Abstract is missing.
- Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker)Tharaka Hewa, Nisita Weerasinghe, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila. 1-3 [doi]
- Safety, Stability and Environmental Impact of FDI Attacks on Vehicular PlatoonsSean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, David Evans. 1-6 [doi]
- Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) AttacksIvan Peter Lamb, Mateus Saquetti, Guilherme Bueno de Oliveira, José Rodrigo Azambuja, Weverton Cordeiro. 1-9 [doi]
- Towards Adaptive Quality Assurance in Industrial ApplicationsChristian Thomay, Ulf Bodin, Haris Isakovic, Rainer Lasch, Nicholas J. P. Race, Christoph Schmittner, Germar Schneider, Zsolt Szepessy, Markus Tauber, Zhiping Wang. 1-6 [doi]
- Digital Twin for the Optical Network: Key Technologies and Enabled Automation ApplicationsChristopher Janz, Yuren You, Mahdi Hemmati, Zhiping Jiang, Abbas Javadtalab, Jeebak Mitra. 1-6 [doi]
- Improved Edge Computing for IoT Devices via Optimized Semantic ModelsAndrei Günter, Matthias König 0001. 1-6 [doi]
- B5GEMINI: Digital Twin Network for 5G and BeyondAlberto Mozo, Amit Karamchandani, Mario Sanz, José Ignacio Moreno, Antonio Pastor 0001. 1-6 [doi]
- Automatically Distributing and Updating In-Network Management Rules for Software Defined NetworksAhmad Abboud, Rémi Garcia 0001, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi. 1-9 [doi]
- Ensemble Learning-based Network Data Analytics for Network Slice Orchestration and Management: An Intent-Based Networking MechanismKhizar Abbas, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song. 1-5 [doi]
- MEC-RHA: Demonstration of Novel Service Request Handling Algorithm for MECGayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera, Indika A. M. Balapuwaduge, Madhusanka Liyanage. 1-3 [doi]
- A testbed for CCAM services supported by edge computing, and use case of computation offloadingIgnacio Royuela, Juan Carlos Aguado, Ignacio de Miguel, Noemí Merayo, Ramón J. Durán Barroso, Diego Hortelano, Lidia Ruiz, Patricia Fernández, Rubén M. Lorenzo, Evaristo J. Abril. 1-6 [doi]
- Complex network theory to model 5G Network SlicingDániel Ficzere. 1-4 [doi]
- Predicting Unseen Links Using Learning-based Matrix CompletionShuying Zhuang, Jessie Hui Wang, Jilong Wang 0001, Changqing An, Yuedong Xu, Tianhao Wu. 1-9 [doi]
- Enabling Malware Detection with Machine Learning on Programmable SwitchHsin-Fu Chang, Michael I.-C. Wang, Chi-Hsiang Hung, Charles H.-P. Wen. 1-5 [doi]
- Performability Analysis of Containerized IMS through Queueing Networks and Stochastic ModelsMario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco. 1-8 [doi]
- Multi-Agent Deep Reinforcement Learning for Slicing and Admission Control in 5G C-RANMuhammad Sulaiman, Arash Moayyedi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh. 1-9 [doi]
- An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite ServicesMohamed Oulaaffart, Remi Badonnel, Christophe Bianco. 1-9 [doi]
- On-Demand Network Management with NMaaS: Network Management as a ServiceVojdan Kjorveziroski, Pavle V. Vuletic, Lukasz Lopatowski, Frédéric Loui. 1-3 [doi]
- Demonstration of xiondp: An XDP-Accelerated Processing of SCION PacketsMarten Gartner, Johann Wagner, Martin Koppehel, David Hausheer. 1-2 [doi]
- Automated IoT security testing with SecLabPatrick Schwaiger, Dimitrios Simopoulos, Andreas Wolf. 1-6 [doi]
- Towards Interpretable Anomaly Detection: Unsupervised Deep Neural Network Approach using Feedback LoopAshima Chawla, Paul Jacob, Paddy G. Farrell, Erik Aumayr, Sheila Fallon. 1-9 [doi]
- Bringing ICN To Software-Defined InfrastructuresMorteza Moghaddassian, Alberto Leon-Garcia. 1-5 [doi]
