Abstract is missing.
- DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly DetectionMohanad Sarhan, Gayan K. Kulatilleke, Wai Weng Lo, Siamak Layeghy, Marius Portmann. 1-7 [doi]
- TwMiner: Mining Relevant Tweets of News ArticlesRoshni Chakraborty, Nilotpal Chakraborty. 1-3 [doi]
- A Review of Colonial Pipeline Ransomware AttackJack Beerman, David Berent, Zach Falter, Suman Bhunia. 8-15 [doi]
- Generative AI for Cyber Threat-Hunting in 6G-enabled IoT NetworksMohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh. 16-25 [doi]
- Securing Multi-IRS Aided mmWave Communications Against Eavesdropping and Jamming in Vehicular Cyber Physical SystemsReham Alsabet, Danda B. Rawat. 26-32 [doi]
- FL-PSO: A Federated Learning approach with Particle Swarm Optimization for Brain Stroke PredictionNancy Victor, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Fasial Mohammed Alotaibi, Thippa Reddy Gadekallu, Rutvij H. Jhaveri. 33-38 [doi]
- A Blockchain-based Security Management Framework for Cyber-Physical SystemsDebashis Das, Sourav Banerjee, Rakhi Chakraborty, Kousik Dasgupta, Pushpita Chatterjee, Uttam Ghosh. 39-44 [doi]
- SAS-UNet: Modified encoder-decoder network for the segmentation of obscenity in imagesSonali Samal, Thippa Reddy Gadekallu, Pankaj Rajput, Yudong Zhang 0001, Bunil Kumar Balabantaray. 45-51 [doi]
- A Study on Secure Network Slicing in 5GPranav Kumar Singh, Maharaj Brahma, Panchanan Nath, Uttam Ghosh. 52-61 [doi]
- Cognitive Health Assessment of Decentralized Smart home Activities using Federated LearningAbdul Rehman Javed, Jerry Chun-Wei Lin, Gautam Srivastava 0001. 62-68 [doi]
- Next Generation Financial Services: Role of Blockchain enabled Federated Learning and MetaversePushpita Chatterjee, Debashis Das, Danda B. Rawat. 69-74 [doi]
- Efficient Design for Smart Environment Using Raspberry Pi with Blockchain and IoT (BRIoT)Sunil K. Ponugumati, Kamran Ali, Aboubaker Lasebae, Zaid Zahoor, Anum Tanveer Kiyani, Ali Khoshkholghi, Maddu Latha. 75-80 [doi]
- Blockchains' federation: Developing Personal Health Trajectory-centered health systemsJavier Rojo 0004, José García-Alonso, Javier Berrocal, Luca Foschini 0001, Paolo Bellavista, Juan Hernández 0001, Juan Manuel Murillo. 81-88 [doi]
- An Isolation-aware Online Virtual Network Embedding via Deep Reinforcement LearningAli Gohar, Chunming Rong, Sanghwan Lee. 89-95 [doi]
- Information Fusion-based Cybersecurity Threat Detection for Intelligent Transportation SystemAbdullahi Chowdhury, Ranesh Naha, Shahriar Kaisar, Mohammad Ali Khoshkholghi, Kamran Ali, Antonino Galletta. 96-103 [doi]
- Transformer Inference Acceleration in Edge Computing EnvironmentMingChu Li, Wenteng Zhang, Dexin Xia. 104-109 [doi]
- RISC-V Core for Ethical Intelligent IoT Edge: Analysis & Design ChoiceP. Haribabu, G. V. K. Sasirekha, Madhav Rao, Jyotsna Bapat, Debabrata Das. 110-117 [doi]
- Securing Serverless Workflows on the Cloud Edge ContinuumGabriele Morabito, Christian Sicari, Lorenzo Carnevale, Antonino Galletta, Giuseppe Di Modica, Massimo Villari. 118-124 [doi]
- Web Services Relocation and Reallocation for Data Residency CompliancePankaj Sahu, Shubhro Roy, Mangesh S. Gharote, Sachin Lodha. 125-132 [doi]
- Competitor Attack Model for Privacy-Preserving Deep LearningDongdong Zhao 0001, Songsong Liao, Huanhuan Li 0002, Jianwen Xiang. 133-140 [doi]
- 3 R: Detecting DDoS using Random ForestAnagha Ramesh, Ramza Haris, Sumedha Arora. 141-146 [doi]
- On the timing of applying resource separation during DDoS attacksAnmol Kumar, Gaurav Somani 0001. 147-152 [doi]
