Abstract is missing.
- MicroTL: Transfer Learning on Low-Power IoT DevicesChristos Profentzas, Magnus Almgren, Olaf Landsiedel. 1-8 [doi]
- Eliminating Routing Loops and Oscillations in BGP Using Total OrderingJ. J. Garcia-Luna-Aceves. 9-17 [doi]
- A Quantum Algorithm for RF-based Fingerprinting Localization SystemsAhmed Shokry, Moustafa Youssef 0001. 18-25 [doi]
- Prediction-based SFC Placement with VNF Sharing at the EdgeAmir Mohamad, Hossam S. Hassanein. 26-33 [doi]
- A Robust Monte-Carlo-Based Deep Learning Strategy for Virtual Network EmbeddingGhina Dandachi, Anouar Rkhami, Yassine Hadjadj Aoul, Abdelkader Outtagarts. 34-41 [doi]
- Enhanced IoT Batteryless D2D Communications Using Reconfigurable Intelligent SurfacesShakil Ahmed, Mohamed Y. Selim, Ahmed E. Kamal 0001. 42-47 [doi]
- Robust Intra-Slice Migration in Fog ComputingAtefeh Talebian, Alvin C. Valera, Jyoti Sahni, Winston K. G. Seah. 48-55 [doi]
- Deep Sequence Models for Packet Stream Analysis and Early DecisionsMinji Kim, Dongeun Lee 0001, Kookjin Lee, Doowon Kim, Sangman Lee, Jinoh Kim. 56-63 [doi]
- Improving Proximity Classification for Contact Tracing using a Multi-channel ApproachEric Lanfer, Thomas Hänel, Roland van Rijswijk-Deij, Nils Aschenbruck. 64-72 [doi]
- Cross-Regional Friendship Inference via Category-Aware Multi-Bipartite Graph EmbeddingLinfei Ren, Ruimin Hu, Dengshi Li, Junhang Wu, Yilong Zang, Wenyi Hu. 73-80 [doi]
- Efficient Mobile Computation Offloading over a Finite-State Markovian Channel using Spectral State AggregationPeyvand Teymoori, Azzedine Boukerche, Feng Liang. 81-89 [doi]
- HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network TrafficSamuel Kopmann, Hauke Heseding, Martina Zitterbart. 90-97 [doi]
- VeNiCE: Enabling Automatic VNF Management based on Smart Contract EventsEder J. Scheid, Muriel Figueredo Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, Burkhard Stiller. 98-105 [doi]
- ReCEIF: Reinforcement Learning-Controlled Effective Ingress FilteringHauke Heseding, Martina Zitterbart. 106-113 [doi]
- Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and DatasetKonrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner 0003, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, Martin Henze. 114-122 [doi]
- Secure Service Function Chaining in the Context of Zero Trust SecurityLeonard Bradatsch, Marco Häberle, Benjamin Steinert, Frank Kargl, Michael Menth. 123-131 [doi]
- Inline Traffic Analysis Attacks on DNS over HTTPSThilini Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne. 132-139 [doi]
- Identify IoT Devices from Backbone Networks Using Lightweight Neural NetworksHua Wu 0004, Xingmeng Fan, Guang Cheng 0001, Xiaoyan Hu. 140-148 [doi]
- Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid SystemsZakaria Abou El Houda, Bouziane Brik, Lyes Khoukhi. 149-156 [doi]
- Incentive-based Resource Allocation for Mobile Edge LearningMhd Saria Allahham, Amr Mohamed 0001, Hossam Hassanein. 157-164 [doi]
- DisruptaBLE: Opportunistic BLE NetworkingPatrick Rathje, Olaf Landsiedel. 165-172 [doi]
- Task Replication in Unreliable Edge NetworksIbrahim M. Amer, Sharief M. A. Oteafy, Hossam S. Hassanein. 173-180 [doi]
- An Application-Specific Power Consumption Optimization for Wearable Electrocardiogram DevicesAhmed Badr, Abdulmonem M. Rashwan, Khalid Elgazzar. 181-188 [doi]
- Quantifying the Quality Attenuation of WiFiBjørn Ivar Teigen, Neil Davies, Kai Olav Ellefsen, Tor Skeie, Jim Torresen. 189-197 [doi]
- Encrypted Traffic Detection: Beyond the Port Number EraHossein Doroud, Ahmad Alaswad, Falko Dressler. 198-204 [doi]
- Network-Efficient Pipelining-Based Secure Multiparty Computation for Machine Learning ApplicationsOscar G. Bautista, Kemal Akkaya. 205-213 [doi]
- Quantifying Direct Link Establishment Delay Between Android DevicesTomás Lagos Jenschke, Marcelo Dias de Amorim, Serge Fdida. 214-219 [doi]