- P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable SwitchLinyih Teng, Chi-Hsiang Hung, Charles H.-P. Wen. 1-5 [doi]
- Factored Reinforcement Learning for Auto-scaling in Tandem QueuesThomas Tournaire, Yue Jin, Armen Aghasaryan, Hind Castel-Taleb, Emmanuel Hyon. 1-7 [doi]
- Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge ComputingRahul Sharma, Chien Aun Chan, Christopher Leckie. 1-7 [doi]
- RLBrowse: Generating Realistic Packet Traces with Reinforcement LearningAlexander Griessel, Maximilian Stephan, Martin Mieth, Wolfgang Kellerer, Patrick Krämer. 1-6 [doi]
- Towards a Predictable Open Source FaaSDavid Balla, Markosz Maliosz, Csaba Simon. 1-5 [doi]
- Securing Edge Services for Future Smart Healthcare and Industrial IoT ApplicationsTanesh Kumar, Mika Ylianttia, Erkki Harjula. 1-6 [doi]
- Side-channel Attacks and Countermeasures in Cloud Services and InfrastructuresAbdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu. 1-4 [doi]
- Towards the Classification of TCP Throughput ChangesSimon Bauer, Benedikt Jaeger, Max Reimann, Jonas Fromm, Georg Carle. 1-7 [doi]
- Change Point Detection in Clustered Network Performance IndicatorsJohan Garcia 0001. 1-6 [doi]
- A NEAT way to test-driven network managementWill Fantom, Paul Alcock, Ben Simms, Charalampos Rotsos, Nicholas J. P. Race. 1-5 [doi]
- Hosting Industry Centralization and ConsolidationLuciano Zembruzki, Raffaele Sommese, Lisandro Zambenedetti Granville, Arthur Selle Jacobs, Mattijs Jonker, Giovane C. M. Moura. 1-9 [doi]
- Automation of Intent-based Service Operation with Models and AI/MLTakayuki Kuroda, Yutaka Yakuwa, Takashi Maruyama, Takuya Kuwahara, Kozo Satoda. 1-6 [doi]
- A Game-Theoretic Algorithm for the Joint Routing and VNF Placement ProblemAli El-Amine, Olivier Brun. 1-9 [doi]
- Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation FrameworkNardine Basta, Muhammad Ikram, Mohamed Ali Kâafar, Andy Walker. 1-7 [doi]
- AC/DCIM: Acoustic Channels for Data Center Infrastructure MonitoringLars Wüstrich, Sebastian Gallenmüller, Marc-Oliver Pahl, Georg Carle. 1-5 [doi]
- GNN-Based Malicious Network Entities Identification In Large-Scale Network DataStepan Dvorak, Pavel Procházka, Lukás Bajer. 1-4 [doi]
- A System for Interactive Examination of Learned Security PoliciesKim Hammar, Rolf Stadler. 1-3 [doi]
- XDP-Accelerated Packet Processing on SCION EndhostsMarten Gartner, Johann Wagner, Martin Koppehel, David Hausheer. 1-9 [doi]
- MUDIS: MUD Inspection SystemAnat Bremler-Barr, Bar Meyuhas, Ran Shister. 1-3 [doi]
- mobile-env: An Open Platform for Reinforcement Learning in Wireless Mobile NetworksStefan Schneider 0008, Stefan Werner, Ramin Khalili, Artur Hecker, Holger Karl. 1-3 [doi]
- Integrated Deployment Prototype for Virtual Network Orchestration SolutionMaya Kassis, Massinissa Ait Aba, Hind Castel-Taleb, Maxime Elkael, Andrea Araldo, Badii Jouaber. 1-3 [doi]
- Mobile applications for connected cars: Security analysis and risk assessmentNicholas Topman, Asma Adnane. 1-6 [doi]
- Predicting network performance using GNNs: generalization to larger unseen networksMiquel Farreras, Paola Soto, Miguel Camelo, Lluís Fàbrega, Pere Vilà. 1-6 [doi]
- Enhancing the SRv6 Network Programming Model Through the Definition of the Maximize Throughput BehaviorMarco Polverini, Davide Aureli, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti. 1-5 [doi]
- Decision tree-based blending method using deep-learning for network managementOns Aouedi, Kandaraj Piamrat, Benoît Parrein. 1-7 [doi]
- BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication NetworksMarwa A. Elsayed, Nur Zincir-Heywood. 1-9 [doi]