- Malware Detection using API Calls Visualisations and Convolutional Neural NetworksJaime Pizarro Barona, Joseph Avila Alvarez, Carlos Jiménez Farfán, Joangie Márquez Aguilar, Rafael I. Bonilla. 153-159 [doi]
- OPERA-gSAM: Big Data Processing Framework for UMI Sequencing at High Scalability and EfficiencyPablo Vazquez Caderno, Feras M. Awaysheh, Yolanda Colino-Sanguino, Laura Rodriguez De La Fuente, Fatima Valdes-Mora, Jose C. Cabaleiro, Tomás F. Pena, David Gallego-Ortega. 160-167 [doi]
- Spark based Parallel Frequent Pattern Rules for Social Media Data AnalyticsShubhangi Chaturvedi, Sri Khetwat Saritha, Animesh Chaturvedi 0001. 168-175 [doi]
- MUAR: Maximizing Utilization of Available Resources for Query ProcessingMayank Patel 0001, Minal Bhise. 176-183 [doi]
- Disease Prediction using Chest X-ray Images in Serverless Data pipeline FrameworkVikas Singh, Neha Singh, Mainak Adhikari. 184-191 [doi]
- Information-Theoretically Secure Multi-Party Linear Regression and Logistic RegressionHengcheng Zhou. 192-199 [doi]
- Controlling Air Pollution in Data Centers using Green Data CentersSweta Dey, Sujata Pal. 200-205 [doi]
- API Traffic Anomaly Detection in Microservice ArchitectureM. Sowmya, Ankith J. Rai, V. Spoorthi, Md Irfan, Prasad B. Honnavalli, S. Nagasundari. 206-213 [doi]
- AI-Powered Interfaces for Extended Reality to Support Remote MaintenanceÁkos Nagy, George Amponis, Konstantinos Kyranou, Thomas Lagkas, Alexandros Apostolos Boulogeorgos, Panagiotis G. Sarigiannidis, Vasileios Argyriou. 214-222 [doi]
- Improving Industry 4.0 Readiness: Monolith Application Refactoring using Graph Attention NetworksTanisha Rathod, Christina Terese Joseph, John Paul Martin. 223-230 [doi]
- Edge Computing Solutions Supporting Voice Recognition Services for Speakers with DysarthriaDavide Mulfari, Lorenzo Carnevale, Antonino Galletta, Massimo Villari. 231-236 [doi]
- Gateway-Based Certification Approach to Include IoT Nodes in a Trusted Edge/Cloud EnvironmentValeria Lukaj, Francesco Martella, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari. 237-241 [doi]
- Highly Scalable Large-Scale Asynchronous Graph Processing using ActorsYoussef Elmougy, Akihiro Hayashi, Vivek Sarkar. 242-248 [doi]
- ParaDiS: a Parallel and Distributed framework for Significant pattern miningJyoti, Sriram Kailasam, Aleksey Buzmakov. 249-255 [doi]
- BigHOST: Automatic Grading System for Big Data AssignmentsVishal Ramesha, Sachin Shankar, Suhas Thalanki, Supreeth Kurpad, Prafullata Auradkar. 256-262 [doi]
- Privacy Regulations-Aware Storage Service Selection in Multi-CloudRishabh Kumar, Pankaj Sahu, Shubhro Roy, Sutapa Mondal, Mangesh S. Gharote, Sachin Lodha. 266-268 [doi]
- Evaluating Kubernetes at the Edge for Fault Tolerant Multi-Camera Computer Vision ApplicationsOwen Heckmann, Arun Ravindran. 269-271 [doi]
- Hierarchical Clustering Architecture for Metaverse ApplicationsKumar M. Santhosh, M. Prabhakar, Goutam Sanyal. 272-274 [doi]
- Optimizing Memory Allocation in a Serverless Architecture through Function SchedulingManish Pandey, Young-Woo Kwon 0001. 275-277 [doi]
- Sequence-based System Call Filtering for Enhanced Container Security, is it beneficial?Somin Song, Sahil Suneja, Michael V. Le, Byungchul Tak. 278-280 [doi]
- Power to the Applications: The Vision of Continuous Decentralized AutoscalingMartin Straesser, Stefan Geißler, Tobias Hoßfeld, Samuel Kounev. 281-283 [doi]
- 3D CNN Acceleration using Block Circulant Matrix in Frequency DomainRui Han, Huarong Xu, Peng Jiang, Xiongwei Jiang, Jiaming Qian. 284-286 [doi]
