


default search action
20th NCA 2021: Boston, MA, USA
- Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky:
20th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021. IEEE 2021, ISBN 978-1-6654-9550-9 - Frédérique Robin, Bruno Sericola, Emmanuelle Anceaume:
Stochastic Analysis of Algorithms for Collecting Longitudinal Data. 1-8 - Adam Cassell, Tapadhir Das
, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer:
Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform. 1-8 - Jad Bassil
, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois:
Enhanced Precision Time Synchronization for Modular Robots. 1-5 - Leonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues:
Cathode: A Consistency-Aware Data Placement Algorithm for the Edge. 1-10 - Tapadhir Das
, Raj Mani Shukla, Shamik Sengupta:
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks. 1-5 - Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien
:
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. 1-10 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya
, Zahir Tari:
Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms. 1-8 - Lukasz Krzywiecki
, Adam Polubek, Hannes Salin
:
Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. 1-4 - Shankar K. Ghosh
, Sasthi C. Ghosh:
An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity. 1-5 - Shlomi Dolev, Ehud Gudes, Hannah Yair:
Automatic Real Time Platoon Formation Using the Road Graph. 1-4 - Edward Chuah
, Neeraj Suri
, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. 1-10 - Geeta Yadav
, Kolin Paul:
Global Monitor using SpatioTemporally Correlated Local Monitors. 1-10 - Mahsa Sadeghi Ghahroudi, Alireza Shahrabi
, Tuleen Boutaleb:
Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule. 1-7 - Arnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens:
Centrality-Based Eventual Leader Election in Dynamic Networks. 1-8 - Hasan Heydari
, Guthemberg Silvestre, Luciana Arantes:
Efficient Consensus-Free Weight Reassignment for Atomic Storage. 1-9 - Gabriele Proietti Mattia
, Roberto Beraldi:
Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum. 1-9 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:
Analysis of Rumor Spreading with 2-pull or 3-pull Operations. 1-8 - Luubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar
, Tan-Hsu Tan:
Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living. 1-5 - Claudia Canali, Riccardo Lancellotti, Stefano Rossi:
Impact of theoretical performance models on the design of fog computing infrastructures. 1-8 - André Bento
, Jaime Correia, João Durães
, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo
, Raul Barbosa:
A layered framework for root cause diagnosis of microservices. 1-8 - Souvik Deb, Sasthi C. Ghosh:
An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication. 1-8 - Pedro Marques, Luís Dias, Miguel Correia:
CyberVTI: Cyber Visualization Tool for Intrusion Detection. 1-9 - Esmaeil Amiri
, Ning Wang, Serdar Vural, Rahim Tafazolli:
HSD-DMM: Hierarchical Software Defined Distributed Mobility Management. 1-7 - Diogo Paulo Dias, José Simão, Luís Veiga
:
RATEE - Resource Auction Trading at Edge Environments. 1-5 - Plamen Hristov, Dimiter Avresky, Ognian Boumbarov:
Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data. 1-5 - Dobrin Dobrev, Dimiter Avresky:
DDoS attack identification based on SDN. 1-8 - Alexander Vaskevich, Thilini Dahanayaka
, Guillaume Jourjon, Suranga Seneviratne:
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting. 1-10 - Luca D'Agati
, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi:
IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities. 1-8 - Souvik Deb, Shankar Kumar Ghosh
, Sasthi C. Ghosh:
A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network. 1-6 - Andrea Venturi
, Claudio Zanasi:
On the feasibility of adversarial machine learning in malware and network intrusion detection. 1-8 - Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti
:
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems. 1-5 - Sashank Sridhar, Sowmya Sanagavarapu:
DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing. 1-4 - Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn:
PLMlight: Emulating Predictable Latency Mode in Regular SSDs. 1-8 - Shlomi Dolev, Arseni Kalma:
Verifiable Computing Using Computation Fingerprints Within FHE. 1-9 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya
, Zahir Tari:
QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform. 1-8 - Lukasz Krzywiecki
, Hannes Salin
, Mateusz Jachniak:
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. 1-8 - Daniel Wladdimiro
, Luciana Arantes, Pierre Sens, Nicolas Hidalgo:
A Multi-Metric Adaptive Stream Processing System. 1-8 - Petra Loncar
:
Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress). 1-3 - Jasmine Grosso, Arshad Jhumka:
Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. 1-10 - Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti
:
Accountable and privacy-aware flexible car sharing and rental services. 1-7 - Miguel C. Francisco, Samih Eisa
, Miguel L. Pardal
:
Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices. 1-8 - Maya Kapoor, Garrett Fuchs
, Jonathan Quance:
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection. 1-9 - Marian Hristov, Maria Nenova
, Georgi Iliev, Dimiter Avresky:
Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. 1-5 - Matthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev:
An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.