|
|
|
Aristeidis Karras, Christos Karras, Konstantinos C. Giotopoulos, Dimitrios Tsolis, Konstantinos Oikonomou and Spyros Sioutas
Federated learning (FL) has emerged as a promising technique for preserving user privacy and ensuring data security in distributed machine learning contexts, particularly in edge intelligence and edge caching applications. Recognizing the prevalent chall...
ver más
|
|
|
|
|
|
|
David Megías, Minoru Kuribayashi and Amna Qureshi
Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright h...
ver más
|
|
|
|
|
|
|
Czeslaw Adamiak, Barbara Szyda, Anna Dubownik and David García-Álvarez
The rising number of homes and apartments rented out through Airbnb and similar peer-to-peer accommodation platforms cause concerns about the impact of such activity on the tourism sector and property market. To date, spatial analysis on peer-to-peer ren...
ver más
|
|
|
|
|
|
|
Nour El Houda Fethellah,Hafida Bouziane,Abdallah Chouarfia
Pág. pp. 104 - 119
The Named Data Networking NDN is one of the most proposed architecture for the new model of Internet communications based on contents distribution, called Information-Centric Network ICN. It is widely accepted by the research community since it has becom...
ver más
|
|
|
|
|
|
|
Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz and Mamoun Alazab
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious...
ver más
|
|
|
|