


default search action
NOMS 2022: Budapest, Hungary
- 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022. IEEE 2022, ISBN 978-1-6654-0601-7

- Daniel Tovarnák, Michal Cech, Dusan Tichý, Vojtech Dohnal:

ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. 1-4 - Alberto Mozo, Amit Karamchandani

, Mario Sanz Rodrigo, José Ignacio Moreno, Antonio Pastor:
B5GEMINI: Digital Twin Network for 5G and Beyond. 1-6 - Sina Rafati Niya, Burkhard Stiller:

Efficient Designs for Practical Blockchain-IoT Integration. 1-6 - Robert Harper, Philip Tee

:
Structural Network Metrics and Incident Generation. 1-6 - Sanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel:

Non-negative Matrix Factorization For Network Delay Matrix Completion. 1-6 - Maher Al Islam, Carol J. Fung, Ashraf Tantawy, Sherif Abdelwahed:

A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services. 1-5 - Jorge Visca, Javier Baliosian:

A Model for Route Learning in Opportunistic Networks. 1-4 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:

Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G System. 1-9 - Johannes Kristan, Paolo Azzoni, Lukas Römer, Sven Erik Jeroschewski, Elisa Londero:

Evolving the Ecosystem: Eclipse Arrowhead integrates Eclipse IoT. 1-6 - Frank Engelhardt

, Mesut Günes:
A /sys Filesystem for the Internet of Things. 1-6 - Hongyi Huang, Wenfei Wu:

HyperSFP: Fault-Tolerant Service Function Chain Provision on Programmable Switches in Data Centers. 1-9 - Lukas Gehreke, Kai Kientopf, Mesut Günes:

B.A.T.M.A.N. in the IoT. 1-6 - Zsófia Papp, Garry Irvine, Roland Smith, Ferenc Mogyorósi, Péter Revisnyei, István Töros, Alija Pasic:

TDoA based indoor positioning over small cell 5G networks. 1-6 - Michelle Cersosimo, Adrián Lara:

Detecting Malicious Domains using the Splunk Machine Learning Toolkit. 1-6 - Dániel Ficzere:

Complex network theory to model 5G Network Slicing. 1-4 - Ashima Chawla, Paul Jacob, Paddy G. Farrell, Erik Aumayr, Sheila Fallon

:
Towards Interpretable Anomaly Detection: Unsupervised Deep Neural Network Approach using Feedback Loop. 1-9 - Yutaka Fukuda, Takuji Hatase, Akihiro Satoh, Yutaka Nakamura, Sujiro Wada:

Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements. 1-4 - Jingye Chi, Siya Xu, Shaoyong Guo, Peng Yu, Xuesong Qiu:

Federated Learning Empowered Edge Collaborative Content Caching Mechanism for Internet of Vehicles. 1-5 - Reinout Eyckerman, Philippe Reiter, Steven Latré, Johann Márquez-Barja

, Peter Hellinckx
:
Application Placement in Fog Environments using Multi-Objective Reinforcement Learning with Maximum Reward Formulation. 1-6 - Mingwei Cui, Xiao Li, Ying Wang, Tianyuan Niu, Fan Yang:

SPT: sketch-based polling in-band network telemetry. 1-7 - Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:

A Data Driven Coordination between Load Balancing and Interference Cancellation. 1-6 - Omar Houidi

, Sihem Bakri, Djamal Zeghlache:
Multi-Agent Graph Convolutional Reinforcement Learning for Intelligent Load Balancing. 1-6 - Frank Loh, Noah Mehling, Stefan Geißler, Tobias Hoßfeld

:
Simulative Performance Study of Slotted Aloha for LoRaWAN Channel Access. 1-9 - Kim Hammar, Rolf Stadler:

A System for Interactive Examination of Learned Security Policies. 1-3 - Martin Zádník:

Towards Inference of DDoS Mitigation Rules. 1-5 - Linyih Teng, Chi-Hsiang Hung, Charles H.-P. Wen

:
P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable Switch. 1-5 - Hongyi Huang, Wenfei Wu, Shimin Tao:

WRS: Workflow Retrieval System for Cloud Automatic Remediation. 1-10 - Wai Weng Lo

, Siamak Layeghy
, Mohanad Sarhan
, Marcus Gallagher
, Marius Portmann
:
E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. 1-9 - Johan Garcia:

Change Point Evaluation in Networking Logs with Periodicity Filtering and Bootstrapping. 1-7 - Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu:

Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures. 1-4 - Marten Gartner, Johann Wagner, Martin Koppehel, David Hausheer:

Demonstration of xiondp: An XDP-Accelerated Processing of SCION Packets. 1-2 - Safwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi, Paul A. Rubin:

HERRA: Energy-Aware Scalable D2D 5G Cellular Traffic Offloading Scheme. 1-7 - Luciano Zembruzki

, Raffaele Sommese
, Lisandro Zambenedetti Granville
, Arthur Selle Jacobs, Mattijs Jonker, Giovane C. M. Moura:
Hosting Industry Centralization and Consolidation. 1-9 - Kilian Holzinger, Franz Biersack, Henning Stubbe, Angela Gonzalez Mariño

, Abdoul Kane, Francesc Fons, Haigang Zhang, Thomas Wild, Andreas Herkersdorf, Georg Carle:
SmartNIC-based Load Management and Network Health Monitoring for Time Sensitive Applications. 1-6 - Tommaso Caiazzi

, Mariano Scazzariello
, Leonardo Alberro
, Lorenzo Ariemma, Alberto Castro
, Eduardo Grampín, Giuseppe Di Battista:
Sibyl: a Framework for Evaluating the Implementation of Routing Protocols in Fat-Trees. 1-7 - Sahar Bakhtar, Hovhannes A. Harutyunyan:

Dynamic Local Community Detection Algorithms. 1-6 - Khizar Abbas

, Talha Ahmed Khan, Muhammad Afaq
, Wang-Cheol Song:
Ensemble Learning-based Network Data Analytics for Network Slice Orchestration and Management: An Intent-Based Networking Mechanism. 1-5 - László Hévizi, Alexandros Palaios:

Automatic RRC Reconfigurations Based on User Mobility Patterns. 1-5 - Subir Halder, Thomas Newe

:
Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT. 1-9 - Lijun Dong, Richard Li

:
Improve Multiple-Camera Assisted Remote Driving by Qualitative Communication and New IP. 1-5 - Viktoria Vomhoff, Stefan Geissler, Frank Loh, Wolfgang Bauer, Tobias Hossfeld

:
Characterizing Mobile Signaling Anomalies in the Internet-of-Things. 1-6 - Komal Gilani

, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi:
Self-sovereign Identity Management Framework using Smart Contracts. 1-7 - Attila Hilt

, József Varga
, Gábor Járó
:
Availability-Aware E-band Wireless Extension of Fiber-Access. 1-5 - Marwa A. Elsayed

, Nur Zincir-Heywood:
BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks. 1-9 - Ivan Peter Lamb, Mateus Saquetti, Guilherme Bueno de Oliveira, José Rodrigo Azambuja, Weverton Cordeiro:

Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks. 1-9 - Jorge Baranda, Josep Mangues-Bafalluy:

End-to-End Network Service Orchestration in Heterogeneous Domains for Next-Generation Mobile Networks. 1-6 - Nicola Caldognetto, Luca Pasquali Evangelisti, Filippo Poltronieri

, Michele Russo, Cesare Stefanelli, Sara Tenani, Sara Toboli, Mauro Tortonesi
:
Water 4.0: enabling Smart Water and Environmental Data Metering. 1-6 - Shuying Zhuang

, Jessie Hui Wang, Jilong Wang, Changqing An
, Yuedong Xu, Tianhao Wu:
Predicting Unseen Links Using Learning-based Matrix Completion. 1-9 - Hélio Henrique Gonçalves Guardabaxo, Gustavo Sousa Pavani

:
QoE Management of HTTP/2 traffic in Software-Defined Wide Area Networks. 1-5 - Gergo Csáti, István Pelle, László Toka:

Optimizing Performance and Resource Consumption of Cloud-Native Logging Application Stacks. 1-4 - Alessandro Spallina, Andrea Araldo, Tijani Chahed, Hind Castel-Taleb, Antonella Di Stefano, Tülin Atmaca:

Energy-efficient Resource Allocation in Multi-Tenant Edge Computing using Markov Decision Processes. 1-5 - Felix Larrinaga, William Ochoa

, Alain Perez
, Javier Cuenca
, Jon Legaristi
, Miren Illarramendi
:
Node-RED Workflow Manager for Edge Service Orchestration. 1-6 - Rui Kang

, Fujun He, Eiji Oki:
Resilient Virtual Network Function Allocation with Diversity and Fault Tolerance Considering Dynamic Requests. 1-9 - Timothy Miskell, Tushar Gohad, Ai Bee Lim, Felipe Pastor, Jeremy Payne, Greg Smith, Chris Cavigioli:

Persistent Memory for Content Delivery Networks. 1-6 - Ákos Leiter, Attila Hegyi, Nándor Galambosi, Edina Lami, Péter Fazekas:

Automatic failover of 5G container-based User Plane Function by ONAP closed-loop orchestration. 1-2 - Filippo Poltronieri

, Mauro Tortonesi
, Cesare Stefanelli:
A Chaos Engineering Approach for Improving the Resiliency of IT Services Configurations. 1-6 - Jasmeen Kaur Ahluwalia, Carla Mouradian, Mohammad Nazmul Alam, Roch H. Glitho:

A Cloud Infrastructure as a Service for an Efficient Usage of Sensing and Actuation Capabilities in Internet of Things. 1-6 - Francesco Giacinto Lavacca, Vincenzo Eramo, Antonio Cianfrani, Marco Listanti, Francesco Valente

:
Perspectives on AI-based Algorithms Applied to C-RAN Functional Splitting and Advanced Antenna System Problem. 1-5 - Richard Etengu, Saw Chin Tan, Teong-Chee Chuah, Jaime Galán-Jiménez:

Deep Learning-Assisted Traffic Prediction in Hybrid SDN/OSPF Backbone Networks. 1-6 - Nikolas Wehner, Markus Ring, Joshua Schüler, Andreas Hotho, Tobias Hoßfeld

, Michael Seufert
:
On Learning Hierarchical Embeddings from Encrypted Network Traffic. 1-7 - Chia-Cheng Yen, Wenting Sun, Hakimeh Purmehdi, Won Park, Kunal Rajan Deshmukh, Nishank Thakrar, Omar Nassef, Adam Jacobs:

Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless Networks. 1-7 - Olena Chornovol, Alex Norta:

Sustainable Machine-to-Everything Infrastructure Management: Blockchain-Based Impact Indexing for Distributed Collaboration Systems. 1-4 - José Camacho, Katarzyna Wasielewska

:
Dataset Quality Assessment in Autonomous Networks with Permutation Testing. 1-4 - Himanshi Babbar, Ouns Bouachir, Shalli Rani

, Moayad Aloqaily:
Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems. 1-6 - Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Yukun Wang, Carol J. Fung, Hailong Yang, Depei Qian:

Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning. 1-5 - Fetia Bannour

, Stefania Dumbrava, Damien Lu:
A Flexible GraphQL Northbound API for Intent-based SDN Applications. 1-5 - Estefanía Coronado, Shuaib Siddiqui, Roberto Riggio:

Roadrunner: O-RAN-based Cell Selection in Beyond 5G Networks. 1-7 - Naik Bakht Sania Qureshi, Dong-Hoon Kim, Jiwoo Lee, Eun-Kyu Lee:

Poisoning Attacks against Federated Learning in Load Forecasting of Smart Energy. 1-7 - Yu Min Park, Sheikh Salman Hassan

, Yan Kyaw Tun
, Zhu Han, Choong Seon Hong:
Joint Resources and Phase-Shift Optimization of MEC-Enabled UAV in IRS-Assisted 6G THz Networks. 1-7 - Alexander Griessel, Maximilian Stephan, Martin Mieth, Wolfgang Kellerer

, Patrick Krämer:
RLBrowse: Generating Realistic Packet Traces with Reinforcement Learning. 1-6 - Carson Kuzniar, Miguel C. Neves, Vladimir Gurevich, Israat Haque:

IoT Device Fingerprinting on Commodity Switches. 1-9 - Ons Aouedi

, Kandaraj Piamrat, Benoît Parrein
:
Decision tree-based blending method using deep-learning for network management. 1-7 - Tanesh Kumar

, Mika Ylianttia, Erkki Harjula:
Securing Edge Services for Future Smart Healthcare and Industrial IoT Applications. 1-6 - Anousheh Gholami, Kunal Rao, Wang-Pin Hsiung, Oliver Po, Murugan Sankaradas, Srimat Chakradhar:

ROMA: Resource Orchestration for Microservices-based 5G Applications. 1-9 - Alberto Huertas Celdrán

, Pedro Miguel Sánchez Sánchez
, Eder J. Scheid
, Timucin Besken, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors. 1-7 - Nicholas Topman, Asma Adnane:

Mobile applications for connected cars: Security analysis and risk assessment. 1-6 - Denis Gustin, Jürgen Jasperneite:

IoT Device Management Based on Open Source Platforms - Requirements Analysis and Evaluation. 1-4 - Paulina Arregoces, Jaime Vergara, Sergio Armando Gutierrez

, Juan Felipe Botero:
Network-based Intrusion Detection: A One-class Classification Approach. 1-6 - Tharaka Hewa, Nisita Weerasinghe, Pawani Porambage, Madhusanka Liyanage

, Mika Ylianttila:
Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker). 1-3 - Satoru Kobayashi

, Keiichi Shima, Kenjiro Cho
, Osamu Akashi, Kensuke Fukuda:
Comparative Causal Analysis of Network Log Data in Two Large ISPs. 1-6 - Sean Joe Taylor

, Farhan Ahmad, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
, David Evans:
Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons. 1-6 - Ignacio Royuela, Juan Carlos Aguado, Ignacio de Miguel, Noemí Merayo, Ramón J. Durán Barroso, Diego Hortelano, Lidia Ruiz-Perez

, Patricia Fernández
, Rubén M. Lorenzo
, Evaristo J. Abril:
A testbed for CCAM services supported by edge computing, and use case of computation offloading. 1-6 - Kengo Tajiri, Ryoichi Kawahara, Yoichi Matsuo

:
Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion. 1-9 - Majid Ghaderi, Wenjie Liu, Shihan Xiao, Fenglin Li:

Learning Traffic Encoding Matrices for Delay-Aware Traffic Engineering in SD-WANs. 1-9 - Roland Mark Erdei, László Toka:

Optimal Resource Provisioning for Data-intensive Microservices. 1-6 - Marco Polverini, Davide Aureli, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti:

Enhancing the SRv6 Network Programming Model Through the Definition of the Maximize Throughput Behavior. 1-5 - Ahmad Abboud, Rémi Garcia

, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula
, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. 1-9 - Ronny Döring

, Marc Geitz:
Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. 1-5 - Manuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez:

Deep Reinforcement Learning Based Method for the Rule Placement Problem in Software-Defined Networks. 1-4 - Simon Raffeck, Stefan Geissler, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld

:
Data Usage in IoT: A Characterization of GTP Tunnels in M2M Mobile Networks. 1-6 - Delia Rico

, Karl-Johan Grinnemo, Anna Brunström, Pedro Merino
:
Implementation and evaluation of the Multi-connection Tactile Internet Protocol and API. 1-6 - Changho Seo, Yunchang Chae, Jaeryun Lee, Euiseong Seo, Byungchul Tak:

NoSQL Database Performance Diagnosis through System Call-level Introspection. 1-9 - Caspar von Lengerke

, Alexander Hefele, Juan A. Cabrera, Frank H. P. Fitzek
:
Stopping the Data Flood: Post-Shannon Traffic Reduction in Digital-Twins Applications. 1-5 - Eun-Ji Kim, Eun-Kyu Lee:

Performance Impact of Differential Privacy on Federated Learning in Vehicular Networks. 1-5 - Miquel Farreras

, Paola Soto, Miguel Camelo, Lluís Fàbrega
, Pere Vilà:
Predicting network performance using GNNs: generalization to larger unseen networks. 1-6 - Nardine Basta, Muhammad Ikram

, Mohamed Ali Kâafar
, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. 1-7 - Christian Lübben, Marc-Oliver Pahl

:
Autonomous convergence mechanisms for collaborative crowd-sourced data-modeling. 1-5 - Géza Kulcsár, Johannes Kristan, Sven Erik Jeroschewski:

Correctness, Completeness, Consistency: Challenges of Migrating Arrowhead System-of-Systems Models. 1-6 - Johannes Kristan, Sven Erik Jeroschewski, Lukas Römer:

Open Source Software Integration in an Industry 4.0 Framework: Experience and Lessons Learned. 1-4 - Kunling He, Changqing An

, Jessie Hui Wang, Tianshu Li, Linmei Zu, Fenghua Li:
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme. 1-9 - Kaspar Hageman

, Egon Kidmose
, René Rydhof Hansen
, Jens Myrup Pedersen
:
Understanding the Challenges of Blocking Unnamed Network Traffic. 1-5 - Kayuã Oleques Paim

, Vagner Ereno Quincozes
, Diego Kreutz, Rodrigo B. Mansilha
, Weverton Cordeiro:
Fix Me If You Can: Using Neural Networks to Regenerate Networked Systems' Monitoring Traces. 1-9 - El-Heithem Mohammedi, Emmanuel Lavinal

, Guillaume Fleury:
Detecting and locating configuration errors in IP VPNs with Graph Neural Networks. 1-6 - Martin Happ, Jia Lei Du, Matthias Herlich, Christian Maier, Peter Dorfinger, José Suárez-Varela

:
Exploring the Limitations of Current Graph Neural Networks for Network Modeling. 1-8 - Stanislav Spacek, Petr Velan, Pavel Celeda

, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. 1-7 - Dániel Ficzere, Dhruvin Patel, Joachim Sachs, Junaid Ansari, Gábor Soós, Pál Varga:

5G public network integration for a real-life PROFINET application. 1-5 - Cristiano M. Silva, Fernanda S. H. Sumika, Daniel Ludovico Guidoni, Leonardo Alvarenga L. Santos, João Fernando Machry Sarubbi, Somayeh Mokhtari

, Matheus F. Rodrigues Santos, José Marcos Silva Nogueira:
Solving Combinatorial Problems via the Random Exploration of the Search Space: An Experimental Approach for Fast Decision Making. 1-4 - Andrzej Jasinski

, Yuansong Qiao, Enda Fallon
, Ronan Flynn
:
Natural Language Processing Applied to Dynamic Workflow Generation for Network Management. 1-6 - Morteza Moghaddassian, Alberto Leon-Garcia:

Bringing ICN To Software-Defined Infrastructures. 1-5 - Balázs Vass

, János Tapolcai:
Essence of Geographically Correlated Failure Events in Communication Networks. 1-6 - Juuso Haavisto, Thibault Cholez

, Jukka Riekki:
Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes. 1-8 - Kyle A. Simpson

, Dimitrios P. Pezaros:
Revisiting the Classics: Online RL in the Programmable Dataplane. 1-10 - Ali El-Amine, Olivier Brun:

A Game-Theoretic Algorithm for the Joint Routing and VNF Placement Problem. 1-9 - Márton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle:

Clustering Mobile Network Data with Decorrelating Adversarial Nets. 1-9 - Vojdan Kjorveziroski

, Pavle V. Vuletic
, Lukasz Lopatowski, Frédéric Loui:
On-Demand Network Management with NMaaS: Network Management as a Service. 1-3 - Takanori Hara

, Masahiro Sasabe:
Lagrangian Heuristics for Capacitated Shortest Path Tour Problem Based Online Service Chaining. 1-9 - Hsin-Fu Chang, Michael I.-C. Wang, Chi-Hsiang Hung, Charles H.-P. Wen

:
Enabling Malware Detection with Machine Learning on Programmable Switch. 1-5 - Will Fantom, Paul Alcock

, Ben Simms, Charalampos Rotsos, Nicholas J. P. Race:
A NEAT way to test-driven network management. 1-5 - Filippo Poltronieri

, Cesare Stefanelli, Mauro Tortonesi
:
Value-of-Information Middleware Solutions for Fog and Edge Computing. 1-6 - Lukás Sadlek, Pavel Celeda

, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. 1-6 - Sharva Garg, Tanmoy Bag, Andreas Mitschele-Thiel:

Decentralized Machine Learning based Network Data Analytics for Cognitive Management of Mobile Communication Networks. 1-9 - Tina Tremel, Jochen Kögel

, Florian Jauernig, Sebastian Meier, Dennis Thom, Franziska Becker
, Christoph Müller, Steffen Koch:
VITALflow: Visual Interactive Traffic Analysis with NetFlow. 1-6 - Niloy Saha, Alexander James, Nashid Shahriar

, Raouf Boutaba, Aladdin Saleh:
Demonstrating Network Slice KPI Monitoring in a 5G Testbed. 1-3 - Rahul Sharma

, Chien Aun Chan
, Christopher Leckie:
Hybrid Collaborative Architectures For Intrusion Detection In Multi-Access Edge Computing. 1-7 - Marten Gartner, Johann Wagner, Martin Koppehel, David Hausheer:

XDP-Accelerated Packet Processing on SCION Endhosts. 1-9 - Thomas Tournaire, Yue Jin, Armen Aghasaryan, Hind Castel-Taleb, Emmanuel Hyon

:
Factored Reinforcement Learning for Auto-scaling in Tandem Queues. 1-7 - Nurefsan Sertbas Bülbül, Doganalp Ergenç, Mathias Fischer:

Towards SDN-based Dynamic Path Reconfiguration for Time Sensitive Networking. 1-9 - Anat Bremler-Barr

, Bar Meyuhas, Ran Shister:
MUDIS: MUD Inspection System. 1-3 - Mario Di Mauro

, Giovanni Galatro, Maurizio Longo, Fabio Postiglione
, Marco Tambasco:
Performability Analysis of Containerized IMS through Queueing Networks and Stochastic Models. 1-8 - Arnol Lemogue, Ivan Martinez, Laurent Toutain, Ahmed Bouabdallah:

Federated IoT Roaming using Private DNS Resolutions. 1-6 - Marek Bachmann

, Luca Hernández Acosta, Johann Götz, Delphine Reinhardt
, Klaus David:
Collision Avoidance for Vulnerable Road Users: Privacy versus Survival? 1-6 - Mozhgan Nasr Azadani, Azzedine Boukerche:

Convolutional and Recurrent Neural Networks for Driver Identification: An Empirical Study. 1-6 - Ramesh Paudel, H. Howie Huang

:
Pikachu: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection. 1-7 - Andrei Günter, Matthias König

:
Improved Edge Computing for IoT Devices via Optimized Semantic Models. 1-6 - Lyn Hill, Charalampos Rotsos

, William Fantom, Christopher Edwards, David Hutchison:
Improving network resilience with Middlebox Minions. 1-5 - Carlos Güemes-Palau

, Paul Almasan
, Shihan Xiao, Xiangle Cheng, Xiang Shi, Pere Barlet-Ros, Albert Cabellos-Aparicio:
Accelerating Deep Reinforcement Learning for Digital Twin Network Optimization with Evolutionary Strategies. 1-5 - Gwen Maudet

, Mireille Batton-Hubert, Patrick Maillé, Laurent Toutain:
Emission Scheduling Strategies for Massive-IoT: Implementation and Performance Optimization. 1-4 - Manel Smine, David Espes, Marc-Oliver Pahl

:
Optimal Access Control Deployment in Network Function Virtualization. 1-9 - Muhammad Sulaiman, Arash Moayyedi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh:

Multi-Agent Deep Reinforcement Learning for Slicing and Admission Control in 5G C-RAN. 1-9 - Morteza Safaei Pour

, Joseph Khoury
, Elias Bou-Harb:
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts. 1-9 - Marian Buschsieweke, Mesut Günes:

Efficient Revocation of Capability Tokens. 1-6 - Shihabur Rahman Chowdhury, Raouf Boutaba:

Resource Management in Softwarized Networks. 1-6 - Juan Vargas, Cédric Thienot, Xavier Lagrange:

Analytical Calculation of the User Threshold for the Switching between Unicast and Broadcast in Cellular Networks. 1-6 - Chenxin Duan, Kai Wang, Wenqi Chen, Guanglei Song, Jiahai Yang, Zhiliang Wang:

Monitoring Smart Home Traffic under Differential Privacy. 1-10 - Vatsal Mehta, Glenford Mapp, Vaibhav Gandhi:

Exploring New Traffic Prediction Models to build an Intelligent Transport System for Smart Cities. 1-6 - Stanislav Lange, Jane Frances Pajo, Thomas Zinner, Håkon Lønsethagen

, Min Xie:
QoS-Aware Inter-Domain Connectivity: Control Plane Design and Operational Considerations. 1-6 - Mengfei Zhu, Rui Kang

, Eiji Oki:
Implementation of Real-time Function Deployment with Resource Migration in Kubernetes. 1-3 - Lars Wüstrich, Sebastian Gallenmüller

, Marc-Oliver Pahl
, Georg Carle:
AC/DCIM: Acoustic Channels for Data Center Infrastructure Monitoring. 1-5 - Jalil Moraney, Danny Raz:

Efficient Resource-Constrained Monitoring. 1-6 - Johan Garcia:

Change Point Detection in Clustered Network Performance Indicators. 1-6 - Stefan Werner, Stefan Schneider, Holger Karl:

Use What You Know: Network and Service Coordination Beyond Certainty. 1-10 - Joseph McNamara

, Erik Aumayr, Liam Fallon, Enda Fallon
:
A Flexible Interpreter For Intent Realisation. 1-6 - Christian Dietz, Marcel Antzek, Gabi Dreo, Anna Sperotto, Aiko Pras:

DMEF: Dynamic Malware Evaluation Framework. 1-7 - Eduardo Cibrián, Roy Mendieta, José María Álvarez Rodríguez

, Juan Lloréns:
Towards the reuse of physical models within the development life-cycle: a case study of Simulink models. 1-6 - Shivani Saxena

, Krishna M. Sivalingam:
Slice admission control using overbooking for enhancing provider revenue in 5G Networks. 1-7 - Nobukazu Fukuda, Chao Wu, Shingo Horiuchi, Kenichi Tayama:

Fault Report Generation for ICT Systems by Jointly Learning Time-series and Text Data. 1-9 - Shahzeb Mustafa, Prasun Kanti Dey, Murat Yuksel:

Peer Me Maybe?: A Data-Centric Approach to ISP Peer Selection. 1-9 - Patrick Schwaiger, Dimitrios Simopoulos

, Andreas Wolf:
Automated IoT security testing with SecLab. 1-6 - Ziting Zhang, Yu Zeng, Haoran Liu, Chaoyue Zhao, Feng Wang, Yunqing Chen:

Smart DC: An AI and Digital Twin-based Energy-Saving Solution for Data Centers. 1-6 - Masaru Sakai, Kensuke Takahashi:

Constructing a service process model based on distributed tracing for conformance checking of microservices. 1-6 - Abir Laraba, Jérôme François, Isabelle Chrisment, Shihabur Rahman Chowdhury, Raouf Boutaba:

Detecting Multi-Step Attacks: A Modular Approach for Programmable Data Plane. 1-9 - Jakob Nyberg, Pontus Johnson, András Méhes:

Cyber threat response using reinforcement learning in graph-based attack simulations. 1-4 - Mohamed Oulaaffart, Remi Badonnel, Christophe Bianco:

An Automated SMT-based Security Framework for Supporting Migrations in Cloud Composite Services. 1-9 - Sebastian Engel, Christian Münch, Fritz Schinkel, Oliver Holschke, Marc Geitz, Timmy Schüller:

Segment Routing with Digital Annealing. 1-9 - Kuon Akiyama, Ryoichi Shinkuma, Jun Shiomi:

Real-time adaptive data filtering with multiple sensors for indoor monitoring. 1-3 - Gayan Dilanka, Lakshan Viranga, Rajitha Pamudith, Tharindu D. Gamage, Pasika Ranaweera

, Indika A. M. Balapuwaduge, Madhusanka Liyanage
:
MEC-RHA: Demonstration of Novel Service Request Handling Algorithm for MEC. 1-3 - Anat Bremler-Barr

, Bar Meyuhas, Ran Shister:
One MUD to Rule Them All: IoT Location Impact. 1-5 - Christian Lübben, Simon Schäffner, Marc-Oliver Pahl

:
Continuous Microservice Re-Placement in the IoT. 1-6 - Stefan Schneider, Stefan Werner, Ramin Khalili, Artur Hecker, Holger Karl:

mobile-env: An Open Platform for Reinforcement Learning in Wireless Mobile Networks. 1-3 - Haythem Yahyaoui, Melek Majdoub, Mohamed Faten Zhani

, Moayad Aloqaily:
On Minimizing TCP Retransmission Delay in Softwarized Networks. 1-6 - Takahide Murakami, Naoki Aihara

, Akio Ikami, Yu Tsukamoto, Hiroyuki Shinbo:
Analysis of CPU Placement of Cell-Free Massive MIMO for User-centric RAN. 1-7 - Negar Emami, Lucas Pacheco, Antonio Di Maio

, Torsten Braun
:
RC-TL: Reinforcement Convolutional Transfer Learning for Large-scale Trajectory Prediction. 1-9 - Alex F. R. Trajano

, Pietro C. F. Andrade, Ivo A. Pimenta
, Jefferson Rodrigo A. Cavalcante, José Neuman de Souza:
Delivering WiFi Connectivity to Remote Locations Through LoRa Mesh Networking. 1-6 - Damu Ding

