Abstract is missing.
- Beyond the Field of View: Neglected Audio Part in VR Video Transmission FrameworksLuyao Chen, Yong Tang, Siyang Chen, Jingwen Xia, Ting Yang, Wenyong Wang. 1-4 [doi]
- Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal VerificationXuejian Li, Mingguang Wang. 1-4 [doi]
- Multipath TCP Scheduling in the Age of Buffer Bloat OptimizationsDaniel Weber 0002, Christoph Fuchs 0003, Nils Auler, Bertram Schütz, Nils Aschenbruck. 1-8 [doi]
- Cellular network offloading through Drone CooperationGatien Roujanski, Michel Marot, Hossam Afifi, Adel Mounir Sareh Said. 1-4 [doi]
- Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVsAlvi Ataur Khalil, Mohammad Ashiqur Rahman. 1-9 [doi]
- Tree-IDS: An Incremental Intrusion Detection System for Connected VehiclesYuxin Zhao, Zixiang Bi, Guosheng Xu 0001, Chenyu Wang, Guoai Xu. 1-4 [doi]
- Lightweight quantum-safe cryptography in underwater scenariosJoanna Sliwa, Konrad S. Wrona, Tsvetelina Shabanska, Alim Solmaz. 1-6 [doi]
- A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime SectorJeroen Pijpker, Stephen James McCombie. 1-6 [doi]
- An Accuracy Study of Emulation Daemons for IEEE 802.11 NetworksJonas Andre, Stephan M. Günther, Georg Carle. 1-9 [doi]
- Towards Energy Efficiency in RAN Network SlicingHnin Pann Phyu, Diala Naboulsi, Razvan Stanica, Gwenael Poitau. 1-9 [doi]
- Coverage Analysis for Multi-Hop Communication in Intelligent-Surface-Assisted mmWave WLANsJingyuan Zhang, Douglas M. Blough. 1-9 [doi]
- Humidity Estimation Using WiFi Channel State InformationMichael Burke, Mohamed Younis 0001. 1-4 [doi]
- Electronic Attacks as a Cyber False Flag against Maritime Radars SystemsGiacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo. 1-6 [doi]
- HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy DevicesKatharina O. E. Müller, Louis Bienz, Bruno Rodrigues 0001, Chao Feng, Burkhard Stiller. 1-9 [doi]
- Meta-ATMoS+: A Meta-Reinforcement Learning Framework for Threat Mitigation in Software-Defined NetworksHauton Tsang, Mohammad A. Salahuddin 0001, Noura Limam, Raouf Boutaba. 1-9 [doi]
- Mobility-aware Service Function Chaining Orchestration for Multi-user Augmented RealityHugo Santos, Bruno Martins, Denis Rosário, Eduardo Cerqueira, Torsten Braun. 1-9 [doi]
- Energy Efficient Resource Allocation for D2D Communications using Reinforcement LearningRathindra Nath Dutta, Sasthi C. Ghosh 0001. 1-7 [doi]
- Non-optimal is Good! Resource Allocation in Presence of Dynamic Obstacles in D2D NetworksRathindra Nath Dutta, Sasthi C. Ghosh 0001. 1-7 [doi]
- Demo: A Reproducible Link Emulation Environment for the Evaluation of Network-Coded Video StreamingStefanie Thieme, Dominic Laniewski, Leonhard Brüggemann, Eric Lanfer, Bertram Schütz, Nils Aschenbruck. 1-3 [doi]
- Cyber Insurance in the Maritime Transportation SystemLogan Drazovich, Susanne Wetzel. 1-6 [doi]
- Demo: Agent-Based Crowdsensing Simulation for Urban Meteorological Data Collection and Hybrid Aerial-Terrestrial Route DeterminationJose A. Gonzalez Nuñez, Mustafa Ilhan Akbas. 1-4 [doi]
- FedForce: Network-adaptive Federated Learning for Reinforced Mobility PredictionNegar Emami, Antonio Di Maio, Torsten Braun. 1-9 [doi]
- Optimal Resource Placement in 5G/6G MEC for Connected Autonomous Vehicles Routes Powered by Deep Reinforcement LearningCarlos Ruiz De Mendoza, Cristina Cervelló-Pastor, Sebastià Sallent. 1-4 [doi]
- DarkHorse: A UDP-based Framework to Improve the Latency of Tor Onion ServicesMd Washik Al Azad, Hasniuj Zahan, Sifat Ut Taki, Spyridon Mastorakis. 1-6 [doi]
- A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic MapsAya Jaradat, Moad Mowafi, Eyad Taqieddin. 1-4 [doi]
- Trade-Off Between Compression and FEC in Image Transmission Over WifibroadcastNikolas Wintering, Jannis Mast, Thomas Hänel, Nils Aschenbruck. 1-9 [doi]
- Antifreeze: High-Quality Adaptive Live Streaming with Real-time TranscoderAsif Ali Mehmuda, Reza Hedayati Majdabadi, Mea Wang, Diwakar Krishnamurthy. 1-4 [doi]
- Demo: Modular Test Frameworks for PolyVerif Autonomous Vehicle Validation EnvironmentMustafa Ilhan Akbas, Mahesh Menase, Rahul Razdan. 1-4 [doi]
- Optimizing the Deployment of UAV for Mesh Access Network CoverageFatih Senel, Nils Aschenbruck. 1-9 [doi]
- Decision Tree-Based Confidentiality Self-Management in the Internet of ThingsAbdelhamid Garah, Nader Mbarek, Sergey Kirgizov. 1-4 [doi]
- Joint Source-and-Channel Coding for Small Satellite ApplicationsOlga Kondrateva, Stefan Dietzel, Björn Scheuermann 0001. 1-9 [doi]
- Field Trial for Enhanced V2X Multi-RAT Handover in Autonomous Vehicle NetworksLucas Bréhon-Grataloup, Rahim Kacimi, André-Luc Beylot. 1-8 [doi]
- On Priority-Based Scheduling for Network Updates in SDNArshiya Rezaie Hezaveh, Mehdi Nobakht. 1-4 [doi]
- Green Segment Routing for Improved Sustainability of Backbone NetworksDaniel Otten, Alexander Brundiers, Timmy Schüller, Nils Aschenbruck. 1-9 [doi]
- Diversity Maximized Scheduling in RoadSide Units for Traffic Monitoring ApplicationsAhmad Sarlak, Abolfazl Razi, Xiwen Chen, Rahul Amin. 1-4 [doi]
- Fault-adaptive Scheduling for Data Acquisition NetworksEloise Stein, Quentin Bramas, Tommaso Colombo, Cristel Pelsser. 1-4 [doi]
- From C-Band to mmWave-Band: Ray-Tracing-Assisted 5G-Based Indoor Positioning in Industrial ScenarioKarthik Muthineni, Alexander Artemenko. 1-7 [doi]
- Affective Communication of Sensorimotor Emotion Synthesis over URLLCIbrahim M. Amer, Sharief M. A. Oteafy, Hossam S. Hassanein. 1-4 [doi]
- Green Traffic Engineering by Line Card MinimizationDaniel Otten, Max Ilsen, Markus Chimani, Nils Aschenbruck. 1-8 [doi]
- Characterizing Changes in Self-Similarity Between Edge and Core Network TrafficBryan Martin, Chad A. Bollmann. 1-4 [doi]
- Demo: Chat based Emergency Service via Long Range Wireless Communication (LoRa)Alisa Stiballe, Simon Welzel, Johannes Dorfschmidt, Darvin Schluter, Dominik Delgado Steuter, Jannik Lukas Hense, Florian Klingler. 1-3 [doi]
- Combining Midpoint Optimization and Conventional End-to-End Segment Routing for Traffic EngineeringAlexander Brundiers, Timmy Schüller, Nils Aschenbruck. 1-9 [doi]
- Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANsGiulio Meucci, Bertan Karahoda, Amir Hosein Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli Forti. 1-6 [doi]
- Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial ProtocolsEric Wagner 0003, Nils Rothaug, Konrad Wolsing, Lennart Bader, Klaus Wehrle, Martin Henze. 1-9 [doi]
- Lessons Learned from Teaching a Maritime Industrial Control Systems Cybersecurity CourseBrien Croteau. 1-6 [doi]
- SyNIG: Synthetic Network Traffic Generation through Time Series ImagingNirhoshan Sivaroopan, Chamara Madarasingha, Shashika Muramudalige, Guillaume Jourjon, Anura P. Jayasumana, Kanchana Thilakarathna. 1-9 [doi]
- Effective Resource Allocation and Pricing Mechanism for MEC under Two-Price EquilibriumYing Li, Junwu Zhu, Xu Liu. 1-9 [doi]
- SEARCH: Robust TCP Slow Start Performance over Satellite NetworksMaryam Ataei Kachooei, Jae Chung, Feng Li, Benjamin Peters, Mark Claypool. 1-4 [doi]
- Secure Plaintext Acquisition of Homomorphically Encrypted Results for Remote ProcessingPia Baumstark, David Monschein, Oliver P. Waldhorst. 1-4 [doi]
- Demo: Software-Based Design of Data Center Networking InfrastructureTyler Kvochick, Julia Byon, Mike Candler, Kendra Lockard, Eli Phillips, Tommy Schaefer, Alex Serriere, Sana Moghul, Casey Wittkop, Marc Wolfe. 1-4 [doi]
- EGAN: Evolutional GAN for Ransomware EvasionDaniel Commey, Benjamin Appiah, Bill K. Frimpong, Isaac Osei, Ebenezer N. A. Hammond, Garth V. Crosby. 1-9 [doi]
- Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoderWei Wan, Ke Wang, Jinxia Wei, Liangyi Gong, Pan Huang, Hao Fu, Yuhao Fu. 1-4 [doi]
- Demo: Remote Heart Assessment using Deep Learning over IoT PhonocardiogramsSara Yavari, Sharief Oteafy. 1-4 [doi]
- Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless NetworksArtur Sterz, Robin Klose, Markus Sommer, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein 0002, Matthias Hollick, Bernd Freisleben. 1-4 [doi]
- Improving Bitswap Privacy with Forwarding and Source ObfuscationErik Daniel, Marcel Ebert, Florian Tschorsch. 1-4 [doi]
- The Virtual Test Bed for EON FPGA Controllers based on UVM Mechanisms and ToolsMarek Michalski. 1-4 [doi]
- Towards Automatic Annotation and Detection of Fake NewsMohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma, Rahat Masood, Muhammad Ikram 0001, Salil S. Kanhere. 1-9 [doi]
- Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-BedMohammed Nasereddin, Mert Nakip, Erol Gelenbe. 1-4 [doi]
- The ACK Policy Optimization Algorithm for QUICEkaterina Volodina, Erwin P. Rathgeb. 1-8 [doi]
- AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data CollectionAmirahmad Chapnevis, Eyuphan Bulut. 1-6 [doi]
- QRadar: A Deployable Quantum Euclidean Similarity Large-scale Localization SystemAhmed Shokry, Moustafa Youssef 0001. 1-8 [doi]
- Sustainable Cooperation in Peer-To-Peer NetworksBulat Nasrulin, Rowdy Chotkan, Johan Pouwelse. 1-9 [doi]
- RPM: Reverse Path Congestion Marking on P4 Programmable SwitchesNehal Baganal Krishna, Tuan-Dat Tran, Ralf Kundel, Amr Rizk. 1-4 [doi]
- Constrained Dynamic Virtual Network EmbeddingJunkai He, Makhlouf Hadji, Djamal Zeghlache. 1-6 [doi]
- UAV Swarms for Joint Data Ferrying and Dynamic Cell Coverage via Optimal Transport Descent and Quadratic AssignmentKai Cui 0001, Lars Baumgärtner, Mustafa Burak Yilmaz, Mengguang Li, Christian Fabian, Benjamin Becker, Lin Xiang, Maximilian Bauer, Heinz Koeppl. 1-8 [doi]
- Penetrating the Silence: Data Exfiltration in Maritime and Underwater ScenariosAlessandro Cantelli Forti, Michele Colajanni, Silvio Russo. 1-6 [doi]
- IVAS: An Intelligent Video Analysis System based on Edge ComputingHuapeng Yang, Zhangqin Huang, Yu Liang, Xiaobo Zhang, Ling Huang, Shen Qiu. 1-4 [doi]
- QUIC(k) Enough in the Long Run? Sustained Throughput Performance of QUIC ImplementationsMichael König, Oliver P. Waldhorst, Martina Zitterbart. 1-4 [doi]
- Autonomic Cyber Security Enhanced with Survival Analysis (ACSeSA)Taylor Bradley, Lanier Watkins, Elie Alhajjar. 1-9 [doi]
- Leveraging Explainable AI Methods Towards Identifying Classification Issues on IDS DatasetsEric Lanfer, Sophia Sylvester, Nils Aschenbruck, Martin Atzmueller. 1-4 [doi]
- msTEACUP - Running Repeatable Experiments with MPTCP over Complex Network TopologiesFarinaz Jowkarishasaltaneh, Jason But. 1-4 [doi]
- On the Limits of Lossy Compression for Human Activity Recognition in Sensor NetworksJonas Schulz, Hristina Radak, Phuong T. Nguyen 0001, Giang T. Nguyen 0002, Frank H. P. Fitzek. 1-4 [doi]
- Enhancing Encrypted Traffic Classification with Deep Adaptation NetworksCuong Dao, Van Tong, Nam-Thang Hoang, Hai Anh Tran, Truong X. Tran. 1-4 [doi]
- Detecting DoH-Based Data Exfiltration: FluBot Malware Case StudyRoman Rader, Kamil Jerábek, Ondrej Rysavý. 1-4 [doi]
- XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater VehiclesKonrad Wolsing, Antoine Saillard, Elmar Padilla, Jan Bauer. 1-6 [doi]
- Design and Implementation of a Gateway Buoy for the Underwater-IoTGunnar Schneider, Michael Goetz, Ivor Nissen. 1-6 [doi]
- Cyberbullying Messages Detection: A Comparative Study of Machine Learning AlgorithmsPhilippe Ea, Paul Vidart, Osman Salem, Ahmed Mehaoua. 1-4 [doi]
- A Heuristic Approach for Scalable Quantum Repeater Deployment ModelingTasdiqul Islam, Engin Arslan. 1-9 [doi]
- Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPCRichard Hernandez, Oscar G. Bautista, Mohammad Hossein Manshaei, Abdulhadi Sahin, Kemal Akkaya. 1-4 [doi]
- Demo: Leveraging Edge Intelligence for Affective Communication over URLLCIbrahim M. Amer, Sarah Adel Bargal, Sharief M. A. Oteafy, Hossam S. Hassanein. 1-4 [doi]
- Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) ProtocolMatthias Frank 0001, Spartak Ehrlich. 1-3 [doi]