Abstract is missing.
- Bulwark Security in an Edge Cloud ModelJeremy Lynn Reed, Ali Saman Tosun, Turgay Korkmaz. 1-8 [doi]
- Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control SystemsHaorui Peng, Fatemeh Akbarian, William Tärneberg, Maria Kihl. 9-17 [doi]
- LPMLP-Based Framework for Secure IPsec VPN Cloud Gateway with Advanced Network Monitoring and Issue ResolutionVinay Gugueoth. 18-26 [doi]
- Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP InfrastructureClément Boin, Tristan Groléat, Xavier Guillaume, Gilles Grimaud, Michaël Hauspie. 27-35 [doi]
- Real-Time Anomaly Detection Using Distributed Tracing in Microservice Cloud ApplicationsMahsa Raeiszadeh, Amin Ebrahimzadeh, Ahsan Saleem, Roch H. Glitho, Johan Eker, Raquel A. F. Mini. 36-44 [doi]
- Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification MechanismRuiqing Chu, Xuanyu Liu, Xiao Fu 0005, Bin Luo 0003, Mohsen Guizani. 45-52 [doi]
- Detection of Cyberattacks in Controller Area Network (CAN) Bus System Using a Hybrid ML ApproachAsma Alfardus, Danda B. Rawat. 53-60 [doi]
- Deblurring as a Defense against Adversarial AttacksWilliam Duckworth, Weixian Liao, Wei Yu 0002. 61-67 [doi]
- High Frequency Trading on a Low-Latency Fabric in a Cloud EnvironmentLarry Ryan, Andrew Addison, Ryan Prins, Daniel Bardsley, Eduard Mikhaylov, Barrett Wakefield, Martin O'Grady, Edward Sepulveda. 68-76 [doi]
- Cloud Telescope: A distributed architecture for capturing Internet Background RadiationFabricio Bortoluzzi, Barry Irwin, Lucas Silvero Beiler, Carla Merkle Westphall. 77-85 [doi]
- Cloud-Native-Bench: an Extensible Benchmarking Framework to Streamline Cloud Performance TestsMichiel Van Kenhove, Merlijn Sebrechts, Filip De Turck, Bruno Volckaert. 86-93 [doi]
- Understanding the Performance and Power Saving Tradeoffs of Server Sleep StatesAbigail Griffiths, Adam Morsman, Paul Veitch. 94-102 [doi]
- Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic TasksWilliam Tärneberg, Per Skarin. 103-111 [doi]
- A Multi-criteria Context-Sensitive Approach to Offloading Decision MakingPedro Paiva Alves, Filipe Fernandes S. B. de Matos, Paulo A. L. Rego, Fernando A. M. Trinta. 112-119 [doi]
- P4-MLFQ: A P4 implementation of Multi-level Feedback Queue Scheduling Using A Coarse-Grained Timer for Data Center NetworksMuhammad Shahid Iqbal, Chien Chen. 120-125 [doi]
- ZePoP: A Distributed Leader Election Protocol using the Delay-based Closeness Centrality for Peer-to-Peer ApplicationsMd. Amjad Hossain, Javed I. Khan. 126-134 [doi]
- Vehicular Edge Computing-Driven Optimized Multihop Clustering with Data AggregationAli Jalooli, Frankie Murcia. 135-143 [doi]
- A MAPE-K and Queueing Theory Approach for VNF Auto-scaling in Edge ComputingThiago Pereira da Silva, Thaís Vasconcelos Batista, Anselmo Luiz Éden Battisti, Andre Saraiva, Antonio A. Rocha, Flávia Coimbra Delicato, Ian Vilar Bastos, Evandro L. C. Macedo, Ana Cristina Bernardo de Oliveira, Paulo F. Pires. 144-152 [doi]
- Accelerating Fingerprint-based Person Identification through Computation Offloading in Edge and Cloud EnvironmentsRenan A. Barbosa, João P. B. Andrade, Mauro R. C. da Silva, Fernando A. M. Trinta, Paulo A. L. Rego. 153-160 [doi]
- Security-Aware Resource Allocation in the Edge-Cloud ContinuumPolyzois Soumplis, Georgios Kontos, Aristotelis Kretsis, Panagiotis Kokkinos, Anastassios Nanos, Emmanouel A. Varvarigos. 161-169 [doi]
- Optimal Deployment and Orchestration of Multiple Service Function Chains in 5G NetworksJing Wang, Amjad Soomro. 170-175 [doi]
- Preserving Location Privacy under Maritime 5G using Intent-oriented SchemeYuhang Wang, Salman Nazir. 176-184 [doi]
