The Community for Technology Leaders
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) (2018)
Cambridge, MA, USA
Nov. 1, 2018 to Nov. 3, 2018
ISBN: 978-1-5386-7660-8
TABLE OF CONTENTS

Cover (PDF)

pp. 1-2

DTFA: A Dynamic Threshold-Based Fuzzy Approach for Power-Efficient VM Consolidation (Abstract)

Deafallah Alsadie , School of Science, RMIT University, Australia
Eidah J. Alzahrani , School of Science, RMIT University, Australia
Nasrin Sohrabi , School of Science, RMIT University, Australia
Zahir Tari , School of Science, RMIT University, Australia
Albert Y. Zomaya , school of Information Technologies, The University of Sydney, Australia
pp. 1-9

RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems (Abstract)

Ashish Rauniyar , Department of Computer Science OsloMet, Oslo Metropolitan University, Autonomous System and Network (ASN) Research Group, Norway
Paal Engelstad , Department of Computer Science OsloMet, Oslo Metropolitan University, Autonomous System and Network (ASN) Research Group, Norway
Olav N. Osterb , Telenor Research, Norway
pp. 1-8

Energy-Efficient Data Center Networks (Abstract)

Juvencio Arnaldo Manjate , KTH Royal Institute of Technology, School of EECS, Stockholm, Sweden
Markus Hidell , KTH Royal Institute of Technology, School of EECS, Stockholm, Sweden
Peter Sjodin , KTH Royal Institute of Technology, School of EECS, Stockholm, Sweden
pp. 1-8

Modeling System-Level Power Consumption Profiles Using RAPL (Abstract)

James Phung , The University of Sydney, School of Information Technologies, Sydney, Australia
Young Choon Lee , Macquarie University, Department of Computing, Sydney, Australia
Albert Y. Zomaya , The University of Sydney, School of Information Technologies, Sydney, Australia
pp. 1-4

Toward Incremental FIB Aggregation with Quick Selections (FAQS) (Abstract)

Yaoqing Liu , Clarkson University
Garegin Grigoryan , Rochester Institute of Technology
pp. 1-8

Recurrent Neural Network-Based Prediction of TCP Transmission States from Passive Measurements (Abstract)

Desta Haileselassie Hagos , Department of Technology Systems, University of Oslo, Kjeller, Norway
Paal E. Engelstad , Department of Technology Systems, University of Oslo, Kjeller, Norway
Anis Yazidi , Department of Computer Science, Oslo Metropolitan University, Oslo, Norway
Oivind Kure , Department of Telematics, Norwegian University of Science and Technology, Trondheim, Norway
pp. 1-10

Towards a Low Latency Network-Slice Resistant to Unresponsive Traffic (Abstract)

Paulo Pinto , Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Instituto de Telecomunicações, Portugal
Amineh Mazandarani , Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Instituto de Telecomunicações, Portugal
Pedro Amaral , Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Instituto de Telecomunicações, Portugal
Luis Bernardo , Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa, Instituto de Telecomunicações, Portugal
pp. 1-5

LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes (Abstract)

Garegin Grigoryan , Rochester Institute of Technology
Yaoqing Liu , Clarkson University
pp. 1-4

An Unsupervised Rule Generation Approach for Online Complex Event Processing (Abstract)

Erick Petersen , Universidad Galileo, Guatemala, 7a. Av. Final, calle Dr. Eduardo Suger Cofiño Zona 10, Guatemala
Marco Antonio To RLICT , Universidad Galileo, Guatemala, 7a. Av. Final, calle Dr. Eduardo Suger Cofiño Zona 10, Guatemala
Stephane Maag , Université Paris-Saclay CNRS UMR 5157 SAMOVAR, Institut Mines-Télécom/Télécom SudParis, Evry Cedex, 9, rue Charles Fourier, 91011, France
Thierry Yamga , Université Paris-Saclay CNRS UMR 5157 SAMOVAR, Institut Mines-Télécom/Télécom SudParis, Evry Cedex, 9, rue Charles Fourier, 91011, France
pp. 1-8

Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media (Abstract)

