Abstract is missing.
- From WHOIS to RDAP: Are IP Lookup Services Getting any Better?Lorenzo Corneo, Mario Di Francesco. 1-10 [doi]
- Data-Centric Federated Learning for Anomaly Detection in Smart Grids and Other Industrial Control SystemsDylan Perdigão, Tiago Cruz 0001, Paulo Simões 0001, Pedro Henriques Abreu. 1-5 [doi]
- Wireless Link Quality Estimation Using LSTM ModelYuki Kanto, Kohei Watabe. 1-5 [doi]
- ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device ClassificationBinghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy. 1-9 [doi]
- Detecting Heavy Hitters in Network-Wide Programmable Multi-Pipe DevicesThiago Henrique Silva Rodrigues, Fábio Luciano Verdi. 1-5 [doi]
- Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine LearningAristide Tanyi-Jong Akem, Guillaume Fraysse, Marco Fiore. 1-9 [doi]
- Distributed Automated Testing Framework for Bluetooth Mesh ApplicationsJorg Wieme, Mathias Baert, Jeroen Hoebeke. 1-5 [doi]
- Analysis on a Performance and Fairness Tradeoff in Entanglement Routing for Quantum NetworksShu Ichinoseki, Yuki Koizumi, Junji Takemasa, Toru Hasegawa. 1-5 [doi]
- Distributed Intelligence for Dynamic Task Migration in the 6G User Plane using Deep Reinforcement LearningSayantini Majumdar, Susanna Schwarzmann, Riccardo Trivisonno, Georg Carle. 1-9 [doi]
- Reinforcement Learning (RL) Based Admission Control in Advance Bandwidth ReservationTananun Orawiwattanakul, Takuya Miyasaka. 1-7 [doi]
- Configuring the IEEE 802.1Q Time-Aware Shaper with Deep Reinforcement LearningAdrien Roberty, Quentin Besnard, Siwar Ben Hadj Said, Frédéric Ridouard, Henri Bauer, Annie Geniet. 1-7 [doi]
- An Artificial Intelligence Framework for Dynamic Selection and Resource Allocation for EVs in Vehicular NetworksMonishanker Halder, Apurba Adhikary, Seong-Bae Park, Choong Seon Hong. 1-9 [doi]
- Co-pilots for Arrowhead-based Cyber-Physical System of Systems EngineeringCsaba Hegedüs, Pál Varga. 1-6 [doi]
- TrafficEd: Deployment and Management System of Edge AI CamerasGuan-Wen Chen, Yi-Hsiu Lin, Tsì-Uí Ik. 1-7 [doi]
- Routing optimization based on DRL and Generative Adversarial Networks for SDN environmentsJuan Chafla Altamirano, Mariem Guitouni, Hassan Hassan 0002, Khalil Drira. 1-5 [doi]
- An Innovative Bridge Layer Access Control Method to Improve SSD UtilizationFeng Jiang, Yongyang Cheng, Tao Zhang. 1-5 [doi]
- Enhancing 5G Core security with eBPF/XDPLuís Loureiro, Vasco Pereira, Tiago Cruz 0001, Paulo Simões 0001. 1-6 [doi]
- Delay-aware Service Function Chain Provisioning with VNF Instance SharingSnigdha, Venkatarami Reddy Chintapalli, A. Antony Franklin. 1-9 [doi]
- Towards Robust Federated Learning via Logits Calibration on Non-IID DataYu Qiao 0004, Apurba Adhikary, Chaoning Zhang, Choong Seon Hong. 1-7 [doi]
- Design and Implementation of CWMP-Enabled Multipath Management Mechanism in Home NetworksWei-Zhi Huang, Yu-En Chang, Yu-Hsiang Lin, Hsin-Chieh Huang. 1-6 [doi]
- Towards Data-Driven Management of Mobile Networks through User Plane InferenceAristide Tanyi-Jong Akem, Marco Fiore. 1-4 [doi]
- Exploring the Benefit of Path Plausibility Algorithms in BGPNils Rodday, Gabi Dreo Rodosek, Aiko Pras, Roland van Rijswijk-Deij. 1-10 [doi]
- Achieving Best-path Selection at Line Rate through the SRv6 Live-Live BehaviorMarco Polverini, Antonio Cianfrani, Tommaso Caiazzi, Mariano Scazzariello, Ahmed Abdelsalam, Clarence Filsfils, Pablo Camarillo. 1-5 [doi]
- Practical Evaluation of Dynamic Service Function Chaining (SFC) for Softwarized Mobile Services in an SDN-based Cloud NetworkHanif Kukkalli, Mehrdad Hajizadeh, Thomas Bauschert. 1-6 [doi]
- Joint User Pairing and Beamforming Design of Multi-STAR-RISs-Aided NOMA in the Indoor Environment via Multi-Agent Reinforcement LearningYu Min Park, Yan Kyaw Tun, Choong Seon Hong. 1-8 [doi]
- Generalizable One-Way Delay Prediction Models for Heterogeneous UEs in 5G NetworksAkhila Rao, Hassam Riaz, Aleksandr Zavodovski, Rami Mochaourab, Viktor Berggren, Andreas Johnsson. 1-9 [doi]
- Towards a Mobility-cum-Battery Aware Dynamic UAV Deployment for Uninterrupted ConnectivityKolichala Rajashekar, Subhajit Sidhanta, Souradyuti Paul. 1-5 [doi]
- Fusing Heterogeneous Data for Network Asset Classification - A Two-layer ApproachOndrej Sedlácek, Václav Bartos. 1-6 [doi]
- Investigating Impact of DDoS Attack and CPA Targeting CDN CachesJiaqi Liu, Noriaki Kamiyama. 1-6 [doi]