- IoT Device Fingerprinting on Commodity SwitchesCarson Kuzniar, Miguel C. Neves, Vladimir Gurevich, Israat Haque. 1-9 [doi]
- Towards the reuse of physical models within the development life-cycle: a case study of Simulink modelsEduardo Cibrián, Roy Mendieta, Jose María Álvarez Rodríguez, Juan Lloréns. 1-6 [doi]
- A Flexible GraphQL Northbound API for Intent-based SDN ApplicationsFetia Bannour, Stefania Dumbrava, Damien Lu. 1-5 [doi]
- Analysis of CPU Placement of Cell-Free Massive MIMO for User-centric RANTakahide Murakami, Naoki Aihara, Akio Ikami, Yu Tsukamoto, Hiroyuki Shinbo. 1-7 [doi]
- Multi-Agent Graph Convolutional Reinforcement Learning for Intelligent Load BalancingOmar Houidi, Sihem Bakri, Djamal Zeghlache. 1-6 [doi]
- Value-of-Information Middleware Solutions for Fog and Edge ComputingFilippo Poltronieri, Cesare Stefanelli, Mauro Tortonesi. 1-6 [doi]
- Implementation of Real-time Function Deployment with Resource Migration in KubernetesMengfei Zhu, Rui Kang, Eiji Oki. 1-3 [doi]
- Deep Reinforcement Learning Based Method for the Rule Placement Problem in Software-Defined NetworksManuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez. 1-4 [doi]
- Solving Combinatorial Problems via the Random Exploration of the Search Space: An Experimental Approach for Fast Decision MakingCristiano M. Silva, Fernanda S. H. Sumika, Daniel Ludovico Guidoni, Leonardo Alvarenga L. Santos, João Fernando Machry Sarubbi, Somayeh Mokhtari, Matheus F. Rodrigues Santos, José Marcos Silva Nogueira. 1-4 [doi]
- Decentralized Machine Learning based Network Data Analytics for Cognitive Management of Mobile Communication NetworksSharva Garg, Tanmoy Bag, Andreas Mitschele-Thiel. 1-9 [doi]
- HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic ArtifactsMorteza Safaei Pour, Joseph Khoury, Elias Bou-Harb. 1-9 [doi]
- Node-RED Workflow Manager for Edge Service OrchestrationFelix Larrinaga, William Ochoa, Alain Perez, Javier Cuenca 0002, Jon Legaristi, Miren Illarramendi. 1-6 [doi]
- Change Point Evaluation in Networking Logs with Periodicity Filtering and BootstrappingJohan Garcia 0001. 1-7 [doi]
- SPT: sketch-based polling in-band network telemetryMingwei Cui, Xiao Li, Ying Wang, Tianyuan Niu, Fan Yang. 1-7 [doi]
- Non-negative Matrix Factorization For Network Delay Matrix CompletionSanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel. 1-6 [doi]
- Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection SystemsHimanshi Babbar, Ouns Bouachir, Shalli Rani, Moayad Aloqaily. 1-6 [doi]
- Peer Me Maybe?: A Data-Centric Approach to ISP Peer SelectionShahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel. 1-9 [doi]
- Structural Network Metrics and Incident GenerationRobert Harper 0004, Philip Tee. 1-6 [doi]
- Characterizing the basic performance of IEEE 802.11ax using actual hardware measurementsYutaka Fukuda, Takuji Hatase, Akihiro Satoh, Yutaka Nakamura, Sujiro Wada. 1-4 [doi]
- Data Usage in IoT: A Characterization of GTP Tunnels in M2M Mobile NetworksSimon Raffeck, Stefan Geissler, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld. 1-6 [doi]
- WRS: Workflow Retrieval System for Cloud Automatic RemediationHongyi Huang, Wenfei Wu, Shimin Tao. 1-10 [doi]
- Continuous Microservice Re-Placement in the IoTChristian Lübben, Simon Schäffner, Marc-Oliver Pahl. 1-6 [doi]
- Sustainable Machine-to-Everything Infrastructure Management: Blockchain-Based Impact Indexing for Distributed Collaboration SystemsOlena Chornovol, Alex Norta. 1-4 [doi]
- Emission Scheduling Strategies for Massive-IoT: Implementation and Performance OptimizationGwen Maudet, Mireille Batton-Hubert, Patrick Maillé, Laurent Toutain. 1-4 [doi]
