Abstract is missing.
- A Truly Self-Sovereign Identity SystemQuinten Stokkink, Georgy Ishmaev, Dick H. J. Epema, Johan A. Pouwelse. 1-8 [doi]
- Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and SimulationsElias Rohrer, Florian Tschorsch. 9-16 [doi]
- Data-Quality Based Scheduling for Federated Edge LearningAfaf Taïk, Hajar Moudoud, Soumaya Cherkaoui. 17-23 [doi]
- Slice Aware Non Terrestrial NetworksYoussouf Drif, Emmanuel Lavinal, Emmanuel Chaput, Pascal Berthou, Boris Tiomela Jou, Olivier Grémillet, Fabrice Arnal. 24-31 [doi]
- On the Benefits of Loops for Segment Routing Traffic EngineeringAlexander Brundiers, Timmy Schüller, Nils Aschenbruck. 32-40 [doi]
- Impact of ACK Scaling Policies on QUIC PerformanceEkaterina Volodina, Erwin P. Rathgeb. 41-48 [doi]
- On the Potential of Rate Adaptive Point Cloud Streaming on the Point LevelDominic Laniewski, Nils Aschenbruck. 49-56 [doi]
- Inferring Connected IoT Devices from IPFIX Records in Residential ISP NetworksArman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili. 57-64 [doi]
- ASER: Scalable Distributed Routing Protocol for LEO Satellite NetworksXiang Zhang, Yuan Yang, Mingwei Xu, Jing Luo. 65-72 [doi]
- SDN-based Self-Configuration for Time-Sensitive IoT NetworksNurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer 0001. 73-80 [doi]
- Déjà Vu? Client-Side Fingerprinting and Version Detection of Web Application SoftwareFabian Marquardt, Lennart Buhl. 81-89 [doi]
- Low-Variance Latency Through Forward Error Correction on Wide-Area NetworksNooshin Eghbal, Paul Lu. 90-98 [doi]
- Anomaly Detection for Discovering Performance Degradation in Cellular IoT ServicesDimitar Minovski, Christer Åhlund, Karan Mitra, Irina Cotanis. 99-106 [doi]
- Opportunistic Routing and Synchronous Transmissions Meet TSCHOliver Harms, Olaf Landsiedel. 107-114 [doi]
- X-Sync: Cross-Technology Clock Synchronization Among Off-the-Shelf Wireless IoT DevicesRainer Hofmann, David Grubmair, Carlo Alberto Boano, Kay Römer. 115-122 [doi]
- Less Is More: Choosing Fair Network Coding ParametersStefanie Thieme, Bertram Schütz, Nils Aschenbruck. 123-131 [doi]
- Understanding MPTCP in Multi-WAN Routers: Measurements and System DesignKariem Fahmi, Douglas J. Leith, Stepán Kucera, Holger Claussen. 132-139 [doi]
- SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack TrafficMuriel Figueredo Franco, Jan von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues 0001, Eder J. Scheid, Lisandro Zambenedetti Granville, Burkhard Stiller. 140-147 [doi]
- Adaptive Warden Strategy for Countering Network Covert Storage ChannelsMehdi Chourib, Steffen Wendzel, Wojciech Mazurczyk. 148-153 [doi]
- Provisioning Differentiated QoS for NVMe over FabricsJoyanta Biswas, Jit Gupta, Krishna Kant 0001, Amitangshu Pal, Dave Minturn. 154-161 [doi]
- A Distributed Delivery Architecture for User Generated Content Live Streaming over HTTPFarzad Tashtarian, Abdelhak Bentaleb, Reza Farahani, Minh Nguyen, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann. 162-169 [doi]
- WhisperChord: Scalable and Secure Node Discovery for Overlay NetworksAndriy Panchenko 0001, Asya Mitseva, Sara Knabe. 170-177 [doi]
- Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness VerificationOscar G. Bautista, Kemal Akkaya, Soamar Homsi. 178-184 [doi]
- MonGNN: A neuroevolutionary-based solution for 5G network slices monitoringAnouar Rkhami, Yassine Hadjadj Aoul, Gerardo Rubino, Abdelkader Outtagarts. 185-192 [doi]
- Delay-Aware DNN Inference Throughput Maximization in Edge Computing via Jointly Exploring Partitioning and ParallelismJing Li, Weifa Liang, Yuchen Li, Zichuan Xu, Xiaohua Jia. 193-200 [doi]
- To Forward or Not to Forward: Optimal Message Scheduling in Mobile Opportunistic NetworksGourish Goudar, Suvadip Batabyal, Özgür Erçetin. 201-208 [doi]
- An Efficient Metric for Physical-layer Jammer Detection in Internet of Things NetworksMostafa Abdollahi, Kousar Malekinasab, Wanqing Tu, Mozafar Bag Mohammadi. 209-216 [doi]
- Multi-level Graph Attention Network based Unsupervised Network AlignmentYilin Xiao, Ruimin Hu, Dengshi Li, Junhang Wu, Yu Zhen, Lingfei Ren. 217-224 [doi]
- Iterative Soft Decoding of Single Parity Check Convolutional Concatenated CodeJunmei Chen, Hao Chen, Zongpeng Li. 225-232 [doi]
- Toward Driver Intention Prediction for Intelligent Vehicles: A Deep Learning ApproachMozhgan Nasr Azadani, Azzedine Boukerche. 233-240 [doi]
- A Formal Method for Evaluating the Performance of TSN Traffic Shapers using UPPAALWang Guo, Yanhong Huang, Jianqi Shi, Zhe Hou, Yang Yang. 241-248 [doi]
- Transfer Learning-Based Accelerated Deep Reinforcement Learning for 5G RAN SlicingAhmad M. Nagib, Hatem Abou-zeid, Hossam S. Hassanein. 249-256 [doi]
- Progressive Mesh-based HTTP Adaptive Augmented Reality Streaming SystemHyunmin Noh, Gi Seok Park, Hwangjun Song. 257-264 [doi]
- Anchor-oriented Time and Phase-based Concurrent Self-localization using UWB RadiosNour Smaoui, Milad Heydariaan, Omprakash Gnawali. 265-272 [doi]
- A Deep Reinforcement Learning Approach for Service Migration in MEC-enabled Vehicular NetworksAmine Abouaomar, Zoubeir Mlika, Abderrahime Filali, Soumaya Cherkaoui, Abdellatif Kobbane. 273-280 [doi]
- SPCAuth: Scalable and Privacy-Preserving Continuous Authentication for Web ApplicationsDavid Monschein, Oliver P. Waldhorst. 281-286 [doi]
- Protecting Software-Defined Enterprise Networks from Packet Injection AttacksTanvir Ishtaique ul Huque, Frank den Hartog. 287-292 [doi]
- Intelligent Cooperative Health Emergency Response System in Autonomous VehiclesHaya Elayan, Moayad Aloqaily, Haythem Bany Salameh, Mohsen Guizani. 293-298 [doi]
- Hierarchical Multi-Agent Deep Reinforcement Learning for SFC Placement on Multiple DomainsNassima Toumi, Miloud Bagaa, Adlen Ksentini. 299-304 [doi]
- Suitability of Graph Representation for BGP Anomaly DetectionKevin Hoarau, Pierre-Ugo Tournoux, Tahiry Razafindralambo. 305-310 [doi]
- Network Traffic Classification Method Supporting Unknown Protocol DetectionHongyu Liu, Bo Lang. 311-314 [doi]
- MPRdeep: Multi-Objective Joint Optimal Node Positioning and Resource Allocation for FANETs with Deep Reinforcement learningQi Wang, Jianmin Liu, Cunzhuang Liu, Jianhui Huang, Chentao He, Yongjun Xu. 315-318 [doi]
- A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain NetworkingJinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou 0002, Ikkyun Kim, Sang-Yoon Chang. 319-322 [doi]
- Virtual Framework for Development and Testing of Federation Software StackAnees Al-Najjar, Nageswara S. V. Rao, Neena Imam, Thomas J. Naughton, Seth Hitefield, Lawrence Sorrillo, James Kohl, Wael R. Elwasif, Jean-Christophe Bilheux, Hassina Z. Bilheux, Swen Boehm, Jason Kincl. 323-326 [doi]
- Recovering Colliding LoRa Frames from Uncertainties Using LoRa CodingWeixuan Xiao, Nancy El Rachkidy, Alexandre Guitton. 327-330 [doi]
- Designing the Interplay of Energy Plane and Communication Plane in the Energy Packet GridKlemens Schneider, Friedrich Wiegel, Dominik Schulz, Veit Hagenmeyer, Marc Hiller, Roland Bless, Martina Zitterbart. 331-334 [doi]
- Delta-State-Based Synchronization of CRDTs in Opportunistic NetworksFrédéric Guidec, Yves Mahéo, Camille Noûs. 335-338 [doi]
- Maintenance of Structural Hole Spanners in Dynamic NetworksDiksha Goel, Hong Shen 0001, Hui Tian, Mingyu Guo. 339-342 [doi]
- KDST: K-Anonymous Node Discovery Using Separation of TrustAli Kabeel, Amr ElMougy. 343-346 [doi]
- Deep Reinforcement Learning for Persistent Cruise Control in UAV-aided Data CollectionHarrison Kurunathan, Kai Li 0002, Wei Ni 0001, Eduardo Tovar, Falko Dressler. 347-350 [doi]
- Telemetron: Measuring Network Capacity Between Off-Path Remote HostsDevashish Gosain, Aishwarya Jaiswal, H. B. Acharya, Sambuddho Chakravarty. 351-354 [doi]
- Accelerating MPI Communication Using Floating-point Compression on Lossy Interconnection NetworksYao Hu, Michihiro Koibuchi. 355-358 [doi]
- An Incentive Approach in Mobile Crowdsensing for Perceptual UserLu Chen, Degan Zhang, Jie Zhang, Ting Zhang, Jinyu Du, Hong-rui Fan. 359-362 [doi]
- A Smartphone-Targeted Opportunistic Computing Environment for Decentralized Web ApplicationsLionel Touseau, Yves Mahéo, Camille Noûs. 363-366 [doi]
- LaFlector: a Privacy-preserving LiDAR-based Approach for Accurate Indoor TrackingBruno Rodrigues 0001, Lukas Müller, Eder J. Scheid, Muriel Figueredo Franco, Christian Killer, Burkhard Stiller. 367-370 [doi]
- Unifying LoRaWAN Networks by Enabling the Roaming CapabilityMohamed Hamnache, Rahim Kacimi, André-Luc Beylot. 371-374 [doi]
- Towards Generalizable Network Anomaly Detection ModelsMd. Arifuzzaman, Shafkat Islam, Engin Arslan. 375-378 [doi]
- On Quantifying the Complexity of IoT TrafficLisa Liu, Daryl Essam, Timothy Lynar. 379-382 [doi]
- Flow-Aware Low-Latency Multipath TunnellingRichard Sailer, Jörg Hähner. 383-386 [doi]
- A Minimal Delay Violation downlink LTE schedulerJeremy Van den Eynde, Chris Blondia. 387-390 [doi]
- A Comprehensive Evaluation of Different Approaches to Tunnelling over Multiple PathsRichard Sailer, Jörg Hähner. 391-394 [doi]
- A two-stage algorithm for the Virtual Network Embedding problemMassinissa Ait Aba, Maxime Elkael, Badii Jouaber, Hind Castel-Taleb, Andrea Araldo, David Olivier. 395-398 [doi]
- Group Communication with OSCORE: RESTful Multiparty Access to a Data-Centric Web of ThingsCenk Gündogan, Christian Amsüss, Thomas C. Schmidt, Matthias Wählisch. 399-402 [doi]
- Near-Optimal Opportunistic Spectrum Access in Cognitive Radio Networks in the 5G and IoT EraOmer Melih Gul. 403-406 [doi]
- A Vehicle Message Scheduling Scheme For Vehicle Trust ManagementQinwen Hu, Wanqing Tu. 407-410 [doi]
- Distributed Task Migration Optimization in MEC by Deep Reinforcement Learning StrategyYuya Cui, Degan Zhang, Jie Zhang, Ting Zhang, Lixiang Cao, Lu Chen. 411-414 [doi]
- Alternative Authentication with Smart Contracts for Online GamesMichal Boron, Anna Kobusinska. 415-418 [doi]
- A Multidimensional Trust Model for Vehicular Ad-Hoc NetworksMaryam Najafi, Lyes Khoukhi, Marc Lemercier. 419-422 [doi]
- Enabling Robust Wireless Communication for BMS on Electric VehiclesFabian A. Rincon Vija, Samuel Cregut, Georgios Z. Papadopoulos, Nicolas Montavont. 423-426 [doi]
- Graph Based Visualisation Techniques for Analysis of Blockchain TransactionsJeyakumar Samantha Tharani, Eugene Yougarajah Andrew Charles, Zhé Hóu, Marimuthu Palaniswami, Vallipuram Muthukkumarasamy. 427-430 [doi]
- Python-Based TinyIPFIX in Wireless Sensor NetworksEryk Schiller, Ramon Huber, Burkhard Stiller. 431-434 [doi]
- Prediction of Indoor Wireless Coverage from 3D Floor Plans Using Deep Convolutional Neural NetworksYaqoob Ansari, Nouha Tiyal, Eduardo Feo Flushing, Saquib Razak. 435-438 [doi]
- Understanding the Achieved Rate Multiplication Effect in FlowQueue-based AQM BottleneckJonathan Kua. 439-442 [doi]
- ICN PATTA: ICN Privacy Attack Through Traffic AnalysisEnkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk. 443-446 [doi]
- Enhancing Adaptive Frequency Hopping for Bluetooth Low EnergyJannis Mast, Thomas Hänel, Nils Aschenbruck. 447-454 [doi]
- QX-MAC: Improving QoS and Energy Performance of IoT-based WSNs using Q-LearningFarhana Afroz, Robin Braun. 455-462 [doi]
- DEMONS: Extended Manufacturer Usage Description to Restrain Malicious Smartphone AppsIna Berenice Fink, Martin Serror, Klaus Wehrle. 463-470 [doi]