- iMIA: Interdependent Mission Impact Assessment Using Subjective Bayesian NetworksHan Jun Yoon, Ashrith Reddy Thukkaraju, Shou Matsumoto, Jair Feldens Ferrari, Donghwan Lee, Myung Kil Ahn, Paulo C. G. Costa, Jin-Hee Cho. 1-7 [doi]
- Towards Safe Load Balancing based on Control Barrier Functions and Deep Reinforcement LearningLam Dinh, Pham Tran Anh Quang, Jérémie Leguay. 1-9 [doi]
- Application-aware Resource Sharing using Software and Hardware Partitioning on Modern GPUsTheodora Adufu, Jiwon Ha, Yoonhee Kim. 1-8 [doi]
- Policy Compression for Low-Power Intelligent Scaling in Software-Based Network ArchitecturesThomas Avé, Paola Soto, Miguel Camelo, Tom De Schepper, Kevin Mets. 1-7 [doi]
- Integrity Management in Softwarized NetworksEnrico Bravi, Antonio Lioy, Diana Gratiela Berbecaru. 1-7 [doi]
- Avoiding "Hot Potato" Problems in Internet Service ProvidersKhanh-Huu-The Dam, Gorby Kabasele Ndonda, Axel Legay, Ramin Sadre. 1-6 [doi]
- Optimum Worker Sampling in Crowdsensing with Multiple AreasChihiro Matsuura, Noriaki Kamiyama. 1-7 [doi]
- SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in MicrogridAurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila. 1-3 [doi]
- Multi-Tenant Programmable Switch Virtualization ArchitectureIvan Peter Lamb, Theo Facen, Pedro Arthur P. R. Duarte, José Rodrigo Azambuja, Weverton Cordeiro. 1-5 [doi]
- Is It Time to Upgrade From CRC-32?Mohit Balany, Craig Partridge. 1-5 [doi]
- Machine learning-based estimation of the number of competing flows at a bottleneck linkZeyou Xia, Go Hasegawa. 1-4 [doi]
- An Efficient FEC Scheme with SLA Consideration for Low Latency TransmissionsChao Xu, Jessie Hui Wang, Rui Li, Zongpeng Li, Hao Wu, Jilong Wang 0001. 1-9 [doi]
- GTT-NTP: A Graph Convolutional Networks-Based Network Traffic Prediction modelLongfei Li, Kyungbaek Kim. 1-7 [doi]
- Congestion-Free Rerouting of Network Flows: Hardness and an FPT AlgorithmEsra Ceylan, Krishnendu Chatterjee, Stefan Schmid 0001, Jakub Svoboda. 1-7 [doi]
- An Adaptable AI Assistant for Network ManagementAmar Abane, Abdella Battou, Mheni Merzouki. 1-3 [doi]
- SHIFT: a Security and Home Integration Framework for IoTKatharina O. E. Müller, Daria Schumm, Elliott Wallace, Bruno Rodrigues 0001, Burkhard Stiller. 1-7 [doi]
- Towards a Partial Computation offloading in In-networking Computing-Assisted MEC: A Digital Twin ApproachIbrahim Aliyu, Awwal Arigi, Seungmin Oh, Tai-Won Um, Jinsul Kim. 1-9 [doi]
- A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security GamesMd. Reya Shad Azim, Mustafa Abdallah. 1-6 [doi]
- Non-Cooperative Edge Server Selection Game for Federated Learning in IoTKinda Khawam, Hussein Taleb, Samer Lahoud, Hassan Fawaz, Dominique Quadri, Steven Martin 0001. 1-6 [doi]
- eMTD: Energy-Aware Moving Target Defense for Sustainable Solar-powered Sensor-based Smart FarmsDian Chen 0007, Ing-Ray Chen, Dong Sam Ha, Jin-Hee Cho. 1-7 [doi]
- Detect Silent Failures with Network SentinelChih-Wei Chang, Pei Jung, Chien-Che Hung, Yuan-Chih Chang. 1-3 [doi]
- Time Sensitive Industrial Applications in KubernetesDavid Balla, István Moldován, Miklós Máté, Markosz Maliosz, János Harmatos. 1-7 [doi]
- Transfer Learning Empowered Power Allocation in Holographic MIMO-enabled Wireless NetworkApurba Adhikary, Avi Deb Raha, Yu Qiao 0004, Seok-won Kang, Choong Seon Hong. 1-7 [doi]
- Demonstrating the Energy Consumption of Radio Access Networks in Container CloudsVenkateswarlu Gudepu, Rajashekhar Reddy Tella, Carlo Centofanti, José Santos, Andrea Marotta, Koteswararao Kondepu. 1-3 [doi]
- Extended Reality Based Education and Training for Human-Centric Industry 5.0 Skill EnhancementThomas Moser, Josef Wolfartsberger, Sabrina Romina Sorko, Belal Abu-Naim. 1-4 [doi]
- IP Geolocation with Adversarial Probe MitigationAndikan Otung, Kenji Hikichi, Yasuki Fujii, Motoyoshi Sekiya. 1-7 [doi]
- Identification of Device Dependencies Using Link PredictionLukás Sadlek, Martin Husák, Pavel Celeda. 1-10 [doi]
- Evolving the Industrial Internet of Things: The Advent of Secure CollaborationsJan Pennekamp. 1-6 [doi]
- PIPO-TG: Parameterizable High-Performance Traffic GenerationFilipo G. Costa, Francisco Germano Vogt, Fabricio E. Rodriguez Cesen, Ariel Góes de Castro, Marcelo Caggiani Luizelli, Christian Esteve Rothenberg. 1-9 [doi]
