Abstract is missing.
- A Zero Trust approach for the cybersecurity of Industrial Control SystemsClaudio Zanasi, Federico Magnanini, Silvio Russo, Michele Colajanni. 1-7 [doi]
- ALDER: Unlocking blockchain performance by multiplexing consensus protocolsKadir Korkmaz, Joachim Bruneau-Queyreix, Sonia Ben Mokhtar, Laurent Réveillère. 9-18 [doi]
- Alternating MPR: a balanced broadcast algorithm for MANETsAymeric Agon-Rambosson, Jonathan Lejeune, Julien Sopena, Pierre Sens 0001. 19-26 [doi]
- An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networksSridevi S, Jacob Augustine, Shankar K. Ghosh. 27-34 [doi]
- BFT-Blocks: The Case for Analyzing Networking in Byzantine Fault Tolerant ConsensusRichard von Seck, Filip Rezabek, Benedikt Jaeger, Sebastian Gallenmüller, Georg Carle. 35-44 [doi]
- Bi-objective optimization of availability and cost for cloud servicesAndré Bento, João Soares, António Ferreira, João Durães, José Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa. 45-53 [doi]
- Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile ApplicationRicardo Grade, Samih Eisa, Miguel L. Pardal. 55-62 [doi]
- Byzantine Fault-Tolerant Causal Broadcast on Incomplete GraphsAnshuman Misra, Ajay D. Kshemkalyani. 63-71 [doi]
- Detecting Causality in the Presence of Byzantine Processes: There is No Holy GrailAnshuman Misra, Ajay D. Kshemkalyani. 73-80 [doi]
- Comparison of Machine Learning-based anomaly detectors for Controller Area NetworkAndrea Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti. 81-88 [doi]
- Data-driven Method for In-band Network Telemetry Monitoring of Aggregated TrafficMehrzad Lavassani, Johan Åkerberg, Mats Björkman. 89-95 [doi]
- Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive HashingMaya Kapoor, Siddharth Krishnan, Thomas Moyer. 97-105 [doi]
- Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell NetworksIbtissem Brahmi, Monia Hamdi, Ines Rahmany, Faouzi Zarai. 107-114 [doi]
- Causal Ordering Properties of Byzantine Reliable Broadcast PrimitivesAnshuman Misra, Ajay D. Kshemkalyani. 115-122 [doi]
- Energy-Aware Routing in SDN Enabled Data Center NetworkPriyanka Kamboj, Sujata Pal. 123-130 [doi]
- Formal models for the verification, performance evaluation, and comparison of IoT communication protocolsImene Ben Hafaiedh. 131-138 [doi]
- In-depth analysis of the IDA-Gossip protocolKadir Korkmaz, Joachim Bruneau-Queyreix, Stéphane Delbruel, Sonia Ben Mokhtar, Laurent Réveillère. 139-147 [doi]
- Infrastructure-centric, NetworkServer-agnostic LoRaWAN RoamingGiovanni Merlino, Rafael Asorey-Cacheda, Luca D'Agati, Francesco Longo 0001, Antonio-Javier García-Sánchez, Joan García-Haro, Antonio Puliafito. 149-156 [doi]
- Inter-slice B5G Bandwidth Resource AllocationFadoua Debbabi, Raouia Taktak, Rihab Jmal, Lamia Chaari Fourati, Rui L. Aguiar. 157-163 [doi]
- LoCaaS: Location-Certification-as-a-ServiceLucas H. Vicente, Samih Eisa, Miguel L. Pardal. 165-172 [doi]
- MAB based Network Selection mechanism for URLLC users in RIS assisted networkSouvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh 0001. 173-179 [doi]
- MPEC2: Multilayer and Pipeline Video Encoding on the Computing ContinuumSamira Afzal, Zahra Najafabadi Samani, Narges Mehran, Christian Timmerer, Radu Prodan. 181-190 [doi]
- Mobility-aware Multi-Access Edge Computing for Multiplayer Augmented and Virtual Reality GamingRamesh Singh, Radhika Sukapuram, Suchetana Chakraborty. 191-200 [doi]
- Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version)Shlomi Dolev, Yaniv Kleinman. 201-207 [doi]
- Never Alone: a Quality of Context-aware Monitoring System for Aging in Place Smart HomeHajer Nabli, Ines Regaig, Raoudha Ben Djemaa, Layth Sliman. 209-215 [doi]
- Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV)Slim Abbes, Slim Rekhis. 217-224 [doi]
- Reputation-based state machine replicationMuhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu. 225-234 [doi]
- Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine LearningAndrea Venturi, Claudio Zanasi, Mirco Marchetti, Michele Colajanni. 235-242 [doi]
- SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETsGabriele Gambigliani Zoccoli, Francesco Pollicino, Dario Stabili, Mirco Marchetti. 243-249 [doi]
- Software-defined Dynamic 5G Network Slice Management for Industrial Internet of ThingsZiran Min, Shashank Shekhar 0001, Charif Mahmoudi, Valerio Formicola, Swapna S. Gokhale, Aniruddha Gokhale. 251-259 [doi]
- SureRepute: Reputation System for Crowdsourced Location WitnessesRafael Figueiredo, Samih Eisa, Miguel L. Pardal. 261-268 [doi]
- Swarming with (Visual) Secret (Shared) MissionShlomi Dolev, Alexander Fok, Michael Segal 0001. 269-276 [doi]
- WebDHT: browser-compatible distributed hash table for decentralized Web applicationsLorenzo Rossi, Luca Ferretti. 277-284 [doi]
- Modularized and Contract-Based Prediction Models in Programmable NetworksMichel Neves, André Riker, Jéferson Campos Nobre, Antônio J. G. Abelém, Bruno Lopes Dalmazo. 285-289 [doi]
- On the Performance of Machine Learning at the Network Edge to Detect Industrial IoT FaultsYuri Santo, Bruno Lopes Dalmazo, Roger Immich, André Riker. 291-295 [doi]
- On using Cellular Automata for Modeling the Evolution of Dynamic-Link Network ParametersErick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache. 297-301 [doi]
- Distributed Coordination Based on Quantum Entanglement (Work in Progress)Yotam Ashkenazi, Shlomi Dolev. 303-305 [doi]
- Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress)Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz. 307-309 [doi]