- Characterizing Human Mobility Patterns During COVID-19 using Cellular Network DataNecati A. Ayan, Nilson Luís Damasceno, Sushil Chaskar, Peron R. de Sousa, Arti Ramesh, Anand Seetharam, Antônio Augusto de Aragão Rocha. 471-478 [doi]
- Mobility-aware COVID-19 Case Prediction using Cellular Network LogsNecati A. Ayan, Sushil Chaskar, Anand Seetharam, Arti Ramesh, Antônio Augusto de Aragão Rocha. 479-486 [doi]
- EADAS: Edge Assisted Adaptation Scheme for HTTP Adaptive StreamingJesús Aguilar Armijo, Christian Timmerer, Hermann Hellwagner. 487-494 [doi]
- Optimal Placement of Recurrent Service Chains on Distributed Edge-Cloud InfrastructuresAyeh Mahjoubi, Javid Taheri, Karl-Johan Grinnemo, ShuiGuang Deng. 495-502 [doi]
- On the Analysis of Adaptive-Rate Applications in Data-Centric Wireless Ad-Hoc NetworksMd Ashiqur Rahman, Beichuan Zhang. 503-510 [doi]
- Hop-By-Hop: Advancing Cooperative Congestion Control for Cyber-Physical SystemsMarkus Jung, Martina Zitterbart. 511-518 [doi]
- Toward a lightweight machine learning based solution against cyber-intrusions for IoTMawloud Omar, Laurent George 0001. 519-524 [doi]
- CSDN: CDN-Aware QoE Optimization in SDN-Assisted HTTP Adaptive Video StreamingReza Farahani, Farzad Tashtarian, Hadi Amirpour, Christian Timmerer, Mohammad Ghanbari 0001, Hermann Hellwagner. 525-532 [doi]
- CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RISAlvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman. 533-540 [doi]
- Quality Preserving Voice Stream Multicast over Mobile Low Power Wireless NetworksShneka Muthu Kumara Swamy, Qi Han. 541-548 [doi]
- Towards Dense and Scalable Soil Sensing Through Low-Cost WiFi Sensing NetworksSteven M. Hernandez, Deniz Erdag, Eyuphan Bulut. 549-556 [doi]
- Robust Authentication and Data Flow Integrity for P2P SCADA InfrastructuresAbel O. Gomez Rivera, Evan M. White, Deepak K. Tosh. 557-564 [doi]
- Application Agnostic Container Migration and FailoverMartin Terneborg, Johan Karlsson Rönnberg, Olov Schelén. 565-572 [doi]
- A Networked Social Virtual Reality Learning Environment Platform for Special EducationRoland Oruche, Vaibhav Akashe, Samaikya Valluripally, Aniket Gulhane, Prasad Calyam, Janine Stichter, Zhihai He. 573-580 [doi]
- DRo: A data-scarce mechanism to revolutionize the performance of DL-based Security SystemsMohit Sewak, Sanjay K. Sahay, Hemant Rathore. 581-588 [doi]
- CLEDGE: A Hybrid Cloud-Edge Computing Framework over Information Centric NetworkingMd Washik Al Azad, Susmit Shannigrahi, Nicholas Stergiou, Francisco R. Ortega, Spyridon Mastorakis. 589-596 [doi]
- Revenue Maximization Leveraging Elastic Service Provisioning in Flexible Optical NetworksCao Chen, Fen Zhou 0001, Shilin Xiao. 597-604 [doi]
- Improved Monte Carlo Tree Search for Virtual Network EmbeddingMaxime Elkael, Hind Castel-Taleb, Badii Jouaber, Andrea Araldo, Massinissa Ait Aba. 605-612 [doi]
- Low-Cost Search in Tree-Structured P2P Overlays: The Null-Balance BenefitPeter Detzner, Jana Gödeke, Steffen Bondorf. 613-620 [doi]
- Predictive Analytics Integrated Multi-level Optimization of Offshore Connectivity in Ocean NetworkSimi Surendran, Maneesha Vinodini Ramesh, Alberto Montresor. 621-628 [doi]
- Upper Bounds on Path Exposure in EH-WSNs with Variable Transmission RangesAbdulsalam Basabaa, Ehab S. Elmallah. 629-636 [doi]
- Breach Path Detection Reliability in Energy Harvesting Wireless Sensor NetworksSalwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah. 637-644 [doi]
- Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoTJunaid Haseeb, Masood Mansoori, Ian Welch. 645-648 [doi]
- Public Wireless Packets Anonymously Hurt YouAbhishek Kumar Mishra, Aline Carneiro Viana, Nadjib Achir, Catuscia Palamidessi. 649-652 [doi]
- Securing Software-Defined Vehicular Network Architecture against DDoS attackHouda Amari, Wassef Louati, Lyes Khoukhi, Lamia Hadrich Belguith. 653-656 [doi]