


default search action
NOMS 2018: Taipei, Taiwan
- 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS 2018, Taipei, Taiwan, April 23-27, 2018. IEEE 2018, ISBN 978-1-5386-3416-5

- Sina Rafati Niya, Florian Shupfer, Thomas Bocek, Burkhard Stiller:

Setting up flexible and light weight trading with enhanced user privacy using smart contracts. 1-2 - Muhammad Tahir Abbas, Talha Ahmed Khan, Asif Mahmood

, Javier Jose Diaz Rivera, Wang-Cheol Song:
Introducing network slice management inside M-CORD-based-5G framework. 1-2 - Leonhard Nobach, Jeremias Blendin, Hans-Jörg Kolbe, Georg Schyguda, David Hausheer:

RTP packet loss healing on a bare-metal switch. 1-2 - Lukas Kekely

, Martin Spinler, Stepan Friedl, Jiri Sikora, Jan Korenek:
Live demonstration of FPGA based networking accelerator for 200 Gbps data transfers. 1-3 - Song Wang, Karina Gomez Chavez, Kandeepan Sithamparanathan

, Paul Zanna
:
The smallest software defined network testbed in the world: Performance and security. 1-2 - Sven van der Meer

, John Keeney, Liam Fallon, Joseph McNamara
:
Demo: Adaptive policy execution (APEX). 1-2 - Marc-Oliver Pahl

, Francois-Xavier Aubet, Stefan Liebald:
Graph-based IoT microservice security. 1-3 - Emmanouil Vasilomanolakis

, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser:
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot. 1-2 - Jeremy Singer

, Herry Herry, Philip James Basford
, Wajdi Hajji, Colin S. Perkins
, Fung Po Tso
, Dimitrios Pezaros, Robert D. Mullins
, Eiko Yoneki, Simon J. Cox, Steven J. Johnston
:
Next generation single board clusters. 1-3 - Petr Velan

, Martin Husák
, Daniel Tovarnák:
Rapid prototyping of flow-based detection methods using complex event processing. 1-3 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:

Synaptic: A formal checker for SDN-based security policies. 1-2 - Jing-Yung Fang, Taiho Lin, Calvin Chang, Cheng-Feng Yang, Hsu-Chi Su, Che-Yu Lu, Bo-Chun Wang, Ching-Han Hung, Pi-Chen Chiu, Miles Wang, Din-Bin Lin, Chun-Ting Chou, Tsang-Ling Sheu, Shi-Chung Chang:

Licensed shared access by mobile networks: Proof-of-concept demonstration over ViSSA platform. 1-2 - Balázs Nagy, Peter Orosz, Pál Varga:

Low-reaction time FPGA-based DDoS detector. 1-2 - Jana Komárková, Lukás Sadlek, Martin Lastovicka

:
Community based platform for vulnerability categorization. 1-2 - Tao Li, Yuanjun Sun, Marek Sobe, Thorsten Strufe, Silvia Santini:

Energy-efficient SDN control and visualization. 1-2 - Frank Loh, Theodoros Karagkioules, Michael Seufert

, Bernd Zeidler, Dimitrios Tsilimantos
, Phuoc Tran-Gia, Stefan Valentin
, Florian Wamser:
Demo: A wrapper for automated measurements with YouTube's native app. 1-2 - Martin Lastovicka

, Daniel Filakovsky:
Passive os fingerprinting prototype demonstration. 1-2 - Guan-Ru Wang, Chien Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu:

Streaming scalable video sequences with media-aware network elements implemented in P4 programming language. 1-2 - Mikolaj Chwalisz:

Demonstration of efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11. 1-2 - Maxime Compastié

, Remi Badonnel, Olivier Festor
, Ruan He:
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. 1-2 - Tomás Jirsík

:
Stream4Flow: Real-time IP flow host monitoring using Apache Spark. 1-2 - Yu-Chen Hsieh, Hua-Jun Hong, Pei-Hsuan Tsai