- Enabling 6G Campus Networks Intelligent Control with Digital Twin: A case studyZied Ennaceur, Mounir Bensalem, Cao Vien Phung, André C. Drummond, Admela Jukan. 1-6 [doi]
- Packet Continuity DDoS Attack Detection for Open Fronthaul in ORAN SystemJung-Erh Chang, Yi-Chen Chiu, Yi-Wei Ma, Zhi-Xiang Li, Cheng-Long Shao. 1-5 [doi]
- Using A Digital Twin for Verification of Automatic Fulfillment Procedures in Telecom ServicesChia-Lun Huang, Jyh-Yuan Chen, Yi-Chih Huang. 1-3 [doi]
- Improvement of Segment Length Selection Method for DASH Considering Shared Bottleneck LinksSumiko Miyata. 1-4 [doi]
- Optimizing Video Conferencing QoS: A DRL-based Bitrate Allocation FrameworkKyungchan Ko, Sangwoo Ryu, Nguyen Van Tu, James Won-Ki Hong. 1-10 [doi]
- DRL meets GNN to improve QoS in Tactical MANETsJohannes F. Loevenich, Roberto Rigolin F. Lopes. 1-4 [doi]
- A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic NetworkingThierry M. Ndimis Ndimis Toko, Martine Bellaïche, Talal Halabi. 1-5 [doi]
- Radio Environment Maps through Spatial Interpolation: A Web-based ApproachA. Almazi Bipon, Md Shantanu Islam, A. Taufiq Asyhari, Adel Aneiba, Raouf Abozariba. 1-7 [doi]
- SWPTMAC: Sleep Wake-up Power Transfer MAC ProtocolLuan Borges Dos Santos, Geraldo Pereira Rocha Filho, Lucas Bondan, Marcos Fagundes Caetano, Aletéia P. F. Araújo, Marcelo Antonio Marotta. 1-8 [doi]
- Comparing Two-stage Clustering Methods for Traffic Pattern Analysis in IoT Device IdentificationMizuki Asano, Takumi Miyoshi, Taku Yamazaki. 1-6 [doi]
- Thimblerig: A Game-Theoretic, Adaptive, Risk-limiting Security System for Cloud SystemsGautam Kumar, Brent Lagesse. 1-6 [doi]
- AI-Driven Traffic-Aware Dynamic TDD Configuration in B5G NetworksSanguk Jeong, Dahyun Mok, Gyurin Byun, Lusungu Josh Mwasinga, Hyunseung Choo. 1-4 [doi]
- An AI/ML Proactive Network Service Relocation Approach for Multi-Admin Domain ScenariosJorge Baranda, Akram Galal, Luca Vettori, Asterios Mpatziakas, Andrea Gentili, Anastasios Sinanis, Anastasia Yastrebova-Castillo, Guillermo Gomez, Sozos Karageorgiou, Anastasios Drosou, Johan Scholliers, Miquel Payaró, Josep Mangues-Bafalluy. 1-3 [doi]
- Correctness of Flow Migration for Service Function ChainsRanjan Patowary, Gautam Barua, Radhika Sukapuram. 1-9 [doi]
- A Novel Service Node Selection Approach Towards Resource-intensive Cloud Computing EnvironmentYongyang Cheng, Feng Jiang. 1-4 [doi]
- Automatic and optimized firewall reconfigurationFrancesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza. 1-9 [doi]
- Evaluating Open-Source 5G SA Testbeds: Unveiling Performance Disparities in RAN ScenariosMohamed Rouili, Niloy Saha, Morteza Golkarifard, Mohammad Zangooei, Raouf Boutaba, Ertan Onur, Aladdin Saleh. 1-6 [doi]
- Spinner: Enabling In-network Flow Clustering Entirely in a Programmable Data PlaneLuigi Cannarozzo, Thiago Bortoluzzi Morais, Paulo Silas Severo de Souza, Leonardo Reinehr Gobatto, Ivan Peter Lamb, Pedro Arthur P. R. Duarte, José Rodrigo Furlanetto Azambuja, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Weverton Cordeiro, Marcelo Caggiani Luizelli. 1-9 [doi]
- Learn to Compress (LtC): Efficient Learning-based Streaming Video AnalyticsQuazi Mishkatul Alam, Israat Haque 0001, Nael B. Abu-Ghazaleh. 1-9 [doi]
- Lightweight Security for IoT Systems leveraging Moving Target Defense and Intrusion DetectionVan Tien Nguyen, Renzo E. Navas, Guillaume Doyen. 1-6 [doi]
- Design of an AI-driven Network Digital Twin for advanced 5G-6G network managementAmit Karamchandani, Mario Sanz Rodrigo, Ángela Burgaleta, Luis De La Cal, Alberto Mozo, José Ignacio Moreno, Antonio Pastor 0001, Diego R. López. 1-7 [doi]
- Orchestrating Multi-Tenant Code Updates Across Multiple Programmable SwitchesTimo Geier, Sebastian Rieger. 1-3 [doi]
- BatchIT: Intelligent and Efficient Batching for IoT Workloads at the EdgeGuoxi Wang, Ryan Hildebrant, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian. 1-7 [doi]
- Enhanced C-V2X Mode-3 with Smart Handover and Wide-area Propagation of Emergency WarningsMoin Ali, Hyundong Hwang, Young-Tak Kim. 1-9 [doi]
- AIMS5.0 AI Toolbox: Enabling Efficient Knowledge Sharing for Industrial AIGergely Hollósi, Dániel Ficzere, Attila Frankó, Máté Bancsics, Ruba Almahasneh, Csaba Lukovszki, Pál Varga. 1-6 [doi]
- On-demand network bandwidth reservation method exploiting machine learning intuitive judgmentKouichi Genda. 1-5 [doi]
