Abstract is missing.
- Tutorial: Consensus Algorithms from Classical to Blockchain: Quickly Program, Configure, Run, and CheckYanhong A. Liu, Scott D. Stoller. 1-4 [doi]
- Tutorial: Object as a Service (OaaS) Serverless Cloud Computing ParadigmPawissanutt Lertpongrujikorn, Mohsen Amini Salehi. 5-8 [doi]
- Tutorial: Information Leakage from Cryptographic TechniquesKomal Kumari, Sharad Mehrotra, Shantanu Sharma 0001. 9-12 [doi]
- Tutorial: Federated Learning × Security for Network MonitoringYann Busnel, Léo Lavaur. 13-16 [doi]
- FLAMINGO: Adaptive and Resilient Federated Meta-Learning against Adversarial AttacksMd. Zarif Hossain, Ahmed Imteaj, Abdur R. Shahid. 17-22 [doi]
- SHELOB-FFL: addressing Systems HEterogeneity with LOcally Backpropagated Forward-Forward LearningStefano Izzo, Fabio Giampaolo, Diletta Chiaro, Francesco Piccialli. 23-28 [doi]
- Towards LLM-Assisted System Testing for MicroservicesMustafa Almutawa, Qusai Ghabrah, Marco Canini. 29-34 [doi]
- Explainable Reinforcement Learning for Network Management via Surrogate ModelAlessio Botta, Roberto Canonico, Annalisa Navarro. 35-40 [doi]
- Incremental Federated Host Embeddings for Network Telescopes Traffic AnalysisKai Huang, Luca Gioacchini, Marco Mellia, Luca Vassio. 41-46 [doi]
- Service Localization and User Satisfaction Enabled Multi-Tier Computing IoT SystemChenyu Gong, Mulei Ma, Liekang Zeng, Yang Yang 0001, Liantao Wu, Zening Liu. 47-52 [doi]
- Hierarchical Caching for Digital Twins Communications Over mURLLC-Based 6G Distributed-Computing Mobile Networks Using FBCXi Zhang, Qixuan Zhu. 53-58 [doi]
- Hybrid Intelligent Reflecting Surface and Cell-free Massive MIMO-Aided Over-the-Air Computation for Digital TwinJiaying Di, Ni Zhang, Junjie Wan, Sen Li, Kunlun Wang. 59-63 [doi]
- PECMQ: Private and Encrypted Communications in IoT Systems Using PUFs and MQTTAmir Ali Pour, Julien Gascon-Samson. 64-74 [doi]
- Towards a lightweight distributed telemetry for microservicesManuel Otero, José María García, Pablo Fernandez. 75-82 [doi]
- Wait or Not to Wait: Evaluating Trade-Offs between Speed and Precision in Blockchain-based Federated AggregationHuong Nguyen, Tri Nguyen, Lauri Lovén, Susanna Pirttikangas. 83-92 [doi]
- Integrating Serverless and DRL for Infrastructure Management in Streaming Data Processing across Edge-Cloud ContinuumChinmaya Kumar Dehury, Satish Narayana Srirama. 93-101 [doi]
- A Framework for Dynamic Dependency-based Service Placement in the Cloud-Edge ContinuumJosef Sochovsky, Vasileios Karagiannis, Janick Edinger, Dominik Kaaser, Stefan Schulte 0002. 102-112 [doi]
- Data Fabric for Industrial MetaverseAbhishek Kumar 0011, Lauri Lovén, Susanna Pirttikangas, Sasu Tarkoma. 113-121 [doi]
- Saila: Human Interface Device (HID) Injection Protection with Smart Phone based Passwordless SecurityAnisha Ghosh, Aditya Mitra, S. Sibi Chakkaravarathy, V. S. Devi Priya, S. Anitha, Rakesh Thoppaen Suresh Babu. 122-127 [doi]
- Detecting Malicious Traffic using JA3 Fingerprints Attributed ML ApproachYuba Raj Siwakoti, Danda B. Rawat. 128-133 [doi]
- SynthEcho Watermarking for Secure and Robust Image-to-Image GenerationXiang Xin, Honggang Wang, Hua Fang. 134-139 [doi]
- KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data GenerationAnantaa Kotal, Brandon Luton, Anupam Joshi. 140-145 [doi]
- Non-Linear Coded Computation for Distributed CNN Inference: A Learning-based ApproachHaoyu Wang, Yiyu Liu, Chunhui Xu, Xing Liu, Ming Tang. 146-152 [doi]
- Profit Maximization In Arbitrage LoopsYu Zhang, Zichen Li, Tao Yan, Qianyu Liu, Nicolò Vallarano, Claudio J. Tessone. 153-160 [doi]
- Assessing Spillover Dynamics: A Diagonal BEKK GARCH Analysis of Interactions Among the Crypto Market and Systemically Significant Industries with a Historical Nexus to Financial CrisesHaoyang Yu. 161-169 [doi]