default search action
48th LCN 2023: Daytona Beach, FL, USA
- Sharief Oteafy, Eyuphan Bulut, Florian Tschorsch, Kanchana Thilakarathna:
48th IEEE Conference on Local Computer Networks, LCN 2023, Daytona Beach, FL, USA, October 1-5, 2023. IEEE 2023, ISBN 979-8-3503-0074-1 - Alexander Brundiers, Timmy Schüller, Nils Aschenbruck:
Combining Midpoint Optimization and Conventional End-to-End Segment Routing for Traffic Engineering. 1-9 - Alvi Ataur Khalil, Mohammad Ashiqur Rahman:
Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVs. 1-9 - Nehal Baganal Krishna, Tuan-Dat Tran, Ralf Kundel, Amr Rizk:
RPM: Reverse Path Congestion Marking on P4 Programmable Switches. 1-4 - Ekaterina Volodina, Erwin P. Rathgeb:
The ACK Policy Optimization Algorithm for QUIC. 1-8 - Katharina O. E. Müller, Louis Bienz, Bruno Rodrigues, Chao Feng, Burkhard Stiller:
HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices. 1-9 - Nirhoshan Sivaroopan, Chamara Madarasingha, Shashika Muramudalige, Guillaume Jourjon, Anura P. Jayasumana, Kanchana Thilakarathna:
SyNIG: Synthetic Network Traffic Generation through Time Series Imaging. 1-9 - Roman Rader, Kamil Jerábek, Ondrej Rysavý:
Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study. 1-4 - Eric Lanfer, Sophia Sylvester, Nils Aschenbruck, Martin Atzmueller:
Leveraging Explainable AI Methods Towards Identifying Classification Issues on IDS Datasets. 1-4 - Fatih Senel, Nils Aschenbruck:
Optimizing the Deployment of UAV for Mesh Access Network Coverage. 1-9 - Artur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick, Bernd Freisleben:
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks. 1-4 - Junkai He, Makhlouf Hadji, Djamal Zeghlache:
Constrained Dynamic Virtual Network Embedding. 1-6 - Pia Baumstark, David Monschein, Oliver P. Waldhorst:
Secure Plaintext Acquisition of Homomorphically Encrypted Results for Remote Processing. 1-4 - Nikolas Wintering, Jannis Mast, Thomas Hänel, Nils Aschenbruck:
Trade-Off Between Compression and FEC in Image Transmission Over Wifibroadcast. 1-9 - Farinaz Jowkarishasaltaneh, Jason But:
msTEACUP - Running Repeatable Experiments with MPTCP over Complex Network Topologies. 1-4 - Mohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
Towards Automatic Annotation and Detection of Fake News. 1-9 - Asif Ali Mehmuda, Reza Hedayati Majdabadi, Mea Wang, Diwakar Krishnamurthy:
Antifreeze: High-Quality Adaptive Live Streaming with Real-time Transcoder. 1-4 - Jonas Schulz, Hristina Radak, Phuong T. Nguyen, Giang T. Nguyen, Frank H. P. Fitzek:
On the Limits of Lossy Compression for Human Activity Recognition in Sensor Networks. 1-4 - Daniel Otten, Max Ilsen, Markus Chimani, Nils Aschenbruck:
Green Traffic Engineering by Line Card Minimization. 1-8 - Daniel Weber, Christoph Fuchs, Nils Auler, Bertram Schütz, Nils Aschenbruck:
Multipath TCP Scheduling in the Age of Buffer Bloat Optimizations. 1-8 - Gatien Roujanski, Michel Marot, Hossam Afifi, Adel Mounir Sareh Said:
Cellular network offloading through Drone Cooperation. 1-4 - Arshiya Rezaie Hezaveh, Mehdi Nobakht:
On Priority-Based Scheduling for Network Updates in SDN. 1-4 - Taylor Bradley, Lanier Watkins, Elie Alhajjar:
Autonomic Cyber Security Enhanced with Survival Analysis (ACSeSA). 1-9 - Karthik Muthineni, Alexander Artemenko:
From C-Band to mmWave-Band: Ray-Tracing-Assisted 5G-Based Indoor Positioning in Industrial Scenario. 1-7 - Ying Li, Junwu Zhu, Xu Liu:
Effective Resource Allocation and Pricing Mechanism for MEC under Two-Price Equilibrium. 1-9 - Ahmed Shokry, Moustafa Youssef:
QRadar: A Deployable Quantum Euclidean Similarity Large-scale Localization System. 1-8 - Tyler Kvochick, Julia Byon, Mike Candler, Kendra Lockard, Eli Phillips, Tommy Schaefer, Alex Serriere, Sana Moghul, Casey Wittkop, Marc Wolfe:
Demo: Software-Based Design of Data Center Networking Infrastructure. 1-4 - Jingyuan Zhang, Douglas M. Blough:
Coverage Analysis for Multi-Hop Communication in Intelligent-Surface-Assisted mmWave WLANs. 1-9 - Hauton Tsang, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba:
Meta-ATMoS+: A Meta-Reinforcement Learning Framework for Threat Mitigation in Software-Defined Networks. 1-9 - Kai Cui, Lars Baumgärtner, Mustafa Burak Yilmaz, Mengguang Li, Christian Fabian, Benjamin Becker, Lin Xiang, Maximilian Bauer, Heinz Koeppl:
UAV Swarms for Joint Data Ferrying and Dynamic Cell Coverage via Optimal Transport Descent and Quadratic Assignment. 1-8 - Daniel Commey, Benjamin Appiah, Bill K. Frimpong, Isaac Osei, Ebenezer N. A. Hammond, Garth V. Crosby:
EGAN: Evolutional GAN for Ransomware Evasion. 1-9 - Michael Burke, Mohamed Younis:
Humidity Estimation Using WiFi Channel State Information. 1-4 - Ahmad Sarlak, Abolfazl Razi, Xiwen Chen, Rahul Amin:
Diversity Maximized Scheduling in RoadSide Units for Traffic Monitoring Applications. 1-4 - Mohammed Nasereddin, Mert Nakip, Erol Gelenbe:
Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. 1-4 - Hugo Santos, Bruno S. Martins, Denis Rosário, Eduardo Cerqueira, Torsten Braun:
Mobility-aware Service Function Chaining Orchestration for Multi-user Augmented Reality. 1-9 - Michael König, Oliver P. Waldhorst, Martina Zitterbart:
QUIC(k) Enough in the Long Run? Sustained Throughput Performance of QUIC Implementations. 1-4 - Carlos Ruiz De Mendoza, Cristina Cervelló-Pastor, Sebastià Sallent:
Optimal Resource Placement in 5G/6G MEC for Connected Autonomous Vehicles Routes Powered by Deep Reinforcement Learning. 1-4 - Maryam Ataei Kachooei, Jae Chung, Feng Li, Benjamin Peters, Mark Claypool:
SEARCH: Robust TCP Slow Start Performance over Satellite Networks. 1-4 - Aya Jaradat, Moad Mowafi, Eyad Taqieddin:
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps. 1-4 - Daniel Otten, Alexander Brundiers, Timmy Schüller, Nils Aschenbruck:
Green Segment Routing for Improved Sustainability of Backbone Networks. 1-9 - Md Washik Al Azad, Hasniuj Zahan, Sifat Ut Taki, Spyridon Mastorakis:
DarkHorse: A UDP-based Framework to Improve the Latency of Tor Onion Services. 1-6 - Lucas Bréhon-Grataloup, Rahim Kacimi, André-Luc Beylot:
Field Trial for Enhanced V2X Multi-RAT Handover in Autonomous Vehicle Networks. 1-8 - Erik Daniel, Marcel Ebert, Florian Tschorsch:
Improving Bitswap Privacy with Forwarding and Source Obfuscation. 1-4 - Xuejian Li, Mingguang Wang:
Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal Verification. 1-4 - Bulat Nasrulin, Rowdy Chotkan, Johan Pouwelse:
Sustainable Cooperation in Peer-To-Peer Networks. 1-9 - Hnin Pann Phyu, Diala Naboulsi, Razvan Stanica, Gwenael Poitau:
Towards Energy Efficiency in RAN Network Slicing. 1-9 - Marek Michalski:
The Virtual Test Bed for EON FPGA Controllers based on UVM Mechanisms and Tools. 1-4 - Bryan Martin, Chad A. Bollmann:
Characterizing Changes in Self-Similarity Between Edge and Core Network Traffic. 1-4 - Richard Hernandez, Oscar G. Bautista, Mohammad Hossein Manshaei, Abdulhadi Sahin, Kemal Akkaya:
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC. 1-4 - Eloise Stein, Quentin Bramas, Tommaso Colombo, Cristel Pelsser:
Fault-adaptive Scheduling for Data Acquisition Networks. 1-4 - Luyao Chen, Yong Tang, Siyang Chen, Jingwen Xia, Ting Yang, Wenyong Wang:
Beyond the Field of View: Neglected Audio Part in VR Video Transmission Frameworks. 1-4 - Tasdiqul Islam, Engin Arslan:
A Heuristic Approach for Scalable Quantum Repeater Deployment Modeling. 1-9 - Wei Wan, Ke Wang, Jinxia Wei, Liangyi Gong, Pan Huang, Hao Fu, Yuhao Fu:
Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder. 1-4 - Huapeng Yang, Zhangqin Huang, Yu Liang, Xiaobo Zhang, Ling Huang, Shen Qiu:
IVAS: An Intelligent Video Analysis System based on Edge Computing. 1-4 - Negar Emami, Antonio Di Maio, Torsten Braun:
FedForce: Network-adaptive Federated Learning for Reinforced Mobility Prediction. 1-9 - Philippe Ea, Paul Vidart, Osman Salem, Ahmed Mehaoua:
Cyberbullying Messages Detection: A Comparative Study of Machine Learning Algorithms. 1-4 - Eric Wagner, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, Martin Henze:
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols. 1-9 - Amirahmad Chapnevis, Eyuphan Bulut:
AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection. 1-6 - Jonas Andre, Stephan M. Günther, Georg Carle:
An Accuracy Study of Emulation Daemons for IEEE 802.11 Networks. 1-9 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:
Decision Tree-Based Confidentiality Self-Management in the Internet of Things. 1-4 - Yuxin Zhao, Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu:
Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles. 1-4 - Cuong Dao, Van Tong, Nam-Thang Hoang, Hai Anh Tran, Truong X. Tran:
Enhancing Encrypted Traffic Classification with Deep Adaptation Networks. 1-4 - Olga Kondrateva, Stefan Dietzel, Björn Scheuermann:
Joint Source-and-Channel Coding for Small Satellite Applications. 1-9 - Ibrahim M. Amer, Sharief M. A. Oteafy, Hossam S. Hassanein:
Affective Communication of Sensorimotor Emotion Synthesis over URLLC. 1-4 - Rathindra Nath Dutta, Sasthi C. Ghosh:
Non-optimal is Good! Resource Allocation in Presence of Dynamic Obstacles in D2D Networks. 1-7 - Rathindra Nath Dutta, Sasthi C. Ghosh:
Energy Efficient Resource Allocation for D2D Communications using Reinforcement Learning. 1-7 - Konrad Wolsing, Antoine Saillard, Elmar Padilla, Jan Bauer:
XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles. 1-6 - Stefanie Thieme, Dominic Laniewski, Leonhard Brüggemann, Eric Lanfer, Bertram Schütz, Nils Aschenbruck:
Demo: A Reproducible Link Emulation Environment for the Evaluation of Network-Coded Video Streaming. 1-3 - Giacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo:
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems. 1-6 - Logan Drazovich, Susanne Wetzel:
Cyber Insurance in the Maritime Transportation System. 1-6 - Brien Croteau:
Lessons Learned from Teaching a Maritime Industrial Control Systems Cybersecurity Course. 1-6 - Alisa Stiballe, Simon Welzel, Johannes Dorfschmidt, Darvin Schluter, Dominik Delgado Steuter, Jannik Lukas Hense, Florian Klingler:
Demo: Chat based Emergency Service via Long Range Wireless Communication (LoRa). 1-3 - Matthias Frank, Spartak Ehrlich:
Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) Protocol. 1-3 - Gunnar Schneider, Michael Goetz, Ivor Nissen:
Design and Implementation of a Gateway Buoy for the Underwater-IoT. 1-6 - Joanna Sliwa, Konrad S. Wrona, Tsvetelina Shabanska, Alim Solmaz:
Lightweight quantum-safe cryptography in underwater scenarios. 1-6 - Mustafa Ilhan Akbas, Mahesh Menase, Rahul Razdan:
Demo: Modular Test Frameworks for PolyVerif Autonomous Vehicle Validation Environment. 1-4 - Jose A. Gonzalez Nuñez, Mustafa Ilhan Akbas:
Demo: Agent-Based Crowdsensing Simulation for Urban Meteorological Data Collection and Hybrid Aerial-Terrestrial Route Determination. 1-4 - Ibrahim M. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein:
Demo: Leveraging Edge Intelligence for Affective Communication over URLLC. 1-4 - Sara Yavari, Sharief Oteafy:
Demo: Remote Heart Assessment using Deep Learning over IoT Phonocardiograms. 1-4 - Giulio Meucci, Bertan Karahoda, Amir Hosein Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli Forti:
Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANs. 1-6 - Alessandro Cantelli Forti, Michele Colajanni, Silvio Russo:
Penetrating the Silence: Data Exfiltration in Maritime and Underwater Scenarios. 1-6 - Jeroen Pijpker, Stephen James McCombie:
A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.