- Detecting and locating configuration errors in IP VPNs with Graph Neural NetworksEl-Heithem Mohammedi, Emmanuel Lavinal, Guillaume Fleury. 1-6 [doi]
- A Data Driven Coordination between Load Balancing and Interference CancellationDiego Fernando Preciado Rojas, Andreas Mitschele-Thiel. 1-6 [doi]
- Resource Management in Softwarized NetworksShihabur Rahman Chowdhury, Raouf Boutaba. 1-6 [doi]
- Smart DC: An AI and Digital Twin-based Energy-Saving Solution for Data CentersZiting Zhang, Yu Zeng, Haoran Liu, Chaoyue Zhao, Feng Wang, Yunqing Chen. 1-6 [doi]
- Anomaly Detection and Localization in NFV Systems: an Unsupervised Learning ApproachSeyed Soheil Johari, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh. 1-9 [doi]
- Characterizing DNS query response sizes through active and passive measurementsKensuke Fukuda, Yoshitaka Aharen, Shinta Sato, Takeshi Mitamura. 1-6 [doi]
- Use What You Know: Network and Service Coordination Beyond CertaintyStefan Werner, Stefan Schneider 0008, Holger Karl. 1-10 [doi]
- B.A.T.M.A.N. in the IoTLukas Gehreke, Kai Kientopf, Mesut Günes. 1-6 [doi]
- Real-time adaptive data filtering with multiple sensors for indoor monitoringKuon Akiyama, Ryoichi Shinkuma, Jun Shiomi. 1-3 [doi]
- Pikachu: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly DetectionRamesh Paudel, H. Howie Huang. 1-7 [doi]
- Federated IoT Roaming using Private DNS ResolutionsArnol Lemogue, Ivan Martinez, Laurent Toutain, Ahmed Bouabdallah. 1-6 [doi]
- Optimal Resource Provisioning for Data-intensive MicroservicesRoland Mark Erdei, László Toka. 1-6 [doi]
- Water 4.0: enabling Smart Water and Environmental Data MeteringNicola Caldognetto, Luca Pasquali Evangelisti, Filippo Poltronieri, Michele Russo, Cesare Stefanelli, Sara Tenani, Sara Toboli, Mauro Tortonesi. 1-6 [doi]
- Improving network resilience with Middlebox MinionsLyn Hill, Charalampos Rotsos, William Fantom, Christopher Edwards, David Hutchison. 1-5 [doi]
- Learning Traffic Encoding Matrices for Delay-Aware Traffic Engineering in SD-WANsMajid Ghaderi, Wenjie Liu, Shihan Xiao, Fenglin Li. 1-9 [doi]
- Joint Resources and Phase-Shift Optimization of MEC-Enabled UAV in IRS-Assisted 6G THz NetworksYu Min Park, Sheikh Salman Hassan, Yan Kyaw Tun, Zhu Han 0001, Choong Seon Hong. 1-7 [doi]
- Edge Robotics Experimentation over Next Generation IIoT TestbedsDimitrios Dechouniotis, Dimitrios Spatharakis, Symeon Papavassiliou. 1-3 [doi]
- Intent-based System Design with Efficient Search Using Partial-Order ReductionTakuya Kuwahara, Takayuki Kuroda, Kozo Satoda. 1-7 [doi]
- Natural Language Processing Applied to Dynamic Workflow Generation for Network ManagementAndrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn. 1-6 [doi]
- Cyber threat response using reinforcement learning in graph-based attack simulationsJakob Nyberg, Pontus Johnson, András Méhes. 1-4 [doi]
- Collision Avoidance for Vulnerable Road Users: Privacy versus Survival?Marek Bachmann, Luca Hernández Acosta, Johann Götz, Delphine Reinhardt, Klaus David. 1-6 [doi]
- Persistent Memory for Content Delivery NetworksTimothy Miskell, Tushar Gohad, Ai Bee Lim, Felipe Pastor, Jeremy Payne, Greg Smith, Chris Cavigioli. 1-6 [doi]
- E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoTWai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann. 1-9 [doi]
- Dataset Quality Assessment in Autonomous Networks with Permutation TestingJosé Camacho, Katarzyna Wasielewska. 1-4 [doi]
- QoE Management of HTTP/2 traffic in Software-Defined Wide Area NetworksHélio Henrique Gonçalves Guardabaxo, Gustavo Sousa Pavani. 1-5 [doi]
- Dynamic Local Community Detection AlgorithmsSahar Bakhtar, Hovhannes A. Harutyunyan. 1-6 [doi]
