Abstract is missing.
- Integrating Smart Production Planning Into Smart ProductionTobias Vogel 0003, Benjamin Gernhardt, Matthias Hemmje. 1-6 [doi]
- LogiSig: Automatic Interaction Detection in Software-based NetworksDaphné Tuncer, Marinos Charalambides. 1-9 [doi]
- Reinforcing Cloud Environments via Index Policy for Bursty WorkloadsVenkatraman Balasubramanian, Moayad Aloqaily, Olufogorehan Tunde-Onadele, Zhengyu Yang, Martin Reisslein. 1-7 [doi]
- Paddy: An Event Log Parsing Approach using Dynamic DictionaryShaohan Huang, Yi Liu, Carol Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan. 1-8 [doi]
- From Models to Management and Back: Towards a System-of-Systems Engineering ToolchainGéza Kulcsár, Kadosa Koltai, Szvetlin Tanyi, Bálint Péceli, Ákos Horváth 0001, Zoltán Micskei, Pál Varga. 1-6 [doi]
- Computing at the Edge: But, what Edge?Luis M. Contreras, Javier Baliosian, Pedro Martinez-Julia, Joan Serrat 0001. 1-9 [doi]
- Towards a Framework for Automatic Firewalls Configuration via Argumentation ReasoningErisa Karafili, Fulvio Valenza, Yichen Chen, Emil C. Lupu. 1-4 [doi]
- DeepSIP: A System for Predicting Service Impact of Network Failure by Temporal Multimodal CNNYoichi Matsuo, Tatsuaki Kimura, Ken Nishimatsu. 1-6 [doi]
- Anomaly prediction in mobile networks : A data driven approach for machine learning algorithm selectionImed Hadj-Kacem, Sana Ben Jemaa, Sylvain Allio, Yosra Ben Slimen. 1-7 [doi]
- PleBeuS: a Policy-based Blockchain Selection FrameworkEder J. Scheid, Daniel Lakic, Bruno Bastos Rodrigues, Burkhard Stiller. 1-8 [doi]
- Automated Keyword Extraction from "One-day" Vulnerabilities at DisclosureClément Elbaz, Louis Rilling, Christine Morin. 1-9 [doi]
- IoT or NoT: Identifying IoT Devices in a Short Time ScaleAnat Bremler-Barr, Haim Levy, Zohar Yakhini. 1-9 [doi]
- Programmable and Automated Deployment of Tenant-Managed SDN Network SlicesMolka Gharbaoui, Barbara Martini, Piero Castoldi. 1-6 [doi]
- Distributed DDoS Defense: A collaborative Approach at Internet ScaleJessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras. 1-6 [doi]
- Enabling Elasticity Control Functions for Cloud-Network Slice-Defined DomainsAlisson Medeiros, Augusto Neto 0001, Silvio Sampaio, Rafael Pasquini, Javier Baliosian. 1-7 [doi]
- Allocating and Scheduling Measurement ApplicationsRaquel Rugani Lage, Anthony Lambert. 1-9 [doi]
- A Novel Flow-level Session Descriptor With Application to OS and Browser IdentificationOmar Richardson, Johan Garcia. 1-9 [doi]
- Optimizing the Flexibility of SDN Control PlaneMu He, Mei-Yuan Huang, Wolfgang Kellerer. 1-9 [doi]
- Improved Fault Localization using Transfer Learning and Language ModelingYusufu Shehu, Robert Harper 0004. 1-6 [doi]
- An Empirical Study of the Effectiveness of Fallback on the ECNLinzhi Zoul, Chun-Xiang Chen, Kenichi Nagaoka. 1-4 [doi]
- SDN-assisted containerized security and monitoring componentsMiguel Borges de Freitas, Pedro Quitério, Luís Rosa, Tiago Cruz, Paulo Simões 0001. 1-5 [doi]
- λBGP: Rethinking BGP programmabilityNicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas J. P. Race, David Hutchison. 1-9 [doi]
- Demo: Deploying Transparent Applications at the Network Edges with LightEdgeEstefania Coronado, Zarrar Yousaf, Roberto Riggio. 1-2 [doi]
- Process mining-based approach for investigating malicious login eventsSofiane Lagraa, Radu State. 1-5 [doi]
- Scalable Traffic Engineering for Higher Throughput in Heavily-loaded Software Defined NetworksChe Zhang, Shiwei Zhang, Yi Wang, Weichao Li, Bo Jin, Ricky K. P. Mok, Qing Li, Hong Xu. 1-7 [doi]
