Abstract is missing.
- Blockage Robustness in Access Point Association for mmWave Wireless LANs with MobilityYuchen Liu, Douglas M. Blough. 1-12 [doi]
- Celosia: An Immune-Inspired Anomaly Detection Framework for IoT DevicesKashif Naveed, Hui Wu 0001. 13-23 [doi]
- Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized DataHossein Shirazi, Shashika R. Muramudalige, Indrakshi Ray, Anura P. Jayasumana. 24-32 [doi]
- Pinning Control of Dynamical Networks with Optimal CostSaber Jafarizadeh. 33-41 [doi]
- Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge ComputingJing Li, Weifa Liang, Zichuan Xu, Wanlei Zhou. 42-53 [doi]
- PLEDGE: An IoT-oriented Proof-of-Honesty based Blockchain Consensus ProtocolImran Makhdoom, Farzad Tofigh, Ian Zhou, Mehran Abolhasan, Justin Lipman. 54-64 [doi]
- Understanding Traffic Fingerprinting CNNsThilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne. 65-76 [doi]
- StopEG: Detecting when to stop exponential growth in TCP slow-startMahdi Arghavani, Haibo Zhang 0001, David M. Eyers, Abbas Arghavani. 77-87 [doi]
- Achieving IoT Devices Secure Sharing in Multi-User Smart SpaceMohammed Al-Shaboti, Gang Chen, Ian Welch. 88-99 [doi]
- Start of Frame Delimiters (SFDs) for Simultaneous Intra-Group One-to-All DisseminationJagnyashini Debadarshini, Sudipta Saha, Olaf Landsiedel, Mun Choon Chan. 100-111 [doi]
- Managing Container QoS with Network and Storage Workloads over a Hyperconverged PlatformSumitro Bhaumik, Sandip Chakraborty. 112-123 [doi]
- SCAN: Smart Collaborative Attack in Named Data NetworkingMadhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, Sunit Kumar Nandi, Sukumar Nandi. 124-133 [doi]
- Improvement and Implementation of a Multi-Path Management Algorithm based on MPTCPMin Chen, Thomas Dreibholz, Xing Zhou, Xuelei Yang. 134-143 [doi]
- A Network Time Security Based Automatic Key Management for PTPv2.1Martin Langer, Kai Heine, Dieter Sibold, Rainer Bermbach. 144-153 [doi]
- Privacy-Preserving Public Key Infrastructure for Vehicular NetworksPavlo Gaiduk, Kumar Rajeev Ranjan, Thomas Basmer, Florian Tschorsch. 154-163 [doi]
- On Predicting Service-oriented Network Slices Performances in 5G: A Federated Learning ApproachBouziane Brik, Adlen Ksentini. 164-171 [doi]
- Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting SystemChristian Killer, Bruno Rodrigues 0001, Eder John Scheid, Muriel Figueredo Franco, Moritz Eck, Nik Zaugg, Alex Scheitlin, Burkhard Stiller. 172-183 [doi]
- Determining a tight worst-case delay of switched Ethernet network in IEC 61850 architecturesThéo Docquier, Ye-Qiong Song, Vincent Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer. 184-194 [doi]
- User Performance in a 5G Multi-connectivity Ultra-Dense Network City ScenarioJosé Perdomo, Mårten Ericson, Mats Nordberg, Karl Andersson 0001. 195-203 [doi]
- IntentKeeper: Intent-oriented Data Usage Control for Federated Data AnalyticsFlavio Cirillo, Bin Cheng 0003, Raffaele Porcellana, Marco Russo, Gürkan Solmaz, Hisashi Sakamoto, Simon Pietro Romano. 204-215 [doi]
- L3SFA: Load Shifting Strategy for Spreading Factor Allocation in LoRaWAN SystemsMohamed Hamnache, Rahim Kacimi, André-Luc Beylot. 216-224 [doi]
- Traffic Characterization of Instant Messaging Apps: A Campus-Level ViewSina Keshvadi, Mehdi Karamollahi, Carey Williamson. 225-232 [doi]
- Traffic Shifting based Resource Optimization in Aggregated IoT CommunicationAmirahmad Chapnevis, Ismail Güvenç, Eyuphan Bulut. 233-243 [doi]
- Guarantees for Mix-flows in Inter-Datacenter WANs in Single and Federated CloudsShruti Gandhi, Yannis Viniotis. 244-255 [doi]
- Inference in Social Networks from Ultra-Sparse Distance Measurements via Pretrained Hadamard AutoencodersGunjan Mahindre, Rasika Karkare, Randy C. Paffenroth, Anura P. Jayasumana. 256-266 [doi]
