Abstract is missing.
- REMO: Resource efficient distributed network monitoringTao Li, Hani Salah, Mu He, Thorsten Strufe, Silvia Santini. 1-9 [doi]
- A large scale transactional service selection approach based on skyline and ant colony optimization algorithmLin Qi, Wenbin Yao, Jingkun Chang. 1-7 [doi]
- Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbedThomas Lin, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia. 1-7 [doi]
- Analyzing throughput and stability in cellular networksErmias Andargie Walelgne, Jukka Manner, Vaibhav Bajpai, Jörg Ott. 1-9 [doi]
- sOFTDP: Secure and efficient OpenFlow topology discovery protocolAbdelhadi Azzouni, Raouf Boutaba, Thi Mai Trang Nguyen, Guy Pujolle. 1-7 [doi]
- Telephony Denial of Service defense at data plane (TDoSD@DP)Aldo Febro, Hannan Xiao, Joseph Spring. 1-6 [doi]
- Securing IoT microservices with certificatesMarc-Oliver Pahl, Lorenzo Donini. 1-5 [doi]
- Providing cognitive components with a bidding heuristic for emergent NFV orchestrationFrederico Schardong, Ingrid Nunes, Alberto E. Schaeffer Filho. 1-9 [doi]
- Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructuresMaxime Compastié, Remi Badonnel, Olivier Festor, Ruan He. 1-2 [doi]
- Avoidance of improper configuration based on self- operationHaitao Tang, Kaj Stenberg, Vilho Räisänen, Joonas Kylliainen. 1-8 [doi]
- Energy models for NFV and service provisioning on fog nodesFabian Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, David Hausheer. 1-7 [doi]
- Risk modeling and optimization approach for system protection communication networksXinting Hu, Wenjing Li, Peng Yu, Fang Chen, Fangzheng Chen, Yuan Tian. 1-4 [doi]
- Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodologyThomas Soenen, Steven van Rossem, Wouter Tavernier, Felipe Vicens, Dario Valocchi, Panos Trakadas, Panos Karkazis, George Xilouris, Philip Eardley, Stavros Kolometsos, Michail-Alexandros Kourtis, Daniel Guija, Muhammad Shuaib Siddiqui, Peer Hasselmeyer, José Bonnet, Diego Lopez. 1-6 [doi]
- Research on lifetime prediction-based recharging scheme in rechargeable WSNsYang Yang 0006, He Li, Xuesong Qiu, Shaoyong Guo, XiaoXiao Zeng, Kang Zhao, Haoran Xin. 1-4 [doi]
- A backup algorithm for power communication network based on fault cascade in the network virtualization environmentXia Zhen, Lanlan Rui, Xuesong Qiu, Biyao Li, Peng Yu 0001. 1-5 [doi]
- Probabilistic multi-RAT performance abstractionsAkhila Rao, Rebecca Steinert. 1-6 [doi]
- FIXIDS: A high-speed signature-based flow intrusion detection systemFelix Erlacher, Falko Dressler. 1-8 [doi]
- Spectrum allocation with differential pricing and admission in cognitive-radio-based neighborhood area network for smart gridXueyao Zhao, Lei Feng, Xiao Cheng, Wenjing Li 0001, Peng Yu, Xuesong Qiu, Lei Wei. 1-7 [doi]
- Managed edge computing on Internet-of-Things devices for smart city applicationsYu-Chen Hsieh, Hua-Jun Hong, Pei-Hsuan Tsai, Yu-Rong Wang, Qiuxi Zhu, Md. Yusuf Sarwar Uddin, Nalini Venkatasubramanian, Cheng-Hsin Hsu. 1-2 [doi]
- A scalable and flexible DDoS mitigation system using network function virtualizationBahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman. 1-6 [doi]
- Never say never: Authoritative TLD nameserver-powered DNS amplificationMarios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis, David K. Y. Yau. 1-9 [doi]
- Demo: A wrapper for automated measurements with YouTube's native appFrank Loh, Theodoros Karagkioules, Michael Seufert, Bernd Zeidler, Dimitrios Tsilimantos, Phuoc Tran-Gia, Stefan Valentin, Florian Wamser. 1-2 [doi]
- Performance evaluation of Open5GCore over KVM and Docker by using Open5GMTCHung-Cheng Chang, Bo-Jun Qiu, Chen-Hao Chiu, Jyh-Cheng Chen, Fuchun Joseph Lin, David de la Bastida, Bao-Shuh Paul Lin. 1-6 [doi]
- Detecting malicious authentication events trustfullyGeorgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane. 1-6 [doi]
- IP/NDN: A multi-level translation and migration mechanismSheng Luo, Shangru Zhong, Kai Lei. 1-5 [doi]
- Comparison of data center traffic division policies using SDNErik de Britto e Silva, Henrique Moura, Gabriel Fanelli, Manoel da Rocha Miranda, Daniel Fernandes Macedo, Luiz F. M. Vieira, Marcos Augusto M. Vieira. 1-5 [doi]
- An IMU-based turn prediction systemYu-Chang Ho, Pei-Chen Lee, Hsin-Yu Yeh, Min-Te Sun, Andy An-Kai Jeng. 1-6 [doi]
- RTP packet loss healing on a bare-metal switchLeonhard Nobach, Jeremias Blendin, Hans-Jörg Kolbe, Georg Schyguda, David Hausheer. 1-2 [doi]
- Low-reaction time FPGA-based DDoS detectorBalázs Nagy, Peter Orosz, Pál Varga. 1-2 [doi]
- Identifying performance bottlenecks in software data planes for cloud-based NFV servicesMichel S. Bonfim, Rafael Roque, Emanuel Coutinho, Kelvin Lopes Dias, Stenio Fernandes. 1-7 [doi]
- Applying gated recurrent units pproaches for workload predictionYanghu Guo, Wenbin Yao. 1-6 [doi]
- Flexibility and dynamicity for open network-as-a-service: From VNF and architecture modeling to deploymentAmina Boubendir, Emmanuel Bertin, Noemie Simoni. 1-6 [doi]
- Energy-saving management mechanism based on hybrid energy supplies in multi-operator shared LTE networksLu Liu, Ao Xiong, Peng Yu 0001, Lei Feng, Wenjing Li, Xuesong Qiu, Mingxiong Wang. 1-5 [doi]
- Multi-constrained maximally disjoint routing mechanismXin Zhang, Lanlan Rui, Jiawen Li, Xuesong Qiu, Shaoyong Guo, Wei Lin. 1-7 [doi]
- An efficient topology reconfiguration algorithm under targeted attacks and failuresWei Chang, Guochu Shou, Yaqiong Liu, Zhigang Guo, Yihong Hu, Jing Liu. 1-5 [doi]
- A blockchain-based PKI management frameworkAlexander Yakubov, Wazen M. Shbair, Anders Wallbom, David Sanda, Radu State. 1-6 [doi]
- Adaptively scaled back-off (ASB) mechanism for enhanced performance of CSMA/CA in IEEE 802.11ax high efficiency WLANNurullah Shahin, Rashid Ali, Sung Won Kim, Young-Tak Kim. 1-5 [doi]
- Bargaining game for effective coexistence between LTE-U and Wi-Fi systemsAnupam Kumar Bairagi, Nguyen H. Tran, Walid Saad, Choong Seon Hong. 1-8 [doi]
- Trading virtual machines to stabilize revenue in public cloudsNoriaki Kamiyama. 1-8 [doi]
- A QoS monitoring system for LTE small cellsMing-Yen Wu, Yu-Hsiang Lin, Tse-Hsiang Tseng, Chen-Min Hsu, Kai-Sheng Hsu, Hey-Chyi Young. 1-4 [doi]
- Cookbook, a recipe for fault localizationRobert Harper, Philip Tee. 1-6 [doi]
- Fogernetes: Deployment and management of fog computing applicationsCecil Wöbker, Andreas Seitz, Harald Mueller, Bernd Bruegge. 1-7 [doi]
- Dynamic video bitrate adaptation for WebRTC-based remote teaching applicationsStefano Petrangeli, Dries Pauwels, Jeroen van der Hooft, Jürgen Slowack, Tim Wauters, Filip De Turck. 1-5 [doi]
- Load-aware potential-based routing for the edge communication of smart grid with content-centric networkXiaotong Wang, Lanlan Rui, Hui Guo, Xuesong Qiu. 1-5 [doi]
- A data model for federated network and security management information exchange in inter-organizational IT service infrastructuresMichael Steinke, Wolfgang Hommel. 1-2 [doi]
- From raw data packets to ingress egress traffic matrix: The distributed MapReduce-based solutionMarco Polverini, Antonio Cianfrani, Andrea Baiocchi, Marco Listanti, Valentina Salvatore. 1-6 [doi]
- A green VNFs placement and chaining algorithmOussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache. 1-5 [doi]
- Quantifying security and privacy in Internet of Things solutionsFaisal Alsubaei, Abdullah Abuhussein, Sajjan G. Shiva. 1-6 [doi]
- A management framework for secure multiparty computation in dynamic environmentsMarcel von Maltitz, Stefan Smarzly, Holger Kinkelin, Georg Carle. 1-7 [doi]
- DDoS defense using MTD and SDNJessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras, Gabi Dreo. 1-9 [doi]
- DASMO: A scalable approach to network slices management and orchestrationSlawomir Kuklinski, Lechoslaw Tomaszewski. 1-6 [doi]
- SFCPerf: An automatic performance evaluation framework for service function chainingIgor Jochem Sanz, Diogo Menezes Ferrazani Mattos, Otto Carlos Muniz Bandeira Duarte. 1-9 [doi]
- Towards efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11Mikolaj Chwalisz, Adam Wolisz. 1-7 [doi]
- Trustworthy configuration management for networked devices using distributed ledgersHolger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle. 1-5 [doi]