- A scalable SON coordination framework for 5GDiego Fernando Preciado Rojas, Andreas Mitschele-Thiel. 1-8 [doi]
- A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt SystemsMalte Granderath, Jürgen Schönwälder. 1-6 [doi]
- A Machine Learning-Based Framework to Estimate the Lifetime of Network Line CardsJuan Luis Herrera, Marco Polverini, Jaime Galán-Jiménez. 1-5 [doi]
- Load Migration in Distributed SDN ControllersMohammad Amin Beiruti, Yashar Ganjali. 1-9 [doi]
- A Privacy-Aware Collaborative DDoS Defence NetworkCarol Fung, Yadunandan Pillai. 1-5 [doi]
- Intent-Based Orchestration of Network Slices and Resource Assurance using Machine LearningTalha Ahmed Khan, Asif Mehmood, Javier Jose Diaz Rivera, Muhammad Afaq, Khizar Abbas, Wang-Cheol Song. 1-2 [doi]
- Delay-Aware NFV Resource Allocation with Deep Reinforcement LearningNingcheng Yuan, Wenchen He, Jing Shen, Xuesong Qiu, Shaoyong Guo, Wenjing Li 0001. 1-7 [doi]
- Capacity Expansion and Modernization of Core Network Elements Running on ATCA PlatformAttila Hilt, József Varga, Gábor Járó. 1-5 [doi]
- Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc NetworksGi Tae Kim, Constantin Serban, Ritu Chadha. 1-7 [doi]
- Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous NetworksMartin Lastovicka, Martin Husák, Lukás Sadlek. 1-6 [doi]
- Is it time for a 999-like (or 112/911) system for critical information servicesƒEmeka Obiodu, Nishanth Sastry, Aravindh Raman. 1-6 [doi]
- Layer-Integrated Edge Distributed Data Store for Real-time and Stateful ServicesKoichiro Amemiya, Akihiro Nakao. 1-9 [doi]
- Protecting Home Networks From Insecure IoT DevicesElmer Lastdrager, Cristian Hesselman, Jelte Jansen, Marco Davids. 1-6 [doi]
- Kathará: A Lightweight Network Emulation SystemMariano Scazzariello, Lorenzo Ariemma, Tommaso Caiazzi. 1-2 [doi]
- HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain DetectionXiaoqing Sun, Jiahai Yang, Zhiliang Wang, Heng Liu. 1-9 [doi]
- Decentralization of 5G slice resource allocationFrancesca Fossati, Stefano Moretti, Stephane Rovedakis, Stefano Secci. 1-9 [doi]
- Going Beyond DiffServ in IP Traffic ClassificationDavide Aureli, Antonio Cianfrani, Alessio Diamanti, José Manuel Sánchez-Vilchez, Stefano Secci. 1-6 [doi]
- Resource Allocation and Management Techniques for Network Slicing in WiFi NetworksMatias Richart, Javier Baliosian, Joan Serrat 0001, Juan-Luis Gorricho. 1-6 [doi]
- Joint Resource and Admission Management for Slice-enabled NetworksSina Ebrahimi, Abulfazl Zakeri, Behzad Akbari, Nader Mokari. 1-7 [doi]
- A Cloud-Agnostic Framework to Enable Cost-Aware Scheduling of Applications in a Multi-Cloud EnvironmentFan Jiang, Kyle Ferriter, Claris Castillo. 1-9 [doi]
- A Process Mining Tool for Supporting IoT SecurityAdrien Hemmer, Rémi Badonnel, Jérôme François, Isabelle Chrisment. 1-2 [doi]
- 2oT Systems in the I4 EraSina Rafati Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller. 1-9 [doi]
- Towards Efficient and Adaptable Monitoring of Softwarized Mobile NetworksAlan Plascinskas, Xenofon Foukas, Mahesh K. Marina. 1-6 [doi]
- Adaptive scaling of Kubernetes podsDavid Balla, Csaba Simon, Markosz Maliosz. 1-5 [doi]
- Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia SubsystemMario Di Mauro, Giovanni Galatro, Maurizio Longo, Arcangelo Palma, Fabio Postiglione, Marco Tambasco. 1-6 [doi]
- xRAC: Execution and Access Control for Restricted Application Containers on Managed HostsFrederik Hauser, Mark Schmidt 0002, Michael Menth. 1-9 [doi]
- Cost-aware Placement and Chaining of Service Function Chain with VNF Instance SharingHantao Guo, Ying Wang, Zifan Li, Xuesong Qiu, Hengbin An, Peng Yu 0001, Ningcheng Yuan. 1-8 [doi]
