Abstract is missing.
- In-Network Applications: Beyond Single Switch PipelinesXin Zhe Khooi, Levente Csikor, Jialin Li, Dinil Mon Divakaran. 1-8 [doi]
- Sketchy With a Chance of Adoption: Can Sketch-Based Telemetry Be Ready for Prime Time?Zaoxing Liu, Hun Namkung, Anup Agarwal, Antonis Manousis, Peter Steenkiste, Srinivasan Seshan, Vyas Sekar. 9-16 [doi]
- Implementation of an Intent Layer for SDN-enabled and QoS-Aware Network SlicingMolka Gharbaoui, Barbara Martini, Piero Castoldi. 17-23 [doi]
- Intent-based Networking Approach for Service Route and QoS control on KOREN SDITalha Ahmed Khan, Muhammad Afaq, Waleed Akbar, Asif Mehmood, Adeel Rafiq, Wang-Cheol Song. 24-30 [doi]
- To All Intents and Purposes: Towards Flexible Intent ExpressionMehdi Bezahaf, Eleanor Davies, Charalampos Rotsos, Nicholas J. P. Race. 31-37 [doi]
- Tenant-Oriented Resource optimization for Cloud Network Slicing with Performance GuaranteesLucian Beraldo, Angelos Pentelas, Fábio Luciano Verdi, Panagiotis Papadimitriou 0001, Cesar Augusto Cavalheiro Marcondes. 38-44 [doi]
- Automated and Optimized Embedding of Virtual Networks and Network SlicesPedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda. 45-51 [doi]
- Design and Manufacture of Narrow-Band BPF for Local 5G Network SlicingAerman Tuerxun, Ping Du, Junji Yumoto, Akihiro Nakao. 52-55 [doi]
- Dynamic Slice Scaling Mechanisms for 5G Multi-domain EnvironmentsDavid Breitgand, Alexios Lekidis, Rasoul Behravesh, Avi Weit, Pietro Giardina, Vasileios Theodorou, Cristina E. Costa, Katherine Barabash. 56-62 [doi]
- Defining a management function based architecture for 5G network slicingKostis Trantzas, Christos Tranoris, Spyros G. Denazis. 63-69 [doi]
- Towards Understanding the Performance of Traffic Policing in Programmable Hardware SwitchesNemanja Ðeric, Amir Varasteh, Amaury Van Bemten, Carmen Mas Machuca, Wolfgang Kellerer. 70-78 [doi]
- Revisiting Heavy-Hitter Detection on Commodity Programmable SwitchesXin Zhe Khooi, Levente Csikor, Jialin Li, Min-Suk Kang, Dinil Mon Divakaran. 79-87 [doi]
- Memory Network Architecture for Packet Processing in Functions VirtualizationTomohiro Korikawa, Eiji Oki. 88-96 [doi]
- FestNet: A Flexible and Efficient Sliced Transport NetworkHao Jiang, Nakjung Choi, Marina Thottan, Jacobus E. van der Merwe. 97-105 [doi]
- Physical Wireless Resource Virtualization for Software-Defined Whole-Stack SlicingMatthias Sander Frigau, Tianyi Zhang, Hongwei Zhang 0001, Ahmed E. Kamal 0001, Arun K. Somani. 106-114 [doi]
- Elastic Slicing in Programmable NetworksBelma Turkovic, Sjors Nijhuis, Fernando A. Kuipers. 115-123 [doi]
- GRU and EdgeQ-Learning based Traffic Prediction and Scaling of SFCSuman Pandey, James Won-Ki Hong, Jae-Hyoung Yoo. 124-132 [doi]
- OctoMap: Supporting Service Function Chaining via Supervised Learning and Online Contextual BanditAziza Alzadjali, Maria Mushtaq, Flavio Esposito, Claudio Fiandrino, Jitender S. Deogun. 133-141 [doi]
- Machine Learning-Based Auto-Scaler for Video Conferencing SystemsPetra Gabriela, Doyoung Lee, Nguyen Van Tu, James Won-Ki Hong. 142-150 [doi]
- Reinforcement Learning based Load Balancing for Data Center NetworksJiyoon Lim, Jae-Hyoung Yoo, James Won-Ki Hong. 151-155 [doi]
- Flow-based Service Type Identification using Deep LearningMona Elsaadawy, Petar Basta, Yunjia Zheng, Bettina Kemme, Mohamed Younis. 156-160 [doi]
- A Distributed Consensus Protocol for Sustainable Federated LearningHaneen Alfauri, Flavio Esposito. 161-165 [doi]
- Policy Gradient-based Deep Reinforcement Learning for Deadline-aware Transfer over Wide Area NetworksKohei Shiomoto, Takashi Kurimoto. 166-170 [doi]
- LiONv2: An Experimental Network Construction Tool Considering Disaggregation of Network Configuration and Device ConfigurationYuki Nagai, Hiroki Watanabe, Takao Kondo, Fumio Teraoka. 171-175 [doi]
