Abstract is missing.
- Towards Data Analytics Based PIM Detection in Wireless NetworksEren Deniz, Gokcan Cantali, Ozcan Ozay, Onur Yildirim, Gürkan Gür, Fatih Alagöz. 1-6 [doi]
- Blockchain-Empowered Immutable and Reliable Delivery Service (BIRDS) Using UAV NetworksSana Hafeez, Habib Ullah Manzoor, Lina S. Mohjazi, Ahmed Zoha, Muhammad Ali Imran 0001, Yao Sun 0002. 7-12 [doi]
- 5GMediaHUB QoS/QoE Monitoring EngineApostolos Siokis, Kostas Ramantas, George Margetis, Stefania Stamou, Ryan McCloskey, Martin Tolan, Christos V. Verikoukis. 13-18 [doi]
- Scalable MU-MIMO User Scheduling for Next-Generation Wireless NetworksJuan Carlos De Luna Ducoing, Konstantinos Nikitopoulos. 19-24 [doi]
- Dynamic Packet Content Construction and Processing for End-to-End Streaming in 6GStuart Clayman, Emre Karakis, Mustafa Tuker, Elif Ak, Berk Canberk, Müge Sayit. 25-30 [doi]
- Power Delay Profile Based Ranging via Approximate EM-ReVAMPFangqing Xiao, Zilu Zhao, Dirk Slock. 31-36 [doi]
- Intelligent Node Deployment in Smart Spaces to Optimize Sensor Signal and Data AcquisitionAndreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis. 37-42 [doi]
- TRUSTEE's Framework for DPIAs: Safeguarding personal information in the Digital EraAthanasios Vasileios Grammatopoulos, Ioannis Stylianou, Katarzyna Barud, Clara Saillant, Ilias Politis. 43-48 [doi]
- Architectural Insights into TRUSTEE's Authentication Manager: Leveraging SSI and eIDASAthanasios Vasileios Grammatopoulos, Ioannis Stylianou, Eneko Gómez Ramos, Iván Gutiérrez-Agüero, Cristina Regueiro, Ilias Politis. 49-54 [doi]
- 6GENABLERS: A Holistic Approach to Establish Pervasive Trust in 6G NetworksMuhammad Asad, Adriana Fernández-Fernández, Hatim Chergui, Maxime Compastié, Mario Montagud, Sergi Fernández, Shuaib Siddiqui. 55-60 [doi]
- An Evolutionary Edge Computing Architecture for the Beyond 5G EraElli Kartsakli, Jordi Pérez-Romero, Nikolaos G. Bartzoudis, Oriol Sallent, Oluwatayo Y. Kolawole, Xin Tao, Swarup Kumar Mohalik, Tomasz Mach, Sige Liu, Yansha Deng, Gianluca Mandò, Angelos Antonopoulos 0001, Valerio Frascolla, Semiha Kosu, Gökhan Kalem, Fred Buining, Eduardo Quiñones. 61-67 [doi]
- Blockchain-enabled Clustered and Scalable Federated Learning (BCS-FL) Framework in UAV NetworksSana Hafeez, Lina S. Mohjazi, Muhammad Ali Imran 0001, Yao Sun 0002. 68-73 [doi]
- OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data LeaksDávid Gábor Uzonyi, Nikolaos Pitropakis, Sean McKeown, Ilias Politis. 74-79 [doi]
- Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approachApostolos P. Fournaris, Christos Tselios, Evangelos Haleplidis, Elias Athanasopoulos, Antreas Dionysiou, Dimitrios Mitropoulos, Panos Louridas, Georgios Christou, Manos Athanatos, George Hatzivasilis, Konstantinos Georgopoulos, Costas Kalogeros, Christos Kotselidis, Simon Vogl, François Hamon, Sotiris Ioannidis. 80-86 [doi]
- Analysis of Age of Information in Slotted ALOHA Networks With Different Strategic Backoff SchemesAlessandro Buratto, Leonardo Badia. 87-92 [doi]
- Efficient Generation of Approximate Region-based Geo-maps from Big Geotagged DataIsam Mashhour Al Jawarneh, Luca Foschini 0001, Antonio Corradi. 93-98 [doi]
- Impact of Transmission Delays Over Age of Information Under Finite Horizon SchedulingAlberto Zancanaro, Giulia Cisotto, Andrea Munari, Leonardo Badia. 99-104 [doi]
- Energy-Efficient QoS-Aware Application and Network Configuration for Next-Gen IoTJuan Luis Herrera, Jaime Galán-Jiménez, Javier Berrocal, Paolo Bellavista, Luca Foschini 0001. 105-110 [doi]
- Genetic Algorithm for Energy Efficiency in Wireless Sensor NetworksDario Guiao, Petros Spachos. 111-116 [doi]
- Optimal Location Assignment for Data-Driven Warehouse Towards Digital Supply Chain TwinMüge Erel-Özçevik, Yusuf Özçevik, Elif Bozkaya, Tugçe Bilen. 117-122 [doi]
- How to synchronize Digital Twins? A Communication Performance AnalysisLal Verda Çakir, Sarah Al-Shareeda, Sema F. Oktug, Mehmet Özdem, Matthew Broadbent, Berk Canberk. 123-127 [doi]
- A Simulation-based Decision Support System for Urban Traffic ManagementAlessandro Calvio, Anish Jindal, Armir Bujari, Gagangeet Singh Aujla, Luca Foschini 0001. 128-133 [doi]
- Learning-Based Latency-Constrained Fronthaul Compression Optimization in C-RANAxel Grönland, Bleron Klaiqi, Xavier Gelabert. 134-139 [doi]
- Source-Coded Multicast for Efficient Content DeliveryTomás Lestayo-Martínez, Manuel Fernández-Veiga. 140-145 [doi]
