Abstract is missing.
- Towards Optimized Verification and Validation of 5G ServicesMarios Touloupou, Evgenia Kapassa, Argyro Mavrogiorgou, Dimosthenis Kyriazis. 5-10 [doi]
- Synchronization of Multiple USRP SDRs for Coherent Receiver ApplicationsMarkus Krueckemeier, Fabian Schwartau, Carsten Monka-Ewe, Joerg Schoebel. 11-16 [doi]
- Network Defragmentation in Virtualized Data CentersOliver Michel, Eric Keller, Fernando M. V. Ramos. 17-24 [doi]
- RADIS: Remote Attestation of Distributed IoT ServicesMauro Conti, Edlira Dushku, Luigi V. Mancini. 25-32 [doi]
- Enhancing Multipath TCP Security Through Software Defined NetworkingReem Melki, Ali Hussein, Ali Chehab. 33-38 [doi]
- An MPTCP-Compatible Load Balancing Solution for Pools of Servers in OpenFlow SDN NetworksPilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja. 39-46 [doi]
- Scalable Load Balancing Scheme for Distributed Controllers in Software Defined Data CentersMohamed Escheikh, Kamel Barkaoui. 47-54 [doi]
- Evasion Attacks Against Watermarking Techniques found in MLaaS SystemsDorjan Hitaj, Briland Hitaj, Luigi V. Mancini. 55-63 [doi]
- LiON: A L3 Protocol Agnostic Experimental Network Construction Tool Based on Infrastructure as CodeKazuki Hayashi, Hiroki Watanabe, Takao Kondo, Fumio Teraoka. 64-71 [doi]
- Securing Industrial Remote Maintenance Sessions using Software-Defined NetworkingAlexander Kern, Reiner Anderl. 72-79 [doi]
- eMES: Easing Maintenance of Entity Services in Service Oriented Software-Defined Internet of ThingsHaiming Chen, Valerio Persico, Antonio Pescapè. 80-87 [doi]
- Enabling Scalability, Adaptivity, and Resilience in Cloud Applications by Software-defined M-Task-based ProgrammingThomas Rauber, Gudula Rünger. 88-95 [doi]
- Hybrid SDN-ICN Architecture Design for the Internet of ThingsHuda Saadeh, Wesam Almobaideen, Khair Eddin Sabri, Maha Saadeh. 96-101 [doi]
- Use of Redundancy in the Design of a Secure Software Defined Industrial Control ApplicationGabriele Gualandi, Emiliano Casalicchio. 102-109 [doi]
- A Survey on Android Malware Detection Techniques Using Machine Learning AlgorithmsEbtesam J. Alqahtani, Rachid Zagrouba, Abdullah Almuhaideb. 110-117 [doi]
- Extending NS3 to Simulate Cognitive Radio Wireless Networks in a Jammed EnvironmentSufyan Almajali, Haythem Bany Salameh, Moussa Ayyash, Hany Elgala. 118-122 [doi]
- An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure ScenariosD. Oliveira, Mahsa Pourvali, Jorge Crichigno, Elias Bou-Harb, Mohamed Rahouti, N. Ghani. 123-129 [doi]
- An SDN-aided Information Centric Networking Approach to Publish-Subscribe with Mobile ConsumersPaolo Benedetti, Agnese V. Ventrella, Giuseppe Piro, Luigi Alfredo Grieco. 130-137 [doi]
- A Qualitative Cross-Comparison of Emerging Technologies for Software-Defined SystemsAwais Aziz Shah, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia. 138-145 [doi]
- Machine Learning for Network Resiliency and ConsistencyAli Hussein, Ola Salman, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 146-153 [doi]
- Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution deviceMalik junaid jami Gul, Riaz Rabia, Yaser Jararweh, M. Mazhar Rathore, Anand Paul. 154-159 [doi]
- Multi-Covert Channel Attack in the CloudMahdi Akil, Luigi V. Mancini, Daniele Venturi 0001. 160-165 [doi]
- Novel Weighted Interest Similarity Measurement for Recommender Systems Using Rating TimestampBilal Hawashin, Darah Aqel, Shadi AlZu'bi, Yaser Jararweh. 166-170 [doi]
- Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and ContainersIlias Mavridis, Helen D. Karatza. 171-178 [doi]
- Fuzzy-GRA Trust Model for Cloud Risk ManagementAbdul Razaque, Muder Almiani, Meer Jaro Khan, Basel Magableh, Ayman Al-Dmour, Amer Al-Rahayfeh. 179-185 [doi]
- A Study of the Forwarding Blackhole phenomenon during Software-Defined Network UpdatesAmine Guidara, Saúl E. Pomares Hetnández, Lil María X. Rodríguez Henríquez, Hatem Hadj Kacem, Ahmed Hadj Kacem. 186-193 [doi]
- Optimized Availability-Aware Component Scheduler for Applications in Container-Based CloudYanal Alahmad, Tariq Daradkeh, Anjali Agarwal. 194-199 [doi]
- Intelligent Intrusion Detection Using Radial Basis Function Neural NetworkAlia Abu Ghazleh, Muder Almiani, Basel Magableh, Abdul Razaque. 200-208 [doi]
- Comparative Study for Recent Technologies in Arabic Language ParsingDarah Aqel, Shadi AlZu'bi, Siham Hamadah. 209-212 [doi]
- Blockchain Based Transparent Vehicle Insurance ManagementMehmet Demir, Ozgur Turetken, Alexander Ferworn. 213-220 [doi]
- Managing a Multi-device Multimedia Service Using Software Defined NetworksAlbert Rego-Mañez, Sandra Sendra, José Luis García-Navas, Jaime Lloret. 221-228 [doi]
- Local Regression Based Box-Cox Transformations for Resource Management in Cloud NetworksMustafa Daraghmeh, Anjali Agarwal, Nishith Goel, Jim Kozlowskif. 229-235 [doi]
- Achieving High Performance with Virtualized Data Plane Workloads for 5G NetworksDharma Rajan. 236-241 [doi]
- Trust-Aware Service Chain EmbeddingNariman Torkzaban, Chrysa Papagianni, John S. Baras. 242-247 [doi]
- Accelerating Packet Classification with Two Class Cuckoo Filters (TC-CF)Jorge A. Martínez, Pedro Reviriego, Salvatore Pontarelli. 248-253 [doi]
- Dynamic Hardware-Acceleration of VNFs in NFV EnvironmentsGourav Prateek Sharma, Wouter Tavernier, Didier Colle, Mario Pickavet. 254-259 [doi]
- SDN-based Slice Orchestration and MAC Management for QoS delivery in IEEE 802.11 NetworksPedro Heleno Isolani, Nelson Cardona, Carlos Donato, Johann Márquez-Barja, Lisandro Zambenedetti Granville, Steven Latré. 260-265 [doi]
- Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third PartiesHongwei Meng, Evan Bian, Cong Tang. 266-271 [doi]
- Using Blockchain Technology to Manage Membership and Legal Contracts in a Distributed Data MarketSven Schlarb, Roman Karl, Ross King, Thomas J. Lampoltshammer, Lörinc Thurnay, Bernd-Peter Ivanschitz, Víctor Mireles. 272-277 [doi]
- Exploring the impact of blockchain on digitized Supply Chain flows: A literature reviewPadraig Scully, Michael Höbig. 278-283 [doi]
- VNF Placement Strategy for Availability and Reliability of Network Services in NFVYanal Alahmad, Anjali Agarwal. 284-289 [doi]
- Blockchain based Application for Exchange of Left over Foreign CurrencyGökay Saldamli, Shreyas Babji, Miroslav Grubic, Nischala Raja Shekar, Chaitra Satyanarayana. 290-293 [doi]
- Immutable and Democratic Data in Permissionless Peer-to-Peer SystemsMaximilian Ernst Tschuchnig, Dejan Radovanovic, Eduard Hirsch, Anna-Maria Oberluggauer, Georg Schäfer. 294-299 [doi]
- A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and DeletionGyeong-Jin Ra, Im-Yeong Lee. 300-305 [doi]
- Choosing a Consensus Protocol for Uses Cases in Distributed Ledger TechnologiesNafissatou Diarra. 306-309 [doi]
- Trust Requirements in Blockchain Systems: A Preliminary StudyDuoaa Khalifa, Nadya Abdel Madjid, Davor Svetinovic. 310-313 [doi]