- Exploring Approaches for Heterogeneous Transfer Learning in Dynamic NetworksFernando García Sanz, Masoumeh Ebrahimi, Andreas Johnsson. 1-9 [doi]
- Demonstrating Network Slice KPI Monitoring in a 5G TestbedNiloy Saha, Alexander James, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh. 1-3 [doi]
- Essence of Geographically Correlated Failure Events in Communication NetworksBalázs Vass, János Tapolcai. 1-6 [doi]
- Fault Report Generation for ICT Systems by Jointly Learning Time-series and Text DataNobukazu Fukuda, Chao Wu, Shingo Horiuchi, Kenichi Tayama. 1-9 [doi]
- A Chaos Engineering Approach for Improving the Resiliency of IT Services ConfigurationsFilippo Poltronieri, Mauro Tortonesi, Cesare Stefanelli. 1-6 [doi]
- Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained SensorsAlberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Eder J. Scheid, Timucin Besken, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. 1-7 [doi]
- SmartNIC-based Load Management and Network Health Monitoring for Time Sensitive ApplicationsKilian Holzinger, Franz Biersack, Henning Stubbe, Angela Gonzalez Mariño, Abdoul Kane, Francesc Fons, Haigang Zhang, Thomas Wild, Andreas Herkersdorf, Georg Carle. 1-6 [doi]
- On Learning Hierarchical Embeddings from Encrypted Network TrafficNikolas Wehner, Markus Ring, Joshua Schüler, Andreas Hotho, Tobias Hoßfeld, Michael Seufert. 1-7 [doi]
- Evolving the Ecosystem: Eclipse Arrowhead integrates Eclipse IoTJohannes Kristan, Paolo Azzoni, Lukas Römer, Sven Erik Jeroschewski, Elisa Londero. 1-6 [doi]
- Improve Multiple-Camera Assisted Remote Driving by Qualitative Communication and New IPLijun Dong, Richard Li. 1-5 [doi]
- Roadrunner: O-RAN-based Cell Selection in Beyond 5G NetworksEstefanía Coronado, Shuaib Siddiqui, Roberto Riggio. 1-7 [doi]
- Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoTSubir Halder, Thomas Newe. 1-9 [doi]
- Analytical Calculation of the User Threshold for the Switching between Unicast and Broadcast in Cellular NetworksJuan Vargas, Cédric Thienot, Xavier Lagrange. 1-6 [doi]
- Availability-Aware E-band Wireless Extension of Fiber-AccessAttila Hilt, József Varga, Gábor Járó. 1-5 [doi]
- Simulative Performance Study of Slotted Aloha for LoRaWAN Channel AccessFrank Loh, Noah Mehling, Stefan Geißler, Tobias Hoßfeld. 1-9 [doi]
- Poisoning Attacks against Federated Learning in Load Forecasting of Smart EnergyNaik Bakht Sania Qureshi, Dong Hoon Kim, Jiwoo Lee, Eun-Kyu Lee. 1-7 [doi]
- HERRA: Energy-Aware Scalable D2D 5G Cellular Traffic Offloading SchemeSafwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi, Paul A. Rubin. 1-7 [doi]
- Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth CongestionKengo Tajiri, Ryoichi Kawahara, Yoichi Matsuo. 1-9 [doi]
- Segment Routing with Digital AnnealingSebastian Engel, Christian Münch, Fritz Schinkel, Oliver Holschke, Marc Geitz, Timmy Schüller. 1-9 [doi]
- HyperSFP: Fault-Tolerant Service Function Chain Provision on Programmable Switches in Data CentersHongyi Huang, Wenfei Wu. 1-9 [doi]
- Efficient Resource-Constrained MonitoringJalil Moraney, Danny Raz. 1-6 [doi]
- Delivering WiFi Connectivity to Remote Locations Through LoRa Mesh NetworkingAlex F. R. Trajano, Pietro C. F. Andrade, Ivo A. Pimenta, Jefferson Rodrigo A. Cavalcante, José Neuman de Souza. 1-6 [doi]
- Identification of Attack Paths Using Kill Chain and Attack GraphsLukás Sadlek, Pavel Celeda, Daniel Tovarnák. 1-6 [doi]
- Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and KubernetesJuuso Haavisto, Thibault Cholez, Jukka Riekki. 1-8 [doi]
- Design and Development of Network Monitoring Strategies in P4-enabled Programmable SwitchesDamu Ding, Marco Savi, Federico Pederzolli, Domenico Siracusa. 1-6 [doi]
