Abstract is missing.
- Mining Patterns in Mobile Network LogsGolnazsadat Zargarian, Luca Vassio, Maurizio M. Munafò, Marco Mellia. 1-6 [doi]
- P4SC: Towards High-Performance Service Function Chain Implementation on the P4-Capable DeviceXiang Chen, Dong Zhang, Xiaojun Wang, Kai Zhu, Haifeng Zhou. 1-9 [doi]
- Machine learning based Insider Threat Modelling and DetectionDuc C. Le, A. Nur Zincir-Heywood. 1-6 [doi]
- Multi-Tenant IoT Service Management towards an IoT App EconomyMarc-Oliver Pahl. 1-4 [doi]
- Multi-party authorization and conflict mediation for decentralized configuration management processesHolger Kinkelin, Heiko Niedermayer, Marc Müller, Georg Carle. 5-8 [doi]
- Passive Inference of User Actions through IoT Gateway Encrypted Traffic AnalysisPierre-Marie Junges, Jérôme François, Olivier Festor. 7-12 [doi]
- AECID-PG: A Tree-Based Log Parser Generator To Enable Log AnalysisMarkus Wurzenberger, Max Landauer, Florian Skopik, Wolfgang Kastner. 7-12 [doi]
- Machine-Learning based IoT Data CachingMarc-Oliver Pahl, Stefan Liebald, Lars Wustrich. 9-12 [doi]
- A Content-aware Data-plane for Efficient And Scalable Video DeliveryYoann Desmouceaux, Marcel Enguehard, Victor Nguyen, Pierre Pfister, Wenqin Shao, Eric Vyncke. 10-18 [doi]
- 5G Smart City Vertical SliceBogdan Rusti, Horia Stefanescu, Marius Iordache, Jean Ghenta, Cristian Patachia, Panagiotis Gouvas, Anastasios Zafeiropoulos, Eleni Fotopoulou, Qi Wang, Jose M. Alcaraz Calero. 13-19 [doi]
- Leveraging SDN to Enable Short-Term On-Demand Security ExceptionsJames Griffioen, Zongming Fei, P. Sergio Rivera, Jacob Chappell, Mami Hayashida, Pinyi Shi, Charles Carpenter, Yongwook Song, Bhushan Chitre, Hussamuddin Nasir, Kenneth L. Calvert. 13-18 [doi]
- A Method for Temporal Event CorrelationRobert Harper, Philip Tee. 13-18 [doi]
- An LSTM Framework For Modeling Network TrafficAggelos Lazaris, Viktor K. Prasanna. 19-24 [doi]
- Offloading Real-time DDoS Attack Detection to Programmable Data PlanesÂngelo C. Lapolli, Jonatas Adilson Marques, Luciano Paschoal Gaspary. 19-27 [doi]
- ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting ApproachAlaa T. Al Ghazo, Ratnesh Kumar. 19-24 [doi]
- An End-to-End Carrier Ethernet MEF enabled 5G network architectureMichail-Alexandros Kourtis, George Xilouris, Dimitris Makris, Athanasios Sarlas, Thomas Soenen, Harilaos Koumaras, Anastasios Kourtis. 20-24 [doi]
- Network Analytics for Streaming Traffic AnalysisSara Khanchi, A. Nur Zincir-Heywood, Malcolm I. Heywood. 25-30 [doi]
- Adaptive Network Management for Safety-Critical SystemsCora Perner, Holger Kinkelin, Georg Carle. 25-30 [doi]
- Enhancing Security in ETSI Open Source MANO with Usage Control CapabilityAntonio La Marra, Alessio Lunardelli, Fabio Martinelli, Paolo Mori, Andrea Saracino, Piero Castoldi, F. Martino, B. Martini. 25-29 [doi]
- Optimal Distributed Resource Allocation in 5G Virtualized NetworksHassan Halabian. 28-35 [doi]
- A Blockchain-Based Decentralized Wi-Fi Sharing MechanismYao Dai, Zhuo Yu, Yong Yan, Shaoyong Guo, Sujie Shao. 30-35 [doi]
- Neural Network Based Spectrum Prediction in Land Mobile Radio Bands for IoT deploymentsSanaz Mohammadjafari, Emir Kavurmacioglu, John Maidens, Ayse Bener. 31-36 [doi]
- Environment-Adaptive Sizing and Placement of NFV Service Chains with Accelerated Reinforcement LearningManabu Nakanoya, Yoichi Sato, Hideyuki Shimonishi. 36-44 [doi]
- Superlight - A Permissionless, Light-client Only Blockchain with Self-Contained Proofs and BLS SignaturesRoman Blum, Thomas Bocek. 36-41 [doi]
