Abstract is missing.
- PINBALL: Universal and Robust Signature Extraction for Smart Home DevicesChenxin Duan, Shize Zhang, Jiahai Yang, Zhiliang Wang, Yang Yang, Jia Li. 1-9 [doi]
- Recovery Process Visualization based on Automaton ConstructionHiroki Ikeuchi, Yosuke Takahashi, Kotaro Matsuda, Tsuyoshi Toyono. 10-18 [doi]
- StepNet: A Compositional Framework with Reduced Querying for Homing Complex Network ServicesAzzam Alsudais, Shankaranarayanan Puzhavakath Narayanan, Bharath Balasubramanian, Zhe Huang 0001, Eric Keller. 19-27 [doi]
- BluePIL: a Bluetooth-based PassIve Localization MethodBruno Rodrigues 0001, Cyrill Halter, Muriel Figueredo Franco, Eder J. Scheid, Christian Killer, Burkhard Stiller. 28-36 [doi]
- Coordination between Radio and Computing Schedulers in Cloud-RANMahdi Sharara, Sahar Hoteit, Patrick Brown, Véronique Vèque. 37-44 [doi]
- Decentralized Dynamic Gate Scheduling of IEEE 802.1Qbv Time Aware Shaper and a TSN Simulator for Tactile Cyber-Physical SystemsKurian Polachan, Chandramani Singh, Prabhakar T. V. 45-53 [doi]
- Divide and Conquer: Hierarchical Network and Service CoordinationStefan Schneider 0008, Mirko Jürgens, Holger Karl. 54-62 [doi]
- Automation and Multi-Objective Optimization of Virtual Network EmbeddingPedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda. 63-71 [doi]
- Tofino + P4: A Strong Compound for AQM on High-Speed Networks?Ike Kunze, Moritz Gunz, David Saam, Klaus Wehrle, Jan Rüth. 72-80 [doi]
- Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic AutomataPetr Matousek, Vojtech Havlena, Lukás Holík. 81-89 [doi]
- MOBO-NFV: Automated Tuning of a Network Function Virtualization System using Multi-Objective Bayesian OptimizationPietro Mercati, Bin Li 0018, Mesut Ali Ergin, Charlie Tai, Michael Kishinevsky, Boris Serafimov, Subhiksha Ravisundar, Eoin Walsh, Thomas Long. 90-98 [doi]
- Towards a Novel Congestion Notification Algorithm for a Software-Defined Data Center NetworksHai Anh Tran, Thi-Thanh-Tu Nguyen, Sami Souihi, Abdelhamid Mellouk. 99-106 [doi]
- FEDCON: An embeddable Framework for Managing MOC Functions and Interfaces in Federated Software NetworksMichael Steinke, Wolfgang Hommel. 107-115 [doi]
- ML-Assisted Latency Assignments in Time-Sensitive NetworkingAlexej Grigorjew, Michael Seufert, Nikolas Wehner, Jan Hofmann, Tobias Hoßfeld. 116-124 [doi]
- Multi-time-step Segment Routing based Traffic Engineering Leveraging Traffic PredictionVan An Le, Tien Thanh Le, Phi-Le Nguyen, Huynh Thi Thanh Binh, Yusheng Ji. 125-133 [doi]
- Online Learning under Resource ConstraintsRodolfo da Silva Villaça, Rolf Stadler. 134-142 [doi]
- Adaptive Observation of Emerging Cyber Attacks targeting Various IoT DevicesSeiya Kato, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto. 143-151 [doi]
- A Workflow Management Framework for the Dynamic Generation of Workflows that is Independent of the Application EnvironmentAndrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn. 152-160 [doi]
- DESTIN: Detecting State Transitions in Network elementsParisa Foroughi, Wenqin Shao, Frank Brockners, Jean-Louis Rougier. 161-169 [doi]