- Using Machine Learning to Estimate the Optimal Transmission Range for RPL NetworksMoussa Aboubakar, Mounir Kellil, Abdelmadjid Bouabdallah, Pierre Roux. 1-5 [doi]
- Scan Correlation - Revealing distributed scan campaignsSteffen Haas, Florian Wilkens, Mathias Fischer 0001. 1-6 [doi]
- MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack ClassificationJoão M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna. 1-9 [doi]
- Demo: NFV-based IoT Security at the ISP LevelYehuda Afek, Anat Bremler-Barr, David Hay, Lior Shafir, Ihab Zhaika. 1-2 [doi]
- MicroRCA: Root Cause Localization of Performance Issues in MicroservicesLi Wu, Johan Tordsson, Erik Elmroth, Odej Kao. 1-9 [doi]
- On the Detection of Persistent Attacks using Alert Graphs and Event Feature EmbeddingsBenjamin Burr, Shelly Wang, Geoff Salmon, Hazem M. Soliman. 1-4 [doi]
- Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart GridsThusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi. 1-9 [doi]
- Perfect is the Enemy of Good: Lloyd-Max Quantization for Rate Allocation in Congestion Control PlaneShiva Ketabi, Yashar Ganjali. 1-9 [doi]
- Scalable Monitoring Heuristics for Improving Network LatencyMaxime Mouchet, M. Randall, M. Ségneré, Isabel Amigo, Pablo Belzarena, Olivier Brun, Balakrishna J. Prabhu, Sandrine Vaton. 1-9 [doi]
- Performability Management of Softwarized IP Multimedia SubsystemMario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco. 1-6 [doi]
- Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoderKazuki Hara, Kohei Shiomoto. 1-8 [doi]
- Uncovering Vulnerable Industrial Control Systems from the Internet CoreMarcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch. 1-9 [doi]
- Industrial Grade Methodology for Firewall Simulation and Requirements VerificationRamon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi, Ina Schieferdecker. 1-7 [doi]
- The rise of eBPF for non-intrusive performance monitoringCyril Renaud Cassagnes, Lucian Trestioreanu, Clement Joly, Radu State. 1-7 [doi]
- On the Impact of Flow Monitoring ConfigurationPetr Velan, Tomás Jirsik. 1-7 [doi]
- Optimizing HAS for 360-Degree VideosChristian Moldovan, Frank Loh, Michael Seufert, Tobias Hoßfeld. 1-6 [doi]
- CONTRAST: Container-based Transcoding for Interactive Video StreamingSajad Sameti, Mea Wang, Diwakar Krishnamurthy. 1-9 [doi]
- Matching Theory Application for Efficient Allocation of Indivisible Testbed ResourcesDonatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas. 1-7 [doi]
- Megalos: A Scalable Architecture for the Virtualization of Network ScenariosMariano Scazzariello, Lorenzo Ariemma, Giuseppe Di Battista, Maurizio Patrignani. 1-7 [doi]
- Network Service Embedding with Multiple Resource DimensionsAngelos Pentelas, George Papathanail, Ioakeim Fotoglou, Panagiotis Papadimitriou 0001. 1-9 [doi]
- Blockchain Based Decentralized Framework for Energy Demand Response MarketplaceVarun Deshpande, Laurent George 0001, Hakim Badis, Alemayehu Addisu Desta. 1-9 [doi]
- SLA Driven Automatic Fault-Recovery Scheduling Method with Cost EvaluationAtsushi Takada, Toshihiko Seki, Kyoko Yamagoe. 1-6 [doi]
- RAIN: Towards Real-Time Core Devices Anomaly Detection Through Session Data in Cloud NetworkHaoyu Liu, Chongrong Fang, Yining Qi, Jian Bai, Shaozhe Wang, Xiong Xiao, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen. 1-6 [doi]
- Edge Concierge: Democratizing Cost-Effective and Flexible Network Operations using Network Layer AI at Private Network EdgesAnan Sawabe, Takanori Iwai, Kozo Satoda, Akihiro Nakao. 1-7 [doi]
