Abstract is missing.
- A Fuzzy-Based System for Determining Driver Stress in VANETs Considering Driving Experience and HistoryKevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 1-9 [doi]
- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Instances: A Comparison Study for RDVM and LDIWM Replacement MethodsShinji Sakamoto, Yi Liu 0011, Leonard Barolli. 10-18 [doi]
- Millimeter-Wave Dual-Band Slotted Antenna for 5G ApplicationsPrince Mahmud Ridoy, Arajit Saha, Khadija Yeasmin Fariya, Pranta Saha, Khan Md. Elme, Farhadur Arifin. 19-30 [doi]
- NARUN-PC: Caching Strategy for Noise Adaptive Routing in Utility NetworksFabio Pagnotta, Leonardo Mostarda, Alfredo Navarra. 31-42 [doi]
- HYPE: CNN Based HYbrid PrEcoding Framework for 5G and BeyondDeepti Sharma, Kuldeep Marotirao Biradar, Santosh Kumar Vipparthi, Ramesh Babu Battula. 43-54 [doi]
- The Multi-access Edge Computing (MEC)-Based Bit Rate Adaptive Multicast SVC Streaming Using the Adaptive FEC MechanismChung-Ming Huang, Kai-Jiun Yang. 55-67 [doi]
- PROA: Pipelined Receiver Oriented Anycast MAC for IoTJoão Carlos Giacomin, Tales Heimfarth. 68-80 [doi]
- A Watchdog Proposal to a Personal e-Health ApproachGabriel Di iorio Silva, Wagno Leão Sergio, Victor Ströele, Mario A. R. Dantas. 81-94 [doi]
- Computation Offloading by Two-Sided Matching in Fog ComputingMeng Wang, Minoru Uehara. 95-104 [doi]
- Distributed Log Search Based on Time Series Access and Service RelationsTomoyuki Koyama, Takayuki Kushida. 105-117 [doi]
- Detector: Hierarchical Distributed Fault Detection Algorithm for Lattice Based Modular RobotsEdy Hourany, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois, Bachir Habib. 118-129 [doi]
- ManufactSim: Manufacturing Line Simulation Using Heterogeneous Distributed RobotsBenoît Piranda, Ishan Gautam, Jerome Meyer, Anass El Houd, Julien Bourgeois. 130-140 [doi]
- Sports Data Management, Mining, and VisualizationBamibo C. Isichei, Carson K. Leung, Lam Thu Nguyen, Luke B. Morrow, Anh Tuan Ngo, Trang Doan Pham, Alfredo Cuzzocrea. 141-153 [doi]
- Mining for Fake NewsRenz M. Cabusas, Brenna N. Epp, Justin M. Gouge, Tyson N. Kaufmann, Carson K. Leung, James R. A. Tully. 154-166 [doi]
- Software Functional and Non-function Requirement Classification Using Word-EmbeddingLov Kumar, Siddarth Baldwa, Shreya Manish Jambavalikar, Lalita Bhanu Murthy Neti, Aneesh Krishna. 167-179 [doi]
- Topic Guided Image Captioning with Scene and Spatial FeaturesUsman Zia, Muhammad Mohsin Riaz, Abdul Ghafoor. 180-191 [doi]
- A Socially-Aware, Privacy-Preserving, and Scalable Federated Learning Protocol for Distributed Online Social NetworksMansour Khelghatdoust, Mehregan Mahdavi. 192-203 [doi]
- A Multi-layer Modeling for the Generation of New Architectures for Big Data WarehousingAsma Dhaouadi, Khadija Bousselmi, Sébastien Monnet, Mohamed Mohsen Gammoudi, Slimane Hammoudi. 204-218 [doi]
- Efficient Retransmission Algorithm for Ensuring Packet Delivery to Sleeping Destination NodeAli Medlej, Eugen Dedu, Dominique Dhoutaut, Kamal Beydoun. 219-230 [doi]
- The Development of an Elderly Monitoring System with Multiple SensorsYasunao Takano, Hiroyuki Adachi, Hiroji Ochii, Mikio Okazaki, Sena Takeda. 231-242 [doi]
- Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTEBathini Sai Akash, Pavan Kumar Reddy Yannam, Bokkasam Venkata Sai Ruthvik, Lov Kumar, Lalita Bhanu Murthy Neti, Aneesh Krishna. 243-255 [doi]
- A Decentralized Federated Learning Architecture for Intrusion Detection in IoT SystemsFrancisco Assis Moreira do Nascimento, Fabiano Hessel. 256-268 [doi]
- Regression Analysis Using Machine Learning Approaches for Predicting Container Shipping RatesIbraheem Abdulhafiz Khan, Farookh Khadeer Hussain. 269-280 [doi]
- Robust Variational Autoencoders and Normalizing Flows for Unsupervised Network Anomaly DetectionNaji Najari, Samuel Berlemont, Grégoire Lefebvre, Stefan Duffner, Christophe Garcia. 281-292 [doi]
- Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart DialogsAnna Pogoda, Ewa Lyko, Michal Kedziora, Ireneusz Jozwiak, Jolanta Pietraszko. 293-305 [doi]
- Using Simplified EEG-Based Brain Computer Interface and Decision Tree Classifier for Emotions DetectionRafal Chalupnik, Katarzyna Bialas, Zofia Majewska, Michal Kedziora. 306-316 [doi]
- Anomaly Detection from Distributed Data Sources via Federated LearningFlorencia Cavallin, Rudolf Mayer. 317-328 [doi]
