default search action
19th NCA 2020: Cambridge, MA, USA
- 19th IEEE International Symposium on Network Computing and Applications, NCA 2020, Cambridge, MA, USA, November 24-27, 2020. IEEE 2020, ISBN 978-1-7281-8326-8
- Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. 1-10 - Ankur Nahar, Debasis Das:
SeScR: SDN-Enabled Spectral Clustering-Based Optimized Routing Using Deep Learning in VANET Environment. 1-9 - Arnaldo Gouveia, Miguel Correia:
Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. 1-8 - Viet Dung Nguyen, Phi-Le Nguyen, Trung Hieu Nguyen, Kien Nguyen, Phan-Thuan Do:
An $\frac{e-1}{2e-1}$-Approximation Algorithm for Maximizing Coverage Capability in Mobile Air Quality Monitoring Systems. 1-4 - Lokendra Vishwakarma, Debasis Das:
BSS: Blockchain Enabled Security System for Internet of Things Applications. 1-4 - La Van Quan, Phi Le Nguyen, Thanh-Hung Nguyen, Kien Nguyen:
Q-learning-based, Optimized On-demand Charging Algorithm in WRSN. 1-8 - Fábio Gomes, Miguel Correia:
Cryptojacking Detection with CPU Usage Metrics. 1-10 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari:
A Dynamic Resource Controller for Resolving Quality of Service Issues in Modern Streaming Processing Engines. 1-8 - Gilberto Gomes, Luís Dias, Miguel Correia:
CryingJackpot: Network Flows and Performance Counters against Cryptojacking. 1-10 - Shlomi Dolev, Ziyu Wang:
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts. 1-10 - Lamia Chaari Fourati, Mohamed Ali Ben Rejeb, Samiha Ayed:
New ICN based Clustering Mechanism for Vehicular Networks. 1-4 - Wladimir De la Cadena, Daniel Kaiser, Andriy Panchenko, Thomas Engel:
Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications. 1-6 - Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov:
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. 1-8 - Marcos Rogério Silveira, Leandro Marcos da Silva, Adriano Mauro Cansian, Hugo Koji Kobayashi:
XGBoost Applied to Identify Malicious Domains Using Passive DNS. 1-4 - Leandro Marcos da Silva, Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi:
Multiclass Classification of Malicious Domains Using Passive DNS with XGBoost: (Work in Progress). 1-3 - Jean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser:
Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think. 1-8 - Panagiotis Oikonomou, Kostas Kolomvatsos, Nikos Tziritas, Georgios Theodoropoulos, Thanasis Loukopoulos, Georgios I. Stamoulis:
Uncertainty Driven Workflow Scheduling Using Unreliable Cloud Resources. 1-8 - Andrea Tundis, Ahmed Ali Shams, Max Mühlhäuser:
Concepts of a Pyramidal Model for Assessing Internet-based Terrorist Propaganda. 1-4 - Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre:
Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT. 1-8 - Shah Khalid Khan, Usman Naseem, Abdul Sattar, Nazar Waheed, Adnan Mir, Atika Qazi, Muhammad Ismail:
UAV-aided 5G Network in Suburban, Urban, Dense Urban, and High-rise Urban Environments. 1-4 - Noé Godinho, Henrique Silva, Marília Curado, Luís Paquete:
Energy and Latency-aware Resource Reconfiguration in Fog Environments. 1-8 - Vishaka Basnayake, Hakim Mabed, Dushantha Nalin K. Jayakody, Philippe Canalda:
M-HELP - Multi-Hop Emergency Call Protocol in 5G. 1-8 - Marcelo Silva, Miguel Matos, Miguel Correia:
P2CSTORE: P2P and Cloud File Storage for Blockchain Applications. 1-4 - Geoffrey Saunois, Frédérique Robin, Emmanuelle Anceaume, Bruno Sericola:
Permissionless Consensus based on Proof-of-Eligibility. 1-4 - Pedro Ákos Costa, Pedro Fouto, João Leitão:
Overlay Networks for Edge Management. 1-10 - Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro:
MemOpLight: Leveraging application feedback to improve container memory consolidation. 1-10 - Thang Nguyen, Khiem Doan, Giang T. Nguyen, Binh Minh Nguyen:
Modeling Multi-constrained Fog-cloud Environment for Task Scheduling Problem. 1-10 - Peter Altmann, Abdul Ghafoor Abbasi, Olov Schelén, Karl Andersson, Morteza Alizadeh:
Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS. 1-8 - Lisa Her, Syeduzzaman Khan, David Samuel, Xusheng Ai, Sixia Chen, Vivek K. Pallipuram:
A2Cloud-cc: A Machine Learning Council to Guide Cloud Resource Selection for Scientific Applications. 1-5 - Mirko Zichichi, Stefano Ferretti, Gabriele D'Angelo, Víctor Rodríguez-Doncel:
Personal Data Access Control Through Distributed Authorization. 1-4 - Krzysztof Stepien, Aneta Poniszewska-Maranda:
Security methods against Black Hole attacks in Vehicular Ad-Hoc Network. 1-4 - Jorge López, Maxime Labonne, Claude Poletti, Dallal Belabed:
Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches. 1-10 - Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. 1-8 - Nguyen Thi Hanh, Huynh Thi Thanh Binh, Nguyen Van Son, Myungchul Kim:
Minimal Relay Node Placement for Ensuring Network Connectivity in Mobile Wireless Sensor Networks. 1-8 - Viveck R. Cadambe, Kishori M. Konwar, Muriel Médard, Haochen Pan, Lewis Tseng, Yingjian Wu:
CassandrEAS: Highly Available and Storage-Efficient Distributed Key-Value Store with Erasure Coding. 1-8 - Claudia Canali, Riccardo Lancellotti, Simone Mione:
Collaboration Strategies for Fog Computing under Heterogeneous Network-bound Scenarios. 1-8 - Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache:
On using SMT-solvers for Modeling and Verifying Dynamic Network Emulators: (Work in Progress). 1-3 - Luís Dias, Simão Valente, Miguel Correia:
Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. 1-10 - Hugo Guerreiro, Luís Rodrigues, Nuno M. Preguiça, Nívia Cruz Quental:
Causality Tracking Trade-offs for Distributed Storage. 1-10 - Alexandra Figueiredo, Tatjana Lide, David R. Matos, Miguel Correia:
MERLIN: Multi-Language Web Vulnerability Detection. 1-9 - Sérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga:
Palpatine: Mining Frequent Sequences for Data Prefetching in NoSQL Distributed Key-Value Stores. 1-10 - Ashish Rauniyar, Anis Yazidi, Paal Engelstad, Olav N. Østerbø:
A Reinforcement Learning based Game Theoretic Approach for Distributed Power Control in Downlink NOMA. 1-10 - Filipe F. Martins, David R. Matos, Miguel L. Pardal, Miguel Correia:
Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum. 1-9 - Bassem Sellami, Akram Hakiri, Sadok Ben Yahia, Pascal Berthou:
Deep Reinforcement Learning for Energy-Efficient Task Scheduling in SDN-based IoT Network. 1-4 - Nisha Panwar, Shantanu Sharma:
Security and Privacy Aspects in 5G Networks. 1-5 - Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro:
Cyber-Resilience Evaluation of Cyber-Physical Systems. 1-8 - Gary Shapiro, Christopher Natoli, Vincent Gramoli:
The Performance of Byzantine Fault Tolerant Blockchains. 1-8 - Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Introducing Network Coding to RPL: The Chained Secure Mode (CSM). 1-4 - Georgios Drainakis, Konstantinos V. Katsaros, Panagiotis Pantazopoulos, Vasilis Sourlas, Angelos Amditis:
Federated vs. Centralized Machine Learning under Privacy-elastic Users: A Comparative Analysis. 1-8 - Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.