Abstract is missing.
- Adaptive Filtering of Visual Content in Distributed Publish/Subscribe SystemsTarek Zaarour, Edward Curry. 1-5 [doi]
- Identifying Running Data-paths in Software Defined Networking Driven Data-planesJosé Reyes, Jorge López, Djamal Zeghlache. 1-8 [doi]
- Evaluating the effectiveness of Adversarial Attacks against Botnet DetectorsGiovanni Apruzzese, Michele Colajanni, Mirco Marchetti. 1-8 [doi]
- Highlighting the Container Memory Consolidation Problems in LinuxFrancis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro 0001. 1-4 [doi]
- Self-organized UAV-based Supervision and Connectivity: Challenges and OpportunitiesYann Busnel, Christelle Caillouet, David Coudert. 1-5 [doi]
- A Batch Scheduling Algorithm for VPON Reconfiguration and BBU Migration in Hybrid Cloud-Fog RANRodrigo Izidoro Tinini, Gustavo Bittencourt Figueiredo, Daniel Macêdo Batista. 1-8 [doi]
- AREA: Adaptive Resilience Algorithm for clustering in Vehicular Ad-hoc NetworksHafiz Husnain Raza Sherazi, Razi Iqbal, Luigi Alfredo Grieco. 1-3 [doi]
- Localized Reliable Causal MulticastVálter Santos, Luís Rodrigues. 1-10 [doi]
- Efficient License Management Based on Smart Contracts Between Software Vendors and Service ProvidersFederico Magnanini, Luca Ferretti, Michele Colajanni. 1-6 [doi]
- MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game TheoryOmid Tavallaie, Javid Taheri, Albert Y. Zomaya. 1-9 [doi]
- DRMF: A Distributed Resource Management Framework for Industry 4.0 EnvironmentsAsma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin 0001. 1-9 [doi]
- Early Intrusion Detection for OS Scan AttacksManuel F. López-Vizcaíno, Francisco Javier Nóvoa, Diego Fernández, Victor Carneiro, Fidel Cacheda. 1-5 [doi]
- Transparent, Provenance-assured, and Secure Software-as-a-ServiceNachiket Tapas, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito. 1-8 [doi]
- Adaptive Energy Efficient RPL Avoiding Unstable Nodes for Smart FactoryJunyoung Lee, Seongeun Yoo. 1-4 [doi]
- IoT Notary: Sensor Data Attestation in Smart EnvironmentNisha Panwar, Shantanu Sharma 0001, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani. 1-9 [doi]
- Charger Scheduling Optimization FrameworkXuan Li, Miao Jin. 1-8 [doi]
- Comparison of SDN Controllers for Constructing Security FunctionsDobrin Dobrev, Dimiter Avresky. 1-5 [doi]
- Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow PlatformsMohammadReza HoseinyFarahabady, Ali Jannesari, Zahir Tari, Javid Taheri, Albert Y. Zomaya. 1-8 [doi]
- Migration-driven Resilient Disaster Response Edge-Cloud DeploymentsXiaojie Zhang, Saptarshi Debroy. 1-8 [doi]
- Computation Task Assignment in Vehicular Fog Computing: A Learning Approach via Neighbor AdviceZeineb Rejiba, Xavier Masip-Bruin, Eva Marín-Tordera. 1-5 [doi]
- Indoor-Location Classification Using RF SignaturesSudarshan S. Chawathe. 1-4 [doi]
- On the Assessment and Debugging of QoE in SDN: Work in ProgressJosé Reyes, Jorge López, Natalia Kushik, Djamal Zeghlache. 1-3 [doi]
- Broadcasting on Adversarial Multiple Access ChannelsBader A. Aldawsari, Bogdan S. Chlebus, Dariusz R. Kowalski. 1-4 [doi]
- Security Chaos Engineering for Cloud Services: Work In ProgressKennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng 0002, Christoph Meinel. 1-3 [doi]
- Link Prediction Based Minimum Cost and Balanced Partition of Large Online Social NetworksRomas James Hada, Miao Jin, Ying Xie, Linh Le. 1-9 [doi]
- Network Data Flow Clustering based on Unsupervised LearningManuel F. López-Vizcaíno, Carlos Dafonte, Francisco Javier Nóvoa, Daniel Garabato, Marco Antonio Álvarez, Diego Fernández. 1-5 [doi]
- Holistic Approach for Studying Resource Failures at ScaleYoung Choon Lee, Jayden King, Seok-Hee Hong. 1-4 [doi]
- A Cost-effective and Lightweight Membership Assessment for Large-scale Data StreamYann Busnel, Noël Gillet. 1-8 [doi]
- Platypus: Offchain Protocol Without SynchronyAlejandro Ranchal Pedrosa, Vincent Gramoli. 1-8 [doi]
