Abstract is missing.
- Byzantine Resilient Waves Interference-based Visual Encryption SchemeShlomi Dolev, Alexander Fok, Michael Segal 0001. 1-8 [doi]
- Hooks: A Simple and Modular Checkpointing Protocol for BlockchainsPedro Antonino, Antoine Durand, Namrata Jain, Garry Lancaster, Jonathan Lawrence, A. W. Roscoe 0001. 9-16 [doi]
- AUPE: Collaborative Byzantine fault-tolerant peer-samplingAugusta Mukam, Joachim Bruneau-Queyreix, Laurent Réveillère. 17-24 [doi]
- Efficient Write Operations in Event Sourcing with ReplicationTiago Rolo, Nuno Preguiça, Filipe Araújo. 25-28 [doi]
- Steiner Trees Composition and Scalable Video Coding for Satelite Video MulticastAlex Binun, Yefim Dinitz, Shlomi Dolev, Ofer Hadar, Adnan Jaber, Shevach Riabtsev. 29-36 [doi]
- Vulnerable Road Users Accident Prevention via Smart City Data Fusion: Experimental Evaluation of a 5G MEC ArchitectureEnrico Rossini, Marcello Pietri, Marco Picone, Carlo Augusto Grazia, Marco Mamei. 37-44 [doi]
- A fuzzy reputation system for Radio Access Network sharingPierre-Marie Lechevalier, Yann Busnel, Romaric Ludinard, Géraldine Texier. 45-52 [doi]
- Collaborative Traffic Offloading in Multi-UAV Cellular Networks via Hybridizing Optimization with Machine LearningZhiyong Liu, Hong Shen, Hui Tian. 53-60 [doi]
- Platelet: Pioneering Security and Privacy Compliant Simulation for Intelligent Transportation Systems and V2XMathias Kautz, Badis Hammi, Joaquín García-Alfaro. 61-67 [doi]
- Certifying IoT Data with Verifiable CredentialsCarlo Mazzocca, Stefano Allevi, Rebecca Montanari. 68-71 [doi]
- WiFi Traffic Inspection for Obscured DevicesMaksuda Rabeya, Nisha Panwar. 72-79 [doi]
- Improving Intrusion Detection in IoT NetworksSilvio Russo, Isabella Marasco, Karina Chichifoi, Claudio Zanasi. 80-86 [doi]
- Towards Threat Modelling of IoT Context-Sharing PlatformsMohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha. 87-96 [doi]
- HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)ValidationsLorenzo Pisu, Federico Loi, Davide Maiorca, Giorgio Giacinto. 97-104 [doi]
- Login System for OpenID Connect with Verifiable CredentialsDario Castellano, Roberto De Prisco, Pompeo Faruolo. 105-112 [doi]
- Efficient and Privacy-Preserving Collective Remote Attestation for NFVGhada Arfaoui, Thibaut Jacques, Cristina Onete. 113-122 [doi]
- Secure, Searchable, and Consent-Driven Healthcare Data Sharing SystemIvan Costa, Ivone Amorim, Eva Maia, Pedro Barbosa, Isabel Praça. 123-131 [doi]
- Detecting VPN Traffic in Real-Time with Active ProbingYuan Tian, Zechun Cao, Shou-Hsuan Stephen Huang. 132-139 [doi]
- An analysis of Genetic Algorithms to support the management of edge computing infrastructuresClaudia Canali, Riccardo Lancellotti, Riccardo Mescoli. 140-147 [doi]
- Controlling Performance Interference in Multi-Tenant Containerized EnvironmentsM. Reza Hoseinyfarahabady, Albert Y. Zomaya. 148-155 [doi]
- Containerized Jupyter Notebooks: balancing flexibility and performanceFrancesco Faenza, Emiliano Maccaferri, Claudia Canali. 156-163 [doi]
- Online Diagnosis of Microservices Based Applications Via Partial Digital TwinSourav Das, Jit Gupta, Krishna Kant 0001. 164-171 [doi]
- Secure Risk Management Approach for Enhancing the Performance of Cloud-based Cooperative Spectrum Sensing CRNsVictor Balogun, Xavier Paquette, Oluwafemi A. Sarumi. 172-176 [doi]
- A Demand-aware Networked System Using Telemetry and ML with REACTNETSeyed Milad Miri, Stefan Schmid 0001, Habib Mostafaei. 177-184 [doi]
- MCQUIC - A Multicast Extension for QUICMax Franke, Jake Holland, Stefan Schmid 0001. 185-192 [doi]
- MALARIA: Management of Low-Latency Routing Impact on Mix Network AnonymityMahdi Rahimi. 193-202 [doi]
- Multi-Coflow Scheduling in Not-All-Stop Optical Circuit Switches for Data Center NetworksHongkun Ren, Hong Shen, Hui Tian. 203-210 [doi]
- QoS-Aware Flow Routing with Minimizing Active Links and Rule Capacity Constraints in SDN NetworksPriyanka Kamboj, Sujata Pal. 211-218 [doi]
- Emergent Peer-to-Peer Multi-Hub TopologyMohamed Amine Legheraba, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida. 219-226 [doi]
- Enhancing Network Intrusion Detection Systems: A Real-time Adaptive Machine Learning Approach for Adversarial Packet-Mutation MitigationMd Mehedi Hasan, Md. Rafiqul Islam 0001, Quazi Mamun, Md Zahidul Islam 0001, Junbin Gao. 227-235 [doi]
- Web Application Penetration Testing with Artificial Intelligence: A Systematic ReviewGustavo Sánchez, Olakunle Olayinka, Aryan Pasikhani. 236-245 [doi]
- DCPsolver: Enhancing DNS Cache Poisoning Defenses with Resolver-Based SmartNICsBharath Kollanur, Kurt Friday, Elias Bou-Harb. 246-253 [doi]
- FedCert: Federated Accuracy CertificationMinh Hieu Nguyen, Huu Tien Nguyen, Trung Thanh Nguyen, Manh Duong Nguyen, Trong Nghia Hoang, Truong Thao Nguyen, Phi-Le Nguyen. 254-261 [doi]
- NeuroSense: Smartwatch-based Early Detection Framework for Alzheimer's DiseaseAarju Dixit, Debasis Das. 262-269 [doi]
- Evaluating Technical Countermeasures for Telecom Spam and Scams in the AI EraMarcello Pietri, Marco Mamei, Michele Colajanni. 270-277 [doi]
- FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive RegularizationManh Duong Nguyen, Trung Thanh Nguyen, Huy Hieu Pham 0001, Trong Nghia Hoang, Phi-Le Nguyen, Thanh Trung Huynh. 278-285 [doi]
- DECEPT-CTI: A Framework for Enhancing Cyber Deception Strategies through NLP-based Extraction of CTI from Unstructured ReportsAmal Sayari, Slim Rekhis, Yacine Djemaiel, Ali Mabrouk, Wiem Mahouachi. 286-293 [doi]
- Defending Against Backdoor Attacks with Feature Activation-Based Detection and Model RecoveryXiao Ma, Hong Shen, Chan-Tong Lam. 294-301 [doi]