- TDoA based indoor positioning over small cell 5G networksZsófia Papp, Garry Irvine, Roland Smith, Ferenc Mogyorósi, Péter Revisnyei, István Töros, Alija Pasic. 1-6 [doi]
- Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless NetworksChia-Cheng Yen, Wenting Sun, Hakimeh Purmehdi, won Park, Kunal Rajan Deshmukh, Nishank Thakrar, Omar Nassef, Adam Jacobs. 1-7 [doi]
- Stopping the Data Flood: Post-Shannon Traffic Reduction in Digital-Twins ApplicationsCaspar von Lengerke, Alexander Hefele, Juan A. Cabrera 0002, Frank H. P. Fitzek. 1-5 [doi]
- On Minimizing TCP Retransmission Delay in Softwarized NetworksHaythem Yahyaoui, Melek Majdoub, Mohamed Faten Zhani, Moayad Aloqaily. 1-6 [doi]
- HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web TrafficStanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnák. 1-7 [doi]
- Clustering Mobile Network Data with Decorrelating Adversarial NetsMárton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle. 1-9 [doi]
- Natural Language Processing for the Dynamic Generation of Network Management WorkflowsAndrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn. 1-3 [doi]
- Resilient Virtual Network Function Allocation with Diversity and Fault Tolerance Considering Dynamic RequestsRui Kang, Fujun He, Eiji Oki. 1-9 [doi]
- Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT ArchitecturesEli Brosh, Elad Wasserstein, Anat Bremler-Barr. 1-6 [doi]
- Application Placement in Fog Environments using Multi-Objective Reinforcement Learning with Maximum Reward FormulationReinout Eyckerman, Philippe Reiter, Steven Latré, Johann Márquez-Barja, Peter Hellinckx. 1-6 [doi]
- Self-sovereign Identity Management Framework using Smart ContractsKomal Gilani, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi. 1-7 [doi]
- Autonomous convergence mechanisms for collaborative crowd-sourced data-modelingChristian Lübben, Marc-Oliver Pahl. 1-5 [doi]
- Energy-efficient Resource Allocation in Multi-Tenant Edge Computing using Markov Decision ProcessesAlessandro Spallina, Andrea Araldo, Tijani Chahed, Hind Castel-Taleb, Antonella Di Stefano, Tülin Atmaca. 1-5 [doi]
- Efficient Designs for Practical Blockchain-IoT IntegrationSina Rafati Niya, Burkhard Stiller. 1-6 [doi]
- A Proposal for Time-Aware Scheduling in Wireless Industrial IoT EnvironmentsBen Schneider, Rute C. Sofia, Matthias Kovatsch. 1-6 [doi]
- IoT Device Management Based on Open Source Platforms - Requirements Analysis and EvaluationDenis Gustin, Jürgen Jasperneite. 1-4 [doi]
- Sibyl: a Framework for Evaluating the Implementation of Routing Protocols in Fat-TreesTommaso Caiazzi, Mariano Scazzariello, Leonardo Alberro, Lorenzo Ariemma, Alberto Castro, Eduardo Grampín, Giuseppe Di Battista. 1-7 [doi]
- A Flexible Interpreter For Intent RealisationJoseph McNamara, Erik Aumayr, Liam Fallon, Enda Fallon. 1-6 [doi]
- Efficient Revocation of Capability TokensMarian Buschsieweke, Mesut Günes. 1-6 [doi]
- Federated Learning Empowered Edge Collaborative Content Caching Mechanism for Internet of VehiclesJingye Chi, Siya Xu, Shaoyong Guo, Peng Yu 0001, Xuesong Qiu 0001. 1-5 [doi]
- Optimizing Performance and Resource Consumption of Cloud-Native Logging Application StacksGergo Csáti, István Pelle, László Toka. 1-4 [doi]
- Comparative Causal Analysis of Network Log Data in Two Large ISPsSatoru Kobayashi, Keiichi Shima, Kenjiro Cho, Osamu Akashi, Kensuke Fukuda. 1-6 [doi]
- Detecting Multi-Step Attacks: A Modular Approach for Programmable Data PlaneAbir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba. 1-9 [doi]
- Accelerating Deep Reinforcement Learning for Digital Twin Network Optimization with Evolutionary StrategiesCarlos Güemes-Palau, Paul Almasan, Shihan Xiao, Xiangle Cheng, Xiang Shi, Pere Barlet-Ros, Albert Cabellos-Aparicio. 1-5 [doi]
