NCA B

54 papers

YearTitle / Authors
202523rd International Symposium on Network Computing and Application, NCA 2025, Lisbon, Portugal, November 5-7, 2025
2025A Framework for Detecting Secure Web Traffic Over VPNs: HTTPS and QUIC.
Yuan Tian, Shou-Hsuan Stephen Huang
2025Addressing Decentralized LoRaWAN-Based Wildfire Monitoring in Forested Environments.
Maurizio Giacobbe, Giuseppe Tricomi, Antonio Puliafito, Marco Scarpa
2025Adversarially Robust and Interpretable Magecart Malware Detection.
Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça
2025An Analytical Model for Distributed Video Analytics in Mobile Computer Vision-based Systems.
Michael Lesko-Krleza, Rodolfo W. L. Coutinho, Yousef R. Shayan
2025An Approach to Blockchain Voting for RWA Governance.
Nuno Braz
2025Anomaly Detection in the Internet of Medical Things: Design and Evaluation of a Cross Layer Dataset.
Rui P. Pinto, Bruno M. C. Silva, Pedro R. M. Inácio
2025Bonsai: A Recovery Approach for Ethereum ERC-20 Transactions.
Diogo Melita, David R. Matos, Miguel L. Pardal
2025CC2C: Confidential Channel-to-Channel Data Exchange in a Permissioned Blockchain.
Emanuel Nunes, Samih Eisa, Miguel L. Pardal, Mário Calha
2025Compliance Verification of 5G Service Level Agreements using Event-B.
Riham Badra, Lazhar Hamel, Layth Sliman, Ralp Bou Nader
2025Congested by the Past: The Dataset Lag in Network Traffic Analysis.
Nimesha Wickramasinghe, Sanjay K. Jha, Gene Tsudik, Arash Shaghaghi
2025Continuous behavioral authentication using mouse dynamics based on Artificial Intelligence.
Francisco Javier Nóvoa, Daniel Garabato, Alvaro Sarmiento, Mario Casado, Ignasi de José, Carlos Dafonte
2025Defending Network Intrusion Detection Systems Based on Graph Neural Networks Against Structural Adversarial Attacks.
Dimitri Galli, Andrea Venturi, Dario Stabili, Mauro Andreolini, Mirco Marchetti
2025Demo: Flute, a Plug and Play Battery-Free Wireless Sensing Platform.
Van Vu Bui, Shuaibu Musa Adam, Sam Michiels, Huynh Nguyen Bao Phuong, Danny Hughes
2025Distributed Resource Selection for Self-Organising Cloud-Edge Systems.
Quentin Renau, Amjad Ullah, Emma Hart
2025Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices.
Tom Van Eyck, Stefan More, Florian Draschbacher, Sam Michiels, Danny Hughes
2025Dynamic Membership Management and Data Sharding in Edge-Enabled Publish/Subscribe Systems.
Jaime Saramago, João A. Silva, Hervé Paulino, João M. Lourenço
2025ELTO: Energy-Latency Trade-off Optimization for Machine Learning Inference with Dynamic Batching.
Ivan Dokuchaev, Ali Kadhum Idrees, Rolf Schuster
2025Energy-Aware Adaptive Security for Smart Farming (EAASF): A Hybrid IDS-IPS Framework with SDN-Orchestrated for Agriculture 4.0.
Seyed Jamal Mirsadri, Ricardo Chaves, Luis Pedrosa
2025Ensemble Machine Learning for UAV Network Intrusion Detection: Comprehensive Analysis Using the UAV-NIDD Dataset.
Anis Charfi, Samiha Ayed, Lamia Chaari, Georgi Tsochev
2025EvoChain: A Recovery Approach for Permissioned Blockchain Applications.
Francisco Faria, Samih Eisa, David R. Matos, Miguel L. Pardal
2025Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN.
Chékra El Fehri, Nouha Baccour
2025Geometric Swarm Flocking with OWC Constraints.
Kerrian Aziza, Massinissa Tighilt, Binh-Minh Bui-Xuan
2025Hypergraphic Partitioning Framework for Static and Adaptive Quantum Circuits.
Waldemir Cambiucci, Regina Melo Silveira
2025Keycloak-SSI: Post-Authentication Attribute Verification in Federated Identity Management Using Self-Sovereign Identity.
Mauladi, Ramin Yahyapour
2025Leaf-Link: Experiences Deploying Battery-Free Wireless Forest Sensing.
Shuaibu Musa Adam, Van Vu Bui, Lowie Goossens, Sam Michiels, Ka Lok Man, Danny Hughes
2025Learning-Augmented Distributed Directories.
Swapnil Guragain, Bibek Maharjan, Sushant Bhattarai, Gokarna Sharma, Pavan Poudel
2025Magecart Malware Detection with Feature Engineering.
Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça
2025MisConfAI: A Framework for Detecting Configuration Vulnerabilities in Complex Systems.
Savi Juneja, Geeta Yadav
2025NC-LoRaSim: A No-Code LoRaWAN Simulation Framework with NS-3.
Mohamed-Ali Hadj Amor, Ismail Bennis
2025Network Connection Management Based on the Integration of Artificial Intelligence for IT Operations and Threat Intelligence Databases.
Francisco Valderlan Jorge Nobre, Ramon S. Araujo, Davi O. Alves, Erick S. Nascimento, Lyedson S. Rodrigues, Rafael L. Gomes
2025Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs.
Mattia Trabucco, Giovanni Gambigliani Zoccoli, Mirco Marchetti, Luca Ferretti
2025Nomad: Accelerating Geo-distributed Learning with Client Transfers.
Bart Cox, Lydia Y. Chen, Jérémie Decouchant
2025Player infrastructure for Attack and Defense Capture The Flag Competitions.
Andrea Artioli, Edoardo Torrini, Lorenzo Rossi, Francesco Mecatti, Mauro Andreolini
2025Poster - A Preliminary Music Data Collector for Networked Music Performance.
Lamine Amour, Andrea Bareggi
2025Poster: Characterization of Dominant and Specific Network Patterns in Industrial Control Systems.
Asya Mitseva, Marco Lewandowsky, Andriy Panchenko
2025Poster: Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN.
Chékra El Fehri, Nouha Baccour
2025Poster: Fully Dynamic Global Traffic Scheduling Prioritizing Emergency Vehicles and Platoons.
Shlomi Dolev, Ehud Gudes, Amit Hendin, Hannah Yair
2025Poster: Multi-Agent LLM System for Cisco Router Configuration.
Michal Rozsíval, Petr Matousek, Jaromír Kotala
2025Poster: Quality Threat Intelligence to Enhance Cyber Security in the Public Administration.
Diogo Agostinho, Nikhil Tulcidas, Miracle Aniakor, Hugo Miranda, Pedro M. Ferreira, Ana Respício
2025Poster: SALAD-Nets: Synthesizing Adaptive, Accelerated, and Distributed Network Functions.
Rui Miguel, Luis Pedrosa, Fernando M. V. Ramos
2025Poster: Secure Lifecycle Management of Confidential Virtual Machines in Public Clouds.
João Sereno, Daniel Castro, Nuno Santos, Luis Rodrigues
2025Poster: Targeted Evasion of Malware Detection Using Adversarial Machine Learning.
Olga Kurasova, Viktor Medvedev, Juozapas Rokas Cypas, Juozas Dautartas
2025Privacy-Preserving Clusterized Federated Learning Framework for Energy Forecasting.
Amaia Gil-Lerchundi, Lucía Muñoz-Solanas, Antonio Nappa, Izar Azpiroz
2025ProvSpider: A Robust and Universal Toolkit for Binary Provenance Analysis Using Deep Learning.
Zhiwei Fu, Hanbo Yu, Xinyu Hu, Steven H. H. Ding, Furkan Alaca, Philippe Charland
2025QoE-Driven Optimization of ZFS for Performance-Aware File Sharing Platforms.
Camila Murad Veille, Lamine Amour, Scott Fowler, Sami Souihi
2025RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable Networks.
Gurjot Singh, Alim Dhanani, Diogo Barradas
2025Road Sight Unit: Edge Image Processing for Vehicle Trajectory and Collision Prediction.
José Cutileiro, Pedro Rosa, Orlando Remédios, Miguel L. Pardal
2025Rûm: Multivalued Loss-Tolerant Byzantine Consensus for Mobile Ad-Hoc Networks.
João Pedro, Guilherme Ramos, David R. Matos
2025Spark: Smart Building Fire Prediction And Risk Analysis.
Anik Pramanik, Mukesh Kumar, Nisha Panwar, Laramie V. Potts, Jainam Shah, Shantanu Sharma
2025Systematic Risk Analysis of Multi-Stage Attacks in Zonal Automotive E/E Architecture.
Ramakrishnan Pitchaimani, Sébastien Canard, Badis Hammi, Aurel Sorin Spornic
2025Thwarting ROP Attacks and Unveiling User Level Stack Tampering through Kernel Shadow Stack.
Marco Calavaro, Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia
2025Towards Scalable O-RAN Resource Management: Graph-Augmented Proximal Policy Optimization.
Duc-Thinh Ngo, Kandaraj Piamrat, Ons Aouedi, Thomas Hassan, Philippe Raipin Parvédy
2025When Buildings Blur the Lines: Revealing the Hidden Performance Equivalences in MANET Routing Protocols.
Hugo Le Dirach, Marc Boyer, Emmanuel Lochin