


Остановите войну!
for scientists:


default search action
NOMS 2022: Budapest, Hungary
- 2022 IEEE/IFIP Network Operations and Management Symposium, NOMS 2022, Budapest, Hungary, April 25-29, 2022. IEEE 2022, ISBN 978-1-6654-0601-7
- Daniel Tovarnák, Michal Cech, Dusan Tichý, Vojtech Dohnal:
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. 1-4 - Alberto Mozo, Amit Karamchandani
, Mario Sanz Rodrigo, José Ignacio Moreno, Antonio Pastor:
B5GEMINI: Digital Twin Network for 5G and Beyond. 1-6 - Sina Rafati Niya, Burkhard Stiller:
Efficient Designs for Practical Blockchain-IoT Integration. 1-6 - Robert Harper, Philip Tee
:
Structural Network Metrics and Incident Generation. 1-6 - Sanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel:
Non-negative Matrix Factorization For Network Delay Matrix Completion. 1-6 - Maher Al Islam, Carol J. Fung, Ashraf Tantawy, Sherif Abdelwahed:
A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services. 1-5 - Jorge Visca, Javier Baliosian:
A Model for Route Learning in Opportunistic Networks. 1-4 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
Cloud Native 5G: an Efficient Orchestration of Cloud Native 5G System. 1-9 - Johannes Kristan, Paolo Azzoni, Lukas Römer, Sven Erik Jeroschewski, Elisa Londero:
Evolving the Ecosystem: Eclipse Arrowhead integrates Eclipse IoT. 1-6 - Frank Engelhardt, Mesut Günes:
A /sys Filesystem for the Internet of Things. 1-6 - Hongyi Huang, Wenfei Wu:
HyperSFP: Fault-Tolerant Service Function Chain Provision on Programmable Switches in Data Centers. 1-9 - Lukas Gehreke, Kai Kientopf, Mesut Günes:
B.A.T.M.A.N. in the IoT. 1-6 - Zsófia Papp, Garry Irvine, Roland Smith, Ferenc Mogyorósi, Péter Revisnyei, István Töros, Alija Pasic:
TDoA based indoor positioning over small cell 5G networks. 1-6 - Michelle Cersosimo, Adrián Lara:
Detecting Malicious Domains using the Splunk Machine Learning Toolkit. 1-6 - Dániel Ficzere:
Complex network theory to model 5G Network Slicing. 1-4 - Ashima Chawla, Paul Jacob, Paddy G. Farrell, Erik Aumayr, Sheila Fallon:
Towards Interpretable Anomaly Detection: Unsupervised Deep Neural Network Approach using Feedback Loop. 1-9 - Yutaka Fukuda, Takuji Hatase, Akihiro Satoh, Yutaka Nakamura, Sujiro Wada:
Characterizing the basic performance of IEEE 802.11ax using actual hardware measurements. 1-4 - Jingye Chi, Siya Xu, Shaoyong Guo, Peng Yu, Xuesong Qiu:
Federated Learning Empowered Edge Collaborative Content Caching Mechanism for Internet of Vehicles. 1-5 - Reinout Eyckerman, Philippe Reiter, Steven Latré, Johann Márquez-Barja
, Peter Hellinckx:
Application Placement in Fog Environments using Multi-Objective Reinforcement Learning with Maximum Reward Formulation. 1-6 - Mingwei Cui, Xiao Li, Ying Wang, Tianyuan Niu, Fan Yang:
SPT: sketch-based polling in-band network telemetry. 1-7 - Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:
A Data Driven Coordination between Load Balancing and Interference Cancellation. 1-6 - Omar Houidi
, Sihem Bakri, Djamal Zeghlache:
Multi-Agent Graph Convolutional Reinforcement Learning for Intelligent Load Balancing. 1-6 - Frank Loh, Noah Mehling, Stefan Geißler, Tobias Hoßfeld:
Simulative Performance Study of Slotted Aloha for LoRaWAN Channel Access. 1-9 - Kim Hammar, Rolf Stadler:
A System for Interactive Examination of Learned Security Policies. 1-3 - Martin Zádník:
Towards Inference of DDoS Mitigation Rules. 1-5 - Linyih Teng, Chi-Hsiang Hung, Charles H.-P. Wen:
P4SF: A High-Performance Stateful Firewall on Commodity P4-Programmable Switch. 1-5 - Hongyi Huang, Wenfei Wu, Shimin Tao:
WRS: Workflow Retrieval System for Cloud Automatic Remediation. 1-10 - Wai Weng Lo
, Siamak Layeghy
, Mohanad Sarhan
, Marcus Gallagher, Marius Portmann:
E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. 1-9 - Johan Garcia:
Change Point Evaluation in Networking Logs with Periodicity Filtering and Bootstrapping. 1-7 - Abdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu:
Side-channel Attacks and Countermeasures in Cloud Services and Infrastructures. 1-4 - Marten Gartner, Johann Wagner, Martin Koppehel, David Hausheer:
Demonstration of xiondp: An XDP-Accelerated Processing of SCION Packets. 1-2 - Safwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi, Paul A. Rubin:
HERRA: Energy-Aware Scalable D2D 5G Cellular Traffic Offloading Scheme. 1-7 - Luciano Zembruzki, Raffaele Sommese, Lisandro Zambenedetti Granville, Arthur Selle Jacobs, Mattijs Jonker, Giovane C. M. Moura:
Hosting Industry Centralization and Consolidation. 1-9 - Kilian Holzinger, Franz Biersack, Henning Stubbe, Angela Gonzalez Mariño
, Abdoul Kane, Francesc Fons, Haigang Zhang, Thomas Wild, Andreas Herkersdorf, Georg Carle:
SmartNIC-based Load Management and Network Health Monitoring for Time Sensitive Applications. 1-6 - Tommaso Caiazzi, Mariano Scazzariello
, Leonardo Alberro
, Lorenzo Ariemma, Alberto Castro, Eduardo Grampín, Giuseppe Di Battista:
Sibyl: a Framework for Evaluating the Implementation of Routing Protocols in Fat-Trees. 1-7 - Sahar Bakhtar, Hovhannes A. Harutyunyan:
Dynamic Local Community Detection Algorithms. 1-6 - Khizar Abbas
, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Ensemble Learning-based Network Data Analytics for Network Slice Orchestration and Management: An Intent-Based Networking Mechanism. 1-5 - László Hévizi, Alexandros Palaios:
Automatic RRC Reconfigurations Based on User Mobility Patterns. 1-5 - Subir Halder, Thomas Newe
:
Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT. 1-9 - Lijun Dong, Richard Li:
Improve Multiple-Camera Assisted Remote Driving by Qualitative Communication and New IP. 1-5 - Viktoria Vomhoff, Stefan Geissler, Frank Loh, Wolfgang Bauer, Tobias Hossfeld:
Characterizing Mobile Signaling Anomalies in the Internet-of-Things. 1-6 - Komal Gilani
, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi:
Self-sovereign Identity Management Framework using Smart Contracts. 1-7 - Attila Hilt
, József Varga, Gábor Járó:
Availability-Aware E-band Wireless Extension of Fiber-Access. 1-5 - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks. 1-9 - Ivan Peter Lamb, Mateus Saquetti, Guilherme Bueno de Oliveira, José Rodrigo Azambuja, Weverton Cordeiro:
Protecting Virtual Programmable Switches from Cross-App Poisoning (CAP) Attacks. 1-9 - Jorge Baranda, Josep Mangues-Bafalluy:
End-to-End Network Service Orchestration in Heterogeneous Domains for Next-Generation Mobile Networks. 1-6 - Nicola Caldognetto, Luca Pasquali Evangelisti, Filippo Poltronieri, Michele Russo, Cesare Stefanelli, Sara Tenani, Sara Toboli, Mauro Tortonesi:
Water 4.0: enabling Smart Water and Environmental Data Metering. 1-6 - Shuying Zhuang, Jessie Hui Wang, Jilong Wang, Changqing An, Yuedong Xu, Tianhao Wu:
Predicting Unseen Links Using Learning-based Matrix Completion. 1-9 - Hélio Henrique Gonçalves Guardabaxo, Gustavo Sousa Pavani
:
QoE Management of HTTP/2 traffic in Software-Defined Wide Area Networks. 1-5 - Gergo Csáti, István Pelle, László Toka:
Optimizing Performance and Resource Consumption of Cloud-Native Logging Application Stacks. 1-4 - Alessandro Spallina, Andrea Araldo, Tijani Chahed, Hind Castel-Taleb, Antonella Di Stefano, Tülin Atmaca:
Energy-efficient Resource Allocation in Multi-Tenant Edge Computing using Markov Decision Processes. 1-5 - Felix Larrinaga, William Ochoa, Alain Perez
, Javier Cuenca
, Jon Legaristi, Miren Illarramendi:
Node-RED Workflow Manager for Edge Service Orchestration. 1-6 - Rui Kang, Fujun He, Eiji Oki:
Resilient Virtual Network Function Allocation with Diversity and Fault Tolerance Considering Dynamic Requests. 1-9 - Timothy Miskell, Tushar Gohad, Ai Bee Lim, Felipe Pastor, Jeremy Payne, Greg Smith, Chris Cavigioli:
Persistent Memory for Content Delivery Networks. 1-6 - Ákos Leiter, Attila Hegyi, Nándor Galambosi, Edina Lami, Péter Fazekas:
Automatic failover of 5G container-based User Plane Function by ONAP closed-loop orchestration. 1-2 - Filippo Poltronieri
, Mauro Tortonesi, Cesare Stefanelli:
A Chaos Engineering Approach for Improving the Resiliency of IT Services Configurations. 1-6 - Jasmeen Kaur Ahluwalia, Carla Mouradian, Mohammad Nazmul Alam, Roch H. Glitho:
A Cloud Infrastructure as a Service for an Efficient Usage of Sensing and Actuation Capabilities in Internet of Things. 1-6 - Francesco Giacinto Lavacca, Vincenzo Eramo, Antonio Cianfrani, Marco Listanti, Francesco Valente
:
Perspectives on AI-based Algorithms Applied to C-RAN Functional Splitting and Advanced Antenna System Problem. 1-5 - Richard Etengu, Saw Chin Tan, Teong-Chee Chuah, Jaime Galán-Jiménez:
Deep Learning-Assisted Traffic Prediction in Hybrid SDN/OSPF Backbone Networks. 1-6 - Nikolas Wehner, Markus Ring, Joshua Schüler, Andreas Hotho, Tobias Hoßfeld, Michael Seufert:
On Learning Hierarchical Embeddings from Encrypted Network Traffic. 1-7 - Chia-Cheng Yen, Wenting Sun, Hakimeh Purmehdi, Won Park, Kunal Rajan Deshmukh, Nishank Thakrar, Omar Nassef, Adam Jacobs:
Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless Networks. 1-7 - Olena Chornovol, Alex Norta:
Sustainable Machine-to-Everything Infrastructure Management: Blockchain-Based Impact Indexing for Distributed Collaboration Systems. 1-4 - José Camacho, Katarzyna Wasielewska
:
Dataset Quality Assessment in Autonomous Networks with Permutation Testing. 1-4 - Himanshi Babbar, Ouns Bouachir, Shalli Rani, Moayad Aloqaily:
Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems. 1-6 - Jiaxing Qi, Zhongzhi Luan, Shaohan Huang, Yukun Wang, Carol J. Fung, Hailong Yang, Depei Qian:
Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning. 1-5 - Fetia Bannour, Stefania Dumbrava, Damien Lu:
A Flexible GraphQL Northbound API for Intent-based SDN Applications. 1-5 - Estefanía Coronado, Shuaib Siddiqui, Roberto Riggio:
Roadrunner: O-RAN-based Cell Selection in Beyond 5G Networks. 1-7 - Naik Bakht Sania Qureshi, Dong-Hoon Kim, Jiwoo Lee, Eun-Kyu Lee:
Poisoning Attacks against Federated Learning in Load Forecasting of Smart Energy. 1-7 - Yu Min Park, Sheikh Salman Hassan
, Yan Kyaw Tun, Zhu Han, Choong Seon Hong:
Joint Resources and Phase-Shift Optimization of MEC-Enabled UAV in IRS-Assisted 6G THz Networks. 1-7 - Alexander Griessel, Maximilian Stephan, Martin Mieth, Wolfgang Kellerer, Patrick Krämer:
RLBrowse: Generating Realistic Packet Traces with Reinforcement Learning. 1-6 - Carson Kuzniar, Miguel C. Neves, Vladimir Gurevich, Israat Haque:
IoT Device Fingerprinting on Commodity Switches. 1-9 - Ons Aouedi, Kandaraj Piamrat, Benoît Parrein
:
Decision tree-based blending method using deep-learning for network management. 1-7 - Tanesh Kumar, Mika Ylianttia, Erkki Harjula:
Securing Edge Services for Future Smart Healthcare and Industrial IoT Applications. 1-6 - Anousheh Gholami, Kunal Rao, Wang-Pin Hsiung, Oliver Po, Murugan Sankaradas, Srimat Chakradhar:
ROMA: Resource Orchestration for Microservices-based 5G Applications. 1-9 - Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Eder J. Scheid, Timucin Besken, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors. 1-7 - Nicholas Topman, Asma Adnane:
Mobile applications for connected cars: Security analysis and risk assessment. 1-6 - Denis Gustin, Jürgen Jasperneite:
IoT Device Management Based on Open Source Platforms - Requirements Analysis and Evaluation. 1-4 - Paulina Arregoces, Jaime Vergara, Sergio Armando Gutierrez
, Juan Felipe Botero:
Network-based Intrusion Detection: A One-class Classification Approach. 1-6 - Tharaka Hewa, Nisita Weerasinghe, Pawani Porambage, Madhusanka Liyanage
, Mika Ylianttila:
Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker). 1-3 - Satoru Kobayashi, Keiichi Shima, Kenjiro Cho, Osamu Akashi, Kensuke Fukuda:
Comparative Causal Analysis of Network Log Data in Two Large ISPs. 1-6 - Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh
, David Evans:
Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons. 1-6 - Ignacio Royuela, Juan Carlos Aguado, Ignacio de Miguel, Noemí Merayo, Ramón J. Durán Barroso, Diego Hortelano, Lidia Ruiz-Perez
, Patricia Fernández, Rubén M. Lorenzo, Evaristo J. Abril:
A testbed for CCAM services supported by edge computing, and use case of computation offloading. 1-6 - Kengo Tajiri, Ryoichi Kawahara, Yoichi Matsuo:
Optimizing Edge-Cloud Cooperation for Machine Learning Accuracy Considering Transmission Latency and Bandwidth Congestion. 1-9 - Majid Ghaderi, Wenjie Liu, Shihan Xiao, Fenglin Li:
Learning Traffic Encoding Matrices for Delay-Aware Traffic Engineering in SD-WANs. 1-9 - Roland Mark Erdei, László Toka:
Optimal Resource Provisioning for Data-intensive Microservices. 1-6 - Marco Polverini, Davide Aureli, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti:
Enhancing the SRv6 Network Programming Model Through the Definition of the Maximize Throughput Behavior. 1-5 - Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. 1-9 - Ronny Döring
, Marc Geitz:
Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. 1-5 - Manuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez:
Deep Reinforcement Learning Based Method for the Rule Placement Problem in Software-Defined Networks. 1-4 - Simon Raffeck, Stefan Geissler, Michael Krolikowski, Steffen Gebert, Tobias Hoßfeld:
Data Usage in IoT: A Characterization of GTP Tunnels in M2M Mobile Networks. 1-6 - Delia Rico
, Karl-Johan Grinnemo, Anna Brunström, Pedro Merino
:
Implementation and evaluation of the Multi-connection Tactile Internet Protocol and API. 1-6 - Changho Seo, Yunchang Chae, Jaeryun Lee, Euiseong Seo, Byungchul Tak:
NoSQL Database Performance Diagnosis through System Call-level Introspection. 1-9 - Caspar von Lengerke
, Alexander Hefele, Juan A. Cabrera, Frank H. P. Fitzek:
Stopping the Data Flood: Post-Shannon Traffic Reduction in Digital-Twins Applications. 1-5 - Eun-Ji Kim, Eun-Kyu Lee:
Performance Impact of Differential Privacy on Federated Learning in Vehicular Networks. 1-5 - Miquel Farreras
