Abstract is missing.
- TinyG: Accurate IP Geolocation Using a Tiny Number of ProbersNan Jiang, Jessie Hui Wang, Jilong Wang 0001, Peiran Wang. 1-9 [doi]
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular NetworksEngin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan, Yekta Turk. 1-7 [doi]
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSNYing Wang 0002, Yufan Cheng, Zhihan Zhuang, Junye Zhang, Peng Yu, Shaoyong Guo, Xuesong Qiu 0001. 1-5 [doi]
- Online Utilization Maximization in Resource Allocation with Minimum Service GuaranteesDor Harris, David Naori, Danny Raz. 1-9 [doi]
- Deep Reinforcement Learning Based Command Control System for Automating Fault DiagnosisHiroshi Yamauchi, Tatsuaki Kimura. 1-5 [doi]
- Path Oracle: Improving Performance of Path-Aware Applications in SCIONThorben Krüger, Clemens Beck, David Hausheer. 1-5 [doi]
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RANMaria Mushtaq, Morteza Golkarifard, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh. 1-5 [doi]
- A Lightweight Heuristic for Micro-Services Placement and Chaining in Low Latency ServicesHichem Magnouche, Guillaume Doyen, Caroline Prodhon. 1-9 [doi]
- Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic AnalysisLucas Torrealba Aravena, Pedro Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik. 1-5 [doi]
- Energy Efficient VNF-FG Embedding via Attention-Based Deep Reinforcement LearningOmar Houidi, Oussama Soualah, Ines Houidi, Djamal Zeghlache. 1-7 [doi]
- On Large-Scale IP Service Disruptions DependenciesAlfred Arouna, Ioana Livadariu, Azan Latif Khanyari, Ahmed Elmokashfi. 1-5 [doi]
- Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified ModelVedant Joseph Kumar, Patrick Maillé, Bruno Tuffin. 1-7 [doi]
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4Yixing Wang, Yang Xiao, Yuqian Song, Jingli Zhou, Jun Liu. 1-7 [doi]
- Performance Impact of Queue Sorting in Container-Based Application SchedulingJosé Santos 0001, Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Vendor Agnostic Network Service Orchestration with Stacked NSO ServicesMarc Koerner. 1-4 [doi]
- Data Fabrics for Multi-Domain Information SystemsPooyan Habibi, Morteza Moghaddassian, Shayan Shafaghi, Alberto Leon-Garcia. 1-5 [doi]
- A Fair Approach to the Online Placement of the Network Services Over the EdgeMasoud Taghavian, Yassine Hadjadj Aoul, Géraldine Texier, Nicolas Huin, Philippe Bertin. 1-7 [doi]
- SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement LearningEui-Dong Jeong, Jae-Hyoung Yoo, James Won-Ki Hong. 1-5 [doi]
- Learning-Based Formation Control of UAV-FleetAbdulhakeem Abdulazeez, Nicola Roberto Zema, Tara Ali-Yahiya, Steven Martin 0001. 1-7 [doi]
- Improving System Configurations Using Domain Knowledge Assisted Semi-Supervised LearningNegar Mohammadi-Koushki, Sanjeev Sondur, Krishna Kant 0001. 1-5 [doi]
- Tailoring MLOps Techniques for Industry 5.0 NeedsCsaba Hegedüs, Pál Varga. 1-7 [doi]
- Path Plausibility Algorithms in GoBGPNils Höoger, Nils Rodday, Oliver Borchert, Gabi Dreo Rodosek. 1-3 [doi]
- Scalable and Efficient Link Layer Topology Discovery for Autonomic NetworksPaul Seehofer, Roland Bless, Hendrik Mahrt, Martina Zitterbart. 1-9 [doi]
- An ETSI-Compliant Architecture for the Element Management System: The Key for Holistic NFV ManagementVinicius Fulber Garcia, José Wilson Vieira Flauzino, Carlos Raniery Paula dos Santos, Elias P. Duarte. 1-9 [doi]
- dot2net: A Labeled Graph Approach for Template-Based Configuration of Emulation NetworksSatoru Kobayashi, Ryusei Shiiba, Ryosuke Miura, Shinsuke Miwa, Toshiyuki Miyachi, Kensuke Fukuda. 1-9 [doi]
- Analyzing the Quality of Synthetic Adversarial CyberattacksUlya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar. 1-5 [doi]
- AdFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center NetworksSebastian Schmidt, Johannes Zerwas, Wolfgang Kellerer. 1-5 [doi]
- A Critical Study of Few-Shot Learning for Encrypted Traffic ClassificationElham Akbari, Sheikh A. Tahmid, Navid Malekghaini, Mohammad Ali Salahuddin 0001, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin. 1-9 [doi]
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket ClassificationMd. Shamim Towhid, Nasik Sami Khan, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh. 1-7 [doi]
- Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path RoutingMohamed Abderrahmane Madani, Fen Zhou 0001, Ahmed Meddahi. 1-5 [doi]
- An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood AttacksBenjamin Teyssier, Y. A Joarder, Carol Fung. 1-9 [doi]
- ML-Based Translation Methods for Protocols and Data FormatsTamas Tothfalusi, Eszter Varga, Zoltan Csiszar, Pál Varga. 1-5 [doi]
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster DetectionRafael Copstein, Brad Niblett, Andrew Johnston, Jeff Schwartzentruber, Malcolm I. Heywood, Nur Zincir-Heywood. 1-7 [doi]
- Look at my Network: An Insight into the ISP Backbone TrafficTomás Benes, Jaroslav Pesek, Tomás Cejka. 1-7 [doi]
- Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular NetworksMahtab Movahedian, Mahdi Dolati, Majid Ghaderi. 1-9 [doi]
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-Based ApproachBadre Bousalem, Mohamed Anis Sakka, Vinicius F. Silva, Wael Jaafar, Asma Ben Letaifa, Rami Langar. 1-5 [doi]
- pUpdate: Priority-Based Scheduling for Continuous and Consistent Network Updates in SDNMehdi Nobakht, Arshiya Rezaie Hezaveh. 1-7 [doi]
- ASSL as an Intent Expression Language for Autonomic Intent-Driven NetworkingSolmaz Jaberi, J. William Atwood, Joey Paquet. 1-5 [doi]
- Settling Issues in IEEE 802.1AS Networks in PI Based Clock ServosAttila Frankó, Gergely Hollósi. 1-7 [doi]
- CML-IDS: Enhancing Intrusion Detection in SDN Through Collaborative Machine LearningPegah Golchin, Chengbo Zhou, Pratyush Agnihotri, Mehrdad Hajizadeh, Ralf Kundel, Ralf Steinmetz. 1-9 [doi]
- AI Toolbox Concept for the Arrowhead FrameworkDániel Ficzere, Gergely Hollósi, Attila Frankó, Pál Varga. 1-7 [doi]
- Deep Reinforcement Learning for Network Service Recovery in Large-Scale FailuresKazuaki Akashi, Nobukazu Fukuda, Shunsuke Kanai, Kenichi Tayama. 1-5 [doi]
- An Explainable-by-Design Ensemble Learning System to Detect Unknown Network AttacksCéline Minh, Kevin Vermeulen, Cédric Lefebvre, Philippe Owezarski, William Ritchie. 1-9 [doi]
- Predicting the Performance of DNNs to Support Efficient Resource AllocationSarah Shah, Yasaman Amannejad, Diwakar Krishnamurthy. 1-7 [doi]
- Bridging Resource Prediction and System Management: A Case Study in Cloud SystemsJustin Kur, Ji Xue, Jingshu Chen, Jun Huang. 1-5 [doi]
- Log Analysis and Prediction for Anomaly Detection in Network SwitchesSukhyun Nam, Euidong Jeong, Jibum Hong, Jae-Hyoung Yoo, James Won-Ki Hong. 1-7 [doi]
- Enhancing DeCrypto: Finding Cryptocurrency Miners Based on Periodic BehaviorJosef Koumar, Richard Plný, Tomás Cejka. 1-7 [doi]
- LLM-Based Policy Generation for Intent-Based Management of ApplicationsKristina Dzeparoska, Jieyu Lin, Ali Tizghadam, Alberto Leon-Garcia. 1-7 [doi]
- Subscription Management for Beyond 5G and 6G Cellular Networks Using Blockchain TechnologyNischal Aryal, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi. 1-7 [doi]
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network ApproachLorenzo Manca, Davide Borsatti, Filippo Poltronieri, Mattia Zaccarini, Domenico Scotece, Gianluca Davoli, Luca Foschini 0001, Genady Ya. Grabarnik, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi, Walter Cerroni. 1-9 [doi]
