Abstract is missing.
- TCP at 100 Gbit/s - Tuning, Limitations, Congestion ControlMario Hock, Maxime Veit, Felix Neumeister, Roland Bless, Martina Zitterbart. 1-9 [doi]
- Heavy-Hitter Flow Identification in Data Centre Networks Using Packet Size Distribution and Template MatchingAlejandra Duque-Torres, Adrián Pekár, Winston K. G. Seah, Oscar Mauricio Caicedo Rendon. 10-17 [doi]
- Learning Wi-Fi Connection Loss Predictions for Seamless Vertical Handovers Using Multipath TCPJonas Höchst, Artur Sterz, Alexander Frömmgen, Denny Stohr, Ralf Steinmetz, Bernd Freisleben. 18-25 [doi]
- Evaluation of Sigfox LPWAN for sensor-enabled homes to identify at risk community dwelling seniorsCrys Tan, Hwee Pink Tan. 26-33 [doi]
- SmartBFA: A Passive Crowdsourcing System for Point-to-Point Barrier-Free AccessNazir Kamaldin, Susan Kee, Songwei Kong, Chengkai Lee, Huiguang Liang, Alisha Saini, Hwee Pink Tan, Hwee-Xian Tan. 34-41 [doi]
- IEEE 802.15.4 TSCH in Sub-GHz: Design Considerations and Multi-band SupportMartina Brachmann, Simon Duquennoy, Nicolas Tsiftes, Thiemo Voigt. 42-50 [doi]
- A Preliminary Study of UG2AG Link Quality in LoRa-based Wireless Underground Sensor NetworksKaiqiang Lin, Tong Hao, Zhouwei Yu, Wuan Zheng, Wenchao He. 51-59 [doi]
- Detasyr: Decentralized Ticket-based Authorization with Sybil ResistanceSebastian Friebe, Paul Martinat, Martina Zitterbart. 60-68 [doi]
- High-performance, platform-independent DDoS detection for IoT ecosystemsAlejandro Santoyo-González, Cristina Cervelló-Pastor, Dimitrios P. Pezaros. 69-75 [doi]
- Blind Synchronization of Channel Impulse Responses for Channel Reciprocity-based Key GenerationPaul Walther, Elke Franz, Thorsten Strufe. 76-83 [doi]
- Map-Z: Exposing the Zcash Network in Times of TransitionErik Daniel, Elias Rohrer, Florian Tschorsch. 84-92 [doi]
- Combined ARP-Path&RSTP Bridges for Smooth Migration to Robust Shortest Path BridgingDiego Lopez-Pajares, Guillermo Ibáñez, José M. Arco, Boby N. Constantin, Elisa Rojas. 93-96 [doi]
- Scaling and Interoperability of All-Path with Bridged and SDN Domains using VXLANsJoaquin Alvarez-Horcajo, Guillermo Ibanez, Boby N. Constantin, Isaías Martinez-Yelmo, José M. Arco. 97-100 [doi]
- Dynamic Platoon Formation at Urban IntersectionsTobias Hardes, Christoph Sommer 0001. 101-104 [doi]
- QUICker Connection Establishment with Out-Of-Band Validation TokensErik Sy, Christian Burkert, Tobias Mueller, Hannes Federrath, Mathias Fischer 0001. 105-108 [doi]
- An Adaptive Flow-Aware Packet Scheduling Algorithm for Multipath TunnellingRichard Sailer, Jörg Hähner. 109-112 [doi]
- An Attack Behaviors Prediction Model Based on Bag Representation in Time SeriesWei Wan, Yue Wang, Chun Long, Jinxia Wei, Jing Zhao, Guanyao Du. 113-116 [doi]
- A Hybrid Intrusion Detection Algorithm Based on Gaussian Mixture Model and Nearest NeighborsChun Long, Yurou Zhang, Jinxia Wei, Wei Wan, Jing Zhao, Guanyao Du. 117-120 [doi]
- Dynamic Vehicle Path-Planning in the Presence of Traffic EventsTobias Meuser, Ioannis Stavrakakis, Antonio Fernández Anta. 121-124 [doi]
- Prioritize When Patching Everything is Impossible!Ali Alshawish, Hermann de Meer. 125-128 [doi]
- Network-Assisted D2D Relay Selection Under the Presence of Dynamic ObstaclesDurgesh Singh 0002, Sasthi C. Ghosh. 129-132 [doi]
- A Geographical Aware Routing Protocol Using Directional Antennas for NDN-VANETsEirini Kalogeiton, Domenico Iapello, Torsten Braun. 133-136 [doi]
- Blockchain and Structural Relationship Based Access Control for IoT: A Smart City Use CaseFariza Sabrina. 137-140 [doi]
- Strict Judgement of Successful Transfer of Multiple Data and ACK Frames in Interfering Wireless LAN EnvironmentsTakeru Kawashima, Yosuke Tanigawa, Hideki Tode. 141-144 [doi]