- An adaptation aware hybrid client-cache approach for video delivery with dynamic adaptive streaming over HTTPSheyda Kiani Mehr, Parikshit Juluri, Mahesh Maddumala, Deep Medhi. 1-5 [doi]
- A declarative approach for service enablement on hybrid cloud orchestration enginesNeeraj Asthana, Tom Chefalas, Alexei A. Karve, Alla Segal, Mahika Dubey, Sai Zeng. 1-7 [doi]
- Automated diagnostic of virtualized service performance degradationJawwad Ahmed, Tim Josefsson, Andreas Johnsson, Christofer Flinta, Farnaz Moradi, Rafael Pasquini, Rolf Stadler. 1-9 [doi]
- Unikernel-based approach for software-defined security in cloud infrastructuresMaxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou. 1-7 [doi]
- On performance observability in IoT systems using active measurementsAndreas Johnsson, Christian Rohner. 1-5 [doi]
- Next generation single board clustersJeremy Singer, Herry Herry, Philip J. Basford, Wajdi Hajji, Colin S. Perkins, Fung Po Tso, Dimitrios Pezaros, Robert D. Mullins, Eiko Yoneki, Simon J. Cox, Steven J. Johnston. 1-3 [doi]
- Cloud aid - A cloud computing tool for mitigating side-channel attacksRicardo Bianchin Gomes, Roseclea Duarte Medina, Fernando Gomes Moro. 1-5 [doi]
- The risks and dangers of relying on blockchain technology in underdeveloped countriesChristopher G. Harris. 1-4 [doi]
- A threat modeling approach for cloud storage brokerage and file sharing systemsKennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Feng Cheng 0002, Christoph Meinel, Hendrik Graupner. 1-5 [doi]
- Rapid prototyping of flow-based detection methods using complex event processingPetr Velan, Martin Husák, Daniel Tovarnák. 1-3 [doi]
- Towards a management plane for smart contracts: Ethereum case studyNida Khan, Abdelkader Lahmadi, Jérôme François, Radu State. 1-6 [doi]
- Optimization on parametric modelFenfen Huang, Wenbin Yao. 1-5 [doi]
- Artificial neural network model to predict affinity for virtual network functionsArthur Selle Jacobs, Ricardo Jose Pfitscher, Ricardo Luis dos Santos, Muriel Figueredo Franco, Eder John Scheid, Lisandro Zambenedetti Granville. 1-9 [doi]
- 5G networks must be autonomic!Sven van der Meer, John Keeney, Liam Fallon. 1-5 [doi]
- HomeNetRescue: An SDN service for troubleshooting home networksAlisson R. Alves, Henrique D. Moura, Jonas R. A. Borges, Vinicius F. S. Mota, Luis H. Cantelli, Daniel F. Macedo, Marcos Augusto M. Vieira. 1-7 [doi]
- A QoS guarantee mechanism based on multi-priority bionic competition model in vehicular edge etworkYao Zhang, Lanlan Rui, Hui Guo, Xuesong Qiu, Linwei. 1-5 [doi]
- Network events in a large commercial network: What can we learn?Antoine Messager, George Parisis, Robert Harper, Philip Tee, Istvan Z. Kiss, Luc Berthouze. 1-6 [doi]
- DLCP: A protocol for securing light client operation in blockchainsLeonardo da Costa, Andre Neto, Billy Pinheiro, Roberto Araujo, Antonio Abelém, Weverton Cordeiro. 1-6 [doi]
- Community based platform for vulnerability categorizationJana Komarkova, Lukas Sadlek, Martin Lastovicka. 1-2 [doi]
- Graph-based IoT microservice securityMarc-Oliver Pahl, Francois-Xavier Aubet, Stefan Liebald. 1-3 [doi]
- Filtering observations to improve resource control in virtual computer and network systemsPedro Martinez-Julia, Ved P. Kafle, Hiroaki Harai. 1-7 [doi]
- An unsupervised framework for detecting anomalous messages from syslog log filesRisto Vaarandi, Bernhards Blumbergs, Markus Kont. 1-6 [doi]
- An adaptive allocation scheme for load balancing and SLA maintenance in multi-location data center networksMirza Mohd Shahriar Maswood, Deep Medhi. 1-9 [doi]
- Efficient placement of edge computing devices for vehicular applications in smart citiesGopika Premsankar, Bissan Ghaddar, Mario Di Francesco, Rudi Verago. 1-9 [doi]
- Delay analysis of new-flow setup time in software defined networksAmer AlGhadhban, Basem Shihada. 1-7 [doi]
- Introducing network slice management inside M-CORD-based-5G frameworkMuhammad Tahir Abbas, Talha Ahmed Khan, Asif Mahmood, Javier Jose Diaz Rivera, Wang-Cheol Song. 1-2 [doi]
- On the configuration of radio resource management in a sliced RANJordi Pérez-Romero, Oriol Sallent, Ramon Ferrús, Ramón Agustí. 1-6 [doi]