- Adaptive and Application-agnostic Caching in Service Meshes for Resilient Cloud ApplicationsLars Larsson, William Tärneberg, Cristian Klein, Maria Kihl, Erik Elmroth. 176-180 [doi]
- SDN Intent-based conformance checking: application to security policiesNicolas Herbaut, Camilo Correa, Jacques Robin, Raúl Mazo. 181-185 [doi]
- Deep Q-Learning for Job Offloading Orchestration in a Fleet of MEC UAVs in 5G EnvironmentsChristian Grasso, Raoul Raftopoulos, Giovanni Schembra. 186-190 [doi]
- In-network Solution for Network Traffic Reduction in Industrial Data CommunicationCsaba Györgyi, Károly Kecskeméti, Péter Vörös, Géza Szabó, Sándor Laki. 191-195 [doi]
- Managing Video Processing and Delivery using Big Packet Protocol with SDN ControllersStuart Clayman, Mustafa Tuker, Halil Arasan, Müge Sayit. 196-200 [doi]
- On Slice Isolation Options in the Transport Network and Associated Feasibility IndicatorsLuis M. Contreras, Jose Ordonez-Lucena. 201-205 [doi]
- Adaptive Batching for Fast Packet Processing in Software Routers using Machine LearningPeter Okelmann, Leonardo Linguaglossa, Fabien Geyer, Paul Emmerich, Georg Carle. 206-210 [doi]
- Alviu: An Intent-Based SD-WAN Orchestrator of Network Slices for Enterprise NetworksRamon Perez, Aitor Zabala, Albert Banchs. 211-215 [doi]
- P4QoS: QoS-based Packet Processing with P4Belma Turkovic, Soovam Biswal, Abhishek Vijay, Antonia Hüfner, Fernando A. Kuipers. 216-220 [doi]
- Providing Telco-oriented Network Services with eBPF: the Case for a 5G Mobile GatewayFederico Parola, Fulvio Risso, Sebastiano Miano. 221-225 [doi]
- Failure Handling for Time-Sensitive Networks using SDN and Source RoutingGagan Nandha Kumar, Kostas Katsalis, Panagiotis Papadimitriou 0001, Paul Pop, Georg Carle. 226-234 [doi]
- Providing In-network Support to Coflow SchedulingCristian Hetnandez Benet, Andreas Kassler, Gianni Antichi, Theophilus A. Benson, Gergely Pongrácz. 235-243 [doi]
- SafeLib: a practical library for outsourcing stateful network functions securelyEnio Marku, Gergely Biczók, Colin Boyd. 244-252 [doi]
- Blockchain-based Secure Coordination for Distributed SDN Control PlaneWenjun Fan, Sang-Yoon Chang, Shubham Kumar, Xiaobo Zhou 0002, Younghee Park. 253-257 [doi]
- Modeling Control Traffic in Software-Defined NetworksJesse Chen, Ananya Gopal, Behnam Dezfouli. 258-262 [doi]
- NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFVMustafa Soylu, Luis Guillen, Satoru Izumi, Toru Abe, Takuo Suganuma. 263-267 [doi]
- Mitigating Evasion Attacks on Machine Learning based NIDS Systems in SDNAparna Ganesan, Kamil Saraç. 268-272 [doi]
- Software Enabled Security Architecture and Mechanisms for Securing 5G Network ServicesVijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar. 273-277 [doi]
- Design and Implementation of ICN-Based Elastic Function Offloading Network for SFCYusaku Hayamizu, Kazuhisa Matsuzono, Takahiro Hirayama, Hitoshi Asaeda. 278-282 [doi]
- Leveraging Heterogeneous NFV Platforms to Upgrade Service Function Chains in DCNsYuhan Xue, Zuqing Zhu. 283-287 [doi]
- DiffPerf: An In-Network Performance Optimization for Improving User-Perceived QoEWalid A. Y. Aljoby, Xin Wang 0040, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma. 288-292 [doi]
- Leveraging In-Network Computing and Programmable Switches for Streaming Analysis of Scientific DataGanesh C. Sankaran, Joaquín Chung, Raj Kettimuthu. 293-297 [doi]
- Embedded vs. External Controllers in Software-Defined IoT NetworksMiheer Kulkarni, Michael Baddeley, Israat Haque. 298-302 [doi]
- SoftTap: A Software-Defined TAP via Switch-Based Traffic MirroringSogand SadrHaghighi, Mahdi Dolati, Majid Ghaderi, Ahmad Khonsari. 303-311 [doi]
- Mind the Semantic Gap: Policy Intent Inference from Network MetadataAnu Mercian, Faraz Ahmed, Puneet Sharma, Shaun Wackerly, Charles Clark. 312-320 [doi]
