Abstract is missing.
- Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN NetworksYi-Hsun Lu, Fang-Yie Leu. 1-11 [doi]
- Blockchain-Based Reputation System in Agri-Food Supply ChainAffaf Shahid, Umair Sarfraz, Muhammad Waseem Malik, Muhammad Sohaib Iftikhar, Abid Jamal, Nadeem Javaid. 12-21 [doi]
- An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and DemandZeeshan Aslam, Nadeem Javaid, Muhammad Adil, Muhammad Tariq Ijaz, Atta-ur-Rahman, Mohsin Ahmed. 22-35 [doi]
- A Secure Distributed e-Health System for the Management of Personal Health Metrics DataRazvan Bocu. 36-51 [doi]
- Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade LaneAyesha Ubaid, Farookh Khadeer Hussain, Jon Charles. 52-59 [doi]
- Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate ResponsesEbtesam Hussain Almansor, Farookh Khadeer Hussain. 60-70 [doi]
- Self-balanced IPv4-IPv6 Lossless Translators with Dynamic Addresses MappingGiovanni Bembo, Francesco Lo Presti. 71-84 [doi]
- Eye Tracking Technology in Personal Authentication ProtocolsMarek R. Ogiela, Lidia Ogiela. 85-89 [doi]
- Techno-Economic Analysis of MMWave vs Mid-Band Spectrum in 5G NetworksChristos Bouras, Anastasia Kollia. 90-105 [doi]
- Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare SystemFatima Tariq, Zahoor Ali Khan, Tanzeela Sultana, Mubariz Rehman, Qaiser Shahzad, Nadeem Javaid. 106-115 [doi]
- Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel ReservationLucas de Melo Guimarães, Jacir Luiz Bordim. 116-126 [doi]
- Machine Learning Based Data Reduction in WSN for Smart AgricultureChristian Salim, Nathalie Mitton. 127-138 [doi]
- A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFVInès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane. 139-152 [doi]
- ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor NodesTaiki Morita, Xuejun Tian, Takashi Okuda. 153-163 [doi]
- DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed PredictionMing-Chang Lee, Jia-Chun Lin. 164-175 [doi]
- Periodic Mining of Traffic Information in Industrial Control NetworksJiahui Ni, Wenqing Yin, Yong Jiang, Jingling Zhao, Yiming Hu. 176-183 [doi]
- The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine EnvironmentsTomoya Enokido, Makoto Takizawa 0001. 184-192 [doi]
- A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing EnvironmentsCharafeddine Mechalikh, Hajer Taktak, Faouzi Moussa. 193-203 [doi]
- CUSCO: A Customizable Solution for NFV CompositionVinicius Fulber Garcia, Marcelo Caggiani Luizelli, Carlos Raniery Paula dos Santos, Elias P. Duarte. 204-216 [doi]
- Evaluating Energy Efficiency and Security for Internet of Things: A Systematic ReviewLuciana P. Oliveira, Moroni N. Vieira, Gabriel B. Leite, Edson L. V. de Almeida. 217-228 [doi]
- IoT Geolocation Performance Using LoRaWANChristos Bouras, Apostolos Gkamas, Vasileios Kokkinos, Nikolaos Papachristos. 229-239 [doi]
- TF-BiLSTMS2S: A Chinese Text Summarization ModelCaiquan Xiong, Zhuang Wang, Li Shen, Na Deng. 240-249 [doi]
- Mobile Fog Computing Model of a Topic-Based Publish/Subscribe SystemTakumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 250-257 [doi]
- Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay PredictionBelal Alsinglawi, Fady Alnajjar, Omar Mubin, Mauricio Novoa, Ola Karajeh, Omar M. Darwish. 258-267 [doi]
- Distributed Approach to Fog Computing with Auction MethodYinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 268-275 [doi]
- A Self-learning Personal Privacy AssistantMounika Kasaraneni, Johnson P. Thomas. 276-287 [doi]
- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering CM and LDVM Replacement MethodsShinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto. 288-297 [doi]
- Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement MethodsAdmir Barolli, Seiji Ohara, Shinji Sakamoto, Makoto Takizawa 0001, Leonard Barolli. 298-307 [doi]
- A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) ProblemZia Ullah, M. R. Elkadeem, Shaorong Wang, Muhammad Azam, Khdija Shaheen, Mehmood Hussain, Muhammad Rizwan. 308-319 [doi]
- Narrative Knowledge Representation and Blockchain: A Symbiotic RelationshipLyazid Sabri, Abdelhak Boubetra. 320-332 [doi]
- Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile DevicesThongtat Oransirikul, Hideyuki Takada. 333-344 [doi]
- Better User Clustering Scheme in Distributed NOMA SystemsSalifou Mounchili, Soumaya Hamouda. 345-356 [doi]
- Sample Selection Search to Predict Elephant Flows in IXP Programmable NetworksMarcus Vinicius Brito da Silva, André Augusto Pacheco de Carvalho, Arthur Selle Jacobs, Ricardo José Pfitscher, Lisandro Zambenedetti Granville. 357-368 [doi]
