The 49th IEEE Conference on Local Computer Networks (LCN), October 8-10, 2024, in Caen, Normandy, France

Accepted Papers


The following set of papers have been accepted for the LCN. See the Technical Program for detailed information about the papers and schedule.


Regular Papers

Accurate Identification of IoT Devices in the Presence of Wireless Channel Dynamics
Bhagyashri Tushir (Santa Clara University & NSIT, Delhi, USA); Vikram Ramanna, Yuhong Liu and Behnam Dezfouli (Santa Clara University, USA)
ActiveDNS: Is There Room for DNS Optimization Beyond CDNs?
Yue Wang (Computer Network Information Center, University of Chinese Academy of Sciences, China); Changhua Pei (Chinese Academy of Sciences, China); Zexin Wang (Computer Network Information Center, Chinese Academy of Sciences & University of Chinese of Sciences, China); Yingqiang Wang (University of Chinese Academy of Sciences, China); Guo Chen (Hunan University, China); Yuchao Zhang (Beijing University of Posts and Telecommunications, China); Yi Li and Jingjing Li (University of Chinese Academy of Sciences, China); Jianhui LI (Computer Network Information Center, CAS, China); Gaogang Xie (CNIC Chinese Academy of Sciences & University of Chinese Academy of Sciences, China)
AI/ML-Based IDS as 5G Core Network Function in the Control Plane for IP/Non-IP CIoT Traffic
Tan Nhat Linh Le (University of Versailles Saint-Quentin-en-Yvelines, France); Boussad Ait Salem (Efrei Reasearch Lab - Panthéon - Assas University, France & Efrei Paris, France); Dave APPADOO (Paris-Panthéon-Assas Université, France); Nadjib Aitsaadi (UVSQ Paris-Saclay & DAVIDLab, France); Xiaojiang Du (Stevens Institute of Technology, USA)
BandSeer: Bandwidth Prediction for Cellular Networks
Birkan Denizer (University of Kiel, Germany); Olaf Landsiedel (Kiel University, Germany & Chalmers University of Technology, Sweden)
Blocking-Waived Estimation: Improving the Worst-Case End-To-End Delay Analysis in Switched Ethernet
Lijie Yang (Carnegie Mellon University, USA); Théo Docquier (Université de Lorraine, France); Ludovic Thomas (EPFL, Switzerland); Ye-Qiong Song (LORIA, France)
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator
Denis Donadel and Francesco Marchiori (University of Padova, Italy); Luca Pajola (University of Padova, Italy & Spritz Matter Srl, Italy); Mauro Conti (University of Padova, Italy & Delft University of Technology, The Netherlands)
CLEVER: Crafting Intelligent MISP for Cyber Threat Intelligence
Han Wang and Alfonso Iacovazzi (RISE Research Institutes of Sweden, Sweden); Seonghyun Kim (Ericsson AB, Sweden); Shahid Raza (RISE Research Institutes of Sweden, Sweden)
Collaborative Edge Caching and Dynamic Bitrate Adaptation for SHVC-Based VR Video Streaming
Siyang Chen, Luyao Chen, Yong Tang and WenYong Wang (University of Electronic Science and Technology of China, China)
Continuous Select-And-Prune Incremental Learning for Encrypted Traffic Classification in Distributed SDN Networks
Son Duong and Hai Anh Tran (Hanoi University of Science and Technology, Vietnam); Truong X. Tran (The Pennsylvania State University, USA)
DDoS Attack Detection and Mitigation in 5G Networks Using P4 and SDN
Diana S Pineda Andrade, Kemal Akkaya and Alexander Pons (Florida International University, USA); Selcuk Uluagac (Florida International University & Electrical and Computer Engineering, USA); Abdulhadi Sahin (Florida International University, USA)
Deep Learning for Reducing Redundancy in Madrid's Traffic Sensor Network
Leyuan Ding (Institut Polytechnique de Paris & Telecom SudParis, France); Praboda Rajapaksha (Telecom SudParis & Uva Wellassa University, France); Roberto Minerva (IMT-TSP & Telecom Sud Paris, France); Noel Crespi (Institut Mines-Télécom, Télécom SudParis, France)
Detecting Network Anomalies in NetFlow Traffic with Machine Learning Algorithms
Quôc Vo (University of Paris Cité, France); Philippe Ea (Université Paris Cité, France); Osman Salem (University of Paris Cité, France); Ahmed Mehaoua (Universite Paris Cite, France)
Extending Boundaries with WiLong: A Field Study on Long-Range Wi-Fi Mesh Custom Solution
