default search action
NOMS 2022: Budapest, Hungary
- 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022. IEEE 2022, ISBN 978-1-6654-0601-7
- Daniel Tovarnák, Michal Cech, Dusan Tichý, Vojtech Dohnal:
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. 1-4 - Alberto Mozo, Amit Karamchandani, Mario Sanz Rodrigo, José Ignacio Moreno, Antonio Pastor:
B5GEMINI: Digital Twin Network for 5G and Beyond. 1-6 - Sina Rafati Niya, Burkhard Stiller:
Efficient Designs for Practical Blockchain-IoT Integration. 1-6 - Robert Harper, Philip Tee:
Structural Network Metrics and Incident Generation. 1-6 - Sanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel:
Non-negative Matrix Factorization For Network Delay Matrix Completion. 1-6 - Maher Al Islam, Carol J. Fung, Ashraf Tantawy, Sherif Abdelwahed:
A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services. 1-5 - Jorge Visca, Javier Baliosian:
A Model for Route Learning in Opportunistic Networks. 1-4 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G System. 1-9 - Johannes Kristan, Paolo Azzoni, Lukas Römer, Sven Erik Jeroschewski, Elisa Londero:
Evolving the Ecosystem: Eclipse Arrowhead integrates Eclipse IoT. 1-6 - Frank Engelhardt, Mesut Günes:
A /sys Filesystem for the Internet of Things. 1-6 - Hongyi Huang, Wenfei Wu:
HyperSFP: Fault-Tolerant Service Function Chain Provision on Programmable Switches in Data Centers. 1-9 - Lukas Gehreke, Kai Kientopf, Mesut Günes:
B.A.T.M.A.N. in the IoT. 1-6 - Zsófia Papp, Garry Irvine, Roland Smith, Ferenc Mogyorósi, Péter Revisnyei, István Töros, Alija Pasic:
TDoA based indoor positioning over small cell 5G networks. 1-6 - Michelle Cersosimo, Adrián Lara:
Detecting Malicious Domains using the Splunk Machine Learning Toolkit. 1-6 - Dániel Ficzere:
Complex network theory to model 5G Network Slicing. 1-4 - Ashima Chawla, Paul Jacob, Paddy G. Farrell, Erik Aumayr, Sheila Fallon:
Towards Interpretable Anomaly Detection: Unsupervised Deep Neural Network Approach using Feedback Loop. 1-9 - Yutaka Fukuda, Takuji Hatase, Akihiro Satoh, Yutaka Nakamura, Sujiro Wada:
Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements. 1-4 - Jingye Chi, Siya Xu, Shaoyong Guo, Peng Yu, Xuesong Qiu:
Federated Learning Empowered Edge Collaborative Content Caching Mechanism for Internet of Vehicles. 1-5 - Reinout Eyckerman, Philippe Reiter, Steven Latré, Johann Márquez-Barja, Peter Hellinckx:
Application Placement in Fog Environments using Multi-Objective Reinforcement Learning with Maximum Reward Formulation. 1-6 - Mingwei Cui, Xiao Li, Ying Wang, Tianyuan Niu, Fan Yang:
SPT: sketch-based polling in-band network telemetry. 1-7 - Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:
A Data Driven Coordination between Load Balancing and Interference Cancellation. 1-6 - Omar Houidi, Sihem Bakri, Djamal Zeghlache:
Multi-Agent Graph Convolutional Reinforcement Learning for Intelligent Load Balancing. 1-6 - Frank Loh, Noah Mehling, Stefan Geißler, Tobias Hoßfeld:
Simulative Performance Study of Slotted Aloha for LoRaWAN Channel Access. 1-9 - Kim Hammar, Rolf Stadler:
A System for Interactive Examination of Learned Security Policies. 1-3 - Martin Zádník:
Towards Inference of DDoS Mitigation Rules. 1-5 - Linyih Teng, Chi-Hsiang Hung, Charles H.-P. Wen:
P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable Switch. 1-5 - Hongyi Huang, Wenfei Wu, Shimin Tao:
WRS: Workflow Retrieval System for Cloud Automatic Remediation. 1-10 - Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann:
E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. 1-9 - Johan Garcia:
Change Point Evaluation in Networking Logs with Periodicity Filtering and Bootstrapping. 1-7 - Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu:
Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures. 1-4 - Marten Gartner, Johann Wagner, Martin Koppehel, David Hausheer:
Demonstration of xiondp: An XDP-Accelerated Processing of SCION Packets. 1-2 - Safwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi, Paul A. Rubin:
HERRA: Energy-Aware Scalable D2D 5G Cellular Traffic Offloading Scheme. 1-7 - Luciano Zembruzki, Raffaele Sommese, Lisandro Zambenedetti Granville, Arthur Selle Jacobs, Mattijs Jonker, Giovane C. M. Moura:
Hosting Industry Centralization and Consolidation. 1-9 - Kilian Holzinger, Franz Biersack, Henning Stubbe, Angela Gonzalez Mariño, Abdoul Kane, Francesc Fons, Haigang Zhang, Thomas Wild, Andreas Herkersdorf, Georg Carle:
SmartNIC-based Load Management and Network Health Monitoring for Time Sensitive Applications. 1-6 - Tommaso Caiazzi, Mariano Scazzariello, Leonardo Alberro, Lorenzo Ariemma, Alberto Castro, Eduardo Grampín, Giuseppe Di Battista:
Sibyl: a Framework for Evaluating the Implementation of Routing Protocols in Fat-Trees. 1-7 - Sahar Bakhtar, Hovhannes A. Harutyunyan:
Dynamic Local Community Detection Algorithms. 1-6 - Khizar Abbas, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Ensemble Learning-based Network Data Analytics for Network Slice Orchestration and Management: An Intent-Based Networking Mechanism. 1-5 - László Hévizi, Alexandros Palaios:
Automatic RRC Reconfigurations Based on User Mobility Patterns. 1-5 - Subir Halder, Thomas Newe:
Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT. 1-9 - Lijun Dong, Richard Li:
Improve Multiple-Camera Assisted Remote Driving by Qualitative Communication and New IP. 1-5 - Viktoria Vomhoff, Stefan Geissler, Frank Loh, Wolfgang Bauer, Tobias Hossfeld:
Characterizing Mobile Signaling Anomalies in the Internet-of-Things. 1-6 - Komal Gilani, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi:
Self-sovereign Identity Management Framework using Smart Contracts. 1-7 - Attila Hilt, József Varga, Gábor Járó:
Availability-Aware E-band Wireless Extension of Fiber-Access. 1-5 - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks. 1-9 - Ivan Peter Lamb, Mateus Saquetti, Guilherme Bueno de Oliveira, José Rodrigo Azambuja, Weverton Cordeiro:
Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks. 1-9 - Jorge Baranda, Josep Mangues-Bafalluy:
End-to-End Network Service Orchestration in Heterogeneous Domains for Next-Generation Mobile Networks. 1-6 - Nicola Caldognetto, Luca Pasquali Evangelisti, Filippo Poltronieri, Michele Russo, Cesare Stefanelli, Sara Tenani, Sara Toboli, Mauro Tortonesi:
Water 4.0: enabling Smart Water and Environmental Data Metering. 1-6 - Shuying Zhuang, Jessie Hui Wang, Jilong Wang, Changqing An, Yuedong Xu, Tianhao Wu:
Predicting Unseen Links Using Learning-based Matrix Completion. 1-9 - Hélio Henrique Gonçalves Guardabaxo, Gustavo Sousa Pavani:
QoE Management of HTTP/2 traffic in Software-Defined Wide Area Networks. 1-5 - Gergo Csáti, István Pelle, László Toka:
Optimizing Performance and Resource Consumption of Cloud-Native Logging Application Stacks. 1-4 - Alessandro Spallina, Andrea Araldo, Tijani Chahed, Hind Castel-Taleb, Antonella Di Stefano, Tülin Atmaca:
