Abstract is missing.
- Making our networking stack truly extensibleOlivier Bonaventure. [doi]
- FitSDN: Flexible Integrated Transactional SDNMaja Curic, Zoran Despotovic, Artur Hecker, Georg Carle. 1-9 [doi]
- An Effective Table-Overflow Attack and Defense in Software-Defined NetworkingJianfeng Xu, Liming Wang, Chen Song, Zhen Xu. 10-17 [doi]
- Izzy: A Distributed Routing Protocol for In-band SDN Control Channel ConnectivityPolina Holzmann, Martina Zitterbart. 18-25 [doi]
- Preemptive Two-Stage Update Mechanism for Software-Defined NetworksOluwatobi Akanbi, Amer Aljaedi, Xiaobo Zhou, Adel R. Alharbi. 26-33 [doi]
- Scalable Transport Mechanisms for Blockchain IoT ApplicationsEryk Schiller, Sina Rafati Niya, Timo Surbeck, Burkhard Stiller. 34-41 [doi]
- Fault-Localization Protocol for Wireless Sensor NetworksAther Saeed, M. Arif Khan, Ali Syed. 42-49 [doi]
- A New Approach for Path Loss Prediction in Wireless Underground Sensor NetworksDamien Wohwe Sambo, Anna Förster, Blaise Omer Yenke, Idrissa Sarr. 50-57 [doi]
- Predictive Resource Management for Opportunistic Public Sensing Networks Using Fuzzy LogicGina Younes, Amr ElMougy. 58-65 [doi]
- A Privacy Framework for Charging Connected Electric Vehicles Using Blockchain and Zero Knowledge ProofsDavid Gabay, Kemal Akkaya, Mumin Cebe. 66-73 [doi]
- Recommender Systems on Homomorphically Encrypted Databases for Enhanced User PrivacySamuel Brack, Robert Muth, Stefan Dietzel, Björn Scheuermann 0001. 74-82 [doi]
- The Case for Session Sharing: Relieving Clients from TLS Handshake OverheadsJens Hiller, Martin Henze, Torsten Zimmermann, Oliver Hohlfeld, Klaus Wehrle. 83-91 [doi]
- Protection Against Side-Channel Attacks on Multifusion Zero-Permission Sensors using Differential PrivacyMina Abdallah, Amr ElMougy. 92-99 [doi]
- White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data PlaneSajad Khorsandroo, Ali Saman Tosun. 100-107 [doi]
- On the importance of TCP splitting proxies for future 5G mmWave communicationsDavid A. Hayes, David Ros, Özgü Alay. 108-116 [doi]
- FQ-PIE Queue Discipline in the Linux Kernel: Design, Implementation and ChallengesGautam Ramakrishnan, Mohit Bhasi, V. Saicharan, Leslie Monis, Sachin D. Patil, Mohit P. Tahiliani. 117-124 [doi]
- Onion: An Efficient Heuristic for Designing Routerless Network-on-ChipJie Xiao, Kwan L. Yeung. 125-132 [doi]
- Is Link-Layer Anycast Scheduling Relevant for IEEE 802.15.4-TSCH Networks?Rodrigo Teles Hermeto, Antoine Gallais, Fabrice Théoleyre. 133-140 [doi]
- μvIMS: A Finer-Scalable Architecture Based on MicroservicesJuan S. Orduz, Gabriel D. Orozco, Carlos Hernan Tobar Arteaga, Oscar Mauricio Caicedo Rendon. 141-148 [doi]
- Location Embedding and Deep Convolutional Neural Networks for Next Location PredictionAbdessamed Sassi, Mohammed Brahimi, Walid Bechkit, Abdelmalik Bachir. 149-157 [doi]
- A Longitudinal Analysis of Online Ad-Blocking BlacklistsSaad Sajid Hashmi, Muhammad Ikram, Mohamed Ali Kâafar. 158-165 [doi]
- Adaptive Data Center Network Traffic Management for Distributed High Speed StorageMadhurima Ray, Joyanta Biswas, Amitangshu Pal, Krishna Kant 0001. 166-174 [doi]
- A Lightweight Estimation Algorithm To Auto Configure Snort Fast Pattern MatcherChenxi Li, Jiahai Yang, Guo Li, Kang Wang. 175-182 [doi]