- Path-Link Graph Neural Network for IP Network Performance PredictionYangzhe Kong, Dmitry Petrov, Vilho Räisänen, Alexander Ilin. 170-177 [doi]
- Towards QoS-aware Provisioning of Chained Virtual Security Services in Edge NetworksMircea M. Iordache-Sica, Christos Anagnostopoulos, Dimitrios P. Pezaros. 178-186 [doi]
- Programmable Low-End Networks: Powering Internet Connectivity for the Other Three BillionAndré Scheibe, Willian Reichert, Luciano Gaspary, Weverton Cordeiro. 187-195 [doi]
- sfc2cpu: Operating a Service Function Chain Platform with Neural Combinatorial OptimizationPatrick Krämer, Philip Diederich, Corinna Krämer, Rastin Pries, Wolfgang Kellerer, Andreas Blenk. 196-205 [doi]
- PMAKE: Physical Unclonable Function-based Mutual Authentication Key Exchange Scheme for Digital Aeronautical CommunicationsNils Mäurer, Thomas Gräupl, Corinna Schmitt, Gabi Dreo Rodosek. 206-214 [doi]
- Latent Semantics Approach for Network Log Analysis: Modeling and its applicationKazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki. 215-223 [doi]
- Distributed Utility Maximization From the Edge in IP NetworksYoucef Magnouche, Pham Tran Anh Quang, Jérémie Leguay, Xu Gong, Feng Zeng. 224-232 [doi]
- ezNL2SQL: A System for Network Devices Management with a Natural Language Interface for DatabasesJasmina Bogojeska, David Lanyi, Mirela Botezatu, Dorothea Wiesmann. 233-240 [doi]
- Cost-efficient Placement and Scaling of 5G Core Network and MEC-enabled Application VNFsDavit Harutyunyan, Rasoul Behravesh, Nina Slamnik-Krijestorac. 241-249 [doi]
- VNFAccel: An FPGA-based Platform for Modular VNF Components AccelerationFilipe B. Lopes, Gabriel Luca Nazar, Alberto E. Schaeffer Filho. 250-258 [doi]
- High-Precision End-to-End Latency Guarantees Using Packet WashLijun Dong, Alexander Clemm. 259-267 [doi]
- On the Practical Detection of Heavy Hitter FlowsJalil Moraney, Danny Raz. 268-276 [doi]
- Experimental Validation of Compute and Network Resource Abstraction and Allocation Mechanisms within an NFV InfrastructureRicardo Martínez, Luca Vettori, Jorge Baranda, Josep Mangues, Engin Zeydan. 277-285 [doi]
- QoE-Aware Container Scheduler for Co-located Cloud EnvironmentsMarcos Carvalho, Daniel Fernandes Macedo. 286-294 [doi]
- Impact of wired telecommunication network latency on demand-side management in smart gridsAdrien Gougeon, Benjamin Camus, Anne Blavette, Anne-Cécile Orgerie. 295-303 [doi]
- PhysarumSM: P2P Service Discovery and Allocation in Dynamic Edge NetworksThomas Lin, Weiyu Zhao, Ivan Co, Andrew Chen, Henry Xu, Alberto Leon-Garcia. 304-312 [doi]
- Bulk Transfer Scheduling with Deadline in Best-Effort SD-WANsArshia Hosseini, Mahdi Dolati, Majid Ghaderi. 313-321 [doi]
- Improved CRL Distribution point for Cooperative Intelligent Transportation SystemsYves Christian Elloh Adja, Ahmed Serhrouchni. 322-330 [doi]
- Delay-aware Slicing and MAC Management using MCDA in IEEE 802.11 SD-RANsPedro Heleno Isolani, Daniel J. Kulenkamp, Johann M. Márquez-Barja, Lisandro Zambenedetti Granville, Steven Latré, Violet R. Syrotiuk. 331-339 [doi]
