24 | -- | 0 | Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li. Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks |
25 | -- | 0 | Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa. Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks |
26 | -- | 0 | Mradula Sharma, Parmeet Kaur 0001. Fog-based Federated Time Series Forecasting for IoT Data |
27 | -- | 0 | Mathias De Brouwer, Filip De Turck, Femke Ongenae. Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE |
28 | -- | 0 | Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya. Optimizing Completion Time of Requests in Serverless Computing |
29 | -- | 0 | Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa. Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review |
30 | -- | 0 | Sateesh Gorikapudi, Hari Kishan Kondaveeti. Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks |
31 | -- | 0 | Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz. 2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN |
32 | -- | 0 | Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao. Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree |
33 | -- | 0 | Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture |
34 | -- | 0 | Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari. A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints |
35 | -- | 0 | Nathan Harris, Sajad Khorsandroo. DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks |
36 | -- | 0 | Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio Oliveira Silva 0001. Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems |
37 | -- | 0 | Siamak Azadiabad, Ferhat Khendek. Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification |
38 | -- | 0 | Mayssa Dardour, Mohamed Mosbah 0001, Toufik Ahmed. Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings |
39 | -- | 0 | Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani. Placement Optimization of Virtual Network Functions in a Cloud Computing Environment |
40 | -- | 0 | Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero. An Edge Cloud Based Coordination Platform for Multi-user AR Applications |
41 | -- | 0 | Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song. Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach |
42 | -- | 0 | Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams |