NCA B

45 papers

YearTitle / Authors
202120th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021
Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky
2021A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network.
Souvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh
2021A Multi-Metric Adaptive Stream Processing System.
Daniel Wladdimiro, Luciana Arantes, Pierre Sens, Nicolas Hidalgo
2021A layered framework for root cause diagnosis of microservices.
André Bento, Jaime Correia, João Durães, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa
2021Accountable and privacy-aware flexible car sharing and rental services.
Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti
2021An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity.
Shankar K. Ghosh, Sasthi C. Ghosh
2021An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks.
Matthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev
2021An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication.
Souvik Deb, Sasthi C. Ghosh
2021Analysis of Rumor Spreading with 2-pull or 3-pull Operations.
Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume
2021Analysis, prevention and detection of ransomware attacks on Industrial Control Systems.
Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti
2021Automatic Real Time Platoon Formation Using the Road Graph.
Shlomi Dolev, Ehud Gudes, Hannah Yair
2021Cathode: A Consistency-Aware Data Placement Algorithm for the Edge.
Leonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues
2021Centrality-Based Eventual Leader Election in Dynamic Networks.
Arnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens
2021Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
Lukasz Krzywiecki, Hannes Salin, Mateusz Jachniak
2021Challenges in Identifying Network Attacks Using Netflow Data.
Edward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt
2021Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule.
Mahsa Sadeghi Ghahroudi, Alireza Shahrabi, Tuleen Boutaleb
2021CyberVTI: Cyber Visualization Tool for Intrusion Detection.
Pedro Marques, Luís Dias, Miguel Correia
2021DDoS attack identification based on SDN.
Dobrin Dobrev, Dimiter Avresky
2021DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing.
Sashank Sridhar, Sowmya Sanagavarapu
2021Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms.
M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari
2021Efficient Consensus-Free Weight Reassignment for Atomic Storage.
Hasan Heydari, Guthemberg Silvestre, Luciana Arantes
2021Enhanced Precision Time Synchronization for Modular Robots.
Jad Bassil, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois
2021Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks.
Jasmine Grosso, Arshad Jhumka
2021Global Monitor using SpatioTemporally Correlated Local Monitors.
Geeta Yadav, Kolin Paul
2021HSD-DMM: Hierarchical Software Defined Distributed Mobility Management.
Esmaeil Amiri, Ning Wang, Serdar Vural, Rahim Tafazolli
2021Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data.
Plamen Hristov, Dimiter Avresky, Ognian Boumbarov
2021Impact of theoretical performance models on the design of fog computing infrastructures.
Claudia Canali, Riccardo Lancellotti, Stefano Rossi
2021Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT.
Marian Hristov, Maria Nenova, Georgi Iliev, Dimiter Avresky
2021IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities.
Luca D'Agati, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi
2021Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum.
Gabriele Proietti Mattia, Roberto Beraldi
2021Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress).
Petra Loncar
2021Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case.
Lukasz Krzywiecki, Adam Polubek, Hannes Salin
2021On the feasibility of adversarial machine learning in malware and network intrusion detection.
Andrea Venturi, Claudio Zanasi
2021PLM
Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn
2021QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform.
M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari
2021RATEE - Resource Auction Trading at Edge Environments.
Diogo Paulo Dias, José Simão, Luís Veiga
2021RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection.
Maya Kapoor, Garrett Fuchs, Jonathan Quance
2021SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting.
Alexander Vaskevich, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
2021Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices.
Miguel C. Francisco, Samih Eisa, Miguel L. Pardal
2021Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform.
Adam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer
2021Stochastic Analysis of Algorithms for Collecting Longitudinal Data.
Frédérique Robin, Bruno Sericola, Emmanuelle Anceaume
2021The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks.
Tapadhir Das, Raj Mani Shukla, Shamik Sengupta
2021Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living.
Luubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar, Tan-Hsu Tan
2021Verifiable Computing Using Computation Fingerprints Within FHE.
Shlomi Dolev, Arseni Kalma
2021Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking.
Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien