Default Cover Image

2024 IEEE 49th Conference on Local Computer Networks (LCN)

Oct. 8 2024 to Oct. 10 2024

Normandy, France

ISBN: 979-8-3503-8800-8

Table of Contents

LCN 2024 Copyright PageFreely available from IEEE.pp. i-i
LCN 2024 Message from the General ChairFreely available from IEEE.pp. i-ii
LCN 2024 Message from the Demo ChairFreely available from IEEE.pp. i-i
LCN 2024 Organizing CommitteeFreely available from IEEE.pp. i-i
LCN 2024 Steering CommitteeFreely available from IEEE.pp. i-i
LCN 2024 Technical Program CommitteeFreely available from IEEE.pp. i-iii
LCN 2024 List of Accepted PapersFreely available from IEEE.pp. i-iv
LCN 2024 Panel DiscussionFreely available from IEEE.pp. i-i
LCN 2024 Panel DiscussionFreely available from IEEE.pp. i-i
LCN 2024 Panel DiscussionFreely available from IEEE.pp. i-i
RF-AcSense: Device-Free Activity Localization and Recognition via Passive RFID Tag ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Polar-QUIC: Adaptive Packet-Level Polar Coding-Assisted QUIC in Satellite NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Accurate Identification of IoT Devices in the Presence of Wireless Channel DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Collaborative Edge Caching and Dynamic Bitrate Adaptation for SHVC-based VR Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
BandSeer: Bandwidth Prediction for Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Plausibly Deniable Content Discovery for Bitswap Using Random WalksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
ULTRA: UWB-based Localization and TRAcking through A-DBSCAN and Bayesian AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
UMCC: Uncoupling Multipath Congestion Control through Shared Bottleneck Detection in Path-Aware NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Can LLMs Understand Computer Networks? Towards a Virtual System AdministratorFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Optimal Caching Strategy for Data Freshness in IoT Applications with Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Deep Learning for Reducing Redundancy in Madrid’s Traffic Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Trustable Network Intrusion Detection System through Wisdomnet and Uncertainty MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Intelligent Hopping Mechanism for Deception Defense Scenarios Based on Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
HPDNS: A High-Performance Domain Name Service Architecture Based on In-Network ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
ActiveDNS: Is There Room for DNS Optimization Beyond CDNs?Full-text access may be available. Sign in or learn about subscription options.pp. 1-9
Single-Anchor Indoor Localization Using Multi-Frequency RSSI FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Flow Migration for Service Function Chains: Preserving External-OrderingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Failure Resilient Green Traffic EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Science DMZ Networks: How Different Are They Really?Full-text access may be available. Sign in or learn about subscription options.pp. 1-9
Detecting Network Anomalies in NetFlow Traffic with Machine Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
GoNP: Graph of Network Patterns for Device Identification using UDP Application Layer ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Research on Security Protection Evasion Mechanism Based on IPv6 Fragment HeadersFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Monty: A Framework for Latency-aware Multi-flow ATSSS SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
CLEVER: Crafting Intelligent MISP for Cyber Threat IntelligenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
PTN-IDS: Prototypical Network Solution for the Few-shot Detection in Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Passive Device-free Indoor Movement Detection using WiFi Time-of-Flight InformationFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Multimodal Machine Learning Algorithm for Enhanced Signal Modulation Recognition in Wireless Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Third Eye: Inferring the State of Your Smartphone Through Wi-FiFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CSUM: A Novel Mechanism for Updating CubeSat while Preserving Authenticity and IntegrityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Is Deep Learning a Better Option than Random Forest for Encrypted Traffic Classification?Full-text access may be available. Sign in or learn about subscription options.pp. 1-6
Towards Detecting IoT Event Spoofing Attacks Using Time-Series ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Variable-length Field Extraction for Unknown Binary Network ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
EFSC: an Efficient, Flexible and Secure Trading System for Computing Power NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Multi-source Trust Model Based on Blockchain and IoT Edge Task CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Impact of PTB Message Usage on Path MTU Discovery for QUICFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Quantum Access Points Selection Algorithm for Large-Scale LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Automated Machine Learning Configuration to Learn Intrusion Detectors on Attack-Free DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
StarReact: Detecting Important Network Changes in BFT Protocols with Star-Based CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Evidence Theory-Based Trust Management for the Social Internet of VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Evaluating Drill-Down DDoS Destination DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Thresh-Hold: Assessment of Threshold Cryptography in Leader-Based ConsensusFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
WoFS: A Write-only File System for Privacy-aware Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Securing the Internet of Robotic Things: A Federated Learning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Client-Constrained Virtual Network Embedding under UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
ShieldDINC: Privacy-Preserving Distributed In-Network Computations with Efficient Homomorphic EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
AScan6: IPv6 Address Fast Scanning Technology Based on Service Instance Name AssociationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Exploring Effective Sensor Deployment Techniques for Dynamic Region of InterestFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Forte: Hybrid Traffic-Aware Scheduling for Mobile TSCH NodesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
B.A.T.M.A.N. Mesh Networking on ESP32’s 802.11Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
Privacy Performance Trade-off in Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Demo: Using Smart Smoke Detectors for Emergency CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Demo: A Software Suite for ILDA Digital Network/IDN-File Recording and PlaybackFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Demo: Maritime Radar Systems under Attack. Help is on the Way!Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Demo: LoRaWAN Coverage Assessment Using Optimal Bicycle Route PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Demo: Security Vulnerabilities and Network Service Disruptions with HTTP/3Full-text access may be available. Sign in or learn about subscription options.pp. 1-4
Demo: Real-Time Spectrum Segmentation and Classification with Over-The-Air DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Demo: Framework for Rapidly Reproducible Wireless Mesh Network TestbedsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Showing 100 out of 112