Accepted Papers
The following set of papers have been accepted for the LCN. See the Technical Program for detailed information about the papers and schedule.
- Regular Papers
- Short Papers
- Special Track Papers: Algorithmic Solutions for Drone- and Robot-based Networks (ASDRoNet)
- Special Track Papers: Maritime Communication and Security (MarCaS)
Regular Papers
Accurate Identification of IoT Devices in the Presence of Wireless Channel Dynamics Bhagyashri Tushir (Santa Clara University & NSIT, Delhi, USA); Vikram Ramanna, Yuhong Liu and Behnam Dezfouli (Santa Clara University, USA) |
ActiveDNS: Is There Room for DNS Optimization Beyond CDNs? Yue Wang (Computer Network Information Center, University of Chinese Academy of Sciences, China); Changhua Pei (Chinese Academy of Sciences, China); Zexin Wang (Computer Network Information Center, Chinese Academy of Sciences & University of Chinese of Sciences, China); Yingqiang Wang (University of Chinese Academy of Sciences, China); Guo Chen (Hunan University, China); Yuchao Zhang (Beijing University of Posts and Telecommunications, China); Yi Li and Jingjing Li (University of Chinese Academy of Sciences, China); Jianhui LI (Computer Network Information Center, CAS, China); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China) |
AI/ML-Based IDS as 5G Core Network Function in the Control Plane for IP/Non-IP CIoT Traffic Tan Nhat Linh Le (University of Versailles Saint-Quentin-en-Yvelines, France); Boussad Ait Salem (Efrei Reasearch Lab - Panthéon - Assas University, France & Efrei Paris, France); Dave APPADOO (Paris-Panthéon-Assas Université, France); Nadjib Aitsaadi (UVSQ Paris-Saclay & DAVIDLab, France); Xiaojiang Du (Stevens Institute of Technology, USA) |
BandSeer: Bandwidth Prediction for Cellular Networks Birkan Denizer (University of Kiel, Germany); Olaf Landsiedel (Kiel University, Germany & Chalmers University of Technology, Sweden) |
Blocking-Waived Estimation: Improving the Worst-Case End-To-End Delay Analysis in Switched Ethernet Lijie Yang (Carnegie Mellon University, USA); Théo Docquier (Université de Lorraine, France); Ludovic Thomas (EPFL, Switzerland); Ye-Qiong Song (LORIA, France) |
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator Denis Donadel and Francesco Marchiori (University of Padova, Italy); Luca Pajola (University of Padova, Italy & Spritz Matter Srl, Italy); Mauro Conti (University of Padova, Italy & Delft University of Technology, The Netherlands) |
CLEVER: Crafting Intelligent MISP for Cyber Threat Intelligence Han Wang and Alfonso Iacovazzi (RISE Research Institutes of Sweden, Sweden); Seonghyun Kim (Ericsson AB, Sweden); Shahid Raza (RISE Research Institutes of Sweden, Sweden) |
Collaborative Edge Caching and Dynamic Bitrate Adaptation for SHVC-Based VR Video Streaming Siyang Chen, Luyao Chen, Yong Tang and WenYong Wang (University of Electronic Science and Technology of China, China) |
Continuous Select-And-Prune Incremental Learning for Encrypted Traffic Classification in Distributed SDN Networks Son Duong and Hai Anh Tran (Hanoi University of Science and Technology, Vietnam); Truong X. Tran (The Pennsylvania State University, USA) |
DDoS Attack Detection and Mitigation in 5G Networks Using P4 and SDN Diana S Pineda Andrade, Kemal Akkaya and Alexander Pons (Florida International University, USA); Selcuk Uluagac (Florida International University & Electrical and Computer Engineering, USA); Abdulhadi Sahin (Florida International University, USA) |
Deep Learning for Reducing Redundancy in Madrid's Traffic Sensor Network Leyuan Ding (Institut Polytechnique de Paris & Telecom SudParis, France); Praboda Rajapaksha (Telecom SudParis & Uva Wellassa University, France); Roberto Minerva (IMT-TSP & Telecom Sud Paris, France); Noel Crespi (Institut Mines-Télécom, Télécom SudParis, France) |
Detecting Network Anomalies in NetFlow Traffic with Machine Learning Algorithms Quôc Vo (University of Paris Cité, France); Philippe Ea (Université Paris Cité, France); Osman Salem (University of Paris Cité, France); Ahmed Mehaoua (Universite Paris Cite, France) |
Extending Boundaries with WiLong: A Field Study on Long-Range Wi-Fi Mesh Custom Solution Kavin Kumar Thangadorai (Indian Institute Of Technology Madras, India & Technology Innovation Institute, United Arab Emirates); Monika Prakash (Senior Researcher, United Arab Emirates); Michael Baddeley and Anshul Pandey (Technology Innovation Institute, United Arab Emirates); Krishna M. Sivalingam (Indian Institute of Technology Madras, India) |
Failure Resilient Green Traffic Engineering Daniel Otten and Nils Aschenbruck (Osnabrück University, Germany) |
Flow Migration for Service Function Chains: Preserving External-Ordering Ranjan Patowary (Central Institute of Technology Kokrajhar, India); Gautam Barua and Radhika Sukapuram (Indian Institute of Information Technology Guwahati, India) |
GoNP: Graph of Network Patterns for Device Identification Using UDP Application Layer Protocols Farah Kandah and Lalith Medury (Auburn University, USA) |
HPDNS: A High-Performance and Robust Domain Name Service Architecture Based on In-Network Computing Xingyu Li (China); Shuyong Zhu (Institute of Computing Technology Chinese Academy of Sciences, China) |
Improving Centralized Intrusion Detection with Hardware Operational Metrics in Internet of Things Alexandre Marques Carrer (Universidade de São Paulo, Brazil); Cintia Borges Margi (Universidade de São Paulo & Escola Politécnica, Brazil) |
Intelligent Hopping Mechanism for Deception Defense Scenarios Based on Reinforcement Learning Yazhuo Gao (Academy of Military Sciences, China); Lin Yang (AMS, China); Ran Zhu and Feng Yang (National University of Defense Technology, China); Yining Cao (AMS, China); Long Zhang (Institute of System Engineering Academy of Military Science, China) |
Live Long and Prosper - on the Potential of Segment Routing Midpoint Optimization to Improve Network Robustness Alexander Brundiers (Osnabrück University, Germany); Timmy Schüller (Deutsche Telekom Technik GmbH & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany) |
Monty: A Framework for Latency-Aware Multi-Flow ATSSS Scheduling Alexander Rabitsch, Per Hurtig and Stefan Alfredsson (Karlstad University, Sweden); Anna Brunstrom (Karlstad University, Sweden & University of Malaga, Spain) |
NEP-IDS: A Network Intrusion Detection System Based on Entropy Prediction Error Andrea Augello, Giuseppe Lo Re, Daniele Peri and Partheepan Thiyagalingam (University of Palermo, Italy) |
Optimal Caching Strategy for Data Freshness in IoT Applications with Edge Computing Surabhi Sharma (Indian Institute of Technology, Roorkee, India); Ajay Chaudhary and Sateesh Kumar Peddoju (Indian Institute of Technology Roorkee, India) |
Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach Niruth Bogahawatta (The University of New South Wales, Australia); Yasiru Senarath Karunanayaka (University of Moratuwa & University of Sydney, Sri Lanka); Suranga Seneviratne (The School of Computer Science & The University of Sydney, Australia); Kanchana Thilakarathna (The University of Sydney, Australia); Rahat Masood (University of New South Wales & School of Electrical Engineering and Computer Science, Australia); Salil S Kanhere (UNSW Sydney, Australia); Aruna Seneviratne (University of New South Wales, Australia) |
Plausibly Deniable Content Discovery for Bitswap Using Random Walks Manuel Wedler (Humboldt-University of Berlin, Germany); Erik Daniel (Technische Universität Dresden, Germany); Florian Tschorsch (TU Dresden, Germany) |
Polar-QUIC: Adaptive Packet-Level Polar Coding-Assisted QUIC in Satellite Networks Yang Liu, Fangzheng Feng, Miaoran Peng, Zhaoyang Wang, Ting Bi and Tao Jiang (Huazhong University of Science and Technology, China) |
Research on Security Protection Evasion Mechanism Based on IPv6 Fragment Headers Bin Lin (Zhengzhou University, China); Liancheng Zhang and Yi Guo (National Digital Switching System Engineering and Technological Research Center, China); Hongtao Zhang and Yakai Fang (Zhengzhou University, China) |
