Abstract is missing.
- Community Selection for Multivariate KPI Predictions in a 2-Tier SystemYue Jin, Makram Bouzid, Armen Aghasaryan, Ricardo Rocha. 1-5 [doi]
- On the Fence: Anomaly Detection in IoT NetworksPatrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood. 1-4 [doi]
- Accurate Bulk Throughput Benchmarks Using Reduced Network ResourcesDerek Phanekham, Kylie Jordan, Oliver Zhu, Suku Nair. 1-5 [doi]
- Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic ManagementGuanxiong Liu, Nicholas Furth, Hang Shi, Abdallah Khreishah, Jo Young Lee, Nirwan Ansari, Chengjun Liu, Yaser Jararweh. 1-8 [doi]
- Low-Overhead Packet Loss Diagnosis for Virtual Private Clouds using P4-Programmable NICsSoroush Aalibagi, Mahdi Dolati, Sogand SadrHaghighi, Majid Ghaderi. 1-9 [doi]
- Reinforcement Learning based model for Maximizing Operator's Profit in Open-RANMahdi Sharara, Sahar Hoteit, Véronique Vèque. 1-5 [doi]
- Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learningOmar Anser, Jérôme François, Isabelle Chrisment. 1-6 [doi]
- An Intelligent Data-Plane with a Quantized ML Model for Traffic ManagementKaiyi Zhang, Nancy Samaan, Ahmed Karmouch. 1-9 [doi]
- Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR'16José Camacho 0001, Katarzyna Wasielewska, Pablo Espinosa, Marta Fuentes-García. 1-5 [doi]
- A Multi-Tenancy System Architecture for Online ExaminationsJonas Andre, Johannes Naab, Benedikt Jaeger, Georg Carle, Leander Seidlitz, Stephan M. Günther. 1-6 [doi]
- Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor CommunicationPyae Sone Aung, Loc X. Nguyen, Yan Kyaw Tun, Zhu Han 0001, Choong Seon Hong. 1-6 [doi]
- An Adaptive Moving Target Defense Approach for Software-Defined Networking ProtectionFelipe Sampaio Dantas da Silva, Túlio Pascoal, Emidio P. Neto, Rodrigo S. S. Nunes, Cristian H. Martins de Souza, Augusto Neto 0001. 1-6 [doi]
- An Intermediary Protocol Representation to Aid in Avionics Network DevelopmentAlexander Frank, Wolfgang Hommel, Benedikt Hopfner. 1-5 [doi]
- Towards an Edge Cloud Based Coordination Platform for Multi-User AR Applications Built on Open-Source SLAMsBalázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero. 1-6 [doi]
- FRL-Assisted Edge Service Offloading Mechanism for IoT Applications in FiWi HetNetsShi Wang, Siya Xu, Jiaxin Wang, Peng Yu 0001, Ying Wang, Fanqin Zhou. 1-5 [doi]
- Industry 5.0 and Operations Management - the Importance of Human FactorsFabian Lindner, Gerald Reiner. 1-4 [doi]
- Independent Split Model Inference at Operator Network for Network Performance EstimationSelim Ickin, Dinand Roeland, Göran Hall. 1-9 [doi]
- Distributed Device-Specific Anomaly Detection using Deep Feed-Forward Neural NetworksChristian Lübben, Marc-Oliver Pahl. 1-9 [doi]
- Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function ChainsMarios Avgeris, Aris Leivadeas, Nikolaos Athanasopoulos, Ioannis Lambadaris, Matthias Falkner. 1-7 [doi]
- A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security PoliciesDo Duc Anh Nguyen, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen. 1-7 [doi]
- GitOps and Kubernetes Operator-based Network Function ConfigurationÁkos Leiter, Attila Hegyi, István Kispál, Pál Böõsy, Nándor Galambosi, Gábor Zsolt Tar. 1-5 [doi]
- Autoscaling Packet Core Network Functions with Deep Reinforcement LearningJatinder Singh, Shantanu Verma, Yoichi Matsuo, Francesca Fossati, Guillaume Fraysse. 1-6 [doi]
- HiFiPot: a High-Fidelity Emulation Framework for Internet of Things HoneypotsPierre-Marie Junges, Jérôme François, Olivier Festor. 1-9 [doi]
- Stochastic Qubit Resource Allocation for Quantum Cloud ComputingRakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong, Jiawen Kang. 1-5 [doi]
- Data-Centric Machine Learning Approach for Early Ransomware Detection and AttributionAldin Vehabovic, Hadi Zanddizari, N. Ghani, F. Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno. 1-6 [doi]
