Abstract is missing.
- Intent-Based Management for Software-Defined Vehicles in Intelligent Transportation SystemsYiwen Shen 0001, Yoseop Ahn, Mose Gu, Jaehoon Paul Jeong. 1-6 [doi]
- An Intent-based Networks Framework based on Large Language ModelsAhlam Fuad, Azza H. Ahmed, Michael A. Riegler, Tarik Cicic. 7-12 [doi]
- Knowledge Graph Embedding in Intent-Based NetworkingKashif Mehmood, Katina Kralevska, David Palma 0001. 13-18 [doi]
- Enhancing Intent Acquisition and Translation with Large Language Models and Intelligent Chatbots: A DHCP Use CaseStefano D'Urso, Mattia Fontana, Barbara Martini, Filippo Sciarrone. 19-24 [doi]
- Recovering Missing Monitoring Data to Enhance Service Provisioning in the Edge-to-Cloud ContinuumGaetano Francesco Pittalà, Cristian Zilli, Nicola Di Cicco, Gianluca Davoli, Alessio Sacco. 25-30 [doi]
- Real-Time Monitoring of 5G Networks: An NWDAF and ML Based KPI PredictionAbebu Ademe Bayleyegn, Zaloa Fernández, Fabrizio Granelli. 31-36 [doi]
- Towards trust-based routing for data plane security in heterogeneous Software-Defined Wireless NetworksTravis Quinn, Syed Danial Ali Shah, Faycal Bouhafs, Frank T. H. den Hartog. 37-42 [doi]
- DY-RUM: Dynamic Resource Allocation for Converged Unicast and Multicast Transmission in 5GRashmi Yadav, Indu Yadav, Pranav Jha, Rashmi Kamran, Abhay Karandikar. 43-48 [doi]
- Benchmarking Different Strategies for Offloading ROS2 Computation to the EdgeDaniele Cacciabue, Jacopo Marino, Francesco Aglieco, Marco Levorato, Domenico Perroni, Fulvio Risso. 49-54 [doi]
- Performance evaluation of YOLOv8 and YOLOv9 on custom dataset with color space augmentation for Real-time Wildlife detection at the EdgeJean-Pierre H. Asdikian, Mengyao Li, Guido Maier. 55-60 [doi]
- Managing and Orchestrating Cross-Cloud VNFs with Deployable Sidecar VNF CoordinatorsMovsun Kuy, Laurent Schumacher, Sokchenda Sreng. 61-66 [doi]
- Building the Cloud Continuum with REARStefano Galantino, Elisa Albanese, Nasir Asadov, Stefano Braghin, Francesco Cappa, Andrea Colli-Vignarelli, Amjad Yousef Majid, Eduard Marin, Jacopo Marino, Lorenzo Moro, Liubov Nedoshivina, Fulvio Risso, Domenico Siracusa, Antonio F. Skarmeta, Luca Zuanazzi. 67-72 [doi]
- AggVNF: Aggregate VNF Allocation and Migration in Dynamic Cloud Data CentersChristopher Gonzalez, Bin Tang. 73-81 [doi]
- Efficient Network Slicing Orchestrator for 5G Networks using a Genetic Algorithm-based Scheduler with Kubernetes: Experimental InsightsMassinissa Ait Aba, Maya Kassis, Maxime Elkael, Andrea Araldo, Ali Al Khansa, Hind Castel-Taleb, Badii Jouaber. 82-90 [doi]
- Proactive VNF Redeployment and Traffic Routing for modern telco networksQiong Liu, Tianzhu Zhang, Walter Cerroni, Leonardo Linguaglossa. 91-99 [doi]
- Signaling Storm Mitigation by Geographically Distributed C-plane NF Placement and RoutingMasayuki Kurata, Akio Ikami, Sohei Itahara, Masaki Suzuki. 100-108 [doi]
- Towards automatic exploitation of programmable networksMihai Valentin Dumitru, Dragos Dumitrescu, Costin Raiciu. 109-117 [doi]
- Towards Sustainable Networking: Unveiling Energy Efficiency Through Hop and Path Efficiency Indicators in Computer NetworksRamon Bister, Alexander Clemm, Severin Dellsperger, Reto Furrer. 118-126 [doi]
- PolyNet: Cost- and Performance-Aware Multi-Criteria Link Selection in Software-Defined Edge-to-Cloud Overlay NetworksVahid Daneshmand, Kensworth C. Subratie, Renato J. O. Figueiredo. 127-135 [doi]
- DigiNet: Scaling up Provisioning of Network Digital TwinMarcelo Caggiani Luizelli, Francisco Germano Vogt, Paulo Silas Severo de Souza, Arthur Francisco Lorenzon, Roberto Irajá Tavares da Costa Filho, Fábio D. Rossi, Rodrigo N. Calheiros, Christian Esteve Rothenberg. 136-144 [doi]
- Tokenized Intelligence: Redefine Network Optimization in Softwarized NetworksEnrico Zanardo, Barbara Martini, Denise Bellisario. 145-148 [doi]
- Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-ServicesDo Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François. 149-152 [doi]
- Extensible FRER Security Testbed in a BoxKároly Kecskeméti, Csaba Györgyi, Péter Vörös, Géza Szabó, Sándor Laki. 153-156 [doi]
- Detecting Attacks and Optimizing Routes in Radio-frequency Networks Using Machine Learning and Graph TheoryManjushree Muralidhara, Md. Shirajum Munir, Sravanthi Proddatoori, Sachin Shetty, Kimberly Gold. 157-165 [doi]
- Leveraging Federated Learning and Variational Autoencoders for an Enhanced Anomaly Detection SystemBeny Nugraha, Kavya Kota, Thomas Bauschert. 166-174 [doi]
- Detection of Anomalous e2e Encrypted Function Invocation in FaaS using Zero-Knowledge ProofsDavide Andreotti, Giacomo Verticale. 175-179 [doi]
- Enhancing IoT Security in 6G Environment With Transparent AI: Leveraging XGBoost, SHAP and LIMENavneet Kaur, Lav Gupta. 180-184 [doi]
- Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes DeploymentsFelix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser 0001. 185-189 [doi]
- In-Network Encryption for Secure Industrial Control Systems CommunicationsLorenzo Rinieri, Antonio Iacobelli, Amir Al Sadi, Andrea Melis 0001, Franco Callegati, Marco Prandini. 190-194 [doi]
- From Pixels to Packets: Traffic Classification of Augmented Reality and Cloud GamingAlireza Shirmarz, Fábio Luciano Verdi, Suneet Kumar Singh, Christian Esteve Rothenberg. 195-203 [doi]
- Leveraging LLMs to eXplain DRL Decisions for Transparent 6G Network SlicingMazene Ameur, Bouziane Brik, Adlen Ksentini. 204-212 [doi]
- NFScaler: AI-Powered 5G-and-Beyond Network Function Scaler for QoS Assurance and Energy EfficiencyAbdirazak Ali Asir Rage, Ning Wang 0001, Rahim Tafazolli. 213-221 [doi]
- An Adaptive Closed-Loop Encoding VNF for Virtual Reality ApplicationsAndrea Caruso, Christian Grasso, Raoul Raftopoulos, Giovanni Schembra. 222-230 [doi]
- Exploring Large Language Models in Intent Acquisition and TranslationMattia Fontana, Barbara Martini, Filippo Sciarrone. 231-234 [doi]
- Network-Centered Resource Management for HPC NetworksDante Van Poucke, Wouter Tavernier, Didier Colle. 235-238 [doi]
- Innovative Approaches for Network Analysis and Optimization: Leveraging Deep Learning and Programmable HardwareAriel Góes de Castro, Christian Esteve Rothenberg. 239-242 [doi]
- Improving Transfer Time Prediction of ML Models via Auto-correcting Dynamical Systems ModelingVenkat Sai Suman Lamba Karanam, Byrav Ramamurthy. 243-247 [doi]
- DDPG_CAD: Intelligent Channel Activity Detection Scheduling in Massive IoT LoRaWANJui Mhatre, Ahyoung Lee, Hoseon Lee, Ngoc-Tu Nguyen 0002. 248-252 [doi]
- LLM-enabled Intent-driven Service Configuration for Next Generation NetworksAbdelkader Mekrache, Adlen Ksentini. 253-257 [doi]
- Leveraging Large Language Models for VNF Resource ForecastingJing Su, Suku Nair, Leo Popokh. 258-262 [doi]
- Hierarchical Multiclass Continual Learning for Network Intrusion DetectionJacopo Talpini, Fabio Sartori, Marco Savi. 263-267 [doi]
- Comparative Analysis of Processing Latency and CPU Efficiency in FPGA-Based FEC AccelerationAerman Tuerxun, Akihiro Nakao. 268-276 [doi]
- Minimizing power consumption in SDNs: measurements and optimizationViviana Arrigoni, Matteo Finelli, Federico Trombetti, Novella Bartolini. 277-285 [doi]
- An Adaptive Rule-based Path Selection Method using Link Information in Non-Terrestrial NetworksTomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Ohwada. 286-294 [doi]
