| 2021 | 20th IEEE International Symposium on Network Computing and Applications, NCA 2021, Boston, MA, USA, November 23-26, 2021 Mauro Andreolini, Mirco Marchetti, Dimiter R. Avresky |
| 2021 | A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network. Souvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh |
| 2021 | A Multi-Metric Adaptive Stream Processing System. Daniel Wladdimiro, Luciana Arantes, Pierre Sens, Nicolas Hidalgo |
| 2021 | A layered framework for root cause diagnosis of microservices. André Bento, Jaime Correia, João Durães, João Soares, Luís Ribeiro, António Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa |
| 2021 | Accountable and privacy-aware flexible car sharing and rental services. Francesco Pollicino, Luca Ferretti, Dario Stabili, Mirco Marchetti |
| 2021 | An Energy Efficient Component Carrier Selection Mechanism for LTE-NR Dual Connectivity. Shankar K. Ghosh, Sasthi C. Ghosh |
| 2021 | An Evaluation of the Communication Performance of MEC-Dependent Services in 5G Networks. Matthias Frei, Thomas Deinlein, Reinhard German, Anatoli Djanatliev |
| 2021 | An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication. Souvik Deb, Sasthi C. Ghosh |
| 2021 | Analysis of Rumor Spreading with 2-pull or 3-pull Operations. Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume |
| 2021 | Analysis, prevention and detection of ransomware attacks on Industrial Control Systems. Giorgio Valenziano Santangelo, Vincenzo Giuseppe Colacino, Mirco Marchetti |
| 2021 | Automatic Real Time Platoon Formation Using the Road Graph. Shlomi Dolev, Ehud Gudes, Hannah Yair |
| 2021 | Cathode: A Consistency-Aware Data Placement Algorithm for the Edge. Leonardo Epifâneo, Cláudio Correia, Luís E. T. Rodrigues |
| 2021 | Centrality-Based Eventual Leader Election in Dynamic Networks. Arnaud Favier, Luciana Arantes, Jonathan Lejeune, Pierre Sens |
| 2021 | Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. Lukasz Krzywiecki, Hannes Salin, Mateusz Jachniak |
| 2021 | Challenges in Identifying Network Attacks Using Netflow Data. Edward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt |
| 2021 | Collective Movement Inspired Distributed Blanket Coverage Algorithm Using Nearest Neighbour Rule. Mahsa Sadeghi Ghahroudi, Alireza Shahrabi, Tuleen Boutaleb |
| 2021 | CyberVTI: Cyber Visualization Tool for Intrusion Detection. Pedro Marques, Luís Dias, Miguel Correia |
| 2021 | DDoS attack identification based on SDN. Dobrin Dobrev, Dimiter Avresky |
| 2021 | DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing. Sashank Sridhar, Sowmya Sanagavarapu |
| 2021 | Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms. M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari |
| 2021 | Efficient Consensus-Free Weight Reassignment for Atomic Storage. Hasan Heydari, Guthemberg Silvestre, Luciana Arantes |
| 2021 | Enhanced Precision Time Synchronization for Modular Robots. Jad Bassil, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois |
| 2021 | Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. Jasmine Grosso, Arshad Jhumka |
| 2021 | Global Monitor using SpatioTemporally Correlated Local Monitors. Geeta Yadav, Kolin Paul |
| 2021 | HSD-DMM: Hierarchical Software Defined Distributed Mobility Management. Esmaeil Amiri, Ning Wang, Serdar Vural, Rahim Tafazolli |
| 2021 | Human-Object Interaction Detection: 1D Convolutional Neural Network Approach Using Skeleton Data. Plamen Hristov, Dimiter Avresky, Ognian Boumbarov |
| 2021 | Impact of theoretical performance models on the design of fog computing infrastructures. Claudia Canali, Riccardo Lancellotti, Stefano Rossi |
| 2021 | Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. Marian Hristov, Maria Nenova, Georgi Iliev, Dimiter Avresky |
| 2021 | IoT/Cloud-Powered Crowdsourced Mobility Services For Green Smart Cities. Luca D'Agati, Zakaria Benomar, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Giuseppe Tricomi |
| 2021 | Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum. Gabriele Proietti Mattia, Roberto Beraldi |
| 2021 | Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress). Petra Loncar |
| 2021 | Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. Lukasz Krzywiecki, Adam Polubek, Hannes Salin |
| 2021 | On the feasibility of adversarial machine learning in malware and network intrusion detection. Andrea Venturi, Claudio Zanasi |
| 2021 | PLM Tanaya Roy, Jit Gupta, Krishna Kant, Amitangshu Pal, Dave Minturn |
| 2021 | QSpark: Distributed Execution of Batch & Streaming Analytics in Spark Platform. M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari |
| 2021 | RATEE - Resource Auction Trading at Edge Environments. Diogo Paulo Dias, José Simão, Luís Veiga |
| 2021 | RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection. Maya Kapoor, Garrett Fuchs, Jonathan Quance |
| 2021 | SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting. Alexander Vaskevich, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne |
| 2021 | Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices. Miguel C. Francisco, Samih Eisa, Miguel L. Pardal |
| 2021 | Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform. Adam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer |
| 2021 | Stochastic Analysis of Algorithms for Collecting Longitudinal Data. Frédérique Robin, Bruno Sericola, Emmanuelle Anceaume |
| 2021 | The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks. Tapadhir Das, Raj Mani Shukla, Shamik Sengupta |
| 2021 | Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living. Luubaatar Badarch, Munkhjargal Gochoo, Ganzorig Batnasan, Fady Alnajjar, Tan-Hsu Tan |
| 2021 | Verifiable Computing Using Computation Fingerprints Within FHE. Shlomi Dolev, Arseni Kalma |
| 2021 | Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. Sameh Khalfaoui, Jean Leneutre, Arthur Villard, Ivan Gazeau, Jingxuan Ma, Jean-Luc Danger, Pascal Urien |