Advanced Information Networking and Applications : Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 4 — 1st ed. 2024. (Englisch)
- Neue Suche nach: Barolli, Leonard
2024
-
ISBN:
- Buch / Elektronische Ressource
-
Titel:Advanced Information Networking and Applications : Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 4
-
Beteiligte:Barolli, Leonard ( Herausgeber:in )
-
Erschienen in:
-
Ausgabe:1st ed. 2024.
-
Verlag:
- Neue Suche nach: Springer Nature Switzerland
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2024
-
Format / Umfang:1 Online-Ressource(XXVIII, 485 p. 178 illus., 141 illus. in color.)
-
ISBN:
-
DOI:
-
Medientyp:Buch
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 620.00285
- Weitere Informationen zu Dewey Decimal Classification
-
Schlagwörter:
-
Klassifikation:
DDC: 620.00285 -
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The Deployment of E-Learning Application as a Web Service in a Cloud Broker ArchitectureZorgati, Rihem / Hassen, Hamdi / Alsulbi, Khlil Ahmad et al. | 2024
- 2
-
CarbonApp: Blockchain Enabled Carbon Offset Project ManagementHu, Yining / McFarlane, Alistair / Hussain, Farookh et al. | 2024
- 3
-
Investigating the Impact of Congestion Control Algorithms on Edge-Cloud ContinuumSakashita, Nicolas Keiji Cattani / Pillon, Maurício Aronne / Miers, Charles Christian / Koslovski, Guilherme Piêgas et al. | 2024
- 4
-
Design and Implementation of a Fuzzy-Based System for Assessment of Relational TrustHigashi, Shunya / Ampririt, Phudit / Qafzezi, Ermioni / Ikeda, Makoto / Matsuo, Keita / Barolli, Leonard et al. | 2024
- 5
-
BarongTrace: A Malware Event Log Dataset for LinuxPratomo, Baskoro Adi / Kosim, Stefanus A. / Studiawan, Hudan / Prabowo, Angela O. et al. | 2024
- 6
-
Specifying SSI over EAP: Towards an Even Better Eduroam in the FuturePetrlic, Ronald et al. | 2024
- 7
-
FastSGX: A Message-Passing Based Runtime for SGXTanigassalame, Subashiny / Pipereau, Yohan / Chader, Adam / Toljaga, Jana / Thomas, Gaël et al. | 2024
- 8
-
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context DetectionShalabi, Fatma / Felouat, Hichem / Nguyen, Huy H. / Echizen, Isao et al. | 2024
- 9
-
Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature MethodRossi Figlarz, Gabriel / Passuelo Hessel, Fabiano et al. | 2024
- 10
-
SoK: Directions and Issues in Formal Verification of Payment ProtocolsSakurada, Hideki / Sakurai, Kouichi et al. | 2024
- 11
-
PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNNSuzuki, Takuya / Yamana, Hayato et al. | 2024
- 12
-
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian ManifoldsLyu, Yang / Feng, Yaokai / Sakurai, Kouichi et al. | 2024
- 13
-
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of EmbeddingsShahriar, Md Hasan / Kamal, Abrar Hasin / Kayem, Anne V. D. M. et al. | 2024
- 14
-
Towards User-Oriented SteganographyOgiela, Urszula / Ogiela, Marek R. et al. | 2024
- 15
-
AI-Based Cybersecurity SystemsOgiela, Marek R. / Ogiela, Lidia et al. | 2024
- 16
-
Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS SystemsAgrawal, Ankit / Bhatia, Ashutosh / Tiwari, Kamlesh et al. | 2024
- 17
-
Messages and Incentives to Promote Updating of Software on SmartphonesSano, Ayane / Sawaya, Yukiko / Isohara, Takamasa / Nishigaki, Masakatsu et al. | 2024
- 18
-
A Non-interactive One-Time Password-Based Method to Enhance the Vault SecurityOliveira, Juarez / Santin, Altair / Viegas, Eduardo / Horchulhack, Pedro et al. | 2024
- 19
-
Causal Inference to Enhance AI Trustworthiness in Environmental Decision-MakingUslu, Suleyman / Kaur, Davinder / Rivera, Samuel J / Durresi, Arjan / Babbar-Sebens, Meghna et al. | 2024
- 20
-
