| 2020 | 19th IEEE International Symposium on Network Computing and Applications, NCA 2020, Cambridge, MA, USA, November 24-27, 2020 |
| 2020 | A Dynamic Resource Controller for Resolving Quality of Service Issues in Modern Streaming Processing Engines. M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari |
| 2020 | A Reinforcement Learning based Game Theoretic Approach for Distributed Power Control in Downlink NOMA. Ashish Rauniyar, Anis Yazidi, Paal Engelstad, Olav N. Østerbø |
| 2020 | A2Cloud-cc: A Machine Learning Council to Guide Cloud Resource Selection for Scientific Applications. Lisa Her, Syeduzzaman Khan, David Samuel, Xusheng Ai, Sixia Chen, Vivek K. Pallipuram |
| 2020 | An $\frac{e-1}{2e-1}$-Approximation Algorithm for Maximizing Coverage Capability in Mobile Air Quality Monitoring Systems. Viet Dung Nguyen, Phi-Le Nguyen, Trung Hieu Nguyen, Kien Nguyen, Phan-Thuan Do |
| 2020 | BSS: Blockchain Enabled Security System for Internet of Things Applications. Lokendra Vishwakarma, Debasis Das |
| 2020 | CassandrEAS: Highly Available and Storage-Efficient Distributed Key-Value Store with Erasure Coding. Viveck R. Cadambe, Kishori M. Konwar, Muriel Médard, Haochen Pan, Lewis Tseng, Yingjian Wu |
| 2020 | Causality Tracking Trade-offs for Distributed Storage. Hugo Guerreiro, Luís Rodrigues, Nuno M. Preguiça, Nívia Cruz Quental |
| 2020 | Collaboration Strategies for Fog Computing under Heterogeneous Network-bound Scenarios. Claudia Canali, Riccardo Lancellotti, Simone Mione |
| 2020 | Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think. Jean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser |
| 2020 | Concepts of a Pyramidal Model for Assessing Internet-based Terrorist Propaganda. Andrea Tundis, Ahmed Ali Shams, Max Mühlhäuser |
| 2020 | Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS. Peter Altmann, Abdul Ghafoor Abbasi, Olov Schelén, Karl Andersson, Morteza Alizadeh |
| 2020 | CryingJackpot: Network Flows and Performance Counters against Cryptojacking. Gilberto Gomes, Luís Dias, Miguel Correia |
| 2020 | Cryptojacking Detection with CPU Usage Metrics. Fábio Gomes, Miguel Correia |
| 2020 | Cyber-Resilience Evaluation of Cyber-Physical Systems. Mariana Segovia, Jose Rubio-Hernan, Ana R. Cavalli, Joaquín García-Alfaro |
| 2020 | Deep Reinforcement Learning for Energy-Efficient Task Scheduling in SDN-based IoT Network. Bassem Sellami, Akram Hakiri, Sadok Ben Yahia, Pascal Berthou |
| 2020 | Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula |
| 2020 | Energy and Latency-aware Resource Reconfiguration in Fog Environments. Noé Godinho, Henrique Silva, Marília Curado, Luís Paquete |
| 2020 | Federated vs. Centralized Machine Learning under Privacy-elastic Users: A Comparative Analysis. Georgios Drainakis, Konstantinos V. Katsaros, Panagiotis Pantazopoulos, Vasilis Sourlas, Angelos Amditis |
| 2020 | Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. Luís Dias, Simão Valente, Miguel Correia |
| 2020 | Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi |
| 2020 | Introducing Network Coding to RPL: The Chained Secure Mode (CSM). Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy |
| 2020 | M-HELP - Multi-Hop Emergency Call Protocol in 5G. Vishaka Basnayake, Hakim Mabed, Dushantha Nalin K. Jayakody, Philippe Canalda |
| 2020 | MERLIN: Multi-Language Web Vulnerability Detection. Alexandra Figueiredo, Tatjana Lide, David R. Matos, Miguel Correia |
| 2020 | MemOpLight: Leveraging application feedback to improve container memory consolidation. Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro |
| 2020 | Minimal Relay Node Placement for Ensuring Network Connectivity in Mobile Wireless Sensor Networks. Nguyen Thi Hanh, Huynh Thi Thanh Binh, Nguyen Van Son, Myungchul Kim |
| 2020 | Modeling Multi-constrained Fog-cloud Environment for Task Scheduling Problem. Thang Nguyen, Khiem Doan, Giang T. Nguyen, Binh Minh Nguyen |
| 2020 | Multiclass Classification of Malicious Domains Using Passive DNS with XGBoost: (Work in Progress). Leandro Marcos da Silva, Marcos Rogério Silveira, Adriano Mauro Cansian, Hugo Koji Kobayashi |
| 2020 | New ICN based Clustering Mechanism for Vehicular Networks. Lamia Chaari Fourati, Mohamed Ali Ben Rejeb, Samiha Ayed |
| 2020 | On using SMT-solvers for Modeling and Verifying Dynamic Network Emulators: (Work in Progress). Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache |
| 2020 | Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications. Wladimir De la Cadena, Daniel Kaiser, Andriy Panchenko, Thomas Engel |
| 2020 | Overlay Networks for Edge Management. Pedro Ákos Costa, Pedro Fouto, João Leitão |
| 2020 | P2CSTORE: P2P and Cloud File Storage for Blockchain Applications. Marcelo Silva, Miguel Matos, Miguel Correia |
| 2020 | Palpatine: Mining Frequent Sequences for Data Prefetching in NoSQL Distributed Key-Value Stores. Sérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga |
| 2020 | Permissionless Consensus based on Proof-of-Eligibility. Geoffrey Saunois, Frédérique Robin, Emmanuelle Anceaume, Bruno Sericola |
| 2020 | Personal Data Access Control Through Distributed Authorization. Mirko Zichichi, Stefano Ferretti, Gabriele D'Angelo, Víctor Rodríguez-Doncel |
| 2020 | Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches. Jorge López, Maxime Labonne, Claude Poletti, Dallal Belabed |
| 2020 | Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov |
| 2020 | Q-learning-based, Optimized On-demand Charging Algorithm in WRSN. La Van Quan, Phi Le Nguyen, Thanh-Hung Nguyen, Kien Nguyen |
| 2020 | Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum. Filipe F. Martins, David R. Matos, Miguel L. Pardal, Miguel Correia |
| 2020 | SeScR: SDN-Enabled Spectral Clustering-Based Optimized Routing Using Deep Learning in VANET Environment. Ankur Nahar, Debasis Das |
| 2020 | Security and Privacy Aspects in 5G Networks. Nisha Panwar, Shantanu Sharma |
| 2020 | Security methods against Black Hole attacks in Vehicular Ad-Hoc Network. Krzysztof Stepien, Aneta Poniszewska-Maranda |
| 2020 | SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts. Shlomi Dolev, Ziyu Wang |
| 2020 | The Performance of Byzantine Fault Tolerant Blockchains. Gary Shapiro, Christopher Natoli, Vincent Gramoli |
| 2020 | Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere |
| 2020 | Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. Arnaldo Gouveia, Miguel Correia |
| 2020 | Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT. Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre |
| 2020 | UAV-aided 5G Network in Suburban, Urban, Dense Urban, and High-rise Urban Environments. Shah Khalid Khan, Usman Naseem, Abdul Sattar, Nazar Waheed, Adnan Mir, Atika Qazi, Muhammad Ismail |
| 2020 | Uncertainty Driven Workflow Scheduling Using Unreliable Cloud Resources. Panagiotis Oikonomou, Kostas Kolomvatsos, Nikos Tziritas, Georgios Theodoropoulos, Thanasis Loukopoulos, Georgios I. Stamoulis |
| 2020 | XGBoost Applied to Identify Malicious Domains Using Passive DNS. Marcos Rogério Silveira, Leandro Marcos da Silva, Adriano Mauro Cansian, Hugo Koji Kobayashi |