Energy-efficient Resource Allocation in Multi-Tenant Edge Computing using Markov Decision Processes. 1-5 - Felix Larrinaga, William Ochoa, Alain Perez, Javier Cuenca, Jon Legaristi, Miren Illarramendi:
Node-RED Workflow Manager for Edge Service Orchestration. 1-6 - Rui Kang, Fujun He, Eiji Oki:
Resilient Virtual Network Function Allocation with Diversity and Fault Tolerance Considering Dynamic Requests. 1-9 - Timothy Miskell, Tushar Gohad, Ai Bee Lim, Felipe Pastor, Jeremy Payne, Greg Smith, Chris Cavigioli:
Persistent Memory for Content Delivery Networks. 1-6 - Ákos Leiter, Attila Hegyi, Nándor Galambosi, Edina Lami, Péter Fazekas:
Automatic failover of 5G container-based User Plane Function by ONAP closed-loop orchestration. 1-2 - Filippo Poltronieri, Mauro Tortonesi, Cesare Stefanelli:
A Chaos Engineering Approach for Improving the Resiliency of IT Services Configurations. 1-6 - Jasmeen Kaur Ahluwalia, Carla Mouradian, Mohammad Nazmul Alam, Roch H. Glitho:
A Cloud Infrastructure as a Service for an Efficient Usage of Sensing and Actuation Capabilities in Internet of Things. 1-6 - Francesco Giacinto Lavacca, Vincenzo Eramo, Antonio Cianfrani, Marco Listanti, Francesco Valente:
Perspectives on AI-based Algorithms Applied to C-RAN Functional Splitting and Advanced Antenna System Problem. 1-5 - Richard Etengu, Saw Chin Tan, Teong-Chee Chuah, Jaime Galán-Jiménez:
Deep Learning-Assisted Traffic Prediction in Hybrid SDN/OSPF Backbone Networks. 1-6 - Nikolas Wehner, Markus Ring, Joshua Schüler, Andreas Hotho, Tobias Hoßfeld, Michael Seufert:
On Learning Hierarchical Embeddings from Encrypted Network Traffic. 1-7 - Chia-Cheng Yen, Wenting Sun, Hakimeh Purmehdi, Won Park, Kunal Rajan Deshmukh, Nishank Thakrar, Omar Nassef, Adam Jacobs:
Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless Networks. 1-7 - Olena Chornovol, Alex Norta:
Sustainable Machine-to-Everything Infrastructure Management: Blockchain-Based Impact Indexing for Distributed Collaboration Systems. 1-4 - José Camacho, Katarzyna Wasielewska:
Dataset Quality Assessment in Autonomous Networks with Permutation Testing. 1-4 - Himanshi Babbar, Ouns Bouachir, Shalli Rani, Moayad Aloqaily:
Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems. 1-6 - Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Yukun Wang, Carol J. Fung, Hailong Yang, Depei Qian:
Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning. 1-5 - Fetia Bannour, Stefania Dumbrava, Damien Lu:
A Flexible GraphQL Northbound API for Intent-based SDN Applications. 1-5 - Estefanía Coronado, Shuaib Siddiqui, Roberto Riggio:
Roadrunner: O-RAN-based Cell Selection in Beyond 5G Networks. 1-7 - Naik Bakht Sania Qureshi, Dong-Hoon Kim, Jiwoo Lee, Eun-Kyu Lee:
Poisoning Attacks against Federated Learning in Load Forecasting of Smart Energy. 1-7 - Yu Min Park, Sheikh Salman Hassan, Yan Kyaw Tun, Zhu Han, Choong Seon Hong:
Joint Resources and Phase-Shift Optimization of MEC-Enabled UAV in IRS-Assisted 6G THz Networks. 1-7 - Alexander Griessel, Maximilian Stephan, Martin Mieth, Wolfgang Kellerer, Patrick Krämer:
RLBrowse: Generating Realistic Packet Traces with Reinforcement Learning. 1-6 - Carson Kuzniar, Miguel C. Neves, Vladimir Gurevich, Israat Haque:
IoT Device Fingerprinting on Commodity Switches. 1-9 - Ons Aouedi, Kandaraj Piamrat, Benoît Parrein:
Decision tree-based blending method using deep-learning for network management. 1-7 - Tanesh Kumar, Mika Ylianttia, Erkki Harjula:
Securing Edge Services for Future Smart Healthcare and Industrial IoT Applications. 1-6 - Anousheh Gholami, Kunal Rao, Wang-Pin Hsiung, Oliver Po, Murugan Sankaradas, Srimat Chakradhar:
ROMA: Resource Orchestration for Microservices-based 5G Applications. 1-9 - Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Eder J. Scheid, Timucin Besken, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors. 1-7 - Nicholas Topman, Asma Adnane:
Mobile applications for connected cars: Security analysis and risk assessment. 1-6 - Denis Gustin, Jürgen Jasperneite:
IoT Device Management Based on Open Source Platforms - Requirements Analysis and Evaluation. 1-4 - Paulina Arregoces, Jaime Vergara, Sergio Armando Gutierrez, Juan Felipe Botero:
Network-based Intrusion Detection: A One-class Classification Approach. 1-6 - Tharaka Hewa, Nisita Weerasinghe, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker). 1-3 - Satoru Kobayashi, Keiichi Shima, Kenjiro Cho, Osamu Akashi, Kensuke Fukuda:
Comparative Causal Analysis of Network Log Data in Two Large ISPs. 1-6 - Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, David Evans:
Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons. 1-6 - Ignacio Royuela, Juan Carlos Aguado, Ignacio de Miguel, Noemí Merayo, Ramón J. Durán Barroso, Diego Hortelano, Lidia Ruiz-Perez, Patricia Fernández, Rubén M. Lorenzo, Evaristo J. Abril:
A testbed for CCAM services supported by edge computing, and use case of computation offloading. 1-6 - Kengo Tajiri, Ryoichi Kawahara, Yoichi Matsuo:
Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion. 1-9 - Majid Ghaderi, Wenjie Liu, Shihan Xiao, Fenglin Li:
Learning Traffic Encoding Matrices for Delay-Aware Traffic Engineering in SD-WANs. 1-9 - Roland Mark Erdei, László Toka:
Optimal Resource Provisioning for Data-intensive Microservices. 1-6 - Marco Polverini, Davide Aureli, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti:
Enhancing the SRv6 Network Programming Model Through the Definition of the Maximize Throughput Behavior. 1-5 - Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. 1-9 - Ronny Döring, Marc Geitz:
Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. 1-5 - Manuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez:
Deep Reinforcement Learning Based Method for the Rule Placement Problem in Software-Defined Networks. 1-4 - Simon Raffeck, Stefan Geissler, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld:
Data Usage in IoT: A Characterization of GTP Tunnels in M2M Mobile Networks. 1-6 - Delia Rico, Karl-Johan Grinnemo, Anna Brunström, Pedro Merino:
Implementation and evaluation of the Multi-connection Tactile Internet Protocol and API. 1-6 - Changho Seo, Yunchang Chae, Jaeryun Lee, Euiseong Seo, Byungchul Tak:
NoSQL Database Performance Diagnosis through System Call-level Introspection. 1-9 - Caspar von Lengerke, Alexander Hefele, Juan A. Cabrera, Frank H. P. Fitzek:
Stopping the Data Flood: Post-Shannon Traffic Reduction in Digital-Twins Applications. 1-5 - Eun-Ji Kim, Eun-Kyu Lee:
Performance Impact of Differential Privacy on Federated Learning in Vehicular Networks. 1-5 - Miquel Farreras, Paola Soto, Miguel Camelo, Lluís Fàbrega, Pere Vilà:
Predicting network performance using GNNs: generalization to larger unseen networks. 1-6 - Nardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. 1-7 - Christian Lübben, Marc-Oliver Pahl:
Autonomous convergence mechanisms for collaborative crowd-sourced data-modeling. 1-5 - Géza Kulcsár, Johannes Kristan, Sven Erik Jeroschewski:
Correctness, Completeness, Consistency: Challenges of Migrating Arrowhead System-of-Systems Models. 1-6 - Johannes Kristan, Sven Erik Jeroschewski, Lukas Römer:
Open Source Software Integration in an Industry 4.0 Framework: Experience and Lessons Learned. 1-4 - Kunling He, Changqing An, Jessie Hui Wang, Tianshu Li, Linmei Zu, Fenghua Li:
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme. 1-9 - Kaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen:
Understanding the Challenges of Blocking Unnamed Network Traffic. 1-5 - Kayuã Oleques Paim, Vagner Ereno Quincozes, Diego Kreutz, Rodrigo B. Mansilha, Weverton Cordeiro:
Fix Me If You Can: Using Neural Networks to Regenerate Networked Systems' Monitoring Traces. 1-9 - El-Heithem Mohammedi, Emmanuel Lavinal, Guillaume Fleury:
Detecting and locating configuration errors in IP VPNs with Graph Neural Networks. 1-6 - Martin Happ, Jia Lei Du, Matthias Herlich, Christian Maier, Peter Dorfinger, José Suárez-Varela:
Exploring the Limitations of Current Graph Neural Networks for Network Modeling. 1-8 - Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. 1-7 - Dániel Ficzere, Dhruvin Patel, Joachim Sachs, Junaid Ansari, Gábor Soós, Pál Varga:
5G public network integration for a real-life PROFINET application. 1-5 - Cristiano M. Silva, Fernanda S. H. Sumika, Daniel Ludovico Guidoni, Leonardo Alvarenga L. Santos, João Fernando Machry Sarubbi, Somayeh Mokhtari, Matheus F. Rodrigues Santos, José Marcos Silva Nogueira:
Solving Combinatorial Problems via the Random Exploration of the Search Space: An Experimental Approach for Fast Decision Making. 1-4 - Andrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn:
Natural Language Processing Applied to Dynamic Workflow Generation for Network Management. 1-6 - Morteza Moghaddassian, Alberto Leon-Garcia:
Bringing ICN To Software-Defined Infrastructures. 1-5 - Balázs Vass, János Tapolcai:
Essence of Geographically Correlated Failure Events in Communication Networks. 1-6 - Juuso Haavisto, Thibault Cholez, Jukka Riekki:
Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes. 1-8 - Kyle A. Simpson, Dimitrios P. Pezaros:
Revisiting the Classics: Online RL in the Programmable Dataplane. 1-10 - Ali El-Amine, Olivier Brun:
A Game-Theoretic Algorithm for the Joint Routing and VNF Placement Problem. 1-9 - Márton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle:
Clustering Mobile Network Data with Decorrelating Adversarial Nets. 1-9 - Vojdan Kjorveziroski, Pavle V. Vuletic, Lukasz Lopatowski, Frédéric Loui:
On-Demand Network Management with NMaaS: Network Management as a Service. 1-3 - Takanori Hara, Masahiro Sasabe:
Lagrangian Heuristics for Capacitated Shortest Path Tour Problem Based Online Service Chaining. 1-9 - Hsin-Fu Chang, Michael I.-C. Wang, Chi-Hsiang Hung, Charles H.-P. Wen:
Enabling Malware Detection with Machine Learning on Programmable Switch. 1-5 - Will Fantom, Paul Alcock, Ben Simms, Charalampos Rotsos, Nicholas J. P. Race:
A NEAT way to test-driven network management. 1-5 - Filippo Poltronieri, Cesare Stefanelli, Mauro Tortonesi:
Value-of-Information Middleware Solutions for Fog and Edge Computing. 1-6 - Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. 1-6 - Sharva Garg, Tanmoy Bag, Andreas Mitschele-Thiel:
Decentralized Machine Learning based Network Data Analytics for Cognitive Management of Mobile Communication Networks. 1-9 - Tina Tremel, Jochen Kögel, Florian Jauernig, Sebastian Meier, Dennis Thom, Franziska Becker, Christoph Müller, Steffen Koch:
VITALflow: Visual Interactive Traffic Analysis with NetFlow. 1-6 - Niloy Saha, Alexander James, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:
Demonstrating Network Slice KPI Monitoring in a 5G Testbed. 1-3 - Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing. 1-7 - Marten Gartner, Johann Wagner, Martin Koppehel, David Hausheer:
XDP-Accelerated Packet Processing on SCION Endhosts. 1-9 - Thomas Tournaire, Yue Jin, Armen Aghasaryan, Hind Castel-Taleb, Emmanuel Hyon:
Factored Reinforcement Learning for Auto-scaling in Tandem Queues. 1-7 - Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:
Towards SDN-based Dynamic Path Reconfiguration for Time Sensitive Networking. 1-9 - Anat Bremler-Barr, Bar Meyuhas, Ran Shister:
MUDIS: MUD Inspection System. 1-3 - Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco:
Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models. 1-8 - Arnol Lemogue, Ivan Martinez, Laurent Toutain, Ahmed Bouabdallah:
Federated IoT Roaming using Private DNS Resolutions. 1-6 - Marek Bachmann, Luca Hernández Acosta, Johann Götz, Delphine Reinhardt, Klaus David:
Collision Avoidance for Vulnerable Road Users: Privacy versus Survival? 1-6 - Mozhgan Nasr Azadani, Azzedine Boukerche:
Convolutional and Recurrent Neural Networks for Driver Identification: An Empirical Study. 1-6 - Ramesh Paudel, H. Howie Huang:
Pikachu: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection. 1-7 - Andrei Günter, Matthias König:
Improved Edge Computing for IoT Devices via Optimized Semantic Models. 1-6 - Lyn Hill, Charalampos Rotsos, William Fantom, Christopher Edwards, David Hutchison:
Improving network resilience with Middlebox Minions. 1-5 - Carlos Güemes-Palau, Paul Almasan, Shihan Xiao, Xiangle Cheng, Xiang Shi, Pere Barlet-Ros, Albert Cabellos-Aparicio:
Accelerating Deep Reinforcement Learning for Digital Twin Network Optimization with Evolutionary Strategies. 1-5 - Gwen Maudet, Mireille Batton-Hubert, Patrick Maillé, Laurent Toutain:
Emission Scheduling Strategies for Massive-IoT: Implementation and Performance Optimization. 1-4 - Manel Smine, David Espes, Marc-Oliver Pahl:
Optimal Access Control Deployment in Network Function Virtualization. 1-9 - Muhammad Sulaiman, Arash Moayyedi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh:
Multi-Agent Deep Reinforcement Learning for Slicing and Admission Control in 5G C-RAN. 1-9 - Morteza Safaei Pour, Joseph Khoury, Elias Bou-Harb:
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts. 1-9 - Marian Buschsieweke, Mesut Günes:
Efficient Revocation of Capability Tokens. 1-6 - Shihabur Rahman Chowdhury, Raouf Boutaba:
Resource Management in Softwarized Networks. 1-6 - Juan Vargas, Cédric Thienot, Xavier Lagrange:
Analytical Calculation of the User Threshold for the Switching between Unicast and Broadcast in Cellular Networks. 1-6 - Chenxin Duan, Kai Wang, Wenqi Chen, Guanglei Song, Jiahai Yang, Zhiliang Wang:
Monitoring Smart Home Traffic under Differential Privacy. 1-10 - Vatsal Mehta, Glenford Mapp, Vaibhav Gandhi:
Exploring New Traffic Prediction Models to build an Intelligent Transport System for Smart Cities. 1-6 - Stanislav Lange, Jane Frances Pajo, Thomas Zinner, Håkon Lønsethagen, Min Xie:
QoS-Aware Inter-Domain Connectivity: Control Plane Design and Operational Considerations. 1-6 - Mengfei Zhu, Rui Kang, Eiji Oki:
Implementation of Real-time Function Deployment with Resource Migration in Kubernetes. 1-3 - Lars Wüstrich, Sebastian Gallenmüller, Marc-Oliver Pahl, Georg Carle:
AC/DCIM: Acoustic Channels for Data Center Infrastructure Monitoring. 1-5 - Jalil Moraney, Danny Raz:
Efficient Resource-Constrained Monitoring. 1-6 - Johan Garcia:
Change Point Detection in Clustered Network Performance Indicators. 1-6 - Stefan Werner, Stefan Schneider, Holger Karl:
Use What You Know: Network and Service Coordination Beyond Certainty. 1-10 - Joseph McNamara, Erik Aumayr, Liam Fallon, Enda Fallon:
A Flexible Interpreter For Intent Realisation. 1-6 - Christian Dietz, Marcel Antzek, Gabi Dreo, Anna Sperotto, Aiko Pras:
DMEF: Dynamic Malware Evaluation Framework. 1-7 - Eduardo Cibrián, Roy Mendieta, José María Álvarez Rodríguez, Juan Lloréns:
Towards the reuse of physical models within the development life-cycle: a case study of Simulink models. 1-6 - Shivani Saxena, Krishna M. Sivalingam:
Slice admission control using overbooking for enhancing provider revenue in 5G Networks. 1-7 - Nobukazu Fukuda, Chao Wu, Shingo Horiuchi, Kenichi Tayama:
Fault Report Generation for ICT Systems by Jointly Learning Time-series and Text Data. 1-9 - Shahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel:
Peer Me Maybe?: A Data-Centric Approach to ISP Peer Selection. 1-9 - Patrick Schwaiger, Dimitrios Simopoulos, Andreas Wolf:
Automated IoT security testing with SecLab. 1-6 - Ziting Zhang, Yu Zeng, Haoran Liu, Chaoyue Zhao, Feng Wang, Yunqing Chen:
Smart DC: An AI and Digital Twin-based Energy-Saving Solution for Data Centers. 1-6 - Masaru Sakai, Kensuke Takahashi:
Constructing a service process model based on distributed tracing for conformance checking of microservices. 1-6 - Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba:
Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane. 1-9 - Jakob Nyberg, Pontus Johnson, András Méhes:
Cyber threat response using reinforcement learning in graph-based attack simulations. 1-4 - Mohamed Oulaaffart, Remi Badonnel, Christophe Bianco:
An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services. 1-9 - Sebastian Engel, Christian Münch, Fritz Schinkel, Oliver Holschke, Marc Geitz, Timmy Schüller:
Segment Routing with Digital Annealing. 1-9 - Kuon Akiyama, Ryoichi Shinkuma, Jun Shiomi:
Real-time adaptive data filtering with multiple sensors for indoor monitoring. 1-3 - Gayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera, Indika A. M. Balapuwaduge, Madhusanka Liyanage:
MEC-RHA: Demonstration of Novel Service Request Handling Algorithm for MEC. 1-3 - Anat Bremler-Barr, Bar Meyuhas, Ran Shister:
One MUD to Rule Them All: IoT Location Impact. 1-5 - Christian Lübben, Simon Schäffner, Marc-Oliver Pahl:
Continuous Microservice Re-Placement in the IoT. 1-6 - Stefan Schneider, Stefan Werner, Ramin Khalili, Artur Hecker, Holger Karl:
mobile-env: An Open Platform for Reinforcement Learning in Wireless Mobile Networks. 1-3 - Haythem Yahyaoui, Melek Majdoub, Mohamed Faten Zhani, Moayad Aloqaily:
On Minimizing TCP Retransmission Delay in Softwarized Networks. 1-6 - Takahide Murakami, Naoki Aihara, Akio Ikami, Yu Tsukamoto, Hiroyuki Shinbo:
Analysis of CPU Placement of Cell-Free Massive MIMO for User-centric RAN. 1-7 - Negar Emami, Lucas Pacheco, Antonio Di Maio, Torsten Braun:
RC-TL: Reinforcement Convolutional Transfer Learning for Large-scale Trajectory Prediction. 1-9 - Alex F. R. Trajano, Pietro C. F. Andrade, Ivo A. Pimenta, Jefferson Rodrigo A. Cavalcante, José Neuman de Souza:
Delivering WiFi Connectivity to Remote Locations Through LoRa Mesh Networking. 1-6 - Damu Ding, Marco Savi, Federico Pederzolli, Domenico Siracusa:
Design and Development of Network Monitoring Strategies in P4-enabled Programmable Switches. 1-6 - Andrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn:
Natural Language Processing for the Dynamic Generation of Network Management Workflows. 1-3 - Maya Kassis, Massinissa Ait Aba, Hind Castel-Taleb, Maxime Elkael, Andrea Araldo, Badii Jouaber:
Integrated Deployment Prototype for Virtual Network Orchestration Solution. 1-3 - Dimitrios Dechouniotis, Dimitrios Spatharakis, Symeon Papavassiliou:
Edge Robotics Experimentation over Next Generation IIoT Testbeds. 1-3 - David Balla, Markosz Maliosz, Csaba Simon:
Towards a Predictable Open Source FaaS. 1-5 - Christopher Janz, Yuren You, Mahdi Hemmati, Zhiping Jiang, Abbas Javadtalab, Jeebak Mitra:
Digital Twin for the Optical Network: Key Technologies and Enabled Automation Applications. 1-6 - Márton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle:
Robust Deep Learning against Corrupted Data in Cognitive Autonomous Networks. 1-7 - Christian Thomay, Ulf Bodin, Haris Isakovic, Rainer Lasch, Nicholas J. P. Race, Christoph Schmittner, Germar Schneider, Zsolt Szepessy, Markus Tauber, Zhiping Wang:
Towards Adaptive Quality Assurance in Industrial Applications. 1-6 - Anderson Santos da Silva, Alberto Schaeffer-Filho:
NetWords: Enabling the Understanding of Network Property Violation Occurrences. 1-9 - Kensuke Fukuda, Yoshitaka Aharen, Shinta Sato, Takeshi Mitamura:
Characterizing DNS query response sizes through active and passive measurements. 1-6 - Takayuki Kuroda, Yutaka Yakuwa, Takashi Maruyama, Takuya Kuwahara, Kozo Satoda:
Automation of Intent-based Service Operation with Models and AI/ML. 1-6 - Reza Hedayati Majdabadi, Mea Wang, Logan Rakai:
SODA-Stream: SDN Optimization for Enhancing QoE in DASH Streaming. 1-5 - Pegah Golchin, Ralf Kundel, Tim Steuer, Rhaban Hark, Ralf Steinmetz:
Improving DDoS Attack Detection Leveraging a Multi-aspect Ensemble Feature Selection. 1-5 - Simon Bauer, Benedikt Jaeger, Max Reimann, Jonas Fromm, Georg Carle:
Towards the Classification of TCP Throughput Changes. 1-7 - Katharina Dietz, Nicholas Gray, Michael Seufert, Tobias Hossfeld:
ML-based Performance Prediction of SDN using Simulated Data from Real and Synthetic Networks. 1-7 - Eli Brosh, Elad Wasserstein, Anat Bremler-Barr:
Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures. 1-6 - Seyed Soheil Johari, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh:
Anomaly Detection and Localization in NFV Systems: an Unsupervised Learning Approach. 1-9 - Stepan Dvorak, Pavel Procházka, Lukás Bajer:
GNN-Based Malicious Network Entities Identification In Large-Scale Network Data. 1-4 - Giles Winchester, George Parisis, Luc Berthouze:
Exploiting Functional Connectivity Inference for Efficient Root Cause Analysis. 1-5 - Takuya Kuwahara, Takayuki Kuroda, Kozo Satoda:
Intent-based System Design with Efficient Search Using Partial-Order Reduction. 1-7 - Fernando García Sanz, Masoumeh Ebrahimi, Andreas Johnsson:
Exploring Approaches for Heterogeneous Transfer Learning in Dynamic Networks. 1-9 - Valentin Dimov, Erkin Kirdan, Marc-Oliver Pahl:
Resource tradeoffs for TLS-secured MQTT-based IoT Management. 1-6 - Ben Schneider, Rute C. Sofia, Matthias Kovatsch:
A Proposal for Time-Aware Scheduling in Wireless Industrial IoT Environments. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.