- Evaluation of energy efficient radio-over-fiber for high-speed train testbedShahzoob Bilal Chundrigar, Osamah Ibrahiem Abdullaziz, Hsien-Wen Chang, Samer T. Talat, Chia-Lin Lai. 1-4 [doi]
- NeuTM: A neural network-based framework for traffic matrix prediction in SDNAbdelhadi Azzouni, Guy Pujolle. 1-5 [doi]
- Developing a Κ-ary malware using blockchainJoanna Moubarak, Maroun Chamoun, Eric Filiol. 1-4 [doi]
- PAX: Partition-aware autoscaling for the Cassandra NoSQL databaseSalvatore Dipietro, Rajkumar Buyya, Giuliano Casale. 1-9 [doi]
- Improvement of security and scalability for IoT network using SD-VPNLinda Shif, Fei Wang, Chung-Homg Lung. 1-5 [doi]
- Economic incentives on DNSSEC deployment: Time to move from quantity to qualityTho Le, Roland van Rijswijk-Deij, Luca Allodi, Nicola Zannone. 1-9 [doi]
- Decomposition-based VNF placement algorithm in TDM-WDM-based optical aggregation networkTakashi Miyamura, Akira Misawa, Junichi Kani. 1-7 [doi]
- Improving network flow definition: Formalization and applicabilityPetr Velan. 1-5 [doi]
- An HTTP/2 push-based framework for low-latency adaptive streaming through user profilingJeroen van der Hooft, Cedric De Boom, Stefano Petrangeli, Tim Wauters, Filip De Turck. 1-5 [doi]
- Resource-saving replication for controllers in multi controller SDN against network failuresLingyu Zhang, Ying Wang, Xuxia Zhong, Wenjing Li, Shaoyong Guo. 1-7 [doi]
- Multi-view feature selection for labeling noisy ticket dataWubai Zhou, Xiaolong Zhu, Tao Li, Larisa Shwartz, Genady Ya. Grabarnik. 1-4 [doi]
- Softwarized and distributed learning for SON management systemsTony Daher, Sana Ben Jemaa, Laurent Decreusefond. 1-7 [doi]
- Cost-efficient resource scheduling under QoS constraints for geo-distributed data centersMirza Mohd Shahriar Maswood, Robayet Nasim, Andreas J. Kassler, Deep Medhi. 1-9 [doi]
- A ring-based single-link failure recovery approach in SDN data planeSixiang Feng, Ying Wang, Xuxia Zhong, Junran Zong, Xuesong Qiu, Shaoyong Guo. 1-7 [doi]
- Passive os fingerprinting prototype demonstrationMartin Lastovicka, Daniel Filakovsky. 1-2 [doi]
- Improving response accuracy for classification- based conversational IT servicesYixin Diao, Daniela Rosu 0001. 1-15 [doi]
- Towards knowledge-defined networking using in-band network telemetryJonghwan Hyun, Nguyen Van Tu, James Won-Ki Hong. 1-7 [doi]
- Transfer learning for server behavior classification in small IT environmentsJasmina Bogojeska, Dorothea Wiesmann. 1-9 [doi]
- Lightweight IPS for port scan in OpenFlow SDN networksCharles V. Neu, Cassio G. Tatsch, Roben C. Lunardi, Regio A. Michelin, Alex M. S. Orozco, Avelino F. Zorzo. 1-6 [doi]
- Reasoning in agent-based network managementVilho Räisänen, Nokia Bell, Kasper Apajalahti. 1-7 [doi]
- EQuery: Enable event-driven declarative queries in programmable network measurementYongyi Ran, Xiaoban Wu, Peilong Li, Chen Xu, Yan Luo, Liang-min Wang. 1-7 [doi]
- Cachalot: A network-aware, cooperative cache network for geo-distributed, data-intensive applicationsFan Jiang, Claris Castillo, Stan Ahalt. 1-9 [doi]
- An SDN energy saving method based on topology switch and reroutingJunhua Ba, Ying Wang, Xuxia Zhong, Sixiang Feng, Xuesong Qiu, Shaoyong Guo. 1-5 [doi]
- Distributed control framework for mapreduce cloud on cloud computingTzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, Ce-Kuen Shieh. 1-4 [doi]
- Months into minutes: Rolling out changes faster with service management automationAlexander Keller, Chris Dawson. 1-14 [doi]
- Framework for precise protocol reverse engineering based on network tracesYoung-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim. 1-4 [doi]
- A model for quantifying performance degradation in virtual network function service chainsRicardo J. Pfitscher, Arthur Selle Jacobs, Eder J. Scheid, Muriel Figueredo Franco, Ricardo Luis dos Santos, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville. 1-9 [doi]
- Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypotEmmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser. 1-2 [doi]
- An architecture and implementation of automatic network slicing for microservicesYuki Minami, Atsushi Taniguchi, Taichi Kawabata, Norio Sakaida, Katsuhiro Shimano. 1-4 [doi]
- SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacksSong Wang, Sathyanarayanan Chandrasekharan, Karina Mabell Gomez, Kandeepan Sithamparanathan, Akram Al-Hourani, Muhammad Rizwan Asghar, Giovanni Russello, Paul Zanna. 1-5 [doi]
- Hybrid holiday traffic predictions in cellular networksMeng Xu, Qiaoling Wang, Qinliang Lin. 1-6 [doi]
- Centralized approach for trustworthy message dissemination in VANETRakesh Shrestha, Rojeena Bajracharya, Seung Yeob Nam. 1-5 [doi]
- Multi-operator backup power sharing in wireless base stationsMinh N. H. Nguyen, Nguyen H. Tran, Mohammad A. Islam, Chuan Pham, Shaolei Ren, Choong Seon Hong. 1-9 [doi]
- Slicing aware QoS/QoE in software defined smart home networkSaoussen Chaabnia, Aref Meddeb. 1-5 [doi]
- A testbed for policy driven closed loop network managementJoseph McNamara, John Keeney, Liam Fallon, Sven van der Meer, Enda Fallon. 1-6 [doi]
- Anomaly detection for Smart City applications over 5G low power wide area networksJose Santos, Philip Leroux, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Realizing services and slices across multiple operator domainsIshan Vaishnavi, János Czentye, Molka Gharbaoui, Giovanni Giuliani, David Haja, János Harmatos, David Jocha, Yoonhee Kim, Barbara Martini, Javier Melian, Paolo Monti, Balázs Németh, Wint Yi Poe, Aurora Ramos, Andrea Sgambelluri, Balázs Sonkoly, László Toka, Francesco Tusa, Carlos Jesus Bernardos, Róbert Szabó. 1-7 [doi]
- Uplink resource allocation for trade-off between throughput and fairness in C-RAN-based neighborhood area networkXiao Cheng, Lei Feng, Fanqin Zhou, Wenjing Li, Peng Yu, Xuesong Qiu, Lei Wei. 1-6 [doi]
- A truthful online auction mechanism for deadline-aware cloud resource allocationTianrong Zhang, Yufeng Xin. 1-9 [doi]
- Stream4Flow: Real-time IP flow host monitoring using Apache SparkTomás Jirsík. 1-2 [doi]
- Detecting DDoS attacks within milliseconds by using FPGA-based hardware accelerationBalázs Nagy, Peter Orosz, Tamas Tothfalusi, László Kovács, Pál Varga. 1-4 [doi]
- Resource discovery and share mechanism in disconnected ubiquitous stub networkYanfu Jiang, Shaoyong Guo, Si-Ya Xu, Xuesong Qiu, Luoming Meng. 1-7 [doi]
- DAMUP: Practical and privacy-aware cloud-based DDoS mitigationSu-Chin Lin, Po-Wei Huang, Hsin-Yi Wang, Hsu-Chun Hsiao. 1-6 [doi]
- Towards a security monitoring plane for named data networking and its application against content poisoning attackHoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor. 1-9 [doi]
- Using domain knowledge for targeted alerting in PBA for IT service managementHongtan Sun, Karin Murthy, Raghav Batta, Maja Vukovic. 1-6 [doi]
- Peer-to-peer secure updates for heterogeneous edge devicesHerry Herry, Emily Band, Colin Perkins, Jeremy Singer. 1-5 [doi]
- Synaptic: A formal checker for SDN-based security policiesNicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz. 1-2 [doi]
- Evaluation of machine learning techniques for network intrusion detectionMarzia Zaman, Chung-Horng Lung. 1-5 [doi]
- Hotspot localization and prediction in wireless cellular networks via spatial traffic fittingXiang Zhang, Fanqin Zhou, Jiayi Ning, Peng Yu, Wenjing Li. 1-6 [doi]
- Design and implementation of an automated and decentralized pollution monitoring system with blockchains, smart contracts, and LoRaWANSina Rafati Niya, Sanjiv S. Jha, Thomas Bocek, Burkhard Stiller. 1-4 [doi]
- Building a version control system in the Hadoop HDFSTsozen Yeh, Tingyu Chien. 1-5 [doi]
- Verification for security monitoring SLAs in IaaS clouds: The example of a network IDSAmir Teshome, Louis Rilling, Christine Morin. 1-7 [doi]
- Quality of experience and access network traffic management of HTTP adaptive video streamingMichael Seufert, Phuoc Tran-Gia. 1-8 [doi]
- An approximate all-terminal reliability evaluation method for large-scale smart grid communication systemsWenjun Jin, Peng Yu, Ao Xiong, Qiang Zhang, Dan Jin, Geng Zhang, Yang Wang. 1-5 [doi]
- Service function chaining policy compliance checkingYangjun Qiu, Xiaofeng Qiu, Yibin Cai. 1-4 [doi]
- Toward real-time network-wide cyber situational awarenessTomás Jirsík, Pavel Celeda. 1-7 [doi]
