Abstract is missing.
- Bridging the Chasm Between Ideal and Realistic Federated Learning: A Measurements StudyHend K. Gedawy, Khaled A. Harras, Temoor Tanveer, Thang Bui. 1-9 [doi]
- SAGE - A Tool for Optimal Deployments in Kubernetes ClustersVlad-Ioan Luca, Madalina Erascu. 10-17 [doi]
- Introducing TinyKVM for High-Performance CDN Edge ServicesAlf-Andre Walla, Paal E. Engelstad. 18-25 [doi]
- Inverse Response Time Ratio Scheduler: Optimizing Throughput and Response Time for Serverless ComputingMina Morcos, Ibrahim Matta. 26-33 [doi]
- GSLAC: GPU Software Level Access Control for Information Isolation on Cloud PlatformsChia-Chang Li, Po-Cheng Wu, Che-Rung Lee. 34-41 [doi]
- A Load Balancing Algorithm For Long-Life Green Edge SystemsRoberto Beraldi, Gabriele Proietti Mattia. 42-51 [doi]
- Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing ApproachQiushi Guo, Yifan Chen, Shisha Liao. 52-57 [doi]
- A Blockchain-based Online Trading Platform: TrustTradeGuang Yang, Lorena-Alina Alexandru, Marius Storheim. 58-62 [doi]
- Enabling 5G QoS configuration capabilities for IoT applications on container orchestration platformYu Liu, Aitor Hernandez Herranz. 63-68 [doi]
- CloudScent: A Model for Code Smell Analysis in Open-Source CloudRaj Narendra Shah, Sameer Ahmed Mohamed, Asif Imran, Tevfik Kosar. 69-75 [doi]
- Recommendation engine for optimal Spark delta tables partitioningRui Esteves, Håvard Moe Jacobsen, Ola Andrè Flotve. 76-81 [doi]
- A Lightweight Routing Layer Using a Reliable Link-Layer ProtocolQiangfeng Shen, Paul Chow. 82-90 [doi]
- A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical InfrastructuresEnrico Bravi, Diana Gratiela Berbecaru, Antonio Lioy. 91-98 [doi]
- MScheduler: Leveraging Spot Instances for High-Performance Reservoir Simulation in the CloudFelipe A. Portella, Paulo J. B. Estrela, Renzo Q. Malini, Luan Teylo, Josep Lluís Berral, Lúcia M. A. Drummond. 99-106 [doi]
- Depot: Dependency-Eager Platform of TransformationsKerem Çelik, Samridhi Maheshwari, Shereen Elsayed, Markus Mock, Chandra Krintz, Rich Wolski. 107-114 [doi]
- Experimental analysis of microservices architectures for hosting cloud-based Massive Multiplayer Online Role-Playing Game (MMORPG)Marlon H. Schweigert, Diego E. G. C. de Oliveira, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers. 115-122 [doi]
- Can Software Containerisation Fit The Car On-Board Systems ?David Fernández Blanco, Frédéric Le Mouël, Trista Lin, Amir Rekik. 123-130 [doi]
- Cost-optimized scheduling for Microservices in KubernetesSugunakumar Arunan, Gayashan Amarasinghe, Indika Perera. 131-138 [doi]
- Lightweight Cloud Application SandboxingMarco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi. 139-146 [doi]
- Energy-Efficient Offloading in Edge Slicing with Non-Linear Power FunctionsJiahe Xu, Jing Fu 0001, Jingjin Wu, Moshe Zukerman. 147-154 [doi]
- Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloudJoao Henrique Faes Battisti, Vitor E. Batista, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Marco A. Marques, Marcos A. Simplício Jr., Diego Kreutz. 155-160 [doi]
- Energy-Aware Streaming Analytics Job Scheduling for Edge ComputingDemetris Trihinas, Moysis Symeonides, Joanna Georgiou, George Pallis 0001, Marios D. Dikaiakos. 161-168 [doi]
- Triad: Trusted Timestamps in Untrusted EnvironmentsGabriel P. Fernandez, Andrey Brito, Christof Fetzer. 169-176 [doi]
- Enhanced Runtime-Adaptable Routing for Serverless Functions based on Performance and Cost Tradeoffs in Hybrid Cloud SettingsGeorgios Fatouros, George Kousiouris, Georgios Makridis, John Soldatos 0001, Michael Filippakis, Dimosthenis Kyriazis. 177-184 [doi]