- Cooperation Control Between Wireless and Base Stations in Wireless Access Network Consisting of Wireless Networks with Different CoveragesRyosuke Nagayoshi, Yosuke Tanigawa, Hideki Tode. 145-148 [doi]
- Application Level Performance Measurements of Multi-Connectivity Options in Cellular Networks for Vehicular ScenariosRalf Lübben, Jens Schwardmann. 149-152 [doi]
- SR Domain Partitioning in Segment Routed SDNsAnix Anbiah, Krishna M. Sivalingam. 153-156 [doi]
- Container-based Real-time Video TranscodingSajad Sameti, Mea Wang, Diwakar Krishnamurthy. 157-160 [doi]
- Where are You? Localising Stationary Nodes with Limited InformationSascha Jungen, Matteo Ceriotti, Valentin Fitz, Alexander J. Golkowski, Pedro José Marrón. 161-168 [doi]
- Towards A Realistic Path Planning Evaluation Model for Micro Aerial Vehicle-Assisted Localization of Wi-Fi NodesAlina Rubina, Alexander Artemenko, Andreas Mitschele-Thiel. 169-176 [doi]
- Maximizing Joint Data Rate and Resource Efficiency in D2D-IoT Enabled Multi-Tier NetworksAjay Pratap, Shivani Singh, Shaswat Satapathy, Sajal K. Das 0001. 177-184 [doi]
- A Realistic Evaluation of MRF-based Resource Allocation for SDR Cognitive Radio NetworksKonstantinos Tsitseklis, Grigorios Kakkavas, Vasileios Karyotis, Symeon Papavassiliou. 185-192 [doi]
- SPONGE: Software-Defined Traffic Engineering to Absorb Influx of Network TrafficBenoit Henry, Shihabur Rahman Chowdhury, Abdelkader Lahmadi, Romain Azaïs, Jérôme François, Raouf Boutaba. 193-201 [doi]
- LatencySmasher: A Software-Defined Networking-Based Framework for End-to-End Latency OptimizationMohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani. 202-209 [doi]
- Cooperative and Distributive Caching System for Video Streaming Services over the Information Centric NetworkingHyunmin Noh, Hwangjun Song. 210-213 [doi]
- Real-Time Video Adaptation in Virtualised 5G NetworksPablo Salva-Garcia, Jose M. Alcaraz Calero, Qi Wang 0001, Maria Barros, Anastasius Gavras. 214-217 [doi]
- Multi-Stream TCP: Leveraging the Performance of a Per-Packet Multipath Routing Algorithm When Using TCP and SDNNoel Farrugia, Victor Buttigieg, Johann A. Briffa. 218-221 [doi]
- Modeling and Monitoring Wi-Fi Calling Traffic in Enterprise Networks Using Machine LearningSharat Chandra Madanapalli, Arunan Sivanathan, Hassan Habibi Gharakheili, Vijay Sivaraman, Santosh Patil, Byju Pularikkal. 222-225 [doi]
- LIoTS: League of IoT Sovereignties. A Scalable approach for a Transparent Privacy-safe Federation of Secured IoT PlatformsFlavio Cirillo, Nicola Capuano, Simon Pietro Romano, Ernö Kovacs. 226-229 [doi]
- Inferring IoT Device Types from Network Behavior Using Unsupervised ClusteringArunan Sivanathan, Hassan Habibi Gharakheili, Vijay Sivaraman. 230-233 [doi]
- DENA: An Intelligent Dynamic Flow Scheduling for Rate Adjustment in Green DCNsYasamin Zandi, Akbar Majidi, Lizhuang Ma. 234-237 [doi]
- Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash FunctionArtur Hlobaz. 238-241 [doi]
- A Machine Learning Approach for RDP-based Lateral Movement DetectionTim Bai, Haibo Bian, Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba. 242-245 [doi]
- Design of Binocular Active Free Space Optics Transmission ApparatusTakeshi Tsujimura, Rintaro Shimogawa, Kouhei Yamamoto, Kiyotaka Izumi. 246-249 [doi]
- Checking the OpenFlow Rule Installation and Operational VerificationRamtin Aryan, Frode Brattensborg, Anis Yazidi, Paal Einar Engelstad. 250-253 [doi]
- SafeMR: Privacy-aware Visual Information Protection for Mobile Mixed RealityJaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne. 254-257 [doi]
- On the Activity Privacy of Blockchain for IoTAli Dorri, Clemence Roulin, Raja Jurdak, Salil S. Kanhere. 258-261 [doi]
