Abstract is missing.
- Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing UnitsRaffaele Bolla, Roberto Bruschi, Alessandro Carrega, Franco Davoli, Chiara Lombardo. 1-6 [doi]
- On the energy efficiency of Laser-based Optical Wireless NetworksWalter Zibusiso Ncube, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani. 7-12 [doi]
- OWC-enabled Spine and Leaf Architecture Towards Energy Efficient Data Center NetworksAbrar S. Alhazmi, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani. 13-18 [doi]
- Analytical Model for the Energy Efficiency in Low Power IoT DeploymentsTobias Hoßfeld, Simon Raffeck, Frank Loh, Stefan Geißler. 19-24 [doi]
- NLP4: An Architecture for Intent-Driven Data Plane ProgrammabilityAntonino Angi, Alessio Sacco, Flavio Esposito, Guido Marchetto, Alexander Clemm. 25-30 [doi]
- From Category Theory to Functional Programming: A Formal Representation of IntentDavide Borsatti, Walter Cerroni, Stuart Clayman. 31-36 [doi]
- Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration PerspectiveKashif Mehmood, David Palma 0001, Katina Kralevska. 37-42 [doi]
- Challenges and Opportunities in Green NetworkingAlexander Clemm, Cédric Westphal. 43-48 [doi]
- Exploiting Segment Routing and SDN Features for Green Traffic EngineeringChung-Horng Lung, Hesham Elbakoury. 49-54 [doi]
- The Spectral and Energy Efficiency of Ultra-Dense IoT NetworksHao Fu, Timothy O'Farrell. 55-60 [doi]
- Improving Intent Correctness with Automated TestingPaul Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, Nicholas J. P. Race. 61-66 [doi]
- Towards a Closed-Looped Automation for Service Assurance with the DxAgentKorian Edeline, Thomas Carlisi, Justin Iurman, Benoit Claise, Benoit Donnet. 67-72 [doi]
- Intent-based cognitive closed-loop management with built-in conflict handlingAhmet Cihat Baktir, Amadeu do Nascimento Júnior, András Zahemszky, Ankita Likhyani, Dagnachew Azene Temesgene, Dinand Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo. 73-78 [doi]
- Accelerator-Resource Sharing with Offload-Mediated Proxy for vRANIkuo Otani, Kei Fujimoto, Akinori Shiraga. 79-84 [doi]
- Host Bypassing: Let your GPU speak EthernetRalf Kundel, Leonard Anderweit, Jonas Markussen, Carsten Griwodz, Osama Abboud, Benjamin Becker, Tobias Meuser. 85-90 [doi]
- Efficient Transparent Access to 5G Edge ServicesJosef Hammer, Hermann Hellwagner. 91-96 [doi]
- Low-Latency and Energy-Efficient Frame Forwarding for vRAN TrafficKo Natori, Kei Fujimoto, Akinori Shiraga. 97-102 [doi]
- A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network EnvironmentsAlireza Mohammadpour, Chiara Lombardo, Raffaele Bolla, Roberto Bruschi, Franco Davoli, Lorenzo Ivaldi. 103-108 [doi]
- On the Performance Benefits of Heterogeneous Virtual Network Function Execution FrameworksHaruna Umar Adoga, Yehia Elkhatib, Dimitrios P. Pezaros. 109-114 [doi]
- Network Performance Benchmarking for Containerized Infrastructure in NFV environmentMinh-Ngoc Tran, Younghan Kim. 115-120 [doi]
- Orchestration Software for Resource Constrained Datacenters: an Experimental EvaluationAlexandros Valantasis, Nikos Makris, Thanasis Korakis. 121-126 [doi]
- Towards Secure and Optimized Cross-Slice Communication EstablishmentGeorge Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, Symeon Papavassiliou, Panagiotis Papadimitriou 0001. 127-132 [doi]
- MUESLI: Multi-objective Radio Resource Slice Management via Reinforcement LearningAjay Kattepur, Sushanth David, Swarup Mohalik. 133-138 [doi]
- Deep learning based resource forecasting for 5G core network scaling in Kubernetes environmentMenuka Perera Jayasuriya Kuranage, Loutfi Nuaymi, Ahmed Bouabdallah, Thomas Ferrandiz, Philippe Bertin. 139-144 [doi]
- Latency-aware Topology Discovery in SDN-based Time-Sensitive NetworksSanaz Mohammadi, Didier Colle, Wouter Tavernier. 145-150 [doi]
- Evaluation of an SDN-based Microservice ArchitectureAnton Hölscher, Mikael Asplund, Felipe Boeira. 151-156 [doi]
- Probability-based dispatching framework for speed-test applications: design and implementationFrancesco D'Alterio, Marco Teodori, Luca Rea, Francesco Matera. 157-162 [doi]
