Search Results - "2021 IEEE 20th International Symposium on Network Computing and Applications (NCA)"

Refine Results
  1. 1

    A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network by Deb, Souvik, Ghosh, Shankar Kumar, Ghosh, Sasthi C.

    “…Designing resource block (RB) allocation mechanism for reconfigurable intelligent surface (RIS) assisted wireless networks is quite limited in the preceding…”
    Get full text
    Conference Proceeding
  2. 2

    Centrality-Based Eventual Leader Election in Dynamic Networks by Favier, Arnaud, Arantes, Luciana, Lejeune, Jonathan, Sens, Pierre

    “…This paper presents CEL, a new distributed eventual leader election algorithm for dynamic networks, which exploits topological information to improve the…”
    Get full text
    Conference Proceeding
  3. 3

    The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks by Das, Tapadhir, Shukla, Raj Mani, Sengupta, Shamik

    “…Deployment of SDN control plane in high-end servers allow many network applications to be automated and easily managed. In this paper, we propose an SDN…”
    Get full text
    Conference Proceeding
  4. 4

    Data-Intensive Workload Consolidation in Serverless (Lambda/FaaS) Platforms by HoseinyFarahabady, M.Reza, Taheri, Javid, Zomaya, Albert Y., Tari, Zahir

    “…A significant amount of research studies in the past years has been devoted on developing efficient mechanisms to control the level of degradation among…”
    Get full text
    Conference Proceeding
  5. 5

    RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection by Kapoor, Maya, Fuchs, Garrett, Quance, Jonathan

    “…Monitoring, security, and network management systems require packet classification solutions to identify particular application-layer protocols. In real-time…”
    Get full text
    Conference Proceeding
  6. 6

    Challenges in Identifying Network Attacks Using Netflow Data by Chuah, Edward, Suri, Neeraj, Jhumka, Arshad, Alt, Samantha

    “…Large networks often encounter attacks that can affect the network availability. While multiple techniques exist to detect network attacks, a comprehensive…”
    Get full text
    Conference Proceeding
  7. 7

    Efficient Consensus-Free Weight Reassignment for Atomic Storage by Heydari, Hasan, Silvestre, Guthemberg, Arantes, Luciana

    “…Weighted voting is a conventional approach to improving the performance of replicated systems based on commonly-used majority quorum systems in heterogeneous…”
    Get full text
    Conference Proceeding
  8. 8

    DDoS attack identification based on SDN by Dobrin, Dobrev, Dimiter, Avresky

    “…The framework that we are proposing is based on Virtual Security Functions (VSF), Openflow, Software Define Network, Mininet, Pox Controller, Virtual Switches…”
    Get full text
    Conference Proceeding
  9. 9

    A layered framework for root cause diagnosis of microservices by Bento, Andre, Correia, Jaime, Duraes, Joao, Soares, Joao, Ribeiro, Luis, Ferreira, Antonio, Carreira, Rita, Araujo, Filipe, Barbosa, Raul

    “…Microservice-based architectures feature function-ally independent, well-defined and fine-grained components suit-able for loosely coupled deployments and for…”
    Get full text
    Conference Proceeding
  10. 10

    Leveraging Reinforcement Learning for online scheduling of real-time tasks in the Edge/Fog-to-Cloud computing continuum by Mattia, Gabriele Proietti, Beraldi, Roberto

    “…The computing continuum model is a widely ac-cepted and used approach that make possible the existence of applications that are very demanding in terms of low…”
    Get full text
    Conference Proceeding
  11. 11

    Ultra-Low Resolution Infrared Sensor-Based Wireless Sensor Network for Privacy-Preserved Recognition of Daily Activities of Living by Badarch, Luubaatar, Gochoo, Munkhjargal, Batnasan, Ganzorig, Alnajjar, Fady, Tan, Tan-Hsu

    “…In the last few decades, the number of elderly people living alone surge worldwide due to an increase in human life expectancy. Researchers suggest different…”
    Get full text
    Conference Proceeding
  12. 12

    Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks by Grosso, Jasmine, Jhumka, Arshad

    “…Wireless IoT Sensor Networks have a wide range of applications in many areas of modern life, including environmental monitoring where data is sent to a sink…”
    Get full text
    Conference Proceeding
  13. 13

    HSD-DMM: Hierarchical Software Defined Distributed Mobility Management by Amiri, Esmaeil, Wang, Ning, Vural, Serdar, Tafazolli, Rahim

    “…Distributed Mobility Management (DMM) protocol is proposed to address the shortcomings of centralized mobility management protocols. In DMM, unlike centralized…”
    Get full text
    Conference Proceeding
  14. 14

    On the feasibility of adversarial machine learning in malware and network intrusion detection by Venturi, Andrea, Zanasi, Claudio

    “…Nowadays, Machine Learning (ML) solutions are widely adopted in modern malware and network intrusion detection systems. While these algorithms offer great…”
    Get full text
    Conference Proceeding
  15. 15

    Analysis, prevention and detection of ransomware attacks on Industrial Control Systems by Santangelo, Giorgio Valenziano, Colacino, Vincenzo Giuseppe, Marchetti, Mirco

    “…With the advent of Industry 4.0, Industrial Control Systems (ICS) are becoming a prime target for many cyber criminals. We are witnessing a steady increase in…”
    Get full text
    Conference Proceeding
  16. 16

    Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking by Khalfaoui, Sameh, Leneutre, Jean, Villard, Arthur, Gazeau, Ivan, Ma, Jingxuan, Danger, Jean-Luc, Urien, Pascal

    “…The demand for Internet of Things services is increasing exponentially, and consequently a big number of devices are being deployed. To efficiently…”
    Get full text
    Conference Proceeding
  17. 17

    An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication by Deb, Souvik, Ghosh, Sasthi C.

    “…Use of millimeter waves for short range device to device (D2D) communication is one of the most promising ways to provide high data rates. But millimeter waves…”
    Get full text
    Conference Proceeding
  18. 18

    Modeling and Simulation of Heterogeneous Resources in the Cloud: (Work in Progress) by Loncar, Petra

    “…Heterogenous cloud computing will take a significant role in addressing performance concerns at hyper-scale computing. New approaches are needed to manage the…”
    Get full text
    Conference Proceeding
  19. 19

    DarkNet Traffic Classification Pipeline with Feature Selection and Conditional GAN-based Class Balancing by Sridhar, Sashank, Sanagavarapu, Sowmya

    “…DarkNet is an encrypted collection of internet sites that host criminal activities and hidden services. These privatized networks keep the internet activity…”
    Get full text
    Conference Proceeding
  20. 20

    Enhanced Precision Time Synchronization for Modular Robots by Bassil, Jad, Piranda, Benoit, Makhoul, Abdallah, Bourgeois, Julien

    “…As in all distributed systems, having an accurate access to a global notion of time is vital for a modular robot's modules to coordinate their activities and…”
    Get full text
    Conference Proceeding