- The Flaw Within: Identifying CVSS Score Discrepancies in the NVDSiqi Zhang, Minjie Cai, Mengyuan Zhang 0001, Lianying Zhao, Xavier de Carné de Carnavalet. 185-192 [doi]
- Addressing Serverless Computing Vendor Lock-In through Cloud Service AbstractionDi Mo, Robert Cordingly, Donald Chinn, Wes Lloyd. 193-199 [doi]
- Peer-to-Peer Approach for Edge Computing ServicesMuhammad Anjum Malik, Tobias Pleuger, Stephan Recker. 200-207 [doi]
- Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion DetectionMarta Catillo, Antonio Pecchia, Umberto Villano. 208-215 [doi]
- Decentralized Authentication in Microservice Architectures with SSI and DID in BlockchainBiagio Boi, Christian Esposito 0001. 216-223 [doi]
- PuppetStack: A tool for building high-availability private cloud infrastructuresFabrizio Messina, Miriana Russo, Corrado Santoro, Federico Fausto Santoro, Salvatore Riccobene. 224-231 [doi]
- Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case StudyGennaro Pio Rimoli, Daniele Granata, Massimo Ficco. 232-237 [doi]
- HCoop: A Cooperative and Hybrid Resource Scheduling for Heterogeneous Jobs in CloudsJinwei Liu, Rui Gong, Wei Dai, Wei Zheng, Ying Mao, Wei Zhou, Feng Deng. 238-245 [doi]
- Undoing CRDT Operations AutomaticallyProvakar Mondal, Eli Tilevich. 246-251 [doi]
- Enabling Trusted TEE-as-a-Service Models with Privacy Preserving AutomatonsBala Subramanyan, Arne Hollum, Giovanni Mazzeo, Matthew Ficke, Darshan Vaydia. 252-260 [doi]
- OSμS: An Open-Source Microservice Prototyping PlatformLamees M. Al Qassem, Thanos Stouraitis, Ernesto Damiani, Ibrahim Abe M. Elfadel. 261-268 [doi]
- Testing techniques to assess impact and cascading effectsValeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli. 269-272 [doi]
- Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable FunctionsMario Barbareschi, Valentina Casola, Daniele Lombardi. 273-278 [doi]
- An Evaluation of Transformer Models for Early Intrusion Detection in Cloud ContinuumMd. Mahbubul Islam, Tanwir Ahmad, Dragos Truscan. 279-284 [doi]
- 5G SUCI Catcher: Attack and DetectionLorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli. 285-290 [doi]
- Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systemsEider Iturbe, Erkuden Rios, Nerea Toledo. 291-297 [doi]
- Towards Smarter Security Orchestration and Automatic Response for CPS and IoTPhu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry 0001. 298-302 [doi]
- Design and Implementation of Web3-Based E-Commerce Cryptocurrency Payment SystemSeung-Seok Lee, Sang Joon Lee. 303-308 [doi]
- Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and TrendsPanagiotis I. Radoglou-Grammatikis, Elisavet Kioseoglou, Dimitrios Christos Asimopoulos, Miltiadis G. Siavvas, Ioannis Nanos, Thomas Lagkas, Vasileios Argyriou, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis. 309-314 [doi]
- Detecting Security Requirements in GitHub Issues -Novel Dataset and SmallBERT-based modelPolina Minina, Andrey Sadovykh, Vladimir Ivanov. 315-318 [doi]
- Software Bill of Materials in Critical InfrastructureLars Andreassen Jaatun, Silje Marie Sørlien, Ravishankar Borgaonkar, Steve Taylor, Martin Gilje Jaatun. 319-324 [doi]
- Increasing Robustness of Blockchain Peer-to-Peer Networks with Alternative Peer InitializationBernadet Klein Wassink, Zhiming Zhao. 325-332 [doi]
- Decoding NFT Market Dynamics with DataSmruti Inamdar, Zhiming Zhao. 333-340 [doi]
- Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code DetectionJungwon Seo, Nan Zhang, Chunming Rong. 341-349 [doi]