- An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier EnsemblesGeorgios Kaiafas, Christian A. Hammerschmidt, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane. 37-42 [doi]
- Statistical Characterization of Round-Trip Times with Nonparametric Hidden Markov ModelsMaxime Mouchet, Sandrine Vaton, Thierry Chonavel. 43-48 [doi]
- Q-Learning Algorithm for Joint Computation Offloading and Resource Allocation in Edge CloudBoutheina Dab, Nadjib Aitsaadi, Rami Langar. 45-52 [doi]
- Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined NetworkJonathan Kelly, Michael DeLaus, Erik Hemberg, Una-May O'Reilly. 49-54 [doi]
- Enabling Dynamic SLA Compensation Using Blockchain-based Smart ContractsEder John Scheid, Bruno Rodrigues, Lisandro Zambenedetti Granville, Burkhard Stiller. 53-61 [doi]
- Multivariate Metrics of Normal and Anomalous Network BehaviorsNong Ye, Douglas Montgomery, Kevin Mills, Mark Carson. 55-58 [doi]
- Model-based System Identification for Cloud Services AnalyticsArun Adiththan, Kaliappa Ravindran. 59-62 [doi]
- What-if Scenario Analysis for IT Services in Hybrid Cloud Environments with BDMaaS+Walter Cerroni, Luca Foschini, Genady Ya. Grabarnik, Larisa Shwartz, Mauro Tortonesi. 62-70 [doi]
- Graph-based malicious login events investigationFaouzi Amrouche, Sofiane Lagraa, Georgios Kaiafas, Radu State. 63-66 [doi]
- Hashtray: Turning the tables on Scalable Client ClassificationNik Sultana, Pardis Pashakhanloo, Zihao Jin, Achala Rao, Boon Thau Loo. 67-70 [doi]
- A Machine Learning Application for Latency Prediction in Operational 4G NetworksAli Safari Khatouni, Francesca Soro, Danilo Giordano. 71-74 [doi]
- A Reputation Scheme for a Blockchain-based Network Cooperative DefenseAndreas Gruhler, Bruno Rodrigues, Burkhard Stiller. 71-79 [doi]
- Mining Software Repositories for Predictive Modelling of Defects in SDN ControllerPetra Vizarreta, Ermin Sakic, Wolfgang Kellerer, Carmen Mas Machuca. 80-88 [doi]
- Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet AnalysisLaurent Evrard, Jérôme François, Jean-Noel Colin. 89-97 [doi]
- Privacy-Conscious Threat Intelligence Using DNSBloomRoland van Rijswijk-Deij, Gijs Rijnders, Matthijs Bomhoff, Luca Allodi. 98-106 [doi]
- Effective NFV Orchestration for Wide-Ranging Services Across Heterogeneous Cloud NetworksBart Spinnewyn, Juan Felipe Botero, Carlos Donato, Steven Latré. 107-115 [doi]
- Specifying and Analyzing Virtual Network Services Using Queuing Petri NetsStefan Schneider, Arnab Sharma, Holger Karl, Heike Wehrheim. 116-124 [doi]
- On the Scaling of Virtualized Network FunctionsJorge Lobo 0001, Windhya Rankothge, Helena Ramalhinho Lourenço. 125-133 [doi]
- Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing HoneypotsShun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto. 134-143 [doi]
- A Graph-Based Machine Learning Approach for Bot DetectionAbbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba. 144-152 [doi]
- Split and Merge: Detecting Unknown BotnetsAgathe Blaise, Mathieu Bouet, Stefano Secci, Vania Conan. 153-161 [doi]
- Mitigation of Multi-vector Network Attacks via Orchestration of Distributed Rule PlacementMarinos Dimolianis, Adam Pavlidis, Dimitris Kalogeras, Vasilis Maglaris. 162-170 [doi]
- Data Querying and Access Control for Secure Multiparty ComputationMarcel von Maltitz, Georg Carle. 171-179 [doi]
- On Multi-Point, In-Network Filtering of Distributed Denial-of-Service TrafficMingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher. 180-188 [doi]