, Yu-Rong Wang, Qiuxi Zhu
, Md. Yusuf Sarwar Uddin
, Nalini Venkatasubramanian, Cheng-Hsin Hsu:
Managed edge computing on Internet-of-Things devices for smart city applications. 1-2 - Shuai Zhao, Deep Medhi:

Application performance optimization using application-aware networking. 1-6 - Amina Boubendir, Emmanuel Bertin, Noemie Simoni:

Flexibility and dynamicity for open network-as-a-service: From VNF and architecture modeling to deployment. 1-6 - Michael Seufert

, Phuoc Tran-Gia:
Quality of experience and access network traffic management of HTTP adaptive video streaming. 1-8 - Safiqul Islam, Michael Welzl

, Stein Gjessing:
Lightweight and flexible single-path congestion control coupling. 1-6 - Yixin Diao, Daniela Rosu:

Improving response accuracy for classification- based conversational IT services. 1-15 - Thomas Soenen, Steven van Rossem, Wouter Tavernier, Felipe Vicens, Dario Valocchi, Panos Trakadas, Panos Karkazis

, George Xilouris
, Philip Eardley, Stavros Kolometsos, Michail-Alexandros Kourtis
, Daniel Guija, Muhammad Shuaib Siddiqui, Peer Hasselmeyer, José Bonnet, Diego R. López:
Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. 1-6 - Thomas Lin, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia:

Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbed. 1-7 - Hung-Cheng Chang, Bo-Jun Qiu, Chen-Hao Chiu, Jyh-Cheng Chen, Fuchun Joseph Lin

, David de la Bastida, Bao-Shuh Paul Lin:
Performance evaluation of Open5GCore over KVM and Docker by using Open5GMTC. 1-6 - Yongyi Ran, Xiaoban Wu, Peilong Li, Chen Xu, Yan Luo, Liang-Min Wang:

EQuery: Enable event-driven declarative queries in programmable network measurement. 1-7 - Alexander Keller, Chris Dawson:

Months into minutes: Rolling out changes faster with service management automation. 1-14 - Joseph McNamara

, John Keeney, Liam Fallon, Sven van der Meer
, Enda Fallon
:
A testbed for policy driven closed loop network management. 1-6 - Hongtan Sun, Karin Murthy, Raghav Batta, Maja Vukovic:

Using domain knowledge for targeted alerting in PBA for IT service management. 1-6 - Mikolaj Chwalisz

, Adam Wolisz:
Towards efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11. 1-7 - Alessandro Raschellà, Faycal Bouhafs

, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
AP selection algorithm based on a potential game for large IEEE 802.11 WLANs. 1-7 - Xin Zhang, Lanlan Rui, Jiawen Li, Xuesong Qiu, Shaoyong Guo, Wei Lin:

Multi-constrained maximally disjoint routing mechanism. 1-7 - Shinnazar Seytnazarov

, Young-Tak Kim:
QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs. 1-7 - Shaoteng Liu, Rebecca Steinert, Dejan Kostic

:
Flexible distributed control plane deployment. 1-7 - Lingyu Zhang, Ying Wang, Xuxia Zhong, Wenjing Li, Shaoyong Guo:

Resource-saving replication for controllers in multi controller SDN against network failures. 1-7 - Sixiang Feng, Ying Wang, Xuxia Zhong, Junran Zong, Xuesong Qiu, Shaoyong Guo:

A ring-based single-link failure recovery approach in SDN data plane. 1-7 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:

Generation of SDN policies for protecting android environments based on automata learning. 1-7 - Roben Castagna Lunardi

, Regio Antonio Michelin, Charles Varlei Neu, Avelino Francisco Zorzo
:
Distributed access control on IoT ledger-based architecture. 1-7 - Maxime Compastié

, Remi Badonnel, Olivier Festor
, Ruan He, Mohamed Kassi-Lahlou:
Unikernel-based approach for software-defined security in cloud infrastructures. 1-7 - Khalid Shahbar, Nur Zincir-Heywood