- Fix Me If You Can: Using Neural Networks to Regenerate Networked Systems' Monitoring TracesKayuã Oleques Paim, Vagner E. Quincozes, Diego Kreutz, Rodrigo B. Mansilha, Weverton Cordeiro. 1-9 [doi]
- Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization SchemeKunling He, Changqing An, Jessie Hui Wang, Tianshu Li, Linmei Zu, FengHua Li. 1-9 [doi]
- Implementation and evaluation of the Multi-connection Tactile Internet Protocol and APIDelia Rico, Karl-Johan Grinnemo, Anna Brunström, Pedro Merino 0001. 1-6 [doi]
- Lagrangian Heuristics for Capacitated Shortest Path Tour Problem Based Online Service ChainingTakanori Hara, Masahiro Sasabe. 1-9 [doi]
- Automatic RRC Reconfigurations Based on User Mobility PatternsLászló Hévizi, Alexandros Palaios. 1-5 [doi]
- ROMA: Resource Orchestration for Microservices-based 5G ApplicationsAnousheh Gholami, Kunal Rao, Wang-Pin Hsiung, Oliver Po, Murugan Sankaradas, Srimat Chakradhar. 1-9 [doi]
- Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G SystemAbderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Gueroui. 1-9 [doi]
- Improving DDoS Attack Detection Leveraging a Multi-aspect Ensemble Feature SelectionPegah Golchin, Ralf Kundel, Tim Steuer, Rhaban Hark, Ralf Steinmetz. 1-5 [doi]
- NoSQL Database Performance Diagnosis through System Call-level IntrospectionChangho Seo, Yunchang Chae, Jaeryun Lee, Euiseong Seo, Byungchul Tak. 1-9 [doi]
- Deep Learning-Assisted Traffic Prediction in Hybrid SDN/OSPF Backbone NetworksRichard Etengu, Saw Chin Tan, Teong Chee Chuah, Jaime Galán-Jiménez. 1-6 [doi]
- NetWords: Enabling the Understanding of Network Property Violation OccurrencesAnderson Santos da Silva, Alberto Schaeffer-Filho. 1-9 [doi]
- ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat IntelligenceDaniel Tovarnák, Michal Cech, Dusan Tichý, Vojtech Dohnal. 1-4 [doi]
- RC-TL: Reinforcement Convolutional Transfer Learning for Large-scale Trajectory PredictionNegar Emami, Lucas Pacheco, Antonio Di Maio, Torsten Braun. 1-9 [doi]
- Understanding the Challenges of Blocking Unnamed Network TrafficKaspar Hageman, Egon Kidmose, René Rydhof Hansen, Jens Myrup Pedersen. 1-5 [doi]
- ML-based Performance Prediction of SDN using Simulated Data from Real and Synthetic NetworksKatharina Dietz 0001, Nicholas Gray, Michael Seufert, Tobias Hossfeld. 1-7 [doi]
- A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud ServicesMaher Al Islam, Carol J. Fung, Ashraf Tantawy, Sherif Abdelwahed. 1-5 [doi]
- Slice admission control using overbooking for enhancing provider revenue in 5G NetworksShivani Saxena, Krishna M. Sivalingam. 1-7 [doi]
- Monitoring Smart Home Traffic under Differential PrivacyChenxin Duan, Kai Wang, Wenqi Chen, Guanglei Song, Jiahai Yang, Zhiliang Wang. 1-10 [doi]
- SODA-Stream: SDN Optimization for Enhancing QoE in DASH StreamingReza Hedayati Majdabadi, Mea Wang, Logan Rakai. 1-5 [doi]
- A Model for Route Learning in Opportunistic NetworksJorge Visca, Javier Baliosian. 1-4 [doi]
- Performance Impact of Differential Privacy on Federated Learning in Vehicular NetworksEun Ji Kim, Eun-Kyu Lee. 1-5 [doi]
- Resource tradeoffs for TLS-secured MQTT-based IoT ManagementValentin Dimov, Erkin Kirdan, Marc-Oliver Pahl. 1-6 [doi]
- End-to-End Network Service Orchestration in Heterogeneous Domains for Next-Generation Mobile NetworksJorge Baranda, Josep Mangues-Bafalluy. 1-6 [doi]
- Exploring New Traffic Prediction Models to build an Intelligent Transport System for Smart CitiesVatsal Mehta, Glenford Mapp, Vaibhav Gandhi. 1-6 [doi]
