


default search action
34th AINA 2020: Caserta, Italy
- Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa:

Advanced Information Networking and Applications - Proceedings of the 34th International Conference on Advanced Information Networking and Applications, AINA-2020, Caserta, Italy, 15-17 April. Advances in Intelligent Systems and Computing 1151, Springer 2020, ISBN 978-3-030-44040-4 - Yi-Hsun Lu, Fang-Yie Leu:

Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks. 1-11 - Affaf Shahid, Umair Sarfraz

, Muhammad Waseem Malik, Muhammad Sohaib Iftikhar, Abid Jamal
, Nadeem Javaid
:
Blockchain-Based Reputation System in Agri-Food Supply Chain. 12-21 - Zeeshan Aslam, Nadeem Javaid

, Muhammad Adil, Muhammad Tariq Ijaz, Atta ur Rahman, Mohsin Ahmed
:
An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and Demand. 22-35 - Razvan Bocu

:
A Secure Distributed e-Health System for the Management of Personal Health Metrics Data. 36-51 - Ayesha Ubaid

, Farookh Khadeer Hussain, Jon Charles:
Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade Lane. 52-59 - Ebtesam Hussain Almansor, Farookh Khadeer Hussain:

Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate Responses. 60-70 - Giovanni Bembo, Francesco Lo Presti:

Self-balanced IPv4-IPv6 Lossless Translators with Dynamic Addresses Mapping. 71-84 - Marek R. Ogiela, Lidia Ogiela:

Eye Tracking Technology in Personal Authentication Protocols. 85-89 - Christos Bouras, Anastasia Kollia:

Techno-Economic Analysis of MMWave vs Mid-Band Spectrum in 5G Networks. 90-105 - Fatima Tariq, Zahoor Ali Khan, Tanzeela Sultana, Mubariz Rehman, Qaiser Shahzad, Nadeem Javaid

:
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare System. 106-115 - Lucas de Melo Guimarães, Jacir Luiz Bordim:

Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel Reservation. 116-126 - Christian Salim

, Nathalie Mitton:
Machine Learning Based Data Reduction in WSN for Smart Agriculture. 127-138 - Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane:

A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFV. 139-152 - Taiki Morita, Xuejun Tian, Takashi Okuda:

ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor Nodes. 153-163 - Ming-Chang Lee, Jia-Chun Lin:

DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction. 164-175 - Jiahui Ni, Wenqing Yin, Yong Jiang, Jingling Zhao, Yiming Hu:

Periodic Mining of Traffic Information in Industrial Control Networks. 176-183 - Tomoya Enokido, Makoto Takizawa:

The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine Environments. 184-192 - Charafeddine Mechalikh

, Hajer Taktak, Faouzi Moussa:
A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing Environments. 193-203 - Vinicius Fulber-Garcia

, Marcelo Caggiani Luizelli, Carlos Raniery Paula dos Santos, Elias P. Duarte Jr.:
CUSCO: A Customizable Solution for NFV Composition. 204-216 - Luciana P. Oliveira

, Moroni N. Vieira, Gabriel B. Leite, Edson L. V. de Almeida:
Evaluating Energy Efficiency and Security for Internet of Things: A Systematic Review. 217-228 - Christos Bouras, Apostolos Gkamas

, Vasileios Kokkinos
, Nikolaos Papachristos:
IoT Geolocation Performance Using LoRaWAN. 229-239 - Caiquan Xiong, Zhuang Wang, Li Shen, Na Deng:

TF-BiLSTMS2S: A Chinese Text Summarization Model. 240-249 - Takumi Saito, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe System. 250-257 - Belal Alsinglawi

, Fady Alnajjar, Omar Mubin, Mauricio Novoa
, Ola Karajeh, Omar Darwish:
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay Prediction. 258-267 - Yinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Distributed Approach to Fog Computing with Auction Method. 268-275 - Mounika Kasaraneni, Johnson P. Thomas:

A Self-learning Personal Privacy Assistant. 276-287 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:

Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering CM and LDVM Replacement Methods. 288-297 - Admir Barolli, Seiji Ohara, Shinji Sakamoto, Makoto Takizawa, Leonard Barolli:

Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement Methods. 298-307 - Zia Ullah

, Mohamed R. Elkadeem
, Shaorong Wang, Muhammad Azam, Khdija Shaheen, Mehmood Hussain, Muhammad Rizwan:
A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) Problem. 308-319 - Lyazid Sabri, Abdelhak Boubetra

:
Narrative Knowledge Representation and Blockchain: A Symbiotic Relationship. 320-332 - Thongtat Oransirikul, Hideyuki Takada:

Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile Devices. 333-344 - Salifou Mounchili, Soumaya Hamouda:

Better User Clustering Scheme in Distributed NOMA Systems. 345-356 - Marcus Vinicius Brito da Silva, André Augusto Pacheco de Carvalho, Arthur Selle Jacobs

, Ricardo José Pfitscher
, Lisandro Zambenedetti Granville
:
Sample Selection Search to Predict Elephant Flows in IXP Programmable Networks. 357-368 - Van Cu Pham

, Yuto Lim
, Ha-Duong Bui, Yasuo Tan, Nak Young Chong
, Antonio Sgorbissa:
An Experimental Study on Culturally Competent Robot for Smart Home Environment. 369-380 - Rumenigue Hohemberger, Arthur Francisco Lorenzon, Fábio Diniz Rossi

, Marcelo Caggiani Luizelli:
A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry Problem. 381-392 - Insaf Sagaama, Amine Kchiche, Wassim Trojet

, Farouk Kamoun
:
Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World Driving. 393-404 - Mohamed Saifeddine Hadj Sassi, Lamia Chaari Fourati

:
Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of Things. 405-418 - Krzysztof Stepien, Aneta Poniszewska-Maranda

:
Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil Attacks. 419-430 - Piyush Ghasiya, Koji Okamura:

Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis Approach. 431-443 - Jingling Zhao, Congxiang Yu, Yunze Ni:

A Universal Defense System Based on Backtrace Canary for ELF Against Vulnerabilities. 444-457 - Alessandro Aloisio

, Alfredo Navarra:
Budgeted Constrained Coverage on Series-Parallel Multi-interface Networks. 458-469 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:

Transformative Computing for Distributed Services Management Protocols. 470-475 - Donald Elmazi

, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison Study. 476-487 - Miralda Cuka, Donald Elmazi

, Keita Matsuo, Makoto Ikeda, Makoto Takizawa, Leonard Barolli:
A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node's Unique Encounters as a New Parameter. 488-498 - Shahab Ali, Nadeem Javaid

, Danish Javeed
, Ijaz Ahmad
, Anwar Ali, Umar Mohammed Badamasi:
A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor Networks. 499-511 - Koichiro Sugihara, Naohiro Hayashibara:

Performance Evaluation of Nomadic Lévy Walk on Unit Disk Graphs Using Hierarchical Clustering. 512-522 - Mai Ibraheam, Fayez Gebali, Kin Fun Li, Leonard Sielecki:

Animal Species Recognition Using Deep Learning. 523-532 - Sirine Mnejja, Yassine Aydi, Mohamed Abid, Salvatore Monteleone

, Maurizio Palesi, Davide Patti:
Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCs. 533-546 - Besfort Shala

, Ulrich Trick
, Armin Lehmann
, Bogdan V. Ghita
, Stavros Shiaeles
:
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms. 547-558 - Dongchu Su, Yong Li, Bo Yuan:

SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V Pipeline. 559-565 - Mohamed Anis Fekih

, Ichrak Mokhtari, Walid Bechkit, Yasmine Belbaki, Hervé Rivano:
On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSN. 566-578 - Shuraia Khan, Farookh Khadeer Hussain:

Evaluation of SLA Negotiation for Personalized SDN Service Delivery. 579-590 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:

Trust-Based Decision Making for Food-Energy-Water Actors. 591-602 - Davinder Kaur, Suleyman Uslu, Arjan Durresi, George O. Mohler, Jeremy G. Carter:

Trust-Based Human-Machine Collaboration Mechanism for Predicting Crimes. 603-616 - Nour El Houda Ben Chaabene, Amel Bouzeghoub, Ramzi Guetari, Samar Balti, Henda Hajjami Ben Ghézala

:
Detection of Users' Abnormal Behavior on Social Networks. 617-629 - Himani Sikarwar, Debasis Das

, Sumit Kalra:
Efficient Authentication Scheme Using Blockchain in IoT Devices. 630-641 - Sudhakar Murugasen

, Shankar Raman, Kamakoti Veezhinathan:
VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in Cloud. 642-656 - Pratik Kumar Sinha

, Subhrabrata Choudhury, Animesh Dutta
:
On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc Networks. 657-668 - Joglas Souza, Carson K. Leung

, Alfredo Cuzzocrea:
An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease Analytics. 669-680 - Hosni Manai, Larbi Ben Hadj Slama, Ridha Bouallegue

:
Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO Networks. 681-692 - Rocco Langone, Alfredo Cuzzocrea, Nikolaos Skantzos:

A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 Environments. 693-702 - José A. T. Gavazza, Juliano Coelho Melo, Thiago Bueno da Silva, Antônio Marcos Alberti, Pedro Frosi Rosa, Flávio de Oliveira Silva