RF-AcSense: Device-Free Activity Localization and Recognition via Passive RFID Tag Array Shaoyi Zhu and Hanfei Lv (Zhejiang Police Vocational Academy, China); Weiqing Huang (Institute of Information Engineering CAS, China) |
Science DMZ Networks: How Different are They Really? Emily B Mutter and Susmit Shannigrahi (Tennessee Technological University, USA) |
Securing Computation Offloading in Mobile Edge Computing with Blockchain-Based Trust Management Ahmed Alioua (Mohamed Seddik Benyahia University, Algeria); Nesrine Bouchemal and Randa Mati (University of Jijel, Algeria); Mohamed-Lamine Messai (University of Lyon, France) |
Single-Anchor Indoor Localization Using Multi-Frequency RSSI Fingerprinting Jannis Mast, Thomas Hänel and Nils Aschenbruck (Osnabrück University, Germany) |
Transparent TSN for Agnostic End-Hosts via P4-Based Traffic Characterization at Switches Cornelia Brülhart and Nurefşan Sertbaş Bülbül (Universität Hamburg, Germany); Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security, Germany); Mathias Fischer (Universität Hamburg, Germany) |
Trustable Network Intrusion Detection System Through Wisdomnet and Uncertainty Measures Abhinav Vij (The Pennsylvania State University, USA); Hai Anh Tran (Hanoi University of Science and Technology, Vietnam); Truong X. Tran (The Pennsylvania State University, USA) |
ULTRA: UWB-Based Precise Localization and TRAcking Through A-DBSCAN and Bayesian Zijun Han (University of Testing, USA); Jinzhu Chen and Fan Bai (General Motors, USA) |
UMCC: Uncoupling Multipath Congestion Control Through Shared Bottleneck Detection in Path-Aware Networks Marten Gartner (University of Magdeburg, Germany); David Hausheer (OVGU Magdeburg, Germany) |
Short Papers
A Lightweight Caching Decision Scheme with a Caching-Resource-Utilization-Based Strategy for Information-Centric Networking Yuanhang Li (Tsinghua University, China); Shuang Ouyang (University of International Business and Economics, China); Jiaxian Lv (Independent Researcher, China) |
A Quantum Access Points Selection Algorithm for Large-Scale Localization Ahmed Shokry and Moustafa Youssef (American University in Cairo, Egypt) |
A Two-Stage Optimization Model for Satellite Tracking with Noncooperative Ground-Based Equipment in NGSO Constellations Xiaoyu Zhang, Meng Zhang and Wen Wang (Chinese Academy of Sciences, China); Huadong Guo (Institute of Information Engineering, Chinese Academy of Sciences, China) |
AScan6: IPv6 Address Fast Scanning Technology Based on Service Instance Name Association Yakai Fang (Zhengzhou University, China); Liancheng Zhang and Yi Guo (National Digital Switching System Engineering and Technological Research Center, China); Hongtao Zhang and Bin Lin (Zhengzhou University, China) |
AutoLoRaConfig: Automated Registration Procedure for LoRaWAN Devices Vicente Torres-Sanz, Julio A. Sanguesa, Francisco J. Martinez and Piedad Garrido (University of Zaragoza, Spain); Carlos T. Calafate (Universidad Politécnica de Valencia, Spain) |
Automated Machine Learning Configuration to Learn Intrusion Detectors on Attack-Free Datasets Jérôme François (INRIA Nancy Grand Est & University of Luxembourg, France); Isabelle Chrisment (LORIA-TELECOM Nancy, Université de Lorraine, France); Omar Anser (University of Lorraine, France) |
B.A.T.M.A.N. Mesh Networking on ESP32's 802.11 Randolf Rotta (Brandenburgische Technische Universität Cottbus-Senftenberg, Germany); Julius Schulz (BTU Cottbus, Germany); Billy Naumann (Technische Universität Chemnitz, Germany); Navya Sneha Chatharajupalli (Brandenburgische Technische Universität Cottbus-Senftenberg, Germany); Jörg Nolte (BTU Cottbus, Germany); Matthias Werner (Technische Universität Chemnitz, Germany) |
