Abstract is missing.
- A Simple Approach for Data Cleansing on Hadoop Framework using File Merging TechniqueAdnan Ali, Nada Masood Mirza, Rawad Bader, Mohamad Khairi Ishak. 1-5 [doi]
- Towards secure and reliable aggregation for Federated Learning protocols in healthcare applicationsMeriem Arbaoui, Mohamed-el-Amine Brahmia, Abdellatif Rahmoun. 1-3 [doi]
- Identifying Sources of Energy Consumption for Android Applications: A Pilot StudyAnshu Rathor, David Berdik, Fadi Wedyan, Yaser Jararweh. 1-7 [doi]
- KeynoteJaime Lloret 0001. 1 [doi]
- Leveraging Self-Sovereign Identity in Decentralized Data AggregationYepeng Ding, Hiroyuki Sato, Maro G. Machizawa. 1-8 [doi]
- KeynoteTatiana Kalganova. 1 [doi]
- An Adaptive Attack Prediction Framework in Cyber-Physical SystemsMohamed-el-Amine Brahmia, Sami Babouche, Samir Ouchani, Mourad Zghal. 1-7 [doi]
- Smart Contract Implementation to Improve Security on Solid Waste Management ApplicationRaimir Holanda Filho, Debora Carla Barboza de Sousa, Wellington Alves de Brito, Victor Pasknel de Alencar Ribeiro, Emanuel Leão Sá, Joan Lucas Marques de Sousa Chaves. 1-6 [doi]
- Expanding DevSecOps Practices and Clarifying the Concepts within Kubernetes EcosystemMuntaha Alawneh, Imad M. Abbadi. 1-7 [doi]
- Side Channel Attack using Machine LearningAmina Amrouche, Larbi Boubchir, Saïd Yahiaoui. 1-5 [doi]
- Message from the General ChairsLarbi Boubchir, Ahmed Bouridane. 1 [doi]
- KeynotezEiman Kanjo. 1 [doi]
- Side-Channel Analysis and pseudo-Boolean functionsMeriem Mahar, Hacène Belbachir, Abdellah Mokrane. 1-2 [doi]
- A Reinforcement Learning-Based Node Selection for PBFT ConsensusKenza Riahi, Mohamed-el-Amine Brahmia, Abdelhafid Abouaissa, Lhassane Idoumghar. 1-3 [doi]
- Multi-Task Deep Learning for Multimodal Biometric RecognitionSaid Si Kaddour, Larbi Boubchir, Boubaker Daachi. 1-2 [doi]
- A Comparative Study for Half-duplex and Full-duplex Multi-hop Routing in Software Defined NetworksSharhabeel H. Alnabelsi, Haythem Bany Salameh, Khalid A. Darabkh. 1-5 [doi]
- Networking Research Innovations for Telesurgery: A Systematic ReviewPradeeban Kathiravelu, Elhadj Benkhelifa, Zachary Zaiman, Matthew Wang, Ramon Correa, Luís Veiga, Imon Banerjee, Hari Trivedi, Saptarshi Purkayastha, Judy Gichoya, Babak Mahmoudi. 1-8 [doi]
- A Novel Routing Protocol for Software Defined RadiosKhalid A. Darabkh, Marwa H. Al-Tahaineh, Andraws I. Swidan, Haythem Bany Salameh. 1-5 [doi]
- An Efficient Routing Protocol for Full-Duplex Software Defined RadiosKhalid A. Darabkh, Batool R. Awawdeh, Ramzi R. Saifan, Ala' F. Khalifeh, Sharhabeel H. Alnabelsi, Haythem Bany Salameh. 1-5 [doi]
- NIV-Detector: An Automated Approach for Detecting Next- Intent Security Vulnerability in Android ApplicationsZakarea Alshara, Anas Shatnawi, Yaser Jararweh. 1-7 [doi]
- Face Detection and Identification based on 2D and 3D Deep Texture FeaturesImen Labiadh, Hassene Seddik, Larbi Boubchir. 1-3 [doi]
- Quantum Programming TaxonomyMaria Belkhir, Haroun Benkaouha, Elhadj Benkhelifa. 1-7 [doi]
- Wavelets and DCT Watermarking for Medical ImageRania Hamami, Narima Zermi, Larbi Boubchir, Amine Khaldi. 1-3 [doi]
- An Efficient Multi-Session Multicast Mechanism for Cognitive Radio NetworksBassam Harb, Mohammed M. Gharaibeh, Haythem Bany Salameh. 1-5 [doi]
- Optimizing System-on-Chip Performance Using AI and SDN: Approaches and ChallengesMohammad Al Ja'afreh, Muath Obaidat, Ali Karime, Sahel Alouneh. 1-8 [doi]
- Artificial Intelligence for Automatic and Optimized Generation of Healthcare PlanningWalid Abdelaidoum, Mohamed A. Madani, Larbi Boubchir, Boubaker Daachi. 1-2 [doi]
- Modelling and simulation of an ecological route in smart cities towards a green trajectoryYoussef Mekouar, Imad Saleh, Karim Mohammed. 1-5 [doi]
- Un-Fair Trojan: Targeted Backdoor Attacks Against Model FairnessNicholas Furth, Abdallah Khreishah, Guanxiong Liu, NhatHai Phan, Yaser Jararweh. 1-9 [doi]
- Performance Analysis of a Multi-Channel Non-persistent CSMA Protocol in Delay-sensitive CR-based IoT Sensor NetworksMuath Bani Irshaid, Haythem Bany Salameh. 1-5 [doi]
- A New Approach Based on a Multi-Agent System for IDS in Cloud ComputingDounya Kassimi, Okba Kazar, Ezedin Barka, Abdelhak Merizig, Zina Houhamdi, Belkacem Athamena, Zaoui Meftah. 1-8 [doi]
- Deep Learning-Based Speech Recognition System using Blockchain for Biometric Access ControlOussama Mounnan, Otman Manad, Larbi Boubchir, Abdelkrim El Mouatasim, Boubaker Daachi. 1-2 [doi]
- VNF Software Cost Modeling Based on Telecom NetworkGhoshana Bista, Eddy Caron, Anne-Lucie Vion. 8-15 [doi]