- Self-adaptive and Efficient Training Node Selection for Federated Learning in B5G/6G Edge NetworkCan Tan, Peng Yu 0001, Wenjing Li, Fanqin Zhou, Ying Wang, Siya Xu, Xuesong Qiu 0001, Qingbi Zheng, Pei Xiao. 1-5 [doi]
- Multi-Agent Advantage Actor-Critic Learning For Message Content Selection in Cooperative Perception NetworksImed Ghnaya, Mohamed Mosbah 0001, Hasnaâ Aniss, Toufik Ahmed. 1-9 [doi]
- Generalizable Resource Scaling of 5G Slices using Constrained Reinforcement LearningMuhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin 0001, Raouf Boutaba, Aladdin Saleh. 1-9 [doi]
- Enabling Auditable Trust in Autonomous Networks with Ethereum and IPFSJaime Fúster De La Fuente, Álvaro Pendás Recondo, Leon Wong, Paul Harvey 0002. 1-6 [doi]
- Characteristic Analysis of Socially-Aware Information-Centric NetworkingKodai Honda, Ryo Nakamura, Noriaki Kamiyama. 1-5 [doi]
- Responding to Network Failures at Data-plane Speeds with Network ProgrammabilityJonatas Adilson Marques, Kirill Levchenko, Luciano Paschoal Gaspary. 1-10 [doi]
- A Scalable Asynchronous Traffic Shaping Mechanism for TSN with Time Slot and PollingHaorui Guo, Weichao Li 0001, Jiashuo Lin, Jianer Zhou, Qinglin Xun, Shuangping Zhan, Yong Huang, Yi Wang 0004, Qingsha Cheng. 1-5 [doi]
- Combining Autonomic and Intent-Based NetworkingAlexander Clemm, Toerless Eckert. 1-6 [doi]
- A Smart Manufacturing Ecosystem for Industry 5.0 using Cloud-based Collaborative Learning at the EdgeSalman Javed, Saleha Javed, Jan van Deventer, Hamam Mokayed, Jerker Delsing. 1-6 [doi]
- MPC-as-a-Service: A Customizable Management Protocol for Running Multi-party Computation on IoT DevicesOscar G. Bautista, Kemal Akkaya. 1-6 [doi]
- Generalizable GNN-based 5G RAN/MEC Slicing and Admission Control in Metropolitan NetworksArash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin 0001, Raouf Boutaba, Aladdin Saleh. 1-9 [doi]
- Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoTFathima James, Indrajit Ray, Deep Medhi. 1-6 [doi]
- Digital Twins in Industry 5.0: Challenges in Modeling and CommunicationMarcell Balogh, András Földvári, Pál Varga. 1-6 [doi]
- RL-based Virtual Network Embedding using VNF Sharing for Network Slicing in 5G NetworksArihant Samar, Krishna M. Sivalingam. 1-7 [doi]
- A Deep Reinforcement Learning Framework for Optimizing Congestion Control in Data CentersShiva Ketabi, hongkai Chen, Haiwei Dong 0001, Yashar Ganjali. 1-7 [doi]
- Trust Quantification in a Collaborative Drone System with Intelligence-driven Edge RoutingAlicia Esquivel Morel, Ekincan Ufuktepe, Cameron Grant, Samuel Elfrink, Chengyi Qu, Prasad Calyam, Kannappan Palaniappan. 1-7 [doi]
- An Experimental Testbed for 5G Network Security AssessmentKarim Baccar, Abdelkader Lahmadi. 1-6 [doi]
- Telemetry Knowledge Distributed Processing for Network Digital Twins and Network ResiliencePedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda. 1-6 [doi]
- Efficient Periodicity Analysis for Real-Time Anomaly DetectionYusufu Shehu, Robert Harper 0004. 1-6 [doi]
- SDN-based GTP-U Traffic Analysis for 5G NetworksDiana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Alexander Perez-Pons. 1-4 [doi]
- A Stacking Learning-Based QoE Model for Cloud GamingDaniel Soares, Marcos Carvalho, Daniel F. Macedo. 1-6 [doi]
- FSA-IDS: A Flow-based Self-Active Intrusion Detection SystemMehrdad Hajizadeh, Sudip Barua, Pegah Golchin. 1-9 [doi]
- Machine learning based detection of replay attacks in VANETAman Kumar, Muhammad Anwar Shahid, Arunita Jaekel, Ning Zhang, Marc Kneppers. 1-6 [doi]
- Communication-Efficient and Scalable Management of Self-Organizing Mobile NetworksTanmoy Bag, Sharva Garg, Sriram Parameswaran, Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel. 1-5 [doi]
- Scaling IoT MUD Enforcement using Programmable Data PlanesHarish S. A, Suvrima Datta, Hemanth Kothapalli, Praveen Tammana, Achmad Basuki, Kotaro Kataoka, Selvakumar Manickam, U. Venkanna 0001, Yung-Wey Chong. 1-9 [doi]
- Bandwidth Provisioning for Network Slices with Per User QoS GuaranteesPanagiotis I. Nikolaidis, Asim Zoulkarni, John S. Baras. 1-9 [doi]