- Optimized Placement of Scalable IoT Services in Edge ComputingAdyson Magalhães Maia, Yacine Ghamri-Doudane, Dario Vieira, Miguel Franklin de Castro. 189-197 [doi]
- Machine Learning Based Active Measurement Proxy for IoT SystemsAndreas Johnsson, Christofer Flinta, Wenqing Yan. 198-206 [doi]
- A Delay and Load-balancing based Hierarchical Route Planning Method for Transmission Line IoT Sensing and Monitoring applicationsCheng Ding, Siya Xu, Xing-yu Chen, Guiping Zhou, Peihao Zheng, Yueyue Li. 207-215 [doi]
- Towards robust controller placement in software-defined networks against links failureLi Li, Nana Du, Huanyu Liu, Ruifang Zhang, Chaobo Yan. 216-223 [doi]
- Optimizing Controller Placement for Distributed Software-Defined NetworksGuiying Huang, Gang Chen, Qiang Fu, Elliott Wen. 224-232 [doi]
- Design and Implementation of Virtual TAP for SDN-based OpenStack networkingSeyeon Jeong, Jae-Hyoung Yoo, James W. Hong. 233-241 [doi]
- Performance Prediction in Dynamic Clouds using Transfer LearningAndreas Johnsson, Farnaz Moradi, Rolf Stadler. 242-250 [doi]
- Quality of Service Forecasting with LSTM Neural NetworksTomás Jirsík, Stepan Trcka, Pavel Celeda. 251-260 [doi]
- Deep Convolutional LSTM Network-based Traffic Matrix Prediction with Partial InformationVan An Le, Phi-Le Nguyen, Yusheng Ji. 261-269 [doi]
- Collaborative Sleep Mechanism between Cross-domain Nodes in FiWi network based on load balancing and QoS awarenessXujing Peng, Siya Xu, Shaoyong Guo, Xuesong Qiu, Shuyang Li, Botao Yu. 270-278 [doi]
- Automatic Quality of Experience Management for WLAN Networks using Multi-Armed BanditHenrique Duarte Moura, Daniel Fernandes Macedo, Marcos Augusto Menezes Vieira. 279-288 [doi]
- QoS-Aware Power Management with Deep LearningJunxiu Zhou, Xian Liu, Yangyang Tao, Shucheng Yu. 289-294 [doi]
- Risk-Aware Service Routes Planning for System Protection Communication Network in Energy InternetBaoju Liu, Peng Yu 0001, Fangzheng Chen, Fang Chen, Xuesong Qiu, Lei Shi. 295-303 [doi]
- Cost-aware Service Function Chaining With Reliability Guarantees in NFV-enabled Inter-DC NetworkXuxia Zhong, Ying Wang 0002, Xuesong Qiu. 304-311 [doi]
- Fault-Tolerant Session Support for Service-Centric NetworkingMikael Gasparyan, Ali Marandi, Eryk Schiller, Torsten Braun. 312-320 [doi]
- Optonomic: Architecture for Autonomic Optical Transport NetworksAbhinava Sadasivarao, Sanjoy Bardhan, Sharfuddin Syed, Biao Lu, Loukas Paraschis. 321-328 [doi]
- Introducing ReCPRI: A Field Re-configurable Protocol for Backhaul Communication in a Radio Access NetworkJuan Camilo Vega, Qianfeng Shen, Alberto Leon-Garcia, Paul Chow. 329-336 [doi]
- Collaborative informed gateway selection in large-scale and heterogeneous networksKhulan Batbayar, Roc Meseguer, Emmanouil Dimogerontakis, Leandro Navarro, Ramin Sadre. 337-345 [doi]
- Distributed Orchestration in Cloud Data CentersBill McCormick, Hassan Halabian, Carol J. Fung. 346-352 [doi]
- Thinking inside the Box: Differential Fault Localization for SDN Control PlaneXing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie Quan. 353-359 [doi]
- Using Real-World Event Notifications to Reduce Operational Cost in Virtual NetworksPedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda, Hiroaki Harai. 360-366 [doi]
- INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane ProtectionTao Li, Hani Salah, Xin Ding, Thorsten Strufe, Frank H. P. Fitzek, Silvia Santini. 367-373 [doi]
- Automated Factorization of Security Chains in Software-Defined NetworksNicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz. 374-380 [doi]
