


default search action
18th NCA 2019: Cambridge, MA, USA
- Aris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky:

18th IEEE International Symposium on Network Computing and Applications, NCA 2019, Cambridge, MA, USA, September 26-28, 2019. IEEE 2019, ISBN 978-1-7281-2522-0 - Subhankar Ghosal

, Sasthi C. Ghosh:
A Randomized Algorithm for Joint Power and Channel Allocation in 5G D2D Communication. 1-5 - Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar

:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. 1-5 - Svetoslav Zhelev, Dimiter R. Avresky:

Using LSTM Neural Network for Time Series Predictions in Financial Markets. 1-5 - Cong Pu

, Logan Carpenter:
Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things. 1-4 - Cong Pu

, Logan Carpenter:
To Route or To Ferry: A Hybrid Packet Forwarding Algorithm in Flying Ad Hoc Networks. 1-8 - Ricardo Filipe

, Jaime Correia
, Filipe Araújo
, Jorge Cardoso
:
Towards Occupation Inference in Non-instrumented Services. 1-7 - Or Raz, Chen Avin, Stefan Schmid

:
Nap: Network-Aware Data Partitions for Efficient Distributed Processing. 1-9 - Nachiket Tapas, Francesco Longo

, Giovanni Merlino
, Antonio Puliafito:
Transparent, Provenance-assured, and Secure Software-as-a-Service. 1-8 - Andreas Grüner, Alexander Mühle, Christoph Meinel:

An Integration Architecture to Enable Service Providers for Self-sovereign Identity. 1-5 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall

:
Semantic Smart Contracts for Blockchain-based Services in the Internet of Things. 1-5 - Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:

Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes. 1-4 - Cristoffer Leite, João J. C. Gondim

, Priscila Solís Barreto, Eduardo Adílio Pelinson Alchieri:
Waste Flooding: A Phishing Retaliation Tool. 1-8 - Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:

DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. 1-9 - Junyoung Lee, Seongeun Yoo:

Adaptive Energy Efficient RPL Avoiding Unstable Nodes for Smart Factory. 1-4 - Rodrigo Izidoro Tinini, Gustavo Bittencourt Figueiredo, Daniel Macêdo Batista

:
A Batch Scheduling Algorithm for VPON Reconfiguration and BBU Migration in Hybrid Cloud-Fog RAN. 1-8 - Yaozhong Ge

, Zhe Ding
, Maolin Tang, Yu-Chu Tian
:
Resource Provisioning for MapReduce Computation in Cloud Container Environment. 1-4 - M. Reza HoseinyFarahabady, Ali Jannesari

, Zahir Tari
, Javid Taheri, Albert Y. Zomaya
:
Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms. 1-8 - Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:

A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. 1-3 - Hafiz Husnain Raza Sherazi

, Razi Iqbal, Luigi Alfredo Grieco:
AREA: Adaptive Resilience Algorithm for clustering in Vehicular Ad-hoc Networks. 1-3 - Fabien Charmet, Gregory Blanc, Christophe Kiennert:

Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration. 1-10 - Sudarshan S. Chawathe:

Indoor-Location Classification Using RF Signatures. 1-4 - José Reyes, Jorge López, Natalia Kushik

, Djamal Zeghlache
:
On the Assessment and Debugging of QoE in SDN: Work in Progress. 1-3 - Paulo Ferreira, Andriy Zabolotny, João Barreto

:
Bicycle Mode Activity Detection with Bluetooth Low Energy Beacons. 1-4 - José Reyes, Jorge López, Djamal Zeghlache

:
Identifying Running Data-paths in Software Defined Networking Driven Data-planes. 1-8 - Young Choon Lee, Jayden King

, Seok-Hee Hong:
Holistic Approach for Studying Resource Failures at Scale. 1-4 - Zeineb Rejiba, Xavier Masip-Bruin

, Eva Marín-Tordera:
Computation Task Assignment in Vehicular Fog Computing: A Learning Approach via Neighbor Advice. 1-5 - Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro:

Highlighting the Container Memory Consolidation Problems in Linux. 1-4 - Klaus-Tycho Foerster

, Stefan Schmid
:
Distributed Consistent Network Updates in SDNs: Local Verification for Global Guarantees. 1-4 - Xuan Li, Miao Jin:

Charger Scheduling Optimization Framework. 1-8 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:

Platypus: Offchain Protocol Without Synchrony. 1-8 - Federico Magnanini, Luca Ferretti, Michele Colajanni

:
Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers. 1-6 - Giovanni Apruzzese

, Michele Colajanni, Mirco Marchetti
:
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors. 1-8 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Feng Cheng, Christoph Meinel:
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems. 1-5 - Manuel F. López-Vizcaíno

, Carlos Dafonte
, Francisco Javier Nóvoa
, Daniel Garabato, Marco Antonio Álvarez
, Diego Fernández
:
Network Data Flow Clustering based on Unsupervised Learning. 1-5 - Xiaojie Zhang

, Saptarshi Debroy:
Migration-driven Resilient Disaster Response Edge-Cloud Deployments. 1-8 - Romas James Hada, Miao Jin, Ying Xie, Linh Le:

Link Prediction Based Minimum Cost and Balanced Partition of Large Online Social Networks. 1-9 - Younghun Chae, Natallia Katenka, Lisa Cingiser DiPippo:

An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems. 1-4 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Feng Cheng, Christoph Meinel:
Security Chaos Engineering for Cloud Services: Work In Progress. 1-3 - Nisha Panwar

, Shantanu Sharma
, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. 1-9 - Yann Busnel

, Noël Gillet:
A Cost-effective and Lightweight Membership Assessment for Large-scale Data Stream. 1-8 - Nguyen Binh Truong, Kai Sun, Yike Guo

:
Blockchain-based Personal Data Management: From Fiction to Solution. 1-8 - Tarek Zaarour, Edward Curry

:
Adaptive Filtering of Visual Content in Distributed Publish/Subscribe Systems. 1-5 - Etienne Mauffret

, Flavien Vernier, Sébastien Monnet:
CAnDoR: Consistency Aware Dynamic data Replication. 1-5 - Bader A. Aldawsari

, Bogdan S. Chlebus, Dariusz R. Kowalski:
Broadcasting on Adversarial Multiple Access Channels. 1-4 - Dobrin Dobrev, Dimiter Avresky:

Comparison of SDN Controllers for Constructing Security Functions. 1-5 - Sudarshan S. Chawathe:

Cost-Based Query-Rewriting for DynamoDB: Work in Progress. 1-3 - Lukasz Krzywiecki

, Patryk Koziel, Nisha Panwar
:
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. 1-4 - Lewis Tseng, Zezhi Wang, Yajie Zhao, Haochen Pan:

Distributed Causal Memory in the Presence of Byzantine Servers. 1-8 - Yann Busnel

, Christelle Caillouet
, David Coudert
:
Self-organized UAV-based Supervision and Connectivity: Challenges and Opportunities. 1-5 - Xiaofei Cao, Sanjay Madria:

Efficient Geospatial Data Collection in IoT Networks for Mobile Edge Computing. 1-10 - Fatma Ezzahra Salem, Tijani Chahed, Eitan Altman, Azeddine Gati, Zwi Altman:

Optimal Policies of Advanced Sleep Modes for Energy-Efficient 5G networks. 1-7 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi:

Classification of Delay-based TCP Algorithms From Passive Traffic Measurements. 1-10 - Pedro Paulo Libório, Chan-Tong Lam, Benjamin K. Ng, Daniel L. Guidoni, Marília Curado, Leandro A. Villas

:
Network Slicing in IEEE 802.11ah. 1-9 - Válter Santos, Luís Rodrigues

:
Localized Reliable Causal Multicast. 1-10 - Aliyu Lawal Aliyu, Adel Aneiba, Mohammad N. Patwary:

Secure Communication between Network Applications and Controller in Software Defined Network. 1-8 - Manuel F. López-Vizcaíno

, Francisco Javier Nóvoa
, Diego Fernández
, Victor Carneiro
, Fidel Cacheda:
Early Intrusion Detection for OS Scan Attacks. 1-5 - Shankar K. Ghosh

, Sasthi C. Ghosh:
$Q$-learning Based Network Selection Mechanism for CRNs with Secrecy Provisioning. 1-5 - Omid Tavallaie

, Javid Taheri, Albert Y. Zomaya
:
MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game Theory. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














