


default search action
NOMS 2023: Miami, FL, USA
- NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023. IEEE 2023, ISBN 978-1-6654-7716-1

- Haorui Guo, Weichao Li, Jiashuo Lin, Jianer Zhou, Qinglin Xun, Shuangping Zhan, Yong Huang, Yi Wang, Qingsha Cheng:

A Scalable Asynchronous Traffic Shaping Mechanism for TSN with Time Slot and Polling. 1-5 - Raffaele Galliera, Alessandro Morelli, Roberto Fronteddu, Niranjan Suri:

MARLIN: Soft Actor-Critic based Reinforcement Learning for Congestion Control in Real Networks. 1-10 - Stanislav Spacek, Petr Velan, Martin Holkovic, Tomás Plesník:

Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. 1-6 - Ákos Leiter, Attila Hegyi, István Kispál, Pál Böõsy, Nándor Galambosi, Gábor Zsolt Tar:

GitOps and Kubernetes Operator-based Network Function Configuration. 1-5 - Amin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson:

On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoT. 1-4 - Omar Houidi

, Sihem Bakri, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
AMAC: Attention-based Multi-Agent Cooperation for Smart Load Balancing. 1-7 - Lajos Bence Makai, Pál Varga:

Predicting Mobility Management Demands of Cellular Networks based on User Behavior. 1-6 - Mahdi Hemmati, Yuren You, Abbas Javadtalab, Christopher Janz:

Optimized Power Commissioning in WDM Networks Using Optical Network Digital Twin. 1-4 - Jhonatan Tavori

, Hanoch Levy:
Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. 1-5 - Ahsan Saleem, Mahsa Raeiszadeh, Amin Ebrahimzadeh, Roch H. Glitho, Johan Eker, Raquel A. F. Mini:

A Deep Learning Approach for Root Cause Analysis in Real-Time IIoT Edge Networks. 1-5 - José Santos, Tim Wauters, Filip De Turck:

Efficient Management in Fog Computing. 1-6 - Francesco Valente, Francesco Giacinto Lavacca, Vincenzo Eramo:

A Resource Allocation Strategy in Earth Observation Orbital Edge Computing-enabled Satellite Networks to minimize Ground Station Energy Consumption. 1-6 - Simon Bauer, Janluka Janelidze, Benedikt Jaeger, Patrick Sattler, Patryk Brzoza, Georg Carle:

On the Accuracy of Active Capacity Estimation in the Internet. 1-7 - Yue Jin, Makram Bouzid, Armen Aghasaryan, Ricardo Rocha:

Community Selection for Multivariate KPI Predictions in a 2-Tier System. 1-5 - Alexander Frank, Wolfgang Hommel, Benedikt Hopfner:

An Intermediary Protocol Representation to Aid in Avionics Network Development. 1-5 - Katharina Dietz, Nicholas Gray, Manuel Wolz, Claas Lorenz, Tobias Hoßfeld, Michael Seufert

:
Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful Firewalls. 1-7 - Sheikh Salman Hassan

, Umer Majeed
, Zhu Han, Choong Seon Hong:
SFL-LEO: Secure Federated Learning Computation Based on LEO Satellites for 6G Non-Terrestrial Networks. 1-5 - Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh:

Generalizable Resource Scaling of 5G Slices using Constrained Reinforcement Learning. 1-9 - Will Fantom, Eleanor Davies, Charalampos Rotsos, Paul Veitch, Stephen A. Cassidy, Nicholas J. P. Race:

NES: Towards Lifecycle Automation for Emulation-Based Experimentation. 1-9 - Csaba Hegedüs, Attila Frankó, Pál Varga, Stefan Gindl, Markus Tauber

:
Enabling Scalable Smart Vertical Farming with IoT and Machine Learning Technologies. 1-4 - Nikolaos Baltagiannis, Ioanna Angeliki Kapetanidou

, Vassilis Tsaoussidis
:
EFPCaching: Energy-aware and Fault-tolerant Probabilistic Caching of popular IoT content in ICN. 1-4 - Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:

On the Fence: Anomaly Detection in IoT Networks. 1-4 - Md. Shamim Towhid, Nashid Shahriar:

Early Detection of Intrusion in SDN. 1-6 - Yu Qiao

, Md. Shirajum Munir, Apurba Adhikary, Avi Deb Raha
, Choong Seon Hong:
CDFed: Contribution-based Dynamic Federated Learning for Managing System and Statistical Heterogeneity. 1-5 - Tanmoy Bag, Sharva Garg, Sriram Parameswaran, Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:

Communication-Efficient and Scalable Management of Self-Organizing Mobile Networks. 1-5 - Divya Pathak

, Ranjitha K., Krishna Sai Modali, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi:
Accelerating PUF-based Authentication Protocols Using Programmable Switch. 1-10 - Ariel L. C. Portela, Rafael A. Menezes, Wanderson L. Costa, Matheus Monteiro Silveira, Luiz Fernando Bittencourt, Rafael Lopes Gomes

:
Detection of IoT Devices and Network Anomalies based on Anonymized Network Traffic. 1-6 - Marten Gartner, Thorben Krüger, David Hausheer:

BitTorrent over SCION: Leveraging Unused Network Capacities in the Internet. 1-5 - Felipe Sampaio Dantas da Silva, Túlio Pascoal, Emidio P. Neto, Rodrigo S. S. Nunes, Cristian H. Martins de Souza, Augusto Neto:

An Adaptive Moving Target Defense Approach for Software-Defined Networking Protection. 1-6 - Gérard Kponhinto

, Ousmane Thiare
, Ado Adamou Abba Ari
, Abdelhak Mourad Guéroui, Sondès Khemiri-Kallel, Junseok Hwang:
Bio-inspired Solution for Cluster-Tree Based Data Collection Protocol in Wireless Sensors Networks. 1-6 - Matheus Monteiro Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes

:
Data Protection based on Searchable Encryption and Anonymization Techniques. 1-5 - Farid Zandi, Sepehr Abbasi Zadeh, Soheil Abbasloo

, Parsa Pazhooheshy, Yashar Ganjali, Zhenhua Hu:
Live Stateful Migration of a Virtual Sub-Network. 1-9 - Fabian Lindner

, Gerald Reiner
:
Industry 5.0 and Operations Management - the Importance of Human Factors. 1-4 - Karim Baccar, Abdelkader Lahmadi:

An Experimental Testbed for 5G Network Security Assessment. 1-6 - Hongfan Mu, Noura Aljeri, Azzedine Boukerche:

Traffic Flow based Feature Engineering for Urban Management System. 1-6 - Kshitij Kokkera

, Aileen Chen, Chythra Malapati, Alex Demchenko, Carol J. Fung:
A Study on the Conspiracy Theory Propagation Network on Twitter. 1-9 - Shie-Yuan Wang, Jin-Ting Li:

Using a P4 Hardware Switch to Block Trackers and Ads for All Devices on an Edge Network. 1-5 - Nobukazu Fukuda, Mayu Yamazoe, Hiroaki Matsubayashi, Kazuaki Akashi, Shunsuke Kanai:

Optimizing Resource Placement for Long-term Disaster Response. 1-5 - Kim Hammar, Rolf Stadler:

Digital Twins for Security Automation. 1-6 - Jonas Andre, Johannes Naab, Benedikt Jaeger, Georg Carle, Leander Seidlitz, Stephan M. Günther:

A Multi-Tenancy System Architecture for Online Examinations. 1-6 - Frank Loh, Kathrin Hildebrand, Florian Wamser, Stefan Geißler, Tobias Hoßfeld:

Machine Learning Based Study of QoE Metrics in Twitch.tv Live Streaming. 1-7 - Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, Aladdin Saleh:

Generalizable GNN-based 5G RAN/MEC Slicing and Admission Control in Metropolitan Networks. 1-9 - Hugo Sullivan, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:

Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization. 1-6 - Jan von der Assen, Alberto Huertas Celdrán

, Adrian Zermin, Raffael Mogicato, Gérôme Bovet, Burkhard Stiller:
SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis. 1-3 - Alexander Clemm, Toerless Eckert:

Combining Autonomic and Intent-Based Networking. 1-6 - Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero:

Towards an Edge Cloud Based Coordination Platform for Multi-User AR Applications Built on Open-Source SLAMs. 1-6 - Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Sajid Alam, Talha Ahmed Khan, Muhammad Afaq

, Wang-Cheol Song:
An Intent-Based Networking mechanism: A study case for efficient path selection using Graph Neural Networks. 1-6 - Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:

Instant Messaging Application Encrypted Traffic Generation System. 1-3 - José Santos

, Tim Wauters, Bruno Volckaert, Filip De Turck:
gym-hpa: Efficient Auto-Scaling via Reinforcement Learning for Complex Microservice-based Applications in Kubernetes. 1-9 - Aman Kumar, Muhammad Anwar Shahid

, Arunita Jaekel, Ning Zhang, Marc Kneppers:
Machine learning based detection of replay attacks in VANET. 1-6 - Guanxiong Liu, Nicholas Furth