- CyberTEA: a Technical and Economic Approach for Cybersecurity Planning and InvestmentMuriel Figueredo Franco, Lisandro Zambenedetti Granville, Burkhard Stiller. 1-6 [doi]
- RAVIN: A Resource-aware VNF Placement Scheme with Performance GuaranteesVenkatarami Reddy Chintapalli, Vishal Siva Kumar Giduturi, Bheemarjuna Reddy Tamma, A. Antony Franklin. 1-9 [doi]
- Data Protection based on Searchable Encryption and Anonymization TechniquesMatheus M. Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes. 1-5 [doi]
- Using a P4 Hardware Switch to Block Trackers and Ads for All Devices on an Edge NetworkShie-Yuan Wang, Jin-Ting Li. 1-5 [doi]
- KeLLy - Efficient, Scalable Link Layer Topology DiscoveryPaul Seehofer, Roland Bless, Martina Zitterbart. 1-5 [doi]
- Digital Map Generation Workflow Demonstrated on ZalaZONE Automotive Proving Ground ElementsÁrpád Somogyi, Tamás Tettamanti, Pál Varga, Zsolt Szalay, Dániel Baranyai, Tamas Lovas. 1-6 [doi]
- Towards Autonomous Computer Networks in Support of Critical SystemsAlessio Sacco, Guido Marchetto. 1-6 [doi]
- Evaluating and Improving Regional Network Robustness from an AS TOPO PerspectiveYujia Liu, Changqing An, Tao Yu, Zhiyan Zheng, Zidong Pei, Jilong Wang 0001, Chalermpol Charnsripinyo. 1-7 [doi]
- Domain Adaptation for Network Performance Modeling with and without Labeled DataHannes Larsson, Farnaz Moradi, Jalil Taghia, Xiaoyu Lan, Andreas Johnsson. 1-9 [doi]
- Event-Flow Correlation for Anomaly Detection in HTTP/3 Web TrafficStanislav Spacek, Petr Velan, Martin Holkovic, Tomás Plesník. 1-6 [doi]
- A Multilayer Perceptron Model for Station Grouping in IEEE 802.11ah NetworksGuan-Sheng Wang, Chih-Yu Lin, Yu-Chee Tseng, Lan-Da Van. 1-5 [doi]
- Traffic Flow based Feature Engineering for Urban Management SystemHongfan Mu, Noura Aljeri, Azzedine Boukerche. 1-6 [doi]
- Performance Evaluation of Next-Generation Data Plane Architectures and their ComponentsStefan Geißler, Tobias Hoßfeld. 1-6 [doi]
- SFL-LEO: Secure Federated Learning Computation Based on LEO Satellites for 6G Non-Terrestrial NetworksSheikh Salman Hassan, Umer Majeed, Zhu Han 0001, Choong Seon Hong. 1-5 [doi]
- Dynamic and Multiprovider-based Resource Infrastructure in the NFV MANO FrameworkSlawomir Kuklinski, Jordi Mongay Batalla, Janusz Pieczerak. 1-4 [doi]
- Trust Me: Explainable ML in Self-Organized Network ManagementFaiaz Nazmetdinov, Diego Preciado, Andreas Mitschele-Thiel. 1-6 [doi]
- th Industrial Revolution: Achievements, Challenges and Research AreasGeorge Dimitrakopoulos, Thomas Gutt, Hans Ehm, Alfred Hoess, Konstantina Karathanasopoulou, Anna Lackner, Germar Schneider. 1-6 [doi]
- Comparative Analysis of 2D Object Detection Algorithms and real-time implementation using RTMAPSMoad Dehbi, Yassin El Hillali, Atika Rivenq, Marwane Ayaida. 1-5 [doi]
- Advancing Network Monitoring and Operation with In-band Network Telemetry and Data Plane ProgrammabilityJonatas Adilson Marques, Luciano Paschoal Gaspary. 1-6 [doi]
- Emergency and Infotainment Services through Mobility-based Dynamic and Predictive 5G Network SlicingGonçalo Perna, Pedro Rito, Carlos Marques, Miguel Luís, Filipe Pinto, Susana Sargento. 1-6 [doi]
- SecBox: A Lightweight Container-based Sandbox for Dynamic Malware AnalysisJan von der Assen, Alberto Huertas Celdrán, Adrian Zermin, Raffael Mogicato, Gérôme Bovet, Burkhard Stiller. 1-3 [doi]
- TopoFuzzer - A Network Topology Fuzzer for Moving Target Defense in the Telco CloudWissem Soussi, Maria Christopoulou, Themis Anagnostopoulos, Gürkan Gür, Burkhard Stiller. 1-5 [doi]
- Using Stochastic Petri net modeling for self-adapting Publish/Subscribe IoT systemsMohammed Djahafi, Nabila Salmi. 1-4 [doi]
- Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge ComputingRahul Sharma, Chien Aun Chan, Christopher Leckie. 1-9 [doi]
- V2N Service Scaling with Deep Reinforcement LearningCyril Shih-Huan Hsu, Jorge Martín-Pérez, Chrysa Papagianni, Paola Grosso. 1-5 [doi]
- Combining NOMA-OMA with a Multiagent Architeture for Enhanced Spectrum Sharing in 6GGustavo C. Eichler, Célia G. Ralha, Arman Farhang, Marcelo Antonio Marotta. 1-7 [doi]
- Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation DesignLuyao Zou, Sheikh Salman Hassan, Yan Kyaw Tun, Zhu Han 0001, Choong Seon Hong. 1-5 [doi]
- Improve Video Conferencing Quality with Deep Reinforcement LearningNguyen Van Tu, Kyungchan Ko, Sangwoo Ryu, Sangtae Ha, James Won-Ki Hong. 1-5 [doi]
- Generic Dijkstra: correctness and tractabilityIreneusz Szczesniak, Bozena Wozna-Szczesniak. 1-7 [doi]
- Measuring 5G-RAN Resilience Using Coverage and Quality of Service IndicatorsSoumeya Kaada, Marie-Line Alberi-Morel, Gerardo Rubino, Sofiene Jelassi. 1-7 [doi]
- Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry DataThomas Feltin, Juan Antonio Cordero Fuertes, Frank Brockners, Thomas Heide Clausen. 1-9 [doi]
- Wavelet-Based Hybrid Machine Learning Model for Out-of-distribution Internet Traffic PredictionSajal Saha, Anwar Haque. 1-8 [doi]
- Integrating state prediction into the Deep Reinforcement Learning for the Autoscaling of Core Network FunctionsYoichi Matsuo, Jatinder Singh, Shantanu Verma, Guillaume Fraysse. 1-5 [doi]
- Federated Learning Framework to Decentralize Mobility Forecasting in Smart CitiesRenato Valente, Carlos R. Senna, Pedro Rito, Susana Sargento. 1-5 [doi]
- Admission Control for URLLC Traffic with Computation Requirements in 5G and BeyondFidan Mehmeti, Valentin Thomas Haider, Wolfgang Kellerer. 1-9 [doi]
- An adaptive and efficient approach to detect microbursts leveraging per-packet telemetry in a production networkJeronimo Bezerra, Italo Brito 0001, Renata Frez, Julio Ibarra. 1-6 [doi]
- On the Temporal Behaviour of a Large-Scale Microservice ArchitectureGiles Winchester, George Parisis, Luc Berthouze. 1-6 [doi]
- Efficient Deep-Learning Models for Future Blockage and Beam Prediction for mmWave SystemsSatya Kumar Vankayala, Sai Krishna Santosh Gollapudi, Bharat Jain, Seungil Yoon, K. Mihir, Swaraj Kumar, H. U. Sudheer Kumar, Issaac Kommineni. 1-8 [doi]
- Optimizing Resource Placement for Long-term Disaster ResponseNobukazu Fukuda, Mayu Yamazoe, Hiroaki Matsubayashi, Kazuaki Akashi, Shunsuke Kanai. 1-5 [doi]
- Nesting Containers for Faithful Datacenters EmulationsTommaso Caiazzi, Mariano Scazzariello, Samuele Quinzi, Lorenzo Ariemma, Maurizio Patrignani, Giuseppe Di Battista. 1-4 [doi]
- Analyzing Traffic Characteristics of Instant Messaging Applications on Android SmartphonesZolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh. 1-5 [doi]
- 5GC-Observer Demonstrator: a Non-intrusive Observability Prototype for Cloud Native 5G SystemAbderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui. 1-3 [doi]
- Multi-agent Reinforcement Learning with Graph Q-Networks for Antenna TuningMaxime Bouton, Jaeseong Jeong, José Outes, Adriano Mendo, Alexandros Nikou. 1-7 [doi]
- A Cloud-Native Federated Learning Architecture for Telecom Fraud DetectionSubhash Talluri, Qiong Zhang, Rongyi Chen. 1-3 [doi]
- Digital Twins for Security AutomationKim Hammar, Rolf Stadler. 1-6 [doi]
- Cold Start for Cloud Anomaly DetectionYonatan Katz, Danny Raz. 1-8 [doi]
- A Reinforcement-Learning Self-Healing Approach for Virtual Network Function PlacementMarios Avgeris, Aris Leivadeas, Ioannis Lambadaris. 1-5 [doi]
- Early Detection of Intrusion in SDNMd. Shamim Towhid, Nashid Shahriar. 1-6 [doi]
- mmCPTP: A Cross-Layer Pull based Transport Protocol for 5G mmWave NetworksPrasad Netalkar, Jiachen Chen, Dipankar Raychaudhuri. 1-9 [doi]
- Protected load-balancing problem: Neural-network based approximation for non-convex optimizationYoucef Magnouche, Sébastien Martin, Jérémie Leguay. 1-9 [doi]
- 5G on the roads: optimizing the latency of federated analysis in vehicular edge networksLászló Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A Antony Franklin. 1-5 [doi]
- A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoTXinran Zheng, Shuo Yang, Xingjun Wang. 1-6 [doi]
