the proceedings contain 226 papers. the topics discussed include: learning-based sensing mode selection for ISAC in intelligent transportation systems;osmotic computing based secure resource orchestration scheme for v...
ISBN:
(纸本)9798331531195
the proceedings contain 226 papers. the topics discussed include: learning-based sensing mode selection for ISAC in intelligent transportation systems;osmotic computing based secure resource orchestration scheme for vehicular communication;finding influential nodes using mixed centralities in complex networks;performance analysis of an underwater partitioned IRS-assisted VLC link with energy harvesting;next-level intrusion detection: multilayered security for future generation 6G networks;exploring emerging spreaders through GCN-based link prediction and a novel centrality method;a multi-modal smart switching based image transmission using semantic communication;and collaborative deadline-sensitive multi-task offloading in vehicular-cloud networks.
the proceedings contain 16 papers. the special focus in this conference is on Verification and Evaluation of Computer and communicationsystems. the topics include: Formal Verification of Declarative Specificatio...
ISBN:
(纸本)9783031853555
the proceedings contain 16 papers. the special focus in this conference is on Verification and Evaluation of Computer and communicationsystems. the topics include: Formal Verification of Declarative Specifications of BPs: DCR2CPN-Based Approach;Toward Green Data Lake Management and Analysis through a CTMC Model;a High Parallelization Method for Automated Formal Verification of Deep Neural networks;monitoring of Neural Network Classifiers Using Neuron Activation Paths;formal Security Analysis of Deep Neural Network Architecture;MDE in the Era of Generative AI;Intrusion Detection Using an Enhancement Bi-LSTM Recurrent Neural Network Model;a Formal Approach for Verifying and Validating Security Objectives in Software Architecture;supervisory Control of Cyber-Physical systems Using Labeled Petri Nets Under Sensor and Actuator Attacks;ERTMS/ETCS L3: Usable Formal Models for the "Loss of Train Integrity" Operation Scenario;towards a Model for Energy-Efficient and Flexible IoT systems;Integrating SysML and Timed Reo to Model and Verify Cyber-Physical systems Interactions with Timing Constraints;a Reliable and Resource-Aware Federated Learning Solution by Decentralizing Client Selection for IoT Devices;DRL Based SFC Orchestration in SDN/NFV Environments Subject to Transient Unavailability.
Internet connectivity in high performance computing (HPC) systems like national super-computing facilities increase the risk of security threats. this paper presents HiPer, an end-to-end extended detection and respons...
详细信息
this paper examines the integration of Intelligent Reflecting Surfaces (IRS) in beyond 5G (B5G) communicationnetworks, where the IRS reflects signals with adjustable phase shifts. By optimizing these phase shifts, ca...
详细信息
this work is motivated by the task of scheduling communication in latency-sensitive systems with potentially unreliable sources. the system consists of multiple communication channels with unknown communication succes...
详细信息
the integration of Terrestrial networks (TNs) and Non-Terrestrial networks (NTNs), including satellites, is essential for enabling seamless, high-quality, and ubiquitous communication in the era beyond 5G. this paper ...
详细信息
this paper presents the nascent paradigm of Semantic communication under the larger context of the Native AI & ML as promised by 6G networks. Two typical applications scenarios are presented from education and dis...
详细信息
this paper presents a comprehensive methodology for investigating incidents related to access violations in information systems. Withthe increasing number of cyberattacks targeting organizations' credentials and ...
详细信息
Supervisory Control and Data Acquisition systems are the backbone of managing critical infrastructure in modern industrial control systems, spanning sectors from power generation to logistics. However, these systems f...
详细信息
Withthe current evolution in cellular communication towards 6G networks, it is envisioned to provide value added services and enhanced performance for vehicle-to-everything (V2X). In addition to the stringent perform...
详细信息
暂无评论