- Formal Verification for Blockchain-based Insurance Claims ProcessingRoshan Lal Neupane, Ernest Bonnah, Bishnu Bhusal, Kiran Neupane, Khaza Anuarul Hoque, Prasad Calyam. 1-5 [doi]
- TimeGAN as a Simulator for Reinforcement Learning Training in Programmable Data PlanesThiago Caproni Tavares, Leandro C. de Almeida, Washington Rodrigo Dias da Silva, Marco Chiesa, Fábio L. Verdi. 1-9 [doi]
- Open RAN Embracing Continual Learning: Towards NextG Adaptive Traffic AnalysisMrityunjoy Gain, Avi Deb Raha, Apurba Adhikary, Kitae Kim, Choong Seon Hong. 1-7 [doi]
- Protocol Security in the Industrial Internet of ThingsMarkus Dahlmanns, Klaus Wehrle. 1-4 [doi]
- Framework for the development of a Network Digital TwinÁngela Burgaleta, Ignacio Dominguez Martinez-Casanueva, Amit Karamchandani, Diego R. López, Antonio Pastor 0001. 1-5 [doi]
- Security Automation in next-generation Networks and Cloud environmentsFrancesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza. 1-4 [doi]
- Latency-Aware Cache Mechanism for Resolver Service of Domain Name SystemsIbirisol Fontes Ferreira, Eiji Oki. 1-4 [doi]
- Energy-Efficient Trajectory and Age of Information Optimization for Urban Air MobilityHyeonsu Kim, Yu Min Park, Pyae Sone Aung, Md. Shirajum Munir, Choong Seon Hong. 1-5 [doi]
- A Blockchain-based Approach for Continuous Auditing in IT Change ManagementCarlos Fraga, Antônio J. G. Abelém, Vinicius C. M. Borges, Billy Pinheiro, Weverton Cordeiro. 1-4 [doi]
- Hierarchical Software-Defined Control for coordinated RAN and PON-based Transport ScalingAlessandro Pacini, Andrea Sgambelluri, Carlo Centofanti, Andrea Marotta, Emilio Paolini, Alessio Giorgetti, Luca Valcarenghi. 1-3 [doi]
- Joint SDN Synchronization and Controller Placement in Wireless Networks using Deep Reinforcement LearningAkrit Mudvari, Leandros Tassiulas. 1-9 [doi]
- Comparing Transfer Learning and Rollout for Policy Adaptation in a Changing Network EnvironmentForough Shahab Samani, Hannes Larsson, Simon Damberg, Andreas Johnsson, Rolf Stadler. 1-7 [doi]
- Analysis of Diffusion Process of ICN Based on Economic FactorsShuntaro Hashimoto, Makoto Misumi, Noriaki Kamiyama. 1-5 [doi]
- Proposal and Investigation of a Distributed Learning Strategy for training of Neural Networks in Earth Observation Application ScenariosFrancesco Valente, Francesco Giacinto Lavacca, Tiziana Fiori, Vincenzo Eramo. 1-7 [doi]
- Lightweight Multi-Input Shape CNN-based Application Traffic ClassificationUi-Jun Baek, Min-Seong Lee, Jee-Tae Park, Jeong Woo Choi, Chang-Yui Shin, Ju-Sung Kim, Yoon-Seong Jang, Myung-Sup Kim. 1-5 [doi]
- perfSONAR: Enhancing Data Collection through Adaptive SamplingAli Mazloum, Ali AlSabeh, Elie F. Kfoury, Jorge Crichigno. 1-6 [doi]
- The True Cost of Network Security Automation: Demo Playbook for Posture AssessmentDaniel Tovarnák, Michal Cech, Vojtech Dohnal, Martin Hamerník, Matús Racek, Dusan Tichý. 1-3 [doi]
- Trusted Digital Twin Network for Intelligent VehiclesAsad Malik, Ayan Roy, Sanjay Madria. 1-5 [doi]
- A Self-assessment Tool to Encourage the Uptake of Artificial Intelligence in Digital WorkspacesBelal Abu-Naim, Yasin Ghafourian, Markus Tauber, Fabian Lindner, Christoph Schmittner, Erwin Schoitsch, Germar Schneider, Olga Kattan, Gerald Reiner, Anna Ryabokon, Francesca Flamigni, Konstantina Karathanasopoulou, George Dimitrakopoulos 0001. 1-5 [doi]
- Preparing for the 6G Era: Introducing the Internet of EdgesKhaldoun Al Agha, Pauline Loygue, Guy Pujolle. 1-3 [doi]
- Optimal Resource Utilization in Hyperledger Fabric: A Comprehensive SPN-Based Performance Evaluation ParadigmCarlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, Leonel Feitosa, Iure Fé, André Soares 0001, Eunmi Choi, Tuan Anh Nguyen 0002, Dugki Min. 1-7 [doi]
- To Squelch or not to Squelch: Enabling Improved Message Dissemination on the XRP LedgerLucian Trestioreanu, Flaviene Scheidt de Cristo, Wazen M. Shbair, Jérôme François, Damien Magoni, Radu State. 1-7 [doi]
- ERAFL: Efficient Resource Allocation for Federated Learning Training in Smart HomesTina Rezaei, Suzan Bayhan, Andrea Continella, Roland van Rijswijk-Deij. 1-5 [doi]
- OLIViS: An OSINT-Based Lightweight Method for Identifying Video Services in Backbone ISPsYuki Tamura, Fumio Teraoka, Takao Kondo. 1-9 [doi]
- Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS ServersDemétrio Francisco Freitas Boeira, Eder John Scheid, Muriel Figueredo Franco, Luciano Zembruzki, Lisandro Zambenedetti Granville. 1-9 [doi]
- Peaking Beyond the Best Route: An Extensive Dataset for Looking GlassesPascal Hennen, Poornima Mani, Anja Feldmann. 1-7 [doi]
- A Design and Development of Operator for Logical Kubernetes Cluster over Distributed CloudsThanh-Nguyen Nguyen, Jangwon Lee, Mafeni Vitumbiko, Younghan Kim. 1-6 [doi]
- Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow MetadataJeffrey Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh. 1-7 [doi]
- iCPN: Scalable Control Plane for the Network Service Automation SystemPedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda. 1-5 [doi]
- Energy-Aware VNF-FG Placement with Transformer-based Deep Reinforcement LearningRania Sahraoui, Omar Houidi, Fetia Bannour. 1-9 [doi]
- Real-Time Application Identification Method for Mobile Networks Using Machine LearningTatsuhiro Ou, Akihiro Nakao. 1-6 [doi]
- Unconsidered Installations: Discovering IoT Deployments in the IPv6 InternetMarkus Dahlmanns, Felix Heidenreich, Johannes Lohmöller, Jan Pennekamp, Klaus Wehrle, Martin Henze. 1-8 [doi]
- TCI: A system for distributed network monitoring, troubleshooting and dataset creationDominik Soukup, Jaroslav Pesek, Lukás Hejcman, David Benes, Tomás Cejka. 1-6 [doi]
- RPL at Scale: Experiences from a Performance Evaluation on up to 700 IEEE 802.15.4 DevicesMateusz Banaszek, Markus Schuß, Carlo Alberto Boano, Konrad Iwanicki. 1-6 [doi]
- Towards Autonomous Networks-Applying Digital Twin to 5G Xhaul Telecom Equipment Configuration Dynamic ManagementChueh-Pai Lee, Zheng Lei, Min-Tzu Liao. 1-5 [doi]
- Impact of Graph-to-Sequence Conversion Methods on the Accuracy of Graph Generation for Network SimulationsKazuhiro Yasuda, Sho Tsugawa, Kohei Watabe. 1-5 [doi]
- SFC Consolidation: Energy-aware SFC Management using Deep Reinforcement LearningEui-Dong Jeong, Jae-Hyoung Yoo, James Won-Ki Hong. 1-5 [doi]
- Data Distribution-Aware Model Aggregation for non-IID Data in a Federated Learning FrameworkDeepali Kushwaha, Ananya Mehrotra, Rajesh M. Hegde. 1-7 [doi]
- Distributed Intelligence for Automated 6G Network Management Using Reinforcement LearningSayantini Majumdar, Susanna Schwarzmann, Riccardo Trivisonno, Georg Carle. 1-4 [doi]
- One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical SystemsRobin Buchta, Tobias Fritz, Carsten Kleiner, Felix Heine, Gabi Dreo Rodosek. 1-5 [doi]
- Coupled Design and Analysis of Experiments in Network ManagementRafael Adán-López, David Fernández-Martínez, Rafael A. Rodríguez-Gómez, José Camacho 0001. 1-5 [doi]
- Gamu Blue: A Practical Tool for Game Theory Security EquilibriaAmeer Taweel, Burcu Yildiz, Alptekin Küpçü. 1-6 [doi]
- Federated Learning-Driven Edge AI for Enhanced Mobile Traffic PredictionHyunsung Kim, Yeji Choi, Jeongjun Park, Lusungu Josh Mwasinga, Hyunseung Choo. 1-4 [doi]
- TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive LearningShangdong Wang, Zhiliang Wang, Chenglong Li, Dongqi Han, Jiahai Yang 0001, Hui Zhang 0052. 1-9 [doi]
- Improving Multi-Tenant I/O-Acceleration for Containerized Network Function EnvironmentsTimo Geier. 1-4 [doi]
- Adaptive In-Network Queue Management using Derivatives of Sojourn Time and Buffer SizeSaad Saleh, Sunny Shu, Boris Koldehofe. 1-6 [doi]
- Harvesting Innovation: Analysis of Decentralized MAPE-K Loops in Cyber-Physical Production SystemsMichael Boch, Christian Hirsch, Yukari Susaki, Stefan Gindl, Markus Tauber. 1-7 [doi]
- GAN-Enhanced Vertical Federated Learning System for WHAR with non-IID DataChanmin Lee, Shinyoung Cho, Hyungbin Park, Jihyun Park, SuKyoung Lee. 1-5 [doi]
- MLOps in CPS - a use-case for image recognition in changing industrial settingsPál Varga, Ádám Kovári, Márton Herkules, Csaba Hegedüs. 1-4 [doi]
- Realizing Open and Decentralized Marketplace for Exchanging Data of Expected IoT BehaviorsSong Guo, Minzhao Lyu, Hassan Habibi Gharakheili. 1-5 [doi]
- Over-The-Air updates for Software Defined Vehicle services with IPFSJosé Oliveira, Pedro Almeida, Pedro Rito, Duarte M. G. Raposo, Susana Sargento. 1-9 [doi]
- Utilizing Generative AI for Test Data Generation - use-cases for IoT and 5G Core SignalingTamás Tóthfalusi, Zoltán Csiszár, Pál Varga. 1-6 [doi]