- Using Blackbox ML Techniques to Diagnose QoE Problems for an IPTV ServiceJawwad Ahmed, Amadeu do Nascimento Júnior, Caner Kilinc, Dan Pan, Jaume Rius i Riu, Jörgen Gustafsson. 1-8 [doi]
- A Device Identification Method Based on Combination of Multiple InformationYuki Imamura, Nobuyuki Nakamura, Taketsugu Yao, Shingo Ata, Ikuo Oka. 1-4 [doi]
- Automated optimal firewall orchestration and configuration in virtualized networksDaniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov. 1-7 [doi]
- UAV-Assisted Vehicular Communication for Densely Crowded EnvironmentsOuns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, Haythem Bany Salameh. 1-4 [doi]
- AI Enabled Resource Allocation in Future Mobile NetworksUmer Rehman Mughal, Manzoor Ahmed Khan, Azam Beg, Ghulam Qadir Mughal. 1-6 [doi]
- Dividing Deep Learning Model for Continuous Anomaly Detection of Inconsistent ICT SystemsKengo Tajiri, Yasuhiro Ikeda, Yuusuke Nakano, Keishiro Watanabe. 1-5 [doi]
- Hardening X.509 Certificate Issuance using Distributed Ledger TechnologyHolger Kinkelin, Richard von Seck, Christoph Rudolf, Georg Carle. 1-6 [doi]
- P4STA: High Performance Packet Timestamping with Programmable Packet ProcessorsRalf Kundel, Fridolin Siegmund, Jeremias Blendin, Amr Rizk, Boris Koldehofe. 1-9 [doi]
- Demo: Efficient Multi-Service RAN Slice Management and OrchestrationRobert Schmidt, Navid Nikaein. 1-2 [doi]
- Using TLS Fingerprints for OS Identification in Encrypted TrafficMartin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda. 1-6 [doi]
- Decision Support for Mission-Centric Network Security ManagementMichal Javorník, Jana Komárková, Lukás Sadlek, Martin Husák. 1-6 [doi]
- Recovery command generation towards automatic recovery in ICT systems by Seq2Seq learningHiroki Ikeuchi, Akio Watanabe, Tsutomu Hirao, Makoto Morishita, Masaaki Nishino, Yoichi Matsuo, Keishiro Watanabe. 1-6 [doi]
- End-to-End Mobile Network Slice Embedding Leveraging Edge ComputingAndrea Fendt, Christian Mannweiler, Katja Ludwig, Lars-Christoph Schmelz, Bernhard Bauer. 1-7 [doi]
- Towards detecting DNSSEC validation failure with passive measurementsKensuke Fukuda, Yoshiro Yoneya, Takeshi Mitamura. 1-6 [doi]
- Reliable Network Slices based on Elastic Network Resource DemandGabriel da Silva, Dyego Oliveira, Rafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira. 1-9 [doi]
- Management of Smart Vehicular Handovers in Overlapped V2X NetworksHyundong Hwang, Young-Tak Kim. 1-6 [doi]
- Unveiling the Features of Network Dynamics: a Data-Oriented ApproachShibo Lu, Daphné Tuncer, Stuart Clayman. 1-5 [doi]
- Exploiting Case Based Reasoning to Automate Management of Network SlicesPedro Martinez-Julia, Jose Ordonez-Lucena, Ved P. Kafle, Hitoshi Asaeda, Diego López. 1-6 [doi]
- Distributed Real-time Forecasting Framework for IoT Network and Service ManagementDiogo Ferreira, Carlos R. Senna, Susana Sargento. 1-4 [doi]
- Inferring Cloud-Network Slice's Requirements from Non-Structured Service DescriptionRafael Pasquini, Javier Baliosian, Joan Serrat 0001, Juan-Luis Gorricho, Augusto Neto 0001, Fábio Verdi. 1-5 [doi]
- A Service Migration Method Based on Dynamic Awareness in Mobile Edge ComputingMenglei Zhang, Haoqiu Huang, Lanlan Rui, Guo Hui, Ying Wang, Xuesong Qiu. 1-7 [doi]
- NFV-based IoT Security for Home Networks using MUDYehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Avraham, Avraham Shalev. 1-9 [doi]
- Modelling Mobile Traffic Patterns Using A Generative Adversarial Neural NetworksBo Ma, Bowei Yang, Zitian Zhang, Jie Zhang. 1-7 [doi]
