


default search action
Networking 2023: Barcelona, Spain
- IFIP Networking Conference, IFIP Networking 2023, Barcelona, Spain, June 12-15, 2023. IEEE 2023, ISBN 978-3-903176-57-7

- Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquín García-Alfaro

, Reda Yaich:
Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems. 1-6 - David Hasselquist, Ludvig Bolin, Emil Carlsson, Adam Hylander, Martin Larsson, Erik Voldstad, Niklas Carlsson:

Longitudinal Analysis of Wildcard Certificates in the WebPKI. 1-9 - Xi Wang, Xusheng Ai, F. Alex Feltus, Susmit Shannigrahi:

GNSGA: A Decentralized Data Replication Algorithm for Big Science Data. 1-9 - Cheick T. Cissé

, Oumaya Baala, Valéry Guillet, François Spies, Alexandre Caminada:
IRGAN: cGAN-based Indoor Radio Map Prediction. 1-9 - Jérôme De Boeck, Bernard Fortz, Stefan Schmid

:
The Case for Stochastic Online Segment Routing under Demand Uncertainty. 1-8 - Jayasree Sengupta

, Mike Kosek
, Justus Fries
, Pratyush Dikshit
, Vaibhav Bajpai
:
Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3. 1-9 - Mike Kosek

, Benedikt Spies, Jörg Ott:
Secure Middlebox-Assisted QUIC. 1-9 - Marcin Bosk

, Filip Rezabek, Johannes Abel, Kilian Holzinger, Max Helm, Georg Carle, Jörg Ott:
Simulation and Practice: A Hybrid Experimentation Platform for TSN. 1-9 - Benedikt Jaeger, Johannes Zirngibl, Marcel Kempf

, Kevin Ploch, Georg Carle:
QUIC on the Highway: Evaluating Performance on High-rate Links. 1-9 - Marten Gartner, Jean-Pierre Smith, Matthias Frei, François Wirz, Cédric Neukom, David Hausheer, Adrian Perrig:

Hercules: High-Speed Bulk-Transfer over SCION. 1-9 - Erik Daniel, Florian Tschorsch:

Privacy-Enhanced Content Discovery for Bitswap. 1-9 - Dimitrios Simopoulos

, Andreas Wolf:
Overcoming New Technologies Challenges in IoT Security Labs: Strategies for Effective Adaptation. 1-5 - Secil Ercan, Léo Mendiboure

, Lylia Alouache
, Sassi Maaloul
, Tidiane Sylla, Hasnaâ Aniss
:
An Enhanced Model for Machine Learning-Based DoS Detection in Vehicular Networks. 1-9 - Yijing Zhang, Hui Xue, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Anqi Wang, Yinliang Yue, Bo Sun:

ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic. 1-10 - Pratyush Dikshit

, Mike Kosek
, Nils Faulhaber, Jayasree Sengupta
, Vaibhav Bajpai
:
Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP Fallback. 1-9 - Irina Tsareva, Trinh Viet Doan

, Vaibhav Bajpai
:
A Decade Long View of Internet Traffic Composition in Japan. 1-9 - Hui Xue, Bo Sun, Weixuan Mao:

Linking User Identities Across Social Networks via Frequency Domain Analysis. 1-8 - Muhammad Affan Javed, Pei Liu, Shivendra S. Panwar:

A Multi-Connectivity Architecture with Data Replication for XR Traffic in mmWave Networks. 1-9 - Shiju Li, Xin Huang

, Chul-Ho Lee, Do Young Eun:
Controlling Epidemic Spread Under Immunization Delay Constraints. 1-9 - George Papathanail, Lefteris Mamatas, Panagiotis Papadimitriou:

Towards the Integration of TAPRIO-based Scheduling with Centralized TSN Control. 1-6 - Alessio Botta, Roberto Canonico

, Annalisa Navarro
, Giovanni Stanco
, Giorgio Ventre:
Scalable Reinforcement Learning for Dynamic Overlay Selection in SD-WANs. 1-9 - Mohamed Seliem

, Ahmed Zahran
, Dirk Pesch
:
Delay Analysis of TSN Based Industrial Networks With Preemptive Traffic Using Network Calculus. 1-9 - Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto, Dusit Niyato:

Game Theoretic Resource Planning and Request Scheduling in Mobile Edge Computing Networks. 1-9 - Nurefsan Sertbas Bülbül, Joshua Jannis Krüger, Mathias Fischer:

TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filtering. 1-8 - Navid Malekghaini

, Hauton Tsang, Mohammad Ali Salahuddin, Noura Limam, Raouf Boutaba:
FSTC: Dynamic Category Adaptation for Encrypted Network Traffic Classification. 1-9 - Yeting Xu, Xiang Li, Yi Yang, Zhenjie Lin, Liming Wang, Wenzhong Li:

FedABR: A Personalized Federated Reinforcement Learning Approach for Adaptive Video Streaming. 1-9 - Jennifer Ly, Yutian Chen, Bin Tang:

Data-VCG: A Data Preservation Game for Base Station-less Sensor Networks with Performance Guarantee. 1-6 - Yan Jiao, Pin-Han Ho, Xiangzhu Lu, Kairan Liang, Yuren You, János Tapolcai, Bingbing Li, Limei Peng:

On Real-time Failure Localization via Instance Correlation in Optical Transport Networks. 1-9 - Olga Kondrateva, Stefan Dietzel, Maximilian Schambach

, Johannes S. Otterbach, Björn Scheuermann:
Filling the Gap: Fault-Tolerant Updates of On-Satellite Neural Networks Using Vector Quantization. 1-9 - Mouhamed Amine Bouchiha

, Yacine Ghamri-Doudane, Mourad Rabah, Ronan Champagnat:
GuRuChain: Guarantee and Reputation-based Blockchain Service Trading Platform. 1-9 - Lotte Weedage

, Syllas R. C. Magalhães, Suzan Bayhan:
National roaming as a fallback or default? 1-6 - Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi:

5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture. 1-9 - Kyle A. Simpson

, Chris Williamson
, Douglas J. Paul
, Dimitrios P. Pezaros
:
Galette: a Lightweight XDP Dataplane on your Raspberry Pi. 1-9 - Alexander Brundiers

, Timmy Schüller, Nils Aschenbruck:
Tactical Traffic Engineering with Segment Routing Midpoint Optimization. 1-9 - Óscar Seijo, Raúl Torrego, Iñaki Val:

On the integration of OPC UA over Wired - Wireless Time Sensitive Networking. 1-6 - Sanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel:

Lightweight Network Delay Segmentation Based on Smoothed Hierarchical Clustering. 1-9 - Tony John

, Adrian Perrig, David Hausheer:
DMTP: Deadline-aware Multipath Transport Protocol. 1-9 - Anne Bouillard:

Imperfect Bandwidth-Sharing Policies using Network Calculus. 1-9 - Maria Papaioannou, Georgios Mantas, Emmanouil Manos Panaousis, Aliyah Essop, Jonathan Rodriguez, Victor Sucasas:

Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations. 1-6 - Fatemeh Marzani, Fatemeh Ghassemi, Zeynab Sabahi-Kaviani, Thijs van Ede, Maarten van Steen:

Mobile App Fingerprinting through Automata Learning and Machine Learning. 1-9 - Doganalp Ergenç, Robin Schenderlein, Mathias Fischer:

TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking. 1-6 - Marina Dehez-Clementi

, Mourad Rabah
, Yacine Ghamri-Doudane
:
A Privacy-preserving Proof-of-Reputation. 1-9 - Panagiotis Promponas, Víctor Valls, Leandros Tassiulas:

Full Exploitation of Limited Memory in Quantum Entanglement Switching. 1-9 - Alexander Staves, Sam Maesschalck

, Richard Derbyshire, Benjamin Green, David Hutchison:
Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines. 1-6 - Itay Alayoff, Gil Einziger:

Optimizing DNS Resolvers for High Loads. 1-9 - Jerrod Wigmore, Brooke Shrader, Eytan H. Modiano:

Hierarchical Thompson Sampling for Multi-band Radio Channel Selection. 1-9 - Julia Caleya-Sanchez

, Jonathan Prados-Garzon
, Lorena Chinchilla-Romero, Pablo Muñoz, Pablo Ameigeiras:
Flow Prioritization for TSN Asynchronous Traffic Shapers. 1-6 - Georgios Zachos, Georgios Mantas, Ismael Essop, Kyriakos Porfyrakis, Joaquim Manuel C. S. Bastos, Jonathan Rodriguez:

An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems. 1-6 - Zhejiayu Ma, Soufiane Roubia, Frédéric Giroire, Guillaume Urvoy-Keller:

Q-learning for Waiting Time Control in CDN/V2V Live streaming. 1-9 - Hassan Fawaz

, Omar Houidi
, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
Graph Convolutional Reinforcement Learning for Load Balancing and Smart Queuing. 1-9 - Baiyang Li

, Yujia Zhu, Qingyun Liu, Yong Sun, Yuedong Zhang, Li Guo:
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications. 1-9 - Dean Carmel, Isaac Keslassy:

Dragonfly: In-Flight CCA Identification. 1-9 - Jack Zhao, Miguel C. Neves, Israat Haque:

On the (dis)Advantages of Programmable NICs for Network Security Services. 1-9 - Lianming Zhang, Benle Yin, Qian Wang, Pingping Dong:

Graph Neural Network-based Delay Prediction Model Enhanced by Network Calculus. 1-7 - Hongwu Li, Xingyu Fu

, Yujia Zhu, Rong Yang, Chao Li:
MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HIN. 1-9 - Allen Hong, Yahui Li, Han Zhang, Ming Wang, Changqing An

, Jilong Wang:
A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass. 1-9 - Mingyuan Zang, Changgang Zheng, Tomasz Koziak, Noa Zilberman, Lars Dittmann:

Federated Learning-Based In-Network Traffic Analysis on IoT Edge. 1-6 - Henning Stubbe, Sebastian Gallenmüller

, Manuel Simon
, Eric Hauser, Dominik Scholz, Georg Carle:
Keeping up to Date with P4Runtime: An Analysis of Data Plane Updates on P4 Switches. 1-9 - Dongqi Han

, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin:
Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild. 1-9 - Xiaolin Wang

, Fen Zhou, Yaojun Chen, Ting Wang:
Maximal Distance Spectrum Assignment for Services Provisioning in Elastic Optical Networks. 1-9 - Lu Lin, Xiaojun Zhu, Ji'ao Tang, Chao Dong:

Placement of UAVs to Reconnect Lost Subnetworks in Wireless Sensor Networks. 1-9 - Filippos Pelekoudas Oikonomou, José Carlos Ribeiro, Georgios Mantas, Firooz Bashashi

, Georgia Sakellari, Jonathan González:
A Tutorial on the Implementation of a Hyperledger Fabric-based Security Architecture for IoMT. 1-6 - Daniel Bachar, Anat Bremler-Barr

, David Hay:
Optimizing Service Selection and Load Balancing in Multi-Cluster Microservice Systems with MCOSS. 1-9 - Sepehr Abbasi Zadeh, Farid Zandi, Matthew Buckley, Yashar Ganjali:

Meta-Migration: Reducing Switch Migration Tail Latency Through Competition. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