- Katoptron: Efficient State Mirroring for Middlebox ResilienceLyn Hill, Charalampos Rotsos, Christopher Edwards, David Hutchison 0001. 1-9 [doi]
- Securing P4-SDN Data Plane against Flow Table Modification AttackBuchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan. 1-5 [doi]
- VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion ServiceKyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto. 1-5 [doi]
- Upsampling Aggregated Network Traffic Data with Denoising Diffusion Probabilistic ModelsNicolas Dupuis, Axel Van Damme, Philippe Dierickx, Olivier Delaby. 1-6 [doi]
- Optimal quadratic control of queues by dynamic service ratesRuben H. Milocco, Paul Mühlethaler, Selma Boumerdassi, Éric Renault. 1-4 [doi]
- The Evolution of Kubernetes Management: Introducing the KubeTwin FrameworkMattia Zaccarini, Mauro Tortonesi, Filippo Poltronieri. 1-4 [doi]
- DigSiNet: Using Multiple Digital Twins to Provide Rhythmic Network ConsistencySebastian Rieger, Leon-Niklas Lux, Jannik Schmitt, Martin Stiemerling. 1-5 [doi]
- Improving Resilience of Future Mobile Network Generations Implementing Zero Trust ParadigmKamyar Abedi, Giang T. Nguyen 0002, Thorsten Strufe. 1-5 [doi]
- End-to-End Detection of Middlebox InterferenceVahab Pournaghshband, Peter L. Reiher. 1-9 [doi]
- Latency-aware Scheduling in the Cloud-Edge ContinuumCristopher Chiaro, Doriana Monaco, Alessio Sacco, Claudio Casetti, Guido Marchetto. 1-5 [doi]
- Adaptive Transmit Power Control for 3GPP C-V2X Networks by Considering Traffic ConditionsShao-Wei Kao, Kai-Yi Yang, Meng-Shiuan Pan. 1-5 [doi]
- StateOS: Enabling Versatile Network Function Virtualization in Edge CloudsTung V. Doan, Frank H. P. Fitzek, Giang T. Nguyen 0002. 1-9 [doi]
- Intent Assurance using LLMs guided by Intent DriftKristina Dzeparoska, Ali Tizghadam, Alberto Leon-Garcia. 1-7 [doi]
- ProNA: A Virtual Lab Framework to Teach Network Automation and SDN in Undergraduate CoursesSebastian Rieger, Martin Stiemerling. 1-3 [doi]
- Towards Ultra-Reliable 6G: Semantics Empowered Robust Beamforming for Millimeter-Wave NetworksAvi Deb Raha, Apurba Adhikary, Mrityunjoy Gain, Yu Min Park, Choong Seon Hong. 1-7 [doi]
- Enhancing Network Data Plane Analysis with Native Graph DatabaseAmar Abane, Abdella Battou, Mheni Merzouki. 1-9 [doi]
- Demo: Towards Reliable Cloud-native 5G and Beyond Networks using In-Network ComputingMahdi Attawna, Osel Lhamo, Tung V. Doan, Frank H. P. Fitzek, Giang T. Nguyen 0002. 1-3 [doi]
- Efficient Microservice Deployment in Kubernetes Multi-Clusters through Reinforcement LearningJosé Santos 0001, Mattia Zaccarini, Filippo Poltronieri, Mauro Tortonesi, Cesare Sleianelli, Nicola Di Cicco, Filip De Turck. 1-9 [doi]
- Enabling Big Data and Machine Learning Applications in High-Stakes EnvironmentsSimon Dahdal, Mauro Tortonesi. 1-4 [doi]
- Analysis of Statistical Distribution Changes of Input Features in Network Traffic Classification DomainLukás Jancicka, Josef Koumar, Dominik Soukup, Tomás Cejka. 1-4 [doi]
- Unlocking Security to the Board: An Evaluation of SmartNIC-driven TLS Acceleration with kTLSFelipe A. S. Novais, Fábio L. Verdi. 1-9 [doi]
- Anomaly Detection in Security Logs using Sequence ModelingSimon Gökstorp, Jakob Nyberg, Yeongwoo Kim, Pontus Johnson, György Dán. 1-9 [doi]
- Modeling the Coexistence Performance between Wi-Fi 7 and legacy Wi-FiSuhwan Jung, Seokwoo Choi, Hyoil Kim, YoungKeun Yoon, Ho-Kyung Son. 1-4 [doi]
- A Machine Learning Operations Platform for Streamlined Model Serving in Industry 5.0Lorenzo Colombi, Alessandro Gilli, Simon Dahdal, Ion Boleac, Mauro Tortonesi, Cesare Stefanelli, Massimiliano Vignoli. 1-6 [doi]
- Polus: Detecting and Characterising Latency Under Load In Multi-Bottleneck Wireless Internet Service Provider NetworksDuncan E. Cameron, Murugaraj Odiathevar, Alvin C. Valera, Winston K. G. Seah. 1-7 [doi]
- Residence Time Aware Client Selection in Federated Learning in Vehicular NetworkSelman Sezgin, Kahina Mokrani, Sylvain Allio, Nour-El-Houda Yellas. 1-7 [doi]
- A Secure Framework in Vertical and Horizontal Federated Learning Utilizing Homomorphic EncryptionLi-Yin Bai, Pei-Hsuan Tsai. 1-5 [doi]
- RDA: Residence Delay Aggregation for Time-Sensitive NetworkingChengbo Zhou, Christoph Gärtner, Amr Rizk, Boris Koldehofe, Björn Scheuermann 0001, Ralf Kundel. 1-5 [doi]
