default search action
20th NCA 2021: Boston, MA, USA
- Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky:
20th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021. IEEE 2021, ISBN 978-1-6654-9550-9 - Frédérique Robin, Bruno Sericola, Emmanuelle Anceaume:
Stochastic Analysis of Algorithms for Collecting Longitudinal Data. 1-8 - Adam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer:
Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform. 1-8 - Jad Bassil, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois:
Enhanced Precision Time Synchronization for Modular Robots. 1-5 - Leonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues:
Cathode: A Consistency-Aware Data Placement Algorithm for the Edge. 1-10 - Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks. 1-5 - Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien:
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. 1-10 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari:
Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms. 1-8 - Lukasz Krzywiecki, Adam Polubek, Hannes Salin:
Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. 1-4 - Shankar K. Ghosh, Sasthi C. Ghosh:
An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity. 1-5 - Shlomi Dolev, Ehud Gudes, Hannah Yair:
Automatic Real Time Platoon Formation Using the Road Graph. 1-4 - Edward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. 1-10 - Geeta Yadav, Kolin Paul:
Global Monitor using SpatioTemporally Correlated Local Monitors. 1-10 - Mahsa Sadeghi Ghahroudi, Alireza Shahrabi, Tuleen Boutaleb:
Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule. 1-7 - Arnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens:
Centrality-Based Eventual Leader Election in Dynamic Networks. 1-8 - Hasan Heydari, Guthemberg Silvestre, Luciana Arantes:
Efficient Consensus-Free Weight Reassignment for Atomic Storage. 1-9 - Gabriele Proietti Mattia, Roberto Beraldi:
Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum. 1-9 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:
Analysis of Rumor Spreading with 2-pull or 3-pull Operations. 1-8 - Luubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar, Tan-Hsu Tan:
Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living. 1-5 - Claudia Canali, Riccardo Lancellotti, Stefano Rossi:
Impact of theoretical performance models on the design of fog computing infrastructures. 1-8 - André Bento, Jaime Correia, João Durães, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa:
A layered framework for root cause diagnosis of microservices. 1-8 - Souvik Deb, Sasthi C. Ghosh:
An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication. 1-8 - Pedro Marques, Luis Dias, Miguel Correia:
CyberVTI: Cyber Visualization Tool for Intrusion Detection. 1-9 - Esmaeil Amiri, Ning Wang, Serdar Vural, Rahim Tafazolli:
HSD-DMM: Hierarchical Software Defined Distributed Mobility Management. 1-7 - Diogo Paulo Dias, José Simão, Luís Veiga:
RATEE - Resource Auction Trading at Edge Environments. 1-5 - Plamen Hristov, Dimiter Avresky, Ognian Boumbarov:
Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data. 1-5 - Dobrin Dobrev, Dimiter Avresky:
DDoS attack identification based on SDN. 1-8 - Alexander Vaskevich, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting. 1-10 - Luca D'Agati, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi:
IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities. 1-8 - Souvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh:
A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network. 1-6 - Andrea Venturi, Claudio Zanasi:
On the feasibility of adversarial machine learning in malware and network intrusion detection. 1-8 - Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti:
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems. 1-5 - Sashank Sridhar, Sowmya Sanagavarapu:
DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing. 1-4 - Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn:
PLMlight: Emulating Predictable Latency Mode in Regular SSDs. 1-8 - Shlomi Dolev, Arseni Kalma:
Verifiable Computing Using Computation Fingerprints Within FHE. 1-9 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari:
QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform. 1-8 - Lukasz Krzywiecki, Hannes Salin, Mateusz Jachniak:
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. 1-8 - Daniel Wladdimiro, Luciana Arantes, Pierre Sens, Nicolas Hidalgo:
A Multi-Metric Adaptive Stream Processing System. 1-8 - Petra Loncar:
Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress). 1-3 - Jasmine Grosso, Arshad Jhumka:
Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. 1-10 - Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti:
Accountable and privacy-aware flexible car sharing and rental services. 1-7 - Miguel C. Francisco, Samih Eisa, Miguel L. Pardal:
Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices. 1-8 - Maya Kapoor, Garrett Fuchs, Jonathan Quance:
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection. 1-9 - Marian Hristov, Maria Nenova, Georgi Iliev, Dimiter Avresky:
Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. 1-5 - Matthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev:
An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.