default search action
NOMS 2023: Miami, FL, USA
- NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023. IEEE 2023, ISBN 978-1-6654-7716-1
- Haorui Guo, Weichao Li, Jiashuo Lin, Jianer Zhou, Qinglin Xun, Shuangping Zhan, Yong Huang, Yi Wang, Qingsha Cheng:
A Scalable Asynchronous Traffic Shaping Mechanism for TSN with Time Slot and Polling. 1-5 - Raffaele Galliera, Alessandro Morelli, Roberto Fronteddu, Niranjan Suri:
MARLIN: Soft Actor-Critic based Reinforcement Learning for Congestion Control in Real Networks. 1-10 - Stanislav Spacek, Petr Velan, Martin Holkovic, Tomás Plesník:
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. 1-6 - Ákos Leiter, Attila Hegyi, István Kispál, Pál Böõsy, Nándor Galambosi, Gábor Zsolt Tar:
GitOps and Kubernetes Operator-based Network Function Configuration. 1-5 - Amin Kaveh, Adam Pettersson, Christian Rohner, Andreas Johnsson:
On the Impact of Blackhole-Attack Variations on ML-based Intrusion Detection Systems in IoT. 1-4 - Omar Houidi, Sihem Bakri, Djamal Zeghlache, Julien Lesca, Pham Tran Anh Quang, Jérémie Leguay, Paolo Medagliani:
AMAC: Attention-based Multi-Agent Cooperation for Smart Load Balancing. 1-7 - Lajos Bence Makai, Pál Varga:
Predicting Mobility Management Demands of Cellular Networks based on User Behavior. 1-6 - Mahdi Hemmati, Yuren You, Abbas Javadtalab, Christopher Janz:
Optimized Power Commissioning in WDM Networks Using Optical Network Digital Twin. 1-4 - Jhonatan Tavori, Hanoch Levy:
Resilience of Networks to Spreading Computer Viruses: Optimal Anti-Virus Deployment. 1-5 - Ahsan Saleem, Mahsa Raeiszadeh, Amin Ebrahimzadeh, Roch H. Glitho, Johan Eker, Raquel A. F. Mini:
A Deep Learning Approach for Root Cause Analysis in Real-Time IIoT Edge Networks. 1-5 - José Santos, Tim Wauters, Filip De Turck:
Efficient Management in Fog Computing. 1-6 - Francesco Valente, Francesco Giacinto Lavacca, Vincenzo Eramo:
A Resource Allocation Strategy in Earth Observation Orbital Edge Computing-enabled Satellite Networks to minimize Ground Station Energy Consumption. 1-6 - Simon Bauer, Janluka Janelidze, Benedikt Jaeger, Patrick Sattler, Patryk Brzoza, Georg Carle:
On the Accuracy of Active Capacity Estimation in the Internet. 1-7 - Yue Jin, Makram Bouzid, Armen Aghasaryan, Ricardo Rocha:
Community Selection for Multivariate KPI Predictions in a 2-Tier System. 1-5 - Alexander Frank, Wolfgang Hommel, Benedikt Hopfner:
An Intermediary Protocol Representation to Aid in Avionics Network Development. 1-5 - Katharina Dietz, Nicholas Gray, Manuel Wolz, Claas Lorenz, Tobias Hoßfeld, Michael Seufert:
Moving Down the Stack: Performance Evaluation of Packet Processing Technologies for Stateful Firewalls. 1-7 - Sheikh Salman Hassan, Umer Majeed, Zhu Han, Choong Seon Hong:
SFL-LEO: Secure Federated Learning Computation Based on LEO Satellites for 6G Non-Terrestrial Networks. 1-5 - Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh:
Generalizable Resource Scaling of 5G Slices using Constrained Reinforcement Learning. 1-9 - Will Fantom, Eleanor Davies, Charalampos Rotsos, Paul Veitch, Stephen A. Cassidy, Nicholas J. P. Race:
NES: Towards Lifecycle Automation for Emulation-Based Experimentation. 1-9 - Csaba Hegedüs, Attila Frankó, Pál Varga, Stefan Gindl, Markus Tauber:
Enabling Scalable Smart Vertical Farming with IoT and Machine Learning Technologies. 1-4 - Nikolaos Baltagiannis, Ioanna Angeliki Kapetanidou, Vassilis Tsaoussidis:
EFPCaching: Energy-aware and Fault-tolerant Probabilistic Caching of popular IoT content in ICN. 1-4 - Patrick Russell, Marwa A. Elsayed, Biswajit Nandy, Nabil Seddigh, Nur Zincir-Heywood:
On the Fence: Anomaly Detection in IoT Networks. 1-4 - Md. Shamim Towhid, Nashid Shahriar:
Early Detection of Intrusion in SDN. 1-6 - Yu Qiao, Md. Shirajum Munir, Apurba Adhikary, Avi Deb Raha, Choong Seon Hong:
CDFed: Contribution-based Dynamic Federated Learning for Managing System and Statistical Heterogeneity. 1-5 - Tanmoy Bag, Sharva Garg, Sriram Parameswaran, Diego Fernando Preciado Rojas, Andreas Mitschele-Thiel:
Communication-Efficient and Scalable Management of Self-Organizing Mobile Networks. 1-5 - Divya Pathak, Ranjitha K., Krishna Sai Modali, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi:
Accelerating PUF-based Authentication Protocols Using Programmable Switch. 1-10 - Ariel L. C. Portela, Rafael A. Menezes, Wanderson L. Costa, Matheus Monteiro Silveira, Luiz Fernando Bittencourt, Rafael Lopes Gomes:
Detection of IoT Devices and Network Anomalies based on Anonymized Network Traffic. 1-6 - Marten Gartner, Thorben Krüger, David Hausheer:
BitTorrent over SCION: Leveraging Unused Network Capacities in the Internet. 1-5 - Felipe Sampaio Dantas da Silva, Túlio Pascoal, Emidio P. Neto, Rodrigo S. S. Nunes, Cristian H. Martins de Souza, Augusto Neto:
An Adaptive Moving Target Defense Approach for Software-Defined Networking Protection. 1-6 - Gérard Kponhinto, Ousmane Thiare, Ado Adamou Abba Ari, Abdelhak Mourad Guéroui, Sondès Khemiri-Kallel, Junseok Hwang:
Bio-inspired Solution for Cluster-Tree Based Data Collection Protocol in Wireless Sensors Networks. 1-6 - Matheus Monteiro Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes:
Data Protection based on Searchable Encryption and Anonymization Techniques. 1-5 - Farid Zandi, Sepehr Abbasi Zadeh, Soheil Abbasloo, Parsa Pazhooheshy, Yashar Ganjali, Zhenhua Hu:
Live Stateful Migration of a Virtual Sub-Network. 1-9 - Fabian Lindner, Gerald Reiner:
Industry 5.0 and Operations Management - the Importance of Human Factors. 1-4 - Karim Baccar, Abdelkader Lahmadi:
An Experimental Testbed for 5G Network Security Assessment. 1-6 - Hongfan Mu, Noura Aljeri, Azzedine Boukerche:
Traffic Flow based Feature Engineering for Urban Management System. 1-6 - Kshitij Kokkera, Aileen Chen, Chythra Malapati, Alex Demchenko, Carol J. Fung:
A Study on the Conspiracy Theory Propagation Network on Twitter. 1-9 - Shie-Yuan Wang, Jin-Ting Li:
Using a P4 Hardware Switch to Block Trackers and Ads for All Devices on an Edge Network. 1-5 - Nobukazu Fukuda, Mayu Yamazoe, Hiroaki Matsubayashi, Kazuaki Akashi, Shunsuke Kanai:
Optimizing Resource Placement for Long-term Disaster Response. 1-5 - Kim Hammar, Rolf Stadler:
Digital Twins for Security Automation. 1-6 - Jonas Andre, Johannes Naab, Benedikt Jaeger, Georg Carle, Leander Seidlitz, Stephan M. Günther:
A Multi-Tenancy System Architecture for Online Examinations. 1-6 - Frank Loh, Kathrin Hildebrand, Florian Wamser, Stefan Geißler, Tobias Hoßfeld:
Machine Learning Based Study of QoE Metrics in Twitch.tv Live Streaming. 1-7 - Arash Moayyedi, Mahdieh Ahmadi, Mohammad Ali Salahuddin, Raouf Boutaba, Aladdin Saleh:
Generalizable GNN-based 5G RAN/MEC Slicing and Admission Control in Metropolitan Networks. 1-9 - Hugo Sullivan, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization. 1-6 - Jan von der Assen, Alberto Huertas Celdrán, Adrian Zermin, Raffael Mogicato, Gérôme Bovet, Burkhard Stiller:
SecBox: A Lightweight Container-based Sandbox for Dynamic Malware Analysis. 1-3 - Alexander Clemm, Toerless Eckert:
Combining Autonomic and Intent-Based Networking. 1-6 - Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero:
Towards an Edge Cloud Based Coordination Platform for Multi-User AR Applications Built on Open-Source SLAMs. 1-6 - Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Sajid Alam, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
An Intent-Based Networking mechanism: A study case for efficient path selection using Graph Neural Networks. 1-6 - Zolboo Erdenebaatar, Biswajit Nandy, Nabil Seddigh, Riyad Alshammari, Marwa Elsayed, Nur Zincir-Heywood:
Instant Messaging Application Encrypted Traffic Generation System. 1-3 - José Santos, Tim Wauters, Bruno Volckaert, Filip De Turck:
gym-hpa: Efficient Auto-Scaling via Reinforcement Learning for Complex Microservice-based Applications in Kubernetes. 1-9 - Aman Kumar, Muhammad Anwar Shahid, Arunita Jaekel, Ning Zhang, Marc Kneppers:
Machine learning based detection of replay attacks in VANET. 1-6 - Guanxiong Liu, Nicholas Furth, Hang Shi, Abdallah Khreishah, Jo Young Lee, Nirwan Ansari, Chengjun Liu, Yaser Jararweh:
Federated Learning Aided Deep Convolutional Neural Network Solution for Smart Traffic Management. 1-8 - Yoichi Matsuo, Jatinder Singh, Shantanu Verma, Guillaume Fraysse:
Integrating state prediction into the Deep Reinforcement Learning for the Autoscaling of Core Network Functions. 1-5 - Subhash Talluri, Qiong Zhang, Rongyi Chen:
A Cloud-Native Federated Learning Architecture for Telecom Fraud Detection. 1-3 - Luis Jesús Martín León, Juan Luis Herrera, Javier Berrocal, Jaime Galán-Jiménez:
Logistic Regression-based Solution to Predict the Transport Assistant Placement in SDN networks. 1-5 - Do Duc Anh Nguyen, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen:
A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies. 1-7 - Xinran Zheng, Shuo Yang, Xingjun Wang:
A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoT. 1-6 - Rodrigo Rosmaninho, Duarte M. G. Raposo, Pedro Rito, Susana Sargento:
Time Constraints on Vehicular Edge Computing: A Performance Analysis. 1-7 - Muriel Figueredo Franco, Lisandro Zambenedetti Granville, Burkhard Stiller:
CyberTEA: a Technical and Economic Approach for Cybersecurity Planning and Investment. 1-6 - Rogelio Hernández, Gabriel Mujica, Jorge Portilla, Francisco Parrilla:
Internet of Things Technology for Train Positioning and Integrity in the Railway Industry Domain. 1-6 - Phuong Bac Ta, Ha-Duong Phung, Younghan Kim:
A-RCL: An Adaptive Incident Prediction and Automated Root Cause Localization System for Cloud Environment. 1-5 - Maxime Bouton, Jaeseong Jeong, José Outes, Adriano Mendo, Alexandros Nikou:
Multi-agent Reinforcement Learning with Graph Q-Networks for Antenna Tuning. 1-7 - Jingchun Li, Fanqin Zhou, Wenjing Li, Mingyu Zhao, Xueqiang Yan, Yan Xi, Jianjun Wu:
Componentized Task Scheduling in Cloud-Edge Cooperative Scenarios Based on GNN-enhanced DRL. 1-4 - Jatinder Singh, Shantanu Verma, Yoichi Matsuo, Francesca Fossati, Guillaume Fraysse:
Autoscaling Packet Core Network Functions with Deep Reinforcement Learning. 1-6 - Pal Patrik Varga, Pál Varga, Dániel Ficzere:
Analyzing self-similarities in network traffic, water levels, and currency exchange rates. 1-6 - Yuxuan Zhong, Siya Xu, Zihan Li, Peng Yu, Ying Wang, Fanqin Zhou:
DRL and Main-Side Blockchain Empowered Edge Computing Framework for Assistant Driving. 1-7 - Vera Clemens, Lars-Christian Schulz, Marten Gartner, David Hausheer:
DDoS Detection in P4 Using HYPERLOGLOG and COUNTMIN Sketches. 1-6 - Marios Avgeris, Aris Leivadeas, Nikolaos Athanasopoulos, Ioannis Lambadaris, Matthias Falkner:
Model Predictive Control for Automated Network Assurance in Intent-Based Networking enabled Service Function Chains. 1-7 - Alicia Esquivel Morel, Ekincan Ufuktepe, Cameron Grant, Samuel Elfrink, Chengyi Qu, Prasad Calyam, Kannappan Palaniappan:
Trust Quantification in a Collaborative Drone System with Intelligence-driven Edge Routing. 1-7 - Shuwen Liu, Yu Liu, Craig A. Shue:
Inspecting Traffic in Residential Networks with Opportunistically Outsourced Middleboxes. 1-7 - Mario Minardi, Youssouf Drif, Thang X. Vu, Ilora Maity, Christos Politis, Symeon Chatzinotas:
SDN-based Testbed for Emerging Use Cases in Beyond 5G NTN-Terrestrial Networks. 1-6 - Jaeryun Lee, Byungchul Tak, Euiseong Seo:
A Close Look at Shared Resource Consumption in NoSQL Databases for Accurate Accounting. 1-7 - Kaiyi Zhang, Nancy Samaan, Ahmed Karmouch:
An Intelligent Data-Plane with a Quantized ML Model for Traffic Management. 1-9 - Ireneusz Szczesniak, Bozena Wozna-Szczesniak:
Generic Dijkstra: correctness and tractability. 1-7 - Salman Javed, Saleha Javed, Jan van Deventer, Hamam Mokayed, Jerker Delsing:
A Smart Manufacturing Ecosystem for Industry 5.0 using Cloud-based Collaborative Learning at the Edge. 1-6 - Soroush Aalibagi, Mahdi Dolati, Sogand SadrHaghighi, Majid Ghaderi:
Low-Overhead Packet Loss Diagnosis for Virtual Private Clouds using P4-Programmable NICs. 1-9 - Yunfeng Zhao, Wenchi Zhang, Zhiliang Wang, Shize Zhang, Kaixin Sui, Enhuan Dong, Jiahai Yang:
Multi-stage Location for Root-Cause Metrics in Online Service Systems. 1-9 - Rahul Sharma, Chien Aun Chan, Christopher Leckie:
Probabilistic Distributed Intrusion Detection For Zero-Trust Multi-Access Edge Computing. 1-9 - Jaime Fúster De La Fuente, Álvaro Pendás Recondo, Leon Wong, Paul Harvey:
Enabling Auditable Trust in Autonomous Networks with Ethereum and IPFS. 1-6 - Philippe Owezarski:
Investigating adversarial attacks against Random Forest-based network attack detection systems. 1-6 - Jonatas Adilson Marques, Kirill Levchenko, Luciano Paschoal Gaspary:
Responding to Network Failures at Data-plane Speeds with Network Programmability. 1-10 - Siyuan Wu, Wenjun Fan:
An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection. 1-5 - Huu Nghia Nguyen, Bertrand Mathieu, Marius Letourneau, Guillaume Doyen, Stéphane Tuffin, Edgardo Montes de Oca:
A Comprehensive P4-based Monitoring Framework for L4S leveraging In-band Network Telemetry. 1-6 - Fidan Mehmeti, Valentin Thomas Haider, Wolfgang Kellerer:
Admission Control for URLLC Traffic with Computation Requirements in 5G and Beyond. 1-9 - José Camacho, Katarzyna Wasielewska, Pablo Espinosa, Marta Fuentes-García:
Quality In / Quality Out: Data quality more relevant than model choice in anomaly detection with the UGR'16. 1-5 - Peng Hu:
SatAIOps: Revamping the Full Life-Cycle Satellite Network Operations. 1-5 - Gabriel Vassoler, Jonatas Adilson Marques, Luciano Paschoal Gaspary:
VERMONT: Towards an In-band Telemetry-Based Approach for Live Network Property Verification. 1-7 - Saad Abouzahir, Essaid Sabir, Halima Elbiaze, Mohamed Sadik:
Federated Power Control for Predictive QoS in 5G and Beyond: A Proof of Concept for URLLC. 1-7 - Sajal Saha, Anwar Haque:
Wavelet-Based Hybrid Machine Learning Model for Out-of-distribution Internet Traffic Prediction. 1-8 - Fathima James, Indrajit Ray, Deep Medhi:
Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT. 1-6 - Satya Kumar Vankayala, Sai Krishna Santosh Gollapudi, Bharat Jain, Seungil Yoon, K. Mihir, Swaraj Kumar, H. U. Sudheer Kumar, Issaac Kommineni:
Efficient Deep-Learning Models for Future Blockage and Beam Prediction for mmWave Systems. 1-8 - Yonatan Katz, Danny Raz:
Cold Start for Cloud Anomaly Detection. 1-8 - Qiao Lu, Changcheng Huang:
Estimating the Performance of VNE Algorithms with a Novel Loss Network Model. 1-5 - Mehrdad Hajizadeh, Sudip Barua, Pegah Golchin:
FSA-IDS: A Flow-based Self-Active Intrusion Detection System. 1-9 - Niloy Saha, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:
MonArch: Network Slice Monitoring Architecture for Cloud Native 5G Deployments. 1-7 - Michael Miller, Anvitha Ramachandran, Alicia Esquivel Morel, Durbek Gafurov, Prasad Calyam:
Transmitting Information with Global-designation of Emergency Routes for Edge Video Processing. 1-7 - Alexander Keller, Jonathan Whitson:
Achieving Observability at Scale through Federated Learning. 1-6 - Farzad Tashtarian, Abdelhak Bentaleb, Hadi Amirpour, Babak Taraghi, Christian Timmerer, Hermann Hellwagner, Roger Zimmermann:
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming. 1-9 - László Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A. Antony Franklin:
5G on the roads: optimizing the latency of federated analysis in vehicular edge networks. 1-5 - Oscar G. Bautista, Kemal Akkaya:
MPC-as-a-Service: A Customizable Management Protocol for Running Multi-party Computation on IoT Devices. 1-6 - Cyprien Gueyraud, Nik Sultana:
Towards In-Network Semantic Analysis: A Case Study involving Spam Classification. 1-6 - Pyae Sone Aung, Loc X. Nguyen, Yan Kyaw Tun, Zhu Han, Choong Seon Hong:
Deep Reinforcement Learning based Spectral Efficiency Maximization in STAR-RIS-Assisted Indoor Outdoor Communication. 1-6 - José Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens:
Optimizing Network Slicing in Distributed Large Scale Infrastructures: From Heuristics to Controlled Deep Reinforcement Learning. 1-6 - Apurba Adhikary, Md. Shirajum Munir, Avi Deb Raha, Yu Qiao, Choong Seon Hong:
Artificial Intelligence Framework for Target Oriented Integrated Sensing and Communication in Holographic MIMO. 1-7 - Paul Seehofer, Roland Bless, Martina Zitterbart:
KeLLy - Efficient, Scalable Link Layer Topology Discovery. 1-5 - Enzo d'Andréa, Jérôme François, Olivier Festor, Mehdi Zakroum:
Multi-label Classification of Hosts Observed through a Darknet. 1-6 - Ashima Chawla, Anne-Marie Bosneag, Anestis Dalgkitsis:
Graph-based Interpretable Anomaly Detection Framework for Network Slice Management in Beyond 5G Networks. 1-6 - Cyril Shih-Huan Hsu, Jorge Martín-Pérez, Chrysa Papagianni, Paola Grosso:
V2N Service Scaling with Deep Reinforcement Learning. 1-5 - Pierre-Marie Junges, Jérôme François, Olivier Festor:
HiFiPot: a High-Fidelity Emulation Framework for Internet of Things Honeypots. 1-9 - Christian Lübben, Marc-Oliver Pahl:
Distributed Device-Specific Anomaly Detection using Deep Feed-Forward Neural Networks. 1-9 - Péter Revisnyei, Ferenc Mogyorósi, Zsófia Papp, István Töros, Alija Pasic:
Performance of a TDOA indoor positioning solution in real-world 5G network. 1-6 - Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto, Alberto Schaeffer-Filho:
Serene: Handling the Effects of Stragglers in In-Network Machine Learning Aggregation. 1-10 - Prasad Netalkar, Jiachen Chen, Dipankar Raychaudhuri:
mmCPTP: A Cross-Layer Pull based Transport Protocol for 5G mmWave Networks. 1-9 - Forough Shahab Samani, Kim Hammar, Rolf Stadler:
Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh. 1-3 - Panagiotis I. Nikolaidis, Asim Zoulkarni, John S. Baras:
Bandwidth Provisioning for Network Slices with Per User QoS Guarantees. 1-9 - Wissem Soussi, Maria Christopoulou, Themis Anagnostopoulos, Gürkan Gür, Burkhard Stiller:
TopoFuzzer - A Network Topology Fuzzer for Moving Target Defense in the Telco Cloud. 1-5 - Soumeya Kaada, Marie-Line Alberi-Morel, Gerardo Rubino, Sofiene Jelassi:
Measuring 5G-RAN Resilience Using Coverage and Quality of Service Indicators. 1-7 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
5GC-Observer Demonstrator: a Non-intrusive Observability Prototype for Cloud Native 5G System. 1-3 - Derek Phanekham, Kylie Jordan, Oliver Zhu, Suku Nair:
Accurate Bulk Throughput Benchmarks Using Reduced Network Resources. 1-5 - Andrés F. Ocampo, Mah-Rukh Fida, Juan Felipe Botero, Ahmed Elmokashfi, Haakon Bryhni:
PRINCIPIA: Opportunistic CPU and CPU-shares Allocation for Containerized Virtualization in Mobile Edge Computing. 1-7 - Christian Lübben, Marc-Oliver Pahl:
Distributed Device-Specific Anomaly Detection for Resource-Constrained Devices. 1-3 - Alessandro Aimi, Stéphane Rovedakis, Fabrice Guillemin, Stefano Secci:
ELoRa: End-to-end Emulation of Massive IoT LoRaWAN Infrastructures. 1-3 - Yanbo Zhou, Lei Feng, Kunyi Xie, Fanqin Zhou, Wenjing Li, Peng Yu:
Stable 5G Time Domain Resource Configuration for Synchronous Timing Services via Lyapunov Aided DRL. 1-5 - Parsa Ghaderi, J. William Atwood, Lata Narayanan:
Topology Discovery in Autonomic Networks. 1-7 - Harish S. A, Suvrima Datta, Hemanth Kothapalli, Praveen Tammana, Achmad Basuki, Kotaro Kataoka, Selvakumar Manickam, U. Venkanna, Yung-Wey Chong:
Scaling IoT MUD Enforcement using Programmable Data Planes. 1-9 - István Pelle, Bence Szoke, Abdulhalim Fayad, Tibor Cinkler, László Toka:
A Comprehensive Performance Analysis of Stream Processing with Kafka in Cloud Native Deployments for IoT Use-cases. 1-6 - Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour, Jorge Crichigno:
Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution. 1-6 - Daniel Soares, Marcos Carvalho, Daniel F. Macedo:
A Stacking Learning-Based QoE Model for Cloud Gaming. 1-6 - Omar Anser, Jérôme François, Isabelle Chrisment:
Auto-tuning of Hyper-parameters for Detecting Network Intrusions via Meta-learning. 1-6 - Mohammed Djahafi, Nabila Salmi:
Using Stochastic Petri net modeling for self-adapting Publish/Subscribe IoT systems. 1-4 - Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale:
SampleHST: Efficient On-the-Fly Selection of Distributed Traces. 1-9 - Xiaofu Huang, Guochu Shou, Yaqiong Liu, Zehua Gao, Yihong Hu:
Delay-bounded Topology Construction and Routing Integration for Time-critical Services. 1-6 - Mohamad Ahmadinejad, Tahmina Azmin, Nashid Shahriar:
5G Network Slice Type Classification using Traditional and Incremental Learning. 1-5 - Zolboo Erdenebaatar, Riyad Alshammari, Nur Zincir-Heywood, Marwa Elsayed, Biswajit Nandy, Nabil Seddigh:
Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones. 1-5 - Jonatas Adilson Marques, Luciano Paschoal Gaspary:
Advancing Network Monitoring and Operation with In-band Network Telemetry and Data Plane Programmability. 1-6 - Gonçalo Perna, Pedro Rito, Carlos Marques, Miguel Luís, Filipe Cabral Pinto, Susana Sargento:
Emergency and Infotainment Services through Mobility-based Dynamic and Predictive 5G Network Slicing. 1-6 - Selim Ickin, Dinand Roeland, Göran Hall:
Independent Split Model Inference at Operator Network for Network Performance Estimation. 1-9 - Jeronimo Bezerra, Italo Brito, Renata Frez, Julio Ibarra:
An adaptive and efficient approach to detect microbursts leveraging per-packet telemetry in a production network. 1-6 - Tommaso Caiazzi, Mariano Scazzariello, Samuele Quinzi, Lorenzo Ariemma, Maurizio Patrignani, Giuseppe Di Battista:
Nesting Containers for Faithful Datacenters Emulations. 1-4 - Alberto Huertas Celdrán, Jan von der Assen, Konstantin Moser, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices. 1-8 - Marco Polverini, Ilaria Germini, Antonio Cianfrani, Francesco Giacinto Lavacca, Marco Listanti:
A Digital Twin based Framework to Enable "What-If" Analysis in BGP Optimization. 1-6 - Hafiz Mati-ur-Rahman, Ghulam Bahoo, Lamees Zafar, Ibrahim Al-Oqily, Hasan Ali Khattak, Arsalan Ahmad:
Empirical Performance Evaluation of Open Source SDN Controllers in different Network Topologies. 1-6 - Hichem Sedjelmaci, Kamel Tourki:
A Distributed Zero Trust Framework for 6G RAN. 1-5 - Géza Szabó, Zalán Trombitás, József Peto, Thorsten Lohmar, István Komlósi, Tamás Pepó, Attila Vidács, Mátyás Andó:
Impact of Network Resource Management On Quality of Industrial Processes. 1-4 - Josef Hammer, Dragi Kimovski, Narges Mehran, Radu Prodan, Hermann Hellwagner:
C3-Edge - An Automated Mininet-Compatible SDN Testbed on Raspberry Pis and Nvidia Jetsons. 1-5 - Slawomir Kuklinski, Jordi Mongay Batalla, Janusz Pieczerak:
Dynamic and Multiprovider-based Resource Infrastructure in the NFV MANO Framework. 1-4 - Gabriel Lando, Lucas Augusto Fonseca Schierholt, Mateus Paludo Milesi, Juliano Araujo Wickboldt:
Evaluating the performance of open source software implementations of the 5G network core. 1-7 - Davi D. Gemmer, Bruno Henrique Meyer, Emerson Ribeiro de Mello, Marcos F. Schwarz, Michelle S. Wangham, Michele Nogueira:
A Scalable Cyber Security Framework for the Experimentation of DDoS Attacks of Things. 1-7 - Bruno Rodrigues, Eder J. Scheid, Julius Willems, Burkhard Stiller:
Real-time Medical Devices Inventory Tracking - a Hands-on Experience. 1-6 - Lucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo, Radu State:
XRP-NDN overlay: Improving the Communication Efficiency of Consensus-Validation based Blockchains with an NDN Overlay. 1-5 - Árpád Somogyi, Tamás Tettamanti, Pál Varga, Zsolt Szalay, Dániel Baranyai, Tamas Lovas:
Digital Map Generation Workflow Demonstrated on ZalaZONE Automotive Proving Ground Elements. 1-6 - Karim Boutiba, Miloud Bagaa, Adlen Ksentini:
On enabling 5G Dynamic TDD by leveraging Deep Reinforcement Learning and O-RAN. 1-3 - László Toka, Márk Konrád, István Pelle, Balázs Sonkoly, Marcell Szabó, Bhavishya Sharma, Shashwat Kumar, Madhuri Annavazzala, Sree Teja Deekshitula, A. Antony Franklin:
Federated learning for vehicular coordination use cases. 1-6 - Yusufu Shehu, Robert Harper:
Efficient Periodicity Analysis for Real-Time Anomaly Detection. 1-6 - Keval Malde, Venkatarami Reddy Chintapalli, Bhavishya Sharma, Bheemarjuna Reddy Tamma, A. Antony Franklin:
JARS: A Joint Allocation of Radio and System Resources for Virtualized Radio Access Networks. 1-9 - Arihant Samar, Krishna M. Sivalingam:
RL-based Virtual Network Embedding using VNF Sharing for Network Slicing in 5G Networks. 1-7 - Bruno Carneiro da Cunha, Daniel Macêdo Batista, Roberto Hirata Junior, Kifayat Ullah:
A Crash Response System using LoRa-based V2X Communications. 1-5 - Gaspard Baye, Priscila Silva, Alexandre Broggi, Lance Fiondella, Nathaniel D. Bastian, Gökhan Kul:
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems. 1-6 - Shiva Ketabi, Hongkai Chen, Haiwei Dong, Yashar Ganjali:
A Deep Reinforcement Learning Framework for Optimizing Congestion Control in Data Centers. 1-7 - János Czentye, István Pelle, Balázs Sonkoly:
Cost-optimal Operation of Latency Constrained Serverless Applications: From Theory to Practice. 1-10 - Frank Loh, Andrea Pimpinella, Stefan Geißler, Tobias Hoßfeld:
Uplink-based Live Session Model for Stalling Prediction in Video Streaming. 1-9 - Tianliang Zhang, Wendell Liu, Balagangadhar G. Bathula, Andrea Fumagalli:
ACTOR: Alarm Correlation and Ticketing for Open ROADM. 1-4 - Shi Wang, Siya Xu, Jiaxin Wang, Peng Yu, Ying Wang, Fanqin Zhou:
FRL-Assisted Edge Service Offloading Mechanism for IoT Applications in FiWi HetNets. 1-5 - Philippe Graff, Xavier Marchal, Thibault Cholez, Bertrand Mathieu, Olivier Festor:
Efficient Identification of Cloud Gaming Traffic at the Edge. 1-10 - Luyao Zou, Sheikh Salman Hassan, Yan Kyaw Tun, Zhu Han, Choong Seon Hong:
Energy Efficient Leaderless Softwarized UAV Network: Joint Intelligent User Association and Resource Allocation Design. 1-5 - Nguyen Van Tu, Kyungchan Ko, Sangwoo Ryu, Sangtae Ha, James Won-Ki Hong:
Improve Video Conferencing Quality with Deep Reinforcement Learning. 1-5 - Wissem Soussi, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Vincent Lefebvre, Gürkan Gür, Burkhard Stiller:
Demo: Closed-Loop Security Orchestration in the Telco Cloud for Moving Target Defense. 1-3 - Moad Dehbi, Yassin El Hillali, Atika Rivenq, Marwane Ayaida:
Comparative Analysis of 2D Object Detection Algorithms and real-time implementation using RTMAPS. 1-5 - Gustavo C. Eichler, Célia G. Ralha, Arman Farhang, Marcelo Antonio Marotta:
Combining NOMA-OMA with a Multiagent Architeture for Enhanced Spectrum Sharing in 6G. 1-7 - Venkatarami Reddy Chintapalli, Vishal Siva Kumar Giduturi, Bheemarjuna Reddy Tamma, A. Antony Franklin:
RAVIN: A Resource-aware VNF Placement Scheme with Performance Guarantees. 1-9 - Marcell Balogh, András Földvári, Pál Varga:
Digital Twins in Industry 5.0: Challenges in Modeling and Communication. 1-6 - Guan-Sheng Wang, Chih-Yu Lin, Yu-Chee Tseng, Lan-Da Van:
A Multilayer Perceptron Model for Station Grouping in IEEE 802.11ah Networks. 1-5 - Kodai Honda, Ryo Nakamura, Noriaki Kamiyama:
Characteristic Analysis of Socially-Aware Information-Centric Networking. 1-5 - Giles Winchester, George Parisis, Luc Berthouze:
On the Temporal Behaviour of a Large-Scale Microservice Architecture. 1-6 - Hannes Larsson, Farnaz Moradi, Jalil Taghia, Xiaoyu Lan, Andreas Johnsson:
Domain Adaptation for Network Performance Modeling with and without Labeled Data. 1-9 - Marios Avgeris, Aris Leivadeas, Ioannis Lambadaris:
A Reinforcement-Learning Self-Healing Approach for Virtual Network Function Placement. 1-5 - Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong, Jiawen Kang:
Stochastic Qubit Resource Allocation for Quantum Cloud Computing. 1-5 - Arthur Selle Jacobs, Ronaldo Alves Ferreira, Lisandro Zambenedetti Granville:
Enabling Self-Driving Networks with Machine Learning. 1-6 - Luís Rosa, Tiago Cruz, Paulo Simões, Edmundo Monteiro:
Intrusion and Anomaly Detection in Industrial Automation and Control Systems. 1-6 - Abderaouf Khichane, Ilhem Fajjari, Nadjib Aitsaadi, Mourad Guéroui:
5GC-Observer: a Non-intrusive Observability Framework for Cloud Native 5G System. 1-10 - Stefan Geißler, Tobias Hoßfeld:
Performance Evaluation of Next-Generation Data Plane Architectures and their Components. 1-6 - Selim Ickin:
Automated Feature Selection with Local Gradient Trajectory in Split Learning. 1-7 - Imed Ghnaya, Mohamed Mosbah, Hasnaâ Aniss, Toufik Ahmed:
Multi-Agent Advantage Actor-Critic Learning For Message Content Selection in Cooperative Perception Networks. 1-9 - Pietro Spadaccino, Sara Bruzzese, Francesca Cuomo, Flavio Luciani:
Analysis and emulation of BGP hijacking events. 1-4 - Pedro Almeida, Andreia Figueiredo, Pedro Rito, Miguel Luís, Susana Sargento:
On the Real Evaluation of a Collective Perception Service. 1-6 - Vladimir Marbukh:
Towards Security Metrics Combining Risks of Known and Zero-day Attacks: Work in Progress. 1-4 - Diana Pineda, Ricardo Harrilal-Parchment, Kemal Akkaya, Alexander Perez-Pons:
SDN-based GTP-U Traffic Analysis for 5G Networks. 1-4 - David Pop, Erkin Kirdan, Marc-Oliver Pahl:
Performance Comparison of UDP and TCP for Different CoAP Load Profiles. 1-6 - Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda:
Telemetry Knowledge Distributed Processing for Network Digital Twins and Network Resilience. 1-6 - Ioanna Angeliki Kapetanidou, Paulo Mendes, Vassilis Tsaoussidis:
Enhancing Security in Information-Centric Ad Hoc Networks. 1-9 - Diego O. Rodrigues, Torsten Braun, Guilherme Maia, Leandro Villas:
Mobility-aware Latency-constrained Data Placement in SDN-enabled Edge Networks. 1-9 - George Dimitrakopoulos, Thomas Gutt, Hans Ehm, Alfred Hoess, Konstantina Karathanasopoulou, Anna Lackner, Germar Schneider:
On the Way to Realize the 5th Industrial Revolution: Achievements, Challenges and Research Areas. 1-6 - Faiaz Nazmetdinov, Diego Preciado, Andreas Mitschele-Thiel:
Trust Me: Explainable ML in Self-Organized Network Management. 1-6 - Raza Ul-Mustafa, Md. Tariqul Islam, Christian Esteve Rothenberg, Pedro Henrique Gomes:
EFFECTOR: DASH QoE and QoS Evaluation Framework For EnCrypTed videO tRaffic. 1-8 - Youcef Magnouche, Sébastien Martin, Jérémie Leguay:
Protected load-balancing problem: Neural-network based approximation for non-convex optimization. 1-9 - Yujia Liu, Changqing An, Tao Yu, Zhiyan Zheng, Zidong Pei, Jilong Wang, Chalermpol Charnsripinyo:
Evaluating and Improving Regional Network Robustness from an AS TOPO Perspective. 1-7 - Mahdi Sharara, Sahar Hoteit, Véronique Vèque:
Reinforcement Learning based model for Maximizing Operator's Profit in Open-RAN. 1-5 - Nour Alhussien, Ahmed Aleroud:
A Novel Poisoning Attack on Few-Shot based Network Intrusion Detection. 1-5 - Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Chungang Yang, Yehua Zhao:
A Comprehensive Framework for Intent-Based Networking, Standards-Based and Open-Source. 1-6 - Thomas Feltin, Juan Antonio Cordero Fuertes, Frank Brockners, Thomas Heide Clausen:
Understanding Semantics in Feature Selection for Fault Diagnosis in Network Telemetry Data. 1-9 - Renato Valente, Carlos R. Senna, Pedro Rito, Susana Sargento:
Federated Learning Framework to Decentralize Mobility Forecasting in Smart Cities. 1-5 - Alessio Sacco, Guido Marchetto:
Towards Autonomous Computer Networks in Support of Critical Systems. 1-6 - Can Tan, Peng Yu, Wenjing Li, Fanqin Zhou, Ying Wang, Siya Xu, Xuesong Qiu, Qingbi Zheng, Pei Xiao:
Self-adaptive and Efficient Training Node Selection for Federated Learning in B5G/6G Edge Network. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.