


default search action
20th NCA 2021: Boston, MA, USA
- Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky:

20th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021. IEEE 2021, ISBN 978-1-6654-9550-9 - Frédérique Robin, Bruno Sericola, Emmanuelle Anceaume:

Stochastic Analysis of Algorithms for Collecting Longitudinal Data. 1-8 - Adam Cassell, Tapadhir Das

, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer:
Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform. 1-8 - Jad Bassil

, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois:
Enhanced Precision Time Synchronization for Modular Robots. 1-5 - Leonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues:

Cathode: A Consistency-Aware Data Placement Algorithm for the Edge. 1-10 - Tapadhir Das

, Raj Mani Shukla, Shamik Sengupta:
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks. 1-5 - Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien

:
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. 1-10 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya

, Zahir Tari:
Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms. 1-8 - Lukasz Krzywiecki

, Adam Polubek, Hannes Salin
:
Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. 1-4 - Shankar K. Ghosh

, Sasthi C. Ghosh:
An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity. 1-5 - Shlomi Dolev, Ehud Gudes, Hannah Yair:

Automatic Real Time Platoon Formation Using the Road Graph. 1-4 - Edward Chuah

, Neeraj Suri
, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. 1-10 - Geeta Yadav

, Kolin Paul:
Global Monitor using SpatioTemporally Correlated Local Monitors. 1-10 - Mahsa Sadeghi Ghahroudi, Alireza Shahrabi

, Tuleen Boutaleb:
Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule. 1-7 - Arnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens:

Centrality-Based Eventual Leader Election in Dynamic Networks. 1-8 - Hasan Heydari

, Guthemberg Silvestre, Luciana Arantes:
Efficient Consensus-Free Weight Reassignment for Atomic Storage. 1-9 - Gabriele Proietti Mattia

, Roberto Beraldi:
Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum. 1-9 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:

Analysis of Rumor Spreading with 2-pull or 3-pull Operations. 1-8 - Luubaatar Badarch

, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar
, Tan-Hsu Tan:
Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living. 1-5 - Claudia Canali, Riccardo Lancellotti, Stefano Rossi:

Impact of theoretical performance models on the design of fog computing infrastructures. 1-8 - André Bento

, Jaime Correia, João Durães
, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo
, Raul Barbosa:
A layered framework for root cause diagnosis of microservices. 1-8 - Souvik Deb

, Sasthi C. Ghosh:
An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication. 1-8 - Pedro Marques, Luís Dias, Miguel Correia:

CyberVTI: Cyber Visualization Tool for Intrusion Detection. 1-9 - Esmaeil Amiri

, Ning Wang
, Serdar Vural, Rahim Tafazolli
:
HSD-DMM: Hierarchical Software Defined Distributed Mobility Management. 1-7 - Diogo Paulo Dias, José Simão, Luís Veiga

:
RATEE - Resource Auction Trading at Edge Environments. 1-5 - Plamen Hristov, Dimiter Avresky, Ognian Boumbarov:

Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data. 1-5 - Dobrin Dobrev, Dimiter Avresky:

DDoS attack identification based on SDN. 1-8 - Alexander Vaskevich, Thilini Dahanayaka

, Guillaume Jourjon, Suranga Seneviratne:
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting. 1-10 - Luca D'Agati

, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi:
IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities. 1-8 - Souvik Deb

, Shankar Kumar Ghosh
, Sasthi C. Ghosh:
A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network. 1-6 - Andrea Venturi

, Claudio Zanasi:
On the feasibility of adversarial machine learning in malware and network intrusion detection. 1-8 - Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti

:
Analysis, prevention and detection of ransomware attacks on Industrial Control Systems. 1-5 - Sashank Sridhar, Sowmya Sanagavarapu:

DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing. 1-4 - Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn:

PLMlight: Emulating Predictable Latency Mode in Regular SSDs. 1-8 - Shlomi Dolev, Arseni Kalma:

Verifiable Computing Using Computation Fingerprints Within FHE. 1-9 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya

, Zahir Tari:
QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform. 1-8 - Lukasz Krzywiecki

, Hannes Salin
, Mateusz Jachniak:
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. 1-8 - Daniel Wladdimiro

, Luciana Arantes, Pierre Sens, Nicolas Hidalgo:
A Multi-Metric Adaptive Stream Processing System. 1-8 - Petra Loncar

:
Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress). 1-3 - Jasmine Grosso, Arshad Jhumka:

Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. 1-10 - Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti

:
Accountable and privacy-aware flexible car sharing and rental services. 1-7 - Miguel C. Francisco, Samih Eisa

, Miguel L. Pardal
:
Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices. 1-8 - Maya Kapoor, Garrett Fuchs

, Jonathan Quance:
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection. 1-9 - Marian Hristov, Maria Nenova

, Georgi Iliev, Dimiter Avresky:
Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. 1-5 - Matthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev:

An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














