


default search action
39th AINA 2025: Barcelona, Spain
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 39th International Conference on Advanced Information Networking and Applications, AINA 2025, Barcelona, Spain, 9-11 April 2025, Volume 4. Lecture Notes on Data Engineering and Communications Technologies 248, Springer 2025, ISBN 978-3-031-87771-1 - Zhihan Cui, Jiancheng Chi, Yuto Lim, Yasuo Tan:
Broad Learning System Scheme for Multi-server MEC Wireless Networks. 1-12 - R. Madhusudhan, Saurabh V. Surashe, P. Pravisha:
Enhancing Cybersecurity: Malicious Webpage Detection Using Machine and Deep Learning. 13-24 - Alex Orsholits, Manabu Tsukada:
Context-Rich Interactions in Mixed Reality Through Edge AI Co-processing. 25-38 - Dhaval S. Jha, Rajdeep Niyogi:
A Swarm Intelligence Approach to Safeguard UAVs for Reconnaissance. 39-49 - Anouar Jridi, Marouen Kachroudi, Marius Zaharia, Mohamed Farah:
Towards an Efficient Semantic Modelling for Kubernetes Environments. 50-60 - Nedra Amara:
Machine Learning Based-Proactive Caching for Cellular Networks. 61-76 - Amal Jlassi, Sami Hafsi, Walid Barhoumi:
UTI-Dx-ViT: Enhancing UTI Diagnosis with YOLOv8 Segmentation and Vision Transformer-Based Classification. 77-88 - Marcus V. Diniz dos Reis, Rodrigo Moreira, Larissa Ferreira Rodrigues Moreira, Flávio de Oliveira Silva
:
Estimating Application Performance in Container-Based Environments: A Cross-Domain Monitoring Approach. 89-100 - Nader Khedhri, Monia Najar:
Reinforcement Learning-Based Adaptive Modulation Systems. 101-112 - Sachin Sharma
, Jiho Noh, Michail S. Alexou
:
Investigating the Transferability and Robustness of Adversarial Attacks Between Standard and Dilated CNN Architectures. 113-126 - Shanyi Xie, Congcong Zhan, Jun Zuo, Xingwang Li, Gang Zhou, Yan Li, Caiyan Nong:
Traffic Classification Method of Power Information Communication Network Based on Multi-mode Competitive Feature Selection. 127-137 - Maysam Chaari
, Yassine Ben Ayed:
Optimized Hybrid Deep Learning Model for Accurate Classification of Alzheimer's Stages. 138-150 - David Beserra, Robert Nantchouang, Mickael Chau, Marc Espie, Patricia Takako Endo, Jean Araujo:
How Effective are OS-Level Virtualization Tools for Managing Containers? 151-162 - Antonio Sousa, David Beserra, Jean Araujo:
Performance Evaluation of Serverless Computing Infrastructure: Insights from Open-Source Frameworks. 163-174 - Ismehene Chaouch, Anis Naanaa, Sadok El Asmi:
Enhanced Image Security in Cloud Computing Using Hybrid Encryption with ECC and Spatiotemporal Cryptography. 175-187 - Dilawaer Duolikun, Shigenari Nakamura
, Tomoya Enokido, Makoto Takizawa:
A Network-Based Selection Algorithm of an Energy-Efficient Succeeding Fog Node in the NBFC Model. 188-197 - Robert Williamson
, Carlos Reaño
, Jesús Martínez del Rincón
, Anastasios Koidis:
SaaS-Enabled RGB to Hyperspectral Imaging: A Novel Paradigm in Image Processing Technology. 198-210 - Theodor-Radu Grumeza, Thomas-Andrei Lazar, Alexandra Emilia Fortis:
Development of a Transformer-Based Large Language Model Architecture in Cloud. 211-222 - Rodrigo Mompo Redoli, Amjad Ullah:
Kubernetes in the Cloud vs. Bare Metal: A Comparative Study of Network Costs. 223-233 - Jiaming Wang
, Kai Yang, Wei Cong, Minjing Li, Lihui Bai, Xu An Wang:
High-Precision Network Intrusion Detection Method Based on NIDS-CNNRF. 234-243 - Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
A Secure Routing Protocol for Opportunistic Networks. 244-256 - Saad El Jaouhari, Andrei Vavilov, Julia Soloveva, Alexandru Archip, Nour El Madhoun:
MIDPS: A Multi-agent Host Intrusion Detection and Prevention System. 257-268 - Raffaele Pizzolante, Arcangelo Castiglione, Michele Mastroianni
, Francesco Palmieri:
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks. 269-281 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Vanessa Bracamonte, Masakatsu Nishigaki:
Do Regularly Personalized Security Messages Cause Habituation? 282-296 - Victor Manuel Gonzalez-Gorrín, Josep Prieto-Blázquez, Joan Arnedo-Moreno:
A Hybrid Machine Learning Method for Detecting Metamorphic Malware. 297-307 - Adrian Brodzik, Wojciech Mazurczyk:
Assessing the Threat of Neural Network Enhanced Obfuscation in Malware. 308-323 - Kamil Wozniak
, Marek R. Ogiela, Lidia Ogiela:
New Distributed Steganographic Techniques. 324-334 - Nghia Dinh
, Huy Tran Tien, Lidia Ogiela, Vinh Truong Hoang
, Václav Snásel:
Blockchain-Enabled Verifiable Credential CAPTCHA. 335-344 - Shunya Higashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Evaluation of User Trust: Effect of Tie Strength on User Trust in Online Social Networks. 345-353 - Arcangelo Castiglione, Teresa Elia:
Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks. 354-366 - Afaq Inayat, Matheus Saueressig, Muriel Figueredo Franco, Eder John Scheid, Lisandro Zambenedetti Granville:
Employing PDDL Plan to Recommend Security Controls Against Cyberattacks. 367-379 - Pawel Rajba, Wojciech Mazurczyk, Jörg Keller:
Double Proof-of-Work Scheme for the Key Transfer in the Steganographic Communication. 380-393 - Miltiadis Alamaniotis:
Intelligent System for Enhancing Nuclear Security in the Design of Maritime Ports Hosting Nuclear-Powered Ships. 394-405 - Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil:
Privacy Benchmarking of Intrusion Detection Sytems. 406-417 - Aleksandra Macura, Marek R. Ogiela, Lidia Ogiela:
Application of CAPTCHA Codes in User Authorization Protocols. 418-425 - Marek R. Ogiela, Urszula Ogiela:
Multi-secret Steganography Based on Polymorphic Keys. 426-431 - Ali Mustafa, Fouad Trad, Ali Chehab:
Leveraging Large Language Models for Reducing False Positives and Prioritizing Alerts in Intrusion Detection Systems. 432-443 - Lidia Ogiela, Makoto Takizawa, Marek R. Ogiela, Shigenari Nakamura
:
Transformative Intelligence in Advanced Security Infrastructure. 444-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.