- Measuring the Cost of the Linux Network Stack in Real-TimeDavide Miola, Fulvio Risso, Federico Parola. 295-303 [doi]
- Enabling Lightweight Federated Learning in NextG Wireless NetworksEmilio Paolini, Luca Valcarenghi, Nicola Andriolli, Luca Maggiani, Flavio Esposito. 304-306 [doi]
- IntentLLM: An AI Chatbot to Create, Find, and Explain Slice Intents in TeraFlowSDNDaniel Adanza, Carlos Natalino, Lluis Gifre, Raul Muñoz 0001, Pol Alemany, Paolo Monti 0001, Ricard Vilalta. 307-309 [doi]
- Demo: An Open-Source and Standards-Based Network-as-a-Service Platform for Cloud VR GamingHesam Rahimi, Lluis Gifre, Ricard Vilalta, Raul Muñoz 0001, Henry Yu, Yanpeng Wang, Ruilin Cai, Yixiao Chen. 310-312 [doi]
- In-network Computing Architecture for Service Acceleration for 6G Networks - DemoHiroki Baba, Shiku Hirai, Kentarou Hayashi, Tomonori Takeda. 313-315 [doi]
- Offloading NVMe over Fabrics (NVMe-oF) to SmartNICs on an at-scale Distributed TestbedShoaib Basu, Deepak Nadig. 316-318 [doi]
- Data Processing Unit (DPU) Based Network Process Offloading for Efficient Service MeshesKarumuri Meher Hasanth, Shoaib Basu, Deepak Nadig. 319-321 [doi]
- Poster: Transport-Aware Resource Block Allocation in 5G SlicingAndrea Pinto, Tanzil Bin Hassan, Francesco Restuccia 0001, Flavio Esposito. 322-323 [doi]
- Poster: Hardware Security for IoT Wireless NetworkUday Kiran Sunkara, Abdulquadri Abiru, Kyle Morman, Aaron Costin. 324-325 [doi]
- Enhancing P4 Syntax to Support Extended Finite State Machines as Native Stateful ObjectsFlorent Allard, Tarek Ould Bachir, Yvon Savaria. 326-330 [doi]
- Sharding the Datastore Network Functions of 5G Core for Scalable and Resilient Slice ServicePriyansha Tiwari, Shwetha Vittal, A. Antony Franklin. 331-335 [doi]
- Towards Adaptive Networks - Generalized utility functions in Multi-Agent FrameworksKaushik Dey, Satheesh K. Perepu, Abir Das, Pallab Dasgupta. 336-340 [doi]
- Calibration and Automation of a 5G Simulator for Realistic Evaluation and Data GenerationConrado Boeira, Antor Hasan, Khaleda Papry, Yue Ju, Zhongwen Zhu, Israat Haque 0001. 341-345 [doi]
- The Effects of Topologies on the Performance of Real-Time NetworksPhilip Diederich, Alexej Grigorjew, Stefan Geißler, Tobias Hoßfeld, Wolfgang Kellerer. 346-350 [doi]
- Online Learning and Model Pruning Against Concept Drifts in Edge DevicesSimone Magnani, Seshu Tirupathi, Roberto Doriguzzi Corin, Liubov Nedoshivina, Stefano Braghin, Domenico Siracusa. 351-356 [doi]
- Resource-Efficient Federated Learning for Network Intrusion DetectionRoberto Doriguzzi Corin, Silvio Cretti, Domenico Siracusa. 357-362 [doi]
- Explainable AI for Process-Aware Attack Detection in Industrial Control SystemsLéa Astrid Kenmogne, Stéphane Mocanu. 363-368 [doi]
- DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based ApproachShurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel. 369-374 [doi]
- Self-reconfiguration of industrial control systems as a response to cyberattacksJolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten. 375-380 [doi]
- An intent-based solution for network isolation in KubernetesFrancesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza. 381-386 [doi]
- Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approachAntonio Matencio-Escolar, Jorge Bernal Bernabé, José M. Alcaraz 0001, Qi Wang 0001, Antonio F. Skarmeta. 387-392 [doi]
- Vulnet: Learning Navigation in an Attack GraphEnzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor. 393-398 [doi]
- How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetyaDo Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, Guillaume Doyen. 399-404 [doi]