Abstract is missing.
- Survival Strategies for IT Companies During Crisis: A Case Study of RussiaMohammad Khalil, Manuel Mazzara. 1-10 [doi]
- Comparative Analysis of Ontologies for Archival RepresentationAlba Amato, Giuseppe Cirillo. 11-19 [doi]
- Augmented Reality for Cyberphisical Exploration of Archeological SitesLuigi Alberico, Dario Branco, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque. 20-28 [doi]
- Research on Archive Digital Editing and Studying ModeJingyi Zeng. 29-36 [doi]
- An Ontology for the Annotation of the Archives of the Royal Site of San LeucioAlba Amato, Angelo Di Falco. 37-44 [doi]
- An Architecture for Metadata and Semantic Annotation of Historical ArchivesAlba Amato, Dario Branco, Salvatore Venticinque. 45-54 [doi]
- Social Robots and Edge Computing: Integrating Cloud Robotics in Social InteractionTheodor-Radu Grumeza, Thomas-Andrei Lazar, Alexandra Emilia Fortis. 55-64 [doi]
- Fine-Tuned CNN for Clothing Image Classification on Mobile Edge ComputingDiogen Babuc, Alexandra Emilia Fortis. 65-75 [doi]
- Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0Shamsher Ullah, Jianqiang Li 0001, Farhan Ullah, Diletta Cacciagrano, Muhammad Tanveer Hussain, Victor C. M. Leung. 76-85 [doi]
- Fixed-Parameter Tractability for Branchwidth of the Maximum-Weight Edge-Colored Subgraph ProblemAlessandro Aloisio. 86-95 [doi]
- On Coverage in Multi-Interface Networks with Bounded PathwidthAlessandro Aloisio, Alfredo Navarra. 96-105 [doi]
- Sensitivity Analysis of Performability Model to Evaluate PBFT SystemsMarco Marcozzi, Antinisca Di Marco, Leonardo Mostarda. 106-113 [doi]
- Algorithmic Aspects of Distributing Energy Consumption in Multi-interface NetworksAlessandro Aloisio. 114-123 [doi]
- Blockchain and Financial Services a Study of the Applications of Distributed Ledger Technology (DLT) in Financial ServicesRamiz Salama, Diletta Cacciagrano, Fadi Al-Turjman 0001. 124-135 [doi]
- A Personalized Parking Guidance Service Based on Computer Vision Technology for Large Car ParksZhi-Wei Kao, Chi-Yi Lin. 136-144 [doi]
- Mathematical Modelling of COVID-19 Using ODEsDharmendra Prasad Mahato, Radha Rani. 145-156 [doi]
- Analyzing Monitoring and Controlling Techniques for Water Optimization Used in Precision IrrigationRajni Goyal, Amar Nath, Utkarsh Niranjan, Rajdeep Niyogi. 157-168 [doi]
- Addressing Security Challenges in Copyright Management Applications: The Blockchain PerspectiveNour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh. 169-182 [doi]
- A Hybrid Deep Reinforcement Learning Routing Method Under Dynamic and Complex Traffic with Software Defined NetworkingZiyang Zhang, Lin Guan, Qinggang Meng. 183-192 [doi]
- Improving ML/DL Solutions for Anomaly Detection in IoT EnvironmentsNouredine Tamani, Saad El Jaouhari, Abdul Qadir Khan, Bastien Pauchet. 193-206 [doi]
- A Survey and Planning Advice of Blockchain-Based Used Car Bidding PlatformChin-Ling Chen, Yong-Yuan Deng, Yao-Yuan Hsu, Hsing-Chung Chen, Der-Chen Huang, Ling-Chun Liu. 207-216 [doi]
- Misuse Detection and Response for Orchestrated Microservices Based SoftwareMohamed Aly Amin, Adnan Harun Dogan, Elif Sena Kuru, Yigit Sever, Pelin Angin. 217-226 [doi]
- Quantum Microservices: Transforming Software Architecture with Quantum ComputingSuleiman Karim Eddin, Hadi Salloum, Mohamad Nour Shahin, Badee Salloum, Manuel Mazzara, Mohammad Reza Bahrami. 227-237 [doi]
- Handover Management Scheme in Macrocell-Femtocell NetworksMaroua Ben Gharbia, Ridha Bouallegue. 238-248 [doi]