Forecasting Malware Incident Rates in Higher Education Institutionsde Souza, Rildo Antonio / Silva, Vitor de Castro / Junior, Sylvio Barbon / Zarpelão, Bruno Bogaz et al. | 2024
- 21
-
Detecting Malicious Android Game Applications on Third-Party Stores Using Machine LearningSanamontre, Thanaporn / Visoottiviseth, Vasaka / Ragkhitwetsagul, Chaiyong et al. | 2024
- 22
-
Neural Network Innovations in Image-Based Malware Classification: A Comparative StudyAl-Qadasi, Hamzah / Benchadi, Djafer Yahia M. / Chehida, Salim / Fukui, Kazuhiro / Bensalem, Saddek et al. | 2024
- 23
-
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive AnalysisDou, Zhicheng / Guo, Yuchen / Chang, Ching-Chun / Nguyen, Huy H. / Echizen, Isao et al. | 2024
- 24
-
Cognitive Blind Blockchain CAPTCHA ArchitectureDinh, Nghia / Tien, Huy Tran / Le, Viet-Tuan / Duong, Huu-Thanh / Ogiela, Lidia / Hoang, Vinh Truong et al. | 2024
- 25
-
DVID: Adding Delegated Authentication to SPIFFE Trusted DomainsJessup, Andrew / Cochak, Henrique Z. / Koslovski, Guilherme P. / Pillon, Maurício A. / Miers, Charles C. / Correia, Pedro H. B. / Marques, Marco A. / Simplicio, Marcos A. et al. | 2024
- 26
-
Transparent Encryption for IoT Using Offline Key Exchange over Public BlockchainsAbu-Tair, Mamun / Zia, Unsub / Memon, Jamshed / Scotney, Bryan / Carracedo, Jorge Martinez / Sajjad, Ali et al. | 2024
- 27
-
An End-to-End Approach for the Detection of Phishing AttacksHammi, Badis / Bilot, Tristan / Bazain, Danyil / Binand, Nicolas / Jaen, Maxime / Mitta, Chems / EL Madhoun, Nour et al. | 2024
- 28
-
Efficient Inner-Product Argument from Compressed \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma $$\end{document}-Protocols and ApplicationsScala, Emanuele / Mostarda, Leonardo et al. | 2024
- 29
-
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage ModelGhanmi, Houaida / Hajlaoui, Nasreddine / Touati, Haifa / Hadded, Mohamed / Muhlethaler, Paul / Boudjit, Saadi et al. | 2024
- 30
-
Enhancing Security and Efficiency: A Lightweight Federated Learning ApproachChen, Chunlu / Wang, Kevin I-Kai / Li, Peng / Sakurai, Kouichi et al. | 2024
- 31
-
Using Biometric Data to Authenticate Tactical Edge Network Usersda Silva Campos, Guilherme Falcão / Dalzochio, Jovani / Nunes, Raul Ceretta / de Lima Silva, Luis Alvaro / de Freitas, Edison Pignaton / Kunst, Rafael et al. | 2024
- 32
-
SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign IdentityBarros, Maurício de Vasconcelos / Martina, Jean Everson et al. | 2024
- 33
-
Privacy-Preserving Location-Based Services: A DQN Algorithmic PerspectivePandey, Manish / Kaur, Harkeerat / Basak, Sudipta / Echizen, Isao et al. | 2024
- 34
-
Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection SystemsChavali, Lalitha / Saxena, Paresh / Mitra, Barsha et al. | 2024
- 35
-
Container-Level Auditing in Container Orchestrators with eBPFBertinatto, Fábio Junior / Arioza, Daniel / Nobre, Jéferson Campos / Granville, Lisandro Zambenedetti et al. | 2024
- 36
-
A Study on Privacy-Preserving Transformer Model for Cross-Domain RecommendationNing, Jing / Li, Kin Fun et al. | 2024
- 37
-
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in MininetMonir, Md Fahad / Hasan, Azwad Fawad et al. | 2024
- 38
-
SDN Supported Network State Aware Command and Control Application FrameworkRodrigues da Silva, Carlos André / de Souza Silva, Lauro / Santos dos Anjos, Julio César / Matiuzzi Stocchero, Jorgito / Wickboldt, Juliano / Pignaton de Freitas, Edison et al. | 2024
- 39
-
Reliability-Aware SFC Protection by Using Nodes with Spare ResourcesChen, Hung-You / Wang, Pi-Chung et al. | 2024
- 40
-
Highly Reliable Communication Using Multipath Slices with Alternating Transmissionda Cunha, Italo Tiago / Rosa, Eduardo Castilho / Moreira, Rodrigo / de Oliveira Silva, Flávio et al. | 2024