default search action
NOMS 2020: Budapest, Hungary
- NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020. IEEE 2020, ISBN 978-1-7281-4973-8
- Varun Deshpande, Laurent George, Hakim Badis, Alemayehu Addisu Desta:
Blockchain Based Decentralized Framework for Energy Demand Response Marketplace. 1-9 - Christofer Flinta, Wenqing Yan, Andreas Johnsson:
Predicting Round-Trip Time Distributions in IoT Systems using Histogram Estimators. 1-9 - Sofiane Lagraa, Radu State:
Process mining-based approach for investigating malicious login events. 1-5 - Moussa Aboubakar, Mounir Kellil, Abdelmadjid Bouabdallah, Pierre Roux:
Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks. 1-5 - Yusufu Shehu, Robert Harper:
Improved Fault Localization using Transfer Learning and Language Modeling. 1-6 - Fujun He, Eiji Oki:
Unavailability-aware Shared Virtual Backup Allocation Model for Middleboxes. 1-7 - Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Uncovering Vulnerable Industrial Control Systems from the Internet Core. 1-9 - Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Avraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. 1-9 - Michal Javorník, Jana Komárková, Lukás Sadlek, Martin Husák:
Decision Support for Mission-Centric Network Security Management. 1-6 - Hyundong Hwang, Young-Tak Kim:
Management of Smart Vehicular Handovers in Overlapped V2X Networks. 1-6 - Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure. 1-9 - Liang-Min Wang, Tim Miskell, Patrick Fu, Cunming Liang, Edwin Verplanke:
OVS-DPDK Port Mirroring via NIC Offloading. 1-2 - George Papathanail, Ioakeim Fotoglou, Christos Demertzis, Angelos Pentelas, Kyriakos Sgouromitis, Panagiotis Papadimitriou, Dimitrios Spatharakis, Ioannis Dimolitsas, Dimitrios Dechouniotis, Symeon Papavassiliou:
COSMOS: An Orchestration Framework for Smart Computation Offloading in Edge Clouds. 1-6 - Yuhong Li, Di Jin, Bailin Wang, Xiang Su, Jukka Riekki, Chao Sun, Hanyu Wei, Hao Wang, Lei Han:
Predicting Internet of Things Data Traffic Through LSTM and Autoregressive Spectrum Analysis. 1-8 - Tomás Jirsík, Pavel Celeda:
Cyber Situation Awareness via IP Flow Monitoring. 1-6 - Angelos Pentelas, George Papathanail, Ioakeim Fotoglou, Panagiotis Papadimitriou:
Network Service Embedding with Multiple Resource Dimensions. 1-9 - Wouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij:
Global-Scale Anycast Network Management with Verfploeter. 1-9 - Ningcheng Yuan, Wenchen He, Jing Shen, Xuesong Qiu, Shaoyong Guo, Wenjing Li:
Delay-Aware NFV Resource Allocation with Deep Reinforcement Learning. 1-7 - Adrien Hemmer, Rémi Badonnel, Isabelle Chrisment:
A Process Mining Approach for Supporting IoT Predictive Security. 1-9 - Chenhao Jia, Tian Pan, Zizheng Bian, Xingchen Lin, Enge Song, Cheng Xu, Tao Huang, Yunjie Liu:
Rapid Detection and Localization of Gray Failures in Data Centers via In-band Network Telemetry. 1-9 - Sina Ebrahimi, Abulfazl Zakeri, Behzad Akbari, Nader Mokari:
Joint Resource and Admission Management for Slice-enabled Networks. 1-7 - Hiroki Ikeuchi, Akio Watanabe, Tsutomu Hirao, Makoto Morishita, Masaaki Nishino, Yoichi Matsuo, Keishiro Watanabe:
Recovery command generation towards automatic recovery in ICT systems by Seq2Seq learning. 1-6 - Christian Moldovan, Frank Loh, Michael Seufert, Tobias Hoßfeld:
Optimizing HAS for 360-Degree Videos. 1-6 - Yang Guo, Franklin Liu, An Wang, Hang Liu:
AccuPIPE: Accurate Heavy Flow Detection in the Data Plane Using Programmable Switches. 1-5 - Yu Liu, Craig A. Shue:
Community Cleanup: Incentivizing Network Hygiene via Distributed Attack Reporting. 1-9 - Raquel Rugani Lage, Anthony Lambert:
Allocating and Scheduling Measurement Applications. 1-9 - Andrea Fendt, Christian Mannweiler, Katja Ludwig, Lars-Christoph Schmelz, Bernhard Bauer:
End-to-End Mobile Network Slice Embedding Leveraging Edge Computing. 1-7 - Talha Ahmed Khan, Asif Mehmood, Javier Jose Diaz Rivera, Muhammad Afaq, Khizar Abbas, Wang-Cheol Song:
Intent-Based Orchestration of Network Slices and Resource Assurance using Machine Learning. 1-2 - Roberto Irajá Tavares da Costa Filho, Filip De Turck, Luciano Paschoal Gaspary:
From 2D to Next Generation VR/AR Videos: Enabling Efficient Streaming via QoE-aware Mobile Networks. 1-6 - Yuki Imamura, Nobuyuki Nakamura, Taketsugu Yao, Shingo Ata, Ikuo Oka:
A Device Identification Method Based on Combination of Multiple Information. 1-4 - Basheer Al-Duwairi, Öznur Özkasap:
Preventing DDoS attacks in Path Identifiers-Based Information Centric Networks. 1-5 - Lukas Römer, Sven Erik Jeroschewski, Johannes Kristan:
Leveraging Eclipse IoT in the Arrowhead Framework. 1-6 - Mauro Femminella, Matteo Pergolesi, Gianluca Reali:
Simplification of the design, deployment, and testing of 5G vertical services. 1-7 - Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi, Ina Schieferdecker:
Industrial Grade Methodology for Firewall Simulation and Requirements Verification. 1-7 - Shiva Ketabi, Yashar Ganjali:
Perfect is the Enemy of Good: Lloyd-Max Quantization for Rate Allocation in Congestion Control Plane. 1-9 - Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco:
Performability Management of Softwarized IP Multimedia Subsystem. 1-6 - Malte Granderath, Jürgen Schönwälder:
A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems. 1-6 - Mariano Scazzariello, Lorenzo Ariemma, Tommaso Caiazzi:
Kathará: A Lightweight Network Emulation System. 1-2 - Jawwad Ahmed, Amadeu do Nascimento Júnior, Caner Kilinc, Dan Pan, Jaume Rius i Riu, Jörgen Gustafsson:
Using Blackbox ML Techniques to Diagnose QoE Problems for an IPTV Service. 1-8 - Holger Kinkelin, Richard von Seck, Christoph Rudolf, Georg Carle:
Hardening X.509 Certificate Issuance using Distributed Ledger Technology. 1-6 - Venkatraman Balasubramanian, Moayad Aloqaily, Olufogorehan Tunde-Onadele, Zhengyu Yang, Martin Reisslein:
Reinforcing Cloud Environments via Index Policy for Bursty Workloads. 1-7 - Pedro Martinez-Julia, Jose A. Ordonez-Lucena, Ved P. Kafle, Hitoshi Asaeda, Diego R. López:
Exploiting Case Based Reasoning to Automate Management of Network Slices. 1-6 - Molka Gharbaoui, Barbara Martini, Piero Castoldi:
Programmable and Automated Deployment of Tenant-Managed SDN Network Slices. 1-6 - Frederik Hauser, Mark Schmidt, Michael Menth:
xRAC: Execution and Access Control for Restricted Application Containers on Managed Hosts. 1-9 - Alexander Clemm, Toerless Eckert:
A Network Emulator for High-Precision Latency Forwarding over Packet-Programmable Networks (Demo Paper). 1-2 - Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. 1-7 - André Luiz Beltrami Rocha, Paulo Ditarso Maciel, Francesco Tusa, Celso Henrique Cesila, Christian Esteve Rothenberg, Rafael Pasquini, Fábio L. Verdi:
Design and Implementation of an Elastic Monitoring Architecture for Cloud Network Slices. 1-7 - Stephen S. Mwanje, Márton Kajó, Sayantini Majumdar, Georg Carle:
Environment Modeling and Abstraction of Network States for Cognitive Functions. 1-8 - Atsushi Takada, Toshihiko Seki, Kyoko Yamagoe:
SLA Driven Automatic Fault-Recovery Scheduling Method with Cost Evaluation. 1-6 - Kazuki Hara, Kohei Shiomoto:
Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoder. 1-8 - Petr Velan, Tomás Jirsík:
On the Impact of Flow Monitoring Configuration. 1-7 - Xufang Wang, Feng Lin, Wen-Kang Jia:
Interference Cancellation for Software Defined Impulse Radio by Template Design. 1-5 - Alexander Clemm, Toerless Eckert:
High-Precision Latency Forwarding over Packet-Programmable Networks. 1-8 - Duncan Cameron, Alvin C. Valera, Winston K. G. Seah:
ElasticWISP: Energy-Proportional WISP Networks. 1-9 - Tom De Schepper, Jeroen Famaey, Steven Latré:
Multi-technology Management of Heterogeneous Wireless Networks. 1-6 - Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Characterising Network-Connected Devices Using Affiliation Graphs. 1-6 - Kun Yang, Junjie Zhang, Yang Xu, H. Jonathan Chao:
DDoS Attacks Detection with AutoEncoder. 1-9 - Anat Bremler-Barr, Haim Levy, Zohar Yakhini:
IoT or NoT: Identifying IoT Devices in a Short Time Scale. 1-9 - Yuncan Zhang, Fujun He, Eiji Oki:
Network Service Mapping and Scheduling under Uncertain Processing Time. 1-8 - Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
BotFP: FingerPrints Clustering for Bot Detection. 1-7 - Matias Richart, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho:
Resource Allocation and Management Techniques for Network Slicing in WiFi Networks. 1-6 - Menglei Zhang, Haoqiu Huang, Lanlan Rui, Guo Hui, Ying Wang, Xuesong Qiu:
A Service Migration Method Based on Dynamic Awareness in Mobile Edge Computing. 1-7 - Martin Lastovicka, Martin Husák, Lukás Sadlek:
Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. 1-6 - Eder J. Scheid, Daniel Lakic, Bruno Rodrigues, Burkhard Stiller:
PleBeuS: a Policy-based Blockchain Selection Framework. 1-8 - Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Arcangelo Palma, Fabio Postiglione, Marco Tambasco:
Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem. 1-6 - Ali Marandi, Vincent Hofer, Mikael Gasparyan, Torsten Braun, Nikolaos Thomos:
Bloom Filter-based Routing for Dominating Set-based Service-Centric Networks. 1-9 - Gábor Soós, Dániel Ficzere, Pál Varga, Zsolt Szalay:
Practical 5G KPI Measurement Results on a Non-Standalone Architecture. 1-5 - Karine Birnfeld, Diogo Campos da Silva, Weverton Cordeiro, Breno Bernard Nicolau de França:
P4 Switch Code Data Flow Analysis: Towards Stronger Verification of Forwarding Plane Software. 1-8 - Imed Hadj-Kacem, Sana Ben Jemaa, Sylvain Allio, Yosra Ben Slimen:
Anomaly prediction in mobile networks : A data driven approach for machine learning algorithm selection. 1-7 - Géza Kulcsár, Kadosa Koltai, Szvetlin Tanyi, Bálint Péceli, Ákos Horváth, Zoltán Micskei, Pál Varga:
From Models to Management and Back: Towards a System-of-Systems Engineering Toolchain. 1-6 - Talal Halabi, Omar Abdel Wahab, Mohammad Zulkernine:
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems. 1-6 - Martin Husák, Pavel Celeda:
Predictions of Network Attacks in Collaborative Environment. 1-6 - João M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna:
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. 1-9 - Anan Sawabe, Takanori Iwai, Kozo Satoda, Akihiro Nakao:
Edge Concierge: Democratizing Cost-Effective and Flexible Network Operations using Network Layer AI at Private Network Edges. 1-7 - Shogo Aoki, Kohei Shiomoto, Chin Lam Eng, Sebastian Backstad:
Few-shot Learning for eNodeB Performance Metric Analysis for Service Level Assurance in LTE Networks. 1-4 - Pedro Martins, André B. Reis, Paulo Salvador, Susana Sargento:
Physical Layer Anomaly Detection Mechanisms in IoT Networks. 1-9 - Maxime Mouchet, Martín Randall, M. Ségneré, Isabel Amigo, Pablo Belzarena, Olivier Brun, Balakrishna J. Prabhu, Sandrine Vaton:
Scalable Monitoring Heuristics for Improving Network Latency. 1-9 - Janne Ali-Tolppa, Márton Kajó:
Mobility and QoS Prediction for Dynamic Coverage Optimization. 1-2 - Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. 1-4 - Steffen Haas, Florian Wilkens, Mathias Fischer:
Scan Correlation - Revealing distributed scan campaigns. 1-6 - Bo Ma, Bowei Yang, Zitian Zhang, Jie Zhang:
Modelling Mobile Traffic Patterns Using A Generative Adversarial Neural Networks. 1-7 - Sajad Sameti, Mea Wang, Diwakar Krishnamurthy:
CONTRAST: Container-based Transcoding for Interactive Video Streaming. 1-9 - José Santos, Tim Wauters, Bruno Volckaert, Filip De Turck:
Towards delay-aware container-based Service Function Chaining in Fog Computing. 1-9 - Ralf Kundel, Fridolin Siegmund, Jeremias Blendin, Amr Rizk, Boris Koldehofe:
P4STA: High Performance Packet Timestamping with Programmable Packet Processors. 1-9 - Jing Ling, Guochu Shou, Mengjie Guo, Yihong Hu:
The Service Metrics and Performance Analysis of Internet Time Service. 1-6 - Simon Bauer, Kilian Holzinger, Benedikt Jaeger, Paul Emmerich, Georg Carle:
Online Monitoring of TCP Throughput Limitations. 1-9 - Estefanía Coronado, Abin Thomas, Suzan Bayhan, Roberto Riggio:
aiOS: An Intelligence Layer for SD-WLANs. 1-9 - André B. Campolina, Azzedine Boukerche, Antonio A. F. Loureiro:
Context and Location Awareness in Eco-Driving Recommendations. 1-6 - Tra Huong Thi Le, Nguyen Hoang Tran, Yan Kyaw Tun, Oanh Tran Thi Kim, Kitae Kim, Choong Seon Hong:
Sharing Incentive Mechanism, Task Assignment and Resource Allocation for Task Offloading in Vehicular Mobile Edge Computing. 1-8 - Wael S. Afifi, Ali A. El-Moursy, Mohamed Saad, Salwa M. Nassar, Hadia M. El-Hennawy:
A Dynamic Clustering Approach for Increasing User Throughput in 5G Wireless Networks. 1-8 - Junichi Kawasaki, Genichi Mouri, Yusuke Suzuki:
Comparative Analysis of Network Fault Classification Using Machine Learning. 1-6 - Diarmuid Corcoran, Per Kreuger, Christian Schulte:
Efficient Real-Time Traffic Generation for 5G RAN. 1-9 - Tobias Vogel, Benjamin Gernhardt, Matthias L. Hemmje:
Integrating Smart Production Planning Into Smart Production. 1-6 - Ricardo Parizotto, Lucas Castanheira, Fernanda Bonetti, Anderson Santos da Silva, Alberto Schaeffer-Filho:
PRIME: Programming In-Network Modular Extensions. 1-9 - Masaru Ueno, Yuji Imai:
SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration. 1-5 - Donatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas:
On the Implementation of Matching Theory Based Resource Allocation in Networking Testbeds. 1-2 - Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer:
All that Glitters is not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) Network. 1-9 - Carol J. Fung, Yadunandan Pillai:
A Privacy-Aware Collaborative DDoS Defence Network. 1-5 - Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
Paddy: An Event Log Parsing Approach using Dynamic Dictionary. 1-8 - Juan Luis Herrera, Marco Polverini, Jaime Galán-Jiménez:
A Machine Learning-Based Framework to Estimate the Lifetime of Network Line Cards. 1-5 - Donatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas:
Matching Theory Application for Efficient Allocation of Indivisible Testbed Resources. 1-7 - Thomas Lin, Alberto Leon-Garcia:
Towards a Client-Centric QoS Auto-Scaling System. 1-9 - Abdurhman Albasir, Q. Hu, Mustafa Al-tekreeti, Kshirasagar Naik, N. Naik, A. James Kozlowski, Nishith Goel:
Unsupervised Detection of Anomalous Behavior in Wireless Devices based on Auto-Encoders. 1-7 - Mariano Scazzariello, Lorenzo Ariemma, Giuseppe Di Battista, Maurizio Patrignani:
Megalos: A Scalable Architecture for the Virtualization of Network Scenarios. 1-7 - Estefanía Coronado, Faqir Zarrar Yousaf, Roberto Riggio:
Demo: Deploying Transparent Applications at the Network Edges with LightEdge. 1-2 - Fan Jiang, Kyle Ferriter, Claris Castillo:
A Cloud-Agnostic Framework to Enable Cost-Aware Scheduling of Applications in a Multi-Cloud Environment. 1-9 - Benjamin Burr, Shelly Wang, Geoff Salmon, Hazem M. Soliman:
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings. 1-4 - Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Distributed DDoS Defense: A collaborative Approach at Internet Scale. 1-6 - Andrei Privalov, Ekaterina Skudneva, Igor V. Kotenko, Igor Saenko:
Graph-based evaluation of probability of disclosing the network structure by targeted attacks. 1-6 - Linzhi Zou, Chun-Xiang Chen, Kenichi Nagaoka:
An Empirical Study of the Effectiveness of Fallback on the ECN. 1-4 - Davide Aureli, Antonio Cianfrani, Alessio Diamanti, José Manuel Sánchez-Vílchez, Stefano Secci:
Going Beyond DiffServ in IP Traffic Classification. 1-6 - Erisa Karafili, Fulvio Valenza, Yichen Chen, Emil C. Lupu:
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. 1-4 - Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids. 1-9 - Emeka Obiodu, Nishanth Sastry, Aravindh Raman:
Is it time for a 999-like (or 112/911) system for critical information servicesƒ. 1-6 - Panagiotis Karamichailidis, Kostas Choumas, Thanasis Korakis:
OpenFlow enabled Integrated Routing and Bridging over Ethernet Virtual Private Networks. 1-5 - Miguel Borges de Freitas, Pedro Quitério, Luís Rosa, Tiago Cruz, Paulo Simões:
SDN-assisted containerized security and monitoring components. 1-5 - Gábor Soós, Dániel Ficzere, Pál Varga:
User Group Behavioural Pattern in a Cellular Mobile Network for 5G Use-cases. 1-7 - Attila Hilt, József Varga, Gábor Járó:
Capacity Expansion and Modernization of Core Network Elements Running on ATCA Platform. 1-5 - Ryan Mills, Nicholas J. P. Race, Matthew Broadbent:
Citrus: Orchestrating Security Mechanisms via Adversarial Deception. 1-4 - Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas J. P. Race, David Hutchison:
λBGP: Rethinking BGP programmability. 1-9 - Verónica Quintuna Rodriguez, Fabrice Guillemin, Amina Boubendir:
Network Slice Management on top of ONAP. 1-2 - Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda:
Using TLS Fingerprints for OS Identification in Encrypted Traffic. 1-6 - Ralf Kundel, Christoph Gärtner, Manisha Luthra, Sukanya Bhowmik, Boris Koldehofe:
Flexible Content-based Publish/Subscribe over Programmable Data Planes. 1-5 - Zheng Qiu, Jianjun Hao, Yijun Guo, Yi Zhang:
Dual Vote Confirmation based Consensus Design for Blockchain integrated IoT. 1-7 - Yoichi Matsuo, Tatsuaki Kimura, Ken Nishimatsu:
DeepSIP: A System for Predicting Service Impact of Network Failure by Temporal Multimodal CNN. 1-6 - Cheng Zhang, Noriaki Kamiyama:
Data Quality Maximization for Mobile Crowdsensing. 1-7 - Reuven Peretz, Shlomo Shenzis, David Hay:
Moving Target Defense for Virtual Network Functions. 1-9 - Thomas Feltin, Parisa Foroughi, Wenqin Shao, Frank Brockners, Thomas H. Clausen:
Semantic feature selection for network telemetry event description. 1-6 - Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Automated optimal firewall orchestration and configuration in virtualized networks. 1-7 - Omar Richardson, Johan Garcia:
A Novel Flow-level Session Descriptor With Application to OS and Browser Identification. 1-9 - Shibo Lu, Daphné Tuncer, Stuart Clayman:
Unveiling the Features of Network Dynamics: a Data-Oriented Approach. 1-5 - Diogo Ferreira, Carlos R. Senna, Susana Sargento:
Distributed Real-time Forecasting Framework for IoT Network and Service Management. 1-4 - Gianvito Urgese, Paolo Azzoni, Jan van Deventer, Jerker Delsing, Enrico Macii:
An Engineering Process model for managing a digitalised life-cycle of products in the Industry 4.0. 1-6 - Sebastian Gallenmüller, Johannes Naab, Iris Adam, Georg Carle:
5G QoS: Impact of Security Functions on Latency. 1-9 - Rui Kang, Fujun He, Takehiro Sato, Eiji Oki:
Demonstration of Network Service Header Based Service Function Chain Application with Function Allocation Model. 1-2 - Ralf Kundel, Amr Rizk, Boris Koldehofe:
Microbursts in Software and Hardware-based Traffic Load Generation. 1-2 - Gi Tae Kim, Constantin Serban, Ritu Chadha:
Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks. 1-7 - Haoyu Liu, Chongrong Fang, Yining Qi, Jian Bai, Shaozhe Wang, Xiong Xiao, Daxiang Kang, Biao Lyu, Peng Cheng, Jiming Chen:
RAIN: Towards Real-Time Core Devices Anomaly Detection Through Session Data in Cloud Network. 1-6 - Hantao Guo, Ying Wang, Zifan Li, Xuesong Qiu, Hengbin An, Peng Yu, Ningcheng Yuan:
Cost-aware Placement and Chaining of Service Function Chain with VNF Instance Sharing. 1-8 - Mattijs Jonker, Anna Sperotto, Aiko Pras:
DDoS Mitigation: A Measurement-Based Approach. 1-6 - Omar Alfandi, Safa Otoum, Yaser Jararweh:
Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance. 1-4 - Kengo Tajiri, Yasuhiro Ikeda, Yuusuke Nakano, Keishiro Watanabe:
Dividing Deep Learning Model for Continuous Anomaly Detection of Inconsistent ICT Systems. 1-5 - Rafael Pasquini, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho, Augusto Neto, Fábio L. Verdi:
Inferring Cloud-Network Slice's Requirements from Non-Structured Service Description. 1-5 - Junaid Ahmed Khan, Cédric Westphal, J. J. Garcia-Luna-Aceves, Yacine Ghamri-Doudane:
LoCHiP: A Distributed Collaborative Cache Management Scheme at the Network Edge. 1-7 - Xiaoqing Sun, Jiahai Yang, Zhiliang Wang, Heng Liu:
HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection. 1-9 - André Luiz Beltrami Rocha, Celso Henrique Cesila, Paulo Ditarso Maciel, Christian Esteve Rothenberg, Fábio L. Verdi:
Elastic Monitoring Architecture for Cloud Network Slices. 1-2 - Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. 1-7 - Márton Kajó, Benedek Schultz, Georg Carle:
Deep Clustering of Mobile Network Data with Sparse Autoencoders. 1-6 - Clément Elbaz, Louis Rilling, Christine Morin:
Automated Keyword Extraction from "One-day" Vulnerabilities at Disclosure. 1-9 - Estefanía Coronado, José Villalón, Antonio Garrido:
Improvements to Multimedia Content Delivery over IEEE 802.11 Networks. 1-6 - Sina Rafati Niya, Eryk Schiller, Ile Cepilov, Burkhard Stiller:
BIIT: Standardization of Blockchain-based I2oT Systems in the I4 Era. 1-9 - Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque:
Impact of False Data Injection Attacks on Deep Learning Enabled Predictive Analytics. 1-7 - Ruben Mennes, Jakob Struye, Carlos Donato, Steven Latré:
A Dynamic Spectrum Footprint Adaptation Framework for Collaborative Spectrum Sharing. 1-4 - Li Wu, Johan Tordsson, Erik Elmroth, Odej Kao:
MicroRCA: Root Cause Localization of Performance Issues in Microservices. 1-9 - Frank Loh, Florian Wamser, Christian Moldovan, Bernd Zeidler, Dimitrios Tsilimantos, Stefan Valentin, Tobias Hoßfeld:
Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic. 1-9 - Alisson Medeiros, Augusto Neto, Silvio Sampaio, Rafael Pasquini, Javier Baliosian:
Enabling Elasticity Control Functions for Cloud-Network Slice-Defined Domains. 1-7 - David Balla, Csaba Simon, Markosz Maliosz:
Adaptive scaling of Kubernetes pods. 1-5 - Nur Hilal, Arda Yurdakul:
Model-based Design of a Roadside Unit for Emergency and Disaster Management. 1-6 - Luana M. Uchôa, Silvio E. Quincozes, Juan Lucas Vieira, Diego G. Passos, Célio Albuquerque, Daniel Mossé:
Analysis of Smart Grid Fault Recovery Protocols. 1-8 - Márton Bak, Dorottya Papp, Csongor Tamás, Levente Buttyán:
Clustering IoT Malware based on Binary Similarity. 1-6 - Omar Hiari, Ibraheem Nofal:
A Dynamic Decentralized Traffic Light Management System: A TCP Inspired Approach. 1-4 - Gabriel da Silva, Dyego Oliveira, Rafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira:
Reliable Network Slices based on Elastic Network Resource Demand. 1-9 - Yimin Li, Lifang Gao, Siya Xu, Qinghai Ou, Xinyu Yuan, Feng Qi, Shaoyong Guo, Xuesong Qiu:
Cost-and-QoS-Based NFV Service Function Chain Mapping Mechanism. 1-9 - Umer Rehman Mughal, Manzoor Ahmed Khan, Azam Beg, Ghulam Qadir Mughal:
AI Enabled Resource Allocation in Future Mobile Networks. 1-6 - Xenofon Vasilakos, Berkay Köksal, Dwi Hartati Izaldi, Navid Nikaein, Robert Schmidt, Nasim Ferdosian, Riri Fitri Sari, Ray-Guang Cheng:
ElasticSDK: A Monitoring Software Development Kit for enabling Data-driven Management and Control in 5G. 1-7 - Luis M. Contreras, Javier Baliosian, Pedro Martinez-Julia, Joan Serrat:
Computing at the Edge: But, what Edge? 1-9 - Alan Plascinskas, Xenofon Foukas, Mahesh K. Marina:
Towards Efficient and Adaptable Monitoring of Softwarized Mobile Networks. 1-6 - Hartwig Baumgärtel, Richard Verbeet:
Service and Agent based System Architectures for Industrie 4.0 Systems. 1-6 - Francesca Fossati, Stefano Moretti, Stephane Rovedakis, Stefano Secci:
Decentralization of 5G slice resource allocation. 1-9 - Miguel A. Iñigo, Alain Porto, Blanca Kremer, Alain Perez, Felix Larrinaga, Javier Cuenca:
Towards an Asset Administration Shell scenario: a use case for interoperability and standardization in Industry 4.0. 1-6 - Damu Ding, Marco Savi, Domenico Siracusa:
Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4. 1-9 - Elmer Lastdrager, Cristian Hesselman, Jelte Jansen, Marco Davids:
Protecting Home Networks From Insecure IoT Devices. 1-6 - Harm Griffioen, Christian Doerr:
Discovering Collaboration: Unveiling Slow, Distributed Scanners based on Common Header Field Patterns. 1-9 - Patrick Rathje, Valentin Poirot, Olaf Landsiedel:
STARC: Low-power Decentralized Coordination Primitive for Vehicular Ad-hoc Networks. 1-6 - Iman Akbari, Ezzeldin Tahoun, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba:
ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning. 1-9 - Robert Schmidt, Navid Nikaein:
Demo: Efficient Multi-Service RAN Slice Management and Orchestration. 1-2 - Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:
A scalable SON coordination framework for 5G. 1-8 - Joseph Khoury, Mohamed Nassar:
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security. 1-9 - Frederik Hauser, Michael Menth:
Demo: Execution and Access Control for Restricted Application Containers on Managed Hosts (xRAC). 1-2 - Daphné Tuncer, Marinos Charalambides:
LogiSig: Automatic Interaction Detection in Software-based Networks. 1-9 - Yehuda Afek, Anat Bremler-Barr, David Hay, Lior Shafir, Ihab Zhaika:
Demo: NFV-based IoT Security at the ISP Level. 1-2 - Wassim Sellil Atoui, Nour Assy, Walid Gaaloul, Imen Grida Ben Yahia:
Learning a Configurable Deployment Descriptors Model in NFV. 1-9 - Shiva Ketabi, Yashar Ganjali:
Hierarchical Congestion Control (HCC): Cooperation of Uncorrelated Flows for Better Fairness and Throughput. 1-5 - Cyril Renaud Cassagnes, Lucian Trestioreanu, Clément Joly, Radu State:
The rise of eBPF for non-intrusive performance monitoring. 1-7 - Kensuke Fukuda, Yoshiro Yoneya, Takeshi Mitamura:
Towards detecting DNSSEC validation failure with passive measurements. 1-6 - Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, Haythem Bany Salameh:
UAV-Assisted Vehicular Communication for Densely Crowded Environments. 1-4 - Che Zhang, Shiwei Zhang, Yi Wang, Weichao Li, Bo Jin, Ricky K. P. Mok, Qing Li, Hong Xu:
Scalable Traffic Engineering for Higher Throughput in Heavily-loaded Software Defined Networks. 1-7 - Hammad Kabir, Muhammad Hassaan Bin Mohsin, Raimo Kantola:
Implementing a Security Policy Management for 5G Customer Edge Nodes. 1-8 - Mu He, Mei-Yuan Huang, Wolfgang Kellerer:
Optimizing the Flexibility of SDN Control Plane. 1-9 - Péter Orosz, Tamás Tóthfalusi:
VoicePerf: A Quality Estimation Approach for No-reference IP Voice Traffic. 1-9 - Osama Arouk, Navid Nikaein:
5G Cloud-Native: Network Management & Automation. 1-2 - Mohammad Amin Beiruti, Yashar Ganjali:
Load Migration in Distributed SDN Controllers. 1-9 - Adrien Hemmer, Rémi Badonnel, Jérôme François, Isabelle Chrisment:
A Process Mining Tool for Supporting IoT Security. 1-2 - Filippo Poltronieri, Mauro Tortonesi, Alessandro Morelli, Cesare Stefanelli, Niranjan Suri:
Value of Information based Optimal Service Fabric Management for Fog Computing. 1-9 - Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras:
Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. 1-5 - Zhe Chen, Chuang Wang, Guanwen Li, Zhe Lou, Sheng Jiang, Alex Galis:
NEW IP Framework and Protocol for Future Applications. 1-5 - Tal Shapira, Yuval Shavitt:
Unveiling the Type of Relationship Between Autonomous Systems Using Deep Learning. 1-6 - Koichiro Amemiya, Akihiro Nakao:
Layer-Integrated Edge Distributed Data Store for Real-time and Stateful Services. 1-9 - Pedro Casas:
Two Decades of AI4NETS - AI/ML for Data Networks: Challenges & Research Directions. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.