


default search action
22nd NCA 2024: Bertinoro, Italy
- 22nd International Symposium on Network Computing and Applications, NCA 2024, Bertinoro, Italy, October 24-26, 2024. IEEE 2024, ISBN 979-8-3315-1018-3
- Shlomi Dolev, Alexander Fok, Michael Segal:
Byzantine Resilient Waves Interference-based Visual Encryption Scheme. 1-8 - Pedro Antonino, Antoine Durand, Namrata Jain, Garry Lancaster, Jonathan Lawrence, A. W. Roscoe:
Hooks: A Simple and Modular Checkpointing Protocol for Blockchains. 9-16 - Augusta Mukam, Joachim Bruneau-Queyreix, Laurent Réveillère:
AUPE: Collaborative Byzantine fault-tolerant peer-sampling. 17-24 - Tiago Rolo
, Nuno M. Preguiça, Filipe Araújo
:
Efficient Write Operations in Event Sourcing with Replication. 25-28 - Alex Binun, Yefim Dinitz, Shlomi Dolev, Ofer Hadar, Adnan Jaber, Shevach Riabtsev:
Steiner Trees Composition and Scalable Video Coding for Satelite Video Multicast. 29-36 - Enrico Rossini, Marcello Pietri
, Marco Picone, Carlo Augusto Grazia, Marco Mamei:
Vulnerable Road Users Accident Prevention via Smart City Data Fusion: Experimental Evaluation of a 5G MEC Architecture. 37-44 - Pierre-Marie Lechevalier, Yann Busnel, Romaric Ludinard, Géraldine Texier:
A fuzzy reputation system for Radio Access Network sharing. 45-52 - Zhiyong Liu, Hong Shen, Hui Tian:
Collaborative Traffic Offloading in Multi-UAV Cellular Networks via Hybridizing Optimization with Machine Learning. 53-60 - Mathias Kautz, Badis Hammi, Joaquín García-Alfaro:
Platelet: Pioneering Security and Privacy Compliant Simulation for Intelligent Transportation Systems and V2X. 61-67 - Carlo Mazzocca, Stefano Allevi, Rebecca Montanari:
Certifying IoT Data with Verifiable Credentials. 68-71 - Maksuda Rabeya, Nisha Panwar:
WiFi Traffic Inspection for Obscured Devices. 72-79 - Silvio Russo, Isabella Marasco, Karina Chichifoi, Claudio Zanasi:
Improving Intrusion Detection in IoT Networks. 80-86 - Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha:
Towards Threat Modelling of IoT Context-Sharing Platforms. 87-96 - Lorenzo Pisu, Federico Loi, Davide Maiorca, Giorgio Giacinto:
HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations. 97-104 - Dario Castellano, Roberto De Prisco, Pompeo Faruolo:
Login System for OpenID Connect with Verifiable Credentials. 105-112 - Ghada Arfaoui, Thibaut Jacques, Cristina Onete:
Efficient and Privacy-Preserving Collective Remote Attestation for NFV. 113-122 - Ivan Costa, Ivone Amorim, Eva Maia, Pedro Barbosa, Isabel Praça:
Secure, Searchable, and Consent-Driven Healthcare Data Sharing System. 123-131 - Yuan Tian, Zechun Cao, Shou-Hsuan Stephen Huang:
Detecting VPN Traffic in Real-Time with Active Probing. 132-139 - Claudia Canali, Riccardo Lancellotti, Riccardo Mescoli:
An analysis of Genetic Algorithms to support the management of edge computing infrastructures. 140-147 - M. Reza HoseinyFarahabady, Albert Y. Zomaya:
Controlling Performance Interference in Multi-Tenant Containerized Environments. 148-155 - Francesco Faenza, Emiliano Maccaferri, Claudia Canali:
Containerized Jupyter Notebooks: balancing flexibility and performance. 156-163 - Sourav Das, Jit Gupta, Krishna Kant:
Online Diagnosis of Microservices Based Applications Via Partial Digital Twin. 164-171 - Victor Balogun, Xavier Paquette, Oluwafemi A. Sarumi:
Secure Risk Management Approach for Enhancing the Performance of Cloud-based Cooperative Spectrum Sensing CRNs. 172-176 - Seyed Milad Miri, Stefan Schmid, Habib Mostafaei
:
A Demand-aware Networked System Using Telemetry and ML with REACTNET. 177-184 - Max Franke, Jake Holland, Stefan Schmid:
MCQUIC - A Multicast Extension for QUIC. 185-192 - Mahdi Rahimi:
MALARIA: Management of Low-Latency Routing Impact on Mix Network Anonymity. 193-202 - Hongkun Ren, Hong Shen, Hui Tian:
Multi-Coflow Scheduling in Not-All-Stop Optical Circuit Switches for Data Center Networks. 203-210 - Priyanka Kamboj, Sujata Pal:
QoS-Aware Flow Routing with Minimizing Active Links and Rule Capacity Constraints in SDN Networks. 211-218 - Mohamed Amine Legheraba, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida:
Emergent Peer-to-Peer Multi-Hub Topology. 219-226 - Md Mehedi Hasan, Md. Rafiqul Islam, Quazi Mamun, Md Zahidul Islam, Junbin Gao:
Enhancing Network Intrusion Detection Systems: A Real-time Adaptive Machine Learning Approach for Adversarial Packet-Mutation Mitigation. 227-235 - Gustavo Sánchez, Olakunle Olayinka, Aryan Pasikhani:
Web Application Penetration Testing with Artificial Intelligence: A Systematic Review. 236-245 - Bharath Kollanur, Kurt Friday, Elias Bou-Harb:
DCPsolver: Enhancing DNS Cache Poisoning Defenses with Resolver-Based SmartNICs. 246-253 - Minh Hieu Nguyen, Huu Tien Nguyen, Trung Thanh Nguyen, Manh Duong Nguyen, Trong Nghia Hoang, Truong Thao Nguyen, Phi Le Nguyen:
FedCert: Federated Accuracy Certification. 254-261 - Aarju Dixit, Debasis Das:
NeuroSense: Smartwatch-based Early Detection Framework for Alzheimer's Disease. 262-269 - Marcello Pietri
, Marco Mamei, Michele Colajanni:
Evaluating Technical Countermeasures for Telecom Spam and Scams in the AI Era. 270-277 - Manh Duong Nguyen, Trung Thanh Nguyen, Huy Hieu Pham, Trong Nghia Hoang, Phi Le Nguyen, Thanh Trung Huynh:
FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization. 278-285 - Amal Sayari, Slim Rekhis, Yacine Djemaiel, Ali Mabrouk, Wiem Mahouachi:
DECEPT-CTI: A Framework for Enhancing Cyber Deception Strategies through NLP-based Extraction of CTI from Unstructured Reports. 286-293 - Xiao Ma, Hong Shen, Chan-Tong Lam:
Defending Against Backdoor Attacks with Feature Activation-Based Detection and Model Recovery. 294-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.