- Low Impact Tenant Code Updates on Multi-Tenant Programmable SwitchesTimo Geier, Sebastian Rieger. 1-5 [doi]
- BGP Control Plane Overhead in Fat-Trees: An Analytical ApproachLeonardo Alberro, Eduardo Grampín. 1-7 [doi]
- Adaptive Entanglement Routing for Quantum Networks with CutoffJiaheng Xiong, Qiaolun Zhang, Alberto Gatto 0001, Francesco Musumeci 0001, Raouf Boutaba, Massimo Tornatore. 1-5 [doi]
- Improved Video QoE in Wireless Networks Using Deep Reinforcement LearningHenrique D. Moura, Júnia Maísa Oliveira, Daniel Soares, Daniel F. Macedo, Marcos A. M. Vieira. 1-7 [doi]
- On Integrated Wired and Wireless Time-Sensitive Networking using SDNMehdi Nobakht, Frank T. H. den Hartog. 1-5 [doi]
- Synthesizing and Scaling WAN Topologies Using Permutation-Invariant Graph Generative ModelsMax Helm, Georg Carle. 1-7 [doi]
- 5G E2E Network Slicing Predictable Traffic GeneratorBrigitte Jaumard, Junior Momo Ziazet. 1-7 [doi]
- BGPEval: Automating Large-Scale Testbed CreationNils Rodday, Gabi Dreo Rodosek. 1-5 [doi]
- Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKABohan Zhang, Paul Zeinaty, Noura Limam, Raouf Boutaba. 1-9 [doi]
- CrossBal: Data and Control Plane Cooperation for Efficient and Scalable Network Load BalancingBruno Loureiro Coelho, Alberto E. Schaeffer Filho. 1-9 [doi]
- Coupling QoS Co-Simulation with Online Adaptive Arrival ForecastingYichong Chen, Manuel Roveri, Shreshth Tuli, Giuliano Casale. 1-9 [doi]
- Deep Learning in NLP for Anomalous HTTP Requests DetectionManh-Tien-Anh Nguyen, Van Tong, Sondes Bannour Souihi, Sami Souihi. 1-8 [doi]
- Disaggregating a 5G Non-Public Network via On-Demand Cloud-Native UPF DeploymentsJorge Baranda, Sergio Barrachina-Muñoz, Rasoul Nikbakht, Miquel Payaró, Josep Mangues-Bafalluy. 1-3 [doi]
- Enterprise Application Outage Prediction Using XGBoost and LSTMAli Hassan, Shahram Shah-Heydari. 1-5 [doi]
- Federated Scheduling of Fog-Native Applications Over Multi-Domain Edge-to-Cloud EcosystemMays F. Al-Naday, Vasileios Karagiannis, Tom De Block, Bruno Volckaert. 1-7 [doi]
- Network Traffic Classification Based on Single Flow Time Series AnalysisJosef Koumar, Karel Hynek, Tomás Cejka. 1-7 [doi]
- DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G NetworksBehnam Farzaneh, Nashid Shahriar, Abu Hena Al Muktadir, Md. Shamim Towhid. 1-5 [doi]
- Leveraging Spatiotemporal Relations for Predicting Potential Link FailuresBruck Wubete, Babak Esfandiari, Thomas Kunz. 1-5 [doi]
- Empirical Analysis of the Fine-Tuning for Unsupervised Anomaly Detection in the ICT SystemYoichi Matsuo. 1-7 [doi]
- DEFT: Distributed, Elastic, and Fault-Tolerant State Management of Network FunctionsMd Mahir Shahriyar, Gourab Saha, Bishwajit Bhattacharjee, Rezwana Reaz. 1-7 [doi]
- Resource Allocation of Multi-User Workloads in Cloud and Edge Data-Centers Using Reinforcement LearningJulian Jimenez, Paola Soto, Danny De Vleeschauwer, Chia-Yu Chang, Yorick De Bock, Steven Latré, Miguel Camelo. 1-5 [doi]
- Workload Placement with Bounded Slowdown in Disaggregated DatacentersAmirhossein Sefati, Mahdi Dolati, Majid Ghaderi. 1-9 [doi]
- A Marketplace Solution for Distributed Network Management and Orchestration of SlicesEngin Zeydan, Luis Blanco, Sergio Barrachina-Muñoz, Farhad Rezazadeh, Luca Vettori, Josep Mangues. 1-6 [doi]
- Deciphering DDoS Attacks Through a Global LensJonas Brunner, Bruno Rodrigues 0001, Katharina O. E. Müller, Salil S. Kanhere, Burkhard Stiller. 1-7 [doi]
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things DevicesAlexander Loginov, Jeffrey Adjei, Nur Zincir-Heywood, Srinivas Sampalli, Kevin de Snayer, Terri Dougall. 1-5 [doi]