


default search action
12th CloudNet 2023: Hoboken, NJ, USA
- 12th IEEE International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-1306-2
- Jeremy Lynn Reed, Ali Saman Tosun, Turgay Korkmaz:
Bulwark Security in an Edge Cloud Model. 1-8 - Haorui Peng, Fatemeh Akbarian, William Tärneberg, Maria Kihl:
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems. 9-17 - Vinay Gugueoth:
LPMLP-Based Framework for Secure IPsec VPN Cloud Gateway with Advanced Network Monitoring and Issue Resolution. 18-26 - Clément Boin, Tristan Groléat, Xavier Guillaume, Gilles Grimaud, Michaël Hauspie:
Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure. 27-35 - Mahsa Raeiszadeh, Amin Ebrahimzadeh, Ahsan Saleem, Roch H. Glitho, Johan Eker, Raquel A. F. Mini:
Real-Time Anomaly Detection Using Distributed Tracing in Microservice Cloud Applications. 36-44 - Ruiqing Chu, Xuanyu Liu, Xiao Fu, Bin Luo, Mohsen Guizani:
Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification Mechanism. 45-52 - Asma Alfardus, Danda B. Rawat:
Detection of Cyberattacks in Controller Area Network (CAN) Bus System Using a Hybrid ML Approach. 53-60 - William Duckworth, Weixian Liao, Wei Yu:
Deblurring as a Defense against Adversarial Attacks. 61-67 - Larry Ryan, Andrew Addison, Ryan Prins, Daniel Bardsley, Eduard Mikhaylov, Barrett Wakefield, Martin O'Grady, Edward Sepulveda:
High Frequency Trading on a Low-Latency Fabric in a Cloud Environment. 68-76 - Fabricio Bortoluzzi, Barry Irwin
, Lucas Silvero Beiler, Carla Merkle Westphall:
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation. 77-85 - Michiel Van Kenhove
, Merlijn Sebrechts
, Filip De Turck
, Bruno Volckaert
:
Cloud-Native-Bench: an Extensible Benchmarking Framework to Streamline Cloud Performance Tests. 86-93 - Abigail Griffiths, Adam Morsman, Paul Veitch:
Understanding the Performance and Power Saving Tradeoffs of Server Sleep States. 94-102 - William Tärneberg, Per Skarin
:
Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic Tasks. 103-111 - Pedro Paiva Alves, Filipe Fernandes S. B. de Matos, Paulo A. L. Rego, Fernando A. M. Trinta:
A Multi-criteria Context-Sensitive Approach to Offloading Decision Making. 112-119 - Muhammad Shahid Iqbal, Chien Chen:
P4-MLFQ: A P4 implementation of Multi-level Feedback Queue Scheduling Using A Coarse-Grained Timer for Data Center Networks. 120-125 - Md. Amjad Hossain, Javed I. Khan:
ZePoP: A Distributed Leader Election Protocol using the Delay-based Closeness Centrality for Peer-to-Peer Applications. 126-134 - Ali Jalooli, Frankie Murcia:
Vehicular Edge Computing-Driven Optimized Multihop Clustering with Data Aggregation. 135-143 - Thiago Pereira da Silva, Thaís Vasconcelos Batista, Anselmo Luiz Éden Battisti, Andre Saraiva, Antonio A. de A. Rocha, Flávia Coimbra Delicato, Ian Vilar Bastos
, Evandro L. C. Macedo, Ana Cristina Bernardo de Oliveira, Paulo F. Pires:
A MAPE-K and Queueing Theory Approach for VNF Auto-scaling in Edge Computing. 144-152 - Renan A. Barbosa, João P. B. Andrade, Mauro Roberto Costa da Silva, Fernando A. M. Trinta, Paulo A. L. Rego:
Accelerating Fingerprint-based Person Identification through Computation Offloading in Edge and Cloud Environments. 153-160 - Polyzois Soumplis, Georgios Kontos, Aristotelis Kretsis, Panagiotis C. Kokkinos, Anastassios Nanos, Emmanouel A. Varvarigos:
Security-Aware Resource Allocation in the Edge-Cloud Continuum. 161-169 - Jing Wang, Amjad Soomro:
Optimal Deployment and Orchestration of Multiple Service Function Chains in 5G Networks. 170-175 - Yuhang Wang, Salman Nazir:
Preserving Location Privacy under Maritime 5G using Intent-oriented Scheme. 176-184 - Matthias Frei, Reinhard German, Anatoli Djanatliev:
Evaluating Optimistic Synchronization of Network Graphs in Mobile Networks With MEC Support. 185-193 - Zhuzhu Wang, Ying Wang:
NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. 194-202 - Yu-Sheng Liu, Shixiong Qi, Po-Yi Lin, Han-Sing Tsai, K. K. Ramakrishnan, Jyh-Cheng Chen:
L25GC+: An Improved, 3GPP-compliant 5G Core for Low-latency Control Plane Operations. 203-211 - Nurzaman Ahmed, Flavio Esposito, Okwudilichukwu Okafor, Nadia Shakoor
:
SoftFarmNet: Reconfigurable Wi-Fi HaLow Networks for Precision Agriculture. 212-220 - Sri Suvetha Meenaa Subamanian, Senthil Pon Vignesh Subramanian, Padmapriya Muthiah, Jalaluddin Mohd Ansari Shajahan:
Multi-Drone Mounted Aerial Base Stations' Enhanced Trajectories Planning with Effective Communication Strategies for FANETs. 221-228 - Shiyu Yuan, Jingda Yang, Sudhanshu Arya, Carlo Lipizzi, Ying Wang:
From Ambiguity to Explicitness: NLP-Assisted 5G Specification Abstraction for Formal Analysis. 229-237 - Nalveer Moocheet, Brigitte Jaumard, Pierre Thibault, Lackis Eleftheriadis:
A Sensor Predictive Model for Power Consumption using Machine Learning. 238-246 - Xuting Tang, Jia Xu, Shusen Wang:
RoMA: Resilient Multi-Agent Reinforcement Learning with Dynamic Participating Agents. 247-255 - Xuting Tang, Mengjiao Zhang, Abdul Rafae Khan, Steve Y. Yang, Jia Xu:
Unveiling Equity: Exploring Feature Dependency using Complex-Valued Neural Networks and Attention Mechanism for Fair Data Analysis. 256-264 - Menuka Perera Jayasuriya Kuranage, Elisabeth Hanser, Loutfi Nuaymi, Ahmed Bouabdallah, Philippe Bertin, Anwer Al-Dulaimi:
AI-assisted proactive scaling solution for CNFs deployed in Kubernetes. 265-273 - Jingda Yang, Ying Wang:
HyFuzz: A NextG Hybrid Testing Platform for Multi-step Deep Fuzzing and Performance Assessment from Virtualization to Over-the-Air. 274-280 - Andrew D'Angelo, Chenglong Fu, Xiaojiang Du, E. Paul Ratazzi:
Transformer-based Compound Correlation Miner for Smart Home Anomaly Detection. 281-289 - Weilin Zhang, Salman Toor, Mays F. Al-Naday:
Federated Machine Learning for Resource Allocation in Multi-domain Fog Ecosystems. 290-298 - Priyanka Verma, John G. Breslin, Donna O'Shea:
PerCFed: An Effective Personalized Clustered Federated Learning Mechanism to Handle non-IID Challenges for Industry 4.0. 299-306 - Chun Shan, Ziyi Zhang, Siyi Zhou:
A multi-task deep learning based vulnerability severity prediction method. 307-315 - Kebin Li, Yang You, Yuntian Tan, Shen Su, Zhihong Tian:
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion. 316-324 - Rongrong Chen, Qianlong Xiao, Minghao Hu, Jiaxu Xing, Fei Tang, Jing Qiu:
Efficient Algorithms for Obnoxious Facility Location on a Line Segment or Circle. 325-333 - Chuanle Song, Ruijie Shan, Xianfeng Li, Senfeng Lai, Chihui Liu:
Dual-Teacher for Unsupervised Text Detector in Cloud. 334-342 - Yunping Fang, Chenglong Fu, Xiaojiang Du:
Virtual-Device-Based Policy Enforcement in Multi-Admin Smart Environments. 343-351 - Jiawei Wang, Junjiang He, Wenshan Li, Xiaolong Lan, Qian Liu, Tao Li:
A Secure Duplicate Data Sharing Method against Untrusted Cloud Service Provider. 352-359 - Wuqi Qi, Wei Wu, Hao Wang, Lu Ou, Ning Hu, Zhihong Tian:
Intrusion Detection Techniques Analysis in Cloud Computing. 360-363 - Cong Hu, Zhitao Guan, Pengfei Yu, Zhen Yao, Cuicui Zhang, Ruixuan Lu, Peng Wang:
A Serverless Federated Learning Service Ecosystem for Multi-Cloud Collaborative Environments. 364-371 - Guangxia Xu, Yuling Huang, Chuang Ma:
Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme. 372-380 - Yufeng Ye, Qichao He, Peng Zhang