, Fábio Luciano Verdi, José Augusto Suruagy Monteiro:
Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures Interconnection. 703-714 - Markus Aleksy

, Philipp Bauer:
Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building Automation Systems. 715-721 - Aneta Poniszewska-Maranda

, Maciej Pluta:
Analysis of Human Vital Functions Based on Data from Internet of Things Devices. 722-733 - Ibtihel Selmi, Nadia Kabachi, Sana Ben Abdallah

, Chirine Ghedira Guegan
, Hajer Baazaoui Zghal:
Adaptive Multi-agent-based Alert System for Diseases' Detection. 734-745 - João Carlos Giacomin, Gustavo Figueiredo Araújo, Tales Heimfarth:

Anycast MAC Protocol with Advanced Preamble for Wireless Sensor Networks. 746-757 - Joanna Ochelska-Mierzejewska:

Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing Problem. 758-767 - Kemal Ihsan Kilic

, Orhan Gemikonakli
, Leonardo Mostarda:
Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVs. 768-779 - Gianluca De Luca Fiscone, Raffaele Pizzolante, Arcangelo Castiglione

, Francesco Palmieri:
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis. 780-791 - Ryoichi Shinkuma, Rieko Takagi, Yuichi Inagaki, Eiji Oki, Fatos Xhafa:

Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine Learning. 792-803 - Paulo Aragao, Reinhard Gotzhein:

Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing Schedules. 804-816 - Jerzy Proficz, Piotr Sumionka, Jaroslaw Skomial, Marcin Semeniuk, Karol Niedzielewski, Maciej Walczak:

Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns. 817-829 - Rodrigo Moreira

, Pedro Frosi Rosa, Rui Luis Andrade Aguiar
, Flávio de Oliveira Silva
:
Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs). 830-844 - Amir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré:

A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. 845-857 - Rafael Hengen Ribeiro, Arthur Selle Jacobs

, Ricardo Parizotto, Luciano Zembruzki
, Alberto Egon Schaeffer Filho, Lisandro Zambenedetti Granville
:
A Bottom-Up Approach for Extracting Network Intents. 858-870 - Luciano Zembruzki

, Arthur Selle Jacobs
, Gustavo Spier Landtreter, Lisandro Zambenedetti Granville
, Giovane C. M. Moura:
[inline-graphic not available: see fulltext]: Measuring Centralization of DNS Infrastructure in the Wild. 871-882 - Vanice Canuto Cunha, Arturo A. Z. Zavala, Pedro R. M. Inácio, Damien Magoni

, Mário M. Freire
:
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance. 883-897 - Eduardo K. Viegas

, Altair Santin Santin, Vinicius Vielmo Cogo
, Vilmar Abreu:
Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model Updates. 898-909 - Sami Abdellatif, Okba Tibermacine, Walid Bechkit, Abdelmalik Bachir:

Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster Situations. 910-921 - Rafael de Jesus Martins

, Rodolfo B. Hecht
, Ederson Ribas Machado
, Jéferson Campos Nobre, Juliano Araújo Wickboldt, Lisandro Zambenedetti Granville
:
Micro-service Based Network Management for Distributed Applications. 922-933 - Mohamad Salhani:

Offloading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communications. 934-946 - Maroua Shili, Moufida Hajjaj, Mohamed Lassaad Ammari:

Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO Systems. 947-956 - Alfonso Di Pace, Giuseppe Fenza, Mariacristina Gallo

, Vincenzo Loia, Aldo Meglio, Francesco Orciuoli:
Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution Systems. 957-967 - Abd El Heq Silem

, Hajer Taktak, Faouzi Moussa:
Dynamic User Interests Profiling Using Fuzzy Logic Application. 968-979 - Yuanyi Qi, Jianhua Yang, Yongzhong Zhang:

Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking. 980-993 - Jefferson Pereira da Silva, Eduardo Alchieri, Jacir Luiz Bordim, Lucas Rodrigues Costa:

A Secure and Distributed Control Plane for Software Defined Networks. 994-1006 - Hayam Alamro

, Costas S. Iliopoulos, Grigorios Loukides
:
Efficiently Detecting Web Spambots in a Temporally Annotated Sequence. 1007-1019 - Dharmendra Prasad Mahato:

On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony Optimization. 1020-1031 - Lucas Camelo Casagrande, Guilherme Piêgas Koslovski, Charles Christian Miers

, Maurício A. Pillon:
DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement Learning. 1032-1044 - Amar Nath

, Rajdeep Niyogi:
Communication QoS-Aware Navigation of Autonomous Robots for Effective Coordination. 1045-1056 - Giuseppe Fenza, Mariacristina Gallo

, Vincenzo Loia, Domenico Marino, Francesco Orciuoli, Alberto Volpe:
Semantic CPPS in Industry 4.0. 1057-1068 - Serena Pelosi:

Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian Language. 1069-1077 - Maria Carmela Catone, Paolo Diana

, Giuseppe Giordano
:
Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research Methods. 1078-1088 - Sujata Swain

, Rajdeep Niyogi:
Context-Aware Service Composition with Functionally Equivalent Services for Complex User Requests. 1089-1100 - Sergi Vila, Nilson Moraes, Fernando Guirado, Josep L. Lérida, Fernando Cores

, Fábio L. Verdi:
Cloud Resources Reassignment Based on CPU and Bandwidth Correlation. 1101-1113 - Michail S. Alexiou

, Euripides G. M. Petrakis
:
Elixir: An Agent for Supporting Elasticity in Docker Swarm. 1114-1125 - Amel Ben Lazreg

, Anis Ben Arbia
, Habib Youssef
:
A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing Approach. 1126-1137 - Khaoula Braiki, Habib Youssef:

Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance Comparison. 1138-1149 - Fadwa Yahya

, Zakaria Maamar
, Khouloud Boukadi
:
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination. 1150-1161 - Imad Berrouyne

, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi:
A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of Things. 1162-1175 - Zakaria Maamar

, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, Bita Banihashemi:
Towards an Approach for Validating the Internet-of-Transactional-Things. 1176-1188 - Neofytos Zacharia, Konstantinos Tsakos, Euripides G. M. Petrakis

:
iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the Cloud. 1189-1200 - Stelios Botonakis, Aimilios Tzavaras, Euripides G. M. Petrakis

:
iSWoT: Service Oriented Architecture in the Cloud for the Semantic Web of Things. 1201-1214 - Vilmar Abreu, Altair Olivo Santin

, Eduardo K. Viegas
, Vinicius Vielmo Cogo
:
Identity and Access Management for IoT in Smart Grid. 1215-1226 - Rosana Lachowski, Marcelo E. Pellenz

, Edgard Jamhour, Manoel Camillo Penna, Guilherme Luiz Moritz
, Glauber Brante
, Richard D. Souza:
Information Centric Protocols to Overcome the Limitations of Group Communication in the IoT. 1227-1238 - Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:

Prevention of DDoS Attacks in IoT Networks. 1239-1250 - Kuang-Yen Tai, Tzer-Shyong Chen

, Frank Yeong-Sung Lin, Po-Min Huang, Jing-Chen Tu:
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record. 1251-1264 - Thamer Alhussain, Ahmad Ali AlZubi, Osama Alfarraj

, Salem Alkhalaf, Musab S. Alkhalaf:
Development of an Information Security Management Model for Enterprise Automated Systems. 1265-1277 - Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki

:
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. 1278-1290 - Ming-Chang Lee, Jia-Chun Lin, Ernst Gunnar Gran:

RePAD: Real-Time Proactive Anomaly Detection for Time Series. 1291-1302 - Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin:

An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts. 1303-1318 - Bowen Sun, Bo Wang, Baojiang Cui, Yeqi Fu:

Greybox Fuzzing Based on Ant Colony Algorithm. 1319-1329 - Yuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki

:
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use. 1330-1340 - David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen

, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection. 1341-1354 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa, Jacir Luiz Bordim, Eduardo Adílio Pelinson Alchieri:

New Programmable Data Plane Architecture Based on P4 OpenFlow Agent. 1355-1367 - Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation. 1368-1382 - Jarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova

:
Using Four Modalities for Malware Detection Based on Feature Level and Decision Level Fusion. 1383-1396 - Lionel N. Tidjon

, Marc Frappier, Amel Mammar:
Intrusion Detection Using ASTDs. 1397-1411 - Raffaele D'Arco, Raffaele Pizzolante, Arcangelo Castiglione

, Francesco Palmieri:
On the File Recovery in Systems Infected by Ransomware. 1412-1425 - Chunlan Zhang, Lihua Dong:

An Improved Fast Correlation Attack on Fruit-80. 1426-1436 - Roger Robson dos Santos, Eduardo Kugler Viegas

, Altair O. Santin
, Vinicius Vielmo Cogo
:
A Long-Lasting Reinforcement Learning Intrusion Detection Model. 1437-1448 - Mohsin Ur Rahman, Barbara Guidi, Fabrizio Baiardi

, Laura Ricci:
Context-Aware and Dynamic Role-Based Access Control Using Blockchain. 1449-1460 - Nourhène Ben Rabah, Ines Ben Tekeya:

A Framework for Classifying Web Attacks While Respecting ML Requirements. 1461-1473 - Chinedu I. Ossai, Ifeanyi P. Egwutuoha:

Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion Battery. 1474-1488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