Kavin Kumar Thangadorai (Indian Institute Of Technology Madras, India & Technology Innovation Institute, United Arab Emirates); Monika Prakash (Senior Researcher, United Arab Emirates); Michael Baddeley and Anshul Pandey (Technology Innovation Institute, United Arab Emirates); Krishna M. Sivalingam (Indian Institute of Technology Madras, India)
Failure Resilient Green Traffic Engineering
Daniel Otten and Nils Aschenbruck (Osnabrück University, Germany)
Flow Migration for Service Function Chains: Preserving External-Ordering
Ranjan Patowary (Central Institute of Technology Kokrajhar, India); Gautam Barua and Radhika Sukapuram (Indian Institute of Information Technology Guwahati, India)
GoNP: Graph of Network Patterns for Device Identification Using UDP Application Layer Protocols
Farah Kandah and Lalith Medury (Auburn University, USA)
HPDNS: A High-Performance and Robust Domain Name Service Architecture Based on In-Network Computing
Xingyu Li (China); Shuyong Zhu (Institute of Computing Technology Chinese Academy of Sciences, China)
Improving Centralized Intrusion Detection with Hardware Operational Metrics in Internet of Things
Alexandre Marques Carrer (Universidade de São Paulo, Brazil); Cintia Borges Margi (Universidade de São Paulo & Escola Politécnica, Brazil)
Intelligent Hopping Mechanism for Deception Defense Scenarios Based on Reinforcement Learning
Yazhuo Gao (Academy of Military Sciences, China); Lin Yang (AMS, China); Ran Zhu and Feng Yang (National University of Defense Technology, China); Yining Cao (AMS, China); Long Zhang (Institute of System Engineering Academy of Military Science, China)
Live Long and Prosper - on the Potential of Segment Routing Midpoint Optimization to Improve Network Robustness
Alexander Brundiers (Osnabrück University, Germany); Timmy Schüller (Deutsche Telekom Technik GmbH & Osnabrück University, Germany); Nils Aschenbruck (Osnabrück University, Germany)
Monty: A Framework for Latency-Aware Multi-Flow ATSSS Scheduling
Alexander Rabitsch, Per Hurtig and Stefan Alfredsson (Karlstad University, Sweden); Anna Brunstrom (Karlstad University, Sweden & University of Malaga, Spain)
NEP-IDS: A Network Intrusion Detection System Based on Entropy Prediction Error
Andrea Augello, Giuseppe Lo Re, Daniele Peri and Partheepan Thiyagalingam (University of Palermo, Italy)
Optimal Caching Strategy for Data Freshness in IoT Applications with Edge Computing
Surabhi Sharma (Indian Institute of Technology, Roorkee, India); Ajay Chaudhary and Sateesh Kumar Peddoju (Indian Institute of Technology Roorkee, India)
Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach
Niruth Bogahawatta (The University of New South Wales, Australia); Yasiru Senarath Karunanayaka (University of Moratuwa & University of Sydney, Sri Lanka); Suranga Seneviratne (The School of Computer Science & The University of Sydney, Australia); Kanchana Thilakarathna (The University of Sydney, Australia); Rahat Masood (University of New South Wales & School of Electrical Engineering and Computer Science, Australia); Salil S Kanhere (UNSW Sydney, Australia); Aruna Seneviratne (University of New South Wales, Australia)
Plausibly Deniable Content Discovery for Bitswap Using Random Walks
Manuel Wedler (Humboldt-University of Berlin, Germany); Erik Daniel (Technische Universität Dresden, Germany); Florian Tschorsch (TU Dresden, Germany)
Polar-QUIC: Adaptive Packet-Level Polar Coding-Assisted QUIC in Satellite Networks
Yang Liu, Fangzheng Feng, Miaoran Peng, Zhaoyang Wang, Ting Bi and Tao Jiang (Huazhong University of Science and Technology, China)
Research on Security Protection Evasion Mechanism Based on IPv6 Fragment Headers
Bin Lin (Zhengzhou University, China); Liancheng Zhang and Yi Guo (National Digital Switching System Engineering and Technological Research Center, China); Hongtao Zhang and Yakai Fang (Zhengzhou University, China)
RF-AcSense: Device-Free Activity Localization and Recognition via Passive RFID Tag Array
Shaoyi Zhu and Hanfei Lv (Zhejiang Police Vocational Academy, China); Weiqing Huang (Institute of Information Engineering CAS, China)
Science DMZ Networks: How Different are They Really?
Emily B Mutter and Susmit Shannigrahi (Tennessee Technological University, USA)
Securing Computation Offloading in Mobile Edge Computing with Blockchain-Based Trust Management
Ahmed Alioua (Mohamed Seddik Benyahia University, Algeria); Nesrine Bouchemal and Randa Mati (University of Jijel, Algeria); Mohamed-Lamine Messai (University of Lyon, France)
Single-Anchor Indoor Localization Using Multi-Frequency RSSI Fingerprinting
Jannis Mast, Thomas Hänel and Nils Aschenbruck (Osnabrück University, Germany)
Transparent TSN for Agnostic End-Hosts via P4-Based Traffic Characterization at Switches
Cornelia Brülhart and Nurefşan Sertbaş Bülbül (Universität Hamburg, Germany); Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security, Germany); Mathias Fischer (Universität Hamburg, Germany)
Trustable Network Intrusion Detection System Through Wisdomnet and Uncertainty Measures
Abhinav Vij (The Pennsylvania State University, USA); Hai Anh Tran (Hanoi University of Science and Technology, Vietnam); Truong X. Tran (The Pennsylvania State University, USA)
ULTRA: UWB-Based Precise Localization and TRAcking Through A-DBSCAN and Bayesian
Zijun Han (University of Testing, USA); Jinzhu Chen and Fan Bai (General Motors, USA)
UMCC: Uncoupling Multipath Congestion Control Through Shared Bottleneck Detection in Path-Aware Networks
Marten Gartner (University of Magdeburg, Germany); David Hausheer (OVGU Magdeburg, Germany)

Short Papers

A Lightweight Caching Decision Scheme with a Caching-Resource-Utilization-Based Strategy for Information-Centric Networking
Yuanhang Li (Tsinghua University, China); Shuang Ouyang (University of International Business and Economics, China); Jiaxian Lv (Independent Researcher, China)
A Quantum Access Points Selection Algorithm for Large-Scale Localization
Ahmed Shokry and Moustafa Youssef (American University in Cairo, Egypt)
A Two-Stage Optimization Model for Satellite Tracking with Noncooperative Ground-Based Equipment in NGSO Constellations
Xiaoyu Zhang, Meng Zhang and Wen Wang (Chinese Academy of Sciences, China); Huadong Guo (Institute of Information Engineering, Chinese Academy of Sciences, China)
AScan6: IPv6 Address Fast Scanning Technology Based on Service Instance Name Association
Yakai Fang (Zhengzhou University, China); Liancheng Zhang and Yi Guo (National Digital Switching System Engineering and Technological Research Center, China); Hongtao Zhang and Bin Lin (Zhengzhou University, China)
AutoLoRaConfig: Automated Registration Procedure for LoRaWAN Devices
Vicente Torres-Sanz, Julio A. Sanguesa, Francisco J. Martinez and Piedad Garrido (University of Zaragoza, Spain); Carlos T. Calafate (Universidad Politécnica de Valencia, Spain)
Automated Machine Learning Configuration to Learn Intrusion Detectors on Attack-Free Datasets
Jérôme François (INRIA Nancy Grand Est & University of Luxembourg, France); Isabelle Chrisment (LORIA-TELECOM Nancy, Université de Lorraine, France); Omar Anser (University of Lorraine, France)
B.A.T.M.A.N. Mesh Networking on ESP32's 802.11
Randolf Rotta (Brandenburgische Technische Universität Cottbus-Senftenberg, Germany); Julius Schulz (BTU Cottbus, Germany); Billy Naumann (Technische Universität Chemnitz, Germany); Navya Sneha Chatharajupalli (Brandenburgische Technische Universität Cottbus-Senftenberg, Germany); Jörg Nolte (BTU Cottbus, Germany); Matthias Werner (Technische Universität Chemnitz, Germany)
CardSketch: Shift Attention for Network-Wide Cardinality Telemetry
Hanze Chen (Fuzhou University, China); Zhengyan Zhou (Zhejiang University, China); Xinyang Chen, Pengpai Shi and Yanni Wu (Fuzhou University, China); Longlong Zhu (Fuzhou University & Quan Cheng Laboratory, China); Haodong Chen (FuZhou University, China); Dong Zhang (Fuzhou University & Quan Cheng Laboratory, China); Chunming Wu (College of Computer Science, Zhejiang University, China)
Client-Constrained Virtual Network Embedding Under Uncertainty
Junkai He (Telecom SudParis, France); Makhlouf Hadji (AIrbus Defence and Space, France); Djamal Zeghlache (Institut Mines-Telecom, Telecom SudParis, Samovar & Institut Polytechnique de Paris, France)
