default search action
16th Integrated Network and Service Management 2019: Washington, DC, USA
- Joe Betser, Carol J. Fung, Alex Clemm, Jérôme François, Shingo Ata:
IFIP/IEEE International Symposium on Integrated Network Management, IM 2019, Washington, DC, USA, April 09-11, 2019. IFIP 2019, ISBN 978-3-903176-15-7
Technical Sessions
- Xiang Chen, Dong Zhang, Xiaojun Wang, Kai Zhu, Haifeng Zhou:
P4SC: Towards High-Performance Service Function Chain Implementation on the P4-Capable Device. 1-9 - Yoann Desmouceaux, Marcel Enguehard, Victor Nguyen, Pierre Pfister, Wenqin Shao, Eric Vyncke:
A Content-aware Data-plane for Efficient And Scalable Video Delivery. 10-18 - Ângelo C. Lapolli, Jonatas Adilson Marques, Luciano Paschoal Gaspary:
Offloading Real-time DDoS Attack Detection to Programmable Data Planes. 19-27 - Hassan Halabian:
Optimal Distributed Resource Allocation in 5G Virtualized Networks. 28-35 - Manabu Nakanoya, Yoichi Sato, Hideyuki Shimonishi:
Environment-Adaptive Sizing and Placement of NFV Service Chains with Accelerated Reinforcement Learning. 36-44 - Boutheina Dab, Nadjib Aitsaadi, Rami Langar:
Q-Learning Algorithm for Joint Computation Offloading and Resource Allocation in Edge Cloud. 45-52 - Eder John Scheid, Bruno Rodrigues, Lisandro Zambenedetti Granville, Burkhard Stiller:
Enabling Dynamic SLA Compensation Using Blockchain-based Smart Contracts. 53-61 - Walter Cerroni, Luca Foschini, Genady Ya. Grabarnik, Larisa Shwartz, Mauro Tortonesi:
What-if Scenario Analysis for IT Services in Hybrid Cloud Environments with BDMaaS+. 62-70 - Andreas Gruhler, Bruno Rodrigues, Burkhard Stiller:
A Reputation Scheme for a Blockchain-based Network Cooperative Defense. 71-79 - Petra Vizarreta, Ermin Sakic, Wolfgang Kellerer, Carmen Mas Machuca:
Mining Software Repositories for Predictive Modelling of Defects in SDN Controller. 80-88 - Laurent Evrard, Jérôme François, Jean-Noël Colin:
Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis. 89-97 - Roland van Rijswijk-Deij, Gijs Rijnders, Matthijs Bomhoff, Luca Allodi:
Privacy-Conscious Threat Intelligence Using DNSBloom. 98-106 - Bart Spinnewyn, Juan Felipe Botero, Carlos Donato, Steven Latré:
Effective NFV Orchestration for Wide-Ranging Services Across Heterogeneous Cloud Networks. 107-115 - Stefan Schneider, Arnab Sharma, Holger Karl, Heike Wehrheim:
Specifying and Analyzing Virtual Network Services Using Queuing Petri Nets. 116-124 - Jorge Lobo, Windhya Rankothge, Helena Ramalhinho Lourenço:
On the Scaling of Virtualized Network Functions. 125-133 - Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots. 134-143 - Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba:
A Graph-Based Machine Learning Approach for Bot Detection. 144-152 - Agathe Blaise, Mathieu Bouet, Stefano Secci, Vania Conan:
Split and Merge: Detecting Unknown Botnets. 153-161 - Marinos Dimolianis, Adam Pavlidis, Dimitris Kalogeras, Vasilis Maglaris:
Mitigation of Multi-vector Network Attacks via Orchestration of Distributed Rule Placement. 162-170 - Marcel von Maltitz, Georg Carle:
Data Querying and Access Control for Secure Multiparty Computation. 171-179 - Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. 180-188 - Adyson Magalhães Maia, Yacine Ghamri-Doudane, Dario Vieira, Miguel Franklin de Castro:
Optimized Placement of Scalable IoT Services in Edge Computing. 189-197 - Andreas Johnsson, Christofer Flinta, Wenqing Yan:
Machine Learning Based Active Measurement Proxy for IoT Systems. 198-206 - Cheng Ding, Siya Xu, Xing-Yu Chen, Guiping Zhou, Peihao Zheng, Yueyue Li:
A Delay and Load-balancing based Hierarchical Route Planning Method for Transmission Line IoT Sensing and Monitoring applications. 207-215 - Li Li, Nana Du, Huanyu Liu, Ruifang Zhang, Chaobo Yan:
Towards robust controller placement in software-defined networks against links failure. 216-223 - Guiying Huang, Gang Chen, Qiang Fu, Elliott Wen:
Optimizing Controller Placement for Distributed Software-Defined Networks. 224-232 - Seyeon Jeong, Jae-Hyoung Yoo, James W. Hong:
Design and Implementation of Virtual TAP for SDN-based OpenStack networking. 233-241 - Andreas Johnsson, Farnaz Moradi, Rolf Stadler:
Performance Prediction in Dynamic Clouds using Transfer Learning. 242-250 - Tomás Jirsík, Stepan Trcka, Pavel Celeda:
Quality of Service Forecasting with LSTM Neural Networks. 251-260 - Van An Le, Phi-Le Nguyen, Yusheng Ji:
Deep Convolutional LSTM Network-based Traffic Matrix Prediction with Partial Information. 261-269 - Xujing Peng, Siya Xu, Shaoyong Guo, Xuesong Qiu, Shuyang Li, Botao Yu:
Collaborative Sleep Mechanism between Cross-domain Nodes in FiWi network based on load balancing and QoS awareness. 270-278 - Henrique Duarte Moura, Daniel Fernandes Macedo, Marcos Augusto Menezes Vieira:
Automatic Quality of Experience Management for WLAN Networks using Multi-Armed Bandit. 279-288 - Junxiu Zhou, Xian Liu, Yangyang Tao, Shucheng Yu:
QoS-Aware Power Management with Deep Learning. 289-294 - Baoju Liu, Peng Yu, Fangzheng Chen, Fang Chen, Xuesong Qiu, Lei Shi:
Risk-Aware Service Routes Planning for System Protection Communication Network in Energy Internet. 295-303 - Xuxia Zhong, Ying Wang, Xuesong Qiu:
Cost-aware Service Function Chaining With Reliability Guarantees in NFV-enabled Inter-DC Network. 304-311 - Mikael Gasparyan, Ali Marandi, Eryk Schiller, Torsten Braun:
Fault-Tolerant Session Support for Service-Centric Networking. 312-320 - Abhinava Sadasivarao, Sanjoy Bardhan, Sharfuddin Syed, Biao Lu, Loukas Paraschis:
Optonomic: Architecture for Autonomic Optical Transport Networks. 321-328 - Juan Camilo Vega, Qianfeng Shen, Alberto Leon-Garcia, Paul Chow:
Introducing ReCPRI: A Field Re-configurable Protocol for Backhaul Communication in a Radio Access Network. 329-336 - Khulan Batbayar, Roc Meseguer, Emmanouil Dimogerontakis, Leandro Navarro, Ramin Sadre:
Collaborative informed gateway selection in large-scale and heterogeneous networks. 337-345
IM 2019 Mini-Conference
- Bill McCormick, Hassan Halabian, Carol J. Fung:
Distributed Orchestration in Cloud Data Centers. 346-352 - Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie Quan:
Thinking inside the Box: Differential Fault Localization for SDN Control Plane. 353-359 - Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda, Hiroaki Harai:
Using Real-World Event Notifications to Reduce Operational Cost in Virtual Networks. 360-366 - Tao Li, Hani Salah, Xin Ding, Thorsten Strufe, Frank H. P. Fitzek, Silvia Santini:
INFAS: In-Network Flow mAnagement Scheme for SDN Control Plane Protection. 367-373 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Automated Factorization of Security Chains in Software-Defined Networks. 374-380 - Jeroen van der Hooft, Maria Torres Vega, Stefano Petrangeli, Tim Wauters, Filip De Turck:
Optimizing Adaptive Tile-Based Virtual Reality Video Streaming. 381-387 - Sheyda Kiani Mehr, Deep Medhi:
QoE Performance for DASH Videos in a Smart Cache Environment. 388-394 - Noriaki Kamiyama:
Recovering Content Availability at Failures in ICN. 395-401 - Xin Zhang, Ru Li:
A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDN. 402-407 - Elaheh Jalalpour, Milad Ghaznavi, Raouf Boutaba, Toufik Ahmed:
TMAS: A Traffic Monitoring Analytics System Leveraging Machine Learning. 408-414 - Jun Xu, Carol J. Fung:
A Risk-defined Trust Transitivity Model for Group Decisions in Social Networks. 415-420 - Michael Schmidt, Michael Brenner, Thomas Schaaf:
IT Service Management Frameworks Compared - Simplifying Service Portfolio Management. 421-427 - Takuya Kuwahara, Takayuki Kuroda, Manabu Nakanoya, Yutaka Yakuwa, Yoichi Sato, Yasuhiro Matsunaga:
Automated Planning of System Rollback in Declarative IT System Update. 428-434 - Madanagopal Ramachandran, Anix Anbiah, Krishna M. Sivalingam:
Capacity Optimization based on Traffic Grooming in Transport Networks. 435-441 - Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. 442-447 - Marc-Oliver Pahl, Stefan Liebald:
A Modular Distributed IoT Service Discovery. 448-454 - Marc-Oliver Pahl, Lorenzo Donini:
Giving IoT Services an Identity and Changeable Attributes. 455-461 - Nitin Varyani, Zhi-Li Zhang, Muralidharan Rangachari, David H. Dai:
LADEQ: A Fast Lagrangian Relaxation Based Algorithm for Destination-Based QoS Routing. 462-468 - Keke Fan, Ying Wang, Junhua Ba, Wenjing Li, Qi Li:
An Approach for Energy Efficient Deadline-Constrained Flow Scheduling and Routing. 469-475 - Xiao Yang, Peng Yu, Lei Feng, Fanqin Zhou, Wenjing Li, Xuesong Qiu:
A Deep Reinforcement Learning based Mechanism for Cell Outage Compensation in 5G UDN. 476-481 - Jiahui Wu, Peng Yu, Lei Feng, Fanqin Zhou, Wenjing Li, Xuesong Qiu:
3D Aerial Base Station Position Planning based on Deep Q-Network for Capacity Enhancement. 482-487
Mini-Conference Experience Session
- Jarrod N. Bakker, Bryan C. K. Ng, Winston K. G. Seah, Adrián Pekár:
Traffic Classification with Machine Learning in a Live Network. 488-493 - Poojitha Amin, Ludmila Cherkasova, Rob Aitken, Vikas Kache:
Analysis and Demand Forecasting of Residential Energy Consumption at Multiple Time Scales. 494-499 - Myron Hecht, David Baum, Joe Betser:
Automated Failure Modes and Effects Analysis using SysML for Industrial Computer Network Reliability and Cybersecurity. 500-514 - Wassim Sellil Atoui, Imen Grida Ben Yahia, Walid Gaaloul:
Virtual Network Function Descriptors Mining using Word Embeddings and Deep Neural Networks. 515-520 - Milan Cermák, Martin Lastovicka, Tomás Jirsík:
Real-time Pattern Detection in IP Flow Data using Apache Spark. 521-526 - Mohamed Abdelkrim Senouci, Abdelhamid Mellouk:
Flow/Interface Association for Multi-interface Mobile Terminals: e-Health case proposal. 527-532
Experience Sessions
- Bruno Rodrigues, Lukas Eisenring, Eder J. Scheid, Thomas Bocek, Burkhard Stiller:
Evaluating a Blockchain-based Cooperative Defense. 533-538 - Liang-Min Wang, Alex Zelezniak, E. Scott Daniels, Timothy Miskell, Li-De Chen:
Build an SR-IOV Hypervisor. 539-544 - Xiaoban Wu, Timothy Miskell, Yan Luo, Liang-Min Wang, Li-De Chen:
Edison: Event-driven Distributed System of Network Measurement. 545-550 - Stanislav Spacek, Martin Lastovicka, Martin Horák, Tomas Plesnik:
Current Issues of Malicious Domains Blocking. 551-556 - Jan Wrona, Martin Zádník:
Low Overhead Distributed IP Flow Records Collection and Analysis. 557-562 - Junichi Kawasaki, Seiya Sumita, Genichi Mouri, Masanori Miyazawa, Takehiro Tsuritani:
Versatile Optical Path Calculation and Monitoring Using Common YANG Model. 563-568 - Pavel Celeda, Petr Velan, Benjamin Kral, Ondrej Kozak:
Enabling SSH Protocol Visibility in Flow Monitoring. 569-574 - Bálint Gyires-Tóth, Pál Varga, Tamas Tothfalusi:
Utilizing Deep Learning for Mobile Telecommunications Network Management. 575-580
Poster Sessions
- Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
SDN Enabled Secure IoT Architecture. 581-585 - Leyi Zhang, Ying Wang, Xuesong Qiu, Hantao Guo:
Redundancy mechanism of Service Function Chain with Node-Ranking Algorithm. 586-589 - Wenchen He, Xiong Chen, Xuesong Qiu, Shaoyong Guo, Peng Yu:
ASCO: An Availability-aware Service Chain Orchestration. 590-593 - Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. 594-598 - Vitor A. Cunha, Eduardo da Silva, Marcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Rui L. Aguiar:
Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipment. 599-603 - Rafael L. Gomes, Francisco R. P. da Ponte, Arthur Urbano, Alan Vasconselos, Luiz F. Bittencourt, Edmundo R. M. Madeira:
Energy-Aware Slicing of Network Resources based on Elastic Demand through Daytime. 604-608 - Eder J. Scheid, Bruno Rodrigues, Burkhard Stiller:
Toward a Policy-based Blockchain Agnostic Framework. 609-613 - Wenji Zhang, Wenan Zhou, Jun Luo:
Mining And Application of User Behavior Pattern Based on Operation And Maintenance Data. 614-618 - Antoine Messager, George Parisis, Istvan Z. Kiss, Robert Harper, Phil Tee, Luc Berthouze:
Functional Topology Inference from Network Events. 619-623 - Francisco R. P. da Ponte, Rafael L. Gomes, Joaquim Celestino Jr., Walisson F. Pereira, Nelson L. S. da Fonseca:
CASH: A Channel Assigner Algorithm for Heterogeneous Devices in Smart Homes. 624-628 - Mercy O. Jaiyeola, Maxwell Young, Jin Xiao, Hugh R. Medal, Greg Grimes, David Schweitzer:
Towards Scalable Planning of Wireless Networks. 629-633 - Arkadeep Sen, Krishna M. Sivalingam, Babu Narayanan K. J:
Persistent WiFi connectivity during Train journey: An SDN based approach. 634-638 - Lina Hao, Bryan C. K. Ng:
Self-healing solutions for Wi-Fi networks to provide seamless handover. 639-642 - Ahmad Salehi S., Carsten Rudolph, Marthie Grobler:
A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application. 643-648 - Jawad Ahmed, Hassan Habibi Gharakheili, Qasim Raza, Craig Russell, Vijay Sivaraman:
Real-Time Detection of DNS Exfiltration and Tunneling from Enterprise Networks. 649-653 - Wenjie Xu, Deliang Chang, Xing Li:
On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation. 654-658
Dissertation Sessions
- Lianjie Cao, Sonia Fahmy, Puneet Sharma:
Data-driven Resource Allocation in Virtualized Environments. 659-664 - Luca Vassio, Marco Mellia:
Data Analysis and Modelling of Users' Behavior on the Web. 665-670 - Daniel Tovarnák, Tomás Pitner:
Normalization of Unstructured Log Data into Streams of Structured Event Objects. 671-676 - Andreas Blenk, Wolfgang Kellerer:
Towards Virtualization of Software-Defined Networks: A Journey in Three Acts. 677-682 - Stefano Petrangeli, Tim Wauters, Filip De Turck:
QoE-Centric Network-Assisted Delivery of Adaptive Video Streaming Services. 683-688 - Shuai Yu, Rami Langar:
Collaborative Computation Offloading for Multi-access Edge Computing. 689-694 - Diman Zad Tootaghaj, Thomas La Porta, Ting He:
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures. 695-700 - Petr Velan, Pavel Celeda:
Application-Aware Flow Monitoring. 701-706
Demonstration Sessions