- Performance Management on Multiple Communication Paths for Portable Assisted LivingFernando Nakayama, Paulo Lenz, Antonin LeFloch, André-Luc Beylot, Aldri Santos, Michele Nogueira. 340-348 [doi]
- LINT: Accuracy-adaptive and Lightweight In-band Network TelemetryShihabur Rahman Chowdhury, Raouf Boutaba, Jérôme François. 349-357 [doi]
- InREC: In-network REal Number ComputationMatthews Jose, Kahina Lazri, Jérôme François, Olivier Festor. 358-366 [doi]
- On the Transition of Legacy Networks to SDN - An Analysis on the Impact of Deployment Time, Number, and Location of ControllersDiogo Ferreira Thé Pontes, Marcos Fagundes Caetano, Geraldo Pereira Rocha Filho, Lisandro Zambenedetti Granville, Marcelo Antonio Marotta. 367-375 [doi]
- Encrypted Network Traffic Classification Using a Geometric Learning ModelTing-Li Huoh, Yan Luo, Tong Zhang. 376-383 [doi]
- Deep-Quality-EON ClassifierGuilherme E. V. Silva, André C. Drummond. 384-392 [doi]
- BUNGEE: An Adaptive Pushback Mechanism for DDoS Detection and Mitigation in P4 Data PlanesLibardo Andrey Quintero González, Lucas Castanheira, Jonatas Adilson Marques, Alberto Schaeffer-Filho, Luciano Paschoal Gaspary. 393-401 [doi]
- RFT: Scalable and Fault-Tolerant Microservices for the O-RAN Control PlaneAlexandre Huff, Matti A. Hiltunen, Elias P. Duarte 0001. 402-409 [doi]
- Scalable TCP Throughput Limitation MonitoringSimon Bauer, Florian Wiedner, Benedikt Jaeger, Paul Emmerich, Georg Carle. 410-416 [doi]
- Impact of Heterogeneous Neutrality Rules with Competitive Content ProvidersKhushboo Agarwal, Patrick Maillé, Bruno Tuffin. 417-423 [doi]
- Network Service Embedding for Cross-Service CommunicationAngelos Pentelas, Panagiotis Papadimitriou 0001. 424-430 [doi]
- Resource Provisioning in Fog Computing through Deep Reinforcement LearningJosé Santos 0001, Tim Wauters, Bruno Volckaert, Filip De Turck. 431-437 [doi]
- C2QoS: CPU-Cycle based Network QoS Strategy in vSwitch of Public CloudYe Yang, Haiyang Jiang, Yulei Wu, Yilong Lv, Xing Li, Gaogang Xie. 438-444 [doi]
- Fault Detection of ICT systems with Deep Learning Model for Missing DataKengo Tajiri, Tomoharu Iwata, Yoichi Matsuo, Keishiro Watanabe. 445-451 [doi]
- Signaling Traffic in Internet-of-Things Mobile NetworksStefan Geissler, Florian Wamser, Wolfgang Bauer, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld. 452-458 [doi]
- The Horizontal INR Conflict-Detection Algorithm: Revealing INR Reallocation and Reauthorization in RPKIHui Zou, Di Ma, Qing Shao, Wei Mao. 459-465 [doi]
- Reinforcement Learning for value-based Placement of Fog ServicesFilippo Poltronieri, Mauro Tortonesi, Cesare Stefanelli, Niranjan Suri. 466-472 [doi]
- Optimized Contextual Data Offloading in Mobile Edge ComputingIbrahim Alghamdi, Christos Anagnostopoulos, Dimitrios P. Pezaros. 473-479 [doi]
- Self-sovereign Identity Management in Wireless Ad Hoc Mesh NetworksMichael Grabatin, Wolfgang Hommel. 480-486 [doi]
- Container-based Service State Management in Cloud ComputingShubha Brata Nath, Sourav Kanti Addya, Sandip Chakraborty, Soumya K. Ghosh 0001. 487-493 [doi]
