Default Cover Image

2018 IEEE Symposium on Computers and Communications (ISCC)

June 25 2018 to June 28 2018

Natal, Brazil

Table of Contents

ISCC 2018 Author Information PageFreely available from IEEE.pp. 43-64
ISCC 2018 CommitteesFreely available from IEEE.pp. 31-32
[Copyright notice]Freely available from IEEE.pp. 1-1
Table of contentsFreely available from IEEE.pp. 3-30
ISCC 2018 Technical Program CommitteeFreely available from IEEE.pp. 33-42
ISCC 2018 WelcomeFreely available from IEEE.pp. 2-2
LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Security and Privacy in Extensible Distributed CoordinationFull-text access may be available. Sign in or learn about subscription options.pp. 28-31
A High-Performance Round-Robin Regular Expression Matching Architecture Based on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Secure Transmission Against Pilot Contamination: A Cooperative Scheme with Multiple AntennasFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Parallel Polar Encoding in 5G CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 52-69
BGCC: a Bloom Filter-based Grouped-Chunk Caching Approach for Information-Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 56-59
Blockchain-based Mutual Authentication Security Protocol for Distributed RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 60-63
B-Cache: A Behavior-Level Caching Framework for the Programmable Data PlaneFull-text access may be available. Sign in or learn about subscription options.pp. 84-90
RWAC: A Self-contained Read and Write Access Control Scheme for Group CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 97-67
QoS Guaranteed Batch Scheduling for Optical Switches Based on Unequal Weight SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 68-109
A Feasibility Study of Watchdogs on Opportunistic Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 83-128
Comprehensive Behavior Profiling Model for Malware ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 129-93
Multi-User Preemptive Scheduling For Critical Low Latency Communications in 5G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 94-97
Increasing LoRaWAN Application-Layer Message Delivery Success RatesFull-text access may be available. Sign in or learn about subscription options.pp. 148-107
EFM: Improving DCNs throughput using the transmission rates of elephant flowsFull-text access may be available. Sign in or learn about subscription options.pp. 109-111
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 158-115
Sparse Detection for Spatial Modulation in Multiple Access ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
An Application-aware QoS Routing Algorithm for SDN-based IoT NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
mTSL: Making mTCP Stack Transparent to Network ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 192-197
Multi-agent Communication with Attentional and Recurrent Message IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 198-131
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Method to Verify Data Integrity in Graph DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 144-147
RM-KVStore: New MXNet KVStore to Accelerate Transfer Performancewith RDMAFull-text access may be available. Sign in or learn about subscription options.pp. 158-162
Tail Latency Optimized Resource Allocation in Fogbased 5G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 249-172
A Broker-guided Trust Calculation Model for Mobile Devices of D2D CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
FDDS-MAC: Enhancing Spectrum Usage on Full-Duplex Communications in 5G Mobile Wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 268-187
Multi-Factor Dynamic Channel Assignment approach for Wi-Fi networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 285-291
A Social-Based Approach to Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
MPP: A Join-dividing Method for Multi-table Privacy PreservationFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Dynamic Network Function Chain Composition for Mitigating Network LatencyFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
REPO: A Microservices Elastic Management System for Cost Reduction in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 328-219
Scalable Fogbed for Fog Computing EmulationFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
Ballistic Skip Graph: A Skip Graph-Style Constant-Degree Structured OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
ECTCP: An Explicit Centralized Congestion Avoidance for TCP in SDN-based Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
On the Effectiveness of the Block Two-Level Erdős-Rényi Generative Network ModelFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Energy-efficient Offloading Policy for Resource Allocation in Distributed Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
Tensor coding for three-hop MIMO relay systemsFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
A Mobility Management Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 390-396
Handover Initiation Comparison in Virtualised SDN-based Flow Mobility ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 260-409
Market Design for IoT Data and Services the Emergent 21Th Century CommoditiesFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
IMMS: IoT Management and Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 
00422
-
00425

Social Pre-caching for Location-dependent Requests in Vehicular Information-Centric Ad-hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Update Cost-Aware Cache Replacement for Wildcard Rules in Software-Defined NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Towards a Hybrid Storage Architecture for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Towards an Accurate Bandwidth Estimation Tool for 802.11n Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
FROG: A Packet Hop Count based DDoS Countermeasure in NDNFull-text access may be available. Sign in or learn about subscription options.pp. 492-497
Redundant Packet Scheduling by Uncorrelated Paths in Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 498-323
Reducing the Variability in Routing Decisions in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 324-327
SM3-MAC: a Multichannel Collision-Free MAC Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Showing 100 out of 231