, Paola Soto, Miguel Camelo, Lluís Fàbrega
, Pere Vilà:
Predicting network performance using GNNs: generalization to larger unseen networks. 1-6 - Nardine Basta, Muhammad Ikram
, Mohamed Ali Kâafar
, Andy Walker:
Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework. 1-7 - Christian Lübben, Marc-Oliver Pahl:
Autonomous convergence mechanisms for collaborative crowd-sourced data-modeling. 1-5 - Géza Kulcsár, Johannes Kristan, Sven Erik Jeroschewski:
Correctness, Completeness, Consistency: Challenges of Migrating Arrowhead System-of-Systems Models. 1-6 - Johannes Kristan, Sven Erik Jeroschewski, Lukas Römer:
Open Source Software Integration in an Industry 4.0 Framework: Experience and Lessons Learned. 1-4 - Kunling He, Changqing An, Jessie Hui Wang, Tianshu Li, Linmei Zu, Fenghua Li:
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme. 1-9 - Kaspar Hageman
, Egon Kidmose, René Rydhof Hansen
, Jens Myrup Pedersen
:
Understanding the Challenges of Blocking Unnamed Network Traffic. 1-5 - Kayuã Oleques Paim, Vagner E. Quincozes, Diego Kreutz, Rodrigo B. Mansilha, Weverton Cordeiro:
Fix Me If You Can: Using Neural Networks to Regenerate Networked Systems' Monitoring Traces. 1-9 - El-Heithem Mohammedi, Emmanuel Lavinal, Guillaume Fleury:
Detecting and locating configuration errors in IP VPNs with Graph Neural Networks. 1-6 - Martin Happ, Jia Lei Du, Matthias Herlich, Christian Maier, Peter Dorfinger, José Suárez-Varela
:
Exploring the Limitations of Current Graph Neural Networks for Network Modeling. 1-8 - Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. 1-7 - Dániel Ficzere, Dhruvin Patel, Joachim Sachs, Junaid Ansari, Gábor Soós, Pál Varga:
5G public network integration for a real-life PROFINET application. 1-5 - Cristiano M. Silva, Fernanda S. H. Sumika, Daniel Ludovico Guidoni, Leonardo Alvarenga L. Santos, João Fernando Machry Sarubbi, Somayeh Mokhtari
, Matheus F. Rodrigues Santos, José Marcos Silva Nogueira:
Solving Combinatorial Problems via the Random Exploration of the Search Space: An Experimental Approach for Fast Decision Making. 1-4 - Andrzej Jasinski, Yuansong Qiao, Enda Fallon, Ronan Flynn:
Natural Language Processing Applied to Dynamic Workflow Generation for Network Management. 1-6 - Morteza Moghaddassian, Alberto Leon-Garcia:
Bringing ICN To Software-Defined Infrastructures. 1-5 - Balázs Vass
, János Tapolcai:
Essence of Geographically Correlated Failure Events in Communication Networks. 1-6 - Juuso Haavisto, Thibault Cholez, Jukka Riekki:
Unleashing GPUs for Network Function Virtualization: an open architecture based on Vulkan and Kubernetes. 1-8 - Kyle A. Simpson
, Dimitrios P. Pezaros:
Revisiting the Classics: Online RL in the Programmable Dataplane. 1-10 - Ali El-Amine, Olivier Brun:
A Game-Theoretic Algorithm for the Joint Routing and VNF Placement Problem. 1-9 - Márton Kajó, Janik Schnellbach, Stephen S. Mwanje, Georg Carle:
Clustering Mobile Network Data with Decorrelating Adversarial Nets. 1-9 - Vojdan Kjorveziroski
, Pavle V. Vuletic
, Lukasz Lopatowski, Frédéric Loui:
On-Demand Network Management with NMaaS: Network Management as a Service. 1-3 - Takanori Hara
, Masahiro Sasabe:
Lagrangian Heuristics for Capacitated Shortest Path Tour Problem Based Online Service Chaining. 1-9 - Hsin-Fu Chang, Michael I.-C. Wang, Chi-Hsiang Hung, Charles H.-P. Wen:
Enabling Malware Detection with Machine Learning on Programmable Switch. 1-5