- Investigate and Improve the Certificate Revocation in Web PKIChengyuan Zhang, Changqing An, Tao Yu, Zhiyan Zheng, Jilong Wang 0001. 1-5 [doi]
- Adaptive Configuration with Deep Reinforcement Learning in Software-Defined Time-Sensitive NetworkingMengjie Guo, Guochu Shou, Yaqiong Liu, Yihong Hu. 1-7 [doi]
- Virtual Multi-Topology Routing for QoS ConstraintsNicolas Huin, Sébastien Martin, Jérémie Leguay. 1-9 [doi]
- Dynamic QoS for High Quality SD-WAN OverlaysPham Tran Anh Quang, Jérémie Leguay, Feng Zeng, Jianqiang Hou, BoYuan Yu, Davide Restivo. 1-3 [doi]
- EdgeURB: Edge-driven Unified Resource Broker for Real-time Video AnalyticsXiaojie Zhang, Amitangshu Pal, Saptarshi Debroy. 1-8 [doi]
- IT Intrusion Detection Using Statistical Learning and Testbed MeasurementsXiaoxuan Wang, Rolf Stadler. 1-7 [doi]
- An Enhancement Framework for RDMA Congestion Control in Multi-tenant DatacentersTianshi Wang, Yiran Zhang, Ao Zhou 0001, Shangguang Wang. 1-9 [doi]
- ChatGPT-enabled Network Automation using API-based PromptsOlasupo Okunaiya, Ron Austin, Shao Ying Zhu. 1-5 [doi]
- Deep Tailored Dynamic Registration in B5G/6G with Lightweight Recurrent ModelBokkeun Kim, Gyeongsik Kim, Jin Kim, Syed M. Raza, Hyunseung Choo. 1-5 [doi]
- Pilot Optimization and Channel Estimation Scheme for Semantic Communication: A Framework for Edge IntelligenceKitae Kim, Yan Kyaw Tun, Md. Shirajum Munir, Walid Saad, Choong Seon Hong. 1-7 [doi]
- Similarity-Based Selective Federated Learning for Distributed Device-Specific Anomaly DetectionChristian Lübben, Marc-Oliver Pahl. 1-5 [doi]
- Deep UAV Path Planning with Assured Connectivity in Dense Urban SettingJiyong Oh, Syed M. Raza, Lusungu Josh Mwasinga, Moonseong Kim, Hyunseung Choo. 1-5 [doi]
- Quantifying the Impact of Frame Preemption on Combined TSN ShapersRubi Debnath, Philipp Hortig, Luxi Zhao 0001, Sebastian Steinhorst. 1-9 [doi]
- Dynamic Wavelength Switching for Open All-Photonics NetworksLi-Hsuan Chu, Yen-Lin Tung, Yong-Zen Huang, Jhih-Heng Yan, Kuang-Heng Shen. 1-5 [doi]
- A Preliminary Study on the Aggregation of FIBs at ICN Routers using Routing StrategyRyo Nakamura, Noriaki Kamiyama. 1-5 [doi]
- Drift-Aware Policy Selection for Slice Admission ControlJesutofunmi Ajayi, Antonio Di Maio, Torsten Braun. 1-9 [doi]
- ANOVA Simultaneous Component Analysis for the Efficient Exploration of Massive Network TrafficJosé Camacho 0001. 1-5 [doi]
- Eliminating Bottlenecks in MANETsKlement Hagenhoff, Gabi Dreo Rodosek. 1-5 [doi]
- Towards a Transformer-Based Pre-trained Model for IoT Traffic ClassificationBruna Bazaluk, Mosab Hamdan, Mustafa Ghaleb, Mohammed Salih Mohammed Gismalla, Flávio S. Corrêa da Silva, Daniel Macêdo Batista. 1-7 [doi]
- SpinTrap: Catching Speeding QUIC FlowsIke Kunze, Constantin Sander, Lars Tissen, Benedikt Bode, Klaus Wehrle. 1-10 [doi]
- Completion of Traffic Matrix by Tensor Nuclear Norm Minus Frobenius Norm Minimization and Time SlicingTakamichi Miyata. 1-5 [doi]
- A ML-Based Model for Evaluating the Power Consumption of Network DevicesChi-Sheng Hsu, Yi-Cheng Chu, Ya-Ping Huang, Lung-Chin Huang, Che-Chun Teng, Chin-Ping Chuang. 1-5 [doi]
- ML-based 5G Core Network Load Forecasting With Metrics From Performance ManagementTse-Ming Chen, Chien Chen, Jyh-Cheng Chen. 1-5 [doi]
- AI-based Network Function Virtualization OrchestrationHeegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong. 1-5 [doi]
- Oz: Towards an Extensible Intent Handler Architecture with Semantic ReasoningPaul Alcock, Charalampos Rotsos, Nicholas J. P. Race. 1-5 [doi]
- Windower: Feature Extraction for Real-Time DDoS Detection Using Machine LearningPatrik Goldschmidt, Jan Kucera. 1-10 [doi]
- CLAIM: A cloud-based framework for Internet-scale measurementsRafi Kurnia Putra, Lorenzo Corneo, Walter Wong, Mario Di Francesco. 1-6 [doi]
- Unmasking the Phishermen: Phishing Domain Detection with Machine Learning and Multi-Source IntelligenceRadek Hranický, Adam Horák, Jan Polisenský, Kamil Jerábek, Ondrej Rysavý. 1-5 [doi]
- Smoothie: Efficient and Flexible Load-Balancing in Data CenterLoïc Champagne, Benoit Donnet. 1-7 [doi]
- Multi-agent Reinforcement Learning-based Network Intrusion Detection SystemAmine Tellache, Amdjed Mokhtari, Abdelaziz Amara Korba, Yacine Ghamri-Doudane. 1-9 [doi]
- Transport Assistants to Enhance TCP Performance: Analysis of the Packet Delivery DelayJaime Galán-Jiménez, Mohamed Faten Zhani, Luis Jesús Martín León, John Kaippallimalil. 1-5 [doi]