- Optimizing Adaptive Tile-Based Virtual Reality Video StreamingJeroen van der Hooft, Maria Torres Vega, Stefano Petrangeli, Tim Wauters, Filip De Turck. 381-387 [doi]
- QoE Performance for DASH Videos in a Smart Cache EnvironmentSheyda Kiani Mehr, Deep Medhi. 388-394 [doi]
- Recovering Content Availability at Failures in ICNNoriaki Kamiyama. 395-401 [doi]
- A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDNXin Zhang, Ru Li. 402-407 [doi]
- TMAS: A Traffic Monitoring Analytics System Leveraging Machine LearningElaheh Jalalpour, Milad Ghaznavi, Raouf Boutaba, Toufik Ahmed. 408-414 [doi]
- A Risk-defined Trust Transitivity Model for Group Decisions in Social NetworksJun Xu, Carol J. Fung. 415-420 [doi]
- IT Service Management Frameworks Compared - Simplifying Service Portfolio ManagementMichael Schmidt, Michael Brenner 0002, Thomas Schaaf. 421-427 [doi]
- Automated Planning of System Rollback in Declarative IT System UpdateTakuya Kuwahara, Takayuki Kuroda, Manabu Nakanoya, Yutaka Yakuwa, Yoichi Sato, Yasuhiro Matsunaga. 428-434 [doi]
- Capacity Optimization based on Traffic Grooming in Transport NetworksMadanagopal Ramachandran, Anix Anbiah, Krishna M. Sivalingam. 435-441 [doi]
- 2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT SystemsAbdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant. 442-447 [doi]
- A Modular Distributed IoT Service DiscoveryMarc-Oliver Pahl, Stefan Liebald. 448-454 [doi]
- Giving IoT Services an Identity and Changeable AttributesMarc-Oliver Pahl, Lorenzo Donini. 455-461 [doi]
- LADEQ: A Fast Lagrangian Relaxation Based Algorithm for Destination-Based QoS RoutingNitin Varyani, Zhi-Li Zhang, Muralidharan Rangachari, David Dai. 462-468 [doi]
- An Approach for Energy Efficient Deadline-Constrained Flow Scheduling and RoutingKeke Fan, Ying Wang, Junhua Ba, Wenjing Li, Qi Li. 469-475 [doi]
- A Deep Reinforcement Learning based Mechanism for Cell Outage Compensation in 5G UDNXiao Yang, Peng Yu 0001, Lei Feng 0001, Fanqin Zhou, Wenjing Li 0001, Xuesong Qiu. 476-481 [doi]
- 3D Aerial Base Station Position Planning based on Deep Q-Network for Capacity EnhancementJiahui Wu, Peng Yu 0001, Lei Feng 0001, Fanqin Zhou, Wenjing Li 0001, Xuesong Qiu. 482-487 [doi]
- Traffic Classification with Machine Learning in a Live NetworkJarrod N. Bakker, Bryan Ng, Winston K. G. Seah, Adrián Pekár. 488-493 [doi]
- Analysis and Demand Forecasting of Residential Energy Consumption at Multiple Time ScalesPoojitha Amin, Ludmila Cherkasova, Rob Aitken, Vikas Kache. 494-499 [doi]
- Automated Failure Modes and Effects Analysis using SysML for Industrial Computer Network Reliability and CybersecurityMyron Hecht, David Baum, Joe Betser. 500-514 [doi]
- Virtual Network Function Descriptors Mining using Word Embeddings and Deep Neural NetworksWassim Sellil Atoui, Imen Grida Ben Yahia, Walid Gaaloul. 515-520 [doi]
- Real-time Pattern Detection in IP Flow Data using Apache SparkMilan Cermák, Martin Lastovicka, Tomás Jirsík. 521-526 [doi]
- Flow/Interface Association for Multi-interface Mobile Terminals: e-Health case proposalMohamed Abdelkrim Senouci, Abdelhamid Mellouk. 527-532 [doi]
- Evaluating a Blockchain-based Cooperative DefenseBruno Rodrigues, Lukas Eisenring, Eder J. Scheid, Thomas Bocek, Burkhard Stiller. 533-538 [doi]
- Build an SR-IOV HypervisorLiang-min Wang, Alex Zelezniak, E. Scott Daniels, Timothy Miskell, Li-De Chen. 539-544 [doi]
- Edison: Event-driven Distributed System of Network MeasurementXiaoban Wu, Timothy Miskell, Yan Luo, Liang-min Wang, Li-De Chen. 545-550 [doi]
