Abstract is missing.
- Unifying Distributed Workflows: A High-Performance Protocol for CONTROL-CORESaksham Gera, Mayuresh V. Kothare, Pradeeban Kathiravelu. 1-4 [doi]
- Resilient SDR-Based Remote Sensing with Asynchronous Edge Upload and Cloud-Native Parallel ProcessingSonny Wandel, Michael Einhaus. 5-12 [doi]
- SnapAI: a Simulator for Network Algorithms and Protocols with Artificial Intelligence integrationJoão Vitor S. Coelho, Leon L. Lausberg, Philipp Zißner, Peter Sevenich, Vinícius F. S. Mota, Cássio V. S. Prazeres, Paulo H. L. Rettore, Bruno P. Santos. 13-20 [doi]
- Navigating the New Frontier: Security Vulnerabilities in Social IoT Compared to Conventional IoTDeborah Oladipo, Elhadj Benkhelifa, Tamara Zhukabayeva. 21-27 [doi]
- Enabling the Design of Robust Network Applications by Creating Realistic ScenariosEdgar S. Oliveira, Paulo H. L. Rettore, Clayson Celes, Leon Luca Lausberg, Rodolfo I Meneguette, Nils Aschenbruck. 28-31 [doi]
- Privacy-Preserving Federated Learning for Secure Healthcare Data ProcessingAteeq Ur Rehman 0001, Anoud Bani-Hani, Sana Maroof, Sara Shar Faiz Alshehri. 32-36 [doi]
- MobMetrics: A Modular Architecture for Computing and Visualizing Mobility MetricsMárcio P. C. Filho, Lucas Novais, Leon L. Lausberg, Peter Sevenich, Paulo H. L. Rettore, Bruno P. Santos. 37-44 [doi]
- Efficient Deep Learning for Biometrics: Overview, Challenges and Trends in Ear of Frugal AIKarim Haroun, Aya Manel Zitouni, Aicha Zenakhri, Meriem Amel Guessoum, Larbi Boubchir. 45-52 [doi]
- The Concept of a Forecasting System for the Sustainable Development of SMEs in KazakhstanShara Toibayeva, Irbulat Utepbergenov, Dina Abylkhassenova, Baurzhan Zholdybaev, Fariza Zainolda, Ablay Aldabergenov. 53-58 [doi]
- Green by Design? Investigating the Energy and Carbon Footprint of Chia NetworkSoraya Djerrab, Clémentine Gritti, Rahima Benzenati. 59-66 [doi]
- Enhancing Security and Performance in Software-Defined Networks Using AI-Driven AutomationSuha Al Qaruty, Reema Al Qaruty, Khawlah M. Al-Tkhayneh, Samer Abdel Hadi. 67-73 [doi]
- Cryptography and Bayesian Networks for Security and Trust in IoT, 5G, and Beyond Networks: A Comprehensive SurveyAssel Abdildayeva, Adda Boualem, Abdelkader Berrouachedi, Assem Shayakhmetova, Elhadj Benkhelifa. 74-83 [doi]
- Towards Realistic Testing of Algorithms and Protocols in IoT Through a Novel Mobility ModelLeon Luca Lausberg, Paulo H. L. Rettore, Philipp Zißner, Sean Kloth, Edgar S. Oliveira, Clayson Celes, Peter Sevenich, Bruno P. Santos. 84-87 [doi]
- Deep Learning Approach for Animal Classification and Detection: Leveraging ResNeXt, MaXViT and K-D Trees for Accurate and Scalable Wildlife MonitoringKanda Patrick Tshinu, Chunling Tu, Owolawi Pius Adewale, Antonie Smith. 88-97 [doi]
- Data-Driven Health Monitoring of Platform Ecosystems: A Systematic Literature ReviewShady Hegazy, Muhammad Ammar, Christoph Elsner, Jan Bosch, Helena Holmström Olsson. 98-105 [doi]
- Improved Detection and Prevention of Phishing URLs Using Ensemble Machine Learning TechniquesTomiwa Kunle Oluwadare, Pantaleon Lutta. 106-113 [doi]
- Optimization of Control Plane for Load Balancing in SD-Wi-Fi NetworksBelkacem Athamena, Mohamed Raid Athamena, Zina Houhamdi. 114-118 [doi]
- Edge AI and Federated Learning: A Post-Cloud Paradigm for The Next Decade of Intelligent ComputingP. William, Firas Tayseer Ayasrah, Thipendra P. Singh, Dipesh B. Pardeshi. 119-124 [doi]
- Scaling and Securing Enterprise Healthcare Networks with BlockchainConstantine Hinds, Macchelssy Dinganga, Pradeeban Kathiravelu. 125-128 [doi]
- A Comparative Study of Machine Learning Models for Breast Cancer Diagnosis Using the Wisconsin Diagnostic DatasetMasum Billah, Mohammad Hasan, Abeda Raiyan. 129-135 [doi]
- An Automated Scanner for Detecting Common Web Application Vulnerabilities with a Focus on Enhanced Performance and SecurityAnthonia Osarumwense Taiwo, Lutta Pantaleon. 136-145 [doi]