Abstract is missing.
- Pseudonymisation in the context of GDPR-compliant medical researchIoannis Basdekis, Christos Kloukinas, Carlos Agostinho, Ioannis Vezakis, Andreia Pimenta, Luigi Gallo, George Spanoudakis. 1-6 [doi]
- A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical InfrastructuresMario Aragonés Lozano, Israel Pérez-Llopis, Alfonso Climente Alarcón, Manuel Esteve Domingo. 1-5 [doi]
- Machine-Learning-Assisted Failure Prediction in Microwave Networks based on Equipment AlarmsFrancesco Lateano, Omran Ayoub, Francesco Musumeci 0001, Massimo Tornatore. 1-7 [doi]
- Automated Fault Detection Framework for Reliable Provision of IoT Applications in AgricultureShadi Attarha, Saurabh Band, Anna Förster. 1-8 [doi]
- Dependability: Enablers in 5G Campus Networks for Industry 4.0Ahmad Khalil, Benjamin Becker, Lisa Wernet, Ralf Kundel, Björn Richerzhagen, Tobias Meuser, Ralf Steinmetz. 1-8 [doi]
- A Moving Target Defense Security Solution for IoT ApplicationsThomas Kyriakakis, Sotiris Ioannidis. 1-6 [doi]
- Risk Assessment on Hardware Offloading Architecture of Network Security Protocols with Linux-based Control PlaneÓscar Gotor Bermejo, Daniel Dik, Michael Stübert Berger. 1-8 [doi]
- Age of Information Resilience With a Strategic Out-of-Band RelayLeonardo Badia, Federico Chiariotti. 1-7 [doi]
- Forensic Investigation Using RAM Analysis on the Hadoop Distributed File SystemStuart Laing, Robert Ludwiniak, Brahim El Boudani, Christos Chrysoulas, George Ubakanma, Nikolaos Pitropakis. 1-6 [doi]
- Theoretical Analysis and Software Implementation of a Quantum Encryption ProposalDaniel Escanez-Exposito, Pino Caballero-Gil. 1-7 [doi]
- Security shortcomings in healthcare: a preliminary investigation of Data Protection Authorities' decisionsChristina Nanou, Maria Kampyli, Maria Crociani, Vasiliki Danilatou. 1-6 [doi]
- Classical vs. Quantum Machine Learning for Breast Cancer DetectionSonia Díaz-Santos, Daniel Escanez-Exposito. 1-5 [doi]
- Uplink NOMA for UAV-Aided Maritime Internet-of-ThingsNikolaos Nomikos, Anastasios E. Giannopoulos, Panagiotis Trakadas, George K. Karagiannidis. 1-6 [doi]
- Blockchain-based Self-Sovereign Identity Solution for Vehicular NetworksEngin Zeydan, Josep Mangues, Suayb S. Arslan, Yekta Turk. 1-7 [doi]
- Performance Evaluation of TI-LFA in Traffic-Engineered Segment Routing-Based NetworksLiesbeth Roelens, Óscar González de Dios, Ignacio de Miguel, Edward Echeverry, Ramón J. Durán Barroso. 1-8 [doi]
- Optimum Network Slicing for Ultra-reliable Low Latency Communication (URLLC) Services in Campus NetworksIulisloi Zacarias, Francisco Carpio, André Costa Drummond, Admela Jukan. 1-8 [doi]
- UAV-assisted Multiband WSN Coverage EvaluationSven Pullwitt, Jan Schlichter, Lars C. Wolf. 1-6 [doi]
- A Swarm Artificial Intelligence Approach for Effective Treatment of Chronic ConditionsKitty Kioskli, Spyridon Papastergiou. 1-5 [doi]
- Information Sharing for Creating Awareness for Securing Healthcare EcosystemShareeful Islam, Christos Grigoriadis, Spyridon Papastergiou. 1-5 [doi]
- A distributed network-aware TSCH schedulingIvanilson França Vieira Júnior, Jorge Granjal, Marília Curado. 1-8 [doi]
- Safe Routing in Energy-aware IP networksYoucef Magnouche, Jérémie Leguay, Feng Zeng. 1-8 [doi]
- Distributed Management of Dynamic Reliability in Beyond 5G Industrial Environments for Extreme Low Latency CommunicationDavide Borsatti, Gianluca Davoli, Walter Cerroni, Carla Raffaelli, Wint Yi Poe, Riccardo Trivisonno, Raffaele Bolla. 1-7 [doi]
- Towards Optimal Path Allocation for Unreliable Reconfigurable Intelligent SurfacesMounir Bensalem, Anna Engelmann, Admela Jukan. 1-8 [doi]
- Quantum Key Distribution with Trusted Relay using an ETSI-compliant Software-Defined ControllerRiccardo Bassi, Qiaolun Zhang, Alberto Gatto, Massimo Tornatore, Giacomo Verticale. 1-7 [doi]
- A Holistic Framework for Safeguarding of SMEs: A Case StudyNefeli Bountouni, Sotiris Koussouris, Alexandros Vasileiou, Stylianos A. Kazazis. 1-5 [doi]
- Routing protocols exploiting queue information for deterministic networksJakob Miserez, Gourav Prateek Sharma, Wouter Tavernier. 1-8 [doi]
- Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logsJan Antic, João Pita Costa, Ales Cernivec, Matija Cankar, Tomaz Martincic, Aljaz Potocnik, Gorka Benguria Elguezabal, Nelly Leligou, Ismael Torres Boigues. 1-5 [doi]
- An NIDS for Known and Zero-Day AnomaliesA. Hussain, F. Aguiló-Gost, E. Simó-Mezquita, Eva Marín-Tordera, X. Massip. 1-7 [doi]
- McEliece Cryptosystem: Reducing the Key Size with QC-LDPC codesPaula Pérez-Pacheco, Pino Caballero-Gil. 1-6 [doi]
- Availability and Throughput Evaluation of Optical Based High Throughput Satellite NetworksMario Wenning, Achim Autenrieth, Jörg-Peter Elbers, Carmen Mas Machuca. 1-8 [doi]
- Sum Rate Maximization of Uplink Active RIS and UAV-assisted THz Mobile CommunicationsSara Farrag, Engy Aly Maher, Ahmed E. El-Mahdy 0001, Falko Dressler. 1-7 [doi]
- Measuring and Modeling ICAO's PBCS Performance MetricsMarkus Klügel, Dominic Schupke. 1-8 [doi]
- Learning to Fulfill the User Demands in 5G-enabled Wireless Networks through Power Allocation: a Reinforcement Learning approachAnastasios E. Giannopoulos, Sotirios T. Spantideas, Nikolaos Nomikos, Alexandros Kalafatelis, Panagiotis Trakadas. 1-7 [doi]