- A Novel Self-Optimization Algorithm for 5G HetNets Using Automatic Weight Function and TOPSISEmre Gures, Ibraheem Shayea, Ibrahim Yazici, Ayman A. El-Saleh, Sawsan Ali Saad. 146-151 [doi]
- Semantics-Empowered UAV-assisted Wireless Communication System for Wildfire DetectionChathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko. 152-157 [doi]
- Theoretical Limits of SoOP TDOA Localization of Unmanned Systems with Imperfect SynchronizationKhaled Walid Elgammal, Berke Can Turan, Oguz Bedir, Hasari Celebi, Marwa K. Qaraqe, Mehmet Kemal Özdemir. 158-163 [doi]
- Utilizing LoRa for Control Link in Software-defined Aerial Networks: Analysis and ImplementationZeynep Betül Arslanbenzer, Büsra Bayram, Talip Tolga Sari, Gökhan Seçinti. 164-169 [doi]
- Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File AnalysisAndrew Thaeler, Yagmur Yigit, Leandros Maglaras, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell 0001. 170-175 [doi]
- Identity Management through a global Discovery System based on Decentralized IdentitiesKonstantinos Lampropoulos 0001, Nikos Kyriakoulis, Giorgos Georgakakos, Spyros G. Denazis. 176-181 [doi]
- Scalable Multi-domain Trust Infrastructures for Segmented NetworksSam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl. 182-187 [doi]
- PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption AlgorithmsMuhammad Shahbaz Khan, Jawad Ahmad 0001, Ahmed Al-Dubai 0001, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan. 188-193 [doi]
- Double Public Key Signing Function Oracle Attack on EdDSA Software ImplementationsSam Grierson, Konstantinos Chalkias, William J. Buchanan, Leandros Maglaras. 194-199 [doi]
- PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT NetworksHisham Ali, Mwrwan Abubakar, Jawad Ahmad 0001, William J. Buchanan, Zakwan Jaroucheh. 200-205 [doi]
- A Differential Privacy Approach for Privacy-Preserving Multi-Modal Stress DetectionMoudy Sharaf Alshareef, Mona Jaber, Ahmed M. Abdelmoniem. 206-212 [doi]
- A Carbon Tracking Model for Federated Learning: Impact of Quantization and SparsificationLuca Barbieri, Stefano Savazzi, Sanaz Kianoush, Monica Nicoli, Luigi Serio. 213-218 [doi]
- Machine Learning Based Resource Utilization Prediction in the Computing ContinuumChristian Bauer, Narges Mehran, Radu Prodan, Dragi Kimovski. 219-224 [doi]
- Edge AI Inference in Heterogeneous Constrained Computing: Feasibility and OpportunitiesRoberto Morabito, Mallik Tatipamula, Sasu Tarkoma, Mung Chiang. 225-232 [doi]
- Enhancing QoE Assessment in FWA: Leveraging Network KPIs and User Feedback AnalysisHakan Gökcesu, Özgür Erçetin, Gökhan Kalem. 233-239 [doi]
- Assessment of Adversarial Attacks on Traffic Sign Detection for Connected and Autonomous VehiclesAaditya Suri, Binod Vaidya, Hussein T. Mouftah. 240-245 [doi]
- Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum CryptographyCarlos Rubio Garcia, Abraham Cano Aguilera, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy, Simon Rommel. 246-251 [doi]
- Secure Multi-Point Coordinated Beamforming using Deep Learning in 5G and Beyond NetworksUtku Ozmat, Mehmet Akif Yazici, Mehmet Fatih Demirkol. 252-257 [doi]
- Securing Southbound Interface in SDNs: Utilizing Support Vector Machines for OpenFlow Packet ClassificationAli Gökhan Avran, Elif Ak, Kübra Duran, Gökhan Yurdakul, Gökhan Seçinti. 258-263 [doi]
- VMD Integrated FMCW Radar System for Non-Invasive Pediatric Vital Sign EstimationFahad Ayaz, Basim Alhumaily, Sajjad Hussain, Muhammad Ali Imran 0001, Ahmed Zoha. 264-269 [doi]
- A distributed user-oriented IoT-based Air Pollution MonitoringJosé Jorge Figueroa Figueroa, Hao Shen, Hamed Ahmadi, Berk Canberk. 270-275 [doi]
- A Comparative Study of VANET Routing Protocols for Safety ApplicationsKevin Coyle, Craig Thomson, Isam Wadhaj, Baraq Ghaleb. 276-282 [doi]
- Emerging Challenges and Solutions in RPL Protocol: Research ReviewJoshua Teddy Ibibo. 283-289 [doi]
- Joint Computation and Communication Resource Allocation for Unmanned Aerial Vehicle NOMA SystemsTan Do-Duy, Dang Van-Huynh, Emi Garcia-Palacios, Tuan Vu Cao, Vishal Sharma 0001, Trung Q. Duong. 290-295 [doi]
- Service Modeling and Delay Analysis of Packet Delivery over a Wireless LinkYan Zhang, Yuming Jiang 0001, Songwei Fu. 296-301 [doi]
- Characterizing Wireless Link Throughput with eBPF and Hardware TimestampsSimon Sundberg, Johan Garcia 0001, Anna Brunström. 302-308 [doi]
- A DigiLogue Receiver Design for Tbps Wireless Transmissions over Flat-Fading ChannelsMahmoud Mojarrad Kiasaraei, Rahim Tafazolli, Konstantinos Nikitopoulos. 309-314 [doi]