- On Predicting COVID-19 Fatality Ratio Based on Regression Using Machine Learning ModelMd. Mafijul Islam Bhuiyan, Mondar Maruf Moin Ahmed, Anik Alvi, Md. Safiqul Islam, Prasenjit Mondal, Md. Akbar Hossain, S. N. M. Azizul Hoque. 329-338 [doi]
- Distributed Training from Multi-sourced DataIbrahim Dahaoui, Mohamed Mosbah, Akka Zemmari. 339-347 [doi]
- Viterbi Algorithm and HMM Implementation to Multicriteria Data-Driven Decision Support Model for Optimization of Medical Service Quality SelectionJolanta Mizera-Pietraszko, Jolanta Tancula. 348-360 [doi]
- Performance Evaluation of a DQN-Based Autonomous Aerial Vehicle Mobility Control Method in Corner EnvironmentNobuki Saito, Tetsuya Oda, Aoto Hirata, Chihiro Yukawa, Kyohei Toyoshima, Tomoaki Matsui, Leonard Barolli. 361-372 [doi]
- OpenAPI QL: Searching in OpenAPI Service CatalogsIoanna-Maria Stergiou, Nikolaos Mainas, Euripides G. M. Petrakis. 373-385 [doi]
- Sensor Virtualization and Provision in Internet of VehiclesSlim Abbes, Slim Rekhis. 386-397 [doi]
- A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption AlgorithmHouaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler. 398-408 [doi]
- Micro-Service Placement Policies for Cost Optimization in KubernetesAlkiviadis Aznavouridis, Konstantinos Tsakos, Euripides G. M. Petrakis. 409-420 [doi]
- A Differentiated Approach Based on Edge-Fog-Cloud Environment to Support e-Health on Rural AreasFernando de Almeida Silva, Walkíria Garcia de Souza Silveira, Mario Dantas. 421-432 [doi]
- Trustworthy Fairness Metric Applied to AI-Based Decisions in Food-Energy-WaterSuleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Mimoza Durresi, Meghna Babbar-Sebens. 433-445 [doi]
- New Security Protocols for Offline Point-of-Sale MachinesNour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle. 446-467 [doi]
- Building a Blockchain-Based Social Network Identification SystemZhanwen Chen, Kazumasa Omote. 468-479 [doi]
- Malware Classification by Deep Learning Using Characteristics of Hash FunctionsTakahiro Baba, Kensuke Baba, Toshihiro Yamauchi. 480-491 [doi]
- Toward a Blockchain Healthcare Information ExchangeRyuji Ueno, Kazumasa Omote. 492-502 [doi]
- A Design Thinking Approach on Information SecurityLukas König, Simon Tjoa. 503-515 [doi]
- Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet EncryptionNoah Neundorfer, Jianhua Yang, Lixin Wang. 516-527 [doi]
- A Study on Enhancing Anomaly Detection Technology with Synthetic-Log GenerationTakumi Yamamoto, Aiko Iwasaki, Hajime Kobayashi, Kiyoto Kawauchi, Ayako Yoshimura. 528-538 [doi]
- Application of Hybrid Intelligence for Security PurposesMarek R. Ogiela, Lidia Ogiela. 539-542 [doi]
- Semantic-Based Techniques for Efficient and Secure Data ManagementUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 543-546 [doi]
- CoWrap: An Approach of Feature Selection for Network Anomaly DetectionAnonnya Ghosh, Hussain Mohammed Ibrahim, Wasif Mohammad, Farhana Chowdhury Nova, Amit Hasan, Raqeebir Rab. 547-559 [doi]
- Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer GraphAmal Sayari, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, Belhassen Jerbi. 560-572 [doi]
- Quantum-Secure Aggregate One-time Signatures with Detecting FunctionalityShingo Sato, Junji Shikata. 573-585 [doi]
- Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency PerturbationTakamichi Terada, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki. 586-597 [doi]
- Comparative Study of Ensemble Learning Techniques for Fuzzy Attack Detection in In-Vehicle NetworksDorsaf Swessi, Hanen Idoudi. 598-610 [doi]
- ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain PaymentsFlavio Corradini, Leonardo Mostarda, Emanuele Scala. 611-623 [doi]
- Prevention of SQL Injection Attacks Using Cryptography and Pattern MatchingR. Madhusudhan, Mohammad Ahsan. 624-634 [doi]
- Monitoring Jitter in Software Defined NetworksJithin Kallukalam Sojan, K. Haribabu. 635-645 [doi]
- Designing and Prototyping of SDN Switch for Application-Driven ApproachDiego Nunes Molinos, Romerson Deiny Oliveira, Marcelo Silva Freitas, Natal Vieira de Souza Neto, Marcelo Barros de Almeida, Flávio de Oliveira Silva, Pedro Frosi Rosa. 646-658 [doi]
- SD-WAN: Edge Cloud Network Acceleration at Australia Hybrid Data CenterJunjie Wang, Lihong Zheng. 659-670 [doi]
- Decision Tree Based IoT Attack Detection in Programmable Data Plane Using P4 LanguageRahul Poddar, Hari Babu. 671-683 [doi]
- Prevention of DrDoS Amplification Attacks by Penalizing the Attackers in SDN EnvironmentShail Saharan, Vishal Gupta. 684-696 [doi]