- Thomas Soenen, Felipe Vicens, José Bonnet, Carlos Parada, Evgenia Kapassa, Marios Touloupou, Eleni Fotopoulou, Anastasios Zafeiropoulos, Ana Pol, Stavros Kolometsos, George Xilouris, Pol Alemany, Ricard Vilalta, Panos Trakadas, Panos Karkazis, Manuel Peuster, Wouter Tavernier:
SLA-controlled Proxy Service Through Customisable MANO Supporting Operator Policies. 707-708 - Amina Boubendir, Fabrice Guillemin, Sylvaine Kerboeuf, Barbara Orlandi, Frédéric Faucheux, Jean-Luc Lafragette:
Network Slice Life-Cycle Management Towards Automation. 709-711 - Koteswararao Kondepu, Francesco Giannone, Serdar Vural, Björn Riemer, Piero Castoldi, Luca Valcarenghi:
Experimental Demonstration of 5G Virtual EPC Recovery in Federated Testbeds. 712-713 - Hiroki Nakayama, Tsunemasa Hayashi:
Connection Integration System for ICT Infrastructure Management. 714-715 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
A Tool Suite for the Automated Synthesis of Security Function Chains. 716-717 - Jordan Augé, Marcel Enguehard:
A network protocol for distributed orchestration using intent-based forwarding. 718-719 - Saranya Krishnan, Min Chen:
Cloud-Based System for Fake Tweet Identification. 720-721 - Nicolas Marie-Magdelaine, Toufik Ahmed, Gauthier Astruc-Amato:
Demonstration of an Observability Framework for Cloud Native Microservices. 722-724 - Gousiya Farheen Shaik, Min Chen:
ViDupe-Duplicate Video Detection as a Service in Cloud. 725-726 - Mingxiao Ma, Abdelkader Lahmadi, Isabelle Chrisment:
Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids. 727-728 - Jawad Ahmed, Hassan Habibi Gharakheili, Qasim Raza, Craig Russell, Vijay Sivaraman:
Demo Abstract: A Tool to Detect and Visualize Malicious DNS Queries for Enterprise Networks. 729-730 - Nicholas Gray, Alexej Grigorjew, Tobias Hoßfeld, Apoorv Shukla, Thomas Zinner:
Highlighting the Gap Between Expected and Actual Behavior in P4-enabled Networks. 731-732 - Xiaoban Wu, Chen Xu, Yan Luo, Cody Bumgardner, Gabriel Ghinita, Michael McGarry:
AMIS: Programmable Privacy-Preserving Network Measurement for Analysis and Troubleshooting. 733-734 - Adam Pavlidis, Marinos Dimolianis, Dimitris Kalogeras, Vasilis Maglaris:
Automated Distribution of Access Control Rules in Defense Layers of an Enterprise Network. 735-736 - Pulkit Rustgi, Carol J. Fung:
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing. 737-738 - Schmidt Michael, Ziegler Jule Anna:
An Identity Provider as a Service platform for the eduGAIN research and education community. 739-740 - Martin Drasar, Tomás Jirsík:
IT Operations Analytics: Root Cause Analysis via Complex Event Processing. 741-742 - Stanislav Spacek, Vít Rusnák, Anna-Marie Dombajova:
DNS Firewall Data Visualization. 743-744 - Forough Shahab, Rolf Stadler, Andreas Johnsson, Christofer Flinta:
Demonstration: Predicting Distributions of Service Metrics. 745-746 - Laurent Evrard, Jérôme François, Jean-Noël Colin, Frédéric Beck:
port2dist: Semantic Port Distances for Network Analytics. 747-748
5th IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)
- Duc C. Le, Nur Zincir-Heywood:
Machine learning based Insider Threat Modelling and Detection. 1-6 - Pierre-Marie Junges, Jérôme François, Olivier Festor:
Passive Inference of User Actions through IoT Gateway Encrypted Traffic Analysis. 7-12 - James Griffioen, Zongming Fei, P. Sergio Rivera, Jacob Chappell, Mami Hayashida, Pinyi Shi, Charles Carpenter, Yongwook Song, Bhushan Chitre, Hussamuddin Nasir, Kenneth L. Calvert:
Leveraging SDN to Enable Short-Term On-Demand Security Exceptions. 13-18 - Alaa T. Al Ghazo, Ratnesh Kumar:
ICS/SCADA Device Recognition: A Hybrid Communication-Patterns and Passive-Fingerprinting Approach. 19-24 - Cora Lisa Perner, Holger Kinkelin, Georg Carle:
Adaptive Network Management for Safety-Critical Systems. 25-30
4th IEEE/IFIP International Workshop on Analytics for Network and Service Management
- Golnazsadat Zargarian, Luca Vassio, Maurizio M. Munafò, Marco Mellia:
Mining Patterns in Mobile Network Logs. 1-6 - Markus Wurzenberger, Max Landauer, Florian Skopik, Wolfgang Kastner:
AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis. 7-12 - Robert Harper, Philip Tee:
A Method for Temporal Event Correlation. 13-18 - Aggelos Lazaris, Viktor K. Prasanna:
An LSTM Framework For Modeling Network Traffic. 19-24 - Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood:
Network Analytics for Streaming Traffic Analysis. 25-30 - Sanaz Mohammadjafari, Emir Kavurmacioglu, John Maidens, Ayse Bener:
Neural Network Based Spectrum Prediction in Land Mobile Radio Bands for IoT deployments. 31-36 - Georgios Kaiafas, Christian A. Hammerschmidt, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles. 37-42 - Maxime Mouchet, Sandrine Vaton, Thierry Chonavel:
Statistical Characterization of Round-Trip Times with Nonparametric Hidden Markov Models. 43-48 - Jonathan Kelly, Michael DeLaus, Erik Hemberg, Una-May O'Reilly:
Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network. 49-54 - Nong Ye, Douglas Montgomery, Kevin Mills, Mark Carson:
Multivariate Metrics of Normal and Anomalous Network Behaviors. 55-58 - Arun Adiththan, Kaliappa Ravindran:
Model-based System Identification for Cloud Services Analytics. 59-62 - Faouzi Amrouche, Sofiane Lagraa, Georgios Kaiafas, Radu State:
Graph-based malicious login events investigation. 63-66 - Nik Sultana, Pardis Pashakhanloo, Zihao Jin, Achala Rao, Boon Thau Loo:
Hashtray: Turning the tables on Scalable Client Classification. 67-70 - Ali Safari Khatouni, Francesca Soro, Danilo Giordano:
A Machine Learning Application for Latency Prediction in Operational 4G Networks. 71-74
Workshop on Hot Topics in Network and Service Management (HotNSM)
- Marc-Oliver Pahl:
Multi-Tenant IoT Service Management towards an IoT App Economy. 1-4 - Holger Kinkelin, Heiko Niedermayer, Marc Müller, Georg Carle:
Multi-party authorization and conflict mediation for decentralized configuration management processes. 5-8 - Marc-Oliver Pahl, Stefan Liebald, Lars Wustrich:
Machine-Learning based IoT Data Caching. 9-12 - Bogdan Rusti, Horia Stefanescu, Marius Iordache, Jean Ghenta, Cristian Patachia, Panagiotis Gouvas, Anastasios Zafeiropoulos, Eleni Fotopoulou, Qi Wang, José M. Alcaraz Calero:
5G Smart City Vertical Slice. 13-19 - Michail-Alexandros Kourtis, George Xilouris, Dimitris Makris, Athanasios Sarlas, Thomas Soenen, Harilaos Koumaras, Anastasios Kourtis:
An End-to-End Carrier Ethernet MEF enabled 5G network architecture. 20-24 - Antonio La Marra, Alessio Lunardelli, Fabio Martinelli, Paolo Mori, Andrea Saracino, Piero Castoldi, Francesco Martino, Barbara Martini:
Enhancing Security in ETSI Open Source MANO with Usage Control Capability. 25-29 - Yao Dai, Zhuo Yu, Yong Yan, Shaoyong Guo, Sujie Shao:
A Blockchain-Based Decentralized Wi-Fi Sharing Mechanism. 30-35 - Roman Blum, Thomas Bocek:
Superlight - A Permissionless, Light-client Only Blockchain with Self-Contained Proofs and BLS Signatures. 36-41
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.