Abstract is missing.
- A Reinforcement Learning based Game Theoretic Approach for Distributed Power Control in Downlink NOMAAshish Rauniyar, Anis Yazidi, Paal Engelstad, Olav N. Østerbø. 1-10 [doi]
- Uncertainty Driven Workflow Scheduling Using Unreliable Cloud ResourcesPanagiotis Oikonomou, Kostas Kolomvatsos, Nikos Tziritas, Georgios Theodoropoulos 0001, Thanasis Loukopoulos, Georgios I. Stamoulis. 1-8 [doi]
- XGBoost Applied to Identify Malicious Domains Using Passive DNSMarcos Rogério Silveira, Leandro Marcos da Silva, Adriano Mauro Cansian, Hugo Koji Kobayashi. 1-4 [doi]
- Federated vs. Centralized Machine Learning under Privacy-elastic Users: A Comparative AnalysisGeorgios Drainakis, Konstantinos V. Katsaros, Panagiotis Pantazopoulos, Vasilis Sourlas, Angelos Amditis. 1-8 [doi]
- Towards Quantum-Enhanced Machine Learning for Network Intrusion DetectionArnaldo Gouveia, Miguel Correia 0001. 1-8 [doi]
- SeScR: SDN-Enabled Spectral Clustering-Based Optimized Routing Using Deep Learning in VANET EnvironmentAnkur Nahar, Debasis Das 0001. 1-9 [doi]
- Causality Tracking Trade-offs for Distributed StorageHugo Guerreiro, Luís Rodrigues, Nuno M. Preguiça, Nívia Cruz Quental. 1-10 [doi]
- Cyber-Resilience Evaluation of Cyber-Physical SystemsMariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro. 1-8 [doi]
- SodsMPC: FSM based Anonymous and Private Quantum-safe Smart ContractsShlomi Dolev, Ziyu Wang 0009. 1-10 [doi]
- Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup AttacksLukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov. 1-8 [doi]
- Permissionless Consensus based on Proof-of-EligibilityGeoffrey Saunois, Frédérique Robin, Emmanuelle Anceaume, Bruno Sericola. 1-4 [doi]
- New ICN based Clustering Mechanism for Vehicular NetworksLamia Chaari Fourati, Mohamed Ali Ben Rejeb, Samiha Ayed. 1-4 [doi]
- P2CSTORE: P2P and Cloud File Storage for Blockchain ApplicationsMarcelo Silva, Miguel Matos, Miguel Correia 0001. 1-4 [doi]
- A2Cloud-cc: A Machine Learning Council to Guide Cloud Resource Selection for Scientific ApplicationsLisa Her, Syeduzzaman Khan, David Samuel, Xusheng Ai, Sixia Chen, Vivek K. Pallipuram. 1-5 [doi]
- Cryptojacking Detection with CPU Usage MetricsFábio Gomes, Miguel Correia 0001. 1-10 [doi]
- Personal Data Access Control Through Distributed AuthorizationMirko Zichichi, Stefano Ferretti, Gabriele D'Angelo, Víctor Rodríguez-Doncel. 1-4 [doi]
- Modeling Multi-constrained Fog-cloud Environment for Task Scheduling ProblemThang Nguyen, Khiem Doan, Giang T. Nguyen 0001, Binh Minh Nguyen. 1-10 [doi]
- Security methods against Black Hole attacks in Vehicular Ad-Hoc NetworkKrzysztof Stepien, Aneta Poniszewska-Maranda. 1-4 [doi]
- Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFSPeter Altmann, Abdul Ghafoor Abbasi, Olov Schelén, Karl Andersson 0001, Morteza Alizadeh. 1-8 [doi]
- CassandrEAS: Highly Available and Storage-Efficient Distributed Key-Value Store with Erasure CodingViveck R. Cadambe, Kishori M. Konwar, Muriel Médard, Haochen Pan, Lewis Tseng, Yingjian Wu. 1-8 [doi]
- M-HELP - Multi-Hop Emergency Call Protocol in 5GVishaka Basnayake, Hakim Mabed, Dushantha Nalin K. Jayakody, Philippe Canalda. 1-8 [doi]
- Recoverable Token: Recovering from Intrusions against Digital Assets in EthereumFilipe F. Martins, David R. Matos, Miguel L. Pardal, Miguel Correia 0001. 1-9 [doi]
- Multiclass Classification of Malicious Domains Using Passive DNS with XGBoost: (Work in Progress)Leandro Marcos da Silva, Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi. 1-3 [doi]
- Overlay Networks for Edge ManagementPedro Ákos Costa, Pedro Fouto, João Leitão 0001. 1-10 [doi]
- Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy ImplicationsWladimir De la Cadena, Daniel Kaiser 0001, Andriy Panchenko 0001, Thomas Engel 0001. 1-6 [doi]