CardSketch: Shift Attention for Network-Wide Cardinality Telemetry Hanze Chen (Fuzhou University, China); Zhengyan Zhou (Zhejiang University, China); Xinyang Chen, Pengpai Shi and Yanni Wu (Fuzhou University, China); Longlong Zhu (Fuzhou University & Quan Cheng Laboratory, China); Haodong Chen (FuZhou University, China); Dong Zhang (Fuzhou University & Quan Cheng Laboratory, China); Chunming Wu (College of Computer Science, Zhejiang University, China) |
Client-Constrained Virtual Network Embedding Under Uncertainty Junkai He (Telecom SudParis, France); Makhlouf Hadji (AIrbus Defence and Space, France); Djamal Zeghlache (Institut Mines-Telecom, Telecom SudParis, Samovar & Institut Polytechnique de Paris, France) |
CSUM: A Novel Mechanism for Updating CubeSat While Preserving Authenticity and Integrity Ankit Gangwal and Aashish Paliwal (IIIT Hyderabad, India) |
Detecting Important Network Changes in BFT Protocols with Star-Based Communication (StarReact) Martin Nischwitz and Marko Esche (Physikalisch-Technische Bundesanstalt, Germany); Florian Tschorsch (TU Dresden, Germany) |
Detecting IoT Event Spoofing Attacks Using Time-Series Classification Uzma Maroof- (University of New South Wales); Gustavo Batista (University of New South Wales, Australia); Arash Shaghaghi (UNSW Sydney, Australia); Sanjay Jha (University of NSW, Australia) |
DOT: Towards Fast Decision Tree Packet Classification by Optimizing Rule Partitions Long Huang, Longlong Zhu and Jiashuo Yu (Fuzhou University & Quan Cheng Laboratory, China); Xinyang Chen and Linying Zheng (Fuzhou University, China); Dong Zhang (Fuzhou University & Quan Cheng Laboratory, China); Chunming Wu (College of Computer Science, Zhejiang University, China) |
DTN Routing Algorithm in Temporary Shelter Based on Mobility Social Attributes and Message Destination Prediction Jianqun Cui (Huazhong Normal University, China); Mengnan Gao (CCNU, China); Yanan Chang (Central China Normal University, China); Huiran Yan (CCNU, China); Zhiyuan Ma (Central China Normal University, China) |
EFSC: An Efficient, Flexible and Secure Trading System for Computing Power Network Qunyang Lin, Luyang Liu, Hongyin Zhu, Haonan Tong and Chuang Zhang (Inspur Electronic Information Industry CO., LTD., China) |
Enhancing Geographic Greedy Routing in Sparse LDACS Air-To-Air Networks Through k-Hop Neighborhood Exploitation Musab Ahmed and Konrad Fuger (Hamburg University of Technology, Germany); Koojana Kuladinithi (Hamburg University of Technology & Institute of Communication Networks, Germany); Andreas Timm-Giel (Hamburg University of Technology, Germany) |
Evaluating Drill-Down DDoS Destination Detection Timon Krack and Samuel Kopmann (Karlsruhe Institute of Technology, Germany); Martina Zitterbart (KIT, Germany) |
Evidence Theory-Based Trust Management for the Social Internet of Vehicles Nasrin Shamaeian and Dirk Pesch (University College Cork, Ireland) |
Exploring Effective Sensor Deployment Techniques for Dynamic Region of Interest Buddhima Sachinthana Amarathunga, Jyoti Sahni and Alvin C Valera (Victoria University of Wellington, New Zealand) |
Hybrid Traffic-Aware Scheduling for Mobile TSCH Nodes Iliar Rabet (Malardalen University, Sweden); Hossein Fotouhi (Mälardalen University, Sweden); Mário Alves (Politécnico do Porto & ISEP, Portugal); Maryam Vahabi (Mälardalen University, Sweden); Mats Björkman (Malardalen University, Sweden) |
Impact of PTB Message Usage on Path MTU Discovery for QUIC Timo Völker (FH Münster, Germany); Michael Tüxen (Münster University of Applied Sciences, Germany) |
Improving Residential Safety by Multiple Sensors on Multiple Nodes for Joint Emergency Detection Artur Sterz, Markus Sommer, Bernd Freisleben and Kevin Lüttge (Philipps-Universität Marburg, Germany) |
Integrating Quantum-Secured Blockchain Identity Management in Open RAN for 6G Networks Engin Zeydan (CTTC, Spain); Luis Blanco (Centre Tecnològic de les Telecommunicacions de Catalunya (CTTC), Spain); Josep Mangues-Bafalluy (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain); Abdullah Aydeger (Florida Institute of Technology, USA); Suayb S. Arslan (Massachusetts Institute of Technology, USA); Yekta Turk (Aselsan, Turkey) |