- Predicting Round-Trip Time Distributions in IoT Systems using Histogram EstimatorsChristofer Flinta, Wenqing Yan, Andreas Johnsson. 1-9 [doi]
- Preventing DDoS attacks in Path Identifiers-Based Information Centric NetworksBasheer Al-Duwairi, Öznur Özkasap. 1-5 [doi]
- Cyber Situation Awareness via IP Flow MonitoringTomás Jirsík, Pavel Celeda. 1-6 [doi]
- Towards an Asset Administration Shell scenario: a use case for interoperability and standardization in Industry 4.0Miguel A. Iñigo, Alain Porto, Blanca Kremer, Alain Perez, Felix Larrinaga, Javier Cuenca. 1-6 [doi]
- A Network Emulator for High-Precision Latency Forwarding over Packet-Programmable Networks (Demo Paper)Alexander Clemm, Toerless Eckert. 1-2 [doi]
- Simplification of the design, deployment, and testing of 5G vertical servicesMauro Femminella, Matteo Pergolesi, Gianluca Reali. 1-7 [doi]
- Graph-based evaluation of probability of disclosing the network structure by targeted attacksAndrei Privalov, Ekaterina Skudneva, Igor V. Kotenko, Igor Saenko. 1-6 [doi]
- STARC: Low-power Decentralized Coordination Primitive for Vehicular Ad-hoc NetworksPatrick Rathje, Valentin Poirot, Olaf Landsiedel. 1-6 [doi]
- DDoS Mitigation: A Measurement-Based ApproachMattijs Jonker, Anna Sperotto, Aiko Pras. 1-6 [doi]
- COSMOS: An Orchestration Framework for Smart Computation Offloading in Edge CloudsGeorge Papathanail, Ioakeim Fotoglou, Christos Demertzis, Angelos Pentelas, Kyriakos Sgouromitis, Panagiotis Papadimitriou 0001, Dimitrios Spatharakis, Ioannis Dimolitsas, Dimitrios Dechouniotis, Symeon Papavassiliou. 1-6 [doi]
- ElasticSDK: A Monitoring Software Development Kit for enabling Data-driven Management and Control in 5GXenofon Vasilakos, Berkay Köksal, Dwi Hartati Izaldi, Navid Nikaein, Robert Schmidt, Nasim Ferdosian, Riri Fitri Sari, Ray-Guang Cheng. 1-7 [doi]
- Environment Modeling and Abstraction of Network States for Cognitive FunctionsStephen S. Mwanje, Márton Kajó, Sayantini Majumdar, Georg Carle. 1-8 [doi]
- Hierarchical Congestion Control (HCC): Cooperation of Uncorrelated Flows for Better Fairness and ThroughputShiva Ketabi, Yashar Ganjali. 1-5 [doi]
- Cost-and-QoS-Based NFV Service Function Chain Mapping MechanismYimin Li, Lifang Gao, Siya Xu, Qinghai Ou, Xinyu Yuan, Feng Qi, Shaoyong Guo, Xuesong Qiu. 1-9 [doi]
- The Service Metrics and Performance Analysis of Internet Time ServiceJing Ling, Guochu Shou, Mengjie Guo, Yihong Hu. 1-6 [doi]
- An Engineering Process model for managing a digitalised life-cycle of products in the Industry 4.0Gianvito Urgese, Paolo Azzoni, Jan van Deventer, Jerker Delsing, Enrico Macii. 1-6 [doi]
- Microbursts in Software and Hardware-based Traffic Load GenerationRalf Kundel, Amr Rizk, Boris Koldehofe. 1-2 [doi]
- A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation SystemsTalal Halabi, Omar Abdel Wahab, Mohammad Zulkernine. 1-6 [doi]
- P4 Switch Code Data Flow Analysis: Towards Stronger Verification of Forwarding Plane SoftwareKarine Birnfeld, Diogo Campos da Silva, Weverton Cordeiro, Breno Bernard Nicolau de França. 1-8 [doi]
- Interference Cancellation for Software Defined Impulse Radio by Template DesignXufang Wang, Feng Lin, Wen-Kang Jia. 1-5 [doi]
- PRIME: Programming In-Network Modular ExtensionsRicardo Parizotto, Lucas Castanheira, Fernanda Bonetti, Anderson Santos da Silva, Alberto Schaeffer-Filho. 1-9 [doi]
- On the Implementation of Matching Theory Based Resource Allocation in Networking TestbedsDonatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas. 1-2 [doi]