- Current Issues of Malicious Domains BlockingStanislav Spacek, Martin Lastovicka, Martin Horák, Tomas Plesnik. 551-556 [doi]
- Low Overhead Distributed IP Flow Records Collection and AnalysisJan Wrona, Martin Zádnik. 557-562 [doi]
- Versatile Optical Path Calculation and Monitoring Using Common YANG ModelJunichi Kawasaki, Seiya Sumita, Genichi Mouri, Masanori Miyazawa, Takehiro Tsuritani. 563-568 [doi]
- Enabling SSH Protocol Visibility in Flow MonitoringPavel Celeda, Petr Velan, Benjamin Kral, Ondrej Kozak. 569-574 [doi]
- Utilizing Deep Learning for Mobile Telecommunications Network ManagementBálint Gyires-Tóth, Pál Varga, Tamas Tothfalusi. 575-580 [doi]
- SDN Enabled Secure IoT ArchitectureKallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula. 581-585 [doi]
- Redundancy mechanism of Service Function Chain with Node-Ranking AlgorithmLeyi Zhang, Ying Wang, Xuesong Qiu, Hantao Guo. 586-589 [doi]
- ASCO: An Availability-aware Service Chain OrchestrationWenchen He, Xiong Chen, Xuesong Qiu, Shaoyong Guo, Peng Yu. 590-593 [doi]
- Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDNHoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor. 594-598 [doi]
- Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipmentVitor A. Cunha, Eduardo da Silva, Marcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes 0001, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Rui L. Aguiar. 599-603 [doi]
- Energy-Aware Slicing of Network Resources based on Elastic Demand through DaytimeRafael L. Gomes, Francisco R. P. da Ponte, Arthur Urbano, Alan Vasconselos, Luiz F. Bittencourt, Edmundo R. M. Madeira. 604-608 [doi]
- Toward a Policy-based Blockchain Agnostic FrameworkEder J. Scheid, Bruno Rodrigues, Burkhard Stiller. 609-613 [doi]
- Mining And Application of User Behavior Pattern Based on Operation And Maintenance DataWenji Zhang, Wenan Zhou, Jun Luo. 614-618 [doi]
- Functional Topology Inference from Network EventsAntoine Messager, George Parisis, Istvan Z. Kiss, Robert Harper, Phil Tee, Luc Berthouze. 619-623 [doi]
- CASH: A Channel Assigner Algorithm for Heterogeneous Devices in Smart HomesFrancisco R. P. da Ponte, Rafael L. Gomes, Joaquim Celestino, Walisson F. Pereira, Nelson L. S. Da Fonseca. 624-628 [doi]
- Towards Scalable Planning of Wireless NetworksMercy O. Jaiyeola, Maxwell Young, Jin Xiao, Hugh R. Medal, Greg Grimes, David Schweitzer. 629-633 [doi]
- Persistent WiFi connectivity during Train journey: An SDN based approachArkadeep Sen, Krishna M. Sivalingam, Babu Narayanan K. J. 634-638 [doi]
- Self-healing solutions for Wi-Fi networks to provide seamless handoverLina Hao, Bryan Ng. 639-642 [doi]
- A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare ApplicationAhmad Salehi S., Carsten Rudolph, Marthie Grobler. 643-648 [doi]
- Real-Time Detection of DNS Exfiltration and Tunneling from Enterprise NetworksJawad Ahmed, Hassan Habibi Gharakheili, Qasim Raza, Craig Russell, Vijay Sivaraman. 649-653 [doi]
- On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validationWenjie Xu, Deliang Chang, Xing Li. 654-658 [doi]
- Data-driven Resource Allocation in Virtualized EnvironmentsLianjie Cao, Sonia Fahmy, Puneet Sharma. 659-664 [doi]
- Data Analysis and Modelling of Users' Behavior on the WebLuca Vassio, Marco Mellia. 665-670 [doi]
- Normalization of Unstructured Log Data into Streams of Structured Event ObjectsDaniel Tovarnák, Tomás Pitner. 671-676 [doi]
- Towards Virtualization of Software-Defined Networks: A Journey in Three ActsAndreas Blenk, Wolfgang Kellerer. 677-682 [doi]
