Abstract is missing.
- The impact of Capitol Hill on Pleroma: the case for decentralised moderationAnaobi Ishaku Hassan, Aravindh Raman, Ignacio Castro, Gareth Tyson. 1-2 [doi]
- Augmenting phishing squatting detection with GANsRodolfo V. Valentim, Idilio Drago, Martino Trevisan, Federico Cerutti, Marco Mellia. 3-4 [doi]
- Towards a generic deep learning pipeline for traffic measurementsRaphaël Azorin, Massimo Gallo, Alessandro Finamore, Maurizio Filippone, Pietro Michiardi, Dario Rossi. 5-6 [doi]
- An analysis of privacy leakage in DoQ trafficGuannan Hu, Kensuke Fukuda. 7-8 [doi]
- Towards generic traffic change detection in the data planeGonçalo Matos, Salvatore Signorello, Fernando M. V. Ramos. 9-10 [doi]
- Securing name resolution in the IoT: DNS over CoAPMartine S. Lenders, Christian Amsüss, Cenk Gündogan, Thomas C. Schmidt, Matthias Wählisch. 11-12 [doi]
- Large scale outage visibility on the control planeLeonard Becker, Oliver Hohlfeld, Georgios Smaragdakis. 13-14 [doi]
- Using proof-of-work to mitigate spoofing-based denial of service attacksSamuel DeLaughter, Karen R. Sollins. 15-16 [doi]
- Leveraging node heterogeneity to improve content discovery and content retrieval in peer-to-peer networksDennis Trautwein, Moritz Schubotz, Bela Gipp. 17-18 [doi]
- Quantum scheduling optimization for UAV-enabled IoT networksFrancesco Vista, Giovanni Iacovelli, Luigi Alfredo Grieco. 19-20 [doi]
- ML-based data classification and data aggregation on the edgeErkan Karabulut, Nisrine Bnouhanna, Rute C. Sofia. 21-22 [doi]