- An α-Rotated Fourier Transform Used as OTFS EnhancementMarwa Rjili, Abdelhakim Khlifi, Fatma Ben Salah, Belgacem Chibani, Said Chniguir. 249-260 [doi]
- Monitoring a Rice Field with a Low-Cost Wireless Sensor NetworkChaima Bejaoui, Nasreddine Hajlaoui. 261-272 [doi]
- Machine Learning Based-RSSI Estimation Module in OMNET++ for Indoor Wireless Sensor NetworksGhofrane Fersi, Mohamed Khalil Baazaoui, Rawdha Haddad, Faouzi Derbel. 273-285 [doi]
- Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research IssuesHenda Hnaien, Ahmed Aboud, Haifa Touati, Hichem Snoussi. 286-297 [doi]
- Design of Low Sidelobe Microstrip Antenna Array with Non-uniform Excitation Amplitude Based on Dolph-Tschebyscheff Synthesis at 28 GHzEmna Jebabli, Mohamed Hayouni, Fethi Choubani. 298-306 [doi]
- Analyzing Security and Privacy Risks in Android Video Game ApplicationsRatiros Phaenthong, Sudsanguan Ngamsuriyaroj. 307-319 [doi]
- Detecting and Mitigating MitM Attack on IoT Devices Using SDNMohamed Ould-Elhassen Aoueileyine, Neder Karmous, Ridha Bouallegue, Neji Youssef, Anis Yazidi. 320-330 [doi]
- Anonymous Credentials and Self-Sovereign Identity - An Initial AssessmentKatja Assaf. 331-343 [doi]
- Network Intrusion Detection with Incremental Active LearningMünteha Nur Bedir Tüzün, Pelin Angin. 344-353 [doi]
- Quantum Advancements in Securing Networking InfrastructuresHadi Salloum, Murhaf Alawir, Mohammad Anas Alatasi, Saleem Asekrea, Manuel Mazzara, Mohammad Reza Bahrami. 354-363 [doi]
- In-Network Monitoring Strategies for HPC CloudMasoud Hemmatpour, Tore Heide Larsen, Nikshubha Kumar, Ernst Gunnar Gran. 364-373 [doi]
- Optimizing Network Latency: Unveiling the Impact of Reflection Server TuningJan Marius Evang, Thomas Dreibholz. 374-384 [doi]
- Extension of Resource Authorization Method with SSI in Edge ComputingRyu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai. 385-394 [doi]
- An AI-Driven System for Identifying Dangerous Driving VehiclesHibiki Tanaka, Kazuki Shimomura, Naoki Tanaka, Makoto Ikeda, Leonard Barolli. 395-400 [doi]
- Multiclassification Analysis of Volumetric, Protocol, and Application Layer DDoS AttacksEric Brown, John Fisher, Aaron Hudon, Erick Colston, Wei Lu. 401-413 [doi]
- A Classification Method of Image Feature Using Neural Metric Learning for Natural Environment VideoYukito Seo, Rafly Arief Kanza, Nobuya Watanabe, Kin Fun Li, Kosuke Takano. 414-421 [doi]
- An Imaging Camera Anomaly Detection System Based on Optical FlowChihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli. 422-431 [doi]
- A Framework for Blockchain-Based Scalable E-Voting System Using Sharding and Time-Slot AlgorithmR. Madhusudhan, Vishnu K. K.. 432-443 [doi]
- Hop-Constrained Oblivious Routing Using Prim's-Sollin's AlgorithmMehak, Dharmendra Prasad Mahato. 444-452 [doi]
- Harnessing the Advanced Capabilities of LLM for Adaptive Intrusion Detection SystemsOscar G. Lira, Alberto Marroquin, Marco Antonio To. 453-464 [doi]
- Real-Time Rogue Base Stations Detection System in Cellular NetworksYing-Tso Wen, Sz-Hsien Wu, Chia-Yi Chen, Yen-Yuan Hsu, Po-Hsueh Wang, Shun-Min Hsu, Chen-Yuan Chang, Bo-Chen Kung. 465-474 [doi]
- A Brief Review of Machine Learning-Based Approaches for Advanced Interference Management in 6G In-X Sub-networksNessrine Trabelsi, Lamia Chaari Fourati. 475-487 [doi]
- A Comparative Study of Adaptive and Switched Beamforming for 5G Mobile Network ApplicationsMeryem Hamdi, Mohamed Hayouni, Emna Jebabli. 488-497 [doi]