- An Experimental Study on Culturally Competent Robot for Smart Home EnvironmentVan Cu Pham, Yuto Lim, Ha-Duong Bui, Yasuo Tan, Nak Young Chong, Antonio Sgorbissa. 369-380 [doi]
- A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry ProblemRumenigue Hohemberger, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Marcelo Caggiani Luizelli. 381-392 [doi]
- Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World DrivingInsaf Sagaama, Amine Kchiche, Wassim Trojet, Farouk Kamoun. 393-404 [doi]
- Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of ThingsMohamed Saifeddine Hadj Sassi, Lamia Chaari Fourati. 405-418 [doi]
- Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil AttacksKrzysztof Stepien, Aneta Poniszewska-Maranda. 419-430 [doi]
- Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis ApproachPiyush Ghasiya, Koji Okamura. 431-443 [doi]
- A Universal Defense System Based on Backtrace Canary for ELF Against VulnerabilitiesJingling Zhao, Congxiang Yu, Yunze Ni. 444-457 [doi]
- Budgeted Constrained Coverage on Series-Parallel Multi-interface NetworksAlessandro Aloisio, Alfredo Navarra. 458-469 [doi]
- Transformative Computing for Distributed Services Management ProtocolsLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 470-475 [doi]
- Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison StudyDonald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 476-487 [doi]
- A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node's Unique Encounters as a New ParameterMiralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Makoto Takizawa 0001, Leonard Barolli. 488-498 [doi]
- A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor NetworksShahab Ali, Nadeem Javaid, Danish Javeed, Ijaz Ahmad, Anwar Ali, Umar Mohammed Badamasi. 499-511 [doi]
- Performance Evaluation of Nomadic Lévy Walk on Unit Disk Graphs Using Hierarchical ClusteringKoichiro Sugihara, Naohiro Hayashibara. 512-522 [doi]
- Animal Species Recognition Using Deep LearningMai Ibraheam, Fayez Gebali, Kin Fun Li, Leonard Sielecki. 523-532 [doi]
- Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCsSirine Mnejja, Yassine Aydi, Mohamed Abid, Salvatore Monteleone, Maurizio Palesi, Davide Patti. 533-546 [doi]
- Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service PlatformsBesfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles. 547-558 [doi]
- SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V PipelineDongchu Su, Yong Li, Bo Yuan. 559-565 [doi]
- On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSNMohamed Anis Fekih, Ichrak Mokhtari, Walid Bechkit, Yasmine Belbaki, Hervé Rivano. 566-578 [doi]
- Evaluation of SLA Negotiation for Personalized SDN Service DeliveryShuraia Khan, Farookh Khadeer Hussain. 579-590 [doi]
- Trust-Based Decision Making for Food-Energy-Water ActorsSuleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens. 591-602 [doi]
- Trust-Based Human-Machine Collaboration Mechanism for Predicting CrimesDavinder Kaur, Suleyman Uslu, Arjan Durresi, George O. Mohler, Jeremy G. Carter. 603-616 [doi]
- Detection of Users' Abnormal Behavior on Social NetworksNour El Houda Ben Chaabene, Amel Bouzeghoub, Ramzi Guetari, Samar Balti, Henda Hajjami Ben Ghezala. 617-629 [doi]
- Efficient Authentication Scheme Using Blockchain in IoT DevicesHimani Sikarwar, Debasis Das, Sumit Kalra. 630-641 [doi]
- VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in CloudSudhakar Murugasen, Shankar Raman, Kamakoti Veezhinathan. 642-656 [doi]
- On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc NetworksPratik Kumar Sinha, Subhrabrata Choudhury, Animesh Dutta. 657-668 [doi]
- An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease AnalyticsJoglas Souza, Carson K. Leung, Alfredo Cuzzocrea. 669-680 [doi]
- Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO NetworksHosni Manai, Larbi Ben Hadj Slama, Ridha Bouallegue. 681-692 [doi]
- A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 EnvironmentsRocco Langone, Alfredo Cuzzocrea, Nikolaos Skantzos. 693-702 [doi]
- Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures InterconnectionJosé A. T. Gavazza, Juliano Coelho Melo, Thiago Bueno da Silva, Antônio Marcos Alberti, Pedro Frosi Rosa, Flávio de Oliveira Silva, Fábio Luciano Verdi, José Augusto Suruagy. 703-714 [doi]
- Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building Automation SystemsMarkus Aleksy, Philipp Bauer. 715-721 [doi]
