J.P.C. et al. | 2019
- 1122
-
Design of personnel big data management system based on blockchainChen, Jian / Lv, Zhihan / Song, Houbing et al. | 2019
- 1130
-
A framework for intelligent analysis of digital cardiotocographic signals from IoMT-based foetal monitoringLu, Yu / Qi, Yingjian / Fu, Xianghua et al. | 2019
- 1142
-
Adaptive energy-aware scheduling method in a meteorological cloudHao, Yongsheng / Cao, Jie / Ma, Tinghuai / Ji, Sai et al. | 2019
- 1158
-
A greedy-proof incentive-compatible mechanism for group recruitment in mobile crowd sensingSuliman, Ahmed / Otrok, Hadi / Mizouni, Rabeb / Singh, Shakti / Ouali, Anis et al. | 2019
- 1168
-
A new strategy based on approximate dynamic programming to maximize the net revenue of IaaS cloud providers with limited resourcesYue, Wenying / Du, Peng / Quan, Xiongwen / Chen, Ying et al. | 2019
- 1187
-
Placing big graph into cloud for parallel processing with a two-phase community-aware approachHu, Kekun / Zeng, Guosun et al. | 2019
- 1201
-
Online travel mode detection method using automated machine learning and feature engineeringF. de S. Soares, Elton / V. Campos, Carlos Alberto / C. de Lucena, Sidney et al. | 2019
- 1213
-
Congestion control vs. link failure: TCP behavior in mmWave connected vehicular networksNa, Woongsoo / Lakew, Demeke Shumeye / Lee, Jihoon / Cho, Sungrae et al. | 2019
- 1223
-
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVDAraghi, Tanya Koohpayeh / Manaf, Azizah Abd et al. | 2019
- 1247
-
Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networksHuda, Shamsul / Abawajy, Jemal / Al-Rubaie, Baker / Pan, Lei / Hassan, Mohammad Mehedi et al. | 2019
- 1259
-
An approach for iris contact lens detection and classification using ensemble of customized DenseNet and SVMChoudhary, Meenakshi / Tiwari, Vivek / U., Venkanna et al. | 2019
- 1271
-
Automated synthesis of mediators for middleware-layer protocol interoperability in the IoTBouloukakis, Georgios / Georgantas, Nikolaos / Ntumba, Patient / Issarny, Valérie et al. | 2019
- ii
-
Editorial Board| 2019