, Marco Savi, Federico Pederzolli, Domenico Siracusa:
Design and Development of Network Monitoring Strategies in P4-enabled Programmable Switches. 1-6 - Andrzej Jasinski

, Yuansong Qiao, Enda Fallon
, Ronan Flynn
:
Natural Language Processing for the Dynamic Generation of Network Management Workflows. 1-3 - Maya Kassis, Massinissa Ait Aba, Hind Castel-Taleb, Maxime Elkael, Andrea Araldo, Badii Jouaber:

Integrated Deployment Prototype for Virtual Network Orchestration Solution. 1-3 - Dimitrios Dechouniotis, Dimitrios Spatharakis, Symeon Papavassiliou:

Edge Robotics Experimentation over Next Generation IIoT Testbeds. 1-3 - David Balla, Markosz Maliosz

, Csaba Simon:
Towards a Predictable Open Source FaaS. 1-5 - Christopher Janz, Yuren You, Mahdi Hemmati

, Zhiping Jiang, Abbas Javadtalab, Jeebak Mitra:
Digital Twin for the Optical Network: Key Technologies and Enabled Automation Applications. 1-6 - Márton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle:

Robust Deep Learning against Corrupted Data in Cognitive Autonomous Networks. 1-7 - Christian Thomay, Ulf Bodin, Haris Isakovic, Rainer Lasch, Nicholas J. P. Race

, Christoph Schmittner, Germar Schneider, Zsolt Szepessy, Markus Tauber
, Zhiping Wang:
Towards Adaptive Quality Assurance in Industrial Applications. 1-6 - Anderson Santos da Silva, Alberto Schaeffer-Filho:

NetWords: Enabling the Understanding of Network Property Violation Occurrences. 1-9 - Kensuke Fukuda, Yoshitaka Aharen, Shinta Sato, Takeshi Mitamura:

Characterizing DNS query response sizes through active and passive measurements. 1-6 - Takayuki Kuroda, Yutaka Yakuwa, Takashi Maruyama, Takuya Kuwahara, Kozo Satoda:

Automation of Intent-based Service Operation with Models and AI/ML. 1-6 - Reza Hedayati Majdabadi, Mea Wang, Logan Rakai:

SODA-Stream: SDN Optimization for Enhancing QoE in DASH Streaming. 1-5 - Pegah Golchin

, Ralf Kundel, Tim Steuer, Rhaban Hark, Ralf Steinmetz
:
Improving DDoS Attack Detection Leveraging a Multi-aspect Ensemble Feature Selection. 1-5 - Simon Bauer, Benedikt Jaeger, Max Reimann, Jonas Fromm, Georg Carle:

Towards the Classification of TCP Throughput Changes. 1-7 - Katharina Dietz, Nicholas Gray, Michael Seufert

, Tobias Hossfeld
:
ML-based Performance Prediction of SDN using Simulated Data from Real and Synthetic Networks. 1-7 - Eli Brosh, Elad Wasserstein, Anat Bremler-Barr

:
Dynamic-Deep: Tune ECG Task Performance and Optimize Compression in IoT Architectures. 1-6 - Seyed Soheil Johari, Nashid Shahriar

, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh:
Anomaly Detection and Localization in NFV Systems: an Unsupervised Learning Approach. 1-9 - Stepan Dvorak, Pavel Procházka, Lukás Bajer:

GNN-Based Malicious Network Entities Identification In Large-Scale Network Data. 1-4 - Giles Winchester

, George Parisis
, Luc Berthouze:
Exploiting Functional Connectivity Inference for Efficient Root Cause Analysis. 1-5 - Takuya Kuwahara, Takayuki Kuroda, Kozo Satoda:

Intent-based System Design with Efficient Search Using Partial-Order Reduction. 1-7 - Fernando García Sanz, Masoumeh Ebrahimi, Andreas Johnsson:

Exploring Approaches for Heterogeneous Transfer Learning in Dynamic Networks. 1-9 - Valentin Dimov, Erkin Kirdan, Marc-Oliver Pahl

:
Resource tradeoffs for TLS-secured MQTT-based IoT Management. 1-6 - Ben Schneider, Rute C. Sofia, Matthias Kovatsch:

A Proposal for Time-Aware Scheduling in Wireless Industrial IoT Environments. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














