| 2018 | 17th IEEE International Symposium on Network Computing and Applications, NCA 2018, Cambridge, MA, USA, November 1-3, 2018 |
| 2018 | A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary. Siddhant Goenka, Sisi Duan, Haibin Zhang |
| 2018 | A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance. Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal |
| 2018 | A Practical Application of a Dataset Analysis in an Intrusion Detection System. Diego Fernández, Laura Vigoya, Fidel Cacheda, Francisco Javier Nóvoa, Manuel F. López-Vizcaíno, Victor Carneiro |
| 2018 | An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS). Francisco D. Vaca, Quamar Niyaz |
| 2018 | An Unsupervised Rule Generation Approach for Online Complex Event Processing. Erick Petersen, Marco Antonio To, Stephane Maag, Thierry Yamga |
| 2018 | Analysis of Burst Header Packets in Optical Burst Switching Networks. Sudarshan S. Chawathe |
| 2018 | Analytical Hierarchy Process Multi-Metric Objective Function for RPL. Walaa Alayed, Lewis M. Mackenzie, Dimitrios Pezaros |
| 2018 | CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. Kennedy A. Torkura, Muhammad I. H. Sukmana, Tim Strauss, Hendrik Graupner, Feng Cheng, Christoph Meinel |
| 2018 | Characterization and Modeling of IoT Data Traffic in the Fog of Things Paradigm. Ernando Batista, Leandro José Silva Andrade, Ramon Dias Costa, Andressa Andrade, Gustavo Bittencourt Figueiredo, Cássio V. S. Prazeres |
| 2018 | Cluster Load Estimation for Stateless Schedulers in Datacenters. Reem Alshahrani, Hassan Peyravi |
| 2018 | Critical Phenomena in Interconnection Networks with Heterogeneous Activity. Lev B. Levitin, Yelena Rykalova |
| 2018 | DBFT: Efficient Leaderless Byzantine Consensus and its Application to Blockchains. Tyler Crain, Vincent Gramoli, Mikel Larrea, Michel Raynal |
| 2018 | DTFA: A Dynamic Threshold-Based Fuzzy Approach for Power-Efficient VM Consolidation. Deafallah Alsadie, Eidah J. Alzahrani, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya |
| 2018 | Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management. Jon Patman, Peter Lovett, Andrew Banning, Annie Barnert, Dmitrii Chemodanov, Prasad Calyam |
| 2018 | Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic. Ying Li, Yi Huang, Richard Yi Da Xu, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Guillaume Jourjon |
| 2018 | Delivery Delay and Mobile Faults. Dimitris Sakavalas, Lewis Tseng |
| 2018 | Device and User Management for Smart Homes. Alejandro Mazuera-Rozo, Sandra Rueda |
| 2018 | Efficient Multi-Hop Broadcasting in Dense Nanonetworks. Thierry Arrabal, Dominique Dhoutaut, Eugen Dedu |
| 2018 | Efficient Resources Utilization by Different Microservices Deployment Models. Fernando H. L. Buzato, Alfredo Goldman, Daniel M. Batista |
| 2018 | Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs. Max Willian Soares Lima, Horacio A. B. Fernandes de Oliveira, Eulanda Miranda dos Santos, Edleno Silva de Moura, Rafael Kohler Costa, Marco Levorato |
| 2018 | Energy-Efficient Data Center Networks. Juvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin |
| 2018 | Estimating the Environmental Impact of Data Centers. João Ferreira, Gustavo Callou, Albert Josua, Paulo R. M. Maciel |
| 2018 | Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples. Giovanni Apruzzese, Michele Colajanni |
| 2018 | Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction. Gudi Siva Leela Krishna Chand, Suman Ojha, Benjamin Johnston, Jesse Clark, Mary-Anne Williams |
| 2018 | Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha |
| 2018 | How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems. Fernando Vano-Garcia, Hector Marco-Gisbert |
| 2018 | LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes. Garegin Grigoryan, Yaoqing Liu |
| 2018 | Leveraging Intel SGX Technology to Protect Security-Sensitive Applications. Joseph Sobchuk, Sean R. O'Melia, Daniil M. Utin, Roger Khazan |
| 2018 | LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions. Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane |
| 2018 | Low-Reliable Low-Latency Networks Optimized for HPC Parallel Applications. Truong Thao Nguyen, Hiroki Matsutani, Michihiro Koibuchi |
| 2018 | Microservices: A Mapping Study for Internet of Things Solutions. Cleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio V. S. Prazeres |
| 2018 | Model of a Virtual Firewall Based on Stochastic Petri Nets. Luis Zabala, Ruben Solozabal, Armando Ferro, Bego Blanco |
| 2018 | Modeling System-Level Power Consumption Profiles Using RAPL. James Phung, Young Choon Lee, Albert Y. Zomaya |
| 2018 | Monitoring IoT Networks for Botnet Activity. Sudarshan S. Chawathe |
| 2018 | Nonintrusive Monitoring of Microservice-Based Systems. Fabio Pina, Jaime Correia, Ricardo Filipe, Filipe Araújo, Jorge Cardroom |
| 2018 | On Black-Box Monitoring Techniques for Multi-Component Services. Ricardo Filipe, Jaime Correia, Filipe Araújo, Jorge Cardoso |
| 2018 | On the Consistent Migration of Splittable Flows: Latency-Awareness and Complexities. Klaus-Tycho Foerster |
| 2018 | On the Fly Detection of the Top-K Items in the Distributed Sliding Window Model. Emmanuelle Anceaume, Yann Busnel, Vasile Cazacu |
| 2018 | Online Workload Scheduling for Green Cloud Data Center with Delay Guarantee in Smart Grid. Huaiwen He, Hong Shen |
| 2018 | Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network). Harish Sukhwani, Nan Wang, Kishor S. Trivedi, Andy J. Rindos |
| 2018 | Population Protocols with Convergence Detection. Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume |
| 2018 | Practical and Fast Causal Consistent Partial Geo-Replication. Pedro Fouto, João Leitão, Nuno M. Preguiça |
| 2018 | ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains. Sidra Malik, Salil S. Kanhere, Raja Jurdak |
| 2018 | RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems. Ashish Rauniyar, Paal Engelstad, Olav N. Østerbø |
| 2018 | RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre |
| 2018 | Recurrent Neural Network-Based Prediction of TCP Transmission States from Passive Measurements. Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure |
| 2018 | Response Time Characterization of Microservice-Based Systems. Jaime Correia, Fabio Ribeiro, Ricardo Filipe, Filipe Araújo, Jorge Cardoso |
| 2018 | SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao |
| 2018 | Scenario Design and Validation for Next Generation Cyber Ranges. Enrico Russo, Gabriele Costa, Alessandro Armando |
| 2018 | Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. Duarte M. G. Raposo, André Rodrigues, Soraya Sinche, Jorge Sá Silva, Fernando Boavida |
| 2018 | Sensing Quality and Estimation of Public Transport Occupancy During Live Operation. Lars Møller Mikkelsen, Hans-Peter Schwefel, Tatiana K. Madsen |
| 2018 | Sensing Trees in Smart Cities with Open-Design Hardware. Antonio Deusany de Carvalho Junior, Victor Seiji Hariki, Alfredo Goldman |
| 2018 | Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media. Andrea Tundis, Gaurav Bhatia, Archit Jain, Max Mühlhäuser |
| 2018 | Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand. Emmanuelle Anceaume, Antoine Guellier, Romaric Ludinard, Bruno Sericola |
| 2018 | Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems. Diogo Calado, Miguel L. Pardal |
| 2018 | The Effect on Network Flows-Based Features and Training Set Size on Malware Detection. Jarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova |
| 2018 | TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis. Oluwatobi Fajana, Gareth Owenson, Mihaela Cocea |
| 2018 | Toward Incremental FIB Aggregation with Quick Selections (FAQS). Yaoqing Liu, Garegin Grigoryan |
| 2018 | Towards a Low Latency Network-Slice Resistant to Unresponsive Traffic. Paulo Pinto, Amineh Mazandarani, Pedro Amaral, Luís Bernardo |
| 2018 | Using SGX-Based Virtual Clones for IoT Security. Rashid Tahir, Ali Raza, Fareed Zaffar, Faizan Ul Ghani, Mubeen Zulfiqar |
| 2018 | Virtualized Network Services Extension Algorithms. Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache, Farouk Kamoun |
| 2018 | Witness-Based Location Proofs for Mobile Devices. João Ferreira, Miguel L. Pardal |