- On Automated Trust Computation in IoT with Multiple Attributes and Subjective LogicNuray Baltaci Akhuseyinoglu, Maryam Karimi, Mai Abdelhakim, Prashant Krishnamurthy. 267-278 [doi]
- Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFVAbdullah Aydeger, Nico Saputro, Kemal Akkaya. 279-285 [doi]
- Deep Learning based User Slice Allocation in 5G Radio Access NetworksSalma Matoussi, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar. 286-296 [doi]
- Root Redundancy in Meshed Tree Bridged NetworksPeter Willis, Nirmala Shenoy, Yin Pan, John F. Hamilton. 297-308 [doi]
- Leveraging MEC in a 5G System for Enhanced Back Situation AwarenessRreze Halili, Faqir Zarrar Yousaf, Nina Slamnik-Krijestorac, Girma M. Yilma, Marco Liebsch, Erik de Britto e Silva, Seilendria A. Hadiwardoyo, Rafael Berkvens, Maarten Weyn. 309-320 [doi]
- Online Detection of Wi-Fi Fingerprint Alteration Strength via Deep LearningMinglu Yan, Jiankun Wang, Zenghua Zhao. 321-324 [doi]
- Transmission Scheduling and End-to-end Throughput of Multi-hop Paths in Full-duplex Embedded Wireless NetworksFei Ge, Liansheng Tan, Wei Zhang, Ming Liu, Xun Gao, Juan Luo. 325-328 [doi]
- IQoR: An Intelligent QoS-aware Routing Mechanism with Deep Reinforcement LearningYuanyuan Cao, Bin Dai, Yijun Mo, Yang Xu. 329-332 [doi]
- Congestion Control Using Diffusion Method in Named Data NetworkingChenglin Lee, Hidenori Nakazato. 333-336 [doi]
- CAUDHT: Decentralized Contact Tracing Using a DHT and Blind SignaturesSamuel Brack, Leonie Reichert, Björn Scheuermann 0001. 337-340 [doi]
- Black-box System Identification of CPS Protected by a Watermark-based DetectorKhalil Guibene, Marwane Ayaida, Lyes Khoukhi, Nadhir Messai. 341-344 [doi]
- Blockchain on MSP430 with IEEE 802.15.4Eryk Schiller, Elfat Esati, Sina Rafati Niya, Burkhard Stiller. 345-348 [doi]
- An efficient autonomous vehicle navigation scheme based on LiDAR sensor in vehicular networkRima Benelmir, Salim Bitam, Abdelhamid Mellouk. 349-352 [doi]
- Extending MUD to SmartphonesIna Berenice Fink, Martin Serror, Klaus Wehrle. 353-356 [doi]
- Net Auto-Solver: A formal approach for automatic resolution of OpenFlow anomaliesRamtin Aryan, Anis Yazidi, Adel Bouhoula, Paal Einar Engelstad. 357-360 [doi]
- Impact of Mobility Models on Energy Consumption in Unmanned Aerial Ad-Hoc NetworkAmina Bensalem, Djallel Eddine Boubiche, Fen Zhou, Abderrezak Rachedi, Abdelhamid Mellouk. 361-364 [doi]
- Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoTTao Li, Christoph Hofmann, Elke Franz 0001. 365-368 [doi]
- Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT ApplicationsAli Dorri, Raja Jurdak. 369-372 [doi]
- Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT DevicesKashif Naveed, Hui Wu 0001, Abdullah Abusaq. 373-376 [doi]
- Triplet Mining-based Phishing Webpage DetectionKalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz. 377-380 [doi]
- Security Apps under the Looking Glass: An Empirical Analysis of Android Security AppsWeixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, Imran Chowdhury, Rahat Masood, Suranga Seneviratne. 381-384 [doi]
- ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile CrowdsensingSamad Saadatmand, Salil S. Kanhere. 385-388 [doi]
- SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps NetworksKwon Nung Choi, Achintha Wijesinghe, Chamara Manoj Madarasingha Kattadige, Kanchana Thilakarathna, Suranga Seneviratne, Guillaume Jourjon. 389-392 [doi]
- Statistical Learning-Based Dynamic Retransmission Mechanism for Mission Critical Communication: An Edge-Computing ApproachMuhammad Ahmad Raza, Mehran Abolhasan, Justin Lipman, Negin Shariati, Wei Ni 0001. 393-396 [doi]