- Optimal configuration determination in Cognitive Autonomous NetworksAnubhab Banerjee, Stephen S. Mwanje, Georg Carle. 494-500 [doi]
- Joint resource management and action scheduling for carrier-grade NFVLukasz Rajewski, Andrzej Beben, Ajay Mahimkar. 501-507 [doi]
- Adversarial Exploitation of P4 Data PlanesConor Black, Sandra Scott-Hayward. 508-514 [doi]
- Application Layer Packet Classifier in HardwareRacyus Delano Garcia Pacífico, Matheus S. Castanho, Luiz Filipe M. Vieira, Marcos A. M. Vieira, Lucas Ferreira Dos Santos Duarte, José Augusto Miranda Nacif. 515-522 [doi]
- A Distributed Congestion Control Routing Protocol Based on Traffic Classification in LEO Satellite NetworksShiyue Dai, Lanlan Rui, Shiyou Chen, Xuesong Qiu 0001. 523-529 [doi]
- ITrade: A Blockchain-based, Self-Sovereign, and Scalable Marketplace for IoT Data StreamsSina Rafati Niya, Danijel Dordevic, Burkhard Stiller. 530-536 [doi]
- Contextual Bandit for Cognitive Management of Self-Organizing NetworksTony Daher, Sana Ben Jemaa. 537-543 [doi]
- Transaction Characteristics of BitcoinBefekadu G. Gebraselase, Bjarne E. Helvik, Yuming Jiang 0001. 544-550 [doi]
- Streaming Pattern Based Feature Extraction for Training Neural Network Classifier to Predict Quality of VOD servicesSuman Pandey, Mi-Jung Choi, Jae-Hyung Yoo, James Won-Ki Hong. 551-557 [doi]
- Software-based Analysis of the Security by Design in Embedded DevicesPierre-Marie Junges, Jérôme François, Olivier Festor. 558-564 [doi]
- Survivability in Lambda Grids by means of Ant Colony OptimizationGustavo Sousa Pavani, Andre Ricardo Frederico. 565-571 [doi]
- PFT: A Congestion Avoidance Method based on Proactive Flow Throttling at EndpointsXingyun Qi, Mingche Lai, Dezun Dong, Yi Dai, Junsheng Chang, Jijun Cao. 572-578 [doi]
- Relational Consensus-Based Cooperative Task Allocation Management for IIoT-Health NetworksCarlos Pedroso, Yan Uehara de Moraes, Michele Nogueira, Aldri Santos. 579-585 [doi]
- Sextant: Enabling Automated Network-aware Application optimization in Carrier NetworksJingxuan Zhang, Luis Contreras, Kai Gao 0001, Francisco Cano, Patricia Cano, Anais Escribano, Y. Richard Yang. 586-593 [doi]
- Empirical Time Complexity of Generic Dijkstra AlgorithmPiotr Jurkiewicz, Edyta Biernacka, Jerzy Domzal, Robert Wójcik. 594-598 [doi]
- Towards Source Selection in Transfer Learning for Cloud Performance PredictionHannes Larsson, Jalil Taghia, Farnaz Moradi, Andreas Johnsson. 599-603 [doi]
- Time-Aware Traffic Scheduling with Virtual Queues in Time-Sensitive NetworkingJunli Xue, Guochu Shou, Yaqiong Liu, Yihong Hu, Zhigang Guo. 604-607 [doi]
- ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble LearningWenqi Chen, Zhiliang Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi. 608-612 [doi]
- An IoT Transport Architecture for Passenger Counting: A Real ImplementationJanine Kniess, Julio Cezar Rutke, William Alberto Cruz Castañeda. 613-617 [doi]
- Distributed User-centric Service Migration for Edge-Enabled NetworksLucas Pacheco, Denis do Rosário, Eduardo Cerqueira, Leandro Villas, Torsten Braun, Antonio A. F. Loureiro. 618-622 [doi]