- Analysis of Human Vital Functions Based on Data from Internet of Things DevicesAneta Poniszewska-Maranda, Maciej Pluta. 722-733 [doi]
- Adaptive Multi-agent-based Alert System for Diseases' DetectionIbtihel Selmi, Nadia Kabachi, Sana Ben Abdallah, Chirine Ghedira Guegan, Hajer Baazaoui Zghal. 734-745 [doi]
- Anycast MAC Protocol with Advanced Preamble for Wireless Sensor NetworksJoão Carlos Giacomin, Gustavo Figueiredo Araújo, Tales Heimfarth. 746-757 [doi]
- Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing ProblemJoanna Ochelska-Mierzejewska. 758-767 [doi]
- Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVsKemal Ihsan Kilic, Orhan Gemikonakli, Leonardo Mostarda. 768-779 [doi]
- Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel AnalysisGianluca De Luca Fiscone, Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri. 780-791 [doi]
- Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine LearningRyoichi Shinkuma, Rieko Takagi, Yuichi Inagaki, Eiji Oki, Fatos Xhafa. 792-803 [doi]
- Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing SchedulesPaulo Aragao, Reinhard Gotzhein. 804-816 [doi]
- Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival PatternsJerzy Proficz, Piotr Sumionka, Jaroslaw Skomial, Marcin Semeniuk, Karol Niedzielewski, Maciej Walczak. 817-829 [doi]
- Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs)Rodrigo Moreira, Pedro Frosi Rosa, Rui Luis Andrade Aguiar, Flávio de Oliveira Silva. 830-844 [doi]
- A RSA-Biometric Based User Authentication Scheme for Smart Homes Using SmartphonesAmir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré. 845-857 [doi]
- A Bottom-Up Approach for Extracting Network IntentsRafael Hengen Ribeiro, Arthur Selle Jacobs, Ricardo Parizotto, Luciano Zembruzki, Alberto Egon Schaeffer Filho, Lisandro Zambenedetti Granville. 858-870 [doi]
- [inline-graphic not available: see fulltext]: Measuring Centralization of DNS Infrastructure in the WildLuciano Zembruzki, Arthur Selle Jacobs, Gustavo Spier Landtreter, Lisandro Zambenedetti Granville, Giovane C. M. Moura. 871-882 [doi]
- Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean DistanceVanice Canuto Cunha, Arturo A. Z. Zavala, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire. 883-897 [doi]
- Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model UpdatesEduardo K. Viegas, Altair Santin Santin, Vinicius V. Cogo, Vilmar Abreu. 898-909 [doi]
- Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster SituationsSami Abdellatif, Okba Tibermacine, Walid Bechkit, Abdelmalik Bachir. 910-921 [doi]
- Micro-service Based Network Management for Distributed ApplicationsRafael de Jesus Martins, Rodolfo B. Hecht, Ederson Ribas Machado, Jéferson Campos Nobre, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville. 922-933 [doi]
- Offloading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communicationsMohamad Salhani. 934-946 [doi]
- Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO SystemsMaroua Shili, Moufida Hajjaj, Mohamed Lassaad Ammari. 947-956 [doi]
- Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution SystemsAlfonso Di Pace, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Aldo Meglio, Francesco Orciuoli. 957-967 [doi]
- Dynamic User Interests Profiling Using Fuzzy Logic ApplicationAbd El Heq Silem, Hajer Taktak, Faouzi Moussa. 968-979 [doi]
- Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer NetworkingYuanyi Qi, Jianhua Yang, Yongzhong Zhang. 980-993 [doi]
- A Secure and Distributed Control Plane for Software Defined NetworksJefferson Pereira da Silva, Eduardo Alchieri, Jacir Luiz Bordim, Lucas Costa. 994-1006 [doi]
- Efficiently Detecting Web Spambots in a Temporally Annotated SequenceHayam Alamro, Costas S. Iliopoulos, Grigorios Loukides. 1007-1019 [doi]
- On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony OptimizationDharmendra Prasad Mahato. 1020-1031 [doi]
- DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement LearningLucas C. Casagrande, Guilherme Piegas Koslovski, Charles Christian Miers, Maurício A. Pillon. 1032-1044 [doi]
- Communication QoS-Aware Navigation of Autonomous Robots for Effective CoordinationAmar Nath, Rajdeep Niyogi. 1045-1056 [doi]
- Semantic CPPS in Industry 4.0Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Domenico Marino, Francesco Orciuoli, Alberto Volpe. 1057-1068 [doi]
- Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian LanguageSerena Pelosi. 1069-1077 [doi]
- Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research MethodsMaria Carmela Catone, Paolo Diana, Giuseppe Giordano. 1078-1088 [doi]
