


default search action
17th NCA 2018: Cambridge, MA, USA
- 17th IEEE International Symposium on Network Computing and Applications, NCA 2018, Cambridge, MA, USA, November 1-3, 2018. IEEE 2018, ISBN 978-1-5386-7659-2

- Emmanuelle Anceaume, Antoine Guellier, Romaric Ludinard, Bruno Sericola:

Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand. 1-8 - Walaa Alayed, Lewis M. Mackenzie, Dimitrios Pezaros:

Analytical Hierarchy Process Multi-Metric Objective Function for RPL. 1-5 - Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane:

LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions. 1-9 - Tyler Crain, Vincent Gramoli, Mikel Larrea

, Michel Raynal:
DBFT: Efficient Leaderless Byzantine Consensus and its Application to Blockchains. 1-8 - Thierry Arrabal, Dominique Dhoutaut, Eugen Dedu:

Efficient Multi-Hop Broadcasting in Dense Nanonetworks. 1-9 - Duarte M. G. Raposo

, André Rodrigues
, Soraya Sinche
, Jorge Sá Silva
, Fernando Boavida:
Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9 - Jaime Correia

, Fabio Ribeiro, Ricardo Filipe
, Filipe Araújo
, Jorge Cardoso
:
Response Time Characterization of Microservice-Based Systems. 1-5 - Truong Thao Nguyen

, Hiroki Matsutani, Michihiro Koibuchi:
Low-Reliable Low-Latency Networks Optimized for HPC Parallel Applications. 1-10 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure:

Recurrent Neural Network-Based Prediction of TCP Transmission States from Passive Measurements. 1-10 - Rashid Tahir

, Ali Raza
, Fareed Zaffar, Faizan Ul Ghani, Mubeen Zulfiqar:
Using SGX-Based Virtual Clones for IoT Security. 1-4 - Pedro Fouto

, João Leitão
, Nuno M. Preguiça
:
Practical and Fast Causal Consistent Partial Geo-Replication. 1-10 - Ashish Rauniyar

, Paal Engelstad, Olav N. Østerbø:
RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems. 1-8 - Jon Patman, Peter Lovett, Andrew Banning, Annie Barnert, Dmitrii Chemodanov, Prasad Calyam:

Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management. 1-8 - Harish Sukhwani, Nan Wang, Kishor S. Trivedi, Andy J. Rindos:

Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network). 1-8 - Sudarshan S. Chawathe:

Analysis of Burst Header Packets in Optical Burst Switching Networks. 1-5 - Arash Shaghaghi, Salil S. Kanhere

, Mohamed Ali Kâafar
, Sanjay Jha
:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. 1-5 - Max Willian Soares Lima, Horacio A. B. Fernandes de Oliveira, Eulanda Miranda dos Santos, Edleno Silva de Moura, Rafael Kohler Costa, Marco Levorato:

Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs. 1-5 - Gudi Siva Leela Krishna Chand, Suman Ojha, Benjamin Johnston, Jesse Clark, Mary-Anne Williams

:
Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction. 1-5 - Diogo Calado, Miguel L. Pardal:

Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems. 1-8 - Emmanuelle Anceaume, Yann Busnel

, Vasile Cazacu:
On the Fly Detection of the Top-K Items in the Distributed Sliding Window Model. 1-8 - Yaoqing Liu, Garegin Grigoryan

:
Toward Incremental FIB Aggregation with Quick Selections (FAQS). 1-8 - Garegin Grigoryan

, Yaoqing Liu:
LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes. 1-4 - Deafallah Alsadie

, Eidah J. Alzahrani
, Nasrin Sohrabi
, Zahir Tari
, Albert Y. Zomaya
:
DTFA: A Dynamic Threshold-Based Fuzzy Approach for Power-Efficient VM Consolidation. 1-9 - Siddhant Goenka, Sisi Duan, Haibin Zhang:

A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary. 1-10 - Joseph Sobchuk, Sean R. O'Melia, Daniil M. Utin, Roger Khazan:

Leveraging Intel SGX Technology to Protect Security-Sensitive Applications. 1-5 - Huaiwen He, Hong Shen:

Online Workload Scheduling for Green Cloud Data Center with Delay Guarantee in Smart Grid. 1-8 - Erick Petersen

, Marco Antonio To
, Stephane Maag, Thierry Yamga:
An Unsupervised Rule Generation Approach for Online Complex Event Processing. 1-8 - João Ferreira, Miguel L. Pardal:

Witness-Based Location Proofs for Mobile Devices. 1-4 - Luis Zabala, Ruben Solozabal, Armando Ferro, Bego Blanco