- Intrusion and Anomaly Detection in Industrial Automation and Control SystemsLuís Rosa 0001, Tiago Cruz 0001, Paulo Simões 0001, Edmundo Monteiro. 1-6 [doi]
- Automated Feature Selection with Local Gradient Trajectory in Split LearningSelim Ickin. 1-7 [doi]
- Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection SystemsGaspard Baye, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gökhan Kul. 1-6 [doi]
- Stable 5G Time Domain Resource Configuration for Synchronous Timing Services via Lyapunov Aided DRLYanbo Zhou, Lei Feng, Kunyi Xie, Fanqin Zhou, Wenjing Li 0001, Peng Yu 0001. 1-5 [doi]
- A Crash Response System using LoRa-based V2X CommunicationsBruno Carneiro da Cunha, Daniel Macêdo Batista, Roberto Hirata Junior, Kifayat Ullah 0002. 1-5 [doi]
- PRINCIPIA: Opportunistic CPU and CPU-shares Allocation for Containerized Virtualization in Mobile Edge ComputingAndrés F. Ocampo, Mah-Rukh Fida, Juan Felipe Botero, Ahmed Elmokashfi, Haakon Bryhni. 1-7 [doi]
- An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP ConnectionSiyuan Wu, Wenjun Fan. 1-5 [doi]
- A Comprehensive Performance Analysis of Stream Processing with Kafka in Cloud Native Deployments for IoT Use-casesIstván Pelle, Bence Szoke, Abdulhalim Fayad, Tibor Cinkler, László Toka. 1-6 [doi]
- Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful FirewallsKatharina Dietz 0001, Nicholas Gray, Manuel Wolz, Claas Lorenz, Tobias Hoßfeld, Michael Seufert. 1-7 [doi]
- Delay-bounded Topology Construction and Routing Integration for Time-critical ServicesXiaofu Huang, Guochu Shou, Yaqiong Liu, Zehua Gao, Yihong Hu. 1-6 [doi]
- DDoS Detection in P4 Using HYPERLOGLOG and COUNTMIN SketchesVera Clemens, Lars-Christian Schulz, Marten Gartner, David Hausheer. 1-6 [doi]
- Performance Comparison of UDP and TCP for Different CoAP Load ProfilesDavid Pop, Erkin Kirdan, Marc-Oliver Pahl. 1-6 [doi]
- Federated Power Control for Predictive QoS in 5G and Beyond: A Proof of Concept for URLLCSaad Abouzahir, Essaid Sabir, Halima Elbiaze, Mohamed Sadik. 1-7 [doi]
- Internet of Things Technology for Train Positioning and Integrity in the Railway Industry DomainRogelio Hernández, Gabriel Mujica, Jorge Portilla, Francisco Parrilla. 1-6 [doi]
- Achieving Observability at Scale through Federated LearningAlexander Keller, Jonathan Whitson. 1-6 [doi]
- Enabling Self-Driving Networks with Machine LearningArthur Selle Jacobs, Ronaldo Alves Ferreira, Lisandro Zambenedetti Granville. 1-6 [doi]
- SatAIOps: Revamping the Full Life-Cycle Satellite Network OperationsPeng Hu. 1-5 [doi]
- Efficient Identification of Cloud Gaming Traffic at the EdgePhilippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Olivier Festor. 1-10 [doi]
- LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live StreamingFarzad Tashtarian, Abdelhak Bentaleb, Hadi Amirpour, Babak Taraghi, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann. 1-9 [doi]
- Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus DeploymentJhonatan Tavori, Hanoch Levy. 1-5 [doi]
- Machine Learning Based Study of QoE Metrics in Twitch.tv Live StreamingFrank Loh, Kathrin Hildebrand, Florian Wamser, Stefan Geißler, Tobias Hoßfeld. 1-7 [doi]
- A Deep Learning Approach for Root Cause Analysis in Real-Time IIoT Edge NetworksAhsan Saleem, Mahsa Raeiszadeh, Amin Ebrahimzadeh, Roch H. Glitho, Johan Eker, Raquel A. F. Mini. 1-5 [doi]
- A Study on the Conspiracy Theory Propagation Network on TwitterKshitij Kokkera, Aileen Chen, Chythra Malapati, Alex Demchenko, Carol J. Fung. 1-9 [doi]
- A Comprehensive Framework for Intent-Based Networking, Standards-Based and Open-SourceHenry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Chungang Yang, Yehua Zhao. 1-6 [doi]
- On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoTAmin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson. 1-4 [doi]
- Estimating the Performance of VNE Algorithms with a Novel Loss Network ModelQiao Lu, Changcheng Huang. 1-5 [doi]
