


default search action
22nd NCA 2024: Bertinoro, Italy
- 22nd International Symposium on Network Computing and Applications, NCA 2024, Bertinoro, Italy, October 24-26, 2024. IEEE 2024, ISBN 979-8-3315-1018-3

- Shlomi Dolev, Alexander Fok

, Michael Segal:
Byzantine Resilient Waves Interference-based Visual Encryption Scheme. 1-8 - Pedro Antonino, Antoine Durand, Namrata Jain, Garry Lancaster, Jonathan Lawrence, A. W. Roscoe:

Hooks: A Simple and Modular Checkpointing Protocol for Blockchains. 9-16 - Augusta Mukam, Joachim Bruneau-Queyreix, Laurent Réveillère:

AUPE: Collaborative Byzantine fault-tolerant peer-sampling. 17-24 - Tiago Rolo

, Nuno M. Preguiça
, Filipe Araújo
:
Efficient Write Operations in Event Sourcing with Replication. 25-28 - Alex Binun, Yefim Dinitz, Shlomi Dolev, Ofer Hadar, Adnan Jaber, Shevach Riabtsev:

Steiner Trees Composition and Scalable Video Coding for Satelite Video Multicast. 29-36 - Enrico Rossini

, Marcello Pietri
, Marco Picone, Carlo Augusto Grazia, Marco Mamei:
Vulnerable Road Users Accident Prevention via Smart City Data Fusion: Experimental Evaluation of a 5G MEC Architecture. 37-44 - Pierre-Marie Lechevalier, Yann Busnel, Romaric Ludinard

, Géraldine Texier:
A fuzzy reputation system for Radio Access Network sharing. 45-52 - Zhiyong Liu, Hong Shen, Hui Tian:

Collaborative Traffic Offloading in Multi-UAV Cellular Networks via Hybridizing Optimization with Machine Learning. 53-60 - Mathias Kautz, Badis Hammi, Joaquín García-Alfaro:

Platelet: Pioneering Security and Privacy Compliant Simulation for Intelligent Transportation Systems and V2X. 61-67 - Carlo Mazzocca, Stefano Allevi, Rebecca Montanari:

Certifying IoT Data with Verifiable Credentials. 68-71 - Maksuda Rabeya, Nisha Panwar:

WiFi Traffic Inspection for Obscured Devices. 72-79 - Silvio Russo

, Isabella Marasco, Karina Chichifoi, Claudio Zanasi:
Improving Intrusion Detection in IoT Networks. 80-86 - Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha:

Towards Threat Modelling of IoT Context-Sharing Platforms. 87-96 - Lorenzo Pisu

, Federico Loi, Davide Maiorca, Giorgio Giacinto:
HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations. 97-104 - Dario Castellano, Roberto De Prisco, Pompeo Faruolo:

Login System for OpenID Connect with Verifiable Credentials. 105-112 - Ghada Arfaoui

, Thibaut Jacques
, Cristina Onete:
Efficient and Privacy-Preserving Collective Remote Attestation for NFV. 113-122 - Ivan Costa, Ivone Amorim, Eva Maia, Pedro Barbosa, Isabel Praça:

Secure, Searchable, and Consent-Driven Healthcare Data Sharing System. 123-131 - Yuan Tian, Zechun Cao, Shou-Hsuan Stephen Huang:

Detecting VPN Traffic in Real-Time with Active Probing. 132-139 - Claudia Canali, Riccardo Lancellotti, Riccardo Mescoli:

An analysis of Genetic Algorithms to support the management of edge computing infrastructures. 140-147 - M. Reza HoseinyFarahabady, Albert Y. Zomaya:

Controlling Performance Interference in Multi-Tenant Containerized Environments. 148-155 - Francesco Faenza, Emiliano Maccaferri, Claudia Canali:

Containerized Jupyter Notebooks: balancing flexibility and performance. 156-163 - Sourav Das, Jit Gupta, Krishna Kant:

Online Diagnosis of Microservices Based Applications Via Partial Digital Twin. 164-171 - Victor Balogun, Xavier Paquette, Oluwafemi A. Sarumi:

Secure Risk Management Approach for Enhancing the Performance of Cloud-based Cooperative Spectrum Sensing CRNs. 172-176 - Seyed Milad Miri, Stefan Schmid, Habib Mostafaei

:
A Demand-aware Networked System Using Telemetry and ML with REACTNET. 177-184 - Max Franke, Jake Holland, Stefan Schmid:

MCQUIC - A Multicast Extension for QUIC. 185-192 - Mahdi Rahimi:

MALARIA: Management of Low-Latency Routing Impact on Mix Network Anonymity. 193-202 - Hongkun Ren, Hong Shen, Hui Tian:

Multi-Coflow Scheduling in Not-All-Stop Optical Circuit Switches for Data Center Networks. 203-210 - Priyanka Kamboj, Sujata Pal:

QoS-Aware Flow Routing with Minimizing Active Links and Rule Capacity Constraints in SDN Networks. 211-218 - Mohamed Amine Legheraba, Maria Potop-Butucaru, Sébastien Tixeuil, Serge Fdida:

Emergent Peer-to-Peer Multi-Hub Topology. 219-226 - Md. Mehedi Hasan, Md. Rafiqul Islam

, Quazi Mamun
, Md Zahidul Islam
, Junbin Gao
:
Enhancing Network Intrusion Detection Systems: A Real-time Adaptive Machine Learning Approach for Adversarial Packet-Mutation Mitigation. 227-235 - Gustavo Sánchez, Olakunle Olayinka

, Aryan Pasikhani:
Web Application Penetration Testing with Artificial Intelligence: A Systematic Review. 236-245 - Bharath Kollanur, Kurt Friday, Elias Bou-Harb:

DCPsolver: Enhancing DNS Cache Poisoning Defenses with Resolver-Based SmartNICs. 246-253 - Minh Hieu Nguyen, Huu Tien Nguyen, Trung Thanh Nguyen, Manh Duong Nguyen, Trong Nghia Hoang, Truong Thao Nguyen, Phi Le Nguyen:

FedCert: Federated Accuracy Certification. 254-261 - Aarju Dixit, Debasis Das:

NeuroSense: Smartwatch-based Early Detection Framework for Alzheimer's Disease. 262-269 - Marcello Pietri

, Marco Mamei, Michele Colajanni:
Evaluating Technical Countermeasures for Telecom Spam and Scams in the AI Era. 270-277 - Manh Duong Nguyen, Trung Thanh Nguyen, Huy Hieu Pham, Trong Nghia Hoang, Phi Le Nguyen, Thanh Trung Huynh:

FedMAC: Tackling Partial-Modality Missing in Federated Learning with Cross-Modal Aggregation and Contrastive Regularization. 278-285 - Amal Sayari, Slim Rekhis, Yacine Djemaiel, Ali Mabrouk, Wiem Mahouachi:

DECEPT-CTI: A Framework for Enhancing Cyber Deception Strategies through NLP-based Extraction of CTI from Unstructured Reports. 286-293 - Xiao Ma, Hong Shen, Chan-Tong Lam:

Defending Against Backdoor Attacks with Feature Activation-Based Detection and Model Recovery. 294-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