CSUM: A Novel Mechanism for Updating CubeSat While Preserving Authenticity and Integrity
Ankit Gangwal and Aashish Paliwal (IIIT Hyderabad, India)
Detecting Important Network Changes in BFT Protocols with Star-Based Communication (StarReact)
Martin Nischwitz and Marko Esche (Physikalisch-Technische Bundesanstalt, Germany); Florian Tschorsch (TU Dresden, Germany)
Detecting IoT Event Spoofing Attacks Using Time-Series Classification
Uzma Maroof- (University of New South Wales); Gustavo Batista (University of New South Wales, Australia); Arash Shaghaghi (UNSW Sydney, Australia); Sanjay Jha (University of NSW, Australia)
DOT: Towards Fast Decision Tree Packet Classification by Optimizing Rule Partitions
Long Huang, Longlong Zhu and Jiashuo Yu (Fuzhou University & Quan Cheng Laboratory, China); Xinyang Chen and Linying Zheng (Fuzhou University, China); Dong Zhang (Fuzhou University & Quan Cheng Laboratory, China); Chunming Wu (College of Computer Science, Zhejiang University, China)
DTN Routing Algorithm in Temporary Shelter Based on Mobility Social Attributes and Message Destination Prediction
Jianqun Cui (Huazhong Normal University, China); Mengnan Gao (CCNU, China); Yanan Chang (Central China Normal University, China); Huiran Yan (CCNU, China); Zhiyuan Ma (Central China Normal University, China)
EFSC: An Efficient, Flexible and Secure Trading System for Computing Power Network
Qunyang Lin, Luyang Liu, Hongyin Zhu, Haonan Tong and Chuang Zhang (Inspur Electronic Information Industry CO., LTD., China)
Enhancing Geographic Greedy Routing in Sparse LDACS Air-To-Air Networks Through k-Hop Neighborhood Exploitation
Musab Ahmed and Konrad Fuger (Hamburg University of Technology, Germany); Koojana Kuladinithi (Hamburg University of Technology & Institute of Communication Networks, Germany); Andreas Timm-Giel (Hamburg University of Technology, Germany)
Evaluating Drill-Down DDoS Destination Detection
Timon Krack and Samuel Kopmann (Karlsruhe Institute of Technology, Germany); Martina Zitterbart (KIT, Germany)
Evidence Theory-Based Trust Management for the Social Internet of Vehicles
Nasrin Shamaeian and Dirk Pesch (University College Cork, Ireland)
Exploring Effective Sensor Deployment Techniques for Dynamic Region of Interest
Buddhima Sachinthana Amarathunga, Jyoti Sahni and Alvin C Valera (Victoria University of Wellington, New Zealand)
Hybrid Traffic-Aware Scheduling for Mobile TSCH Nodes
Iliar Rabet (Malardalen University, Sweden); Hossein Fotouhi (Mälardalen University, Sweden); Mário Alves (Politécnico do Porto & ISEP, Portugal); Maryam Vahabi (Mälardalen University, Sweden); Mats Björkman (Malardalen University, Sweden)
Impact of PTB Message Usage on Path MTU Discovery for QUIC
Timo Völker (FH Münster, Germany); Michael Tüxen (Münster University of Applied Sciences, Germany)
Improving Residential Safety by Multiple Sensors on Multiple Nodes for Joint Emergency Detection
Artur Sterz, Markus Sommer, Bernd Freisleben and Kevin Lüttge (Philipps-Universität Marburg, Germany)
Integrating Quantum-Secured Blockchain Identity Management in Open RAN for 6G Networks
Engin Zeydan (CTTC, Spain); Luis Blanco (Centre Tecnològic de les Telecommunicacions de Catalunya (CTTC), Spain); Josep Mangues-Bafalluy (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC), Spain); Abdullah Aydeger (Florida Institute of Technology, USA); Suayb S. Arslan (Massachusetts Institute of Technology, USA); Yekta Turk (Aselsan, Turkey)
Integration of SOCKS-Based MPTCP Proxies as Service Functions in SFC Domains
Benjamin Steinert (University of Tuebingen, Germany); Reza Poorzare (Data-Centric Software Systems Research Group at the Institute of Applied Research Karlsruhe Universi, Germany); Marco Häberle and Michael Menth (University of Tuebingen, Germany); Oliver P. Waldhorst (Karlsruhe University of Applied Sciences & Distributed Software Systems (DSS) Research Group at the Insitute of Applied Research (IAF), Germany)
Is Deep Learning a Better Option than Random Forest for Encrypted Traffic Classification?