- Blockchain-based Identity and Access Management in Industrial IoT SystemsValentin Vallois, Ahmed Mehaoua, Mourad Amziani. 623-627 [doi]
- FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture AttackKeita Hasegawa, Daishi Kondo, Hideki Tode. 628-632 [doi]
- 5G Network Slicing for Wi-Fi NetworksMatteo Nerini, David Palma 0001. 633-637 [doi]
- Availability-Aware Service Chain Provisioning with Sub-chain-enabled Coordinated ProtectionYuncan Zhang, Fujun He, Eiji Oki. 638-642 [doi]
- An open measurement dataset on the Bitcoin P2P NetworkJean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin 0001. 643-647 [doi]
- Machine-Learning-Based Predictive HandoverAhmed Masri, Teemu Veijalainen, Henrik Martikainen, Stephen S. Mwanje, Janne Ali-Tolppa, Márton Kajó. 648-652 [doi]
- SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET)Faheed A. F. Alenezi, Sejun Song, Baek-Young Choi. 653-657 [doi]
- Towards Robust Security Risk Metrics for Networked Systems: Work in ProgressVladimir Marbukh. 658-661 [doi]
- A Computation Offloading Mechanism Based on Sharable Cache in Smart CommunityYixin Zhang, Yong Yan, Yang Yang 0006, Zhipeng Gao, Xuesong Qiu 0001. 662-666 [doi]
- Study of IoT Architecture and Application Invariant FunctionalitiesNahit Pawar, Thomas Bourgeau, Hakima Chaouchi. 667-671 [doi]
- A Reinforcement Learning Approach for Placement of Stateful Virtualized Network FunctionsGodfrey kibalya, Joan Serrat 0001, Juan-Luis Gorricho, Doreen Gift Bujjingo, Jonathan Serugunda, Peiying Zhang. 672-676 [doi]
- Provisioning and Recovery in Flexible Optical Networks using Ant Colony OptimizationLeandro Alvarez de Lima, Gustavo Sousa Pavani. 677-681 [doi]
- A semantic approach for comparing Fog Service Placement ProblemsTanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. 682-686 [doi]
- Power-Aware Path Planning for Vehicle-Assisted Multi-UAVs in Mobile Crowd SensingJie Xi, Liang Liu, Mengqi Li, Xin Li, Jianfei Peng. 687-691 [doi]
- Towards Automating Security Enhancement for Cloud ServicesMohamed Oulaaffart, Remi Badonnel, Olivier Festor. 692-696 [doi]
- CATS: Crowd-based Alert and Tracing Services for building a Safe Community Cluster against COVID-19Khalid J. Almalki, Sejun Song, Muhammad Mohzary, Baek-Young Choi. 697-701 [doi]
- Pipeline for Crowdsourced IoT Data-Modeling with AI-Supported ConvergenceMarc-Oliver Pahl, Florian Bauer, Christian Lübben. 702-706 [doi]
- Summary Cache of IoT Data Using ICNHayate Sasaki, Noriaki Kamiyama. 707-710 [doi]
- ETSCP: Flexible SDN data plane configuration based on bootstrapping of in-band control channelsRomerson Deiny Oliveira, Marcelo Silva Freitas, Diego Nunes Molinos, Pedro Frosi Rosa, Daniel Gomes Mesquita. 711-715 [doi]
- A Dashboard for Cyber Situational Awareness and Decision Support in Network Security ManagementLukás Matta, Martin Husák. 716-717 [doi]
- VFTGen: a Tool to Perform Experiments in Virtual Fat Tree TopologiesTommaso Caiazzi, Mariano Scazzariello, Lorenzo Ariemma. 718-719 [doi]
- A Framework for the Dynamic Generation of Workflows for Network ManagementAndrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn. 720-721 [doi]