- LoCHiP: A Distributed Collaborative Cache Management Scheme at the Network EdgeJunaid Ahmed Khan, Cédric Westphal, J. J. Garcia-Luna-Aceves, Yacine Ghamri-Doudane. 1-7 [doi]
- Demo: Execution and Access Control for Restricted Application Containers on Managed Hosts (xRAC)Frederik Hauser, Michael Menth. 1-2 [doi]
- Practical 5G KPI Measurement Results on a Non-Standalone ArchitectureGábor Soós, Dániel Ficzere, Pál Varga, Zsolt Szalay. 1-5 [doi]
- 5G Cloud-Native: Network Management & AutomationOsama Arouk, Navid Nikaein. 1-2 [doi]
- Two Decades of AI4NETS - AI/ML for Data Networks: Challenges & Research DirectionsPedro Casas. 1-6 [doi]
- Improvements to Multimedia Content Delivery over IEEE 802.11 NetworksEstefania Coronado, José Villalón, Antonio Garrido. 1-6 [doi]
- OpenFlow enabled Integrated Routing and Bridging over Ethernet Virtual Private NetworksPanagiotis Karamichailidis, Kostas Choumas, Thanasis Korakis. 1-5 [doi]
- Context and Location Awareness in Eco-Driving RecommendationsAndré B. Campolina, Azzedine Boukerche, Antonio A. F. Loureiro. 1-6 [doi]
- Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTDChristian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras. 1-5 [doi]
- VoicePerf: A Quality Estimation Approach for No-reference IP Voice TrafficPéter Orosz, Tamás Tóthfalusi. 1-9 [doi]
- SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure AdministrationMasaru Ueno, Yuji Imai. 1-5 [doi]
- Rapid Detection and Localization of Gray Failures in Data Centers via In-band Network TelemetryChenhao Jia, Tian Pan, Zizheng Bian, Xingchen Lin, Enge Song, Cheng Xu, Tao Huang, Yunjie Liu. 1-9 [doi]
- NEW IP Framework and Protocol for Future ApplicationsZhe Chen, Chuang Wang, Guanwen Li, Zhe Lou, Sheng Jiang, Alex Galis. 1-5 [doi]
- OVS-DPDK Port Mirroring via NIC OffloadingLiang-min Wang, Tim Miskell, Patrick Fu, Cunming Liang, Edwin Verplanke. 1-2 [doi]
- Few-shot Learning for eNodeB Performance Metric Analysis for Service Level Assurance in LTE NetworksShogo Aoki, Kohei Shiomoto, Chin Lam Eng, Sebastian Backstad. 1-4 [doi]
- Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4Damu Ding, Marco Savi, Domenico Siracusa. 1-9 [doi]
- Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN InfrastructureKallol Krishna Karmakar, Vijay Varadharajan, Uday Kiran Tupakula, Michael Hitchens. 1-9 [doi]
- Deep Clustering of Mobile Network Data with Sparse AutoencodersMárton Kajó, Benedek Schultz, Georg Carle. 1-6 [doi]
- All that Glitters is not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) NetworkSami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer. 1-9 [doi]
- Analysis of Smart Grid Fault Recovery ProtocolsLuana M. Uchôa, Silvio E. Quincozes, Juan Lucas Vieira, Diego G. Passos, Célio Albuquerque, Daniel Mossé. 1-8 [doi]
- A Dynamic Clustering Approach for Increasing User Throughput in 5G Wireless NetworksWael S. Afifi, Ali A. El-Moursy, Mohamed Saad, Salwa M. Nassar, Hadia M. El-Hennawy. 1-8 [doi]
- Characterising Network-Connected Devices Using Affiliation GraphsKyle Millar, Adriel Cheng, Hong-Gunn Chew, Cheng-Chew Lim. 1-6 [doi]
- Physical Layer Anomaly Detection Mechanisms in IoT NetworksPedro Martins, André B. Reis, Paulo Salvador, Susana Sargento. 1-9 [doi]
- Dual Vote Confirmation based Consensus Design for Blockchain integrated IoTZheng Qiu, Jianjun Hao, Yijun Guo, Yi Zhang. 1-7 [doi]
- Unveiling the Type of Relationship Between Autonomous Systems Using Deep LearningTal Shapira, Yuval Shavitt. 1-6 [doi]
- Flexible Content-based Publish/Subscribe over Programmable Data PlanesRalf Kundel, Christoph Gärtner, Manisha Luthra, Sukanya Bhowmik, Boris Koldehofe. 1-5 [doi]