, Hang Shi, Abdallah Khreishah, Joyoung Lee
, Nirwan Ansari
, Chengjun Liu, Yaser Jararweh:
Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic Management. 1-8 - Yoichi Matsuo

, Jatinder Singh
, Shantanu Verma
, Guillaume Fraysse
:
Integrating state prediction into the Deep Reinforcement Learning for the Autoscaling of Core Network Functions. 1-5 - Subhash Talluri, Qiong Zhang, Rongyi Chen:

A Cloud-Native Federated Learning Architecture for Telecom Fraud Detection. 1-3 - Luis Jesús Martín León, Juan Luis Herrera

, Javier Berrocal, Jaime Galán-Jiménez:
Logistic Regression-based Solution to Predict the Transport Assistant Placement in SDN networks. 1-5 - Do Duc Anh Nguyen

, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen:
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies. 1-7 - Xinran Zheng, Shuo Yang, Xingjun Wang:

A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoT. 1-6 - Rodrigo Rosmaninho

, Duarte M. G. Raposo
, Pedro Rito, Susana Sargento
:
Time Constraints on Vehicular Edge Computing: A Performance Analysis. 1-7 - Muriel Figueredo Franco

, Lisandro Zambenedetti Granville
, Burkhard Stiller:
CyberTEA: a Technical and Economic Approach for Cybersecurity Planning and Investment. 1-6 - Rogelio Hernández

, Gabriel Mujica, Jorge Portilla, Francisco Parrilla:
Internet of Things Technology for Train Positioning and Integrity in the Railway Industry Domain. 1-6 - Phuong Bac Ta

, Ha-Duong Phung, Younghan Kim:
A-RCL: An Adaptive Incident Prediction and Automated Root Cause Localization System for Cloud Environment. 1-5 - Maxime Bouton, Jaeseong Jeong, José Outes, Adriano Mendo

, Alexandros Nikou:
Multi-agent Reinforcement Learning with Graph Q-Networks for Antenna Tuning. 1-7 - Jingchun Li, Fanqin Zhou, Wenjing Li, Mingyu Zhao, Xueqiang Yan, Yan Xi, Jianjun Wu:

Componentized Task Scheduling in Cloud-Edge Cooperative Scenarios Based on GNN-enhanced DRL. 1-4 - Jatinder Singh

, Shantanu Verma
, Yoichi Matsuo
, Francesca Fossati, Guillaume Fraysse
:
Autoscaling Packet Core Network Functions with Deep Reinforcement Learning. 1-6 - Pal Patrik Varga

, Pál Varga, Dániel Ficzere:
Analyzing self-similarities in network traffic, water levels, and currency exchange rates. 1-6 - Yuxuan Zhong, Siya Xu, Zihan Li, Peng Yu, Ying Wang, Fanqin Zhou:

DRL and Main-Side Blockchain Empowered Edge Computing Framework for Assistant Driving. 1-7 - Vera Clemens

, Lars-Christian Schulz
, Marten Gartner, David Hausheer:
DDoS Detection in P4 Using HYPERLOGLOG and COUNTMIN Sketches. 1-6 - Marios Avgeris

, Aris Leivadeas, Nikolaos Athanasopoulos, Ioannis Lambadaris, Matthias Falkner:
Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function Chains. 1-7 - Alicia Esquivel Morel, Ekincan Ufuktepe

, Cameron Grant, Samuel Elfrink, Chengyi Qu
, Prasad Calyam, Kannappan Palaniappan:
Trust Quantification in a Collaborative Drone System with Intelligence-driven Edge Routing. 1-7 - Shuwen Liu

, Yu Liu, Craig A. Shue:
Inspecting Traffic in Residential Networks with Opportunistically Outsourced Middleboxes. 1-7 - Mario Minardi, Youssouf Drif

, Thang X. Vu
, Ilora Maity
, Christos Politis, Symeon Chatzinotas
:
SDN-based Testbed for Emerging Use Cases in Beyond 5G NTN-Terrestrial Networks. 1-6 - Jaeryun Lee, Byungchul Tak, Euiseong Seo:

A Close Look at Shared Resource Consumption in NoSQL Databases for Accurate Accounting. 1-7 - Kaiyi Zhang, Nancy Samaan, Ahmed Karmouch:

An Intelligent Data-Plane with a Quantized ML Model for Traffic Management. 1-9 - Ireneusz Szczesniak, Bozena Wozna-Szczesniak

:
Generic Dijkstra: correctness and tractability. 1-7 - Salman Javed, Saleha Javed, Jan van Deventer, Hamam Mokayed, Jerker Delsing:

A Smart Manufacturing Ecosystem for Industry 5.0 using Cloud-based Collaborative Learning at the Edge. 1-6 - Soroush Aalibagi, Mahdi Dolati, Sogand SadrHaghighi, Majid Ghaderi:

Low-Overhead Packet Loss Diagnosis for Virtual Private Clouds using P4-Programmable NICs. 1-9 - Yunfeng Zhao, Wenchi Zhang, Zhiliang Wang, Shize Zhang, Kaixin Sui, Enhuan Dong, Jiahai Yang:

Multi-stage Location for Root-Cause Metrics in Online Service Systems. 1-9 - Rahul Sharma

, Chien Aun Chan
, Christopher Leckie:
Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing. 1-9 - Jaime Fúster De La Fuente

, Álvaro Pendás Recondo
, Leon Wong
, Paul Harvey
:
Enabling Auditable Trust in Autonomous Networks with Ethereum and IPFS. 1-6 - Philippe Owezarski:

Investigating adversarial attacks against Random Forest-based network attack detection systems. 1-6 - Jonatas Adilson Marques, Kirill Levchenko, Luciano Paschoal Gaspary:

Responding to Network Failures at Data-plane Speeds with Network Programmability. 1-10 - Siyuan Wu

, Wenjun Fan:
An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection. 1-5 - Huu Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin

, Edgardo Montes de Oca:
A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry. 1-6 - Fidan Mehmeti, Valentin Thomas Haider

, Wolfgang Kellerer
:
Admission Control for URLLC Traffic with Computation Requirements in 5G and Beyond. 1-9 - José Camacho, Katarzyna Wasielewska, Pablo Espinosa

, Marta Fuentes-García
:
Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR'16. 1-5 - Peng Hu:

SatAIOps: Revamping the Full Life-Cycle Satellite Network Operations. 1-5 - Gabriel Vassoler, Jonatas Adilson Marques, Luciano Paschoal Gaspary:

VERMONT: Towards an In-band Telemetry-Based Approach for Live Network Property Verification. 1-7 - Saad Abouzahir, Essaid Sabir, Halima Elbiaze, Mohamed Sadik:

Federated Power Control for Predictive QoS in 5G and Beyond: A Proof of Concept for URLLC. 1-7 - Sajal Saha, Anwar Haque

:
Wavelet-Based Hybrid Machine Learning Model for Out-of-distribution Internet Traffic Prediction. 1-8 - Fathima James, Indrajit Ray, Deep Medhi:

Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT. 1-6 - Satya Kumar Vankayala, Sai Krishna Santosh Gollapudi, Bharat Jain, Seungil Yoon, K. Mihir, Swaraj Kumar, H. U. Sudheer Kumar, Issaac Kommineni:

Efficient Deep-Learning Models for Future Blockage and Beam Prediction for mmWave Systems. 1-8 - Yonatan Katz, Danny Raz:

Cold Start for Cloud Anomaly Detection. 1-8 - Qiao Lu

, Changcheng Huang:
Estimating the Performance of VNE Algorithms with a Novel Loss Network Model. 1-5 - Mehrdad Hajizadeh, Sudip Barua

, Pegah Golchin:
FSA-IDS: A Flow-based Self-Active Intrusion Detection System. 1-9 - Niloy Saha, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:

MonArch: Network Slice Monitoring Architecture for Cloud Native 5G Deployments. 1-7 - Michael Miller, Anvitha Ramachandran

, Alicia Esquivel Morel, Durbek Gafurov, Prasad Calyam:
Transmitting Information with Global-designation of Emergency Routes for Edge Video Processing. 1-7 - Alexander Keller, Jonathan Whitson:

Achieving Observability at Scale through Federated Learning. 1-6 - Farzad Tashtarian, Abdelhak Bentaleb, Hadi Amirpour, Babak Taraghi, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann:

LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming. 1-9 - László Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó

, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A. Antony Franklin:
5G on the roads: optimizing the latency of federated analysis in vehicular edge networks. 1-5 - Oscar G. Bautista, Kemal Akkaya:

MPC-as-a-Service: A Customizable Management Protocol for Running Multi-party Computation on IoT Devices. 1-6 - Cyprien Gueyraud, Nik Sultana:

Towards In-Network Semantic Analysis: A Case Study involving Spam Classification. 1-6 - Pyae Sone Aung, Loc X. Nguyen, Yan Kyaw Tun

, Zhu Han, Choong Seon Hong:
Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication. 1-6 - José Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens:

Optimizing Network Slicing in Distributed Large Scale Infrastructures: From Heuristics to Controlled Deep Reinforcement Learning. 1-6 - Apurba Adhikary