- Multi-protocols and Data Manager for IoT Gateways: A smart-building use-case demoLaurent Deru, Amel Achour, Lotfi Guedria. 722-723 [doi]
- Detection of State Transitions in Network elements: On-box demoParisa Foroughi, Wenqin Shao, Frank Brockners, Anil Kuriakose, Jean-Louis Rougier. 724-725 [doi]
- MRT#: a Fast Multi-Threaded MRT ParserLorenzo Ariemma, Mariano Scazzariello, Tommaso Caiazzi. 726-727 [doi]
- PrIoT Demo: Example of Invariant FunctionalitiesNahit Pawar, Thomas Bourgeau, Hakima Chaouchi. 728-729 [doi]
- Co-Simulation of Power Systems and Computing Systems using the FMI StandardAdrien Gougeon, Benjamin Camus, François Lemercier, Martin Quinson, Anne Blavette, Anne-Cécile Orgerie. 730-731 [doi]
- Codec-Aware Video Delivery Over SDNsObinna Izima, Ruairí de Fréin, Ali Malik. 732-733 [doi]
- Leveraging in-network real-value computation for home network device recognitionMatthews Jose, Kahina Lazri, Jérôme François, Olivier Festor. 734-735 [doi]
- Stream-Based IP Flow AnalysisMilan Cermák, Pavel Celeda. 736-741 [doi]
- Software-Defined Architecture for Infrastructure-less Mobile Ad Hoc NetworksAyush Dusia, Adarshpal S. Sethi. 742-747 [doi]
- Survivable Virtual Network EmbeddingNashid Shahriar, Raouf Boutaba. 748-753 [doi]
- Securing Robots: An Integrated Approach for Security Challenges and Monitoring for the Robotic Operating System (ROS)Sean Rivera, Radu State. 754-759 [doi]
- The Cooperative DDoS Signaling based on a Blockchain-based SystemBruno Rodrigues 0001, Burkhard Stiller. 760-765 [doi]
- TANGLED: A Cooperative Anycast TestbedLeandro Marcio Bertholdo, João M. Ceron, Wouter B. de Vries, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, Roland van Rijswijk-Deij, Aiko Pras. 766-771 [doi]
- Defense Against SYN Flood DoS Attacks Using Network-based Mitigation TechniquesPatrik Goldschmidt, Jan Kucera. 772-777 [doi]
- A National Programmable Infrastructure to Experiment with Next-Generation NetworksPaola Grosso, Cristian Hesselman, Luuk Hendriks, Joseph Hill, Stavros Konstantaras, Ronald van der Pol, Victor Reijs, Joeri de Ruiter, Caspar Schutijser. 778-782 [doi]
- 5G Experimentation: The Experience of the Athens 5GENESIS FacilityMaria Christopoulou, Georgios Xilouris, Athanasios Sarlas, Harilaos Koumaras, Michail-Alexandros Kourtis, Themistoklis Anagnostopoulos. 783-787 [doi]
- Routing in Fat Trees: a protocol analyzer for debugging and experimentationMaximiliano Lucero, Agustina Parnizari, Leonardo Alberro, Alberto Castro, Eduardo Grampín. 788-792 [doi]
- Design of a Real-Time Traffic Mirroring SystemLiang-min Wang, Tim Miskell, John Morgan, Edwin Verplanke. 793-796 [doi]
- Experience with implementing VNF chains with Segment Routing and PCEPCees Portegies, Leonardo Boldrini, Marijke Kaat, Paola Grosso. 797-811 [doi]
- What database do you choose for heterogeneous security log events analysis?Sofiane Lagraa, Radu State. 812-817 [doi]
- THANOS: Teleprotection Holistic Application for ONOS ControllerJuan Lucas Vieira, Vinicius C. Ferreira 0001, Ian Vilar Bastos, Silvio Ereno Quincozes, Wilker de Oliveira Delfino, Yago de Rezende dos Santos, Yona Lopes, Diego G. Passos, Célio Vinicius N. Albuquerque, Igor M. Moraes, Luiz Claudio Schara Magalhães, Natalia Castro Fernandes, Débora C. Muchaluat-Saade. 818-823 [doi]
