Abstract is missing.
- Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS AttacksMuriel Figueredo Franco, Jan von der Assen, Luc Boillat, Christian Killer, Bruno Rodrigues 0001, Eder J. Scheid, Lisandro Zambenedetti Granville, Burkhard Stiller. 1-3 [doi]
- On the Complexity of Weight-Dynamic Network AlgorithmsMonika Henzinger, Ami Paz, Stefan Schmid 0001. 1-9 [doi]
- A Zero-Touch Solution for Transport Layer Adaptation to Applications and NetworksEl-Fadel Bonfoh, Samir Medjiah, Christophe Chassot. 1-9 [doi]
- ASIMOV: a Fully Passive WiFi Device TrackingRafael Hengen Ribeiro, Bruno Bastos Rodrigues, Christian Killer, Lenz Baumann, Muriel Figueredo Franco, Eder John Scheid, Burkhard Stiller. 1-3 [doi]
- How to Network Delay-Sensitive ApplicationsPavel Chuprikov, Kirill Kogan. 1-9 [doi]
- ARMHH: Accurate, Rapid and Memory-Efficient Heavy Hitter Detection with Sliding Window in the Software-Defined Network ContextZijun Hang, YongJie Wang, Shuguang Huang. 1-9 [doi]
- Network Telemetry by Observing and Recording on Programmable Data PlaneWen-Hong Lin, Waixi Liu, Gui-Feng Chen, Song Wu, Jin-Jiang Fu, Xing Liang, Sen Ling, Zhitao Chen. 1-6 [doi]
- Towards Large-Scale Deterministic IP NetworksBingyang Liu, Shoushou Ren, Chuang Wang, Vincent Angilella, Paolo Medagliani, Sébastien Martin, Jeremie Leguay. 1-9 [doi]
- Estimating the Impact of BGP Prefix HijackingPavlos Sermpezis, Vasileios Kotronis, Konstantinos Arakadakis, Athena Vakali. 1-10 [doi]
- Co-Virality of Competing Content over OSNs?Khushboo Agarwal, Veeraruna Kavitha. 1-9 [doi]
- Few-Shot Class-Adaptive Anomaly Detection with Model-Agnostic Meta-LearningTongtong Feng, Qi Qi 0001, Jingyu Wang 0001, Jianxin Liao. 1-9 [doi]
- Blockchain based Mobile Crowd Sensing for Reliable Data Sharing in IoT SystemsZhenni Feng, Junchang Chen. 1-3 [doi]
- Poster: Automated Neural Network Structure Selection for IoT Botnet DetectionKashif Naveed, Hui Wu 0001. 1-3 [doi]
- Performance Study of P4 Programmable Devices: Flow Scalability and Rule Update ResponsivenessHasanin Harkous, Mu He, Michael Jarschel, Rastin Pries, Ehab Mansour, Wolfgang Kellerer. 1-6 [doi]
- DC-PoET: Proof-of-Elapsed-Time Consensus with Distributed Coordination for Blockchain NetworksAmitangshu Pal, Krishna Kant 0001. 1-9 [doi]
- Demand-Aware Plane Spanners of Bounded DegreeEsra Ceylan, Klaus-Tycho Foerster, Stefan Schmid 0001, Katsiaryna Zaitsava. 1-9 [doi]
- Implementation of Virtual Network Function Allocation with Diversity and Redundancy in KubernetesRui Kang, Mengfei Zhu, Fujun He, Eiji Oki. 1-2 [doi]
- Dynamic Real-Time Stream Reservation with TAS and Shared Time WindowsAlexej Grigorjew, Nicholas Gray, Tobias Hoßfeld. 1-6 [doi]
- Containers Resource Allocation in Dynamic Cloud EnvironmentsOren Katz, Dror Rawitz, Danny Raz. 1-9 [doi]
- Applying 5G and Edge Processing in Smart ManufacturingJari Montonen, Jukka Koskinen, Jukka Mäkelä, Sami Ruponen, Tapio Heikkilä, Markku Hentula. 1-2 [doi]
- Minimizing Effort and Risk with Network Change Deployment PlanningCarlos Eduardo de Andrade, Ajay Mahimkar, Rakesh K. Sinha, Weiyi Zhang, Andre Cire, Giritharan Rana, Zihui Ge, Sarat C. Puthenpura, Jennifer Yates, Robert Riding. 1-9 [doi]
- Onion Pass: Token-Based Denial-of-Service Protection for Tor Onion ServicesChristoph Döpmann, Valentin Franck, Florian Tschorsch. 1-9 [doi]
- Distributed Sketching with Traffic-Aware SummariesDor Harris, Arik Rinberg, Ori Rottenstreich. 1-8 [doi]
- MultilayerTuple: A General, Scalable and High-performance Packet Classification Algorithm for Software Defined Network SystemChunyang Zhang, Gaogang Xie. 1-9 [doi]
- Evaluating Public DNS Services in the Wake of Increasing Centralization of DNSTrinh Viet Doan, Justus Fries, Vaibhav Bajpai. 1-9 [doi]
- TeleNoise: A Network-Noise Module for In-Band Real-Time TelemetryVitalii Demianiuk, Sergey Gorinsky, Kirill Kogan. 1-9 [doi]
- KadRTT: Routing with network proximity and uniform ID arrangement in KademliaHidehiro Kanemitsu, Hidenori Nakazato. 1-6 [doi]
- Source Selection in Transfer Learning for Improved Service Performance PredictionsHannes Larsson, Jalil Taghia, Farnaz Moradi, Andreas Johnsson. 1-9 [doi]
- Investigating Automatic Code Generation for Network Packet ParsingStephen McQuistin, Vivian Band, Dejice Jacob, Colin Perkins. 1-9 [doi]
- Hotcount: A High-Precision Traffic Statistics for Multi-TenantsGuanjie Qiao, Gaofeng Lv, Jing Tan, Lusha Mo. 1-6 [doi]
- Pulsarcast: Scalable, Reliable Pub-Sub over P2P NetsJoão Antunes, David Dias, Luís Veiga. 1-6 [doi]
- Energy-Efficient and Interference-Aware VNF Placement with Deep Reinforcement LearningYanyan Mu, Lei Wang, Jin Zhao. 1-9 [doi]
- Combating Imbalance in Network Traffic Classification Using GAN Based OversamplingYu Guo, Gang Xiong, Zhen Li 0011, Junzheng Shi, Mingxin Cui, Gaopeng Gou. 1-9 [doi]
- Estimating Distributions of Large Graphs from Incomplete Sampled DataShiju Li, Xin Huang, Chul-Ho Lee. 1-9 [doi]
- ECTSA: An Efficient Charging Time Scheduling Algorithm for Wireless Rechargeable UAV NetworkMengqi Li, Liang Liu, Jie Xi, Zuchao Ma, Xiangyu Xu, Lisong Wang. 1-9 [doi]
- (How Much) Can Edge Computing Change Network Latency?Lorenzo Corneo, Nitinder Mohan, Aleksandr Zavodovski, Walter Wong, Christian Rohner, Per Gunningberg, Jussi Kangasharju. 1-9 [doi]
- Network Automation for Path Selection: A New Knowledge Transfer ApproachGuozhi Lin, Jingguo Ge, Yulei Wu, Hui Li, Tong Li 0012, Wei Mi, Yuepeng E. 1-9 [doi]
- Simulation framework for EtherCAT over TSNBalakrishna Balakrishna, Boris Meinardus, Leonidas Kontopoulos. 1-6 [doi]
- Poster: Understanding Human Mobility during COVID-19 using Cellular Network TrafficNecati A. Ayan, Nilson Luís Damasceno, Sushil Chaskar, Peron R. de Sousa, Arti Ramesh, Anand Seetharam, Antônio A. de A. Rocha. 1-3 [doi]
- Enabling self-verifiable mutable content items in IPFS using Decentralized IdentifiersNikos Fotiou, Vasilios A. Siris, George C. Polyzos. 1-6 [doi]
- IPLS: A Framework for Decentralized Federated LearningChristodoulos Pappas, Dimitris Chatzopoulos, Spyros Lalis, Manolis Vavalis. 1-6 [doi]
- Decentralized identifiers for peer-to-peer service discoveryCarson Farmer, Sander Pick, Andrew Hill. 1-6 [doi]
- LightPIR: Privacy-Preserving Route Discovery for Payment Channel NetworksKrzysztof Pietrzak, Iosif Salem, Stefan Schmid 0001, Michelle Yeo. 1-9 [doi]
- INVEST: Flow-based Traffic Volume Estimation in Data-plane Programmable NetworksDamu Ding, Marco Savi, Federico Pederzolli, Domenico Siracusa. 1-9 [doi]
- Two-Level Processing Scheme for 3D-Image Sensing NetworkChongyu Li, Ryoichi Shinkuma, Takehiro Sato, Eiji Oki. 1-2 [doi]
- From Single Lane to Highways: Analyzing the Adoption of Multipath TCP in the InternetFlorian Aschenbrenner, Tanya Shreedhar, Oliver Gasser, Nitinder Mohan, Jörg Ott. 1-9 [doi]
- Introducing Peer Copy - A Fully Decentralized Peer-to-Peer File Transfer ToolDennis Trautwein, Moritz Schubotz, Bela Gipp. 1-2 [doi]
- Real-Time Channel Management in WLANs: Deep Reinforcement Learning versus HeuristicsOvidiu Iacoboaiea, Jonatan Krolikowski, Zied Ben-Houidi, Dario Rossi. 1-9 [doi]
- Simulative Evaluation of the TSN Mechanisms Time-Aware Shaper and Frame Preemption and Their Suitability for Industrial Use CasesAnna Arestova, Kai-Steffen Jens Hielscher, Reinhard German. 1-6 [doi]
- FlowToss: Fast Wait-Free Scheduling of Deterministic Flows in Time Synchronized NetworksRandeep Bhatia, T. V. Lakshman, Mustafa F. Özkoç, Shivendra Panwar. 1-6 [doi]
- Service Function Chain Graph Transformation for Enhanced Resource Efficiency in NFVAngelos Pentelas, Panagiotis Papadimitriou 0001. 1-9 [doi]
- Poster: eID in Europe - Password Authentication RevisitedMiroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao. 1-3 [doi]
- Deadline-Aware TDMA Scheduling for Multihop Networks Using Reinforcement LearningShanti Chilukuri, Guangyuan Piao, Diego Lugones, Dirk Pesch. 1-9 [doi]
- Temporal Graph based Energy-limited Max-flow Routing over Satellite NetworksKeyi Shi, Hongyan Li 0001, Long Suo. 1-3 [doi]
- Resource Allocation Method for Network Slicing Using Constrained Reinforcement LearningYongshuai Liu, Jiaxin Ding, Xin Liu. 1-3 [doi]
- CacheNet: Leveraging the Principle of Locality in Reconfigurable Network DesignChen Griner, Chen Avin. 1-3 [doi]
- Parallel VM Deployment with Provable GuaranteesItamar Cohen, Gil Einziger, Maayan Goldstein, Yaniv Sa'ar, Gabriel Scalosub, Erez Waisbard. 1-9 [doi]
- It's Good to Relax: Fast Profit Approximation for Virtual Networks with Latency ConstraintsRobin Münk, Matthias Rost, Harald Räcke, Stefan Schmid 0001. 1-3 [doi]
- Towards Identifying Internet Applications Using Early Classification of Traffic FlowAshish Gupta 0012, Hari Prabhat Gupta, Tanima Dutta. 1-9 [doi]
- Robustness of AutoML for Time Series Forecasting in Sensor NetworksTuomas Halvari, Jukka K. Nurminen, Tommi Mikkonen. 1-3 [doi]
- VPN-Zero: A Privacy-Preserving Decentralized Virtual Private NetworkMatteo Varvello, Iñigo Querejeta-Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, Benjamin Livshits. 1-6 [doi]