Andrea Tundis , Department of Computer Science Technische Universitdt Darmstadt (TUDA), Telecooperation Lab (TK), Darmstadt, Germany
Gaurav Bhatia , Department of Computer Science Technische Universitdt Darmstadt (TUDA), Telecooperation Lab (TK), Darmstadt, Germany
Archit Jain , Department of Computer Science Technische Universitdt Darmstadt (TUDA), Telecooperation Lab (TK), Darmstadt, Germany
Max Muhlhauser , Department of Computer Science Technische Universitdt Darmstadt (TUDA), Telecooperation Lab (TK), Darmstadt, Germany
pp. 1-10

TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis (Abstract)

Oluwatobi Fajana , University of Portsmouth, School of Computing, United Kingdom
Gareth Owenson , University of Portsmouth, School of Computing, United Kingdom
Mihaela Cocea , University of Portsmouth, School of Computing, United Kingdom
pp. 1-8

Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples (Abstract)

Giovanni Apruzzese , University of Modena and Reggio Emilia, Department of Engineering “Enzo Ferrari”, Modena, Italy
Michele Colajanni , University of Modena and Reggio Emilia, Department of Engineering “Enzo Ferrari”, Modena, Italy
pp. 1-8

The Effect on Network Flows-Based Features and Training Set Size on Malware Detection (Abstract)

Jarilyn M. Hernandez Jimenez , West Virginia University, Lane Department of Computer Science and Electrical Engineering, Morgantown, WV, 26506
Katerina Goseva-Popstojanova , West Virginia University, Lane Department of Computer Science and Electrical Engineering, Morgantown, WV, 26506
pp. 1-9

Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network) (Abstract)

Harish Sukhwani , Duke University, Durham, NC, USA
Nan Wang , Duke University, Durham, NC, USA
Kishor S. Trivedi , Duke University, Durham, NC, USA
Andy Rindos , IBM Corporation, RTP, NC, USA
pp. 1-8

Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand (Abstract)

Emmanuelle Anceaume , CNRS / IRISA, France
Antoine Guellier , CNRS / IRISA, France
Romaric Ludinard , IMT Atlantique, France
Bruno Sericola , Inria, France
pp. 1-8

DBFT: Efficient Leaderless Byzantine Consensus and its Application to Blockchains (Abstract)

Tyler Crain , University of Sydney, Australia
Vincent Gramoli , University of Sydney, Australia
Mikel Larrea , Univ. of the Basque Country UPV/EHU, Spain
Michel Raynal , France Polytechnic University, Université de Rennes, Hong Kong
pp. 1-8

ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains (Abstract)

Sidra Malik , The University of New South Wales, School of Computer Science and Engineering, Sydney, Australia
Salil S. Kanhere , The University of New South Wales, School of Computer Science and Engineering, Sydney, Australia
Raja Jurdak , CSIRO, Data61, Brisbane, Australia
pp. 1-10

Nonintrusive Monitoring of Microservice-Based Systems (Abstract)

Fabio Pina , Dept. of Informatics Engineering University of Coimbra, CISUC, Coimbra, Portugal
Jaime Correia , Dept. of Informatics Engineering University of Coimbra, CISUC, Coimbra, Portugal
Ricardo Filipe , Dept. of Informatics Engineering University of Coimbra, CISUC, Coimbra, Portugal
Filipe Araujo , Dept. of Informatics Engineering University of Coimbra, CISUC, Coimbra, Portugal
Jorge Cardroom , Dept. of Informatics Engineering University of Coimbra, CISUC, Coimbra, Portugal
pp. 1-8

Response Time Characterization of Microservice-Based Systems (Abstract)

Jaime Correia , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Fabio Ribeiro , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Ricardo Filipe , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Filipe Arauio , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Jorge Cardoso , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
pp. 1-5

Microservices: A Mapping Study for Internet of Things Solutions (Abstract)

Cleber Santana , Federal University of Bahia, WISER: Web, Internet and Intelligent Systems Research Group, Computer Science Department, Salvador, Bahia, Brazil
Brenno Alencar , Federal University of Bahia, WISER: Web, Internet and Intelligent Systems Research Group, Computer Science Department, Salvador, Bahia, Brazil
Cassio Prazeres , Federal University of Bahia, WISER: Web, Internet and Intelligent Systems Research Group, Computer Science Department, Salvador, Bahia, Brazil
pp. 1-4

