2023 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
Energy-efficient IoT Communications: A Comparative Study of Long-Term Evolution for Machines (LTE-M) and Narrowband Internet of Things (NB-IoT) Technologies 节能物联网通信:机器(LTE-M)和窄带物联网(NB-IoT)技术长期演进的比较研究
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218061
Nassim Labdaoui, F. Nouvel, Stephanie Dutertre
{"title":"Energy-efficient IoT Communications: A Comparative Study of Long-Term Evolution for Machines (LTE-M) and Narrowband Internet of Things (NB-IoT) Technologies","authors":"Nassim Labdaoui, F. Nouvel, Stephanie Dutertre","doi":"10.1109/ISCC58397.2023.10218061","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218061","url":null,"abstract":"This article investigates the power consumption of LTE-M and NB-IoT devices using u-blox SARA-R422S modules complying with the standards of two French operators. Our findings suggest that under certain conditions, these technologies can achieve a 5-year operational lifespan. The size of transmitted data does not have a significant impact on power consumption under favourable coverage conditions, but can quickly affect the battery life under harsh coverage conditions. This article offers insights into the power consumption of LTE-M and NB-IoT devices and provides useful information for those considering the use of these technolgaies in IoT.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Microservices-Aware Autoscaling: A Review 面向微服务的自动伸缩:综述
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218213
M. Fourati, Soumaya Marzouk, M. Jmaiel
{"title":"Towards Microservices-Aware Autoscaling: A Review","authors":"M. Fourati, Soumaya Marzouk, M. Jmaiel","doi":"10.1109/ISCC58397.2023.10218213","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218213","url":null,"abstract":"This research paper elaborates an overview of auto scaling solutions for microservices-based applications deployed with containers. Two main features may characterize the efficiency of an autoscaler: analysis strategy launched to identify the root cause of resource saturation, and resource allocation strategy which selects the eligible components for scaling and calculates the required amount of resources. However, existing solutions do not consider the specificity of microservice architecture in their analysis and resource allocation strategies, which may lead to wrong root cause identification and unnecessary resource allocation. In this paper, we investigate and classify existing autoscalers dealing with containers in microservice context. We additionally specify the strength and the shortcomings of each category. As a conclusion, we report the challenges of such solutions and provide recommendations for future works enabling the development of microservices-aware autoscalers.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular Networks 基于mec的车辆网络中业务迁移的自适应深度强化学习方法
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218103
Sabri Khamari, Rachedi Abdennour, T. Ahmed, M. Mosbah
{"title":"Adaptive Deep Reinforcement Learning Approach for Service Migration in MEC-Enabled Vehicular Networks","authors":"Sabri Khamari, Rachedi Abdennour, T. Ahmed, M. Mosbah","doi":"10.1109/ISCC58397.2023.10218103","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218103","url":null,"abstract":"Multiaccess edge computing (MEC) has emerged as a promising technology for time-sensitive and computation-intensive tasks. However, user mobility, particularly in vehicular networks, and limited coverage of Edge Server result in service interruptions and a decrease in Quality of Service (QoS). Service migration has the potential to effectively resolve this issue. In this paper, we investigate the problem of service migration in a MEC-enabled vehicular network to minimize the total service latency and migration cost. To this end, we formulate the service migration problem as a Markov decision process (MDP). We present novel contributions by providing optimal adaptive migration strategies which consider vehicle mobility, server load, and different service profiles. We solve the problem using the Double Deep Q-network algorithm (DDQN). Simulation results show that the proposed DDQN scheme achieves a better tradeoff between latency and migration cost compared with other approaches.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limiting the Spread of Fake News on Social Networks by Users as Witnesses 以用户为证人限制虚假新闻在社交网络上的传播
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217907
Moumen Hamouma, Badreddine Benreguia, A. Bounceur, Leila Saadi