- An Adaptive TXOP Sharing Algorithm for Multimedia Traffic in IEEE802.11ac NetworksSummera Nosheen, Jamil Y. Khan. 397-400 [doi]
- A Multi-Domain Framework to Enable Privacy for Aggregated IoT StreamsRenato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre. 401-404 [doi]
- On the Lack of Anonymity of Anonymized Smart Meter Data: An Empiric StudyAljoscha Dietrich, Dominik Leibenger, Christoph Sorge. 405-408 [doi]
- Don't Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security StudiesFabian Marquardt, Christopher Schmidt. 409-412 [doi]
- An Efficient Reputation Management Model based on Game Theory for Vehicular NetworksSamira Chouikhi, Lyes Khoukhi, Samiha Ayed, Marc Lemercier. 413-416 [doi]
- LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement LearningMaximilian Bachl, Joachim Fabini, Tanja Zseby. 417-420 [doi]
- Network Traffic Prediction using Quantile Regression with linear, Tree, and Deep Learning ModelsAhmed Alutaibi, Sudhakar Ganti. 421-424 [doi]
- Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address SharingYu Liu, Craig A. Shue. 425-428 [doi]
- Federated Vehicular Networks: Design, Applications, Routing, and EvaluationJason Posner, Lewis Tseng, Moayad Aloqaily, Mohsen Guizani. 429-432 [doi]
- Time-dependent Stable Task Assignment in Participatory Mobile CrowdsensingFatih Yucel, Eyuphan Bulut. 433-436 [doi]
- Leveraging a Music Streaming Platform in Establishing a Novel Storage Covert ChannelConnor Egbert, Fawaz Alhenaki, Daryl Johnson. 437-440 [doi]
- Intelligent Task Off-Loading and Resource Allocation for 6G Smart City EnvironmentSyed Usman Jamil, M. Arif Khan, Sabih ur Rehman. 441-444 [doi]
- Detecting Bottleneck Use of PIE or FQ-CoDel Active Queue Management During DASH-like Content StreamingJonathan Kua, Philip Branch, Grenville Armitage. 445-448 [doi]
- Towards a Distributed Defence Mechanism Against IoT-based BotsCarlos A. Rivera A, Arash Shaghaghi, Salil S. Kanhere. 449-452 [doi]
- A Collision-Protected Multihop Frame Transmission Method with Wireless LAN Communication Supported by Longer-Distance Wireless CommunicationRyosuke Nagayoshi, Yosuke Tanigawa, Hideki Tode. 453-456 [doi]
- LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWANInaam Ilahi, Muhammad Usama, Muhammad Omer Farooq, Muhammad Umar Janjua, Junaid Qadir 0001. 457-460 [doi]
- Concurrent Transmission Based Data Sharing with Run-Time Variation of TDMA ScheduleMadhav Tummala, Sudipta Saha. 461-464 [doi]
- ARdeep: Adaptive and Reliable Routing Protocol for Mobile Robotic Networks with Deep Reinforcement LearningJianmin Liu, Qi Wang, Chentao He, Yongjun Xu. 465-468 [doi]
- Rate Adaptation Techniques Using Contextual Bandit Approach for Mobile Wireless LAN UsersArkadeep Sen, Krishna M. Sivalingam. 469-472 [doi]
- Flow Control in the Context of the Multiplexed Transport Protocol QUICEkaterina Volodina, Erwin P. Rathgeb. 473-478 [doi]
- Transmission Timing Control to Avoid Collisions Among Both Aperiodic and Periodic Packets in Wireless Sensor NetworksAya Koyama, Yosuke Tanigawa, Hideki Tode. 479-484 [doi]
- KYoT: Self-sovereign IoT Identification with a Physically Unclonable FunctionSina Rafati Niya, Benjamin Jeffrey, Burkhard Stiller. 485-490 [doi]
- ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of EnergyJiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li. 491-496 [doi]
- Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular NetworksBharat Agarwal, Mohammed Amine Togou, Marco Ruffini, Gabriel-Miro Muntean. 497-502 [doi]
- Bounding Path Exposure in Energy Harvesting Wireless Sensor Networks Using Pathsets and CutsetsAbdulsalam Basabaa, Ehab S. Elmallah. 503-508 [doi]
- Increasing Throughput of Intrusion Detection Systems by Hash-Based Short String Pre-filterTomás Fukac, Vlastimil Kosar, Jan Korenek, Jirí Matousek 0002. 509-514 [doi]