- HoneyDrone: A medium-interaction unmanned aerial vehicle honeypotJörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis. 1-6 [doi]
- Equal-volume quantization of mobile network data using bounding spheres and boxesMarton Kajo, Benedek Schultz, Janne Ali-Tolppa, Georg Carle. 1-9 [doi]
- Vertex-centric distributed computation for mapping virtual networks across domainsQiong Zhang, Xiaoyong Liang, Yi Zhu, Xi Wang, Paparao Palacharla, Vibha Sarin, Tadashi Ikeuchi. 1-8 [doi]
- Securing configuration management and migration of virtual network functions using blockchainIgor Drummond Alvarenga, Gabriel A. F. Rebello, Otto Carlos M. B. Duarte. 1-9 [doi]
- Real-time detection, isolation and monitoring of elephant flows using commodity SDN systemSharat Chandra Madanapalli, Minzhao Lyu, Himal Kumar, Hassan Habibi Gharakheili, Vijay Sivaraman. 1-5 [doi]
- Generation of SDN policies for protecting android environments based on automata learningNicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz. 1-7 [doi]
- A new algorithm of route design against large-scale disastersTakuma Tsubaki, Mika Ishizuka, Seisho Yasukawa. 1-5 [doi]
- Licensed shared access by mobile networks: Proof-of-concept demonstration over ViSSA platformJing-Yung Fang, Taiho Lin, Calvin Chang, Cheng-Feng Yang, Hsu-Chi Su, Che-Yu Lu, Bo-Chun Wang, Ching-Han Hung, Pi-Chen Chiu, Miles Wang, Din-Bin Lin, Chun-Ting Chou, Tsang-Ling Sheu, Shi-Chung Chang. 1-2 [doi]
- Streaming Botnet traffic analysis using bio-inspired active learningSara Khanchi, A. Nur Zincir-Heywood, Malcolm I. Heywood. 1-6 [doi]
- Integrating network management information into the SDN control planeStanislav Lange, Lorenz Reinhart, Thomas Zinner, David Hock, Nicholas Gray, Phuoc Tran-Gia. 1-9 [doi]
- Model-based flow delegation for improving SDN infrastructure compatibilityFelipe A. Lopes, Pablo Tiburcio, Robert Bauer, Stenio Fernandes, Martina Zitterbart. 1-9 [doi]
- Design and implementation of a load shedding engine for solving starvation problems in Apache KafkaJiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi. 1-4 [doi]
- HoneyV: A virtualized honeynet system based on network softwarizationBahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski. 1-5 [doi]
- Monitoring the transaction selection policy of Bitcoin mining poolsBeltran Borja Fiz Pontiveros, Robert Norvill, Radu State. 1-6 [doi]
- Kathará: A container-based framework for implementing network function virtualization and software defined networksGaetano Bonofiglio, Veronica Iovinella, Gabriele Lospoto, Giuseppe Di Battista. 1-9 [doi]
- Traffic-aware user association in heterogeneous LTE/WiFi radio access networksDavit Harutyunyan, Supreeth Herle, Dimitri Maradin, George Agapiu, Roberto Riggio. 1-8 [doi]
- Balancing the migration of virtual network functions with replications in data centersFrancisco Carpio, Admela Jukan, Rastin Pries. 1-8 [doi]
- Cost-aware service function chain orchestration across multiple data centersXuxia Zhong, Ying Wang, Xuesong Qiu, Shaoyng Guo. 1-7 [doi]
- Fast packet classification on OpenFlow switches using multiple R*-tree based bitmap intersectionDing-Fong Huang, Chien Chen, Mahadevan Thanavel. 1-9 [doi]
- Passive os fingerprinting methods in the jungle of wireless networksMartin Lastovicka, Tomás Jirsík, Pavel Celeda, Stanislav Spacek, Daniel Filakovsky. 1-9 [doi]
- Distributed access control on IoT ledger-based architectureRoben Castagna Lunardi, Regio Antonio Michelin, Charles Varlei Neu, Avelino Francisco Zorzo. 1-7 [doi]
- Demo: Adaptive policy execution (APEX)Sven van der Meer, John Keeney, Liam Fallon, Joseph McNamara. 1-2 [doi]
- Autonomic resource arbitration and service-continuable network function migration along service function chainsTakaya Miyazawa, Masahiro Jibiki, Ved P. Kafle, Hiroaki Harai. 1-9 [doi]
- Leveraging NFV for the deployment of NDN: Application to HTTP traffic transportXavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor. 1-5 [doi]
- Implementing service-centric model with P4: A fully-programmable approachAhmet Cihat Baktir, Atay Ozgovde, Cem Ersoy. 1-6 [doi]
- A decision-making mechanism of network risk control based on grey relationMeng Li, Wenjing Li 0001, Xiangjian Zeng, Peng Yu 0001, Xuesong Qiu. 1-4 [doi]