- Optimizing Network Slicing in Distributed Large Scale Infrastructures: From Heuristics to Controlled Deep Reinforcement LearningJosé Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens 0001. 1-6 [doi]
- VERMONT: Towards an In-band Telemetry-Based Approach for Live Network Property VerificationGabriel Vassoler, Jonatas Adilson Marques, Luciano Paschoal Gaspary. 1-7 [doi]
- JARS: A Joint Allocation of Radio and System Resources for Virtualized Radio Access NetworksKeval Malde, Venkatarami Reddy Chintapalli, Bhavishya Sharma, Bheemarjuna Reddy Tamma, A. Antony Franklin. 1-9 [doi]
- Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing DevicesAlberto Huertas Celdrán, Jan von der Assen, Konstantin Moser, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. 1-8 [doi]
- Artificial Intelligence Framework for Target Oriented Integrated Sensing and Communication in Holographic MIMOApurba Adhikary, Md. Shirajum Munir, Avi Deb Raha, Yu Qiao, Choong Seon Hong. 1-7 [doi]
- DRL and Main-Side Blockchain Empowered Edge Computing Framework for Assistant DrivingYuxuan Zhong, Siya Xu, Zihan Li, Peng Yu 0001, Ying Wang, Fanqin Zhou. 1-7 [doi]
- Mobility-aware Latency-constrained Data Placement in SDN-enabled Edge NetworksDiego O. Rodrigues, Torsten Braun, Guilherme Maia, Leandro Villas. 1-9 [doi]
- Time Constraints on Vehicular Edge Computing: A Performance AnalysisRodrigo Rosmaninho, Duarte M. G. Raposo, Pedro Rito, Susana Sargento. 1-7 [doi]
- On the Accuracy of Active Capacity Estimation in the InternetSimon Bauer, Janluka Janelidze, Benedikt Jaeger, Patrick Sattler, Patryk Brzoza, Georg Carle. 1-7 [doi]
- A Digital Twin based Framework to Enable "What-If" Analysis in BGP OptimizationMarco Polverini, Ilaria Germini, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti. 1-6 [doi]
- AMAC: Attention-based Multi-Agent Cooperation for Smart Load BalancingOmar Houidi, Sihem Bakri, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani. 1-7 [doi]
- A Scalable Cyber Security Framework for the Experimentation of DDoS Attacks of ThingsDavi D. Gemmer, Bruno H. Meyer, Emerson Ribeiro de Mello, Marcos Schwarz, Michelle S. Wangham, Michele Nogueira. 1-7 [doi]
- Performance of a TDOA indoor positioning solution in real-world 5G networkPéter Revisnyei, Ferenc Mogyorósi, Zsófia Papp, István Töros, Alija Pasic. 1-6 [doi]
- C3-Edge - An Automated Mininet-Compatible SDN Testbed on Raspberry Pis and Nvidia JetsonsJosef Hammer, Dragi Kimovski, Narges Mehran, Radu Prodan, Hermann Hellwagner. 1-5 [doi]
- A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network TelemetryHuu-Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin, Edgardo Montes de Oca. 1-6 [doi]
- Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target DefenseWissem Soussi, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Vincent Lefebvre, Gürkan Gür, Burkhard Stiller. 1-3 [doi]
- Multi-stage Location for Root-Cause Metrics in Online Service SystemsYunfeng Zhao, Wenchi Zhang, Zhiliang Wang, Shize Zhang, Kaixin Sui, Enhuan Dong, Jiahai Yang 0001. 1-9 [doi]
- Instant Messaging Application Encrypted Traffic Generation SystemZolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood. 1-3 [doi]
- SampleHST: Efficient On-the-Fly Selection of Distributed TracesAlim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale. 1-9 [doi]
- Federated learning for vehicular coordination use casesLászló Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A Antony Franklin. 1-6 [doi]
- Empirical Performance Evaluation of Open Source SDN Controllers in different Network TopologiesHafiz Mati-ur-Rahman, Ghulam Bahoo, Lamees Zafar, Ibrahim Al-Oqily, Hasan Ali Khattak, Arsalan Ahmad. 1-6 [doi]
- NES: Towards Lifecycle Automation for Emulation-Based ExperimentationWill Fantom, Eleanor Davies, Charalampos Rotsos, Paul Veitch, Stephen A. Cassidy, Nicholas J. P. Race. 1-9 [doi]
- Transmitting Information with Global-designation of Emergency Routes for Edge Video ProcessingMichael Miller, Anvitha Ramachandran, Alicia Esquivel Morel, Durbek Gafurov, Prasad Calyam. 1-7 [doi]