- An SDN-based Approach to Protect Communication Between Virtual MachinesRadoslaw Cwalinski, René Rietz, Michael Vogel, Hartmut König. 262-265 [doi]
- On the Use of Wide Channels in WiFi NetworksSaber Malekmohammadi, Catherine Rosenberg, Razvan Stanica. 266-269 [doi]
- End-to-End Adversarial Learning for Intrusion Detection in Computer NetworksBahram Mohammadi, Mohammad Sabokrou. 270-273 [doi]
- Geolocation Tracking and Cloaking of Malicious Web SitesMasood Mansoori, Ian Welch. 274-281 [doi]
- Security and Fault Detection in In-node components of IIoT Constrained DevicesDuarte Raposo, André Rodrigues 0001, Soraya Sinche, Jorge Sá Silva, Fernando Boavida. 282-290 [doi]
- A Neural Attention Model for Real-Time Network Intrusion DetectionMengxuan Tan, Alfonso Iacovazzi, Ngai-Man Cheung, Yuval Elovici. 291-299 [doi]
- An Odd Couple: Loss-Based Congestion Control and Minimum RTT Scheduling in MPTCPRalf Lübben, Johannes Morgenroth. 300-307 [doi]
- Network Web Traffic Generator for Cyber Range ExercisesChitra Javali, Girish Revadigar. 308-315 [doi]
- A Framework for Multiaccess Support for Unreliable Internet Traffic using Multipath DCCPMarkus Amend, Eckard Bogenfeld, Milan Cvjetkovic, Veselin Rakocevic, Marcus Pieska, Andreas Kassler, Anna Brunström. 316-323 [doi]
- On Sampling and Recovery of Topology of Directed Social Networks - A Low-Rank Matrix Completion Based ApproachGunjan Mahindre, Anura P. Jayasumana, Kelum Gajamannage, Randy C. Paffenroth. 324-331 [doi]
- Bifröst: a Modular Blockchain Interoperability APIEder J. Scheid, Timo Hegnauer, Bruno Rodrigues, Burkhard Stiller. 332-339 [doi]
- RL-Sketch: Scaling Reinforcement Learning for Adaptive and Automate Anomaly Detection in Network Data StreamsZhengyan Zhou, Dong Zhang, Xiaoyan Hong. 340-347 [doi]
- Machine Tools Fingerprinting for Distributed Numerical Control SystemsWeiqing Huang, Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li. 348-355 [doi]
- Performance Modelling of V2V based Collective Perceptions in Connected and Autonomous VehiclesHui Huang, Wenqi Fang, Huiyun Li. 356-363 [doi]
- Optimizing Inter-Cluster Flights of Post-Disaster Communication Support UAVsJulian Zobel, Patrick Lieser, Bastian Drescher, Bernd Freisleben, Ralf Steinmetz. 364-371 [doi]
- Efficient Multi-Satellite Downlinks for Earth Observation Data Based on Distributed Arithmetic CodingHolger Döbler, Hagen Sparka, Björn Scheuermann 0001. 372-380 [doi]
- OPPLOAD: Offloading Computational Workflows in Opportunistic NetworksArtur Sterz, Lars Baumgärtner, Jonas Höchst, Patrick Lampe, Bernd Freisleben. 381-388 [doi]
- The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World EnvironmentsLars Almon, Flor Álvarez, Laurenz Kamp, Matthias Hollick. 389-397 [doi]
- Association and Reliability in 802.11ad Networks: An Experimental StudyMohammed Dahhani, Gentian Jakllari, André-Luc Beylot. 398-405 [doi]
- Exploring the Usefulness of Machine Learning in the Context of WebRTC Performance EstimationDoreid Ammar, Katrien De Moor, Lea Skorin-Kapov, Markus Fiedler, Poul E. Heegaard. 406-413 [doi]
- IoTLogBlock: Recording Off-line Transactions of Low-Power IoT Devices Using a BlockchainChristos Profentzas, Magnus Almgren, Olaf Landsiedel. 414-421 [doi]
- Failure Resilient Traffic Engineering Using Segment RoutingTimmy Schuller, Nils Aschenbruck, Markus Chimani, Martin Horneffer. 422-429 [doi]
- rmin -Routing - Discovery and Operation of Routes in Wireless Ad-hoc Networks with Specified Statistical Minimum ReliabilitiesChristopher Kohlstruck, Kiran Mathews, Reinhard Gotzhein. 430-437 [doi]
- A Lesson in Scaling 6LoWPAN - Minimal Fragment Forwarding in Lossy NetworksMartine S. Lenders, Thomas C. Schmidt, Matthias Wählisch. 438-446 [doi]
- Packet-Preserving Network Coding Schemes for Padding Overhead ReductionBertram Schütz, Nils Aschenbruck. 447-454 [doi]