Philippe Ea (Université Paris Cité, France); Quôc Vo (University of Paris Cité, France); Ahmed Mehaoua (Universite Paris Cite, France); Osman Salem (University of Paris Cité, France)
MTFS: A Moving Target Defense-Enabled\\ File System for Malware Mitigation
Jan von der Assen (University of Zurich UZH, Switzerland); Alberto Huertas Celdrán (University of Zürich UZH, Switzerland & University of Murcia, Spain); Rinor Sefa (University of Zurich, South Africa); Burkhard Stiller (University of Zürich, Switzerland); Gérôme Bovet (Armasuisse, Switzerland)
Multi-Source Trust Model Based on Blockchain and IoT Edge Task Collaboration
He Sikai, Chen Jian and Zhang Peiyun (Nanjing University of Information Science & Technology, China); Zhangjie Fu (Nanjing University of Information Science and Technology, China)
Multimodal Machine Learning Algorithm for Enhanced Signal Modulation Recognition in Wireless Communication Systems
Bojun Zhang (TianJin University, China)
Online Resource Allocation for Processing Service Function Chains in Fog and Cloud Computing: Analysis Toward 6G
Mayron César de Oliveira Moreira (Universidade Federal de Lavras & Universidade Federal de Minas Gerais, Brazil); Samuel Moreira Abreu Araújo (Federal University of São João Del-Rei, Brazil); Geraldo R Mateus (Universidade Federal de Minas Gerais, Brazil)
Privacy Performance Trade-Off in Web Services
Hari Hara Sudhan Selvam (Indian Institute of Technology Gandhinagar, India); Manjesh Kumar Hanawal (Indian Institute of Technology Bombay, India); Sameer G Kulkarni (Indian Institute of Technology, Gandhinagar, India)
Reproducible Wireless Experiments in a Containerized Environment with Hardware Access
Désirée Rentz, Lukas Heindl and Jonas Andre (Technical University of Munich, Germany); Georg Carle (Technische Universität München, Germany); Stephan M. Günther (Technical University of Munich, Germany)
Securing Blockchain-Based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs
Daniel Commey (Texas A&M University & Kwame Nkrumah University of Science and Technology, USA); Sena Hounsinou (Metro State University, USA); Garth V Crosby (Texas A&M University, USA)
Securing the Internet of Robotic Things: A Federated Learning Approach
Matilda Nkoom (Texas A&M University, USA); Daniel Commey (Texas A&M University & Kwame Nkrumah University of Science and Technology, USA); Garth V Crosby (Texas A&M University, USA); Sena Hounsinou (Metro State University, USA)
ShieldDINC: Privacy-Preserving Distributed In-Network Computations with Efficient Homomorphic Encryption
Htet Htet Hlaing and Hitoshi Asaeda (National Institute of Information and Communications Technology (NICT), Japan)
SynCoDel: Network-Assisted Synchronization of Video and Haptic Streams for Teleoperations
Mingyu Ma and Yushan Yang (Technische Universität Dresden, Germany); Tung Doan (Technische Universität Dresden & Haptic Communication Systems, Germany); Osel Lhamo (Technische Universität Dresden, Germany); Frank H.P. Fitzek (Technische Universität Dresden & ComNets - Communication Networks Group, Germany); Giang T. Nguyen (Technische Universität Dresden, Germany)
Third Eye: Inferring the State of Your Smartphone Through Wi-Fi
Abhishek Kumar Mishra (INSA, Inria Lyon, France); Mathieu Cunche (INSA-Lyon / INRIA, France)
Thresh-Hold: Assessment of Threshold Cryptography in Leader-Based Consensus
Richard von Seck (Technische Universität München, Germany); Filip Rezabek (Technical University of Munich, Germany); Georg Carle (Technische Universität München, Germany)
Variable-Length Field Extraction for Unknown Binary Network Protocols