Integration of SOCKS-Based MPTCP Proxies as Service Functions in SFC Domains Benjamin Steinert (University of Tuebingen, Germany); Reza Poorzare (Data-Centric Software Systems Research Group at the Institute of Applied Research Karlsruhe Universi, Germany); Marco Häberle and Michael Menth (University of Tuebingen, Germany); Oliver P. Waldhorst (Karlsruhe University of Applied Sciences & Distributed Software Systems (DSS) Research Group at the Insitute of Applied Research (IAF), Germany) |
Is Deep Learning a Better Option than Random Forest for Encrypted Traffic Classification? Philippe Ea (Université Paris Cité, France); Quôc Vo (University of Paris Cité, France); Ahmed Mehaoua (Universite Paris Cite, France); Osman Salem (University of Paris Cité, France) |
MTFS: A Moving Target Defense-Enabled\\ File System for Malware Mitigation Jan von der Assen (University of Zurich UZH, Switzerland); Alberto Huertas Celdrán (University of Zürich UZH, Switzerland & University of Murcia, Spain); Rinor Sefa (University of Zurich, South Africa); Burkhard Stiller (University of Zürich, Switzerland); Gérôme Bovet (Armasuisse, Switzerland) |
Multi-Source Trust Model Based on Blockchain and IoT Edge Task Collaboration He Sikai, Chen Jian and Zhang Peiyun (Nanjing University of Information Science & Technology, China); Zhangjie Fu (Nanjing University of Information Science and Technology, China) |
Multimodal Machine Learning Algorithm for Enhanced Signal Modulation Recognition in Wireless Communication Systems Bojun Zhang (TianJin University, China) |
Online Resource Allocation for Processing Service Function Chains in Fog and Cloud Computing: Analysis Toward 6G Mayron César de Oliveira Moreira (Universidade Federal de Lavras & Universidade Federal de Minas Gerais, Brazil); Samuel Moreira Abreu Araújo (Federal University of São João Del-Rei, Brazil); Geraldo R Mateus (Universidade Federal de Minas Gerais, Brazil) |
Privacy Performance Trade-Off in Web Services Hari Hara Sudhan Selvam (Indian Institute of Technology Gandhinagar, India); Manjesh Kumar Hanawal (Indian Institute of Technology Bombay, India); Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India) |
Reproducible Wireless Experiments in a Containerized Environment with Hardware Access Désirée Rentz, Lukas Heindl and Jonas Andre (Technical University of Munich, Germany); Georg Carle (Technische Universität München, Germany); Stephan M. Günther (Technical University of Munich, Germany) |
Securing Blockchain-Based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs Daniel Commey (Texas A&M University & Kwame Nkrumah University of Science and Technology, USA); Sena Hounsinou (Metro State University, USA); Garth V Crosby (Texas A&M University, USA) |
Securing the Internet of Robotic Things: A Federated Learning Approach Matilda Nkoom (Texas A&M University, USA); Daniel Commey (Texas A&M University & Kwame Nkrumah University of Science and Technology, USA); Garth V Crosby (Texas A&M University, USA); Sena Hounsinou (Metro State University, USA) |
ShieldDINC: Privacy-Preserving Distributed In-Network Computations with Efficient Homomorphic Encryption Htet Htet Hlaing and Hitoshi Asaeda (National Institute of Information and Communications Technology (NICT), Japan) |
SynCoDel: Network-Assisted Synchronization of Video and Haptic Streams for Teleoperations Mingyu Ma and Yushan Yang (Technische Universität Dresden, Germany); Tung Doan (Technische Universität Dresden & Haptic Communication Systems, Germany); Osel Lhamo (Technische Universität Dresden, Germany); Frank H.P. Fitzek (Technische Universität Dresden & ComNets - Communication Networks Group, Germany); Giang T. Nguyen (Technische Universität Dresden, Germany) |
Third Eye: Inferring the State of Your Smartphone Through Wi-Fi Abhishek Kumar Mishra (INSA, Inria Lyon, France); Mathieu Cunche (INSA-Lyon / INRIA, France) |