On Black-Box Monitoring Techniques for Multi-Component Services (Abstract)

Ricardo Filipe , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Jaime Correia , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Filipe Araujo , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
Jorge Cardoso , Department of Informatics Engineering, University of Coimbra, CISUC, Coimbra, Portugal
pp. 1-5

Efficient Resources Utilization by Different Microservices Deployment Models (Abstract)

Fernando H. L. Buzato , University of são Paulo (USP), Department of Computer Science, São Paulo, Brazil
Alfredo Goldman , University of são Paulo (USP), Department of Computer Science, São Paulo, Brazil
Daniel Batista , University of são Paulo (USP), Department of Computer Science, São Paulo, Brazil
pp. 1-4

Practical and Fast Causal Consistent Partial Geo-Replication (Abstract)

Pedro Fouto , FCT / NOVA University of Lisbon, NOVA LINCS & DI, Lisbon, Portugal
Joao Leitao , FCT / NOVA University of Lisbon, NOVA LINCS & DI, Lisbon, Portugal
Nuno Preguica , FCT / NOVA University of Lisbon, NOVA LINCS & DI, Lisbon, Portugal
pp. 1-10

On the Fly Detection of the Top-K Items in the Distributed Sliding Window Model (Abstract)

Emmanuelle Anceaume , IRISA, CNRS, Rennes, France
Yann Busnel , IRISA, IMT Atlantique, Cesson-Sévigné, France
Vasile Cazacu , IRISA, CNRS, Rennes, France
pp. 1-8

Population Protocols with Convergence Detection (Abstract)

Yves Mocquard , Université de Rennes 1/IRISA
Bruno Sericola , INRIA Rennes - Bretagne Atlantique
Emmanuelle Anceaume , CNRS/IRISA
pp. 1-8

Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems (Abstract)

Diogo Calado , Instituto Superior Técnico, INESC-ID, Universidade de Lisboa, Portugal
Miguel L. Pardal , Instituto Superior Técnico, INESC-ID, Universidade de Lisboa, Portugal
pp. 1-8

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach (Abstract)

Jonathan Roux , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Eric Alata , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Guillaume Auriol , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Mohamed Kaaniche , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Vincent Nicomette , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Romain Cayre , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
pp. 1-8

Characterization and Modeling of IoT Data Traffic in the Fog of Things Paradigm (Abstract)

Ernando Batista , Federal University of Bahia, WISER @ DCC, Salvador, Bahia, Brazil
Leandro Andrade , Federal University of Bahia, WISER @ DCC, Salvador, Bahia, Brazil
Ramon Dias , Federal University of Bahia, WISER @ DCC, Salvador, Bahia, Brazil
Andressa Andrade , Federal University of Bahia, WISER @ DCC, Salvador, Bahia, Brazil
Gustavo Figueiredo , Federal University of Bahia, GRADE @ DCC, Salvador, Bahia, Brazil
Cassio Prazeres , Federal University of Bahia, WISER @ DCC, Salvador, Bahia, Brazil
pp. 1-8

Sensing Quality and Estimation of Public Transport Occupancy During Live Operation (Abstract)

Lars Mikkelsen , Aalborg University, Wireless Communication Networks, Aalborg, Denmark
Hans-Peter Schwefel , Aalborg University, Wireless Communication Networks, Aalborg, Denmark
Tatiana Madsen , Aalborg University, Wireless Communication Networks, Aalborg, Denmark
pp. 1-4

Device and User Management for Smart Homes (Abstract)

Alejandro Mazuera-Rozo , Los Andes University, Systems and Computing Engineering Department, Bogotá, Colombia
Sandra Rueda , Los Andes University, Systems and Computing Engineering Department, Bogotá, Colombia
pp. 1-4

Witness-Based Location Proofs for Mobile Devices (Abstract)

Joao Ferreira , Instituto Superior Técnico, Universidade de Lisboa, INESC-ID, Portugal
Miguel L. Pardal , Instituto Superior Técnico, Universidade de Lisboa, INESC-ID, Portugal
pp. 1-4

Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction (Abstract)