- QoE-Centric Network-Assisted Delivery of Adaptive Video Streaming ServicesStefano Petrangeli, Tim Wauters, Filip De Turck. 683-688 [doi]
- Collaborative Computation Offloading for Multi-access Edge ComputingShuai Yu, Rami Langar. 689-694 [doi]
- Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive FailuresDiman Zad Tootaghaj, Thomas F. La Porta, Ting He 0001. 695-700 [doi]
- Application-Aware Flow MonitoringPetr Velan, Pavel Celeda. 701-706 [doi]
- SLA-controlled Proxy Service Through Customisable MANO Supporting Operator PoliciesThomas Soenen, Felipe Vicens, José Bonnet, Carlos Parada, Evgenia Kapassa, Marios Touloupou, Eleni Fotopoulou, Anastasios Zafeiropoulos, Ana Pol, Stavros Kolometsos, George Xilouris, Pol Alemany, Ricard Vilalta, Panos Trakadas, Panos Karkazis, Manuel Peuster, Wouter Tavernier. 707-708 [doi]
- Network Slice Life-Cycle Management Towards AutomationAmina Boubendir, Fabrice Guillemin, Sylvaine Kerboeuf, Barbara Orlandi, Frédéric Faucheux, Jean-Luc Lafragette. 709-711 [doi]
- Experimental Demonstration of 5G Virtual EPC Recovery in Federated TestbedsKoteswararao Kondepu, Francesco Giannone, S. Vural, B. Riemer, Piero Castoldi, Luca Valcarenghi. 712-713 [doi]
- Connection Integration System for ICT Infrastructure ManagementHiroki Nakayama, Tsunemasa Hayashi. 714-715 [doi]
- A Tool Suite for the Automated Synthesis of Security Function ChainsNicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz. 716-717 [doi]
- A network protocol for distributed orchestration using intent-based forwardingJordan Augé, Marcel Enguehard. 718-719 [doi]
- Cloud-Based System for Fake Tweet IdentificationSaranya Krishnan, Min Chen. 720-721 [doi]
- Demonstration of an Observability Framework for Cloud Native MicroservicesNicolas Marie-Magdelaine, Toufik Ahmed, Gauthier Astruc-Amato. 722-724 [doi]
- ViDupe-Duplicate Video Detection as a Service in CloudGousiya Farheen Shaik, Min Chen. 725-726 [doi]
- Demonstration of Synchronization Attacks on Distributed and Cooperative Control in MicrogridsMingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment. 727-728 [doi]
- Demo Abstract: A Tool to Detect and Visualize Malicious DNS Queries for Enterprise NetworksJawad Ahmed, Hassan Habibi Gharakheili, Qasim Raza, Craig Russell, Vijay Sivaraman. 729-730 [doi]
- Highlighting the Gap Between Expected and Actual Behavior in P4-enabled NetworksNicholas Gray, Alexej Grigorjew, Tobias Hoßfeld, Apoorv Shukla, Thomas Zinner. 731-732 [doi]
- AMIS: Programmable Privacy-Preserving Network Measurement for Analysis and TroubleshootingXiaoban Wu, Chen Xu, Yan Luo, Cody Bumgardner, Gabriel Ghinita, Michael McGarry. 733-734 [doi]
- Automated Distribution of Access Control Rules in Defense Layers of an Enterprise NetworkAdam Pavlidis, Marinos Dimolianis, Dimitris Kalogeras, Vasilis Maglaris. 735-736 [doi]
- Demo: DroidNet - An Android Permission Control Recommendation System Based on CrowdsourcingPulkit Rustgi, Carol J. Fung. 737-738 [doi]
- An Identity Provider as a Service platform for the eduGAIN research and education communitySchmidt Michael, Ziegler Jule Anna. 739-740 [doi]
- IT Operations Analytics: Root Cause Analysis via Complex Event ProcessingMartin Drasar, Tomás Jirsík. 741-742 [doi]
- DNS Firewall Data VisualizationStanislav Spacek, Vít Rusnák, Anna-Marie Dombajova. 743-744 [doi]
- Demonstration: Predicting Distributions of Service MetricsForough Shahab, Rolf Stadler, Andreas Johnsson, Christofer Flinta. 745-746 [doi]
- port2dist: Semantic Port Distances for Network AnalyticsLaurent Evrard, Jérôme François, Jean-Noel Colin, Frédéric Beck. 747-748 [doi]