- A Novel Frame Forwarding Algorithm for Switched NetworksPeter Willis 0003, Nirmala Shenoy, Yin Pan, John F. Hamilton. 220-226 [doi]
- Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular networkRoy-Chowdhury, Sukumar Nandi, Diganta Goswami. 227-232 [doi]
- Reliable Water-Air Direct Wireless Communication: Kalman Filter-Assisted Deep Reinforcement Learning ApproachJinglong Wang, Hanjiang Luo, Rukhsana Ruby, Jiangang Liu, Kai Guo, Kaishun Wu. 233-238 [doi]
- Microservices Configurations and the Impact on the Performance in Cloud Native EnvironmentsMohamed Mekki, Nassima Toumi, Adlen Ksentini. 239-244 [doi]
- A Live Demonstration of In-Band Telemetry in OSM-Orchestrated Core NetworksThomas Dreibholz, Mah-Rukh Fida, Azza H. Ahmed, Andrés F. Ocampo, Foivos Michelinakis. 245-247 [doi]
- Dynamic Ad Substitution in Hybrid Broadband Broadcast EnvironmentsRobert Seeliger, Louay Bassbouss. 248-250 [doi]
- Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT SecurityTill Zimmermann, Eric Lanfer, Nils Aschenbruck. 251-253 [doi]
- A Framework for Flexible ILDA Digital Network (IDN) Audio StreamingMatthias Frank. 254-257 [doi]
- Indoor UWB localisation: LocURa4IoT testbed and dataset presentationQuentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val. 258-260 [doi]
- Vehicle Update Management in Software Defined VehiclesStefan Aust. 261-263 [doi]
- ForestEdge: Unobtrusive Mechanism Interception in Environmental MonitoringPatrick Lampe, Markus Sommer, Artur Sterz, Jonas Höchst, Christian Uhl, Bernd Freisleben. 264-266 [doi]
- Research on the derivation of AS hidden links and the Discovery of Critical ASJiangbin Chen, Yujing Liu, Shuhui Chen, Xiangquan Shi. 267-270 [doi]
- Mobility-Focused Joining in TSCH NetworksOliver Nielsen, Lucas Koefoed Schnügger, Charalampos Orfanidis, Xenofon Fafoutis. 271-274 [doi]
- Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis RevisitedAakash Soni 0001, Jean-Luc Scharbarg. 275-278 [doi]
- Service-Based Identification of Highly Coupled Mobile ApplicationsHua Wu 0004, Rui Wang, Guang Cheng 0001, Xiaoyan Hu. 279-282 [doi]
- Reputation-Based Data Carrying for Web3 NetworksQuinten Stokkink, Can Umut Ileri, Johan Pouwelse. 283-286 [doi]
- How to build socio-organizational information from remote IP addresses to enrich security analysis?Camille Moriot, François Lesueur, Nicolas Stouls, Fabrice Valois. 287-290 [doi]
- Accurate Real-Time Labeling of Application TrafficSebastian Schäfer, Alexander Löbel, Ulrike Meyer. 291-294 [doi]
- Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is?Zhejiayu Ma, Soufiane Rouibia, Frédéric Giroire, Guillaume Urvoy-Keller. 295-298 [doi]
- Blockchain-Based Decentralized Authentication for Information-Centric 5G NetworksMuhammad Hassan, Davide Pesavento, Lotfi Benmohamed. 299-302 [doi]
- Unobtrusive Mechanism InterceptionPatrick Lampe, Markus Sommer, Artur Sterz, Jonas Höchst, Christian Uhl, Bernd Freisleben. 303-306 [doi]
- IoT-Cache: Caching Transient Data at the IoT EdgeSurabhi Sharma, Sateesh Kumar Peddoju. 307-310 [doi]
- AlcFier: Adaptive Self-Learning Classifier for Routing in Vehicular Ad-Hoc NetworkAnkur Nahar, Himani Sikarwar, Debasis Das 0001. 311-314 [doi]
- AI-aided Hidden Camera Detection and Localization based on Raw IoT Network TrafficJihyeon Lee, Sangwon Seo, Taehun Yang, Soochang Park. 315-318 [doi]
- ICN With DHT Support in Mobile NetworksEryk Schiller, Timo Surbeck, Mikael Gasparyan, Burkhard Stiller, Torsten Braun. 319-322 [doi]
- Adaptive Edge Content Delivery Networks for Web-Scale File SystemsJoão Tiago, David Dias, Luís Veiga. 323-326 [doi]
- SmartPubSub: Content-based Pub-Sub on IPFSPedro Agostinho, David Dias, Luís Veiga. 327-330 [doi]
- Towards Job Completion Time in Vehicular Cloud by Overcoming Resource VolatilityChinh Tran, Mustafa Mehmet-Ali. 331-334 [doi]
- A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using BlockchainAkanksha Dixit, Max Smith-Creasey, Muttukrishnan Rajarajan. 335-338 [doi]
