default search action
38th AINA 2024: Kitakyushu, Japan
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4. Lecture Notes on Data Engineering and Communications Technologies 202, Springer 2024, ISBN 978-3-031-57915-8 - Rihem Zorgati, Hamdi Hassen, Kahlil Ahmad Alsulbi:
The Deployment of E-Learning Application as a Web Service in a Cloud Broker Architecture. 1-12 - Yining Hu, Alistair McFarlane, Farookh Hussain:
CarbonApp: Blockchain Enabled Carbon Offset Project Management. 13-25 - Nicolas Keiji Cattani Sakashita, Maurício Aronne Pillon, Charles Christian Miers, Guilherme Piêgas Koslovski:
Investigating the Impact of Congestion Control Algorithms on Edge-Cloud Continuum. 26-37 - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Design and Implementation of a Fuzzy-Based System for Assessment of Relational Trust. 38-47 - Baskoro Adi Pratomo, Stefanus A. Kosim, Hudan Studiawan, Angela O. Prabowo:
BarongTrace: A Malware Event Log Dataset for Linux. 48-60 - Ronald Petrlic:
Specifying SSI over EAP: Towards an Even Better Eduroam in the Future. 61-73 - Subashiny Tanigassalame, Yohan Pipereau, Adam Chader, Jana Toljaga, Gaël Thomas:
FastSGX: A Message-Passing Based Runtime for SGX. 74-85 - Fatma Shalabi, Hichem Felouat, Huy H. Nguyen, Isao Echizen:
Leveraging Chat-Based Large Vision Language Models for Multimodal Out-of-Context Detection. 86-98 - Gabriel Rossi Figlarz, Fabiano Passuelo Hessel:
Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method. 99-110 - Hideki Sakurada, Kouichi Sakurai:
SoK: Directions and Issues in Formal Verification of Payment Protocols. 111-119 - Takuya Suzuki, Hayato Yamana:
PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN. 120-132 - Yang Lyu, Yaokai Feng, Kouichi Sakurai:
Design and Performance Evaluation of a Two-Stage Detection of DDoS Attacks Using a Trigger with a Feature on Riemannian Manifolds. 133-144 - Md Hasan Shahriar, Abrar Hasin Kamal, Anne V. D. M. Kayem:
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings. 145-158 - Urszula Ogiela, Marek R. Ogiela:
Towards User-Oriented Steganography. 159-165 - Marek R. Ogiela, Lidia Ogiela:
AI-Based Cybersecurity Systems. 166-173 - Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS Systems. 174-186 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Messages and Incentives to Promote Updating of Software on Smartphones. 187-200 - Juarez Oliveira, Altair O. Santin, Eduardo Viegas, Pedro Horchulhack:
A Non-interactive One-Time Password-Based Method to Enhance the Vault Security. 201-213 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:
Causal Inference to Enhance AI Trustworthiness in Environmental Decision-Making. 214-225 - Rildo Antonio de Souza, Vitor de Castro-Silva, Sylvio Barbon Junior, Bruno Bogaz Zarpelão:
Forecasting Malware Incident Rates in Higher Education Institutions. 226-237 - Thanaporn Sanamontre, Vasaka Visoottiviseth, Chaiyong Ragkhitwetsagul:
Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning. 238-251 - Hamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, Kazuhiro Fukui, Saddek Bensalem:
Neural Network Innovations in Image-Based Malware Classification: A Comparative Study. 252-265 - Zhicheng Dou, Yuchen Guo, Ching-Chun Chang, Huy H. Nguyen, Isao Echizen:
Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis. 266-277 - Nghia Dinh, Huy Tran Tien, Viet-Tuan Le, Huu-Thanh Duong, Lidia Ogiela, Vinh Truong Hoang:
Cognitive Blind Blockchain CAPTCHA Architecture. 278-288 - Andrew Jessup, Henrique Zanela Cochak, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Pedro H. B. Correia, Marco A. Marques, Marcos A. Simplício Jr.:
DVID: Adding Delegated Authentication to SPIFFE Trusted Domains. 289-300 - Mamun I. Abu-Tair, Unsub Zia, Jamshed Memon, Bryan W. Scotney, Jorge Martínez Carracedo, Ali Sajjad:
Transparent Encryption for IoT Using Offline Key Exchange over Public Blockchains. 301-313 - Badis Hammi, Tristan Bilot, Danyil Bazain, Nicolas Binand, Maxime Jaen, Chems Mitta, Nour El Madhoun:
An End-to-End Approach for the Detection of Phishing Attacks. 314-325 - Emanuele Scala, Leonardo Mostarda:
Efficient Inner-Product Argument from Compressed Σ-Protocols and Applications. 326-337 - Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler, Saadi Boudjit:
A Decentralized Blockchain-Based Platform for Secure Data Sharing in Cloud Storage Model. 338-348 - Chunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai:
Enhancing Security and Efficiency: A Lightweight Federated Learning Approach. 349-359 - Guilherme Falcão da Silva Campos, Jovani Dalzochio, Raul Ceretta Nunes, Luís Alvaro de Lima Silva, Edison Pignaton de Freitas, Rafael Kunst:
Using Biometric Data to Authenticate Tactical Edge Network Users. 360-371 - Maurício de Vasconcelos Barros, Jean Everson Martina:
SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign Identity. 372-383 - Manish Pandey, Harkeerat Kaur, Sudipta Basak, Isao Echizen:
Privacy-Preserving Location-Based Services: A DQN Algorithmic Perspective. 384-399 - Lalitha Chavali, Paresh Saxena, Barsha Mitra:
Knowledge Empowered Deep Reinforcement Learning to Prioritize Alerts Generated by Intrusion Detection Systems. 400-411 - Fabio Junior Bertinatto, Daniel Arioza, Jéferson Campos Nobre, Lisandro Zambenedetti Granville:
Container-Level Auditing in Container Orchestrators with eBPF. 412-423 - Jing Ning, Kin Fun Li:
A Study on Privacy-Preserving Transformer Model for Cross-Domain Recommendation. 424-435 - Md Fahad Monir, Azwad Fawad Hasan:
Exploring SDN Based Firewall and NAPT: A Comparative Analysis with Iptables and OVS in Mininet. 436-447 - Carlos André Rodrigues da Silva, Lauro de Souza Silva, Julio Cesar Santos dos Anjos, Jorgito Matiuzzi Stocchero, Juliano Araujo Wickboldt, Edison Pignaton de Freitas:
SDN Supported Network State Aware Command and Control Application Framework. 448-459 - Hung-You Chen, Pi-Chung Wang:
Reliability-Aware SFC Protection by Using Nodes with Spare Resources. 460-470 - Italo Tiago da Cunha, Eduardo Castilho Rosa, Rodrigo Moreira, Flávio de Oliveira Silva:
Highly Reliable Communication Using Multipath Slices with Alternating Transmission. 471-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.