{"title":"Limiting the Spread of Fake News on Social Networks by Users as Witnesses","authors":"Moumen Hamouma, Badreddine Benreguia, A. Bounceur, Leila Saadi","doi":"10.1109/ISCC58397.2023.10217907","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217907","url":null,"abstract":"In this paper, we study how users can act as witnesses to limit the spread of fake news. We present a new technique based on consulting a set of users, called witnesses. Before resharing a content <tex>$M$</tex> by a user <tex>$A$</tex>, a set of <tex>$k$</tex> users (witnesses) are selected randomly, by the system, from the friends set of <tex>$A$</tex>. Witnesses are asked to validate the content <tex>$M$</tex> after allowing the user <tex>$A$</tex> to re-share it. If there is an authenticated user <tex>$AU$</tex>, among this set of witnesses that validating <tex>$M$</tex>, the user <tex>$A$</tex> is allowed to re-share it without considering the others <tex>$(k-1)$</tex> responses. In the case where all witnesses are non-authenticated, if at least one witness rejects the content <tex>$M$</tex>, the user <tex>$A$</tex> is not allowed to re-share it. Note that <tex>$A$</tex> has no knowledge about the set of selected witnesses.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125311466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions AppBox:移动应用管理解决方案的黑盒应用沙箱技术
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217861
Maqsood Ahmad, F. Bergadano, Valerio Costamagna, B. Crispo, G. Russello
{"title":"AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions","authors":"Maqsood Ahmad, F. Bergadano, Valerio Costamagna, B. Crispo, G. Russello","doi":"10.1109/ISCC58397.2023.10217861","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217861","url":null,"abstract":"Several Mobile Device Management (MDM) and Mobile Application Management (MAM) services have been launched on the market. However, these services suffer from two important limitations: reduced granularity and need for app developers to include third party SDKs. We present AppBox, a novel black-box app-sandboxing solution for app customisation for stock Android devices. AppBox enables enterprises to select any app, even highly-obfuscated, from any market and perform a set of target customisations by means of fine-grained security policies. We have implemented and tested AppBox on various smartphones and Android versions. The evaluation shows that AppBox can effectively enforce fine-grained policies on a wide set of existing apps, with an acceptable overhead.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automatic Vision Transformer Pruning Method Based on Binary Particle Swarm Optimization 基于二元粒子群优化的视觉变压器自动剪枝方法
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218144
Jihene Tmamna, Emna ben Ayed, Rahma Fourati, Mounir Ben Ayed
{"title":"An Automatic Vision Transformer Pruning Method Based on Binary Particle Swarm Optimization","authors":"Jihene Tmamna, Emna ben Ayed, Rahma Fourati, Mounir Ben Ayed","doi":"10.1109/ISCC58397.2023.10218144","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218144","url":null,"abstract":"This paper presents an automatic vision transformer pruning method that aims to alleviate the difficulty of deploying vision transformer models on resource-constrained devices. The proposed method aims to automatically search for the optimal pruned model by removing irrelevant units while maintaining the original accuracy. Specifically, the model pruning is formulated as an optimization problem using binary particle swarm optimization. To demonstrate its effectiveness, our method was tested on the DeiT Transformer model with CIFAR-10 and CIFAR-100 datasets. Experimental results demonstrate that our method achieves a significant reduction in computational cost with slight performance degradation.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125890023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deploying Digital Twins Over the Cloud-to-Thing Continuum 在云到物连续体上部署数字孪生
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218052
Sergio Laso, Lorenzo Tore-Gálvez, J. Berrocal, C. Canal, J. M. Murillo
{"title":"Deploying Digital Twins Over the Cloud-to-Thing Continuum","authors":"Sergio Laso, Lorenzo Tore-Gálvez, J. Berrocal, C. Canal, J. M. Murillo","doi":"10.1109/ISCC58397.2023.10218052","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218052","url":null,"abstract":"Smart cities have deployed a myriad of devices to sense the status of the city and its citizens in order to reconfigure different elements to improve the quality of life. However, the analysis and reconfiguration of these elements on the fly can lead to unforeseen problems. The digital twin paradigm has risen as a promising technology to analyze and test these re-configurations before their execution. These digital twins are usually centralized in the cloud. However, the emulation of highly distributed systems can lead to scalability, response time, and security and privacy problems. In this paper, we propose a hierarchical and distributed architecture for digital twins, deployed over the Cloud-to-Thing Continuum. The proposal is illustrated by means of a case study about public transportation in smart cities.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129939143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features 寻找隐藏的RDP-MITM:基于网络特征的RDP MITM工具分析与检测
