default search action
10th NetSoft 2024: Saint Louis, MO, USA
- 10th IEEE International Conference on Network Softwarization, NetSoft 2024, Saint Louis, MO, USA, June 24-28, 2024. IEEE 2024, ISBN 979-8-3503-6958-8
- Yiwen Shen, Yoseop Ahn, Mose Gu, Jaehoon Paul Jeong:
Intent-Based Management for Software-Defined Vehicles in Intelligent Transportation Systems. 1-6 - Ahlam Fuad, Azza H. Ahmed, Michael A. Riegler, Tarik Cicic:
An Intent-based Networks Framework based on Large Language Models. 7-12 - Kashif Mehmood, Katina Kralevska, David Palma:
Knowledge Graph Embedding in Intent-Based Networking. 13-18 - Stefano D'Urso, Mattia Fontana, Barbara Martini, Filippo Sciarrone:
Enhancing Intent Acquisition and Translation with Large Language Models and Intelligent Chatbots: A DHCP Use Case. 19-24 - Gaetano Francesco Pittalà, Cristian Zilli, Nicola Di Cicco, Gianluca Davoli, Alessio Sacco:
Recovering Missing Monitoring Data to Enhance Service Provisioning in the Edge-to-Cloud Continuum. 25-30 - Abebu Ademe Bayleyegn, Zaloa Fernández, Fabrizio Granelli:
Real-Time Monitoring of 5G Networks: An NWDAF and ML Based KPI Prediction. 31-36 - Travis Quinn, Syed Danial Ali Shah, Faycal Bouhafs, Frank T. H. den Hartog:
Towards trust-based routing for data plane security in heterogeneous Software-Defined Wireless Networks. 37-42 - Rashmi Yadav, Indu Yadav, Pranav Jha, Rashmi Kamran, Abhay Karandikar:
DY-RUM: Dynamic Resource Allocation for Converged Unicast and Multicast Transmission in 5G. 43-48 - Daniele Cacciabue, Jacopo Marino, Francesco Aglieco, Marco Levorato, Domenico Perroni, Fulvio Risso:
Benchmarking Different Strategies for Offloading ROS2 Computation to the Edge. 49-54 - Jean-Pierre H. Asdikian, Mengyao Li, Guido Maier:
Performance evaluation of YOLOv8 and YOLOv9 on custom dataset with color space augmentation for Real-time Wildlife detection at the Edge. 55-60 - Movsun Kuy, Laurent Schumacher, Sokchenda Sreng:
Managing and Orchestrating Cross-Cloud VNFs with Deployable Sidecar VNF Coordinators. 61-66 - Stefano Galantino, Elisa Albanese, Nasir Asadov, Stefano Braghin, Francesco Cappa, Andrea Colli-Vignarelli, Amjad Yousef Majid, Eduard Marin, Jacopo Marino, Lorenzo Moro, Liubov Nedoshivina, Fulvio Risso, Domenico Siracusa, Antonio F. Skarmeta, Luca Zuanazzi:
Building the Cloud Continuum with REAR. 67-72 - Christopher Gonzalez, Bin Tang:
AggVNF: Aggregate VNF Allocation and Migration in Dynamic Cloud Data Centers. 73-81 - Massinissa Ait Aba, Maya Kassis, Maxime Elkael, Andrea Araldo, Ali Al Khansa, Hind Castel-Taleb, Badii Jouaber:
Efficient Network Slicing Orchestrator for 5G Networks using a Genetic Algorithm-based Scheduler with Kubernetes: Experimental Insights. 82-90 - Qiong Liu, Tianzhu Zhang, Walter Cerroni, Leonardo Linguaglossa:
Proactive VNF Redeployment and Traffic Routing for modern telco networks. 91-99 - Masayuki Kurata, Akio Ikami, Sohei Itahara, Masaki Suzuki:
Signaling Storm Mitigation by Geographically Distributed C-plane NF Placement and Routing. 100-108 - Mihai-Valentin Dumitru, Dragos Dumitrescu, Costin Raiciu:
Towards automatic exploitation of programmable networks. 109-117 - Ramon Bister, Alexander Clemm, Severin Dellsperger, Reto Furrer:
Towards Sustainable Networking: Unveiling Energy Efficiency Through Hop and Path Efficiency Indicators in Computer Networks. 118-126 - Vahid Daneshmand, Kensworth C. Subratie, Renato J. O. Figueiredo:
PolyNet: Cost- and Performance-Aware Multi-Criteria Link Selection in Software-Defined Edge-to-Cloud Overlay Networks. 127-135 - Marcelo Caggiani Luizelli, Francisco Germano Vogt, Paulo Silas Severo de Souza, Arthur Francisco Lorenzon, Roberto Irajá Tavares da Costa Filho, Fábio D. Rossi, Rodrigo N. Calheiros, Christian Esteve Rothenberg:
DigiNet: Scaling up Provisioning of Network Digital Twin. 136-144 - Enrico Zanardo, Barbara Martini, Denise Bellisario:
Tokenized Intelligence: Redefine Network Optimization in Softwarized Networks. 145-148 - Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François:
Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services. 149-152 - Károly Kecskeméti, Csaba Györgyi, Péter Vörös, Géza Szabó, Sándor Laki:
Extensible FRER Security Testbed in a Box. 153-156 - Manjushree Muralidhara, Md. Shirajum Munir, Sravanthi Proddatoori, Sachin Shetty, Kimberly Gold:
Detecting Attacks and Optimizing Routes in Radio-frequency Networks Using Machine Learning and Graph Theory. 157-165 - Beny Nugraha, Kavya Kota, Thomas Bauschert:
Leveraging Federated Learning and Variational Autoencoders for an Enhanced Anomaly Detection System. 166-174 - Davide Andreotti, Giacomo Verticale:
Detection of Anomalous e2e Encrypted Function Invocation in FaaS using Zero-Knowledge Proofs. 175-179 - Navneet Kaur, Lav Gupta:
Enhancing IoT Security in 6G Environment With Transparent AI: Leveraging XGBoost, SHAP and LIME. 180-184 - Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. 185-189 - Lorenzo Rinieri, Antonio Iacobelli, Amir Al Sadi, Andrea Melis, Franco Callegati, Marco Prandini:
In-Network Encryption for Secure Industrial Control Systems Communications. 190-194 - Alireza Shirmarz, Fábio Luciano Verdi, Suneet Kumar Singh, Christian Esteve Rothenberg:
From Pixels to Packets: Traffic Classification of Augmented Reality and Cloud Gaming. 195-203 - Mazene Ameur, Bouziane Brik, Adlen Ksentini:
Leveraging LLMs to eXplain DRL Decisions for Transparent 6G Network Slicing. 204-212 - Abdirazak Ali Asir Rage, Ning Wang, Rahim Tafazolli:
NFScaler: AI-Powered 5G-and-Beyond Network Function Scaler for QoS Assurance and Energy Efficiency. 213-221 - Andrea Caruso, Christian Grasso, Raoul Raftopoulos, Giovanni Schembra:
An Adaptive Closed-Loop Encoding VNF for Virtual Reality Applications. 222-230 - Mattia Fontana, Barbara Martini, Filippo Sciarrone:
Exploring Large Language Models in Intent Acquisition and Translation. 231-234 - Dante Van Poucke, Wouter Tavernier, Didier Colle:
Network-Centered Resource Management for HPC Networks. 235-238 - Ariel Góes de Castro, Christian Esteve Rothenberg:
Innovative Approaches for Network Analysis and Optimization: Leveraging Deep Learning and Programmable Hardware. 239-242 - Venkat Sai Suman Lamba Karanam, Byrav Ramamurthy:
Improving Transfer Time Prediction of ML Models via Auto-correcting Dynamical Systems Modeling. 243-247 - Jui Mhatre, Ahyoung Lee, Hoseon Lee, Ngoc-Tu Nguyen:
DDPG_CAD: Intelligent Channel Activity Detection Scheduling in Massive IoT LoRaWAN. 248-252 - Abdelkader Mekrache, Adlen Ksentini:
LLM-enabled Intent-driven Service Configuration for Next Generation Networks. 253-257 - Jing Su, Suku Nair, Leo Popokh:
Leveraging Large Language Models for VNF Resource Forecasting. 258-262 - Jacopo Talpini, Fabio Sartori, Marco Savi:
Hierarchical Multiclass Continual Learning for Network Intrusion Detection. 263-267 - Aerman Tuerxun, Akihiro Nakao:
Comparative Analysis of Processing Latency and CPU Efficiency in FPGA-Based FEC Acceleration. 268-276 - Viviana Arrigoni, Matteo Finelli, Federico Trombetti, Novella Bartolini:
Minimizing power consumption in SDNs: measurements and optimization. 277-285 - Tomohiro Korikawa, Chikako Takasaki, Kyota Hattori, Hidenari Ohwada:
An Adaptive Rule-based Path Selection Method using Link Information in Non-Terrestrial Networks. 286-294 - Davide Miola, Fulvio Risso, Federico Parola:
Measuring the Cost of the Linux Network Stack in Real-Time. 295-303 - Emilio Paolini, Luca Valcarenghi, Nicola Andriolli, Luca Maggiani, Flavio Esposito:
Enabling Lightweight Federated Learning in NextG Wireless Networks. 304-306 - Daniel Adanza, Carlos Natalino, Lluis Gifre, Raul Muñoz, Pol Alemany, Paolo Monti, Ricard Vilalta:
IntentLLM: An AI Chatbot to Create, Find, and Explain Slice Intents in TeraFlowSDN. 307-309 - Hesam Rahimi, Lluis Gifre, Ricard Vilalta, Raul Muñoz, Henry Yu, Yanpeng Wang, Ruilin Cai, Yixiao Chen:
Demo: An Open-Source and Standards-Based Network-as-a-Service Platform for Cloud VR Gaming. 310-312 - Hiroki Baba, Shiku Hirai, Kentarou Hayashi, Tomonori Takeda:
In-network Computing Architecture for Service Acceleration for 6G Networks - Demo. 313-315 - Shoaib Basu, Deepak Nadig:
Offloading NVMe over Fabrics (NVMe-oF) to SmartNICs on an at-scale Distributed Testbed. 316-318 - Karumuri Meher Hasanth, Shoaib Basu, Deepak Nadig:
Data Processing Unit (DPU) Based Network Process Offloading for Efficient Service Meshes. 319-321 - Andrea Pinto, Tanzil Bin Hassan, Francesco Restuccia, Flavio Esposito:
Poster: Transport-Aware Resource Block Allocation in 5G Slicing. 322-323 - Uday Kiran Sunkara, Abdulquadri Abiru, Kyle Morman, Aaron Costin:
Poster: Hardware Security for IoT Wireless Network. 324-325 - Florent Allard, Tarek Ould-Bachir, Yvon Savaria:
Enhancing P4 Syntax to Support Extended Finite State Machines as Native Stateful Objects. 326-330 - Priyansha Tiwari, Shwetha Vittal, A. Antony Franklin:
Sharding the Datastore Network Functions of 5G Core for Scalable and Resilient Slice Service. 331-335 - Kaushik Dey, Satheesh K. Perepu, Abir Das, Pallab Dasgupta:
Towards Adaptive Networks - Generalized utility functions in Multi-Agent Frameworks. 336-340 - Conrado Boeira, Antor Hasan, Khaleda Papry, Yue Ju, Zhongwen Zhu, Israat Haque:
Calibration and Automation of a 5G Simulator for Realistic Evaluation and Data Generation. 341-345 - Philip Diederich, Alexej Grigorjew, Stefan Geißler, Tobias Hoßfeld, Wolfgang Kellerer:
The Effects of Topologies on the Performance of Real-Time Networks. 346-350 - Simone Magnani, Seshu Tirupathi, Roberto Doriguzzi Corin, Liubov Nedoshivina, Stefano Braghin, Domenico Siracusa:
Online Learning and Model Pruning Against Concept Drifts in Edge Devices. 351-356 - Roberto Doriguzzi Corin, Silvio Cretti, Domenico Siracusa:
Resource-Efficient Federated Learning for Network Intrusion Detection. 357-362 - Léa Astrid Kenmogne, Stéphane Mocanu:
Explainable AI for Process-Aware Attack Detection in Industrial Control Systems. 363-368 - Shurok Khozam, Gregory Blanc, Sébastien Tixeuil, Eric Totel:
DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach. 369-374 - Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten:
Self-reconfiguration of industrial control systems as a response to cyberattacks. 375-380 - Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
An intent-based solution for network isolation in Kubernetes. 381-386 - Antonio Matencio-Escolar, Jorge Bernal Bernabé, José M. Alcaraz, Qi Wang, Antonio F. Skarmeta:
Network slicing as 6G security mechanism to mitigate cyber-attacks: the RIGOUROUS approach. 387-392 - Enzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor:
Vulnet: Learning Navigation in an Attack Graph. 393-398 - Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, Guillaume Doyen:
How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya. 399-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.