- Poster: SmartTE: Partially Deployed Segment Routing for Smart Traffic Engineering with Deep Reinforcement LearningZeyu Luan, Qing Li 0006, Yong Jiang 0001. 1-3 [doi]
- The Case for AI Based Web3 Reputation SystemsNavin V. Keizer, Fan Yang, Ioannis Psaras, George Pavlou. 1-2 [doi]
- Priority Re-assignment for Improving Schedulability and Mixed-Criticality of ARINC 664Metin Yeniaydin, Ömer Faruk Gemici, Muhammet Selim Demir, Ibrahim Hökelek, Sinem Coleri, Ufuk Tureli. 1-6 [doi]
- HTMT: High-Throughput Multipath Tunnelling for Asymmetric PathsRichard Sailer, Jörg Hähner. 1-3 [doi]
- All Roads Lead to Rome: An MPTCP-Aware Layer-4 Load BalancerYijing Zeng, Milind M. Buddhikot, Suman Banerjee. 1-9 [doi]
- SRPT-based Congestion Control for Flows with Unknown SizesAlex Davydow, Sergey I. Nikolenko, Vitalii Demianiuk, Pavel Chuprikov, Kirill Kogan. 1-9 [doi]
- Queuing Network Topology Inference Using Passive MeasurementsYilei Lin, Ting He 0001, Guodong Pang. 1-9 [doi]
- SIP Bruteforcing in the Wild - An Assessment of Adversaries, Techniques and ToolsHarm Griffioen, Huancheng Hu, Christian Doerr. 1-9 [doi]
- TSMF: Network Latency Estimation using Matrix Factorization and Time Series ForecastingFotis Savva, Christos Anagnostopoulos, Dimitrios Pezaros. 1-9 [doi]
- Leveraging Flexibility of Time-Sensitive Networks for dynamic ReconfigurabilityChristoph Gärtner, Amr Rizk, Boris Koldehofe, Rhaban Hark, René Guillaume, Ralf Steinmetz. 1-6 [doi]
- Boundaries of Flow Table Usage Reduction Algorithms Based on Elephant Flow DetectionPiotr Jurkiewicz. 1-9 [doi]
- Noise Measurement and Removal for Data Streaming Algorithms with Network ApplicationsChaoyi Ma, Haibo Wang, Olufemi Odegbile, Shigang Chen. 1-9 [doi]
- Adaptive Semi-Persistent Scheduling for Enhanced On-road Safety in Decentralized V2X NetworksAvik Dayal, Vijay K. Shah, Biplav Choudhury, Vuk Marojevic, Carl Dietrich, Jeffrey H. Reed. 1-9 [doi]
- Solid over the Interplanetary File SystemFabrizio Parrillo, Christian F. Tschudin. 1-6 [doi]
- Poster: Network Performance Upgrade by Cut SpannersGuy Rozenberg, Michael Segal 0001. 1-3 [doi]
- IPFS-FAN: A Function-Addressable Computation NetworkAlfonso de la Rocha, Yiannis Psaras, David Dias. 1-6 [doi]
- Fully Decentralized Trading Games with Evolvable Characters using NFTs and IPFSChristos Karapapas, Iakovos Pittaras, George C. Polyzos. 1-2 [doi]
- Abstracting Networks with Measurable GuaranteesVitalii Demianiuk, Kirill Kogan, Antonio Fernández Anta. 1-3 [doi]
- A state consistency framework leveraging packet cloning and piggybacking for programmable network data planesHugo Garcia, Naercio Magaia. 1-3 [doi]
- Network Slicing with Multi-Topology RoutingNicolas Huin, Sébastien Martin, Jérémie Leguay, Shengming Cai. 1-2 [doi]
- Poster: Multipath Extensions for WireGuardKonrad-Felix Krentz, Marius Iulian Corici. 1-3 [doi]
- Poster: COVID-19 Case Prediction using Cellular Network TrafficNecati A. Ayan, Sushil Chaskar, Anand Seetharam, Arti Ramesh, Antônio A. de A. Rocha. 1-3 [doi]