- Exploring the Limitations of Current Graph Neural Networks for Network ModelingMartin Happ, Jia Lei Du, Matthias Herlich, Christian Maier, Peter Dorfinger, José Suárez-Varela. 1-8 [doi]
- Perspectives on AI-based Algorithms Applied to C-RAN Functional Splitting and Advanced Antenna System ProblemFrancesco Giacinto Lavacca, Vincenzo Eramo, Antonio Cianfrani, Marco Listanti, Francesco Valente. 1-5 [doi]
- Towards Inference of DDoS Mitigation RulesMartin Zádník. 1-5 [doi]
- Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial LearningJiaxing Qi, Zhongzhi Luan, Shaohan Huang, Yukun Wang, Carol J. Fung, Hailong Yang, Depei Qian. 1-5 [doi]
- Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake PerformanceRonny Döring, Marc Geitz. 1-5 [doi]
- One MUD to Rule Them All: IoT Location ImpactAnat Bremler-Barr, Bar Meyuhas, Ran Shister. 1-5 [doi]
- A Cloud Infrastructure as a Service for an Efficient Usage of Sensing and Actuation Capabilities in Internet of ThingsJasmeen Kaur Ahluwalia, Carla Mouradian, Mohammad Nazmul Alam, Roch H. Glitho. 1-6 [doi]
- DMEF: Dynamic Malware Evaluation FrameworkChristian Dietz, Marcel Antzek, Gabi Dreo, Anna Sperotto, Aiko Pras. 1-7 [doi]
- Revisiting the Classics: Online RL in the Programmable DataplaneKyle A. Simpson, Dimitrios P. Pezaros. 1-10 [doi]
- Robust Deep Learning against Corrupted Data in Cognitive Autonomous NetworksMárton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle. 1-7 [doi]
- Characterizing Mobile Signaling Anomalies in the Internet-of-ThingsViktoria Vomhoff, Stefan Geissler, Frank Loh, Wolfgang Bauer, Tobias Hossfeld. 1-6 [doi]
- Towards SDN-based Dynamic Path Reconfiguration for Time Sensitive NetworkingNurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer 0001. 1-9 [doi]
- Correctness, Completeness, Consistency: Challenges of Migrating Arrowhead System-of-Systems ModelsGéza Kulcsár, Johannes Kristan, Sven Erik Jeroschewski. 1-6 [doi]
- QoS-Aware Inter-Domain Connectivity: Control Plane Design and Operational ConsiderationsStanislav Lange, Jane Frances Pajo, Thomas Zinner, Håkon Lønsethagen, Min Xie 0006. 1-6 [doi]
- Convolutional and Recurrent Neural Networks for Driver Identification: An Empirical StudyMozhgan Nasr Azadani, Azzedine Boukerche. 1-6 [doi]
- A /sys Filesystem for the Internet of ThingsFrank Engelhardt, Mesut Günes. 1-6 [doi]
- VITALflow: Visual Interactive Traffic Analysis with NetFlowTina Tremel, Jochen Kögel, Florian Jauernig, Sebastian Meier, Dennis Thom, Franziska Becker, Christoph Müller 0001, Steffen Koch 0001. 1-6 [doi]
- Exploiting Functional Connectivity Inference for Efficient Root Cause AnalysisGiles Winchester, George Parisis, Luc Berthouze. 1-5 [doi]
- Network-based Intrusion Detection: A One-class Classification ApproachPaulina Arregoces, Jaime Vergara, Sergio Armando Gutierrez, Juan Felipe Botero. 1-6 [doi]
- Optimal Access Control Deployment in Network Function VirtualizationManel Smine, David Espes, Marc-Oliver Pahl. 1-9 [doi]
- Detecting Malicious Domains using the Splunk Machine Learning ToolkitMichelle Cersosimo, Adrian Lara. 1-6 [doi]
- Open Source Software Integration in an Industry 4.0 Framework: Experience and Lessons LearnedJohannes Kristan, Sven Erik Jeroschewski, Lukas Römer. 1-4 [doi]
- 5G public network integration for a real-life PROFINET applicationDániel Ficzere, Dhruvin Patel, Joachim Sachs, Junaid Ansari, Gábor Soós, Pál Varga. 1-5 [doi]
- Automatic failover of 5G container-based User Plane Function by ONAP closed-loop orchestrationÁkos Leiter, Attila Hegyi, Nándor Galambosi, Edina Lami, Péter Fazekas. 1-2 [doi]
- Constructing a service process model based on distributed tracing for conformance checking of microservicesMasaru Sakai, Kensuke Takahashi. 1-6 [doi]