- Digital Mobile Onboarding in Switzerland - a Hands-on ExperienceNicolas Gordillo, Bruno Rodrigues 0001, Christian Killer, Thomas Bocek, Burkhard Stiller. 824-829 [doi]
- Quality that Matters: QoE Monitoring in Education Service Provider (ESP) NetworksNikolas Wehner, Michael Seufert, Viktoria Wieser, Pedro Casas, Germán Capdehourat. 830-835 [doi]
- Real-life V2X Measurement Results for 5G NSA Performance on a High-speed MotorwayDániel Ficzere, Gábor Soós, Pál Varga, Zsolt Szalay. 836-841 [doi]
- Predicting cloud-native application failures based on monitoring data of cloud infrastructureLászló Toka, Gergely Dobreff, Dávid Haja, Mark Szalay. 842-847 [doi]
- LogDTL: Network Log Template Generation with Deep Transfer LearningThieu Nguyen, Satoru Kobayashi, Kensuke Fukuda. 848-853 [doi]
- Exploring the Adaptability of Word Embeddings to Log Message ClassificationYusufu Shehu, Robert Harper 0004. 854-859 [doi]
- SpeedCam: Towards Efficient Flow Monitoring for Multipath CommunicationKilian Gärtner, Jonghoon Kwon, David Hausheer. 860-865 [doi]
- Detection of DoS/DDoS attacks: the UBM and GMM approachJorge Steven Martinez Osorio, Jaime Alberto Vergara Tejada, Juan Felipe Botero Vega. 866-871 [doi]
- CONTAIN: Privacy-oriented Contact Tracing Protocols for EpidemicsArvin Hekmati, Gowri Sankar Ramachandran, Bhaskar Krishnamachari. 872-877 [doi]
- Fog Orchestration meets Proactive CachingFrancescomaria Faticanti, Lorenzo Maggi, Francesco De Pellegrini, Daniele Santoro, Domenico Siracusa. 878-883 [doi]
- When Deep Learning May Not Be The Right Tool For Traffic ClassificationKleidi Ismailaj, Miguel Camelo, Steven Latré. 884-889 [doi]
- Establishing a Chain of Trust in a Sporadically Connected Cyber-Physical SystemSilia Maksuti, Michael Pickem, Mario Zsilak, Anna Stummer, Markus Tauber, Marcus Wieschhoff, Dominic Pirker, Christoph Schmittner, Jerker Delsing. 890-895 [doi]
- Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?Géza Kulcsár, Pál Varga, Marek S. Tatara, Federico Montori, Michel A. Iñigo, Gianvito Urgese, Paolo Azzoni. 896-901 [doi]
- A DevOps Approach for Cyber-Physical System-of-Systems Engineering through ArrowheadCsaba Hegedüs, Pál Varga, Attila Frankó. 902-907 [doi]
- Analysing Design Approaches for the Power Consumption in Cyber-Physical SystemsPatrizia Sailer, Igor Ivkic, Markus Tauber, Andreas Mauthe, Antonios Gouglidis. 908-913 [doi]
- A Framework to identify People, Devices and Services in Cyber-physical system of systemsChristoph Klikovits, Patrick Abraham, Rene Rambacher. 914-919 [doi]
- Key Success Factors for the Implementation of Digital Technologies in the Context of Industry 4.0Alexander Stocker, Manfred Rosenberger, Michael Schmeja, Germar Schneider. 920-925 [doi]
- UAVs-as-a-Service: Cloud-based Remote Application Management for DronesJerico Moeyersons, Martijn Gevaert, Karl-Erik Réculé, Bruno Volckaert, Filip De Turck. 926-931 [doi]