, Md. Shirajum Munir, Avi Deb Raha
, Yu Qiao
, Choong Seon Hong:
Artificial Intelligence Framework for Target Oriented Integrated Sensing and Communication in Holographic MIMO. 1-7 - Paul Seehofer

, Roland Bless
, Martina Zitterbart:
KeLLy - Efficient, Scalable Link Layer Topology Discovery. 1-5 - Enzo d'Andréa

, Jérôme François
, Olivier Festor, Mehdi Zakroum
:
Multi-label Classification of Hosts Observed through a Darknet. 1-6 - Ashima Chawla, Anne-Marie Bosneag, Anestis Dalgkitsis:

Graph-based Interpretable Anomaly Detection Framework for Network Slice Management in Beyond 5G Networks. 1-6 - Cyril Shih-Huan Hsu

, Jorge Martín-Pérez
, Chrysa Papagianni
, Paola Grosso
:
V2N Service Scaling with Deep Reinforcement Learning. 1-5 - Pierre-Marie Junges, Jérôme François

, Olivier Festor:
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. 1-9 - Christian Lübben, Marc-Oliver Pahl

:
Distributed Device-Specific Anomaly Detection using Deep Feed-Forward Neural Networks. 1-9 - Péter Revisnyei, Ferenc Mogyorósi, Zsófia Papp, István Töros, Alija Pasic:

Performance of a TDOA indoor positioning solution in real-world 5G network. 1-6 - Diego Cardoso Nunes, Bruno Loureiro Coelho

, Ricardo Parizotto, Alberto Schaeffer-Filho:
Serene: Handling the Effects of Stragglers in In-Network Machine Learning Aggregation. 1-10 - Prasad Netalkar

, Jiachen Chen, Dipankar Raychaudhuri:
mmCPTP: A Cross-Layer Pull based Transport Protocol for 5G mmWave Networks. 1-9 - Forough Shahab Samani, Kim Hammar, Rolf Stadler:

Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh. 1-3 - Panagiotis I. Nikolaidis, Asim Zoulkarni, John S. Baras:

Bandwidth Provisioning for Network Slices with Per User QoS Guarantees. 1-9 - Wissem Soussi, Maria Christopoulou

, Themis Anagnostopoulos
, Gürkan Gür
, Burkhard Stiller:
TopoFuzzer - A Network Topology Fuzzer for Moving Target Defense in the Telco Cloud. 1-5 - Soumeya Kaada, Marie-Line Alberi-Morel, Gerardo Rubino, Sofiene Jelassi:

Measuring 5G-RAN Resilience Using Coverage and Quality of Service Indicators. 1-7 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:

5GC-Observer Demonstrator: a Non-intrusive Observability Prototype for Cloud Native 5G System. 1-3 - Derek Phanekham

, Kylie Jordan, Oliver Zhu, Suku Nair:
Accurate Bulk Throughput Benchmarks Using Reduced Network Resources. 1-5 - Andrés F. Ocampo, Mah-Rukh Fida, Juan Felipe Botero, Ahmed Elmokashfi, Haakon Bryhni:

PRINCIPIA: Opportunistic CPU and CPU-shares Allocation for Containerized Virtualization in Mobile Edge Computing. 1-7 - Christian Lübben, Marc-Oliver Pahl

:
Distributed Device-Specific Anomaly Detection for Resource-Constrained Devices. 1-3 - Alessandro Aimi

, Stéphane Rovedakis, Fabrice Guillemin, Stefano Secci:
ELoRa: End-to-end Emulation of Massive IoT LoRaWAN Infrastructures. 1-3 - Yanbo Zhou, Lei Feng, Kunyi Xie, Fanqin Zhou, Wenjing Li, Peng Yu:

Stable 5G Time Domain Resource Configuration for Synchronous Timing Services via Lyapunov Aided DRL. 1-5 - Parsa Ghaderi, J. William Atwood, Lata Narayanan:

Topology Discovery in Autonomic Networks. 1-7 - Harish S. A, Suvrima Datta, Hemanth Kothapalli, Praveen Tammana, Achmad Basuki

, Kotaro Kataoka, Selvakumar Manickam, U. Venkanna, Yung-Wey Chong:
Scaling IoT MUD Enforcement using Programmable Data Planes. 1-9 - István Pelle, Bence Szoke, Abdulhalim Fayad

, Tibor Cinkler, László Toka:
A Comprehensive Performance Analysis of Stream Processing with Kafka in Cloud Native Deployments for IoT Use-cases. 1-6 - Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour

, Jorge Crichigno:
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution. 1-6 - Daniel Soares, Marcos Carvalho, Daniel F. Macedo

:
A Stacking Learning-Based QoE Model for Cloud Gaming. 1-6 - Omar Anser, Jérôme François

, Isabelle Chrisment:
Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning. 1-6 - Mohammed Djahafi

, Nabila Salmi:
Using Stochastic Petri net modeling for self-adapting Publish/Subscribe IoT systems. 1-4 - Alim Ul Gias

, Yicheng Gao
, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale:
SampleHST: Efficient On-the-Fly Selection of Distributed Traces. 1-9 - Xiaofu Huang, Guochu Shou, Yaqiong Liu, Zehua Gao, Yihong Hu:

Delay-bounded Topology Construction and Routing Integration for Time-critical Services. 1-6 - Mohamad Ahmadinejad, Tahmina Azmin, Nashid Shahriar:

5G Network Slice Type Classification using Traditional and Incremental Learning. 1-5 - Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:

Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones. 1-5 - Jonatas Adilson Marques, Luciano Paschoal Gaspary:

Advancing Network Monitoring and Operation with In-band Network Telemetry and Data Plane Programmability. 1-6 - Gonçalo Perna, Pedro Rito, Carlos Marques, Miguel Luís

, Filipe Cabral Pinto, Susana Sargento
:
Emergency and Infotainment Services through Mobility-based Dynamic and Predictive 5G Network Slicing. 1-6 - Selim Ickin, Dinand Roeland, Göran Hall:

Independent Split Model Inference at Operator Network for Network Performance Estimation. 1-9 - Jeronimo Bezerra, Italo Brito, Renata Frez, Julio Ibarra:

An adaptive and efficient approach to detect microbursts leveraging per-packet telemetry in a production network. 1-6 - Tommaso Caiazzi

, Mariano Scazzariello
, Samuele Quinzi, Lorenzo Ariemma, Maurizio Patrignani, Giuseppe Di Battista:
Nesting Containers for Faithful Datacenters Emulations. 1-4 - Alberto Huertas Celdrán

, Jan von der Assen, Konstantin Moser, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices. 1-8 - Marco Polverini, Ilaria Germini, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti:

A Digital Twin based Framework to Enable "What-If" Analysis in BGP Optimization. 1-6 - Hafiz Mati-ur-Rahman

, Ghulam Bahoo
, Lamees Zafar, Ibrahim Al-Oqily
, Hasan Ali Khattak
, Arsalan Ahmad
:
Empirical Performance Evaluation of Open Source SDN Controllers in different Network Topologies. 1-6 - Hichem Sedjelmaci, Kamel Tourki:

A Distributed Zero Trust Framework for 6G RAN. 1-5 - Géza Szabó, Zalán Trombitás, József Peto, Thorsten Lohmar, István Komlósi, Tamás Pepó, Attila Vidács, Mátyás Andó:

Impact of Network Resource Management On Quality of Industrial Processes. 1-4 - Josef Hammer, Dragi Kimovski

, Narges Mehran, Radu Prodan, Hermann Hellwagner:
C3-Edge - An Automated Mininet-Compatible SDN Testbed on Raspberry Pis and Nvidia Jetsons. 1-5 - Slawomir Kuklinski, Jordi Mongay Batalla, Janusz Pieczerak:

Dynamic and Multiprovider-based Resource Infrastructure in the NFV MANO Framework. 1-4 - Gabriel Lando, Lucas Augusto Fonseca Schierholt, Mateus Paludo Milesi, Juliano Araújo Wickboldt:

Evaluating the performance of open source software implementations of the 5G network core. 1-7 - Davi D. Gemmer, Bruno Henrique Meyer, Emerson Ribeiro de Mello, Marcos F. Schwarz, Michelle S. Wangham, Michele Nogueira:

A Scalable Cyber Security Framework for the Experimentation of DDoS Attacks of Things. 1-7 - Bruno Rodrigues

, Eder J. Scheid
, Julius Willems, Burkhard Stiller:
Real-time Medical Devices Inventory Tracking - a Hands-on Experience. 1-6 - Lucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo

, Radu State:
XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay. 1-5 - Árpád Somogyi, Tamás Tettamanti, Pál Varga, Zsolt Szalay

, Dániel Baranyai, Tamas Lovas:
Digital Map Generation Workflow Demonstrated on ZalaZONE Automotive Proving Ground Elements. 1-6 - Karim Boutiba, Miloud Bagaa, Adlen Ksentini:

On enabling 5G Dynamic TDD by leveraging Deep Reinforcement Learning and O-RAN. 1-3 - László Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó

, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A. Antony Franklin:
Federated learning for vehicular coordination use cases. 1-6 - Yusufu Shehu, Robert Harper:

Efficient Periodicity Analysis for Real-Time Anomaly Detection. 1-6 - Keval Malde, Venkatarami Reddy Chintapalli, Bhavishya Sharma, Bheemarjuna Reddy Tamma, A. Antony Franklin:

JARS: A Joint Allocation of Radio and System Resources for Virtualized Radio Access Networks. 1-9 - Arihant Samar, Krishna M. Sivalingam:

RL-based Virtual Network Embedding using VNF Sharing for Network Slicing in 5G Networks. 1-7 - Bruno Carneiro da Cunha, Daniel Macêdo Batista

, Roberto Hirata Junior, Kifayat Ullah:
A Crash Response System using LoRa-based V2X Communications. 1-5 - Gaspard Baye

, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gökhan Kul:
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems. 1-6 - Shiva Ketabi, Hongkai Chen, Haiwei Dong, Yashar Ganjali:

A Deep Reinforcement Learning Framework for Optimizing Congestion Control in Data Centers. 1-7 - János Czentye, István Pelle, Balázs Sonkoly:

Cost-optimal Operation of Latency Constrained Serverless Applications: From Theory to Practice. 1-10 - Frank Loh, Andrea Pimpinella

, Stefan Geißler, Tobias Hoßfeld:
Uplink-based Live Session Model for Stalling Prediction in Video Streaming. 1-9 - Tianliang Zhang, Wendell Liu, Balagangadhar G. Bathula, Andrea Fumagalli:

ACTOR: Alarm Correlation and Ticketing for Open ROADM. 1-4 - Shi Wang, Siya Xu, Jiaxin Wang, Peng Yu, Ying Wang, Fanqin Zhou:

FRL-Assisted Edge Service Offloading Mechanism for IoT Applications in FiWi HetNets. 1-5 - Philippe Graff

, Xavier Marchal, Thibault Cholez
, Bertrand Mathieu, Olivier Festor:
Efficient Identification of Cloud Gaming Traffic at the Edge. 1-10 - Luyao Zou, Sheikh Salman Hassan

, Yan Kyaw Tun
, Zhu Han, Choong Seon Hong:
Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation Design. 1-5 - Nguyen Van Tu, Kyungchan Ko, Sangwoo Ryu, Sangtae Ha, James Won-Ki Hong:

Improve Video Conferencing Quality with Deep Reinforcement Learning. 1-5 - Wissem Soussi, Maria Christopoulou

, George Xilouris, Edgardo Montes de Oca, Vincent Lefebvre, Gürkan Gür
, Burkhard Stiller:
Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense. 1-3 - Moad Dehbi, Yassin El Hillali, Atika Rivenq, Marwane Ayaida:

Comparative Analysis of 2D Object Detection Algorithms and real-time implementation using RTMAPS. 1-5 - Gustavo C. Eichler, Célia G. Ralha

, Arman Farhang
, Marcelo Antonio Marotta:
Combining NOMA-OMA with a Multiagent Architeture for Enhanced Spectrum Sharing in 6G. 1-7 - Venkatarami Reddy Chintapalli, Vishal Siva Kumar Giduturi, Bheemarjuna Reddy Tamma, A. Antony Franklin:

RAVIN: A Resource-aware VNF Placement Scheme with Performance Guarantees. 1-9 - Marcell Balogh

, András Földvári
, Pál Varga:
Digital Twins in Industry 5.0: Challenges in Modeling and Communication. 1-6 - Guan-Sheng Wang, Chih-Yu Lin, Yu-Chee Tseng, Lan-Da Van:

A Multilayer Perceptron Model for Station Grouping in IEEE 802.11ah Networks. 1-5 - Kodai Honda, Ryo Nakamura, Noriaki Kamiyama:

Characteristic Analysis of Socially-Aware Information-Centric Networking. 1-5 - Giles Winchester

, George Parisis
, Luc Berthouze:
On the Temporal Behaviour of a Large-Scale Microservice Architecture. 1-6 - Hannes Larsson, Farnaz Moradi, Jalil Taghia, Xiaoyu Lan, Andreas Johnsson:

Domain Adaptation for Network Performance Modeling with and without Labeled Data. 1-9 - Marios Avgeris

, Aris Leivadeas, Ioannis Lambadaris:
A Reinforcement-Learning Self-Healing Approach for Virtual Network Function Placement. 1-5 - Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong

, Jiawen Kang
:
Stochastic Qubit Resource Allocation for Quantum Cloud Computing. 1-5 - Arthur Selle Jacobs, Ronaldo Alves Ferreira, Lisandro Zambenedetti Granville

:
Enabling Self-Driving Networks with Machine Learning. 1-6 - Luís Rosa, Tiago Cruz

, Paulo Simões, Edmundo Monteiro:
Intrusion and Anomaly Detection in Industrial Automation and Control Systems. 1-6 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:

5GC-Observer: a Non-intrusive Observability Framework for Cloud Native 5G System. 1-10 - Stefan Geißler, Tobias Hoßfeld:

Performance Evaluation of Next-Generation Data Plane Architectures and their Components. 1-6 - Selim Ickin:

Automated Feature Selection with Local Gradient Trajectory in Split Learning. 1-7 - Imed Ghnaya, Mohamed Mosbah, Hasnaâ Aniss

, Toufik Ahmed:
Multi-Agent Advantage Actor-Critic Learning For Message Content Selection in Cooperative Perception Networks. 1-9 - Pietro Spadaccino, Sara Bruzzese, Francesca Cuomo, Flavio Luciani:

Analysis and emulation of BGP hijacking events. 1-4 - Pedro Almeida, Andreia Figueiredo

, Pedro Rito
, Miguel Luís
, Susana Sargento
:
On the Real Evaluation of a Collective Perception Service. 1-6 - Vladimir Marbukh:

Towards Security Metrics Combining Risks of Known and Zero-day Attacks: Work in Progress. 1-4 - Diana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Alexander Perez-Pons

:
SDN-based GTP-U Traffic Analysis for 5G Networks. 1-4 - David Pop, Erkin Kirdan, Marc-Oliver Pahl

:
Performance Comparison of UDP and TCP for Different CoAP Load Profiles. 1-6 - Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda:

Telemetry Knowledge Distributed Processing for Network Digital Twins and Network Resilience. 1-6 - Ioanna Angeliki Kapetanidou

, Paulo Mendes, Vassilis Tsaoussidis
:
Enhancing Security in Information-Centric Ad Hoc Networks. 1-9 - Diego O. Rodrigues, Torsten Braun, Guilherme Maia, Leandro Villas

:
Mobility-aware Latency-constrained Data Placement in SDN-enabled Edge Networks. 1-9 - George Dimitrakopoulos, Thomas Gutt, Hans Ehm, Alfred Hoess, Konstantina Karathanasopoulou, Anna Lackner, Germar Schneider:

On the Way to Realize the 5th Industrial Revolution: Achievements, Challenges and Research Areas. 1-6 - Faiaz Nazmetdinov, Diego Preciado, Andreas Mitschele-Thiel:

Trust Me: Explainable ML in Self-Organized Network Management. 1-6 - Raza Ul-Mustafa

, Md. Tariqul Islam, Christian Esteve Rothenberg, Pedro Henrique Gomes:
EFFECTOR: DASH QoE and QoS Evaluation Framework For EnCrypTed videO tRaffic. 1-8 - Youcef Magnouche, Sébastien Martin

, Jérémie Leguay:
Protected load-balancing problem: Neural-network based approximation for non-convex optimization. 1-9 - Yujia Liu, Changqing An

, Tao Yu, Zhiyan Zheng, Zidong Pei, Jilong Wang, Chalermpol Charnsripinyo:
Evaluating and Improving Regional Network Robustness from an AS TOPO Perspective. 1-7 - Mahdi Sharara, Sahar Hoteit, Véronique Vèque:

Reinforcement Learning based model for Maximizing Operator's Profit in Open-RAN. 1-5 - Nour Alhussien, Ahmed Aleroud:

A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection. 1-5 - Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Chungang Yang, Yehua Zhao:

A Comprehensive Framework for Intent-Based Networking, Standards-Based and Open-Source. 1-6 - Thomas Feltin, Juan Antonio Cordero Fuertes, Frank Brockners, Thomas Heide Clausen:

Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data. 1-9 - Renato Valente, Carlos R. Senna

, Pedro Rito, Susana Sargento:
Federated Learning Framework to Decentralize Mobility Forecasting in Smart Cities. 1-5 - Alessio Sacco, Guido Marchetto:

Towards Autonomous Computer Networks in Support of Critical Systems. 1-6 - Can Tan

, Peng Yu, Wenjing Li, Fanqin Zhou, Ying Wang, Siya Xu, Xuesong Qiu, Qingbi Zheng, Pei Xiao:
Self-adaptive and Efficient Training Node Selection for Federated Learning in B5G/6G Edge Network. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














