default search action
34th AINA 2020: Caserta, Italy
- Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa:
Advanced Information Networking and Applications - Proceedings of the 34th International Conference on Advanced Information Networking and Applications, AINA-2020, Caserta, Italy, 15-17 April. Advances in Intelligent Systems and Computing 1151, Springer 2020, ISBN 978-3-030-44040-4 - Yi-Hsun Lu, Fang-Yie Leu:
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks. 1-11 - Affaf Shahid, Umair Sarfraz, Muhammad Waseem Malik, Muhammad Sohaib Iftikhar, Abid Jamal, Nadeem Javaid:
Blockchain-Based Reputation System in Agri-Food Supply Chain. 12-21 - Zeeshan Aslam, Nadeem Javaid, Muhammad Adil, Muhammad Tariq Ijaz, Atta ur Rahman, Mohsin Ahmed:
An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and Demand. 22-35 - Razvan Bocu:
A Secure Distributed e-Health System for the Management of Personal Health Metrics Data. 36-51 - Ayesha Ubaid, Farookh Khadeer Hussain, Jon Charles:
Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade Lane. 52-59 - Ebtesam Hussain Almansor, Farookh Khadeer Hussain:
Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate Responses. 60-70 - Giovanni Bembo, Francesco Lo Presti:
Self-balanced IPv4-IPv6 Lossless Translators with Dynamic Addresses Mapping. 71-84 - Marek R. Ogiela, Lidia Ogiela:
Eye Tracking Technology in Personal Authentication Protocols. 85-89 - Christos Bouras, Anastasia Kollia:
Techno-Economic Analysis of MMWave vs Mid-Band Spectrum in 5G Networks. 90-105 - Fatima Tariq, Zahoor Ali Khan, Tanzeela Sultana, Mubariz Rehman, Qaiser Shahzad, Nadeem Javaid:
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare System. 106-115 - Lucas de Melo Guimarães, Jacir Luiz Bordim:
Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel Reservation. 116-126 - Christian Salim, Nathalie Mitton:
Machine Learning Based Data Reduction in WSN for Smart Agriculture. 127-138 - Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane:
A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFV. 139-152 - Taiki Morita, Xuejun Tian, Takashi Okuda:
ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor Nodes. 153-163 - Ming-Chang Lee, Jia-Chun Lin:
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction. 164-175 - Jiahui Ni, Wenqing Yin, Yong Jiang, Jingling Zhao, Yiming Hu:
Periodic Mining of Traffic Information in Industrial Control Networks. 176-183 - Tomoya Enokido, Makoto Takizawa:
The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine Environments. 184-192 - Charafeddine Mechalikh, Hajer Taktak, Faouzi Moussa:
A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing Environments. 193-203 - Vinicius Fulber-Garcia, Marcelo Caggiani Luizelli, Carlos Raniery Paula dos Santos, Elias P. Duarte Jr.:
CUSCO: A Customizable Solution for NFV Composition. 204-216 - Luciana P. Oliveira, Moroni N. Vieira, Gabriel B. Leite, Edson L. V. de Almeida:
Evaluating Energy Efficiency and Security for Internet of Things: A Systematic Review. 217-228 - Christos Bouras, Apostolos Gkamas, Vasileios Kokkinos, Nikolaos Papachristos:
IoT Geolocation Performance Using LoRaWAN. 229-239 - Caiquan Xiong, Zhuang Wang, Li Shen, Na Deng:
TF-BiLSTMS2S: A Chinese Text Summarization Model. 240-249 - Takumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe System. 250-257 - Belal Alsinglawi, Fady Alnajjar, Omar Mubin, Mauricio Novoa, Ola Karajeh, Omar Darwish:
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay Prediction. 258-267 - Yinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Distributed Approach to Fog Computing with Auction Method. 268-275 - Mounika Kasaraneni, Johnson P. Thomas:
A Self-learning Personal Privacy Assistant. 276-287 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering CM and LDVM Replacement Methods. 288-297 - Admir Barolli, Seiji Ohara, Shinji Sakamoto, Makoto Takizawa, Leonard Barolli:
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement Methods. 298-307 - Zia Ullah, Mohamed R. Elkadeem, Shaorong Wang, Muhammad Azam, Khdija Shaheen, Mehmood Hussain, Muhammad Rizwan:
A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) Problem. 308-319 - Lyazid Sabri, Abdelhak Boubetra:
Narrative Knowledge Representation and Blockchain: A Symbiotic Relationship. 320-332 - Thongtat Oransirikul, Hideyuki Takada:
Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile Devices. 333-344 - Salifou Mounchili, Soumaya Hamouda:
Better User Clustering Scheme in Distributed NOMA Systems. 345-356 - Marcus Vinicius Brito da Silva, André Augusto Pacheco de Carvalho, Arthur Selle Jacobs, Ricardo José Pfitscher, Lisandro Zambenedetti Granville:
Sample Selection Search to Predict Elephant Flows in IXP Programmable Networks. 357-368 - Van Cu Pham, Yuto Lim, Ha-Duong Bui, Yasuo Tan, Nak Young Chong, Antonio Sgorbissa:
An Experimental Study on Culturally Competent Robot for Smart Home Environment. 369-380 - Rumenigue Hohemberger, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Marcelo Caggiani Luizelli:
A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry Problem. 381-392 - Insaf Sagaama, Amine Kchiche, Wassim Trojet, Farouk Kamoun:
Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World Driving. 393-404 - Mohamed Saifeddine Hadj Sassi, Lamia Chaari Fourati:
Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of Things. 405-418 - Krzysztof Stepien, Aneta Poniszewska-Maranda:
Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil Attacks. 419-430 - Piyush Ghasiya, Koji Okamura:
Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis Approach. 431-443 - Jingling Zhao, Congxiang Yu, Yunze Ni:
A Universal Defense System Based on Backtrace Canary for ELF Against Vulnerabilities. 444-457 - Alessandro Aloisio, Alfredo Navarra:
Budgeted Constrained Coverage on Series-Parallel Multi-interface Networks. 458-469 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Computing for Distributed Services Management Protocols. 470-475 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison Study. 476-487 - Miralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Makoto Takizawa, Leonard Barolli:
A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node's Unique Encounters as a New Parameter. 488-498 - Shahab Ali, Nadeem Javaid, Danish Javeed, Ijaz Ahmad, Anwar Ali, Umar Mohammed Badamasi:
A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor Networks. 499-511 - Koichiro Sugihara, Naohiro Hayashibara:
Performance Evaluation of Nomadic Lévy Walk on Unit Disk Graphs Using Hierarchical Clustering. 512-522 - Mai Ibraheam, Fayez Gebali, Kin Fun Li, Leonard Sielecki:
Animal Species Recognition Using Deep Learning. 523-532 - Sirine Mnejja, Yassine Aydi, Mohamed Abid, Salvatore Monteleone, Maurizio Palesi, Davide Patti:
Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCs. 533-546 - Besfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles:
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms. 547-558 - Dongchu Su, Yong Li, Bo Yuan:
SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V Pipeline. 559-565 - Mohamed Anis Fekih, Ichrak Mokhtari, Walid Bechkit, Yasmine Belbaki, Hervé Rivano:
On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSN. 566-578 - Shuraia Khan, Farookh Khadeer Hussain:
Evaluation of SLA Negotiation for Personalized SDN Service Delivery. 579-590 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:
Trust-Based Decision Making for Food-Energy-Water Actors. 591-602 - Davinder Kaur, Suleyman Uslu, Arjan Durresi, George O. Mohler, Jeremy G. Carter:
Trust-Based Human-Machine Collaboration Mechanism for Predicting Crimes. 603-616 - Nour El Houda Ben Chaabene, Amel Bouzeghoub, Ramzi Guetari, Samar Balti, Henda Hajjami Ben Ghézala:
Detection of Users' Abnormal Behavior on Social Networks. 617-629 - Himani Sikarwar, Debasis Das, Sumit Kalra:
Efficient Authentication Scheme Using Blockchain in IoT Devices. 630-641 - Sudhakar Murugasen, Shankar Raman, Kamakoti Veezhinathan:
VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in Cloud. 642-656 - Pratik Kumar Sinha, Subhrabrata Choudhury, Animesh Dutta:
On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc Networks. 657-668 - Joglas Souza, Carson K. Leung, Alfredo Cuzzocrea:
An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease Analytics. 669-680 - Hosni Manai, Larbi Ben Hadj Slama, Ridha Bouallegue:
Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO Networks. 681-692 - Rocco Langone, Alfredo Cuzzocrea, Nikolaos Skantzos:
A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 Environments. 693-702 - José A. T. Gavazza, Juliano Coelho Melo, Thiago Bueno da Silva, Antônio Marcos Alberti, Pedro Frosi Rosa, Flávio de Oliveira Silva, Fábio Luciano Verdi, José Augusto Suruagy Monteiro:
Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures Interconnection. 703-714 - Markus Aleksy, Philipp Bauer:
Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building Automation Systems. 715-721 - Aneta Poniszewska-Maranda, Maciej Pluta:
Analysis of Human Vital Functions Based on Data from Internet of Things Devices. 722-733 - Ibtihel Selmi, Nadia Kabachi, Sana Ben Abdallah, Chirine Ghedira Guégan, Hajer Baazaoui Zghal:
Adaptive Multi-agent-based Alert System for Diseases' Detection. 734-745 - João Carlos Giacomin, Gustavo Figueiredo Araújo, Tales Heimfarth:
Anycast MAC Protocol with Advanced Preamble for Wireless Sensor Networks. 746-757 - Joanna Ochelska-Mierzejewska:
Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing Problem. 758-767 - Kemal Ihsan Kilic, Orhan Gemikonakli, Leonardo Mostarda:
Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVs. 768-779 - Gianluca De Luca Fiscone, Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri:
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis. 780-791 - Ryoichi Shinkuma, Rieko Takagi, Yuichi Inagaki, Eiji Oki, Fatos Xhafa:
Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine Learning. 792-803 - Paulo Aragao, Reinhard Gotzhein:
Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing Schedules. 804-816 - Jerzy Proficz, Piotr Sumionka, Jaroslaw Skomial, Marcin Semeniuk, Karol Niedzielewski, Maciej Walczak:
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns. 817-829 - Rodrigo Moreira, Pedro Frosi Rosa, Rui Luis Andrade Aguiar, Flávio de Oliveira Silva:
Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs). 830-844 - Amir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré:
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. 845-857 - Rafael Hengen Ribeiro, Arthur Selle Jacobs, Ricardo Parizotto, Luciano Zembruzki, Alberto Egon Schaeffer Filho, Lisandro Zambenedetti Granville:
A Bottom-Up Approach for Extracting Network Intents. 858-870 - Luciano Zembruzki, Arthur Selle Jacobs, Gustavo Spier Landtreter, Lisandro Zambenedetti Granville, Giovane C. M. Moura:
[inline-graphic not available: see fulltext]: Measuring Centralization of DNS Infrastructure in the Wild. 871-882 - Vanice Canuto Cunha, Arturo A. Z. Zavala, Pedro R. M. Inácio, Damien Magoni, Mário M. Freire:
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance. 883-897 - Eduardo K. Viegas, Altair Santin Santin, Vinicius Vielmo Cogo, Vilmar Abreu:
Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model Updates. 898-909 - Sami Abdellatif, Okba Tibermacine, Walid Bechkit, Abdelmalik Bachir:
Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster Situations. 910-921 - Rafael de Jesus Martins, Rodolfo B. Hecht, Ederson Ribas Machado, Jéferson Campos Nobre, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville:
Micro-service Based Network Management for Distributed Applications. 922-933 - Mohamad Salhani:
Offloading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communications. 934-946 - Maroua Shili, Moufida Hajjaj, Mohamed Lassaad Ammari:
Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO Systems. 947-956 - Alfonso Di Pace, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Aldo Meglio, Francesco Orciuoli:
Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution Systems. 957-967 - Abd El Heq Silem, Hajer Taktak, Faouzi Moussa:
Dynamic User Interests Profiling Using Fuzzy Logic Application. 968-979 - Yuanyi Qi, Jianhua Yang, Yongzhong Zhang:
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking. 980-993 - Jefferson Pereira da Silva, Eduardo Alchieri, Jacir Luiz Bordim, Lucas Rodrigues Costa:
A Secure and Distributed Control Plane for Software Defined Networks. 994-1006 - Hayam Alamro, Costas S. Iliopoulos, Grigorios Loukides:
Efficiently Detecting Web Spambots in a Temporally Annotated Sequence. 1007-1019 - Dharmendra Prasad Mahato:
On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony Optimization. 1020-1031 - Lucas Camelo Casagrande, Guilherme Piêgas Koslovski, Charles Christian Miers, Maurício A. Pillon:
DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement Learning. 1032-1044 - Amar Nath, Rajdeep Niyogi:
Communication QoS-Aware Navigation of Autonomous Robots for Effective Coordination. 1045-1056 - Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia, Domenico Marino, Francesco Orciuoli, Alberto Volpe:
Semantic CPPS in Industry 4.0. 1057-1068 - Serena Pelosi:
Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian Language. 1069-1077 - Maria Carmela Catone, Paolo Diana, Giuseppe Giordano:
Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research Methods. 1078-1088 - Sujata Swain, Rajdeep Niyogi:
Context-Aware Service Composition with Functionally Equivalent Services for Complex User Requests. 1089-1100 - Sergi Vila, Nilson Moraes, Fernando Guirado, Josep L. Lérida, Fernando Cores, Fábio L. Verdi:
Cloud Resources Reassignment Based on CPU and Bandwidth Correlation. 1101-1113 - Michail S. Alexiou, Euripides G. M. Petrakis:
Elixir: An Agent for Supporting Elasticity in Docker Swarm. 1114-1125 - Amel Ben Lazreg, Anis Ben Arbia, Habib Youssef:
A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing Approach. 1126-1137 - Khaoula Braiki, Habib Youssef:
Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance Comparison. 1138-1149 - Fadwa Yahya, Zakaria Maamar, Khouloud Boukadi:
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination. 1150-1161 - Imad Berrouyne, Mehdi Adda, Jean-Marie Mottu, Jean-Claude Royer, Massimo Tisi:
A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of Things. 1162-1175 - Zakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, Bita Banihashemi:
Towards an Approach for Validating the Internet-of-Transactional-Things. 1176-1188 - Neofytos Zacharia, Konstantinos Tsakos, Euripides G. M. Petrakis:
iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the Cloud. 1189-1200 - Stelios Botonakis, Aimilios Tzavaras, Euripides G. M. Petrakis:
iSWoT: Service Oriented Architecture in the Cloud for the Semantic Web of Things. 1201-1214 - Vilmar Abreu, Altair Olivo Santin, Eduardo K. Viegas, Vinicius Vielmo Cogo:
Identity and Access Management for IoT in Smart Grid. 1215-1226 - Rosana Lachowski, Marcelo E. Pellenz, Edgard Jamhour, Manoel Camillo Penna, Guilherme Luiz Moritz, Glauber Brante, Richard D. Souza:
Information Centric Protocols to Overcome the Limitations of Group Communication in the IoT. 1227-1238 - Fatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha:
Prevention of DDoS Attacks in IoT Networks. 1239-1250 - Kuang-Yen Tai, Tzer-Shyong Chen, Frank Yeong-Sung Lin, Po-Min Huang, Jing-Chen Tu:
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record. 1251-1264 - Thamer Alhussain, Ahmad Ali AlZubi, Osama Alfarraj, Salem Alkhalaf, Musab S. Alkhalaf:
Development of an Information Security Management Model for Enterprise Automated Systems. 1265-1277 - Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. 1278-1290 - Ming-Chang Lee, Jia-Chun Lin, Ernst Gunnar Gran:
RePAD: Real-Time Proactive Anomaly Detection for Time Series. 1291-1302 - Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin:
An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts. 1303-1318 - Bowen Sun, Bo Wang, Baojiang Cui, Yeqi Fu:
Greybox Fuzzing Based on Ant Colony Algorithm. 1319-1329 - Yuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use. 1330-1340 - David Ifeoluwa Adelani, Haotian Mai, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen:
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection. 1341-1354 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa, Jacir Luiz Bordim, Eduardo Adílio Pelinson Alchieri:
New Programmable Data Plane Architecture Based on P4 OpenFlow Agent. 1355-1367 - Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation. 1368-1382 - Jarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova:
Using Four Modalities for Malware Detection Based on Feature Level and Decision Level Fusion. 1383-1396 - Lionel N. Tidjon, Marc Frappier, Amel Mammar:
Intrusion Detection Using ASTDs. 1397-1411 - Raffaele D'Arco, Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri:
On the File Recovery in Systems Infected by Ransomware. 1412-1425 - Chunlan Zhang, Lihua Dong:
An Improved Fast Correlation Attack on Fruit-80. 1426-1436 - Roger Robson dos Santos, Eduardo Kugler Viegas, Altair O. Santin, Vinicius Vielmo Cogo:
A Long-Lasting Reinforcement Learning Intrusion Detection Model. 1437-1448 - Mohsin Ur Rahman, Barbara Guidi, Fabrizio Baiardi, Laura Ricci:
Context-Aware and Dynamic Role-Based Access Control Using Blockchain. 1449-1460 - Nourhène Ben Rabah, Ines Ben Tekeya:
A Framework for Classifying Web Attacks While Respecting ML Requirements. 1461-1473 - Chinedu I. Ossai, Ifeanyi P. Egwutuoha:
Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion Battery. 1474-1488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.