![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Proceedings of the ACM on Networking, Volume 1
Volume 1, Number CoNEXT1, June 2023
- Marco Mellia
, Peter Steenkiste
, Lili Qiu
, Olivier Bonaventure
:
PACMNET V1, N1, June 2023 Editorial. 1:1 - Zhehui Zhang
, Yanbing Liu
, Qianru Li
, Zizheng Liu
, Chunyi Peng
, Songwu Lu
:
Dependent Misconfigurations in 5G/4.5G Radio Resource Control. 2:1-2:20 - Vipul Harsh
, Tong Meng
, Kapil Agrawal
, Philip Brighten Godfrey
:
Flock: Accurate Network Fault Localization at Scale. 3:1-3:22 - Fahad Hilal
, Oliver Gasser
:
Yarrpbox: Detecting Middleboxes at Internet-Scale. 4:1-4:23
Volume 1, Number CoNEXT2, September 2023
- Marco Mellia
, Peter Steenkiste
, Lili Qiu
, Olivier Bonaventure
:
PACMNET V1, CoNEXT2, September 2023 Editorial. 5:1 - Martine S. Lenders
, Christian Amsüss
, Cenk Gündogan
, Marcin Nawrocki
, Thomas C. Schmidt
, Matthias Wählisch
:
Securing Name Resolution in the IoT: DNS over CoAP. 6:1-6:25 - Shinan Liu
, Francesco Bronzino
, Paul Schmitt
, Arjun Nitin Bhagoji
, Nick Feamster
, Hector Garcia Crespo
, Timothy Coyle
, Brian Ward
:
LEAF: Navigating Concept Drift in Cellular Networks. 7:1-7:24
Volume 1, Number CoNEXT3, December 2023
- Marco Mellia
, Peter Steenkiste
, Lili Qiu
, Olivier Bonaventure
:
PACMNET, V1, CoNEXT3, December 2023 Editorial. 8:1-8:2 - Haoyu Liu
, Alec F. Diallo
, Paul Patras
:
Amoeba: Circumventing ML-supported Network Censorship via Adversarial Reinforcement Learning. 9:1-9:25 - Vivek Jain
, S. M. Maksudul Alam
, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
C2Store: C2 Server Profiles at Your Fingertips. 10:1-10:21 - Maoran Jiang
, Wei Gong
:
Dances with Blues: Harnessing Multi-Frequency Carriers for Commodity Bluetooth Backscatter. 11:1-11:20 - Marco Rossanese
, Andres Garcia-Saavedra
, Andra Lutu, Xavier Costa-Pérez
:
Data-driven Analysis of the Cost-Performance Trade-off of Reconfigurable Intelligent Surfaces in a Production Network. 12:1-12:20 - Ravjot Singh Samra
, Marinho P. Barcellos
:
DDoS2Vec: Flow-Level Characterisation of Volumetric DDoS Attacks at Scale. 13:1-13:25 - Changgang Zheng
, Haoyue Tang
, Mingyuan Zang
, Xinpeng Hong
, Aosong Feng
, Leandros Tassiulas
, Noa Zilberman
:
DINC: Toward Distributed In-Network Computing. 14:1-14:25 - Aravindh Raman
, Matteo Varvello
, Hyunseok Chang
, Nishanth Sastry
, Yasir Zaki
:
Dissecting the Performance of Satellite Network Operators. 15:1-15:25 - Noah Martin
, Fahad R. Dogar
:
Divided at the Edge - Measuring Performance and the Digital Divide of Cloud Edge Data Centers. 16:1-16:23 - Leonardo Peroni
, Sergey Gorinsky
, Farzad Tashtarian
, Christian Timmerer
:
Empowerment of Atypical Viewers via Low-Effort Personalized Modeling of Video Streaming Quality. 17:1-17:27 - Vítor Nunes
, José Brás
, Afonso Carvalho
, Diogo Barradas
, Kevin Gallagher
, Nuno Santos
:
Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels. 18:1-18:26 - Claudio Fiandrino
, Leonardo Bonati
, Salvatore D'Oro
, Michele Polese
, Tommaso Melodia
, Joerg Widmer
:
EXPLORA: AI/ML EXPLainability for the Open RAN. 19:1-19:26 - Sawsan El-Zahr
, Paul Gunning
, Noa Zilberman
:
Exploring the Benefits of Carbon-Aware Routing. 20:1-20:24 - Duckwoo Kim
, YoungGyoun Moon
, Jaehyun Hwang
, KyoungSoo Park
:
FlexCP: A Scalable Multipath TCP Proxy for Cellular Networks. 21:1-21:21 - Tommaso Caiazzi
, Mariano Scazzariello
, Marco Chiesa
:
Millions of Low-latency State Insertions on ASIC Switches. 22:1-22:23 - Xu Liu
, Peng Zhang
, Hao Li
, Wenbing Sun
:
Modular Data Plane Verification for Compositional Networks. 23:1-23:22 - Patrick Sattler
, Johannes Zirngibl
, Mattijs Jonker
, Oliver Gasser
, Georg Carle
, Ralph Holz
:
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns. 24:1-24:21 - Sepehr Abdous
, Erfan Sharafzadeh
, Soudeh Ghorbani
:
Practical Packet Deflection in Datacenters. 25:1-25:25 - Jens Friess
, Haya Schulmann
, Michael Waidner
:
Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates. 26:1-26:20 - Andrea Monterubbiano
, Raphaël Azorin
, Gabriele Castellano
, Massimo Gallo
, Salvatore Pontarelli
, Dario Rossi
:
SPADA: A Sparse Approximate Data Structure Representation for Data Plane Per-flow Monitoring. 27:1-27:25
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.