Abstract is missing.
- Assessing the Impact of Membership Inference Attacks on Classical Machine Learning AlgorithmsGonzalo Martínez Ruiz de Arcaute, José Alberto Hernández 0001, Pedro Reviriego. 1-4 [doi]
- Traffic Protection in T-SDN-Enabled IP-Optical Core Networks by Adjustable Robust OptimizationRonald Romero Reyes, Thomas Bauschert. 1-8 [doi]
- The Impact of COVID-19 on Communication Network OutagesFaris Alotibi, Alekhya Velagapudi, Akshay Madan, Kuheli Sai, Abhishek Viswanathan, Amy Babay, David Tipper, Prashant Krishnamurthy. 1-8 [doi]
- A Machine Learning IDS for Known and Unknown AnomaliesF. Aguiló-Gost, E. Simó-Mezquita, Eva Marín-Tordera, A. Hussain. 1-5 [doi]
- Applications of Machine Learning Techniques for What-if Analysis and Network Overload DetectionJosé Alberto Hernández 0001, Ignacio Martín 0001, Pablo Camarillo, Gonzalo Martínez Ruiz de Arcaute. 1-7 [doi]
- Extending the MEC Mobility Service to Support Cache PrefetchingCarlos M. Lentisco, Luis Bellido, Daniel González-Sánchez, Ignacio Dominguez Martinez-Casanueva, David Fernández, Ignacio Soto. 1-4 [doi]
- Network Insights for IoT Solution ResiliencyDinesh C. Verma, Seraphin B. Calo, Keith Grueneberg, Erich M. Nahum, Douglas Freimuth, David Wood. 1-8 [doi]
- Network Research Simulator. An abstract model formulationJose L. Marzo, David Martínez 0006, Sergi Bergillos, Eusebi Calle. 1-4 [doi]
- Resilient Planning for Multi-Access Edge Computing in Sparsely Populated AreasCamilo Anzola Rojas, Ramón J. Durán Barroso, Ignacio de Miguel, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández, Rubén M. Lorenzo, Evaristo J. Abril. 1-4 [doi]
- Revisiting and Comparing Failure Dependent Protection and RestorationBrigitte Jaumard, Yefei Zhang. 1-7 [doi]
- Modeling and Evaluation of a Data Center SovereigntyShakthivelu Janardhanan, Carmen Mas Machuca. 1-8 [doi]
- Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity CertificationAndré da Silva Oliveira, Henrique Santos 0001. 1-6 [doi]
- Latency-Aware Routing and Spectrum Assignment with Deep Reinforcement LearningCarlos Hernández-Chulde, Ramon Casellas, Ricardo Martínez, Ricard Vilalta, Raul Muñoz. 1-4 [doi]
- Resilient SDN Intercontroller Network Design under Availability Requirements and Geodiversity ConstraintsDorabella Santos, Teresa Gomes, Lúcia Martins, João P. Vidal. 1-8 [doi]
- Adaptive network reliability for human-robot interaction in beyond 5G industrial applicationsDavide Borsatti, Gianluca Davoli, Chiara Lombardo, Daniela Selvi, Roberto Bruschi, Walter Cerroni, Franco Davoli, Carla Raffaelli, Riccardo Trivisonno, Raffaele Bolla. 1-6 [doi]
- A New Approach for Efficient Computation of Marginal Reliability ImportanceMasahiro Hayashi. 1-8 [doi]
- An Intelligent Model to Quantify the Robustness of Tactical Systems to Unplanned Link DisconnectionsJohannes F. Loevenich, Aleksandr Sergeev, Paulo H. L. Rettore, Roberto Rigolin Ferreira Lopes. 1-8 [doi]
- The IoTAC Software Security-by-Design Platform: Concept, Challenges, and Preliminary OverviewMiltiadis G. Siavvas, Erol Gelenbe, Dimitrios Tsoukalas, Ilias Kalouptsoglou, Maria Mathioudaki, Mert Nakip, Dionisis D. Kehagias, Dimitrios Tzovaras. 1-6 [doi]