- Evaluating Optimistic Synchronization of Network Graphs in Mobile Networks With MEC SupportMatthias Frei, Reinhard German, Anatoli Djanatliev. 185-193 [doi]
- NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time ProfilingZhuzhu Wang, Ying Wang. 194-202 [doi]
- 25GC+: An Improved, 3GPP-compliant 5G Core for Low-latency Control Plane OperationsYu-Sheng Liu, Shixiong Qi, Po-Yi Lin, Han-Sing Tsai, K. K. Ramakrishnan, Jyh-Cheng Chen. 203-211 [doi]
- SoftFarmNet: Reconfigurable Wi-Fi HaLow Networks for Precision AgricultureNurzaman Ahmed, Flavio Esposito, Okwudilichukwu Okafor, Nadia Shakoor. 212-220 [doi]
- Multi-Drone Mounted Aerial Base Stations' Enhanced Trajectories Planning with Effective Communication Strategies for FANETsSri Suvetha Meenaa Subamanian, Senthil Pon Vignesh Subramanian, Padmapriya Muthiah, Jalaluddin Mohd Ansari Shajahan. 221-228 [doi]
- From Ambiguity to Explicitness: NLP-Assisted 5G Specification Abstraction for Formal AnalysisShiyu Yuan, Jingda Yang, Sudhanshu Arya, Carlo Lipizzi, Ying Wang. 229-237 [doi]
- A Sensor Predictive Model for Power Consumption using Machine LearningNalveer Moocheet, Brigitte Jaumard, Pierre Thibault, Lackis Eleftheriadis. 238-246 [doi]
- RoMA: Resilient Multi-Agent Reinforcement Learning with Dynamic Participating AgentsXuting Tang, Jia Xu 0004, Shusen Wang. 247-255 [doi]
- Unveiling Equity: Exploring Feature Dependency using Complex-Valued Neural Networks and Attention Mechanism for Fair Data AnalysisXuting Tang, Mengjiao Zhang, Abdul Rafae Khan, Steve Y. Yang, Jia Xu. 256-264 [doi]
- AI-assisted proactive scaling solution for CNFs deployed in KubernetesMenuka Perera Jayasuriya Kuranage, Elisabeth Hanser, Loutfi Nuaymi, Ahmed Bouabdallah, Philippe Bertin, Anwer Al-Dulaimi. 265-273 [doi]
- HyFuzz: A NextG Hybrid Testing Platform for Multi-step Deep Fuzzing and Performance Assessment from Virtualization to Over-the-AirJingda Yang, Ying Wang. 274-280 [doi]
- Transformer-based Compound Correlation Miner for Smart Home Anomaly DetectionAndrew D'Angelo, Chenglong Fu 0002, Xiaojiang Du, E. Paul Ratazzi. 281-289 [doi]
- Federated Machine Learning for Resource Allocation in Multi-domain Fog EcosystemsWeilin Zhang, Salman Toor, Mays F. Al-Naday. 290-298 [doi]
- PerCFed: An Effective Personalized Clustered Federated Learning Mechanism to Handle non-IID Challenges for Industry 4.0Priyanka Verma, John G. Breslin, Donna O'Shea. 299-306 [doi]
- A multi-task deep learning based vulnerability severity prediction methodChun Shan, Ziyi Zhang, Siyi Zhou. 307-315 [doi]
- C2MDNIF: A Cross Chain based Method for Domain Name Information FusionKebin Li, Yang You, Yuntian Tan, Shen Su, Zhihong Tian. 316-324 [doi]
- Efficient Algorithms for Obnoxious Facility Location on a Line Segment or CircleRongrong Chen, Qianlong Xiao, Minghao Hu, Jiaxu Xing, Fei Tang, Jing Qiu 0002. 325-333 [doi]
- Dual-Teacher for Unsupervised Text Detector in CloudChuanle Song, Ruijie Shan, Xianfeng Li, Senfeng Lai, Chihui Liu. 334-342 [doi]
- Virtual-Device-Based Policy Enforcement in Multi-Admin Smart EnvironmentsYunping Fang, Chenglong Fu 0002, Xiaojiang Du. 343-351 [doi]
- A Secure Duplicate Data Sharing Method against Untrusted Cloud Service ProviderJiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li 0016. 352-359 [doi]
- Intrusion Detection Techniques Analysis in Cloud ComputingWuqi Qi, Wei Wu, Hao Wang, Lu Ou, Ning Hu, Zhihong Tian. 360-363 [doi]
- A Serverless Federated Learning Service Ecosystem for Multi-Cloud Collaborative EnvironmentsCong Hu, Zhitao Guan, Pengfei Yu, Zhen Yao, Cuicui Zhang, Ruixuan Lu, Peng Wang. 364-371 [doi]
- Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing SchemeGuangxia Xu, Yuling Huang, Chuang Ma. 372-380 [doi]