, Jie Xiao, Zhao Li:
Multivariate Time Series Anomaly Detection with Fourier Time Series Transformer. 381-388 - Peixin Liao, Xvxin Huang, Qiangbo Huang, Yanming Liang, Zhongxiao Wang, Denghui Zhang:
An explainable intrusion detection system based on feature importance. 389-397 - Junhan Chen, Rufeng Liang, Man Zhang, Chengcong Zheng, Xun Huang, Hui Lu, Xiang Yu, Zhihong Tian:
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation. 398-402 - Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu, Hui Lu, Xiang Yu, Zhihong Tian:
Research on the Exploitability of Binary Software Vulnerabilities. 403-407 - Zhenshan Li, Hao Liu
, Ruijie Shan, Yanbin Sun, Yu Jiang, Ning Hu:
Binary Code Similarity Detection: State and Future. 408-412 - Yunxin Jiang, Yitong Ren, Ziyu Wang, Yi Tang, Shengtao Lu, Ning Hu, Zhihong Tian, Yinghai Zhou:
OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM. 413-417 - Haowen Yi, Fan Liu, Rui Wang
, Ning Hu, Zhihong Tian:
A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior. 418-422 - Guoyi Bu, Kuo Chi
, Ting Su, Yongqin Yang:
An Energy-saving Multi-path Traffic Scheduling Approach for Data Center Networks Based on the Rate Scaling. 423-427 - Qian Qu, Simeon Ogunbunmi
, Mohsen Hatami
, Ronghua Xu, Yu Chen, Genshe Chen, Erik Blasch:
A Digital Twins Enabled Reputation System for Microchain-based UAV Networks. 428-432 - Wenbin Zhou, Qian Wang:
An Efficient Cache Eviction Strategy based on Learning and Belady Algorithm. 433-437 - Yunting Zhang
, Lin Ye, Baisong Li, Hongli Zhang:
Robustness Evaluation of Cloud-Deployed Large Language Models against Chinese Adversarial Text Attacks. 438-442 - Yue Wu, Lin Ye, Baisong Li, Hongli Zhang, Jing Cao:
Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks. 443-447 - Athanasios Chourlias, Theodoros Theodoropoulos, John Violos, Aris Leivadeas, Konstantinos Tserpes, Christos-Kyprianos Zalachoris:
A Brief Review of Population-based Methods for Task Offloading in Cloud-to-Edge Continuum. 448-453 - Piotr Sowinski, Ignacio Lacalle, Rafael Vaño, Carlos Enrique Palau:
Autonomous Choreography of WebAssembly Workloads in the Federated Cloud-Edge-IoT Continuum. 454-459 - Yiwei Cheng, Jin Nakazato, Ehsan Javanmardi, Chia-Ming Chang, Manabu Tsukada:
Pedestrian-centric Augmented Reality Visualization of Real-time Autonomous Vehicle Dynamics. 460-465 - Rodrigo Asensio Garriga, Alejandro Molina Zarca, Antonio F. Skarmeta:
A Multi-stakeholder Cloud-continuum framework for 6G Networks security & service management. 466-471 - Sunghyun Jin, Serae Kim, Kyunghan Lee:
Co-Scheduling of Radio and Computing Resources for Resource-Efficient Latency Guarantee in 6G. 472-476 - Quang Tung Thai, Myung-Eun Kim, Namseok Ko:
On design and implementation of a cloud-native B5G mobile core network. 477-482 - Engin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan, Yekta Turk:
Decentralized Identity Management for Secure Resource Sharing in O-RAN. 483-488 - Slawomir Kuklinski:
Flexible Composition of 6G Networks atop Cloud Continuum. 489-494 - Cheikh Saliou Mbacke Babou, Yasunori Owada, Masugi Inoue, Kenichi Takizawa, Toshiaki Kuri:
Distributed Self-Orchestration System based on Home 5G Concept. 495-500 - Shivam Singha
, Debajit Saha, Pallab Sarma, Pranav Kumar Singh, Uttam Ghosh, Maharaj Brahma:
SPEEDY: Small Prototyping for Number Plate Detection and Speed Estimation using Edge AI. 501-506 - Debashis Das, Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty:
Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert System. 507-512

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.