Siva Leela Krishna Chand Gudi , Centre for Artificial Intelligence, University of Technology, Innovation and Enterprise Research Laboratory (The Magic Lab), Sydney, Australia
Suman Ojha , Centre for Artificial Intelligence, University of Technology, Innovation and Enterprise Research Laboratory (The Magic Lab), Sydney, Australia
Benjamin Johnston , Centre for Artificial Intelligence, University of Technology, Innovation and Enterprise Research Laboratory (The Magic Lab), Sydney, Australia
Jesse Clark , Centre for Artificial Intelligence, University of Technology, Innovation and Enterprise Research Laboratory (The Magic Lab), Sydney, Australia
Mary-Anne Williams , Centre for Artificial Intelligence, University of Technology, Innovation and Enterprise Research Laboratory (The Magic Lab), Sydney, Australia
pp. 1-5

Sensing Trees in Smart Cities with Open-Design Hardware (Abstract)

Antonio Deusany de Carvalho Junior , Universidade de São Paulo, Instituto de Matemdtica e Estatistica, São Paulo, Brazil
Victor Seiji Hariki , Universidade de São Paulo, Instituto de Matemdtica e Estatistica, São Paulo, Brazil
Alfredo Goldman , Universidade de São Paulo, Instituto de Matemdtica e Estatistica, São Paulo, Brazil
pp. 1-4

Low-Reliable Low-Latency Networks Optimized for HPC Parallel Applications (Abstract)

Truong Thao Nguyen , Industrial Science and Technology (AIST), National Institute of Advanced, Tsukuba, Ibaraki, 305-8560, JAPAN
Hiroki Matsutani , Keio University, Yokohama, 3-14-1 Hiyoshi, Kohoku-ku, Kanagawa, 223-8522, JAPAN
Michihiro Koibuchi , Industrial Science and Technology (AIST), National Institute of Advanced, Tsukuba, Ibaraki, 305-8560, JAPAN
pp. 1-10

Delivery Delay and Mobile Faults (Abstract)

Dimitris Sakavalas , Boston College, Computer Science Department, Chestnut Hill, USA
Lewis Tseng , Boston College, Computer Science Department, Chestnut Hill, USA
pp. 1-8

Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems (Abstract)

Arash Shaghaghi , The University of New South Wales (UNSW), Sydney, Australia
Salil S. Kanhere , The University of New South Wales (UNSW), Sydney, Australia
Mohamed Ali Kaafar , CSIRO Data61, Australia
Sanjay Jha , The University of New South Wales (UNSW), Sydney, Australia
pp. 1-5

Critical Phenomena in Interconnection Networks with Heterogeneous Activity (Abstract)

Lev B. Levitin , Boston University, ECE Department, USA
Yelena Rykalova , UMass Lowell, Department of Computer Science, USA
pp. 1-5

Analysis of Burst Header Packets in Optical Burst Switching Networks (Abstract)

Sudarshan S. Chawathe , University of Maine, School of Computing and Information Science, Orono, Maine, 04469-5711, USA
pp. 1-5

Virtualized Network Services Extension Algorithms (Abstract)

Omar Houidi , Samovar-UMR 5157 CNRS, University of Paris-Saclay, Telecom SudParis, France
Oussama Soualah , Samovar-UMR 5157 CNRS, University of Paris-Saclay, Telecom SudParis, France
Wajdi Louati , University of Sfax, ReDCAD Lab, Tunisia
Djamal Zeghlache , Samovar-UMR 5157 CNRS, University of Paris-Saclay, Telecom SudParis, France
Farouk Kamoun , National School of Computer Sciences, University of Manouba, CRISTAL Lab, Tunisia
pp. 1-5

Monitoring IoT Networks for Botnet Activity (Abstract)

Sudarshan S. Chawathe , University of Maine, School of Computing and Information Science, Orono, Maine, 04469-5711, USA
pp. 1-8

Model of a Virtual Firewall Based on Stochastic Petri Nets (Abstract)

Luis Zabala , Department of Communications Engineering
Ruben Solozabal , Department of Communications Engineering
Armando Ferro , Department of Communications Engineering
Bego Blanco , University of the Basque Country (UPV/EHU), Department of Computer Languages and Systems, Bilbao, Spain
pp. 1-4