:
Model of a Virtual Firewall Based on Stochastic Petri Nets. 1-4 - Antonio Deusany de Carvalho Junior, Victor Seiji Hariki, Alfredo Goldman

:
Sensing Trees in Smart Cities with Open-Design Hardware. 1-4 - James Phung, Young Choon Lee

, Albert Y. Zomaya
:
Modeling System-Level Power Consumption Profiles Using RAPL. 1-4 - Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. 1-8 - Fabio Pina, Jaime Correia

, Ricardo Filipe
, Filipe Araújo
, Jorge Cardroom:
Nonintrusive Monitoring of Microservice-Based Systems. 1-8 - Oluwatobi Fajana

, Gareth Owenson, Mihaela Cocea:
TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis. 1-8 - Francisco D. Vaca, Quamar Niyaz:

An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS). 1-5 - Diego Fernández

, Laura Vigoya, Fidel Cacheda, Francisco Javier Nóvoa
, Manuel F. López-Vizcaíno
, Victor Carneiro
:
A Practical Application of a Dataset Analysis in an Intrusion Detection System. 1-5 - Ying Li, Yi Huang

, Richard Yi Da Xu
, Suranga Seneviratne
, Kanchana Thilakarathna
, Adriel Cheng, Darren Webb, Guillaume Jourjon:
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic. 1-8 - Lars Møller Mikkelsen, Hans-Peter Schwefel, Tatiana K. Madsen:

Sensing Quality and Estimation of Public Transport Occupancy During Live Operation. 1-4 - Andrea Tundis

, Gaurav Bhatia, Archit Jain, Max Mühlhäuser:
Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media. 1-10 - Sidra Malik, Salil S. Kanhere

, Raja Jurdak
:
ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains. 1-10 - Juvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin:

Energy-Efficient Data Center Networks. 1-8 - Enrico Russo

, Gabriele Costa, Alessandro Armando
:
Scenario Design and Validation for Next Generation Cyber Ranges. 1-4 - Jarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova

:
The Effect on Network Flows-Based Features and Training Set Size on Malware Detection. 1-9 - João Ferreira

, Gustavo Callou, Albert Josua, Paulo R. M. Maciel:
Estimating the Environmental Impact of Data Centers. 1-4 - Giovanni Apruzzese

, Michele Colajanni
:
Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples. 1-8 - Alejandro Mazuera-Rozo, Sandra Rueda:

Device and User Management for Smart Homes. 1-4 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Tim Strauss, Hendrik Graupner
, Feng Cheng, Christoph Meinel:
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. 1-10 - Sudarshan S. Chawathe:

Monitoring IoT Networks for Botnet Activity. 1-8 - Cleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio V. S. Prazeres:

Microservices: A Mapping Study for Internet of Things Solutions. 1-4 - Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed

, Nazife Baykal:
A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance. 1-5 - Paulo Pinto

, Amineh Mazandarani
, Pedro Amaral
, Luís Bernardo
:
Towards a Low Latency Network-Slice Resistant to Unresponsive Traffic. 1-5 - Ricardo Filipe

, Jaime Correia
, Filipe Araújo
, Jorge Cardoso
:
On Black-Box Monitoring Techniques for Multi-Component Services. 1-5 - Reem Alshahrani, Hassan Peyravi:

Cluster Load Estimation for Stateless Schedulers in Datacenters. 1-4 - Fernando Vano-Garcia, Hector Marco-Gisbert:

How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems. 1-4 - Klaus-Tycho Foerster

:
On the Consistent Migration of Splittable Flows: Latency-Awareness and Complexities. 1-4 - Ernando Batista

, Leandro José Silva Andrade, Ramon Dias Costa, Andressa Andrade, Gustavo Bittencourt Figueiredo, Cássio V. S. Prazeres:
Characterization and Modeling of IoT Data Traffic in the Fog of Things Paradigm. 1-8 - Omar Houidi

, Oussama Soualah, Wajdi Louati, Djamal Zeghlache
, Farouk Kamoun
:
Virtualized Network Services Extension Algorithms. 1-5 - Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. 1-5 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:

Population Protocols with Convergence Detection. 1-8 - Dimitris Sakavalas, Lewis Tseng:

Delivery Delay and Mobile Faults. 1-8 - Fernando H. L. Buzato

, Alfredo Goldman
, Daniel M. Batista:
Efficient Resources Utilization by Different Microservices Deployment Models. 1-4 - Lev B. Levitin, Yelena Rykalova:

Critical Phenomena in Interconnection Networks with Heterogeneous Activity. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