- An Adaptive Threshold Method for Anomaly-based Intrusion Detection SystemsYounghun Chae, Natallia Katenka, Lisa Cingiser DiPippo. 1-4 [doi]
- Bicycle Mode Activity Detection with Bluetooth Low Energy BeaconsPaulo Ferreira, Andriy Zabolotny, João Barreto 0001. 1-4 [doi]
- Towards Occupation Inference in Non-instrumented ServicesRicardo Filipe, Jaime Correia, Filipe Araújo, Jorge S. Cardoso. 1-7 [doi]
- Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial CrashesMarek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong. 1-4 [doi]
- Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor NetworksLukasz Krzywiecki, Patryk Koziel, Nisha Panwar. 1-4 [doi]
- $Q$-learning Based Network Selection Mechanism for CRNs with Secrecy ProvisioningShankar K. Ghosh, Sasthi C. Ghosh. 1-5 [doi]
- Blockchain-based Personal Data Management: From Fiction to SolutionNguyen B. Truong, Kai Sun, Yike Guo. 1-8 [doi]
- Anomalous Communications Detection in IoT Networks Using Sparse AutoencodersMustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar. 1-5 [doi]
- To Route or To Ferry: A Hybrid Packet Forwarding Algorithm in Flying Ad Hoc NetworksCong Pu, Logan Carpenter. 1-8 [doi]
- Using LSTM Neural Network for Time Series Predictions in Financial MarketsSvetoslav Zhelev, Dimiter R. Avresky. 1-5 [doi]
- Optimizing Resource Allocation for Secure SDN-based Virtual Network MigrationFabien Charmet, Gregory Blanc, Christophe Kiennert. 1-10 [doi]
- Cost-Based Query-Rewriting for DynamoDB: Work in ProgressSudarshan S. Chawathe. 1-3 [doi]
- A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in ProgressYong Jin, Masahiko Tomoishi, Satoshi Matsuura. 1-3 [doi]
- Nap: Network-Aware Data Partitions for Efficient Distributed ProcessingOr Raz, Chen Avin, Stefan Schmid 0001. 1-9 [doi]
- SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage SystemsKennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng 0002, Christoph Meinel. 1-5 [doi]
- Distributed Causal Memory in the Presence of Byzantine ServersLewis Tseng, Zezhi Wang, Yajie Zhao, Haochen Pan. 1-8 [doi]
- An Integration Architecture to Enable Service Providers for Self-sovereign IdentityAndreas Grüner, Alexander Mühle, Christoph Meinel. 1-5 [doi]
- Efficient Geospatial Data Collection in IoT Networks for Mobile Edge ComputingXiaofei Cao, Sanjay Madria. 1-10 [doi]
- Network Slicing in IEEE 802.11ahPedro Paulo Libório, Chan-Tong Lam, Benjamin K. Ng, Daniel L. Guidoni, Marília Curado, Leandro A. Villas. 1-9 [doi]
- Waste Flooding: A Phishing Retaliation ToolCristoffer Leite, João José Costa Gondim, Priscila Solís Barreto, Eduardo Adílio Pelinson Alchieri. 1-8 [doi]
- Digital Signature Based Countermeasure Against Puppet Attack in the Internet of ThingsCong Pu, Logan Carpenter. 1-4 [doi]
- Classification of Delay-based TCP Algorithms From Passive Traffic MeasurementsDesta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi. 1-10 [doi]
- Distributed Consistent Network Updates in SDNs: Local Verification for Global GuaranteesKlaus-Tycho Foerster, Stefan Schmid 0001. 1-4 [doi]
- A Randomized Algorithm for Joint Power and Channel Allocation in 5G D2D CommunicationSubhankar Ghosal, Sasthi C. Ghosh. 1-5 [doi]
- Resource Provisioning for MapReduce Computation in Cloud Container EnvironmentYaozhong Ge, Zhe Ding, Maolin Tang, Yu-Chu Tian. 1-4 [doi]
- Optimal Policies of Advanced Sleep Modes for Energy-Efficient 5G networksFatma Ezzahra Salem, Tijani Chahed, Eitan Altman, Azeddine Gati, Zwi Altman. 1-7 [doi]
- CAnDoR: Consistency Aware Dynamic data ReplicationEtienne Mauffret, Flavien Vernier, Sébastien Monnet. 1-5 [doi]
- Secure Communication between Network Applications and Controller in Software Defined NetworkAliyu Lawal Aliyu, Adel Aneiba, Mohammad N. Patwary. 1-8 [doi]
- Semantic Smart Contracts for Blockchain-based Services in the Internet of ThingsHamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall. 1-5 [doi]