- Delay-sensitive Task offloading combined with Bandwidth Allocation in Multi-access Edge ComputingShudian Song, Shuyue Ma, Xiumin Zhu, Yumei Li 0008, Feng Yang, Linbo Zhai. 339-342 [doi]
- A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated LearningZakaria Abou El Houda, Lyes Khoukhi, Bouziane Brik. 343-346 [doi]
- Auto-Tune: Efficient Autonomous Routing for Payment Channel NetworksHsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou 0002. 347-350 [doi]
- Robust Deep Reinforcement Learning Algorithm for VNF-FG EmbeddingAbdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj Aoul. 351-354 [doi]
- Evaluation Metrics for Overlapping Community DetectionSafa El Ayeb, Baptiste Hemery, Fabrice Jeanne, Estelle Cherrier, Christophe Charrier. 355-358 [doi]
- Limited Size Lossy Compression for WSNsSanku Kumar Roy, Ioanis Nikolaidis. 359-362 [doi]
- Vehicle-to-Vehicle Charging Coordination over Information Centric NetworkingRobert Thompson, Muhammad Ismail, Susmit Shannigrahi. 363-366 [doi]
- Safe, Fast, and Cycle-Free Multi-Path Routing Using VouchersJ. J. Garcia-Luna-Aceves. 367-370 [doi]
- Few-Shot Open-Set Traffic Classification Based on Self-Supervised LearningJi Li 0004, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu. 371-374 [doi]
- Accurate-ECN: An ECN Enhancement with Inband Network TelemetryJiayi Liu, Shan Lu, Qinghai Yang. 375-378 [doi]
- Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic SolutionManuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez. 379-382 [doi]
- e-CLDC: Efficient Cross-Layer protocol for Data Collection in WBAN for remote patient monitoringYoumna Nasser, Wafa Badreddine. 383-386 [doi]
- Raising the AWAREness of BFT Protocols for Soaring Network DelaysMartin Nischwitz, Marko Esche, Florian Tschorsch. 387-390 [doi]
- Paving the Way for Massive Public Sensing as a ServiceAbdelrahman Elewah, Walid M. Ibrahim, Khalid Elgazzar. 391-394 [doi]
- Robust Packet Classification with Field MissingJiayao Wang, Ziling Wei, Baosheng Wang, BaoKang Zhao, Jincheng Zhong. 395-398 [doi]
- Securing MPTCP Connections: A Solution for Distributed NIDS EnvironmentsJoão Pedro Meira, Rui Pedro C. Monteiro, João Marco C. Silva. 399-402 [doi]
- Reliability-Aware and Delay-Constrained Service Function Chain Orchestration in Multi-Data-Center NetworksShunliang Zhang, Xiang Wang, Jing Li. 403-406 [doi]
- An agent-based approach to disintegrate and modularise Software Defined Networks controllerVijaya Durga Chemalamarri, Mehran Abolhasan, Robin Braun. 407-413 [doi]
- Distributed Attestation Revocation in Self-Sovereign IdentityRowdy Chotkan, Jérémie Decouchant, Johan Pouwelse. 414-421 [doi]
- Optimizing Virtual Network Function Splitting in Open-RAN EnvironmentsEsmaeil Amiri, Ning Wang 0001, Mohammad Shojafar, Rahim Tafazolli. 422-429 [doi]
- A Knapsack-based Optimization Algorithm for VNF Placement and Chaining ProblemAbdeldjalil Ikhelef, Mohand Yazid Saidi, Shuopeng Li, Ken Chen. 430-437 [doi]
- Performance Improvements in Cooperative Downloading: Encoding and Strategies for Heterogeneous Vehicular NetworksMichael Niebisch, Daniel Pfaller, Reinhard German, Anatoli Djanatliev. 438-446 [doi]
- Peer Discovery in Tree-Structured P2P Overlay Networks by Means of Connected Dominating SetsPeter Detzner, Jana Gödeke, Steffen Bondorf. 447-454 [doi]
- SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment RoutingBaosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou. 455-462 [doi]
- Prediction and detection model for hierarchical Software-Defined Vehicular NetworkHouda Amari, Lyes Khoukhi, Lamia Hadrich Belguith. 463-470 [doi]
- On Slicing Weighted Energy-Harvesting Wireless Sensing Networks with Transmission Range UncertaintySalwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah. 471-478 [doi]
- The ClusterDuck Protocol put to the test: Evaluating and Enhancing a Communication Network for Disaster ManagementLennart Buhl. 479-482 [doi]