- A Generic Framework for Resource-Limited Microcontrollers Deployment in I-IoT SystemsBelal Abu-Naim, Yasin Ghafourian, Anna Ryabokon, Francesca Flamigni, Ralph Baldrian. 1-6 [doi]
- Online Policy Adaptation for Networked Systems using RolloutForough Shahab Samani, Kim Hammar, Rolf Stadler. 1-9 [doi]
- A 9-dimensional Analysis of GossipSub over the XRP Ledger Consensus ProtocolFlaviene Scheidt de Cristo, Jorge Augusto Meira, Jean-Philippe Eisenbarth, Radu State. 1-7 [doi]
- Log-TF-IDF for Anomaly Detection in Network SwitchesSukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong. 1-9 [doi]
- Digital Twin Network for dynamic management of a Bluetooth Mesh NetworkJorg Wieme, Mathias Baert, Jeroen Hoebeke. 1-3 [doi]
- Using Contextual Reinforcement Learning to Design FANET Defence Protocols to Combat Grey Hole AttacksCharles Hutchins. 1-4 [doi]
- Shells Bells: Cyber-Physical Anomaly Detection in Data CentersLars Wüstrich, Sebastian Gallenmüller, Stephan M. Günther, Georg Carle, Marc-Oliver Pahl. 1-10 [doi]
- Multi-armed Bandits for Self-distributing Stateful Services across Networking InfrastructuresFrederico Meletti Rappa, Roberto Rodrigues Filho, Alison R. Panisson, Leandro Soriano Marcolino, Luiz F. Bittencourt. 1-6 [doi]
- Inferring Visibility of Internet Traffic Matrices Using eXplainable AICristian Zilli, Alessio Sacco, Doriana Monaco, Okwudilichukwu Okafor, Flavio Esposito, Guido Marchetto. 1-6 [doi]
- Distributed and Adaptive Workload Prediction for In-Network ComputingTakaya Miyazawa, Ved P. Kafle, Hitoshi Asaeda. 1-7 [doi]
- FTA-detector: Troubleshooting Gray Link Failures Based on Fault Tree AnalysisYan Zou, Tian Pan 0001, Qiang Fu 0011, Chenhao Jia, Qingqiang Yi, Ying Wan, Jiao Zhang 0002, Tao Huang 0005. 1-9 [doi]
- MANET-Rank: A Framework for Defence Protocols against Packet Dropping Attacks in MANETsCharles Hutchins, Leonardo Aniello, Enrico H. Gerding, Basel Halak. 1-8 [doi]
- Practical Anomaly Detection in Internet Services: An ISP centric approachAlex Huang Feng, Pierre François, Kensuke Fukuda, Wanting Du, Thomas Graf, Paolo Lucente, Stéphane Frénot. 1-4 [doi]
- Towards Intent-based Configuration for Network Function Virtualization using In-context Learning in Large Language ModelsNguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 1-8 [doi]
- Microservices in Edge and Cloud Computing for Safety in Intelligent Transportation SystemsJoão Oliveira, Pedro Teixeira, Pedro Rito, Miguel Luís, Susana Sargento, Bruno Parreira. 1-7 [doi]
- Demo: Towards Rapid Prototyping Network-Slicing Solutions in Software-Defined NetworksFritz Windisch, Kamyar Abedi, Giang T. Nguyen 0002, Thorsten Strufe. 1-3 [doi]
- Discovery of Cloud Incidents through Streaming Consolidation of Events across Timeline and Topology HierarchyAshot N. Harutyunyan, Arnak V. Poghosyan, Tigran Bunarjyan, Naira Grigoryan, Artur Grigoryan, Vahan Tadevosyan, Nelson Baloian. 1-7 [doi]
- Reconfiguration with Virtual Gate Control List for Deterministic Transmission in Time-Sensitive NetworksMengjie Guo, Guochu Shou, Yaqiong Liu, Yihong Hu. 1-6 [doi]
- RECAP 5GC: Resilience and CAP aware 5G Core for Consistent and High Availability ServiceSiddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin. 1-7 [doi]
- Towards Effective Reinforcement Learning in Video Conferencing using Network Status Data and Model AnalysisSangwoo Ryu, Kyungchan Ko, Nguyen Van Tu, James Won-Ki Hong. 1-9 [doi]
- Network Slice Robustness with Function SetsNour-El-Houda Yellas, Jeongku Choi, Prosper Chemouil, Stefano Secci, Deep Medhi. 1-9 [doi]
- Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFLChao Feng, Alberto Huertas Celdrán, Michael Vuong, Gérôme Bovet, Burkhard Stiller. 1-9 [doi]
- Improving the Traffic Engineering of SDN networks by using Local Multi-Agent Deep Reinforcement LearningJosé Gómez-delaHiz, Jaime Galán-Jiménez. 1-5 [doi]
- Graph Neural Networks for IoT Data Aggregation SchedulingVan Vi Vo, Syed M. Raza, Duc Tai Le, Moonseong Kim, Hyunseung Choo. 1-7 [doi]
- Accelerating Containerized Machine Learning WorkloadsAli Tariq, Lianjie Cao, Faraz Ahmed, Eric Rozner, Puneet Sharma. 1-10 [doi]
- S-Witch: Switch Configuration Assistant with LLM and Prompt EngineeringEui-Dong Jeong, Heegon Kim, Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong. 1-7 [doi]