- Evaluation of the node importance in power grid communication network and analysis of node riskMeng Zhou, Lanlan Rui, Xuesong Qiu, Zhen Xia, Biyao Li. 1-5 [doi]
- Live distributed controller migration for software-defined data center networksWoojoong Kim, James Won-Ki Hong, Young-Joo Suh. 1-5 [doi]
- Effective resource provisioning for QoS-aware virtual networks in SDNPrashanth Podili, Kotaro Kataoka. 1-9 [doi]
- Wi-balance: Channel-aware user association in software-defined Wi-Fi networksEstefania Coronado, Roberto Riggio, José Villalón, Antonio Garrido. 1-9 [doi]
- Visual emulation for Ethereum's virtual machineRobert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Andrea J. Cullen. 1-4 [doi]
- A language model for compromised user analysisA. Nur Zincir-Heywood, Tien D. Phan. 1-4 [doi]
- Lessons from operating systems for layering and abstractions in 5G networksStuart Clayman, Daphné Tuncer. 1-7 [doi]
- Adaptive configuration of lora networks for dense IoT deploymentsMariusz Slabicki, Gopika Premsankar, Mario Di Francesco. 1-9 [doi]
- On the feasibility of using hybrid evolutionary dynamic optimization for optimal monitor selection in dynamic communication networksRobin Mueller-Bady, Martin Kappes, Inmaculada Medina-Bulo, Francisco Palomo-Lozano. 1-4 [doi]
- AP selection algorithm based on a potential game for large IEEE 802.11 WLANsAlessandro Raschella, Faycal Bouhafs, M. Mackay, Q. Shi, Jorge Ortín, José Ramón Gallego, María Canales. 1-7 [doi]
- Demonstration of efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11Mikolaj Chwalisz. 1-2 [doi]
- OpenFlow-based virtual TAP using open vSwitch and DPDKSeyeon Jeong, Doyoung Lee, Jian Li, James Won-Ki Hong. 1-9 [doi]
- Taming policy complexity: Model to executionSven van der Meer, John Keeney, Liam Fallon. 1-8 [doi]
- SDN-based hybrid server and link load balancing in multipath distributed storage systemsLuis Guillen, Satoru Izumi, Toru Abe, Takuo Suganuma, Hiroaki Muraoka. 1-6 [doi]
- Two-stage anomaly detection using application specific heavy hitter analysisBeibei Yang, Akihiro Nakao. 1-4 [doi]
- The smallest software defined network testbed in the world: Performance and securitySong Wang, Karina Gomez Chavez, Kandeepan Sithamparanathan, Paul Zanna. 1-2 [doi]
- Joint multicast routing and OFDM resource allocation in LTE-D2D 5G cellular networkSafwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi. 1-9 [doi]
- Protecting location privacy in opportunistic mobile social networksRui Huang, Bidi Ying, Amiya Nayak. 1-8 [doi]
- An approach to deploy service function chains in satellite networksYibin Cai, Ying Wang, Xuxia Zhong, Wenjing Li 0001, Xuesong Qiu, Shaoyong Guo. 1-7 [doi]
- Evaluation and experimental demonstration of SDN-enabled flexi-grid optical domain controller based on NETCONF/YANGBogdan Andrus, Achim Autenrieth, Thomas Szyrkowiec, J. J. Vegas Olmos, Idelfonso Tafur Monroy. 1-7 [doi]
- Network attack traffic detection using seed based sequential grouping modelJee-Tae Park, Sung-Ho Lee, Young-Hoon Goo, Ui-Jun Baek, Myung-Sup Kim. 1-4 [doi]
- Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structureKyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova, Myung-Sup Kim. 1-4 [doi]
- Blockchain orchestration anpriority bionic competition ork: A case study of KYCWazen M. Shbair, Mathis Steichen, Jérôme François, Radu State. 1-6 [doi]
- Live demonstration of FPGA based networking accelerator for 200 Gbps data transfersLukas Kekely, Martin Spinier, Stepan Friedl, Jiri Sikora, Jan Korenek. 1-3 [doi]
- Wi-Not: Exploiting radio diversity in software-defined 802.11-based WLANsEstefania Coronado, Davit Harutyunyan, Roberto Riggio, José Villalón, Antonio Garrido. 1-4 [doi]
- Melting the snow: Using active DNS measurements to detect snowshoe spam domainsOlivier van der Toorn, Roland van Rijswijk-Deij, Bart Geesink, Anna Sperotto. 1-9 [doi]
- Nodes contact probability estimation approach based on Bayesian network for DTNYuebin Bai, Xu Shao, Wentao Yang, Weitao Wang, Peng Feng, Shuai Liu, Xudong Zhang, Rui Wang. 1-4 [doi]
- Evaluating predictors of congestion collapse in communication networksChristopher Dabrowski, Kevin Mills. 1-9 [doi]
