default search action
NOMS 2023: Miami, FL, USA
- NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023. IEEE 2023, ISBN 978-1-6654-7716-1
- Haorui Guo, Weichao Li, Jiashuo Lin, Jianer Zhou, Qinglin Xun, Shuangping Zhan, Yong Huang, Yi Wang, Qingsha Cheng:
A Scalable Asynchronous Traffic Shaping Mechanism for TSN with Time Slot and Polling. 1-5 - Raffaele Galliera, Alessandro Morelli, Roberto Fronteddu, Niranjan Suri:
MARLIN: Soft Actor-Critic based Reinforcement Learning for Congestion Control in Real Networks. 1-10 - Stanislav Spacek, Petr Velan, Martin Holkovic, Tomás Plesník:
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. 1-6 - Ákos Leiter, Attila Hegyi, István Kispál, Pál Böõsy, Nándor Galambosi, Gábor Zsolt Tar:
GitOps and Kubernetes Operator-based Network Function Configuration. 1-5 - Amin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson:
On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoT. 1-4 - Omar Houidi, Sihem Bakri, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
AMAC: Attention-based Multi-Agent Cooperation for Smart Load Balancing. 1-7 - Lajos Bence Makai, Pál Varga:
Predicting Mobility Management Demands of Cellular Networks based on User Behavior. 1-6 - Mahdi Hemmati, Yuren You, Abbas Javadtalab, Christopher Janz:
Optimized Power Commissioning in WDM Networks Using Optical Network Digital Twin. 1-4 - Jhonatan Tavori, Hanoch Levy:
Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. 1-5 - Ahsan Saleem, Mahsa Raeiszadeh, Amin Ebrahimzadeh, Roch H. Glitho, Johan Eker, Raquel A. F. Mini:
A Deep Learning Approach for Root Cause Analysis in Real-Time IIoT Edge Networks. 1-5 - José Santos, Tim Wauters, Filip De Turck:
Efficient Management in Fog Computing. 1-6 - Francesco Valente, Francesco Giacinto Lavacca, Vincenzo Eramo:
A Resource Allocation Strategy in Earth Observation Orbital Edge Computing-enabled Satellite Networks to minimize Ground Station Energy Consumption. 1-6 - Simon Bauer, Janluka Janelidze, Benedikt Jaeger, Patrick Sattler, Patryk Brzoza, Georg Carle:
On the Accuracy of Active Capacity Estimation in the Internet. 1-7 - Yue Jin, Makram Bouzid, Armen Aghasaryan, Ricardo Rocha:
Community Selection for Multivariate KPI Predictions in a 2-Tier System. 1-5 - Alexander Frank, Wolfgang Hommel, Benedikt Hopfner:
An Intermediary Protocol Representation to Aid in Avionics Network Development. 1-5 - Katharina Dietz, Nicholas Gray, Manuel Wolz, Claas Lorenz, Tobias Hoßfeld, Michael Seufert:
Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful Firewalls. 1-7 - Sheikh Salman Hassan, Umer Majeed, Zhu Han, Choong Seon Hong:
SFL-LEO: Secure Federated Learning Computation Based on LEO Satellites for 6G Non-Terrestrial Networks. 1-5 - Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh:
Generalizable Resource Scaling of 5G Slices using Constrained Reinforcement Learning. 1-9 - Will Fantom, Eleanor Davies, Charalampos Rotsos, Paul Veitch, Stephen A. Cassidy, Nicholas J. P. Race:
NES: Towards Lifecycle Automation for Emulation-Based Experimentation. 1-9 - Csaba Hegedüs, Attila Frankó, Pál Varga, Stefan Gindl, Markus Tauber:
Enabling Scalable Smart Vertical Farming with IoT and Machine Learning Technologies. 1-4 - Nikolaos Baltagiannis, Ioanna Angeliki Kapetanidou, Vassilis Tsaoussidis:
EFPCaching: Energy-aware and Fault-tolerant Probabilistic Caching of popular IoT content in ICN. 1-4 - Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
On the Fence: Anomaly Detection in IoT Networks. 1-4 - Md. Shamim Towhid, Nashid Shahriar:
Early Detection of Intrusion in SDN. 1-6 - Yu Qiao, Md. Shirajum Munir, Apurba Adhikary, Avi Deb Raha, Choong Seon Hong:
CDFed: Contribution-based Dynamic Federated Learning for Managing System and Statistical Heterogeneity. 1-5 - Tanmoy Bag, Sharva Garg, Sriram Parameswaran, Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:
Communication-Efficient and Scalable Management of Self-Organizing Mobile Networks. 1-5 - Divya Pathak, Ranjitha K., Krishna Sai Modali, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi:
Accelerating PUF-based Authentication Protocols Using Programmable Switch. 1-10 - Ariel L. C. Portela, Rafael A. Menezes, Wanderson L. Costa, Matheus Monteiro Silveira, Luiz Fernando Bittencourt, Rafael Lopes Gomes:
Detection of IoT Devices and Network Anomalies based on Anonymized Network Traffic. 1-6 - Marten Gartner, Thorben Krüger, David Hausheer:
BitTorrent over SCION: Leveraging Unused Network Capacities in the Internet. 1-5 - Felipe Sampaio Dantas da Silva, Túlio Pascoal, Emidio P. Neto, Rodrigo S. S. Nunes, Cristian H. Martins de Souza, Augusto Neto:
An Adaptive Moving Target Defense Approach for Software-Defined Networking Protection. 1-6 - Gérard Kponhinto, Ousmane Thiare, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Sondès Khemiri-Kallel, Junseok Hwang:
Bio-inspired Solution for Cluster-Tree Based Data Collection Protocol in Wireless Sensors Networks. 1-6 - Matheus Monteiro Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes:
Data Protection based on Searchable Encryption and Anonymization Techniques. 1-5 - Farid Zandi, Sepehr Abbasi Zadeh, Soheil Abbasloo, Parsa Pazhooheshy, Yashar Ganjali, Zhenhua Hu:
Live Stateful Migration of a Virtual Sub-Network. 1-9 - Fabian Lindner, Gerald Reiner:
Industry 5.0 and Operations Management - the Importance of Human Factors. 1-4 - Karim Baccar, Abdelkader Lahmadi:
An Experimental Testbed for 5G Network Security Assessment. 1-6 - Hongfan Mu, Noura Aljeri, Azzedine Boukerche:
Traffic Flow based Feature Engineering for Urban Management System. 1-6 - Kshitij Kokkera, Aileen Chen, Chythra Malapati, Alex Demchenko, Carol J. Fung:
A Study on the Conspiracy Theory Propagation Network on Twitter. 1-9 - Shie-Yuan Wang, Jin-Ting Li:
Using a P4 Hardware Switch to Block Trackers and Ads for All Devices on an Edge Network. 1-5 - Nobukazu Fukuda, Mayu Yamazoe, Hiroaki Matsubayashi, Kazuaki Akashi, Shunsuke Kanai:
Optimizing Resource Placement for Long-term Disaster Response. 1-5 - Kim Hammar, Rolf Stadler:
Digital Twins for Security Automation. 1-6 - Jonas Andre, Johannes Naab, Benedikt Jaeger, Georg Carle, Leander Seidlitz, Stephan M. Günther:
A Multi-Tenancy System Architecture for Online Examinations. 1-6 - Frank Loh, Kathrin Hildebrand, Florian Wamser, Stefan Geißler, Tobias Hoßfeld:
Machine Learning Based Study of QoE Metrics in Twitch.tv Live Streaming. 1-7 - Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, Aladdin Saleh:
Generalizable GNN-based 5G RAN/MEC Slicing and Admission Control in Metropolitan Networks. 1-9 - Hugo Sullivan, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization. 1-6 - Jan von der Assen, Alberto Huertas Celdrán, Adrian Zermin, Raffael Mogicato, Gérôme Bovet, Burkhard Stiller:
SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis. 1-3 - Alexander Clemm, Toerless Eckert:
Combining Autonomic and Intent-Based Networking. 1-6 - Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero:
Towards an Edge Cloud Based Coordination Platform for Multi-User AR Applications Built on Open-Source SLAMs. 1-6 - Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Sajid Alam, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
An Intent-Based Networking mechanism: A study case for efficient path selection using Graph Neural Networks. 1-6 - Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:
Instant Messaging Application Encrypted Traffic Generation System. 1-3 - José Santos, Tim Wauters, Bruno Volckaert, Filip De Turck:
gym-hpa: Efficient Auto-Scaling via Reinforcement Learning for Complex Microservice-based Applications in Kubernetes. 1-9 - Aman Kumar, Muhammad Anwar Shahid, Arunita Jaekel, Ning Zhang, Marc Kneppers:
Machine learning based detection of replay attacks in VANET. 1-6 - Guanxiong Liu, Nicholas Furth, Hang Shi, Abdallah Khreishah, Jo Young Lee, Nirwan Ansari, Chengjun Liu, Yaser Jararweh:
Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic Management. 1-8 - Yoichi Matsuo, Jatinder Singh, Shantanu Verma, Guillaume Fraysse:
Integrating state prediction into the Deep Reinforcement Learning for the Autoscaling of Core Network Functions. 1-5 - Subhash Talluri, Qiong Zhang, Rongyi Chen:
A Cloud-Native Federated Learning Architecture for Telecom Fraud Detection. 1-3 - Luis Jesús Martín León, Juan Luis Herrera, Javier Berrocal, Jaime Galán-Jiménez:
Logistic Regression-based Solution to Predict the Transport Assistant Placement in SDN networks. 1-5 - Do Duc Anh Nguyen, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen:
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies. 1-7 - Xinran Zheng, Shuo Yang, Xingjun Wang:
A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoT. 1-6 - Rodrigo Rosmaninho, Duarte M. G. Raposo, Pedro Rito, Susana Sargento:
Time Constraints on Vehicular Edge Computing: A Performance Analysis. 1-7 - Muriel Figueredo Franco, Lisandro Zambenedetti Granville, Burkhard Stiller:
CyberTEA: a Technical and Economic Approach for Cybersecurity Planning and Investment. 1-6 - Rogelio Hernández, Gabriel Mujica, Jorge Portilla, Francisco Parrilla:
Internet of Things Technology for Train Positioning and Integrity in the Railway Industry Domain. 1-6 - Phuong Bac Ta, Ha-Duong Phung, Younghan Kim:
A-RCL: An Adaptive Incident Prediction and Automated Root Cause Localization System for Cloud Environment. 1-5 - Maxime Bouton, Jaeseong Jeong, José Outes, Adriano Mendo, Alexandros Nikou:
Multi-agent Reinforcement Learning with Graph Q-Networks for Antenna Tuning. 1-7 - Jingchun Li, Fanqin Zhou, Wenjing Li, Mingyu Zhao, Xueqiang Yan, Yan Xi, Jianjun Wu:
Componentized Task Scheduling in Cloud-Edge Cooperative Scenarios Based on GNN-enhanced DRL. 1-4 - Jatinder Singh, Shantanu Verma, Yoichi Matsuo, Francesca Fossati, Guillaume Fraysse:
Autoscaling Packet Core Network Functions with Deep Reinforcement Learning. 1-6 - Pal Patrik Varga, Pál Varga, Dániel Ficzere:
Analyzing self-similarities in network traffic, water levels, and currency exchange rates. 1-6 - Yuxuan Zhong, Siya Xu, Zihan Li, Peng Yu, Ying Wang, Fanqin Zhou:
DRL and Main-Side Blockchain Empowered Edge Computing Framework for Assistant Driving. 1-7 - Vera Clemens, Lars-Christian Schulz, Marten Gartner, David Hausheer:
DDoS Detection in P4 Using HYPERLOGLOG and COUNTMIN Sketches. 1-6 - Marios Avgeris, Aris Leivadeas, Nikolaos Athanasopoulos, Ioannis Lambadaris, Matthias Falkner:
Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function Chains. 1-7 - Alicia Esquivel Morel, Ekincan Ufuktepe, Cameron Grant, Samuel Elfrink, Chengyi Qu, Prasad Calyam, Kannappan Palaniappan:
Trust Quantification in a Collaborative Drone System with Intelligence-driven Edge Routing. 1-7 - Shuwen Liu, Yu Liu, Craig A. Shue:
Inspecting Traffic in Residential Networks with Opportunistically Outsourced Middleboxes. 1-7 - Mario Minardi, Youssouf Drif, Thang X. Vu, Ilora Maity, Christos Politis, Symeon Chatzinotas:
SDN-based Testbed for Emerging Use Cases in Beyond 5G NTN-Terrestrial Networks. 1-6 - Jaeryun Lee, Byungchul Tak, Euiseong Seo:
A Close Look at Shared Resource Consumption in NoSQL Databases for Accurate Accounting. 1-7 - Kaiyi Zhang, Nancy Samaan, Ahmed Karmouch:
An Intelligent Data-Plane with a Quantized ML Model for Traffic Management. 1-9 - Ireneusz Szczesniak, Bozena Wozna-Szczesniak:
Generic Dijkstra: correctness and tractability. 1-7 - Salman Javed, Saleha Javed, Jan van Deventer, Hamam Mokayed, Jerker Delsing:
A Smart Manufacturing Ecosystem for Industry 5.0 using Cloud-based Collaborative Learning at the Edge. 1-6 - Soroush Aalibagi, Mahdi Dolati, Sogand SadrHaghighi, Majid Ghaderi:
Low-Overhead Packet Loss Diagnosis for Virtual Private Clouds using P4-Programmable NICs. 1-9 - Yunfeng Zhao, Wenchi Zhang, Zhiliang Wang, Shize Zhang, Kaixin Sui, Enhuan Dong, Jiahai Yang:
Multi-stage Location for Root-Cause Metrics in Online Service Systems. 1-9 - Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing. 1-9 - Jaime Fúster De La Fuente, Álvaro Pendás Recondo, Leon Wong, Paul Harvey:
Enabling Auditable Trust in Autonomous Networks with Ethereum and IPFS. 1-6 - Philippe Owezarski:
Investigating adversarial attacks against Random Forest-based network attack detection systems. 1-6 - Jonatas Adilson Marques, Kirill Levchenko, Luciano Paschoal Gaspary:
Responding to Network Failures at Data-plane Speeds with Network Programmability. 1-10 - Siyuan Wu, Wenjun Fan:
An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection. 1-5 - Huu Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin, Edgardo Montes de Oca:
A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry. 1-6 - Fidan Mehmeti, Valentin Thomas Haider, Wolfgang Kellerer:
Admission Control for URLLC Traffic with Computation Requirements in 5G and Beyond. 1-9 - José Camacho, Katarzyna Wasielewska, Pablo Espinosa, Marta Fuentes-García:
Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR'16. 1-5 - Peng Hu:
SatAIOps: Revamping the Full Life-Cycle Satellite Network Operations. 1-5 - Gabriel Vassoler, Jonatas Adilson Marques, Luciano Paschoal Gaspary:
VERMONT: Towards an In-band Telemetry-Based Approach for Live Network Property Verification. 1-7 - Saad Abouzahir, Essaid Sabir, Halima Elbiaze, Mohamed Sadik:
Federated Power Control for Predictive QoS in 5G and Beyond: A Proof of Concept for URLLC. 1-7 - Sajal Saha, Anwar Haque:
Wavelet-Based Hybrid Machine Learning Model for Out-of-distribution Internet Traffic Prediction. 1-8 - Fathima James, Indrajit Ray, Deep Medhi:
Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT. 1-6 - Satya Kumar Vankayala, Sai Krishna Santosh Gollapudi, Bharat Jain, Seungil Yoon, K. Mihir, Swaraj Kumar, H. U. Sudheer Kumar, Issaac Kommineni:
Efficient Deep-Learning Models for Future Blockage and Beam Prediction for mmWave Systems. 1-8 - Yonatan Katz, Danny Raz:
Cold Start for Cloud Anomaly Detection. 1-8 - Qiao Lu, Changcheng Huang:
Estimating the Performance of VNE Algorithms with a Novel Loss Network Model. 1-5 - Mehrdad Hajizadeh, Sudip Barua, Pegah Golchin:
FSA-IDS: A Flow-based Self-Active Intrusion Detection System. 1-9 - Niloy Saha, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:
MonArch: Network Slice Monitoring Architecture for Cloud Native 5G Deployments. 1-7 - Michael Miller, Anvitha Ramachandran, Alicia Esquivel Morel, Durbek Gafurov, Prasad Calyam:
Transmitting Information with Global-designation of Emergency Routes for Edge Video Processing. 1-7 - Alexander Keller, Jonathan Whitson:
Achieving Observability at Scale through Federated Learning. 1-6 - Farzad Tashtarian, Abdelhak Bentaleb, Hadi Amirpour, Babak Taraghi, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann:
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming. 1-9 - László Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A. Antony Franklin:
5G on the roads: optimizing the latency of federated analysis in vehicular edge networks. 1-5 - Oscar G. Bautista, Kemal Akkaya:
MPC-as-a-Service: A Customizable Management Protocol for Running Multi-party Computation on IoT Devices. 1-6 - Cyprien Gueyraud, Nik Sultana:
Towards In-Network Semantic Analysis: A Case Study involving Spam Classification. 1-6 - Pyae Sone Aung, Loc X. Nguyen, Yan Kyaw Tun, Zhu Han, Choong Seon Hong:
Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication. 1-6 - José Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens:
Optimizing Network Slicing in Distributed Large Scale Infrastructures: From Heuristics to Controlled Deep Reinforcement Learning. 1-6 - Apurba Adhikary, Md. Shirajum Munir, Avi Deb Raha, Yu Qiao, Choong Seon Hong:
Artificial Intelligence Framework for Target Oriented Integrated Sensing and Communication in Holographic MIMO. 1-7 - Paul Seehofer, Roland Bless, Martina Zitterbart:
KeLLy - Efficient, Scalable Link Layer Topology Discovery. 1-5 - Enzo d'Andréa, Jérôme François, Olivier Festor, Mehdi Zakroum:
Multi-label Classification of Hosts Observed through a Darknet. 1-6 - Ashima Chawla, Anne-Marie Bosneag, Anestis Dalgkitsis:
Graph-based Interpretable Anomaly Detection Framework for Network Slice Management in Beyond 5G Networks. 1-6 - Cyril Shih-Huan Hsu, Jorge Martín-Pérez, Chrysa Papagianni, Paola Grosso:
V2N Service Scaling with Deep Reinforcement Learning. 1-5 - Pierre-Marie Junges, Jérôme François, Olivier Festor:
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. 1-9 - Christian Lübben, Marc-Oliver Pahl:
Distributed Device-Specific Anomaly Detection using Deep Feed-Forward Neural Networks. 1-9 - Péter Revisnyei, Ferenc Mogyorósi, Zsófia Papp, István Töros, Alija Pasic:
Performance of a TDOA indoor positioning solution in real-world 5G network. 1-6 - Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Schaeffer-Filho:
Serene: Handling the Effects of Stragglers in In-Network Machine Learning Aggregation. 1-10 - Prasad Netalkar, Jiachen Chen, Dipankar Raychaudhuri:
mmCPTP: A Cross-Layer Pull based Transport Protocol for 5G mmWave Networks. 1-9 - Forough Shahab Samani, Kim Hammar, Rolf Stadler:
Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh. 1-3 - Panagiotis I. Nikolaidis, Asim Zoulkarni, John S. Baras:
Bandwidth Provisioning for Network Slices with Per User QoS Guarantees. 1-9