Xiuwen Sun, Huiying Li, Yu Chen and Jie Cui (Anhui University, China); Hong Zhong (School of Computer Science and Technology, Anhui University, China)
WoFS: A Write-Only File System for Privacy-Aware Wireless Sensor Networks
Philipp Jahn, Markus Sommer and Artur Sterz (Philipps-Universität Marburg, Germany); Jonas Höchst (tRackIT Systems, Germany & University of Marburg, Germany); Bernd Freisleben (Philipps-Universität Marburg, Germany)

Special Track Papers: Algorithmic Solutions for Drone- and Robot-based Networks (ASDRoNet)

Estimating Soil Moisture with COTS Hardware Using BLE's Angle-Of-Arrival Feature
Thomas Hänel and Lennart Kaiser (Osnabrück University, Germany)
M-SET: Multi-Drone Swarm Intelligence Experimentation with Collision Avoidance Realism
Chuhao Qin, Alexander Robins, Callum Lillywhite-Roake, Adam Pearce, Hritik Mehta, Scott James, Tsz Ho Wong and Evangelos Pournaras (University of Leeds, United Kingdom)
Privacy-Preserving Drone Navigation Through Homomorphic Encryption for Collision Avoidance
Allan J Luedeman, Nicholas Baum and Kemal Akkaya (Florida International University, USA); Andrew Quijano (New York University & Amazon, USA)
Scheduling of Multiple UAVs in BVLoS Operations Along Unidirectional and Bidirectional Paths
Francesco Betti Sorbelli (University of Perugia, Italy); Punyasha Chatterjee (Jadavpur University, India); Federico Corò (University of Padova, Italy); Sajjad Ghobadi and Cristina M. Pinotti (University of Perugia, Italy)

Special Track Papers: Maritime Communication and Security (MarCaS)

Advancing Radar Cybersecurity: Defending Against Adversarial Attacks in SAR Ship Recognition Using Explainable AI and Ensemble Learning
Amir Hossein Oveis (Radar and Surveillance Systems (RaSS Lab - CNIT), Italy); Giulio Meucci (UniPi and CNIT, Italy); Francesco Mancuso (University of Pisa & Radar and Surveillance Systems (RaSS) National Laboratory - CNIT, Italy); Alessandro Cantelli-Forti (CNIT, Italy)
AIS Data Analysis: Reality in the Sea of Echos
Gabor Visky (Tallinn University of Technology, Estonia); Olaf M Maennel and Alexander Rohl (University of Adelaide, Australia); Sokratis K. Katsikas (Norwegian University of Science and Technology, Norway)
AIS Spoofing: A Tutorial for Researchers
Gary Craig Kessler (Gary Kessler Associates, USA); Diane M. Zorri (Equis Group, Italy)
Dude, Where's That Ship? Stealthy Radio Attacks Against AIS Broadcasts
Felix Klör and Jan Bauer (Fraunhofer FKIE, Germany); Sachar Paulus (Mannheim University of Applied Sciences, Germany); Michael Rademacher (Fraunhofer FKIE, Germany)
Exploring the Security Landscape of Underwater Positioning and Navigation Systems: An Attack Surface Analysis
Hosam Alamleh (University of North Carolina Wilmington & Louisiana Tech University, USA); Bilge Karabacak (University of North Carolina Wilmington, USA)
Fighting Shadows and Ghosts - A Conceptual Framework for Identification Deception Tactics (IDTs) and MARINE Approach
Giangiuseppe Pili, Dr. (James Madison University & Royal United Services Institute, USA); Alessio Armenzoni (Open Source Centre, United Kingdom (Great Britain))
Hacking on the High Seas: How Automated Reverse-Engineering Can Assist Vulnerability Discovery of a Proprietary Communication Protocol
Gabor Visky (Tallinn University of Technology, Estonia); Alexander Rohl and Olaf M Maennel (University of Adelaide, Australia); Sokratis K. Katsikas (Norwegian University of Science and Technology, Norway); Risto Vaarandi (Tallinn University of Technology, Estonia)
Sea Trial Measurements of LTE and HF Performance for Underwater Network Extension
Gunnar Schneider and Michael Goetz (Fraunhofer FKIE, Germany); Ivor Nissen (University of Kiel, Germany)