Abstract is missing.
- An Evaluation of the Communication Performance of MEC-Dependent Services in 5G NetworksMatthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev. 1-8 [doi]
- Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor NetworksJasmine Grosso, Arshad Jhumka. 1-10 [doi]
- Challenges in Identifying Network Attacks Using Netflow DataEdward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt. 1-10 [doi]
- RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet InspectionMaya Kapoor, Garrett Fuchs, Jonathan Quance. 1-9 [doi]
- Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) PlatformsM. Reza Hoseinyfarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari. 1-8 [doi]
- QSpark: Distributed Execution of Batch & Streaming Analytics in Spark PlatformM. Reza Hoseinyfarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari. 1-8 [doi]
- Enhanced Precision Time Synchronization for Modular RobotsJad Bassil, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois. 1-5 [doi]
- A layered framework for root cause diagnosis of microservicesAndré Bento, Jaime Correia, João Durães, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa. 1-8 [doi]
- Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour RuleMahsa Sadeghi Ghahroudi, Alireza Shahrabi, Tuleen Boutaleb. 1-7 [doi]
- Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin CaseLukasz Krzywiecki, Adam Polubek, Hannes Salin. 1-4 [doi]
- Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton DataPlamen Hristov, Dimiter Avresky, Ognian Boumbarov. 1-5 [doi]
- On the feasibility of adversarial machine learning in malware and network intrusion detectionAndrea Venturi, Claudio Zanasi. 1-8 [doi]
- Automatic Real Time Platoon Formation Using the Road GraphShlomi Dolev, Ehud Gudes, Hannah Yair. 1-4 [doi]
- Efficient Consensus-Free Weight Reassignment for Atomic StorageHasan Heydari, Guthemberg Silvestre, Luciana Arantes. 1-9 [doi]
- Stochastic Analysis of Algorithms for Collecting Longitudinal DataFrédérique Robin, Bruno Sericola, Emmanuelle Anceaume. 1-8 [doi]
- A Multi-Metric Adaptive Stream Processing SystemDaniel Wladdimiro, Luciana Arantes, Pierre Sens 0001, Nicolas Hidalgo. 1-8 [doi]
- CyberVTI: Cyber Visualization Tool for Intrusion DetectionPedro Marques, Luis Dias, Miguel Correia 0001. 1-9 [doi]
- Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress)Petra Loncar. 1-3 [doi]
- IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart CitiesLuca D'Agati, Zakaria Benomar, Francesco Longo 0001, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi. 1-8 [doi]
- Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoTMarian Hristov, Maria Nenova, Georgi Iliev, Dimiter Avresky. 1-5 [doi]
- An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual ConnectivityShankar K. Ghosh, Sasthi C. Ghosh 0001. 1-5 [doi]
- Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of LivingLuubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar, Tan-Hsu Tan. 1-5 [doi]
- HSD-DMM: Hierarchical Software Defined Distributed Mobility ManagementEsmaeil Amiri, Ning Wang 0001, Serdar Vural, Rahim Tafazolli. 1-7 [doi]
- Analysis, prevention and detection of ransomware attacks on Industrial Control SystemsGiorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti. 1-5 [doi]
- Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning WatermarkingSameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien. 1-10 [doi]
- A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless NetworkSouvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh 0001. 1-6 [doi]
- RATEE - Resource Auction Trading at Edge EnvironmentsDiogo Paulo Dias, José Simão, Luís Veiga. 1-5 [doi]
- Verifiable Computing Using Computation Fingerprints Within FHEShlomi Dolev, Arseni Kalma. 1-9 [doi]
- Cathode: A Consistency-Aware Data Placement Algorithm for the EdgeLeonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues. 1-10 [doi]
- DDoS attack identification based on SDNDobrin Dobrev, Dimiter Avresky. 1-8 [doi]
- SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video FingerprintingAlexander Vaskevich, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne. 1-10 [doi]
- light: Emulating Predictable Latency Mode in Regular SSDsTanaya Roy, Jit Gupta, Krishna Kant 0001, Amitangshu Pal, Dave Minturn. 1-8 [doi]
- Centrality-Based Eventual Leader Election in Dynamic NetworksArnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens 0001. 1-8 [doi]
- Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuumGabriele Proietti Mattia, Roberto Beraldi. 1-9 [doi]
- DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class BalancingSashank Sridhar, Sowmya Sanagavarapu. 1-4 [doi]
- An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D CommunicationSouvik Deb, Sasthi C. Ghosh. 1-8 [doi]
- Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing PlatformAdam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer. 1-8 [doi]
- The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined NetworksTapadhir Das, Raj Mani Shukla, Shamik Sengupta. 1-5 [doi]
- Global Monitor using SpatioTemporally Correlated Local MonitorsGeeta Yadav, Kolin Paul. 1-10 [doi]
- Secure protocol buffers for Bluetooth Low-Energy communication with wearable devicesMiguel C. Francisco, Samih Eisa, Miguel L. Pardal. 1-8 [doi]
- Impact of theoretical performance models on the design of fog computing infrastructuresClaudia Canali, Riccardo Lancellotti, Stefano Rossi. 1-8 [doi]
- Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key LeakageLukasz Krzywiecki, Hannes Salin, Mateusz Jachniak. 1-8 [doi]
- Analysis of Rumor Spreading with 2-pull or 3-pull OperationsYves Mocquard, Bruno Sericola, Emmanuelle Anceaume. 1-8 [doi]
- Accountable and privacy-aware flexible car sharing and rental servicesFrancesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti. 1-7 [doi]