- An intelligent sound alam recognition system for smart cars and smart homesItai Dabran, Ofir Elmakias, Ron Shmelkin, Yishai Zusman. 1-4 [doi]
- Flexible distributed control plane deploymentShaoteng Liu, Rebecca Steinert, Dejan Kostic. 1-7 [doi]
- Optimized XG-PON DBA mechanism for front-haul upstream traffic in virtualized small cell cloud-RAN architectureAhmed Mohammed Mikaeil, Weisheng Hu. 1-7 [doi]
- Lightweight and flexible single-path congestion control couplingSafiqul Islam, Michael Welzl, Stein Gjessing. 1-6 [doi]
- How far can we push flow analysis to identify encrypted anonymity network traffic?Khalid Shahbar, A. Nur Zincir-Heywood. 1-6 [doi]
- Big torrent measurement: A country-, network-, and content-centric analysis of video sharing in BitTorrentAndri Lareida, Burkhard Stiller. 1-9 [doi]
- A container scheduling strategy based on neighborhood division in micro serviceYanghu Guo, Wenbin Yao. 1-6 [doi]
- Setting up flexible and light weight trading with enhanced user privacy using smart contractsSina Rafati Niya, Florian Shupfer, Thomas Bocek, Burkhard Stiller. 1-2 [doi]
- Machine learning as a reusable microserviceMarc-Oliver Pahl, Markus Loipfinger. 1-7 [doi]
- Streaming scalable video sequences with media-aware network elements implemented in P4 programming languageGuan-Ru Wang, Chien Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu. 1-2 [doi]
- JOX: An event-driven orchestrator for 5G network slicingKostas Katsalis, Navid Nikaein, Anta Huang. 1-9 [doi]
- A network traffic flow prediction with deep learning approach for large-scale metropolitan area networkWeitao Wang, Yuebin Bai, Chao Yu, Yuhao Gu, Peng Feng, Xiaojing Wang, Rui Wang. 1-9 [doi]
- Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technologyMichael Grabatin, Wolfgang Hommel. 1-6 [doi]
- Generation mechanism of flaming phenomena in on-line social networks described by perturbation of asymmetric link effectsMasaki Aida, Chisa Takano, Masayuki Murata. 1-4 [doi]
- An adaptive data placement strategy in scientific workflows over cloud computing environmentsHeewon Kim, Yoonhee Kim. 1-5 [doi]
- Centroid-based KNN query in mobile service of LBSHuan Zhao, Meng Li. 1-6 [doi]
- QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANsShinnazar Seytnazarov, Young-Tak Kim. 1-7 [doi]
- A cost optimized reverse influence maximization in social networksAshis Talukder, Md. Golam Rabiul Alam, Nguyen H. Tran, Choong Seon Hong. 1-9 [doi]
- Complex solution for VoLTE monitoring and cross-protocol data analysisPál Varga, Tamas Tothfalusi, Zsolt Balog, Gábor Sey. 1-4 [doi]
- An efficient tuple pruning scheme for packet classification using on-chip filtering and indexingShaowei Zhao, Junmao Li, Dagang Li. 1-7 [doi]
- Al-assisted workflow management framework for automated closed-loop operationTatsuji Miyamoto, Keisuke Kuroki, Masanori Miyazawa, Michiaki Hayashi. 1-6 [doi]
- Application performance optimization using application-aware networkingShuai Zhao 0002, Deep Medhi. 1-6 [doi]
- LightMANO: Converging NFV and SDN at the edges of the networkRoberto Riggio, Shah Nawaz Khan, Tejas Subramanya, Imen Grida Ben Yahia, Diego R. Lopez. 1-9 [doi]
- Fingerprinting encrypted network traffic types using machine learningSam Leroux, Steven Bohez, Pieter-Jan Maenhaut, Nathan Meheus, Pieter Simoens, Bart Dhoedt. 1-5 [doi]
- Extending IoT/M2M system scalability by network slicingDavid de la Bastida, Fuchun Joseph Lin. 1-8 [doi]
- Wireless network virtualization with non-orthogonal multiple accessTai Manh Ho, Nguyen H. Tran, S. M. Ahsan Kazmi, Zhu Han, Choong Seon Hong. 1-9 [doi]
- A service routing reconstruction approach in cyber-physical power system based on risk balanceOuzhou Dong, Peng Yu, Huiyong Liu, Lei Feng, Wenjing Li 0001, Fang Chen, Lei Shi. 1-6 [doi]
- Energy-efficient SDN control and visualizationTao Li, Yuanjun Sun, Marek Sobe, Thorsten Strufe, Silvia Santini. 1-2 [doi]
- PIM-compliant SDN-enabled IP multicast serviceLi-Hsing Yen, Ming-Hung Wang, Song-Yu Wu, Chien-Chao Tseng. 1-4 [doi]
- Cognitive radio : A method to achieve spectrum sharing in LTE-R systemHongyu Deng, Yiming Wang, Cheng Wu. 1-5 [doi]