


default search action
39th AINA 2025: Barcelona, Spain
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 39th International Conference on Advanced Information Networking and Applications, AINA 2025, Barcelona, Spain, 9-11 April 2025, Volume 5. Lecture Notes on Data Engineering and Communications Technologies 249, Springer 2025, ISBN 978-3-031-87774-2 - Hiroaki Kikuchi, Ryuichi Moriya, Takumi Kitahara, Hikari Fukuda:
Honey-Proxy: Revealing Malicious Activities via Residential Proxies. 1-12 - Nicola Capuano, Vincenzo Carletti, Pasquale Foggia, Giuseppe Parrella, Mario Vento:
Leveraging Open-Source LLMs for Zero-Shot Vulnerability Detection: A Comparative Analysis. 13-25 - Aman Ullah Bhuiyan, Ashikun Nabi, Raqeebir Rab, Abderrahmane Leshob, Tasnim Mahmud, Adil Ahmed Khan:
Encrypted Network Traffic Classification for QUIC Protocol: A Transfer Learning Approach. 26-38 - Ali Bakhshi, Vamsi Paruchuri:
Enhancing Ethereum Smart Contract Security: A Comprehensive Analysis Using CVSS and Mitigation Strategies. 39-52 - Soki Nakamura, Daiki Miyahara, Li Yang, Kazuo Sakiyama:
Key-Recovery Attack Against Ascon Using 1-Bit Random Fault Model. 53-64 - Shigenari Nakamura, Lidia Ogiela, Makoto Takizawa:
Zero Trust Model with the Information Flow Control. 65-72 - Johannes Klemm, Anne V. D. M. Kayem:
Does Cyber-Security Training Translate to Effective Prevention of Online Harms? 73-83 - Eishin Nakano, Takuya Suzuki, Yuki Yada, Hayato Yamana:
Privacy-Preserving News Recommendation over Homomorphic Encryption. 84-97 - Masood Mansoori, Junaid Haseeb, Ian Welch:
A Cost-Effective AIR System for Browser-Based Geolocation and Cloaking Attacks. 98-111 - Asma Salem, Amjad Hudaib, Nadia Salem, Khawla M. Al-tarawneh, Hamza Salem, Manuel Mazzara:
A Weighted Framework for Security Patterns Selection Used for Hosting on the Cloud. 112-125 - Khawla M. Al-tarawneh, Nadia Salem, Saleh Al-Sharaeh, Asma Salem, Hamza Salem, Siham Maher Hattab, Manuel Mazzara:
DDOS Attack Detection in SD-IOT Networks Using CTELC. 126-138 - Yevhen Zolotavkin, Prajnamaya Dass, Stefan Köpsell:
A New Privacy Modeling and Enhancement Methodology for JCAS-Enabled Railway Applications. 139-153 - Hamza Salem, Hadi Salloum, Manuel Mazzara, Nursultan Askarbekuly, Leonard Johard, Giancarlo Succi:
Hidden Risks: The Centralization of NFT Metadata and What It Means for the Market. 154-162 - Rezak Aziz, Youakim Badr, Samia Bouzefrane:
Enhancing Trust in Central Differential Privacy Using zk-SNARKs and Cryptographic Hashes. 163-176 - Lalitha Chavali, Paresh Saxena:
Multi-critic Deep Reinforcement Learning for Enhanced Alert Prioritization in Intrusion Detection Systems. 177-188 - Oumaima Zanouni, Aida Ben Chehida Douss, Mohamed Mosbah:
Cooperative Trust Based Detection Mechanism for Fake Objects in Collective Perception Messages. 189-200 - Larissa Gremelmaier Rosa, Gustavo Zambonin, Jean Everson Martina:
Enhanced SIM Swap Security Practices via Ceremony Modeling. 201-211 - V. Rasagna, G. Geethakumari:
K-Means and Dynamic Thresholding for Countering Ballot Stuffing Attacks in Fog Computing. 212-223 - Amal Sayari, Slim Rekhis, Yacine Djemaiel, Ali Mabrouk:
An Adaptive Reinforcement Learning-Based Approach for Effective Cyber Denial and Deception Strategies Finding. 224-234 - Shanyi Xie, Congcong Zhan, Xinyue Jin, Xingwang Li, Yan Li, Caiyan Nong:
Transformer-Based Semantic Reverse Engineering Method for Firmware Binary Protocols. 235-248 - Rama Krishna Koppanati
, Sateesh K. Peddoju
, Arya Deshmukh, Lakshya Joshi:
Fusion of Significant Features and Superposition Feature Engineering for Malware Detection. 249-261 - Rama Krishna Koppanati
, Sateesh K. Peddoju
, Mansi Yadav:
BERT-Powered Malware Detection with Potential Regional and Contextual Features. 262-273 - Lauro de Souza Silva, Edison Pignaton de Freitas, Juliano Araujo Wickboldt:
A P4 Practical Deployment of Priority Queues with Stratum and ONOS. 274-285 - Rajni Goyal, Amar Nath, Utkarsh Niranjan, Rajdeep Niyogi:
Weed Detection in Potato Fields: A Comparative Study of YOLOv8 and YOLOv9 with UAV Imagery. 286-296 - Rajni Goyal, Shobha Kumari, Amar Nath, Gurjinder Kaur:
IoRT and AI-Driven Solution for Optimal Herbicides Spray on Weeds in a Dynamic Agriculture Environment. 297-308 - Amar Nath, Ayushi, Gaurav Sharma, Rajdeep Niyogi:
Autonomous and Rapid Crop Residue Management Using AI and IoRT: From Data Acquisition to Classification. 309-319 - Janella Rutte B. Caluag, Lawrence V. Dela Cruz, Charlene Faith L. Delfin, Tricia Mae L. Gervas, Krischelle A. Policarpio, Dennis R. dela Cruz:
Internet of Things-Based Water Quality Monitoring System for Brackish Water Fishponds. 320-331 - Christine Lahoud, Mariam Gawich, Hajer Baazaoui, Ihab Jomaa:
AIOGO: A Modular Ontology for Managing Greenhouses. 332-343 - Ameni Chamekh, Mariem Mahfoudh
, Khouloud Boukadi
, Walid Hamada
:
A BERT-Based Attention Model with BiLSTM for Aspect-Based Sentiment Analysis in Agricultural Datasets. 344-355 - Sawsen Khlifa, Chiheb Ameur Abid, Asma Ben Letaifa, Belhassen Zouari:
Local Model Checking on an IoT Based System: Use Case of Cellular M2M in Agriculture. 356-367 - Hao-Hsiang Ku, Ching-Ho Chi:
Enhancing Digital Capabilities of Cold Chain in Small Food Factories Using AIoT and IOTA Techniques. 368-379 - Lluís M. Plà-Aragonés, Pol Llagostera, Pau Font, Ijaz Ul Haq, Daniel Babot:
Evaluation of Feeding Robots' Efficiency for Pig Fattening. 380-387 - Jihene Khoualdi, Ilheme Abedlmoula, Hella Kaffel Ben Ayed, Donia Bensedrine:
Secure and Transparent Agri-Food Supply Chain Traceability with SSI and Blockchain-Enabled IoT. 388-398 - Kaouther Ezzameli, Hela Mahersia:
Emotional Features in Speech: A Deep Scattering-Based Analysis. 399-410 - Oriol Caravaca-Müller, Joan Llobera, Carles Ventura, Ismael Benito-Altamirano:
VClipper: Moment Retrieval in Video Streams Using Zero-Shot and Context-Aware Foundational Models. 411-422 - Montse Guitert-Catasús, Teresa Romeu Fontanillas, Juan Pedro Cerro Martínez:
The Potential of Learning Analytics in Higher Education: A Student's Perspective. 423-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.