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218180
Hao Miao, Zhou-yu Zhou, Renjie Li, Fengyuan Shi, Wei Yang, Shu Li, Qingyun Liu
{"title":"Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features","authors":"Hao Miao, Zhou-yu Zhou, Renjie Li, Fengyuan Shi, Wei Yang, Shu Li, Qingyun Liu","doi":"10.1109/ISCC58397.2023.10218180","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218180","url":null,"abstract":"Remote Desktop Protocol (RDP) is commonly used for remote access to windows computers. As more and more people work remotely, the number of users of RDP is increasing, making RDP a growing concern in cybersecurity. The latest way to threaten RDP security is RDP man-in-the-middle (MITM) tools which realize the MITM function in an RDP connection and automate the MITM attack process, significantly reducing the difficulty of network attacks. At the same time, RDP MITM tools can be used for high-interaction RDP honeypots. In order to mitigate this risk, we present the first in-depth study of RDP MITM tools in this paper. By analysis and experiment, we identify network features that can be used to detect RDP MITM tools effectively. Based on packet latency and TLS handshake, we propose a machine learning classifier that can detect RDP MITM tools for securing RDP connections. Finally, we analyze the deployment of RDP MITM tools in the wild and effectively measure the RDP MITM tools using our proposed detection approach.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatiotemporal-Enhanced Recurrent Neural Network for Network Traffic Prediction 用于网络流量预测的时空增强递归神经网络
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217943
Zhiyong Chen, Junyu Lai, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Tian Xia
{"title":"Spatiotemporal-Enhanced Recurrent Neural Network for Network Traffic Prediction","authors":"Zhiyong Chen, Junyu Lai, Junhong Zhu, Wanyi Ma, Lianqiang Gan, Tian Xia","doi":"10.1109/ISCC58397.2023.10217943","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217943","url":null,"abstract":"Network traffic prediction can serve as a proactive approach for network resource planning, allocation, and management. Besides, it can also be applied for load generation in digital twin networks (DTNs). This paper focuses on background traffic prediction of typical local area networks (LANs), which is vital for synchronous traffic generation in DTN. Conventional traffic prediction models are firstly reviewed. The challenges of DTN traffic prediction are analyzed. On that basis, a spatiotemporal-enhanced recurrent neural network (RNN) based approach is elaborated to accurately predict the background traffic matrices of target LANs. Experiments compare this proposed model with four baseline models, including LSTM, CNN-LSTM, ConvLSTM, and PredRNN. The results turn out that the spatiotemporal-enhanced RNN model outperforms the baselines on accuracy. In particular, it can decrease the MSE of PredRNN more than 18%, with acceptable efficiency degradation.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130144175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT-Based Solution for Monitoring Young People with Emotional Behavioral Disorders in a Residential Childcare Setting 基于物联网的寄宿托儿环境中青少年情绪行为障碍监测解决方案
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218215
Bharat Paudyal, C. Creed, Sherelle Knowles, Hilton Mutariswa, Ian Williams
{"title":"An IoT-Based Solution for Monitoring Young People with Emotional Behavioral Disorders in a Residential Childcare Setting","authors":"Bharat Paudyal, C. Creed, Sherelle Knowles, Hilton Mutariswa, Ian Williams","doi":"10.1109/ISCC58397.2023.10218215","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218215","url":null,"abstract":"This paper focuses on the design, development and preliminary evaluation of cloud-based Internet of Things (IoT) system that utilises wearable sensors to remotely monitor the physiological patterns of young person with Emotional Behavioral Disorder (EBD). We report on an exploratory study with caregivers to understand the challenges exhibited by young people with EBD. This informed the design of cloud-based IoT system that retrieves real-time physiological parameters such as Heart Rate, Body Temperature through non-invasive wearable sensors, which enables caregivers to monitor the activity of young person remotely and provide enhanced support based on the collected parameters. To validate system's feasibility, an initial pilot study within a healthcare environment involving children with EBD was conducted. The study confirms the system's viability and identifies important areas for future improvements. By utilizing IoT technology, our work aims to enhance the healthcare sector's ability to support individuals with EBD and improve their overall well-being.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信