- Multivariate Time Series Anomaly Detection with Fourier Time Series TransformerYufeng Ye, Qichao He, Peng Zhang 0001, Jie Xiao, Zhao Li. 381-388 [doi]
- An explainable intrusion detection system based on feature importancePeixin Liao, Xvxin Huang, Qiangbo Huang, Yanming Liang, Zhongxiao Wang, Denghui Zhang. 389-397 [doi]
- Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack SimulationJunhan Chen, Rufeng Liang, Man Zhang 0004, Chengcong Zheng, Xun Huang, Hui Lu 0005, Xiang Yu, Zhihong Tian. 398-402 [doi]
- Research on the Exploitability of Binary Software VulnerabilitiesXiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu, Hui Lu, Xiang Yu, Zhihong Tian. 403-407 [doi]
- Binary Code Similarity Detection: State and FutureZhenshan Li, Hao Liu, Ruijie Shan, Yanbin Sun, Yu Jiang, Ning Hu. 408-412 [doi]
- OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISMYunxin Jiang, Yitong Ren, Ziyu Wang, Yi Tang, Shengtao Lu, Ning Hu, Zhihong Tian, Yinghai Zhou. 413-417 [doi]
- A Survey of Deception Defense: Approaches Used to Counter Malicious BehaviorHaowen Yi, Fan Liu 0005, Rui Wang, Ning Hu, Zhihong Tian. 418-422 [doi]
- An Energy-saving Multi-path Traffic Scheduling Approach for Data Center Networks Based on the Rate ScalingGuoyi Bu, Kuo Chi, Ting Su 0006, Yongqin Yang. 423-427 [doi]
- A Digital Twins Enabled Reputation System for Microchain-based UAV NetworksQian Qu, Simeon Ogunbunmi, Mohsen Hatami, Ronghua Xu, Yu Chen 0002, Genshe Chen, Erik Blasch. 428-432 [doi]
- An Efficient Cache Eviction Strategy based on Learning and Belady AlgorithmWenbin Zhou, Qian Wang. 433-437 [doi]
- Robustness Evaluation of Cloud-Deployed Large Language Models against Chinese Adversarial Text AttacksYunting Zhang, Lin Ye, Baisong Li, Hongli Zhang. 438-442 [doi]
- Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud NetworksYue Wu, Lin Ye, Baisong Li, Hongli Zhang 0001, Jing Cao. 443-447 [doi]
- A Brief Review of Population-based Methods for Task Offloading in Cloud-to-Edge ContinuumAthanasios Chourlias, Theodoros Theodoropoulos, John Violos, Aris Leivadeas, Konstantinos Tserpes, Christos-Kyprianos Zalachoris. 448-453 [doi]
- Autonomous Choreography of WebAssembly Workloads in the Federated Cloud-Edge-IoT ContinuumPiotr Sowinski, Ignacio Lacalle, Rafael Vaño, Carlos Enrique Palau. 454-459 [doi]
- Pedestrian-centric Augmented Reality Visualization of Real-time Autonomous Vehicle DynamicsYiwei Cheng, Jin Nakazato, Ehsan Javanmardi, Chia-Ming Chang, Manabu Tsukada. 460-465 [doi]
- A Multi-stakeholder Cloud-continuum framework for 6G Networks security & service managementRodrigo Asensio Garriga, Alejandro Molina Zarca, Antonio F. Skarmeta. 466-471 [doi]
- Co-Scheduling of Radio and Computing Resources for Resource-Efficient Latency Guarantee in 6GSunghyun Jin, Serae Kim, Kyunghan Lee. 472-476 [doi]
- On design and implementation of a cloud-native B5G mobile core networkQuang Tung Thai, Myung-Eun Kim, Namseok Ko. 477-482 [doi]
- Decentralized Identity Management for Secure Resource Sharing in O-RANEngin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan, Yekta Turk. 483-488 [doi]
- Flexible Composition of 6G Networks atop Cloud ContinuumSlawomir Kuklinski. 489-494 [doi]
- Distributed Self-Orchestration System based on Home 5G ConceptCheikh Saliou Mbacke Babou, Yasunori Owada, Masugi Inoue, Kenichi Takizawa, Toshiaki Kuri. 495-500 [doi]
- SPEEDY: Small Prototyping for Number Plate Detection and Speed Estimation using Edge AIShivam Singha, Debajit Saha, Pallab Sarma, Pranav Kumar Singh, Uttam Ghosh, Maharaj Brahma. 501-506 [doi]
- Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert SystemDebashis Das, Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty. 507-512 [doi]