default search action
Networking 2023: Barcelona, Spain
- IFIP Networking Conference, IFIP Networking 2023, Barcelona, Spain, June 12-15, 2023. IEEE 2023, ISBN 978-3-903176-57-7
- Romain Dagnas, Michel Barbeau, Maxime Boutin, Joaquín García-Alfaro, Reda Yaich:
Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems. 1-6 - David Hasselquist, Ludvig Bolin, Emil Carlsson, Adam Hylander, Martin Larsson, Erik Voldstad, Niklas Carlsson:
Longitudinal Analysis of Wildcard Certificates in the WebPKI. 1-9 - Xi Wang, Xusheng Ai, F. Alex Feltus, Susmit Shannigrahi:
GNSGA: A Decentralized Data Replication Algorithm for Big Science Data. 1-9 - Cheick T. Cissé, Oumaya Baala, Valéry Guillet, François Spies, Alexandre Caminada:
IRGAN: cGAN-based Indoor Radio Map Prediction. 1-9 - Jérôme De Boeck, Bernard Fortz, Stefan Schmid:
The Case for Stochastic Online Segment Routing under Demand Uncertainty. 1-8 - Jayasree Sengupta, Mike Kosek, Justus Fries, Pratyush Dikshit, Vaibhav Bajpai:
Web Privacy By Design: Evaluating Cross-layer Interactions of QUIC, DNS and H/3. 1-9 - Mike Kosek, Benedikt Spies, Jörg Ott:
Secure Middlebox-Assisted QUIC. 1-9 - Marcin Bosk, Filip Rezabek, Johannes Abel, Kilian Holzinger, Max Helm, Georg Carle, Jörg Ott:
Simulation and Practice: A Hybrid Experimentation Platform for TSN. 1-9 - Benedikt Jaeger, Johannes Zirngibl, Marcel Kempf, Kevin Ploch, Georg Carle:
QUIC on the Highway: Evaluating Performance on High-rate Links. 1-9 - Marten Gartner, Jean-Pierre Smith, Matthias Frei, François Wirz, Cédric Neukom, David Hausheer, Adrian Perrig:
Hercules: High-Speed Bulk-Transfer over SCION. 1-9 - Erik Daniel, Florian Tschorsch:
Privacy-Enhanced Content Discovery for Bitswap. 1-9 - Dimitrios Simopoulos, Andreas Wolf:
Overcoming New Technologies Challenges in IoT Security Labs: Strategies for Effective Adaptation. 1-5 - Secil Ercan, Léo Mendiboure, Lylia Alouache, Sassi Maaloul, Tidiane Sylla, Hasnaâ Aniss:
An Enhanced Model for Machine Learning-Based DoS Detection in Vehicular Networks. 1-9 - Yijing Zhang, Hui Xue, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Anqi Wang, Yinliang Yue, Bo Sun:
ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic. 1-10 - Pratyush Dikshit, Mike Kosek, Nils Faulhaber, Jayasree Sengupta, Vaibhav Bajpai:
Evaluating DNS Resiliency with Truncation, Fragmentation and DoTCP Fallback. 1-9 - Irina Tsareva, Trinh Viet Doan, Vaibhav Bajpai:
A Decade Long View of Internet Traffic Composition in Japan. 1-9 - Hui Xue, Bo Sun, Weixuan Mao:
Linking User Identities Across Social Networks via Frequency Domain Analysis. 1-8 - Muhammad Affan Javed, Pei Liu, Shivendra S. Panwar:
A Multi-Connectivity Architecture with Data Replication for XR Traffic in mmWave Networks. 1-9 - Shiju Li, Xin Huang, Chul-Ho Lee, Do Young Eun:
Controlling Epidemic Spread Under Immunization Delay Constraints. 1-9 - George Papathanail, Lefteris Mamatas, Panagiotis Papadimitriou:
Towards the Integration of TAPRIO-based Scheduling with Centralized TSN Control. 1-6 - Alessio Botta, Roberto Canonico, Annalisa Navarro, Giovanni Stanco, Giorgio Ventre:
Scalable Reinforcement Learning for Dynamic Overlay Selection in SD-WANs. 1-9 - Mohamed Seliem, Ahmed Zahran, Dirk Pesch:
Delay Analysis of TSN Based Industrial Networks With Preemptive Traffic Using Network Calculus. 1-9 - Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto, Dusit Niyato:
Game Theoretic Resource Planning and Request Scheduling in Mobile Edge Computing Networks. 1-9 - Nurefsan Sertbas Bülbül, Joshua Jannis Krüger, Mathias Fischer:
TSN Gatekeeper: Enforcing stream reservations via P4-based in-network filtering. 1-8 - Navid Malekghaini, Hauton Tsang, Mohammad Ali Salahuddin, Noura Limam, Raouf Boutaba:
FSTC: Dynamic Category Adaptation for Encrypted Network Traffic Classification. 1-9 - Yeting Xu, Xiang Li, Yi Yang, Zhenjie Lin, Liming Wang, Wenzhong Li:
FedABR: A Personalized Federated Reinforcement Learning Approach for Adaptive Video Streaming. 1-9 - Jennifer Ly, Yutian Chen, Bin Tang:
Data-VCG: A Data Preservation Game for Base Station-less Sensor Networks with Performance Guarantee. 1-6 - Yan Jiao, Pin-Han Ho, Xiangzhu Lu, Kairan Liang, Yuren You, János Tapolcai, Bingbing Li, Limei Peng:
On Real-time Failure Localization via Instance Correlation in Optical Transport Networks. 1-9 - Olga Kondrateva, Stefan Dietzel, Maximilian Schambach, Johannes S. Otterbach, Björn Scheuermann:
Filling the Gap: Fault-Tolerant Updates of On-Satellite Neural Networks Using Vector Quantization. 1-9 - Mouhamed Amine Bouchiha, Yacine Ghamri-Doudane, Mourad Rabah, Ronan Champagnat:
GuRuChain: Guarantee and Reputation-based Blockchain Service Trading Platform. 1-9 - Lotte Weedage, Syllas R. C. Magalhães, Suzan Bayhan:
National roaming as a fallback or default? 1-6 - Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi:
5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture. 1-9 - Kyle A. Simpson, Chris Williamson, Douglas J. Paul, Dimitrios P. Pezaros:
Galette: a Lightweight XDP Dataplane on your Raspberry Pi. 1-9 - Alexander Brundiers, Timmy Schüller, Nils Aschenbruck:
Tactical Traffic Engineering with Segment Routing Midpoint Optimization. 1-9 - Óscar Seijo, Raúl Torrego, Iñaki Val:
On the integration of OPC UA over Wired - Wireless Time Sensitive Networking. 1-6 - Sanaa Ghandi, Alexandre Reiffers-Masson, Sandrine Vaton, Thierry Chonavel:
Lightweight Network Delay Segmentation Based on Smoothed Hierarchical Clustering. 1-9 - Tony John, Adrian Perrig, David Hausheer:
DMTP: Deadline-aware Multipath Transport Protocol. 1-9 - Anne Bouillard:
Imperfect Bandwidth-Sharing Policies using Network Calculus. 1-9 - Maria Papaioannou, Georgios Mantas, Emmanouil Manos Panaousis, Aliyah Essop, Jonathan Rodriguez, Victor Sucasas:
Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations. 1-6 - Fatemeh Marzani, Fatemeh Ghassemi, Zeynab Sabahi-Kaviani, Thijs van Ede, Maarten van Steen:
Mobile App Fingerprinting through Automata Learning and Machine Learning. 1-9 - Doganalp Ergenç, Robin Schenderlein, Mathias Fischer:
TSNZeek: An Open-source Intrusion Detection System for IEEE 802.1 Time-sensitive Networking. 1-6 - Marina Dehez-Clementi, Mourad Rabah, Yacine Ghamri-Doudane:
A Privacy-preserving Proof-of-Reputation. 1-9 - Panagiotis Promponas, Víctor Valls, Leandros Tassiulas:
Full Exploitation of Limited Memory in Quantum Entanglement Switching. 1-9 - Alexander Staves, Sam Maesschalck, Richard Derbyshire, Benjamin Green, David Hutchison:
Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines. 1-6 - Itay Alayoff, Gil Einziger:
Optimizing DNS Resolvers for High Loads. 1-9 - Jerrod Wigmore, Brooke Shrader, Eytan H. Modiano:
Hierarchical Thompson Sampling for Multi-band Radio Channel Selection. 1-9 - Julia Caleya-Sanchez, Jonathan Prados-Garzon, Lorena Chinchilla-Romero, Pablo Muñoz, Pablo Ameigeiras:
Flow Prioritization for TSN Asynchronous Traffic Shapers. 1-6 - Georgios Zachos, Georgios Mantas, Ismael Essop, Kyriakos Porfyrakis, Joaquim Manuel C. S. Bastos, Jonathan Rodriguez:
An IoT/IoMT Security Testbed for Anomaly-based Intrusion Detection Systems. 1-6 - Zhejiayu Ma, Soufiane Roubia, Frédéric Giroire, Guillaume Urvoy-Keller:
Q-learning for Waiting Time Control in CDN/V2V Live streaming. 1-9 - Hassan Fawaz, Omar Houidi, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
Graph Convolutional Reinforcement Learning for Load Balancing and Smart Queuing. 1-9 - Baiyang Li, Yujia Zhu, Qingyun Liu, Yong Sun, Yuedong Zhang, Li Guo:
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications. 1-9 - Dean Carmel, Isaac Keslassy:
Dragonfly: In-Flight CCA Identification. 1-9 - Jack Zhao, Miguel C. Neves, Israat Haque:
On the (dis)Advantages of Programmable NICs for Network Security Services. 1-9 - Lianming Zhang, Benle Yin, Qian Wang, Pingping Dong:
Graph Neural Network-based Delay Prediction Model Enhanced by Network Calculus. 1-7 - Hongwu Li, Xingyu Fu, Yujia Zhu, Rong Yang, Chao Li:
MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HIN. 1-9 - Allen Hong, Yahui Li, Han Zhang, Ming Wang, Changqing An, Jilong Wang:
A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass. 1-9 - Mingyuan Zang, Changgang Zheng, Tomasz Koziak, Noa Zilberman, Lars Dittmann:
Federated Learning-Based In-Network Traffic Analysis on IoT Edge. 1-6 - Henning Stubbe, Sebastian Gallenmüller, Manuel Simon, Eric Hauser, Dominik Scholz, Georg Carle:
Keeping up to Date with P4Runtime: An Analysis of Data Plane Updates on P4 Switches. 1-9 - Dongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin:
Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild. 1-9 - Xiaolin Wang, Fen Zhou, Yaojun Chen, Ting Wang:
Maximal Distance Spectrum Assignment for Services Provisioning in Elastic Optical Networks. 1-9 - Lu Lin, Xiaojun Zhu, Ji'ao Tang, Chao Dong:
Placement of UAVs to Reconnect Lost Subnetworks in Wireless Sensor Networks. 1-9 - Filippos Pelekoudas Oikonomou, José Carlos Ribeiro, Georgios Mantas, Firooz Bashashi, Georgia Sakellari, Jonathan González:
A Tutorial on the Implementation of a Hyperledger Fabric-based Security Architecture for IoMT. 1-6 - Daniel Bachar, Anat Bremler-Barr, David Hay:
Optimizing Service Selection and Load Balancing in Multi-Cluster Microservice Systems with MCOSS. 1-9 - Sepehr Abbasi Zadeh, Farid Zandi, Matthew Buckley, Yashar Ganjali:
Meta-Migration: Reducing Switch Migration Tail Latency Through Competition. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.