- Strengthening SDN Security: Protocol Dialecting and Downgrade AttacksMichael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie. 321-329 [doi]
- On the cloudification of Metropolitan Area Networks: impact on cost and energy consumptionJosé Alberto Hernández 0001, Marco Quagliotti, Laura Serra. 330-338 [doi]
- Robust Virtual Network Function Deployment against Uncertain Traffic Arrival RatesFujun He, Eiji Oki. 339-347 [doi]
- Efficiency Gains due to Network Function Sharing in CDN-as-a-Service Slicing ScenariosLuis M. Contreras, Alberto Solano, Francisco Cano, Jesús Folgueira. 348-356 [doi]
- CloudTrace Demo: Tracing Cloud Network DelayGiuseppe Di Lena, Frédéric Giroire, Thierry Turletti, Chidung Lac. 357-359 [doi]
- Implementation of Backup Resource Management Controller for Reliable Function Allocation in KubernetesMengfei Zhu, Rui Kang, Fujun He, Eiji Oki. 360-362 [doi]
- Live Demonstration of a Highly Scalable Fog Service OrchestratorTom Goethals, Filip De Turck, Bruno Volckaert. 363-365 [doi]
- Slice Isolation for 5G Transport NetworksChia-Yu Chang, Manuel A. Jiménez, Molka Gharbaoui, Javier Sacido, Fabio Ubaldi, Chrysa Papagianni, Aitor Zabala, Luca Valcarenghi, Davide Scano, Konstantin Tomakh, Alessio Giorgetti, Andrea Boddi, Koen De Schepper. 366-368 [doi]
- Open and Programmable 5G Network-in-a-Box: Technology Demonstration and Evaluation ResultsAdnan Aijaz, Ben Holden, Fanyu Meng. 369-371 [doi]
- Blockchain-based Secure Aggregation for Federated Learning with a Traffic Prediction Use CaseQiong Zhang, Paparao Palacharla, Motoyoshi Sekiya, Junichi Suga, Toru Katagiri. 372-374 [doi]
- Survivable Service Function Chain Mapping in NFV-Enabled 5G NetworksYue Hu, Yongan Guo. 375-380 [doi]
- Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous NetworksZhe Han, Bin Wang, Hai-tao Zhao, Yue Chen. 381-387 [doi]
- Service Function Chaining in Wildfire ScenariosBruno Miguel Sousa, Henrique M. Simões Silva, Noé Godinho, Marília Curado. 388-394 [doi]
- DDoS Attack Detection and Mitigation in SDN using Machine LearningFatima Khashab, Joanna Moubarak, Antoine Feghali, Carole Bassil. 395-401 [doi]
- Evaluating ML-based DDoS Detection with Grid Search Hyperparameter OptimizationOdnan Ref Sanchez, Matteo Repello, Alessandro Carrega, Raffaele Bolla. 402-408 [doi]
- Intrusion Detection using Network Traffic Profiling and Machine Learning for IoTJoseph R. Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis. 409-415 [doi]
- A Translator as Virtual Network Function for Network Level Interoperability of Different IoT TechnologiesSisay Tadesse Arzo, Francesco Zambotto, Fabrizio Granelli, Riccardo Bassoli, Michael Devetsikiotis, Frank H. P. Fitzek. 416-422 [doi]
- Security Technologies in Ad-hoc Networks: A SurveyYaohui Zhong, Yongan Guo. 423-429 [doi]
- Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge NetworkTianyi Feng, Bin Wang, Hai-tao Zhao, Tangwei Zhang, Jiawen Tang, Zhenkun Wang. 430-436 [doi]
- Encapcap: Transforming Network Traces to Virtual NetworksDaniel Spiekermann, Jörg Keller 0001. 437-442 [doi]
- Leveraging the 5G architecture to mitigate amplification attacksMatteo Repetto, Alessandro Carrega, Guerino Lamanna, Jaloliddin Yusupov, Orazio Toscano, Gianmarco Bruno, Michele Nuovo, Marco Cappelli. 443-449 [doi]
- Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow LabelLuca Caviglione, Marco Zuppelli, Wojciech Mazurczyk, Andreas Schaffhauser, Matteo Repetto. 450-456 [doi]
- A novel approach for security function graph configuration and deploymentDaniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza. 457-463 [doi]
- A Dynamic Recommendation-based Trust Scheme for the Smart GridDimitrios Pliatsios, Panagiotis G. Sarigiannidis, George F. Fragulis, Apostolos Tsiakalos, Dimitrios Margounakis. 464-469 [doi]
- Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository FunctionShanay Behrad, David Espes, Philippe Bertin, Cao-Thanh Phan. 470-476 [doi]