- Efficient Real-Time Traffic Generation for 5G RANDiarmuid Corcoran, Per Kreuger, Christian Schulte 0001. 1-9 [doi]
- Data Quality Maximization for Mobile CrowdsensingCheng Zhang, Noriaki Kamiyama. 1-7 [doi]
- Online Monitoring of TCP Throughput LimitationsSimon Bauer, Kilian Holzinger, Benedikt Jaeger, Paul Emmerich, Georg Carle. 1-9 [doi]
- Impact of False Data Injection Attacks on Deep Learning Enabled Predictive AnalyticsGautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque. 1-7 [doi]
- Design and Implementation of an Elastic Monitoring Architecture for Cloud Network SlicesAndré Beltrami, Paulo D. Maciel, Francesco Tusa, Celso Cesila, Christian Esteve Rothenberg, Rafael Pasquini, Fábio L. Verdi. 1-7 [doi]
- Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault ToleranceOmar Alfandi, Safa Otoum, Yaser Jararweh. 1-4 [doi]
- Semantic feature selection for network telemetry event descriptionThomas Feltin, Parisa Foroughi, Wenqin Shao, Frank Brockners, Thomas H. Clausen. 1-6 [doi]
- Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field PatternsHarm Griffioen, Christian Doerr. 1-9 [doi]
- Unavailability-aware Shared Virtual Backup Allocation Model for MiddleboxesFujun He, Eiji Oki. 1-7 [doi]
- Sharing Incentive Mechanism, Task Assignment and Resource Allocation for Task Offloading in Vehicular Mobile Edge ComputingTra Huong Thi Le, Nguyen H. Tran, Yan Kyaw Tun, Oanh Tran Thi Kim, Kitae Kim, Choong Seon Hong. 1-8 [doi]
- Clustering IoT Malware based on Binary SimilarityMárton Bak, Dorottya Papp, Csongor Tamás, Levente Buttyán. 1-6 [doi]
- AccuPIPE: Accurate Heavy Flow Detection in the Data Plane Using Programmable SwitchesYang Guo, Franklin Liu, an Wang, Hang Liu. 1-5 [doi]
- aiOS: An Intelligence Layer for SD-WLANsEstefania Coronado, Abin Thomas, Suzan Bayhan, Roberto Riggio. 1-9 [doi]
- Towards a Client-Centric QoS Auto-Scaling SystemThomas Lin, Alberto Leon-Garcia. 1-9 [doi]
- Community Cleanup: Incentivizing Network Hygiene via Distributed Attack ReportingYu Liu, Craig A. Shue. 1-9 [doi]
- Unsupervised Detection of Anomalous Behavior in Wireless Devices based on Auto-EncodersAbdurhman Albasir, Q. Hu, M. Al-tekreeti, Kshirasagar Naik, N. Naik, A. James Kozlowski, Nishith Goel. 1-7 [doi]
- A Proactive Cache Privacy Attack on NDNAlberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle. 1-7 [doi]
- ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement LearningIman Akbari, Ezzeldin Tahoun, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba. 1-9 [doi]
- Bloom Filter-based Routing for Dominating Set-based Service-Centric NetworksAli Marandi, Vincent Hofer, Mikael Gasparyan, Torsten Braun, Nikolaos Thomos. 1-9 [doi]
- Citrus: Orchestrating Security Mechanisms via Adversarial DeceptionRyan Mills, Nicholas J. P. Race, Matthew Broadbent. 1-4 [doi]
- Is the Uplink Enough? Estimating Video Stalls from Encrypted Network TrafficFrank Loh, Florian Wamser, Christian Moldovan, Bernd Zeidler, Dimitrios Tsilimantos, Stefan Valentin, Tobias Hoßfeld. 1-9 [doi]
- ElasticWISP: Energy-Proportional WISP NetworksDuncan Cameron, Alvin C. Valera, Winston K. G. Seah. 1-9 [doi]
- Model-based Design of a Roadside Unit for Emergency and Disaster ManagementNur Hilal, Arda Yurdakul. 1-6 [doi]
- A OneM2M Intrusion Detection and Prevention System based on Edge Machine LearningNadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac. 1-7 [doi]
- From 2D to Next Generation VR/AR Videos: Enabling Efficient Streaming via QoE-aware Mobile NetworksRoberto Irajá Tavares da Costa Filho, Filip De Turck, Luciano Paschoal Gaspary. 1-6 [doi]