Thresh-Hold: Assessment of Threshold Cryptography in Leader-Based Consensus Richard von Seck (Technische Universität München, Germany); Filip Rezabek (Technical University of Munich, Germany); Georg Carle (Technische Universität München, Germany) |
Variable-Length Field Extraction for Unknown Binary Network Protocols Xiuwen Sun, Huiying Li, Yu Chen and Jie Cui (Anhui University, China); Hong Zhong (School of Computer Science and Technology, Anhui University, China) |
WoFS: A Write-Only File System for Privacy-Aware Wireless Sensor Networks Philipp Jahn, Markus Sommer and Artur Sterz (Philipps-Universität Marburg, Germany); Jonas Höchst (tRackIT Systems, Germany & University of Marburg, Germany); Bernd Freisleben (Philipps-Universität Marburg, Germany) |
Special Track Papers: Algorithmic Solutions for Drone- and Robot-based Networks (ASDRoNet)
Estimating Soil Moisture with COTS Hardware Using BLE's Angle-Of-Arrival Feature Thomas Hänel and Lennart Kaiser (Osnabrück University, Germany) |
M-SET: Multi-Drone Swarm Intelligence Experimentation with Collision Avoidance Realism Chuhao Qin, Alexander Robins, Callum Lillywhite-Roake, Adam Pearce, Hritik Mehta, Scott James, Tsz Ho Wong and Evangelos Pournaras (University of Leeds, United Kingdom) |
Privacy-Preserving Drone Navigation Through Homomorphic Encryption for Collision Avoidance Allan J Luedeman, Nicholas Baum and Kemal Akkaya (Florida International University, USA); Andrew Quijano (New York University & Amazon, USA) |
Scheduling of Multiple UAVs in BVLoS Operations Along Unidirectional and Bidirectional Paths Francesco Betti Sorbelli (University of Perugia, Italy); Punyasha Chatterjee (Jadavpur University, India); Federico Corò (University of Padova, Italy); Sajjad Ghobadi and Cristina M. Pinotti (University of Perugia, Italy) |
Special Track Papers: Maritime Communication and Security (MarCaS)
Advancing Radar Cybersecurity: Defending Against Adversarial Attacks in SAR Ship Recognition Using Explainable AI and Ensemble Learning Amir Hossein Oveis (Radar and Surveillance Systems (RaSS Lab - CNIT), Italy); Giulio Meucci (UniPi and CNIT, Italy); Francesco Mancuso (University of Pisa & Radar and Surveillance Systems (RaSS) National Laboratory - CNIT, Italy); Alessandro Cantelli-Forti (CNIT, Italy) |
AIS Data Analysis: Reality in the Sea of Echos Gabor Visky (Tallinn University of Technology, Estonia); Olaf M Maennel and Alexander Rohl (University of Adelaide, Australia); Sokratis K. Katsikas (Norwegian University of Science and Technology, Norway) |
AIS Spoofing: A Tutorial for Researchers Gary Craig Kessler (Gary Kessler Associates, USA); Diane M. Zorri (Equis Group, Italy) |
Dude, Where's That Ship? Stealthy Radio Attacks Against AIS Broadcasts Felix Klör and Jan Bauer (Fraunhofer FKIE, Germany); Sachar Paulus (Mannheim University of Applied Sciences, Germany); Michael Rademacher (Fraunhofer FKIE, Germany) |
Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis Hosam Alamleh (University of North Carolina Wilmington & Louisiana Tech University, USA); Bilge Karabacak (University of North Carolina Wilmington, USA) |
Fighting Shadows and Ghosts - A Conceptual Framework for Identification Deception Tactics (IDTs) and MARINE Approach Giangiuseppe Pili, Dr. (James Madison University & Royal United Services Institute, USA); Alessio Armenzoni (Open Source Centre, United Kingdom (Great Britain)) |
Hacking on the High Seas: How Automated Reverse-Engineering Can Assist Vulnerability Discovery of a Proprietary Communication Protocol Gabor Visky (Tallinn University of Technology, Estonia); Alexander Rohl and Olaf M Maennel (University of Adelaide, Australia); Sokratis K. Katsikas (Norwegian University of Science and Technology, Norway); Risto Vaarandi (Tallinn University of Technology, Estonia) |
Sea Trial Measurements of LTE and HF Performance for Underwater Network Extension Gunnar Schneider and Michael Goetz (Fraunhofer FKIE, Germany); Ivor Nissen (University of Kiel, Germany) |