- 5GC-Observer: a Non-intrusive Observability Framework for Cloud Native 5G SystemAbderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui. 1-10 [doi]
- A Resource Allocation Strategy in Earth Observation Orbital Edge Computing-enabled Satellite Networks to minimize Ground Station Energy ConsumptionFrancesco Valente, Francesco Giacinto Lavacca, Vincenzo Eramo. 1-6 [doi]
- Multi-label Classification of Hosts Observed through a DarknetEnzo d'Andréa, Jérôme François, Olivier Festor, Mehdi Zakroum. 1-6 [doi]
- Distributed Device-Specific Anomaly Detection for Resource-Constrained DevicesChristian Lübben, Marc-Oliver Pahl. 1-3 [doi]
- Enhancing Security in Information-Centric Ad Hoc NetworksIoanna Angeliki Kapetanidou, Paulo Mendes 0001, Vassilis Tsaoussidis. 1-9 [doi]
- On the Real Evaluation of a Collective Perception ServicePedro Almeida, Andreia Figueiredo, Pedro Rito, Miguel Luís, Susana Sargento. 1-6 [doi]
- 5G Network Slice Type Classification using Traditional and Incremental LearningMohamad Ahmadinejad, Tahmina Azmin, Nashid Shahriar. 1-5 [doi]
- On enabling 5G Dynamic TDD by leveraging Deep Reinforcement Learning and O-RANKarim Boutiba, Miloud Bagaa, Adlen Ksentini. 1-3 [doi]
- MARLIN: Soft Actor-Critic based Reinforcement Learning for Congestion Control in Real NetworksRaffaele Galliera, Alessandro Morelli, Roberto Fronteddu, Niranjan Suri. 1-10 [doi]
- Towards Security Metrics Combining Risks of Known and Zero-day Attacks: Work in ProgressVladimir Marbukh. 1-4 [doi]
- Live Stateful Migration of a Virtual Sub-NetworkFarid Zandi, Sepehr Abbasi Zadeh, Soheil Abbasloo, Parsa Pazhooheshy, Yashar Ganjali, Zhenhua Hu. 1-9 [doi]
- Logistic Regression-based Solution to Predict the Transport Assistant Placement in SDN networksLuis Jesús Martímathn León, Juan Luis Herrera, Javier Berrocal, Jaime Galán-Jiménez. 1-5 [doi]
- XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN OverlayLucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo, Radu State. 1-5 [doi]
- A Novel Poisoning Attack on Few-Shot based Network Intrusion DetectionNour Alhussien, Ahmed AlEroud. 1-5 [doi]
- Componentized Task Scheduling in Cloud-Edge Cooperative Scenarios Based on GNN-enhanced DRLJingchun Li, Fanqin Zhou, Wenjing Li, Mingyu Zhao, Xueqiang Yan, Yan-xi, Jianjun Wu. 1-4 [doi]
- Analysis and emulation of BGP hijacking eventsPietro Spadaccino, Sara Bruzzese, Francesca Cuomo, Flavio Luciani. 1-4 [doi]
- SDN-based Testbed for Emerging Use Cases in Beyond 5G NTN-Terrestrial NetworksMario Minardi, Youssouf Drif, Thang X. Vu, Ilora Maity, Christos Politis, Symeon Chatzinotas. 1-6 [doi]
- Enabling Scalable Smart Vertical Farming with IoT and Machine Learning TechnologiesCsaba Hegedüs, Attila Frankó, Pál Varga, Stefan Gindl, Markus Tauber. 1-4 [doi]
- Inspecting Traffic in Residential Networks with Opportunistically Outsourced MiddleboxesShuwen Liu 0009, Yu Liu, Craig A. Shue. 1-7 [doi]
- Efficient Management in Fog ComputingJosé Santos 0001, Tim Wauters, Filip De Turck. 1-6 [doi]
- A-RCL: An Adaptive Incident Prediction and Automated Root Cause Localization System for Cloud EnvironmentPhuong Bac Ta, Ha-Duong Phung, Younghan Kim. 1-5 [doi]
- Bio-inspired Solution for Cluster-Tree Based Data Collection Protocol in Wireless Sensors NetworksGérard Kponhinto, Ousmane Thiare, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Sondès Khemiri-Kallel, Junseok Hwang. 1-6 [doi]
- gym-hpa: Efficient Auto-Scaling via Reinforcement Learning for Complex Microservice-based Applications in KubernetesJosé Santos 0001, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Impact of Network Resource Management On Quality of Industrial ProcessesGéza Szabó, Zalán Trombitás, József Peto, Thorsten Lohmar, István Komlósi, Tamás Pepó, Attila Vidács, Mátyás Andó. 1-4 [doi]
- EFFECTOR: DASH QoE and QoS Evaluation Framework For EnCrypTed videO tRafficRaza Ul-Mustafa, Md. Tariqul Islam, Christian Esteve Rothenberg, Pedro Henrique Gomes. 1-8 [doi]
