default search action
12th CloudNet 2023: Hoboken, NJ, USA
- 12th IEEE International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-1306-2
- Jeremy Lynn Reed, Ali Saman Tosun, Turgay Korkmaz:
Bulwark Security in an Edge Cloud Model. 1-8 - Haorui Peng, Fatemeh Akbarian, William Tärneberg, Maria Kihl:
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems. 9-17 - Vinay Gugueoth:
LPMLP-Based Framework for Secure IPsec VPN Cloud Gateway with Advanced Network Monitoring and Issue Resolution. 18-26 - Clément Boin, Tristan Groléat, Xavier Guillaume, Gilles Grimaud, Michaël Hauspie:
Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure. 27-35 - Mahsa Raeiszadeh, Amin Ebrahimzadeh, Ahsan Saleem, Roch H. Glitho, Johan Eker, Raquel A. F. Mini:
Real-Time Anomaly Detection Using Distributed Tracing in Microservice Cloud Applications. 36-44 - Ruiqing Chu, Xuanyu Liu, Xiao Fu, Bin Luo, Mohsen Guizani:
Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification Mechanism. 45-52 - Asma Alfardus, Danda B. Rawat:
Detection of Cyberattacks in Controller Area Network (CAN) Bus System Using a Hybrid ML Approach. 53-60 - William Duckworth, Weixian Liao, Wei Yu:
Deblurring as a Defense against Adversarial Attacks. 61-67 - Larry Ryan, Andrew Addison, Ryan Prins, Daniel Bardsley, Eduard Mikhaylov, Barrett Wakefield, Martin O'Grady, Edward Sepulveda:
High Frequency Trading on a Low-Latency Fabric in a Cloud Environment. 68-76 - Fabricio Bortoluzzi, Barry Irwin, Lucas Silvero Beiler, Carla Merkle Westphall:
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation. 77-85 - Michiel Van Kenhove, Merlijn Sebrechts, Filip De Turck, Bruno Volckaert:
Cloud-Native-Bench: an Extensible Benchmarking Framework to Streamline Cloud Performance Tests. 86-93 - Abigail Griffiths, Adam Morsman, Paul Veitch:
Understanding the Performance and Power Saving Tradeoffs of Server Sleep States. 94-102 - William Tärneberg, Per Skarin:
Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic Tasks. 103-111 - Pedro Paiva Alves, Filipe Fernandes S. B. de Matos, Paulo A. L. Rego, Fernando A. M. Trinta:
A Multi-criteria Context-Sensitive Approach to Offloading Decision Making. 112-119 - Muhammad Shahid Iqbal, Chien Chen:
P4-MLFQ: A P4 implementation of Multi-level Feedback Queue Scheduling Using A Coarse-Grained Timer for Data Center Networks. 120-125 - Md. Amjad Hossain, Javed I. Khan:
ZePoP: A Distributed Leader Election Protocol using the Delay-based Closeness Centrality for Peer-to-Peer Applications. 126-134 - Ali Jalooli, Frankie Murcia:
Vehicular Edge Computing-Driven Optimized Multihop Clustering with Data Aggregation. 135-143 - Thiago Pereira da Silva, Thaís Vasconcelos Batista, Anselmo Luiz Éden Battisti, Andre Saraiva, Antonio A. Rocha, Flávia Coimbra Delicato, Ian Vilar Bastos, Evandro L. C. Macedo, Ana Cristina Bernardo de Oliveira, Paulo F. Pires:
A MAPE-K and Queueing Theory Approach for VNF Auto-scaling in Edge Computing. 144-152 - Renan A. Barbosa, João P. B. Andrade, Mauro Roberto Costa da Silva, Fernando A. M. Trinta, Paulo A. L. Rego:
Accelerating Fingerprint-based Person Identification through Computation Offloading in Edge and Cloud Environments. 153-160 - Polyzois Soumplis, Georgios Kontos, Aristotelis Kretsis, Panagiotis C. Kokkinos, Anastassios Nanos, Emmanouel A. Varvarigos:
Security-Aware Resource Allocation in the Edge-Cloud Continuum. 161-169 - Jing Wang, Amjad Soomro:
Optimal Deployment and Orchestration of Multiple Service Function Chains in 5G Networks. 170-175 - Yuhang Wang, Salman Nazir:
Preserving Location Privacy under Maritime 5G using Intent-oriented Scheme. 176-184 - Matthias Frei, Reinhard German, Anatoli Djanatliev:
Evaluating Optimistic Synchronization of Network Graphs in Mobile Networks With MEC Support. 185-193 - Zhuzhu Wang, Ying Wang:
NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. 194-202 - Yu-Sheng Liu, Shixiong Qi, Po-Yi Lin, Han-Sing Tsai, K. K. Ramakrishnan, Jyh-Cheng Chen:
L25GC+: An Improved, 3GPP-compliant 5G Core for Low-latency Control Plane Operations. 203-211 - Nurzaman Ahmed, Flavio Esposito, Okwudilichukwu Okafor, Nadia Shakoor:
SoftFarmNet: Reconfigurable Wi-Fi HaLow Networks for Precision Agriculture. 212-220 - Sri Suvetha Meenaa Subamanian, Senthil Pon Vignesh Subramanian, Padmapriya Muthiah, Jalaluddin Mohd Ansari Shajahan:
Multi-Drone Mounted Aerial Base Stations' Enhanced Trajectories Planning with Effective Communication Strategies for FANETs. 221-228 - Shiyu Yuan, Jingda Yang, Sudhanshu Arya, Carlo Lipizzi, Ying Wang:
From Ambiguity to Explicitness: NLP-Assisted 5G Specification Abstraction for Formal Analysis. 229-237 - Nalveer Moocheet, Brigitte Jaumard, Pierre Thibault, Lackis Eleftheriadis:
A Sensor Predictive Model for Power Consumption using Machine Learning. 238-246 - Xuting Tang, Jia Xu, Shusen Wang:
RoMA: Resilient Multi-Agent Reinforcement Learning with Dynamic Participating Agents. 247-255 - Xuting Tang, Mengjiao Zhang, Abdul Rafae Khan, Steve Y. Yang, Jia Xu:
Unveiling Equity: Exploring Feature Dependency using Complex-Valued Neural Networks and Attention Mechanism for Fair Data Analysis. 256-264 - Menuka Perera Jayasuriya Kuranage, Elisabeth Hanser, Loutfi Nuaymi, Ahmed Bouabdallah, Philippe Bertin, Anwer Al-Dulaimi:
AI-assisted proactive scaling solution for CNFs deployed in Kubernetes. 265-273 - Jingda Yang, Ying Wang:
HyFuzz: A NextG Hybrid Testing Platform for Multi-step Deep Fuzzing and Performance Assessment from Virtualization to Over-the-Air. 274-280 - Andrew D'Angelo, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection. 281-289 - Weilin Zhang, Salman Toor, Mays F. Al-Naday:
Federated Machine Learning for Resource Allocation in Multi-domain Fog Ecosystems. 290-298 - Priyanka Verma, John G. Breslin, Donna O'Shea:
PerCFed: An Effective Personalized Clustered Federated Learning Mechanism to Handle non-IID Challenges for Industry 4.0. 299-306 - Chun Shan, Ziyi Zhang, Siyi Zhou:
A multi-task deep learning based vulnerability severity prediction method. 307-315 - Kebin Li, Yang You, Yuntian Tan, Shen Su, Zhihong Tian:
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion. 316-324 - Rongrong Chen, Qianlong Xiao, Minghao Hu, Jiaxu Xing, Fei Tang, Jing Qiu:
Efficient Algorithms for Obnoxious Facility Location on a Line Segment or Circle. 325-333 - Chuanle Song, Ruijie Shan, Xianfeng Li, Senfeng Lai, Chihui Liu:
Dual-Teacher for Unsupervised Text Detector in Cloud. 334-342 - Yunping Fang, Chenglong Fu, Xiaojiang Du:
Virtual-Device-Based Policy Enforcement in Multi-Admin Smart Environments. 343-351 - Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. 352-359 - Wuqi Qi, Wei Wu, Hao Wang, Lu Ou, Ning Hu, Zhihong Tian:
Intrusion Detection Techniques Analysis in Cloud Computing. 360-363 - Cong Hu, Zhitao Guan, Pengfei Yu, Zhen Yao, Cuicui Zhang, Ruixuan Lu, Peng Wang:
A Serverless Federated Learning Service Ecosystem for Multi-Cloud Collaborative Environments. 364-371 - Guangxia Xu, Yuling Huang, Chuang Ma:
Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme. 372-380 - Yufeng Ye, Qichao He, Peng Zhang, Jie Xiao, Zhao Li:
Multivariate Time Series Anomaly Detection with Fourier Time Series Transformer. 381-388 - Peixin Liao, Xvxin Huang, Qiangbo Huang, Yanming Liang, Zhongxiao Wang, Denghui Zhang:
An explainable intrusion detection system based on feature importance. 389-397 - Junhan Chen, Rufeng Liang, Man Zhang, Chengcong Zheng, Xun Huang, Hui Lu, Xiang Yu, Zhihong Tian:
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation. 398-402 - Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu, Hui Lu, Xiang Yu, Zhihong Tian:
Research on the Exploitability of Binary Software Vulnerabilities. 403-407 - Zhenshan Li, Hao Liu, Ruijie Shan, Yanbin Sun, Yu Jiang, Ning Hu:
Binary Code Similarity Detection: State and Future. 408-412 - Yunxin Jiang, Yitong Ren, Ziyu Wang, Yi Tang, Shengtao Lu, Ning Hu, Zhihong Tian, Yinghai Zhou:
OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM. 413-417 - Haowen Yi, Fan Liu, Rui Wang, Ning Hu, Zhihong Tian:
A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior. 418-422 - Guoyi Bu, Kuo Chi, Ting Su, Yongqin Yang:
An Energy-saving Multi-path Traffic Scheduling Approach for Data Center Networks Based on the Rate Scaling. 423-427 - Qian Qu, Simeon Ogunbunmi, Mohsen Hatami, Ronghua Xu, Yu Chen, Genshe Chen, Erik Blasch:
A Digital Twins Enabled Reputation System for Microchain-based UAV Networks. 428-432 - Wenbin Zhou, Qian Wang:
An Efficient Cache Eviction Strategy based on Learning and Belady Algorithm. 433-437 - Yunting Zhang, Lin Ye, Baisong Li, Hongli Zhang:
Robustness Evaluation of Cloud-Deployed Large Language Models against Chinese Adversarial Text Attacks. 438-442 - Yue Wu, Lin Ye, Baisong Li, Hongli Zhang, Jing Cao:
Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks. 443-447 - Athanasios Chourlias, Theodoros Theodoropoulos, John Violos, Aris Leivadeas, Konstantinos Tserpes, Christos-Kyprianos Zalachoris:
A Brief Review of Population-based Methods for Task Offloading in Cloud-to-Edge Continuum. 448-453 - Piotr Sowinski, Ignacio Lacalle, Rafael Vaño, Carlos Enrique Palau:
Autonomous Choreography of WebAssembly Workloads in the Federated Cloud-Edge-IoT Continuum. 454-459 - Yiwei Cheng, Jin Nakazato, Ehsan Javanmardi, Chia-Ming Chang, Manabu Tsukada:
Pedestrian-centric Augmented Reality Visualization of Real-time Autonomous Vehicle Dynamics. 460-465 - Rodrigo Asensio Garriga, Alejandro Molina Zarca, Antonio F. Skarmeta:
A Multi-stakeholder Cloud-continuum framework for 6G Networks security & service management. 466-471 - Sunghyun Jin, Serae Kim, Kyunghan Lee:
Co-Scheduling of Radio and Computing Resources for Resource-Efficient Latency Guarantee in 6G. 472-476 - Quang Tung Thai, Myung-Eun Kim, Namseok Ko:
On design and implementation of a cloud-native B5G mobile core network. 477-482 - Engin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan, Yekta Turk:
Decentralized Identity Management for Secure Resource Sharing in O-RAN. 483-488 - Slawomir Kuklinski:
Flexible Composition of 6G Networks atop Cloud Continuum. 489-494 - Cheikh Saliou Mbacke Babou, Yasunori Owada, Masugi Inoue, Kenichi Takizawa, Toshiaki Kuri:
Distributed Self-Orchestration System based on Home 5G Concept. 495-500 - Shivam Singha, Debajit Saha, Pallab Sarma, Pranav Kumar Singh, Uttam Ghosh, Maharaj Brahma:
SPEEDY: Small Prototyping for Number Plate Detection and Speed Estimation using Edge AI. 501-506 - Debashis Das, Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty:
Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert System. 507-512
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.