Abstract is missing.
- A Multi-Connectivity Architecture with Data Replication for XR Traffic in mmWave NetworksMuhammad Affan Javed, Pei Liu 0001, Shivendra S. Panwar. 1-9 [doi]
- On the integration of OPC UA over Wired - Wireless Time Sensitive NetworkingÓscar Seijo, Raúl Torrego, Iñaki Val. 1-6 [doi]
- FedABR: A Personalized Federated Reinforcement Learning Approach for Adaptive Video StreamingYeting Xu, Xiang Li, Yi Yang, Zhenjie Lin, Liming Wang, Wenzhong Li. 1-9 [doi]
- Tactical Traffic Engineering with Segment Routing Midpoint OptimizationAlexander Brundiers, Timmy Schüller, Nils Aschenbruck. 1-9 [doi]
- Hierarchical Thompson Sampling for Multi-band Radio Channel SelectionJerrod Wigmore, Brooke Shrader, Eytan H. Modiano. 1-9 [doi]
- Controlling Epidemic Spread Under Immunization Delay ConstraintsShiju Li, Xin Huang, Chul-Ho Lee, Do Young Eun. 1-9 [doi]
- On Real-time Failure Localization via Instance Correlation in Optical Transport NetworksYan Jiao, Pin-Han Ho, Xiangzhu Lu, Kairan Liang, Yuren You, János Tapolcai, Bingbing Li, Limei Peng. 1-9 [doi]
- A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking GlassAllen Hong, YaHui Li, Han Zhang, Ming Wang, Changqing An, Jilong Wang 0001. 1-9 [doi]
- Optimizing Service Selection and Load Balancing in Multi-Cluster Microservice Systems with MCOSSDaniel Bachar, Anat Bremler-Barr, David Hay. 1-9 [doi]
- Galette: a Lightweight XDP Dataplane on your Raspberry PiKyle A. Simpson, Chris Williamson, Douglas J. Paul, Dimitrios P. Pezaros. 1-9 [doi]
- Federated Learning-Based In-Network Traffic Analysis on IoT EdgeMingyuan Zang, Changgang Zheng, Tomasz Koziak, Noa Zilberman, Lars Dittmann. 1-6 [doi]
- Privacy-Enhanced Content Discovery for BitswapErik Daniel, Florian Tschorsch. 1-9 [doi]
- Q-learning for Waiting Time Control in CDN/V2V Live streamingZhejiayu Ma, Soufiane Roubia, Frédéric Giroire, Guillaume Urvoy-Keller. 1-9 [doi]
- A Decade Long View of Internet Traffic Composition in JapanIrina Tsareva, Trinh Viet Doan, Vaibhav Bajpai. 1-9 [doi]
- An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection SystemsGeorgios Zachos, Georgios Mantas, Ismael Essop, Kyriakos Porfyrakis, Joaquim Manuel C. S. Bastos, Jonathan Rodriguez 0001. 1-6 [doi]
- GNSGA: A Decentralized Data Replication Algorithm for Big Science DataXi Wang, Xusheng Ai, F. Alex Feltus, Susmit Shannigrahi. 1-9 [doi]
- Hercules: High-Speed Bulk-Transfer over SCIONMarten Gartner, Jean-Pierre Smith, Matthias Frei, François Wirz, Cédric Neukom, David Hausheer, Adrian Perrig. 1-9 [doi]
- IRGAN: cGAN-based Indoor Radio Map PredictionCheick T. Cissé, Oumaya Baala, Valéry Guillet, François Spies, Alexandre Caminada. 1-9 [doi]
- A Privacy-preserving Proof-of-ReputationMarina Dehez-Clementi, Mourad Rabah, Yacine Ghamri-Doudane. 1-9 [doi]
- Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3Jayasree Sengupta, Mike Kosek, Justus Fries, Pratyush Dikshit, Vaibhav Bajpai. 1-9 [doi]
- Optimizing DNS Resolvers for High LoadsItay Alayoff, Gil Einziger. 1-9 [doi]
- Maximal Distance Spectrum Assignment for Services Provisioning in Elastic Optical NetworksXiaolin Wang, Fen Zhou 0001, Yaojun Chen, Ting Wang. 1-9 [doi]
- Scalable Reinforcement Learning for Dynamic Overlay Selection in SD-WANsAlessio Botta, Roberto Canonico, Annalisa Navarro, Giovanni Stanco, Giorgio Ventre. 1-9 [doi]
- Secure Middlebox-Assisted QUICMike Kosek, Benedikt Spies, Jörg Ott. 1-9 [doi]
- The Case for Stochastic Online Segment Routing under Demand UncertaintyJérôme De Boeck, Bernard Fortz, Stefan Schmid 0001. 1-8 [doi]
- Game Theoretic Resource Planning and Request Scheduling in Mobile Edge Computing NetworksBin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto, Dusit Niyato. 1-9 [doi]
- Longitudinal Analysis of Wildcard Certificates in the WebPKIDavid Hasselquist, Ludvig Bolin, Emil Carlsson, Adam Hylander, Martin Larsson, Erik Voldstad, Niklas Carlsson. 1-9 [doi]
- Lightweight Network Delay Segmentation Based on Smoothed Hierarchical ClusteringSanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel. 1-9 [doi]
- Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the WildDongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang 0001, Xingang Shi, Xia Yin. 1-9 [doi]
- Simulation and Practice: A Hybrid Experimentation Platform for TSNMarcin Bosk, Filip Rezabek, Johannes Abel, Kilian Holzinger, Max Helm, Georg Carle, Jörg Ott. 1-9 [doi]
- Imperfect Bandwidth-Sharing Policies using Network CalculusAnne Bouillard. 1-9 [doi]
- MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HINHongwu Li, Xingyu Fu, Yujia Zhu, Rong Yang, Chao Li. 1-9 [doi]
- Keeping up to Date with P4Runtime: An Analysis of Data Plane Updates on P4 SwitchesHenning Stubbe, Sebastian Gallenmüller, Manuel Simon, Eric Hauser, Dominik Scholz, Georg Carle. 1-9 [doi]
- Behavioral Biometrics for Mobile User Authentication: Benefits and LimitationsMaria Papaioannou, Georgios Mantas, Emmanouil Manos Panaousis, Aliyah Essop, Jonathan Rodriguez 0001, Victor Sucasas. 1-6 [doi]
- Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and GuidelinesAlexander Staves, Sam Maesschalck, Richard Derbyshire, Benjamin Green 0001, David Hutchison 0001. 1-6 [doi]
- Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP FallbackPratyush Dikshit, Mike Kosek, Nils Faulhaber, Jayasree Sengupta, Vaibhav Bajpai. 1-9 [doi]
- TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive NetworkingDoganalp Ergenç, Robin Schenderlein, Mathias Fischer 0001. 1-6 [doi]
- Delay Analysis of TSN Based Industrial Networks With Preemptive Traffic Using Network CalculusMohamed Seliem, Ahmed Zahran, Dirk Pesch. 1-9 [doi]
- On the (dis)Advantages of Programmable NICs for Network Security ServicesJack Zhao, Miguel C. Neves, Israat Haque 0001. 1-9 [doi]
- Graph Neural Network-based Delay Prediction Model Enhanced by Network CalculusLianming Zhang, Benle Yin, Qian Wang, Pingping Dong. 1-7 [doi]
- Placement of UAVs to Reconnect Lost Subnetworks in Wireless Sensor NetworksLu Lin, Xiaojun Zhu 0001, Ji'ao Tang, Chao Dong. 1-9 [doi]
- Meta-Migration: Reducing Switch Migration Tail Latency Through CompetitionSepehr Abbasi Zadeh, Farid Zandi, Matthew Buckley, Yashar Ganjali. 1-9 [doi]
- Flow Prioritization for TSN Asynchronous Traffic ShapersJulia Caleya-Sanchez, Jonathan Prados-Garzon, Lorena Chinchilla-Romero, Pablo Muñoz 0001, Pablo Ameigeiras. 1-6 [doi]
- ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT TrafficYijing Zhang, Hui Xue, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Anqi Wang, Yinliang Yue, Bo Sun. 1-10 [doi]
- Full Exploitation of Limited Memory in Quantum Entanglement SwitchingPanagiotis Promponas, Víctor Valls, Leandros Tassiulas. 1-9 [doi]
- QUIC on the Highway: Evaluating Performance on High-rate LinksBenedikt Jaeger, Johannes Zirngibl, Marcel Kempf, Kevin Ploch, Georg Carle. 1-9 [doi]
- Filling the Gap: Fault-Tolerant Updates of On-Satellite Neural Networks Using Vector QuantizationOlga Kondrateva, Stefan Dietzel, Maximilian Schambach, Johannes S. Otterbach, Björn Scheuermann 0001. 1-9 [doi]
- GuRuChain: Guarantee and Reputation-based Blockchain Service Trading PlatformMouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah, Ronan Champagnat. 1-9 [doi]
- Dragonfly: In-Flight CCA IdentificationDean Carmel, Isaac Keslassy. 1-9 [doi]
- Overcoming New Technologies Challenges in IoT Security Labs: Strategies for Effective AdaptationDimitrios Simopoulos, Andreas Wolf. 1-5 [doi]
- A Tutorial on the Implementation of a Hyperledger Fabric-based Security Architecture for IoMTFilippos Pelekoudas Oikonomou, José Carlos Ribeiro, Georgios Mantas, Firooz Bashashi, Georgia Sakellari, Jonathan González. 1-6 [doi]
- Linking User Identities Across Social Networks via Frequency Domain AnalysisHui Xue, Bo Sun, Weixuan Mao. 1-8 [doi]
- 5GShield: HTTP/2 Anomaly Detection in 5G Service-Based ArchitectureNathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi. 1-9 [doi]
- Mobile App Fingerprinting through Automata Learning and Machine LearningFatemeh Marzani, Fatemeh Ghassemi, Zeynab Sabahi-Kaviani, Thijs van Ede, Maarten van Steen. 1-9 [doi]
- FSTC: Dynamic Category Adaptation for Encrypted Network Traffic ClassificationNavid Malekghaini, Hauton Tsang, Mohammad Ali Salahuddin 0001, Noura Limam, Raouf Boutaba. 1-9 [doi]
- An Enhanced Model for Machine Learning-Based DoS Detection in Vehicular NetworksSecil Ercan, Léo Mendiboure, Lylia Alouache, Sassi Maaloul, Tidiane Sylla, Hasnaâ Aniss. 1-9 [doi]
- Data-VCG: A Data Preservation Game for Base Station-less Sensor Networks with Performance GuaranteeJennifer Ly, Yutian Chen, Bin Tang. 1-6 [doi]
- Graph Convolutional Reinforcement Learning for Load Balancing and Smart QueuingHassan Fawaz, Omar Houidi, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani. 1-9 [doi]
- Exploring the Quantitative Resilience Analysis of Cyber-Physical SystemsRomain Dagnas, Michel Barbeau, Maxime Boutin, Joaquín García-Alfaro, Reda Yaich. 1-6 [doi]
- DMTP: Deadline-aware Multipath Transport ProtocolTony John, Adrian Perrig, David Hausheer. 1-9 [doi]
- TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filteringNurefsan Sertbas Bülbül, Joshua Jannis Krüger, Mathias Fischer 0001. 1-8 [doi]
- Energy-Aware Spreading Factor Selection in LoRaWAN Using Delayed-Feedback BanditsRenzo E. Navas, Ghina Dandachi, Yassine Hadjadj Aoul, Patrick Maillé. 1-9 [doi]
- Towards the Integration of TAPRIO-based Scheduling with Centralized TSN ControlGeorge Papathanail, Lefteris Mamatas, Panagiotis Papadimitriou 0001. 1-6 [doi]
- Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile ApplicationsBaiyang Li, Yujia Zhu, Qingyun Liu, Yong Sun, Yuedong Zhang, Li Guo 0001. 1-9 [doi]
- National roaming as a fallback or default?Lotte Weedage, Syllas R. C. Magalhaes, Suzan Bayhan. 1-6 [doi]