- On using SMT-solvers for Modeling and Verifying Dynamic Network Emulators: (Work in Progress)Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache. 1-3 [doi]
- A Dynamic Resource Controller for Resolving Quality of Service Issues in Modern Streaming Processing EnginesM. Reza Hoseinyfarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari. 1-8 [doi]
- MERLIN: Multi-Language Web Vulnerability DetectionAlexandra Figueiredo, Tatjana Lide, David R. Matos, Miguel Correia 0001. 1-9 [doi]
- An $\frac{e-1}{2e-1}$-Approximation Algorithm for Maximizing Coverage Capability in Mobile Air Quality Monitoring SystemsViet-Dung Nguyen, Phi-Le Nguyen, Trung Hieu Nguyen, Kien Nguyen, Phan-Thuan Do. 1-4 [doi]
- MemOpLight: Leveraging application feedback to improve container memory consolidationFrancis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro 0001. 1-10 [doi]
- Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDSLuís Dias, Simão Valente, Miguel Correia 0001. 1-10 [doi]
- Priority Flow Admission and Routing in SDN: Exact and Heuristic ApproachesJorge López, Maxime Labonne, Claude Poletti, Dallal Belabed. 1-10 [doi]
- Security and Privacy Aspects in 5G NetworksNisha Panwar, Shantanu Sharma 0001. 1-5 [doi]
- Deep Reinforcement Learning for Energy-Efficient Task Scheduling in SDN-based IoT NetworkBassem Sellami, Akram Hakiri, Sadok Ben Yahia, Pascal Berthou. 1-4 [doi]
- Minimal Relay Node Placement for Ensuring Network Connectivity in Mobile Wireless Sensor NetworksNguyen Thi Hanh, Huynh Thi Thanh Binh, Nguyen Van Son, Myungchul Kim. 1-8 [doi]
- Palpatine: Mining Frequent Sequences for Data Prefetching in NoSQL Distributed Key-Value StoresSérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga. 1-10 [doi]
- UAV-aided 5G Network in Suburban, Urban, Dense Urban, and High-rise Urban EnvironmentsShah Khalid Khan, Usman Naseem, Abdul Sattar 0006, Nazar Waheed, Adnan Mir, Atika Qazi, Muhammad Ismail. 1-4 [doi]
- Energy and Latency-aware Resource Reconfiguration in Fog EnvironmentsNoé Godinho, Henrique Silva, Marília Curado, Luís Paquete. 1-8 [doi]
- Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You ThinkJean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser. 1-8 [doi]
- Concepts of a Pyramidal Model for Assessing Internet-based Terrorist PropagandaAndrea Tundis, Ahmed Ali Shams, Max Mühlhäuser. 1-4 [doi]
- Efficient Distribution of Security Policy Filtering Rules in Software Defined NetworksAhmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula. 1-10 [doi]
- Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge ProofsEdoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere. 1-10 [doi]
- Introducing Network Coding to RPL: The Chained Secure Mode (CSM)Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy. 1-4 [doi]
- BSS: Blockchain Enabled Security System for Internet of Things ApplicationsLokendra Vishwakarma, Debasis Das. 1-4 [doi]
- Collaboration Strategies for Fog Computing under Heterogeneous Network-bound ScenariosClaudia Canali, Riccardo Lancellotti, Simone Mione. 1-8 [doi]
- CryingJackpot: Network Flows and Performance Counters against CryptojackingGilberto Gomes, Luís Dias, Miguel Correia 0001. 1-10 [doi]
- The Performance of Byzantine Fault Tolerant BlockchainsGary Shapiro, Christopher Natoli, Vincent Gramoli. 1-8 [doi]
- Q-learning-based, Optimized On-demand Charging Algorithm in WRSNLa Van Quan, Phi-Le Nguyen, Thanh-Hung Nguyen, Kien Nguyen. 1-8 [doi]
- Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devicesMalcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi. 1-8 [doi]
- Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoTRenato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre. 1-8 [doi]