- A novel scheme for congestion notification in IoT low power networksMoussa Aboubakar, Pierre Roux, Mounir Kellil, Abdelmadjid Bouabdallah. 932-937 [doi]
- Unified SNMP Interface for IoT MonitoringPetr Matousek, Ondrej Rysavý, Libor Polcák. 938-943 [doi]
- S3MP: A SCION based Secure Smart Metering PlatformTony John, David Hausheer. 944-949 [doi]
- Cyber-Physical Anomaly Detection for ICSLars Wüstrich, Lukas Schröder, Marc-Oliver Pahl. 950-955 [doi]
- HSL: a Cyber Security Research Facility for Sensitive Data ExperimentsFrédéric Beck, Abdelkader Lahmadi, Jérôme François. 956-961 [doi]
- ORACLE: An Architecture for Collaboration of Data and Control Planes to Detect DDoS AttacksSebastián Gómez Macías, Luciano Paschoal Gaspary, Juan Felipe Botero. 962-967 [doi]
- Access Control in Adversarial Environments for IoT-oriented Distributed LedgersAndrew Cullen, Pietro Ferraro, Robert Shorten, William Sanders, Luigi Vigneri. 968-973 [doi]
- An Electrocardiogram-based Authentication Implementation Integrated with the BlockchainMateus Stürmer Pioner, Luciano Ignaczak, Bruno Lopes Dalmazo, Elvandi da Silva Júnior, Jéferson Campos Nobre. 974-979 [doi]
- Towards an Efficient Detection of Pivoting ActivityMartin Husák, Giovanni Apruzzese, Shanchieh Jay Yang, Gordon Werner. 980-985 [doi]
- Graph-Based CPE Matching for Identification of Vulnerable Asset ConfigurationsDaniel Tovarnák, Lukás Sadlek, Pavel Celeda. 986-991 [doi]
- Intelligent Charging Infrastructure Design for Connected and Autonomous Electric Vehicles in Smart CitiesPalwasha W. Shaikh, Hussein T. Mouftah. 992-997 [doi]
- Sensor Virtualization and Data Orchestration in Internet of Vehicles (IoV)Muhammad Afaq, Muhammad Saqib, Wang-Cheol Song. 998-1003 [doi]
- Performance Evaluation of Pedestrian Detectors for Autonomous VehiclesMingzhi Sha, Azzedine Boukerche. 1004-1008 [doi]
- A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated VehiclesRicardo O. Jacome, Cody Stolle, Ronald K. Faller, George Grispos. 1009-1017 [doi]
- A Data-Fusion Method using Bayesian Approach to Enhance Raw Data Accuracy of Position and Distance Measurements for Connected VehiclesHyeonsup Lim, Bumjoon Bae, Lee D. Han, Shih-Miao Chin, Holing Hwang. 1018-1023 [doi]
- Age of Information in IEEE 802.11pAndrea Baiocchi, Ion Turcanu, Nikita Lyamin, Katrin Sjöberg, Alexey V. Vinel. 1024-1031 [doi]
- Lightweight IDS For UAV Networks: A Periodic Deep Reinforcement Learning-based ApproachOmar Bouhamed, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi. 1032-1037 [doi]
- SRFog: A flexible architecture for Virtual Reality content delivery through Fog Computing and Segment RoutingJosé Santos 0001, Jeroen van der Hooft, Maria Torres Vega, Tim Wauters, Bruno Volckaert, Filip De Turck. 1038-1043 [doi]
- Multimedia Microservice Placement in Hierarchical Multi-tier Cloud-to-Fog NetworksFillipe Santos, Roger Immich, Edmundo R. M. Madeira. 1044-1049 [doi]
- Infinity: A Scalable Infrastructure for In-Network ApplicationsMarcelo Abranches, Karl Olson, Eric Keller. 1050-1053 [doi]
- Cyber-Physiotherapy: Rehabilitation to TrainingIshan Ranasinghe, Ram Dantu, Mark V. Albert, Sam Watts, Ruben Ocana. 1054-1057 [doi]