- CHIMA: a Framework for Network Services Deployment and Performance AssuranceElia Battiston, Daniele Moro, Giacomo Verticale, Antonio Capone. 163-170 [doi]
- A Caching SFC Proxy Based on eBPFMarco Häberle, Benjamin Steinert, Michael Weiss, Michael Menth. 171-179 [doi]
- MiddleNet: A High-Performance, Lightweight, Unified NFV and Middlebox FrameworkZiteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan. 180-188 [doi]
- NetREC: Network-wide in-network REal-value ComputationMatthews Jose, Kahina Lazri, Jérôme François, Olivier Festor. 189-197 [doi]
- Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains PlacementHichem Magnouche, Guillaume Doyen, Caroline Prodhon. 198-206 [doi]
- On the Training of Reinforcement Learning-based Algorithms in 5G and Beyond Radio Access NetworksIrene Vilà Muñoz, Jordi Pérez-Romero, Oriol Sallent. 207-215 [doi]
- Dynamic VNF Placement in 5G Edge NodesDor Harris, Danny Raz. 216-224 [doi]
- Demonstration of Containerized Central Unit Live Migration in 5G Radio Access NetworkShunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Miguel Razo, Marco Tacca, Luca Valcarenghi, Andrea Fumagalli. 225-227 [doi]
- Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile NetworksBadre Bousalem, Vinicius F. Silva, Rami Langar, Sylvain Cherrier. 228-230 [doi]
- Towards a Fully Automated System for Testing and Validating NetAppsRafael Direito, Diogo Gomes 0001, Rui L. Aguiar. 231-233 [doi]
- A Web-based Orchestrator for Dynamic Service Function Chaining Development with KubernetesZiqiang Wang, Abdullah Bittar, Changcheng Huang, Chung-Horng Lung, Gauravdeep Shami. 234-236 [doi]
- Demo: A Network Simulator for 5G Virtualized NetworksOscar Delgado, Brigitte Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette. 237-239 [doi]
- Demo: Towards Software Defined Layer 4.5 CustomizationDaniel Lukaszewski, Geoffrey G. Xie. 240-242 [doi]
- Encrypted Network Traffic Classification in SDN using Self-supervised LearningMd. Shamim Towhid, Nashid Shahriar. 243-245 [doi]
- DEMO: MiddleNet: A High-Performance, Lightweight, Unified NFV & Middlebox FrameworkZiteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan. 246-248 [doi]
- NETREACT: Distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing PipelinesCsaba Györgyi, Károly Kecskeméti, Hiba Mallouhi, Péter Vörös, Sándor Laki. 249-253 [doi]
- Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use CaseFederico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso. 254-258 [doi]
- DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video StreamingPedro Casas, Michael Seufert, Sarah Wassermann, Bruno Gardlo, Nikolas Wehner, Raimund Schatz. 259-263 [doi]
- Passive OS Fingerprinting on Commodity SwitchesSherry Bai, HyoJoon Kim, Jennifer Rexford. 264-268 [doi]
- End-to-end 5G network slice resource management and orchestration architectureHiroki Baba, Shiku Hirai, Takayuki Nakamura, Sho Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru. 269-271 [doi]
- Demonstration of 5G-MEC assisted Location Services for Mission Critical ApplicationsSupriya Dilip Tambe, Shwetha Vittal, Pratik Abhijeet Bendre, Supriya Kumari, A. Antony Franklin. 272-274 [doi]
- Service-Based Management Architecture for On-Demand Creation, Configuration, and Control of a Network Slice SubnetA. Ishaq, Daniele Ronzani, A. Spinato, Nicola di Pietro, Marco Centenaro, A. Bellin, Daniele Munaretto. 275-277 [doi]
- GOX: Towards a Scalable Graph Database-Driven SDN ControllerFetia Bannour, Stefania Dumbrava, Alex Danduran-Lembezat. 278-280 [doi]
- Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE TestbedLluis Gifre, Carlos Manso, Ramon Casellas, Ricardo Martínez 0001, Ricard Vilalta, Raul Muñoz. 281-283 [doi]
- Towards Application-Aware Provisioning of Security Services with KubernetesRoberto Doriguzzi Corin, Silvio Cretti, Tiziana Catena, Simone Magnani, Domenico Siracusa. 284-286 [doi]
- Network Digital Replica using Neural-Network-based Network Node ModelingKyota Hattori, Tomohiro Korikawa, Chikako Takasaki, Hidenari Oowada, Masafumi Shimizu, Naoki Takaya. 287-291 [doi]
- Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable SwitchYutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa. 292-296 [doi]
- Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Access NetworksHimank Gupta, A. Antony Franklin, Mayank Kumar, Bheemarjuna Reddy Tamma. 297-301 [doi]
- FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC PlacementSagar Agarwal, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma. 302-306 [doi]
- Intelligent Admission and Placement of O-RAN Slices Using Deep Reinforcement LearningNabhasmita Sen, A. Antony Franklin. 307-311 [doi]
- Effects of SD-RAN Control Plane Design on User Quality of ServiceArled Papa, Polina Kutsevol, Fidan Mehmeti, Wolfgang Kellerer. 312-320 [doi]
- TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuumYacine Anser, Chrystel Gaber, Jean-Philippe Wary, Sara N. Matheu-García, Samia Bouzefrane 0001. 321-329 [doi]
- Towards Software Defined Layer 4.5 CustomizationDaniel Lukaszewski, Geoffrey G. Xie. 330-338 [doi]
- Proactive Clustering of Base Stations in 5GC-RAN using Cellular Traffic PredictionMehul Sharma, Ujjwal Pawar, A. Antony Franklin, Bheemarjuna Reddy Tamma. 339-347 [doi]
- Switch Migration Scheduling in Distributed SDN ControllersMatthew Buckley, Sepehr Abbasi Zadeh, Mohammad Amin Beiruti, Soheil Abbasloo, Yashar Ganjali. 348-356 [doi]
- At the Edge? Wait no More: Immediate Placement of Time-Critical SFCs with VNF SharingAmir Mohamad, Hossam S. Hassanein. 357-365 [doi]
- Encrypted Network Traffic Classification using Self-supervised LearningMd. Shamim Towhid, Nashid Shahriar. 366-374 [doi]
- Backup Resource Allocation Model with Two-Stage Probabilistic ProtectionKento Yokouchi, Fujun He, Eiji Oki. 375-383 [doi]
- Unavailability-Aware Backup Allocation Model for Middleboxes with Two-Stage Shared ProtectionKita Nozomi, Fujun He, Eiji Oki. 384-392 [doi]
- Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined NetworkShinji Noda, Takehiro Sato, Eiji Oki. 393-401 [doi]
- Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation ApplicationsStefan Senk, Marian Ulbricht, Javier Acevedo, Giang T. Nguyen 0002, Patrick Seeling, Frank H. P. Fitzek. 402-410 [doi]
- Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided AttacksConor Black, Sandra Scott-Hayward. 411-419 [doi]
- FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated AnnealingHélio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia C. Fernande. 420-428 [doi]
- Detecting Data Exfiltration over Encrypted DNSJacob Steadman, Sandra Scott-Hayward. 429-437 [doi]
- Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection PerformanceRoshan Sedar, Charalampos Kalalas, Jesus Alonso-Zarate, Francisco Vázquez Gallego. 438-443 [doi]
- An application of Netspot to Detect Anomalies in IoTTom Tuunainen, Olli Isohanni, Mitha Rachel Jose. 444-449 [doi]
- Model-Driven Network Monitoring Using NetFlow Applied to Threat DetectionDaniel González-Sánchez, Ignacio Dominguez Martinez-Casanueva, Antonio Pastor 0001, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López. 450-455 [doi]
- Evaluation of the data handling pipeline of the ASTRID frameworkMatteo Repetto, Guerino Lamanna. 456-461 [doi]
- Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative ApproachAthanasios Liatifis, Pedro Ruzafa Alcazar, Panagiotis I. Radoglou-Grammatikis, Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Thomas Krousarlis, Molinuevo Martin Alberto, Iñaki Angulo, Antonios Sarigiannidis, Thomas Lagkas, Vasileios Argyriou, Antonio F. Skarmeta, Panagiotis G. Sarigiannidis. 462-467 [doi]
- Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service ChainsGiovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco. 468-473 [doi]
- A model of capabilities of Network Security FunctionsCataldo Basile, Daniele Canavese, Leonardo Regano, Ignazio Pedone, Antonio Lioy. 474-479 [doi]
- Always-Sustainable Software SecurityVincent Lefebvre, Gianni Santinelli. 480-485 [doi]
- Security Automation using Traffic Flow ModelingSimone Bussa, Riccardo Sisto, Fulvio Valenza. 486-491 [doi]