- ACTOR: Alarm Correlation and Ticketing for Open ROADMTianliang Zhang, Wendell Liu, Balagangadhar G. Bathula, Andrea Fumagalli. 1-4 [doi]
- Optimized Power Commissioning in WDM Networks Using Optical Network Digital TwinMahdi Hemmati, Yuren You, Abbas Javadtalab, Christopher Janz. 1-4 [doi]
- Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset CharacterizationHugo Sullivan, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili. 1-6 [doi]
- Serene: Handling the Effects of Stragglers in In-Network Machine Learning AggregationDiego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Schaeffer-Filho. 1-10 [doi]
- MonArch: Network Slice Monitoring Architecture for Cloud Native 5G DeploymentsNiloy Saha, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh. 1-7 [doi]
- Detection of IoT Devices and Network Anomalies based on Anonymized Network TrafficAriel L. C. Portela, Rafael A. Menezes, Wanderson L. Costa, Matheus M. Silveira, Luiz Fernando Bittecnourt, Rafael Lopes Gomes. 1-6 [doi]
- Evaluating the performance of open source software implementations of the 5G network coreGabriel Lando, Lucas Augusto Fonseca Schierholt, Mateus Paludo Milesi, Juliano Araujo Wickboldt. 1-7 [doi]
- Demonstrating a System for Dynamically Meeting Management Objectives on a Service MeshForough Shahab Samani, Kim Hammar, Rolf Stadler. 1-3 [doi]
- Graph-based Interpretable Anomaly Detection Framework for Network Slice Management in Beyond 5G NetworksAshima Chawla, Anne-Marie Bosneag, Anestis Dalgkitsis. 1-6 [doi]
- EFPCaching: Energy-aware and Fault-tolerant Probabilistic Caching of popular IoT content in ICNNikolaos Baltagiannis, Ioanna Angeliki Kapetanidou, Vassilis Tsaoussidis. 1-4 [doi]
- CDFed: Contribution-based Dynamic Federated Learning for Managing System and Statistical HeterogeneityYu Qiao, Md. Shirajum Munir, Apurba Adhikary, Avi Deb Raha, Choong Seon Hong. 1-5 [doi]
- BitTorrent over SCION: Leveraging Unused Network Capacities in the InternetMarten Gartner, Thorben Krüger, David Hausheer. 1-5 [doi]
- Analyzing self-similarities in network traffic, water levels, and currency exchange ratesPal Patrik Varga, Pál Varga, Dániel Ficzere. 1-6 [doi]
- Cost-optimal Operation of Latency Constrained Serverless Applications: From Theory to PracticeJános Czentye, István Pelle, Balázs Sonkoly. 1-10 [doi]
- Investigating adversarial attacks against Random Forest-based network attack detection systemsPhilippe Owezarski. 1-6 [doi]
- A Close Look at Shared Resource Consumption in NoSQL Databases for Accurate AccountingJaeryun Lee, Byungchul Tak, Euiseong Seo. 1-7 [doi]
- Predicting Mobility Management Demands of Cellular Networks based on User BehaviorLajos Bence Makai, Pál Varga. 1-6 [doi]
- Topology Discovery in Autonomic NetworksParsa Ghaderi, J. William Atwood, Lata Narayanan. 1-7 [doi]
- Accelerating PUF-based Authentication Protocols Using Programmable SwitchDivya Pathak, Ranjitha K., Krishna Sai Modali, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi. 1-10 [doi]
- Real-time Medical Devices Inventory Tracking - a Hands-on ExperienceBruno Rodrigues 0001, Eder J. Scheid, Julius Willems, Burkhard Stiller. 1-6 [doi]
- Uplink-based Live Session Model for Stalling Prediction in Video StreamingFrank Loh, Andrea Pimpinella, Stefan Geißler, Tobias Hoßfeld. 1-9 [doi]
- A Distributed Zero Trust Framework for 6G RANHichem Sedjelmaci, Kamel Tourki. 1-5 [doi]
- ELoRa: End-to-end Emulation of Massive IoT LoRaWAN InfrastructuresAlessandro Aimi, Stéphane Rovedakis, Fabrice Guillemin, Stefano Secci. 1-3 [doi]
- Towards In-Network Semantic Analysis: A Case Study involving Spam ClassificationCyprien Gueyraud, Nik Sultana. 1-6 [doi]
- An Intent-Based Networking mechanism: A study case for efficient path selection using Graph Neural NetworksJavier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Sajid Alam, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song. 1-6 [doi]