


default search action
23rd NCA 2025: Lisbon, Portugal
- 23rd International Symposium on Network Computing and Application, NCA 2025, Lisbon, Portugal, November 5-7, 2025. IEEE 2025, ISBN 979-8-3315-7842-8

- Bart Cox

, Lydia Y. Chen, Jérémie Decouchant:
Nomad: Accelerating Geo-distributed Learning with Client Transfers. 1-8 - Francisco Javier Nóvoa, Daniel Garabato, Alvaro Sarmiento, Mario Casado, Ignasi de José, Carlos Dafonte:

Continuous behavioral authentication using mouse dynamics based on Artificial Intelligence. 1-8 - Mauladi, Ramin Yahyapour:

Keycloak-SSI: Post-Authentication Attribute Verification in Federated Identity Management Using Self-Sovereign Identity. 9-16 - Camila Murad Veille, Lamine Amour, Scott Fowler, Sami Souihi:

QoE-Driven Optimization of ZFS for Performance-Aware File Sharing Platforms. 17-24 - Swapnil Guragain, Bibek Maharjan, Sushant Bhattarai, Gokarna Sharma, Pavan Poudel:

Learning-Augmented Distributed Directories. 25-34 - Nimesha Wickramasinghe, Sanjay K. Jha, Gene Tsudik, Arash Shaghaghi:

Congested by the Past: The Dataset Lag in Network Traffic Analysis. 35-38 - Mohamed-Ali Hadj Amor, Ismail Bennis:

NC-LoRaSim: A No-Code LoRaWAN Simulation Framework with NS-3. 39-42 - Quentin Renau, Amjad Ullah, Emma Hart:

Distributed Resource Selection for Self-Organising Cloud-Edge Systems. 43-50 - Jaime Saramago, João A. Silva, Hervé Paulino, João M. Lourenço:

Dynamic Membership Management and Data Sharding in Edge-Enabled Publish/Subscribe Systems. 51-58 - Mattia Trabucco, Giovanni Gambigliani Zoccoli

, Mirco Marchetti
, Luca Ferretti:
Network-efficient authenticated pseudonym-based V2X communications with constant revocation costs. 59-68 - Michael Lesko-Krleza, Rodolfo W. L. Coutinho, Yousef R. Shayan:

An Analytical Model for Distributed Video Analytics in Mobile Computer Vision-based Systems. 69-73 - José Cutileiro, Pedro Rosa, Orlando Remédios, Miguel L. Pardal:

Road Sight Unit: Edge Image Processing for Vehicle Trajectory and Collision Prediction. 74-78 - Yuan Tian, Shou-Hsuan Stephen Huang:

A Framework for Detecting Secure Web Traffic Over VPNs: HTTPS and QUIC. 79-86 - Francisco Valderlan Jorge Nobre, Ramon S. Araujo, Davi O. Alves, Erick S. Nascimento, Lyedson S. Rodrigues, Rafael L. Gomes:

Network Connection Management Based on the Integration of Artificial Intelligence for IT Operations and Threat Intelligence Databases. 95-102 - Zhiwei Fu, Hanbo Yu, Xinyu Hu, Steven H. H. Ding, Furkan Alaca, Philippe Charland:

ProvSpider: A Robust and Universal Toolkit for Binary Provenance Analysis Using Deep Learning. 103-110 - Amaia Gil-Lerchundi, Lucía Muñoz-Solanas, Antonio Nappa, Izar Azpiroz:

Privacy-Preserving Clusterized Federated Learning Framework for Energy Forecasting. 111-114 - João Pedro, Guilherme Ramos

, David R. Matos:
Rûm: Multivalued Loss-Tolerant Byzantine Consensus for Mobile Ad-Hoc Networks. 115-122 - Hugo Le Dirach, Marc Boyer, Emmanuel Lochin:

When Buildings Blur the Lines: Revealing the Hidden Performance Equivalences in MANET Routing Protocols. 123-130 - Tom Van Eyck

, Stefan More
, Florian Draschbacher
, Sam Michiels
, Danny Hughes:
Don't Stop Receiving: Ensuring Availability of Critical Services on Compromised Mobile Devices. 131-140 - Anis Charfi, Samiha Ayed, Lamia Chaari, Georgi Tsochev:

Ensemble Machine Learning for UAV Network Intrusion Detection: Comprehensive Analysis Using the UAV-NIDD Dataset. 141-148 - Maurizio Giacobbe, Giuseppe Tricomi, Antonio Puliafito, Marco Scarpa:

Addressing Decentralized LoRaWAN-Based Wildfire Monitoring in Forested Environments. 149-156 - Ivan Dokuchaev, Ali Kadhum Idrees, Rolf Schuster:

ELTO: Energy-Latency Trade-off Optimization for Machine Learning Inference with Dynamic Batching. 157-164 - Duc-Thinh Ngo, Kandaraj Piamrat, Ons Aouedi, Thomas Hassan, Philippe Raipin Parvédy:

Towards Scalable O-RAN Resource Management: Graph-Augmented Proximal Policy Optimization. 165-173 - Waldemir Cambiucci, Regina Melo Silveira:

Hypergraphic Partitioning Framework for Static and Adaptive Quantum Circuits. 174-181 - Kerrian Aziza, Massinissa Tighilt, Binh-Minh Bui-Xuan:

Geometric Swarm Flocking with OWC Constraints. 182-185 - Chékra El Fehri, Nouha Baccour:

Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN. 186-189 - Marco Calavaro, Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia:

Thwarting ROP Attacks and Unveiling User Level Stack Tampering through Kernel Shadow Stack. 190-199 - Andrea Artioli, Edoardo Torrini, Lorenzo Rossi, Francesco Mecatti, Mauro Andreolini:

Player infrastructure for Attack and Defense Capture The Flag Competitions. 200-208 - Gurjot Singh, Alim Dhanani, Diogo Barradas:

RevealNet: Distributed Traffic Correlation for Attack Attribution on Programmable Networks. 209-218 - Dimitri Galli, Andrea Venturi, Dario Stabili, Mauro Andreolini, Mirco Marchetti:

Defending Network Intrusion Detection Systems Based on Graph Neural Networks Against Structural Adversarial Attacks. 219-228 - Ramakrishnan Pitchaimani, Sébastien Canard, Badis Hammi, Aurel Sorin Spornic:

Systematic Risk Analysis of Multi-Stage Attacks in Zonal Automotive E/E Architecture. 229-238 - Shuaibu Musa Adam, Van Vu Bui, Lowie Goossens, Sam Michiels

, Ka Lok Man, Danny Hughes:
Leaf-Link: Experiences Deploying Battery-Free Wireless Forest Sensing. 239-246 - Anik Pramanik, Mukesh Kumar, Nisha Panwar, Laramie V. Potts, Jainam Shah, Shantanu Sharma:

Spark: Smart Building Fire Prediction And Risk Analysis. 247-254 - Rui P. Pinto, Bruno M. C. Silva, Pedro R. M. Inácio:

Anomaly Detection in the Internet of Medical Things: Design and Evaluation of a Cross Layer Dataset. 255-262 - Riham Badra, Lazhar Hamel, Layth Sliman, Ralp Bou Nader:

Compliance Verification of 5G Service Level Agreements using Event-B. 263-266 - Savi Juneja, Geeta Yadav:

MisConfAI: A Framework for Detecting Configuration Vulnerabilities in Complex Systems. 267-275 - Francisco Faria, Samih Eisa, David R. Matos, Miguel L. Pardal:

EvoChain: A Recovery Approach for Permissioned Blockchain Applications. 276-285 - Diogo Melita, David R. Matos, Miguel L. Pardal:

Bonsai: A Recovery Approach for Ethereum ERC-20 Transactions. 286-294 - Pedro Pereira, José Gouveia, João Vitorino, Eva Maia, Isabel Praça:

Adversarially Robust and Interpretable Magecart Malware Detection. 295-299 - Emanuel Nunes, Samih Eisa, Miguel L. Pardal, Mário Calha:

CC2C: Confidential Channel-to-Channel Data Exchange in a Permissioned Blockchain. 300-303 - Van Vu Bui, Shuaibu Musa Adam, Sam Michiels

, Huynh Nguyen Bao Phuong, Danny Hughes:
Demo: Flute, a Plug and Play Battery-Free Wireless Sensing Platform. 304-305 - Michal Rozsíval, Petr Matousek, Jaromír Kotala:

Poster: Multi-Agent LLM System for Cisco Router Configuration. 306-307 - Olga Kurasova, Viktor Medvedev

, Juozapas Rokas Cypas
, Juozas Dautartas:
Poster: Targeted Evasion of Malware Detection Using Adversarial Machine Learning. 308-309 - João Sereno, Daniel Castro, Nuno Santos, Luis Rodrigues:

Poster: Secure Lifecycle Management of Confidential Virtual Machines in Public Clouds. 310-311 - Nuno Braz:

An Approach to Blockchain Voting for RWA Governance. 312-313 - Asya Mitseva, Marco Lewandowsky, Andriy Panchenko:

Poster: Characterization of Dominant and Specific Network Patterns in Industrial Control Systems. 314-315 - Chékra El Fehri, Nouha Baccour:

Poster: Exploring Standard-Compliant Channel Access Enhancements for dense LoRaWAN. 316-317 - Shlomi Dolev, Ehud Gudes, Amit Hendin, Hannah Yair:

Poster: Fully Dynamic Global Traffic Scheduling Prioritizing Emergency Vehicles and Platoons. 318-319 - Pedro Pereira

, José Gouveia, João Vitorino, Eva Maia, Isabel Praça:
Magecart Malware Detection with Feature Engineering. 320-321 - Rui Miguel, Luis Pedrosa, Fernando M. V. Ramos:

Poster: SALAD-Nets: Synthesizing Adaptive, Accelerated, and Distributed Network Functions. 322-323 - Lamine Amour, Andrea Bareggi:

Poster - A Preliminary Music Data Collector for Networked Music Performance. 324-325 - Diogo Agostinho, Nikhil Tulcidas, Miracle Aniakor, Hugo Miranda, Pedro M. Ferreira, Ana Respício:

Poster: Quality Threat Intelligence to Enhance Cyber Security in the Public Administration. 326-327 - Seyed Jamal Mirsadri

, Ricardo Chaves, Luis Pedrosa:
Energy-Aware Adaptive Security for Smart Farming (EAASF): A Hybrid IDS-IPS Framework with SDN-Orchestrated for Agriculture 4.0. 328-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