- Distributed In-band Network TelemetryDhyey Thummar, Iram Nawab, Sameer G. Kulkarni. 287-289 [doi]
- Sparse-HeteroCL: From Sparse Tensor Algebra to Highly Customized Accelerators on FPGAsJize Pang, Lei Gong, Chao Wang 0003, Xuehai Zhou. 290-292 [doi]
- Query Latency Optimization by Resource-Aware Task Placement in FogFatima Abdullah, Limei Peng, Byungchul Tak. 293-295 [doi]
- Satin Bowerbird Optimization-Based Classification Model for Heart Disease Prediction Using Deep Learning in E-HealthcareKamal Kumar Gola, Shikha Arya. 296-298 [doi]
- Knowledge Enhanced Digital Objects: a Data Lake ApproachYu Luo, Beth Plale. 299-301 [doi]
- A flexible dataflow CNN accelerator on FPGAHaoran Li, Lei Gong, Chao Wang 0003, Xuehai Zhou. 302-304 [doi]
- A Lightweight, Mobility-Aware, Geospatial & Temporal Data Store for Multi-UAV SystemsShashwat jaiswal, Suman Raj, Subhajit Sidhanta, Yogesh Simmhan. 305-307 [doi]
- AggFirstJoin: Optimizing Geo-Distributed Joins using Aggregation-Based TransformationsDhruv Kumar 0001, Sohaib Ahmad, Abhishek Chandra, Ramesh K. Sitaraman. 308-310 [doi]
- An Improved PBFT-Based Consensus Protocol for Industrial IoTRoshan Singh, Sukumar Nandi. 311-312 [doi]
- Comparing the Orchestration of Quantum Applications on Hybrid CloudsRajiv Sangle, Tuhin Khare, Padmanabha V. Seshadri, Yogesh Simmhan. 313-315 [doi]
- Deep Learning based Approach for Fast, Effective Visualization of Voluminous Gridded Spatial ObservationsPaahuni Khandelwal, Menuka Warushavithana, Sangmi Lee Pallickara, Shrideep Pallickara. 316-318 [doi]
- Distributed and Dependable Software-Defined Storage Control Plane for HPCMariana Miranda. 319-321 [doi]
- Enhancing Interval-centric Distributed Computing to Support Incremental GraphsVarad Kulkarni, Ruchi Bhoot, Animesh Baranawal, Yogesh Simmhan. 322-324 [doi]
- Importance-driven In situ Analysis and VisualizationMuzafar Ahmad Wani, Preeti Malakar. 325-327 [doi]
- Microservice-based in-network security framework for FPGA NICsLasani Hussain, Mayank Rawat, Neeraj Kumar Yadav, Sumit Darak, Praveen Tammana, Rinku Shah. 328-330 [doi]
- Towards a Mobile App Platform for Personalized UAV Fleets using Edge and CloudSuman Raj, Yogesh Simmhan. 331-333 [doi]
- Performance Modelling of Graph Neural NetworksPranjal Naman, Yogesh Simmhan. 334-336 [doi]
- Privacy-preserving Job Scheduler for GPU SharingAritra Ray, Kyle Lafata, Zhaobo Zhang, Ying Xiong, Krishnendu Chakrabarty. 337-339 [doi]
- Runway: In-transit Data Compression on Heterogeneous HPC SystemsJohn Ravi, Suren Byna, Michela Becchi. 340-342 [doi]
- Scalable, High-Quality Scheduling of Data Center WorkloadsMeghana Thiyyakat, Subramaniam Kalambur, Dinkar Sitaram. 343-345 [doi]
- ScaMP: Scalable Meta-Parallelism for Deep Learning SearchQuentin Anthony, Lang Xu, Aamir Shafi, Hari Subramoni, Dhabaleswar K. Panda 0001. 346-348 [doi]
- Scavenger: A Cloud Service for Optimizing Cost and Performance of DL TrainingSahil Tyagi. 349-350 [doi]
- To Think Like a Vertex (or Not) for Distributed Training of Graph Neural NetworksVarad Kulkarni, Akarsh Chaturvedi, Pranjal Naman, Yogesh Simmhan. 351-353 [doi]
- Toward Next-Generation Distributed Rate-limitersIram Nawab, Sameer G. Kulkarni. 354-356 [doi]
- Towards Efficient Scheduling of Concurrent DNN Training and Inferencing on Accelerated EdgesPrashanthi S. K, Vinayaka Hegde, Yogesh Simmhan. 357-359 [doi]
- Unique Prefix vs. Unique Mask for Minimizing SDN Flows with Transparent Edge AccessJosef Hammer, Hermann Hellwagner. 360-362 [doi]