A Practical Application of a Dataset Analysis in an Intrusion Detection System (Abstract)

Diego Fernandez , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
Laura Vigoya , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
Fidel Cacheda , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
Francisco J. Novoa , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
Manuel F. Lopez-Vizcaino , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
Victor Carneiro , University of A Coruna, A Coruna, CITIC Campus de Elvina, s/n 15071, Spain
pp. 1-5

Scenario Design and Validation for Next Generation Cyber Ranges (Abstract)

Enrico Russo , University of Genova, DIBRIS, Genova, Italy
Gabriele Costa , IMT School for Advanced Studies, SysMA Group, Lucca, Italy
Alessandro Armando , University of Genova, DIBRIS, Genova, Italy
pp. 1-4

Using SGX-Based Virtual Clones for IoT Security (Abstract)

Rashid Tahir , University of Prince Mugrin
Ali Raza , Boston University
pp. 1-4

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture (Abstract)

Guillaume Averlant , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Eric Alata , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Mohamad Kaaniche , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Vincent Nicomette , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
Yuxiao Mao , Université de Toulouse, CNRS, INSA, LAAS-CNRS, Toulouse, France
pp. 1-5

Leveraging Intel SGX Technology to Protect Security-Sensitive Applications (Abstract)

Joseph Sobchuk , MIT Lincoln Laboratory, Secure Resilient Systems and Technology Group, Lexington, MA
Sean O'Melia , MIT Lincoln Laboratory, Secure Resilient Systems and Technology Group, Lexington, MA
Daniil Utin , MIT Lincoln Laboratory, Secure Resilient Systems and Technology Group, Lexington, MA
Roger Khazan , MIT Lincoln Laboratory, Secure Resilient Systems and Technology Group, Lexington, MA
pp. 1-5

A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance (Abstract)

Salva Daneshgadeh , Middle East Technical University, Graduate School of Informatics, Ankara, Turkey
Thomas Kemmerich , Norwegian University of Science and Technology, Department of Information Security and Communication Technology, Gjϕvik, Norway
Tarem Ahmed , Independent University, Department of Computer Science and Engineering, Bangladesh Dhaka, Bangladesh
Nazife Baykal , Middle East Technical University, Graduate School of Informatics, Ankara, Turkey
pp. 1-5

Online Workload Scheduling for Green Cloud Data Center with Delay Guarantee in Smart Grid (Abstract)

Huaiwen He , Sun Yat-Sen University, School of Data and Computer Science, China
Hong Shen , Sun Yat-Sen University, School of Data and Computer Science, China
pp. 1-8

CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems (Abstract)

Kennedy A. Torkura , University of Potsdam, Hasso-Plattner-Institute, Potsdam, Germany
Muhammad I.H. Sukmana , University of Potsdam, Hasso-Plattner-Institute, Potsdam, Germany
Tim Strauss , Bundesdruckerei GmbH, Berlin, Germany
Hendrik Graupner , Bundesdruckerei GmbH, Berlin, Germany
Feng Cheng , University of Potsdam, Hasso-Plattner-Institute, Potsdam, Germany
Christoph Meinel , University of Potsdam, Hasso-Plattner-Institute, Potsdam, Germany
pp. 1-10

Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management (Abstract)

Jon Patman , University of Missouri, Department of Electricall Engineering & Computer Science, USA
Peter Lovett , University of Oregon, Computer& Information Science Department, USA
Andrew Banning , Southeast Missouri State University, Department of Computer Science, USA
Annie Barnert , Cornell University, Department- of Computer Science., USA
Dmitrii Chemodanov , University of Missouri, Department of Electricall Engineering & Computer Science, USA
Prasad Calvam , University of Missouri, Department of Electricall Engineering & Computer Science, USA
pp. 1-8

How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems (Abstract)

Fernando Vano-Garcia , Physical Sciences University of the West of Scotland, School of Computing Engineering, Paisley, High St, PAl 2BE, UK
Hector Marco-Gisbert , Physical Sciences University of the West of Scotland, School of Computing Engineering, Paisley, High St, PAl 2BE, UK
pp. 1-4

Estimating the Environmental Impact of Data Centers (Abstract)

