


default search action
39th AINA 2025: Barcelona, Spain
- Leonard Barolli:

Advanced Information Networking and Applications - Proceedings of the 39th International Conference on Advanced Information Networking and Applications, AINA 2025, Barcelona, Spain, 9-11 April 2025, Volume 4. Lecture Notes on Data Engineering and Communications Technologies 248, Springer 2025, ISBN 978-3-031-87771-1 - Zhihan Cui, Jiancheng Chi, Yuto Lim, Yasuo Tan:

Broad Learning System Scheme for Multi-server MEC Wireless Networks. 1-12 - R. Madhusudhan, Saurabh V. Surashe, P. Pravisha:

Enhancing Cybersecurity: Malicious Webpage Detection Using Machine and Deep Learning. 13-24 - Alex Orsholits, Manabu Tsukada:

Context-Rich Interactions in Mixed Reality Through Edge AI Co-processing. 25-38 - Dhaval S. Jha, Rajdeep Niyogi:

A Swarm Intelligence Approach to Safeguard UAVs for Reconnaissance. 39-49 - Anouar Jridi, Marouen Kachroudi, Marius Zaharia, Mohamed Farah:

Towards an Efficient Semantic Modelling for Kubernetes Environments. 50-60 - Nedra Amara

:
Machine Learning Based-Proactive Caching for Cellular Networks. 61-76 - Amal Jlassi, Sami Hafsi, Walid Barhoumi:

UTI-Dx-ViT: Enhancing UTI Diagnosis with YOLOv8 Segmentation and Vision Transformer-Based Classification. 77-88 - Marcus V. Diniz dos Reis, Rodrigo Moreira, Larissa Ferreira Rodrigues Moreira, Flávio de Oliveira Silva

:
Estimating Application Performance in Container-Based Environments: A Cross-Domain Monitoring Approach. 89-100 - Nader Khedhri, Monia Najar:

Reinforcement Learning-Based Adaptive Modulation Systems. 101-112 - Sachin Sharma

, Jiho Noh, Michail S. Alexiou
:
Investigating the Transferability and Robustness of Adversarial Attacks Between Standard and Dilated CNN Architectures. 113-126 - Shanyi Xie, Congcong Zhan, Jun Zuo, Xingwang Li, Gang Zhou, Yan Li, Caiyan Nong:

Traffic Classification Method of Power Information Communication Network Based on Multi-mode Competitive Feature Selection. 127-137 - Maysam Chaari

, Yassine Ben Ayed:
Optimized Hybrid Deep Learning Model for Accurate Classification of Alzheimer's Stages. 138-150 - David Beserra, Robert Nantchouang, Mickael Chau, Marc Espie, Patricia Takako Endo, Jean Araujo:

How Effective are OS-Level Virtualization Tools for Managing Containers? 151-162 - Antonio Sousa, David Beserra, Jean Araujo:

Performance Evaluation of Serverless Computing Infrastructure: Insights from Open-Source Frameworks. 163-174 - Ismehene Chaouch, Anis Naanaa, Sadok El Asmi:

Enhanced Image Security in Cloud Computing Using Hybrid Encryption with ECC and Spatiotemporal Cryptography. 175-187 - Dilawaer Duolikun, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
A Network-Based Selection Algorithm of an Energy-Efficient Succeeding Fog Node in the NBFC Model. 188-197 - Robert Williamson

, Carlos Reaño
, Jesús Martínez del Rincón
, Anastasios Koidis:
SaaS-Enabled RGB to Hyperspectral Imaging: A Novel Paradigm in Image Processing Technology. 198-210 - Theodor-Radu Grumeza, Thomas-Andrei Lazar, Alexandra Emilia Fortis:

Development of a Transformer-Based Large Language Model Architecture in Cloud. 211-222 - Rodrigo Mompo Redoli, Amjad Ullah:

Kubernetes in the Cloud vs. Bare Metal: A Comparative Study of Network Costs. 223-233 - Jiaming Wang

, Kai Yang, Wei Cong, Minjing Li, Lihui Bai, Xu An Wang:
High-Precision Network Intrusion Detection Method Based on NIDS-CNNRF. 234-243 - Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:

A Secure Routing Protocol for Opportunistic Networks. 244-256 - Saad El Jaouhari, Andrei Vavilov, Julia Soloveva, Alexandru Archip, Nour El Madhoun

:
MIDPS: A Multi-agent Host Intrusion Detection and Prevention System. 257-268 - Raffaele Pizzolante, Arcangelo Castiglione, Michele Mastroianni

, Francesco Palmieri:
A Modular and Scalable Framework for Effective Server-Side Forensic Analysis of XSS Attacks. 269-281 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Vanessa Bracamonte, Masakatsu Nishigaki

:
Do Regularly Personalized Security Messages Cause Habituation? 282-296 - Victor Manuel Gonzalez-Gorrín

, Josep Prieto-Blázquez, Joan Arnedo-Moreno:
A Hybrid Machine Learning Method for Detecting Metamorphic Malware. 297-307 - Adrian Brodzik, Wojciech Mazurczyk:

Assessing the Threat of Neural Network Enhanced Obfuscation in Malware. 308-323 - Kamil Wozniak

, Marek R. Ogiela, Lidia Ogiela:
New Distributed Steganographic Techniques. 324-334 - Nghia Dinh

, Huy Tran Tien
, Lidia Ogiela, Vinh Truong Hoang
, Václav Snásel:
Blockchain-Enabled Verifiable Credential CAPTCHA. 335-344 - Shunya Higashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

A Fuzzy-Based System for Evaluation of User Trust: Effect of Tie Strength on User Trust in Online Social Networks. 345-353 - Arcangelo Castiglione, Teresa Elia:

Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks. 354-366 - Afaq Inayat

, Matheus Saueressig, Muriel Figueredo Franco, Eder John Scheid, Lisandro Zambenedetti Granville:
Employing PDDL Plan to Recommend Security Controls Against Cyberattacks. 367-379 - Pawel Rajba, Wojciech Mazurczyk, Jörg Keller:

Double Proof-of-Work Scheme for the Key Transfer in the Steganographic Communication. 380-393 - Miltiadis Alamaniotis:

Intelligent System for Enhancing Nuclear Security in the Design of Maritime Ports Hosting Nuclear-Powered Ships. 394-405 - Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil:

Privacy Benchmarking of Intrusion Detection Sytems. 406-417 - Aleksandra Macura, Marek R. Ogiela, Lidia Ogiela:

Application of CAPTCHA Codes in User Authorization Protocols. 418-425 - Marek R. Ogiela, Urszula Ogiela:

Multi-secret Steganography Based on Polymorphic Keys. 426-431 - Ali Mustafa, Fouad Trad, Ali Chehab:

Leveraging Large Language Models for Reducing False Positives and Prioritizing Alerts in Intrusion Detection Systems. 432-443 - Lidia Ogiela, Makoto Takizawa, Marek R. Ogiela, Shigenari Nakamura

:
Transformative Intelligence in Advanced Security Infrastructure. 444-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