- Context-Aware Service Composition with Functionally Equivalent Services for Complex User RequestsSujata Swain, Rajdeep Niyogi. 1089-1100 [doi]
- Cloud Resources Reassignment Based on CPU and Bandwidth CorrelationSergi Vila, Nilson Moraes, Fernando Guirado, Josep L. Lérida, Fernando Cores, Fábio L. Verdi. 1101-1113 [doi]
- Elixir: An Agent for Supporting Elasticity in Docker SwarmMichail S. Alexiou, Euripides G. M. Petrakis. 1114-1125 [doi]
- A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing ApproachAmel Ben Lazreg, Anis Ben Arbia, Habib Youssef. 1126-1137 [doi]
- Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance ComparisonKhaoula Braiki, Habib Youssef. 1138-1149 [doi]
- A Multi-Criteria Decision Making Approach for Cloud-Fog CoordinationFadwa Yahya, Zakaria Maamar, Khouloud Boukadi. 1150-1161 [doi]
- A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of ThingsImad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi. 1162-1175 [doi]
- Towards an Approach for Validating the Internet-of-Transactional-ThingsZakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, Bita Banihashemi. 1176-1188 [doi]
- iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the CloudNeofytos Zacharia, Konstantinos Tsakos, Euripides G. M. Petrakis. 1189-1200 [doi]
- iSWoT: Service Oriented Architecture in the Cloud for the Semantic Web of ThingsStelios Botonakis, Aimilios Tzavaras, Euripides G. M. Petrakis. 1201-1214 [doi]
- Identity and Access Management for IoT in Smart GridVilmar Abreu, Altair Olivo Santin, Eduardo K. Viegas, Vinicius V. Cogo. 1215-1226 [doi]
- Information Centric Protocols to Overcome the Limitations of Group Communication in the IoTRosana Lachowski, Marcelo E. Pellenz, Edgard Jamhour, Manoel Camillo Penna, Guilherme Luiz Moritz, Glauber Brante, Richard D. Souza. 1227-1238 [doi]
- Prevention of DDoS Attacks in IoT NetworksFatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha. 1239-1250 [doi]
- Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical RecordKuang-Yen Tai, Tzer-Shyong Chen, Frank Yeong-Sung Lin, Po-Min Huang, Jing-Chen Tu. 1251-1264 [doi]
- Development of an Information Security Management Model for Enterprise Automated SystemsThamer Alhussain, Ahmad Ali AlZubi, Osama Alfarraj, Salem Alkhalaf, Musab S. Alkhalaf. 1265-1277 [doi]
- Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted EmailKota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki. 1278-1290 [doi]
- RePAD: Real-Time Proactive Anomaly Detection for Time SeriesMing-Chang Lee, Jia-Chun Lin, Ernst Gunnar Gran. 1291-1302 [doi]
- An Event-B Based Approach for Formal Modelling and Verification of Smart ContractsAsma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin 0001. 1303-1318 [doi]
- Greybox Fuzzing Based on Ant Colony AlgorithmBowen Sun, Bo Wang, Baojiang Cui, Yeqi Fu. 1319-1329 [doi]
- Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical UseYuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki. 1330-1340 [doi]
- Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based DetectionDavid Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen. 1341-1354 [doi]
- New Programmable Data Plane Architecture Based on P4 OpenFlow AgentRanyelson N. Carvalho, Lucas R. Costa, Jacir Luiz Bordim, Eduardo Adílio Pelinson Alchieri. 1355-1367 [doi]
- Code Reordering Obfuscation Technique Detection by Means of Weak BisimulationGiuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 1368-1382 [doi]
- Using Four Modalities for Malware Detection Based on Feature Level and Decision Level FusionJarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova. 1383-1396 [doi]
- Intrusion Detection Using ASTDsLionel Nganyewou Tidjon, Marc Frappier, Amel Mammar. 1397-1411 [doi]
- On the File Recovery in Systems Infected by RansomwareRaffaele D'Arco, Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri. 1412-1425 [doi]
- An Improved Fast Correlation Attack on Fruit-80Chunlan Zhang, Lihua Dong. 1426-1436 [doi]
- A Long-Lasting Reinforcement Learning Intrusion Detection ModelRoger Robson dos Santos, Eduardo Kugler Viegas, Altair Santin, Vinicius Vielmo Cogo. 1437-1448 [doi]
- Context-Aware and Dynamic Role-Based Access Control Using BlockchainMohsin Ur Rahman, Barbara Guidi, Fabrizio Baiardi, Laura Ricci. 1449-1460 [doi]
- A Framework for Classifying Web Attacks While Respecting ML RequirementsNourhène Ben Rabah, Ines Ben Tekeya. 1461-1473 [doi]
- Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion BatteryChinedu I. Ossai, Ifeanyi P. Egwutuoha. 1474-1488 [doi]