- Implementing a Security Policy Management for 5G Customer Edge NodesHammad Kabir, Muhammad Hassaan Bin Mohsin, Raimo Kantola. 1-8 [doi]
- Multi-technology Management of Heterogeneous Wireless NetworksTom De Schepper, Jeroen Famaey, Steven Latré. 1-6 [doi]
- Value of Information based Optimal Service Fabric Management for Fog ComputingFilippo Poltronieri, Mauro Tortonesi, Alessandro Morelli, Cesare Stefanelli, Niranjan Suri. 1-9 [doi]
- Learning a Configurable Deployment Descriptors Model in NFVWassim Sellil Atoui, Nour Assy, Walid Gaaloul, Imen Grida Ben Yahia. 1-9 [doi]
- Adjusted Location Privacy Scheme for VANET Safety ApplicationsRuqayah Al-ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed. 1-4 [doi]
- Predicting Internet of Things Data Traffic Through LSTM and Autoregressive Spectrum AnalysisYuhong Li, Di Jin, Bailin Wang, Xiang Su, Jukka Riekki, Chao Sun, Hanyu Wei, Hao Wang, Lei Han. 1-8 [doi]
- Predictions of Network Attacks in Collaborative EnvironmentMartin Husák, Pavel Celeda. 1-6 [doi]
- Elastic Monitoring Architecture for Cloud Network SlicesAndré Beltrami, Celso Cesila, Paulo Ditarso Maciel, Christian Esteve Rothenberg, Fábio L. Verdi. 1-2 [doi]
- User Group Behavioural Pattern in a Cellular Mobile Network for 5G Use-casesGábor Soós, Dániel Ficzere, Pál Varga. 1-7 [doi]
- Network Service Mapping and Scheduling under Uncertain Processing TimeYuncan Zhang, Fujun He, Eiji Oki. 1-8 [doi]
- DDoS Attacks Detection with AutoEncoderKun Yang, Junjie Zhang, Yang Xu, Jonathan Chao. 1-9 [doi]
- 5G QoS: Impact of Security Functions on LatencySebastian Gallenmüller, Johannes Naab, Iris Adam, Georg Carle. 1-9 [doi]
- BotFP: FingerPrints Clustering for Bot DetectionAgathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci. 1-7 [doi]
- Mobility and QoS Prediction for Dynamic Coverage OptimizationJanne Ali-Tolppa, Márton Kajó. 1-2 [doi]
- Network Slice Management on top of ONAPVeronica Quintuna Rodriguez, Fabrice Guillemin, Amina Boubendir. 1-2 [doi]
- Global-Scale Anycast Network Management with VerfploeterWouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij. 1-9 [doi]
- Moving Target Defense for Virtual Network FunctionsReuven Peretz, Shlomo Shenzis, David Hay. 1-9 [doi]
- A Process Mining Approach for Supporting IoT Predictive SecurityAdrien Hemmer, Rémi Badonnel, Isabelle Chrisment. 1-9 [doi]
- Leveraging Eclipse IoT in the Arrowhead FrameworkLukas Römer, Sven Erik Jeroschewski, Johannes Kristan. 1-6 [doi]
- High-Precision Latency Forwarding over Packet-Programmable NetworksAlexander Clemm, Toerless Eckert. 1-8 [doi]
- Demonstration of Network Service Header Based Service Function Chain Application with Function Allocation ModelRui Kang, Fujun He, Takehiro Sato, Eiji Oki. 1-2 [doi]
- A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems SecurityJoseph Khoury, Mohamed Nassar. 1-9 [doi]
- A Dynamic Decentralized Traffic Light Management System: A TCP Inspired ApproachOmar Hiari, Ibraheem Nofal. 1-4 [doi]
- A Dynamic Spectrum Footprint Adaptation Framework for Collaborative Spectrum SharingRuben Mennes, Jakob Struye, Carlos Donato, Steven Latré. 1-4 [doi]
- Towards delay-aware container-based Service Function Chaining in Fog ComputingJosé Santos 0001, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Service and Agent based System Architectures for Industrie 4.0 SystemsHartwig Baumgärtel, Richard Verbeet. 1-6 [doi]
- Comparative Analysis of Network Fault Classification Using Machine LearningJunichi Kawasaki, Genichi Mouri, Yusuke Suzuki. 1-6 [doi]