Joao Ferreira , Federal Univ. of Pernambuco, Informatics Center, Recife, Brazil
Gustavo Callou , Federal Rural Univ. of Pernambuco, Dept. of Computing, Recife, Brazil
Albert Josua , Federal Inst. of Amazonas, Dept. of Informatics, Amazonas, Brazil
Paulo Maciel , Federal Univ. of Pernambuco, Informatics Center, Recife, Brazil
pp. 1-4

Cluster Load Estimation for Stateless Schedulers in Datacenters (Abstract)

Reem Alshahrani , Kent State University, Department of Computer Science, Kent, Ohio, 44242
Hassan Peyravi , Kent State University, Department of Computer Science, Kent, Ohio, 44242
pp. 1-4

Efficient Multi-Hop Broadcasting in Dense Nanonetworks (Abstract)

Thierry Arrabal , Univ. Bourgogne Franche-Comte, CNRS, FEMTO-ST Institute, Montbeliard, Numérica, cours Leprince-Ringuet, 25200, France
Dominique Dhoutaut , Univ. Bourgogne Franche-Comte, CNRS, FEMTO-ST Institute, Montbeliard, Numérica, cours Leprince-Ringuet, 25200, France
Eugen Dedu , Univ. Bourgogne Franche-Comte, CNRS, FEMTO-ST Institute, Montbeliard, Numérica, cours Leprince-Ringuet, 25200, France
pp. 1-9

Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities (Abstract)

Duarte Raposo , University of Coimbra, CISUC, Coimbra, Portugal
Andre Rodrigues , University of Coimbra, CISUC, Coimbra, Portugal
Soraya Sinche , University of Coimbra, CISUC, Coimbra, Portugal
Jorge Sa Silva , Escuela Politécnica Nacional, DETRI, Quito, Ecuador
Fernando Boavida , University of Coimbra, CISUC, Coimbra, Portugal
pp. 1-9

LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions (Abstract)

Ines EI Korbi , CRISTAL Lab, University of Manouba, National School of Computer Science, 2010, Tunisia
Yacine Ghamri-Doudane , University of La Rochelle, L3i Lab, La Rochelle CEDEX 1, Av. Michel Crépeau, 17042, France
Leila Azouz Saidane , CRISTAL Lab, University of Manouba, National School of Computer Science, 2010, Tunisia
pp. 1-9

Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic (Abstract)

Ying Li , University Technology of Sydney, Australia
Yi Huang , University Technology of Sydney, Australia
Richard Xu , University Technology of Sydney, Australia
Suranga Seneviratne , University of Sydney, Australia
Kanchana Thilakarathna , University of Sydney, Australia
Adriel Cheng , Defence Science & Technology Group, Edinburgh, Australia
Darren Webb , Defence Science & Technology Group, Edinburgh, Australia
Guillaume Jourjon , Data61-CSIRO, Sydney, Australia
pp. 1-8

Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs (Abstract)

Max Willian Soares Lima , Federal University of Amazonas, Institute of Computing, Brazil
Horacio A. B. Fernandes de Oliveira , Federal University of Amazonas, Institute of Computing, Brazil
Eulanda Miranda dos Santos , Federal University of Amazonas, Institute of Computing, Brazil
Edleno Silva de Moura , Federal University of Amazonas, Institute of Computing, Brazil
Rafael Kohler Costa , Positivo Technologies, Education Technologies, Brazil
Marco Levorato , University of California, Computer Science Department, Irvine, USA
pp. 1-5

Analytical Hierarchy Process Multi-Metric Objective Function for RPL (Abstract)

Walaa Alayed , University of Glasgow, School of Computing Science, Glasgow, UK
Lewis Mackenzie , University of Glasgow, School of Computing Science, Glasgow, UK
Dimitrios Pezaros , University of Glasgow, School of Computing Science, Glasgow, UK
pp. 1-5

An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS) (Abstract)

Francisco D Vaca , College of Engineering and Sciences Purdue University Northwest, Electrical and Computer Engineering Department, Hammond, IN-46323, USA
Quamar Niyaz , College of Engineering and Sciences Purdue University Northwest, Electrical and Computer Engineering Department, Hammond, IN-46323, USA
pp. 1-5
98 ms
(Ver 3.3 (11022016))