:
How far can we push flow analysis to identify encrypted anonymity network traffic? 1-6 - Amir Teshome, Louis Rilling, Christine Morin:

Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS. 1-7 - Fabian Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, David Hausheer:

Energy models for NFV and service provisioning on fog nodes. 1-7 - Yibin Cai, Ying Wang, Xuxia Zhong, Wenjing Li, Xuesong Qiu, Shaoyong Guo:

An approach to deploy service function chains in satellite networks. 1-7 - Takashi Miyamura

, Akira Misawa, Junichi Kani
:
Decomposition-based VNF placement algorithm in TDM-WDM-based optical aggregation network. 1-7 - Michel S. Bonfim, Rafael Roque, Emanuel F. Coutinho, Kelvin Lopes Dias, Stenio Fernandes:

Identifying performance bottlenecks in software data planes for cloud-based NFV services. 1-7 - Michael Steinke, Wolfgang Hommel:

A data model for federated network and security management information exchange in inter-organizational IT service infrastructures. 1-2 - Huan Zhao, Meng Li:

Centroid-based KNN query in mobile service of LBS. 1-6 - Yu-Chang Ho, Pei-Chen Lee, Hsin-Yu Yeh, Min-Te Sun, Andy An-Kai Jeng:

An IMU-based turn prediction system. 1-6 - Marc-Oliver Pahl

, Markus Loipfinger:
Machine learning as a reusable microservice. 1-7 - Tomás Jirsík

, Pavel Celeda
:
Toward real-time network-wide cyber situational awareness. 1-7 - Alisson R. Alves, Henrique D. Moura

, Jonas R. A. Borges, Vinícius F. S. Mota, Luis H. Cantelli, Daniel F. Macedo
, Marcos Augusto M. Vieira:
HomeNetRescue: An SDN service for troubleshooting home networks. 1-7 - Jonghwan Hyun, Nguyen Van Tu, James Won-Ki Hong:

Towards knowledge-defined networking using in-band network telemetry. 1-7 - Bogdan Andrus, Achim Autenrieth, Thomas Szyrkowiec, J. J. Vegas Olmos, Idelfonso Tafur Monroy

:
Evaluation and experimental demonstration of SDN-enabled flexi-grid optical domain controller based on NETCONF/YANG. 1-7 - Vilho Räisänen, Nokia Bell, Kasper Apajalahti:

Reasoning in agent-based network management. 1-7 - Sven van der Meer

, John Keeney, Liam Fallon:
Taming policy complexity: Model to execution. 1-8 - Tony Daher, Sana Ben Jemaa, Laurent Decreusefond:

Softwarized and distributed learning for SON management systems. 1-7 - Xuxia Zhong, Ying Wang, Xuesong Qiu, Shaoyong Guo:

Cost-aware service function chain orchestration across multiple data centers. 1-7 - Neeraj Asthana, Tom Chefalas, Alexei A. Karve, Alla Segal, Mahika Dubey, Sai Zeng:

A declarative approach for service enablement on hybrid cloud orchestration engines. 1-7 - Pedro Martinez-Julia

, Ved P. Kafle
, Hiroaki Harai:
Filtering observations to improve resource control in virtual computer and network systems. 1-7 - Yanfu Jiang, Shaoyong Guo, Si-Ya Xu, Xuesong Qiu, Luoming Meng:

Resource discovery and share mechanism in disconnected ubiquitous stub network. 1-7 - Xueyao Zhao, Lei Feng, Xiao Cheng, Wenjing Li, Peng Yu, Xuesong Qiu, Lei Wei:

Spectrum allocation with differential pricing and admission in cognitive-radio-based neighborhood area network for smart grid. 1-7 - Andreas Johnsson, Christian Rohner:

On performance observability in IoT systems using active measurements. 1-5 - Tzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, Ce-Kuen Shieh:

Distributed control framework for mapreduce cloud on cloud computing. 1-4 - Itai Dabran, Ofir Elmakias, Ron Shmelkin, Yishai Zusman:

An intelligent sound alam recognition system for smart cars and smart homes. 1-4 - Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache

:
A green VNFs placement and chaining algorithm. 1-5 - Rakesh Shrestha

, Rojeena Bajracharya, Seung Yeob Nam:
Centralized approach for trustworthy message dissemination in VANET. 1-5 - Sven van der Meer

, John Keeney, Liam Fallon:
5G networks must be autonomic! 1-5 - Ricardo Bianchin Gomes, Roseclea Duarte Medina, Fernando Gomes Moro:

Cloud aid - A cloud computing tool for mitigating side-channel attacks. 1-5 - Xiaotong Wang, Lanlan Rui, Hui Guo, Xuesong Qiu:

Load-aware potential-based routing for the edge communication of smart grid with content-centric network. 1-5 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Michael Meinig, Feng Cheng, Christoph Meinel, Hendrik Graupner
:
A threat modeling approach for cloud storage brokerage and file sharing systems. 1-5 - Marc-Oliver Pahl

, Lorenzo Donini:
Securing IoT microservices with certificates. 1-5 - Tsozen Yeh, Tingyu Chien:

Building a version control system in the Hadoop HDFS. 1-5 - Heewon Kim, Yoonhee Kim:

An adaptive data placement strategy in scientific workflows over cloud computing environments. 1-5 - Linda Shif, Fei Wang, Chung-Horng Lung:

Improvement of security and scalability for IoT network using SD-VPN. 1-5 - Yuki Minami, Atsushi Taniguchi, Taichi Kawabata, Norio Sakaida, Katsuhiro Shimano:

An architecture and implementation of automatic network slicing for microservices. 1-4 - Yangjun Qiu, Xiaofeng Qiu, Yibin Cai:

Service function chaining policy compliance checking. 1-4 - Saoussen Chaabnia

, Aref Meddeb
:
Slicing aware QoS/QoE in software defined smart home network. 1-5 - Song Wang, Sathyanarayanan Chandrasekharan, Karina Mabell Gomez, Kandeepan Sithamparanathan

, Akram Al-Hourani
, Muhammad Rizwan Asghar
, Giovanni Russello, Paul Zanna
:
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks. 1-5 - Estefanía Coronado, Davit Harutyunyan, Roberto Riggio

, José Villalón
, Antonio Garrido:
Wi-Not: Exploiting radio diversity in software-defined 802.11-based WLANs. 1-4 - Xia Zhen, Lanlan Rui, Xuesong Qiu, Biyao Li, Peng Yu:

A backup algorithm for power communication network based on fault cascade in the network virtualization environment. 1-5 - Abdelhadi Azzouni, Guy Pujolle:

NeuTM: A neural network-based framework for traffic matrix prediction in SDN. 1-5 - Sharat Chandra Madanapalli, Minzhao Lyu

, Himal Kumar
, Hassan Habibi Gharakheili
, Vijay Sivaraman:
Real-time detection, isolation and monitoring of elephant flows using commodity SDN system. 1-5 - Erik de Britto e Silva

, Henrique D. Moura
, Gabriel Fanelli, Manoel da Rocha Miranda, Daniel Fernandes Macedo
, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:
Comparison of data center traffic division policies using SDN. 1-5 - Junhua Ba, Ying Wang, Xuxia Zhong, Sixiang Feng, Xuesong Qiu, Shaoyong Guo:

An SDN energy saving method based on topology switch and rerouting. 1-5 - Petr Velan

:
Improving network flow definition: Formalization and applicability. 1-5 - Li-Hsing Yen, Ming-Hung Wang, Song-Yu Wu, Chien-Chao Tseng

:
PIM-compliant SDN-enabled IP multicast service. 1-4 - Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski:

HoneyV: A virtualized honeynet system based on network softwarization. 1-5 - Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez

, Guillaume Doyen, Wissam Mallouli, Olivier Festor
:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. 1-5 - Woojoong Kim, James Won-Ki Hong, Young-Joo Suh:

Live distributed controller migration for software-defined data center networks. 1-5 - Hongyu Deng, Yiming Wang, Cheng Wu:

Cognitive radio : A method to achieve spectrum sharing in LTE-R system. 1-5 - Takuma Tsubaki, Mika Ishizuka, Seisho Yasukawa:

A new algorithm of route design against large-scale disasters. 1-5 - Sheyda Kiani Mehr, Parikshit Juluri, Mahesh Maddumala

, Deep Medhi:
An adaptation aware hybrid client-cache approach for video delivery with dynamic adaptive streaming over HTTP. 1-5 - Yuebin Bai, Xu Shao, Wentao Yang, Weitao Wang, Peng Feng, Shuai Liu, Xudong Zhang, Rui Wang:

Nodes contact probability estimation approach based on Bayesian network for DTN. 1-4 - Marzia Zaman, Chung-Horng Lung:

Evaluation of machine learning techniques for network intrusion detection. 1-5 - Sheng Luo, Shangru Zhong, Kai Lei

:
IP/NDN: A multi-level translation and migration mechanism. 1-5 - Meng Zhou, Lanlan Rui, Xuesong Qiu, Zhen Xia, Biyao Li:

Evaluation of the node importance in power grid communication network and analysis of node risk. 1-5 - Jeroen van der Hooft, Cedric De Boom, Stefano Petrangeli, Tim Wauters, Filip De Turck:

An HTTP/2 push-based framework for low-latency adaptive streaming through user profiling. 1-5 - Lu Liu, Ao Xiong, Peng Yu, Lei Feng, Wenjing Li, Xuesong Qiu, Mingxiong Wang:

Energy-saving management mechanism based on hybrid energy supplies in multi-operator shared LTE networks. 1-5 - Stefano Petrangeli, Dries Pauwels, Jeroen van der Hooft, Jürgen Slowack, Tim Wauters, Filip De Turck

:
Dynamic video bitrate adaptation for WebRTC-based remote teaching applications. 1-5 - Sam Leroux, Steven Bohez, Pieter-Jan Maenhaut

, Nathan Meheus, Pieter Simoens
, Bart Dhoedt:
Fingerprinting encrypted network traffic types using machine learning. 1-5 - Nurullah Shahin, Rashid Ali

, Sung Won Kim, Young-Tak Kim:
Adaptively scaled back-off (ASB) mechanism for enhanced performance of CSMA/CA in IEEE 802.11ax high efficiency WLAN. 1-5 - Wubai Zhou, Xiaolong Zhu, Tao Li, Larisa Shwartz, Genady Ya. Grabarnik:

Multi-view feature selection for labeling noisy ticket data. 1-4 - Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras, Gabi Dreo:

DDoS defense using MTD and SDN. 1-9 - Olivier van der Toorn, Roland van Rijswijk-Deij

, Bart Geesink, Anna Sperotto:
Melting the snow: Using active DNS measurements to detect snowshoe spam domains. 1-9 - Tho Le, Roland van Rijswijk-Deij

, Luca Allodi, Nicola Zannone
:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. 1-9 - Marios Anagnostopoulos

, Georgios Kambourakis, Stefanos Gritzalis
, David K. Y. Yau:
Never say never: Authoritative TLD nameserver-powered DNS amplification. 1-9 - Christopher Dabrowski, Kevin Mills:

Evaluating predictors of congestion collapse in communication networks. 1-9 - Shaowei Zhao, Junmao Li, Dagang Li

:
An efficient tuple pruning scheme for packet classification using on-chip filtering and indexing. 1-7 - Ding-Fong Huang, Chien Chen, Mahadevan Thanavel:

Fast packet classification on OpenFlow switches using multiple R*-tree based bitmap intersection. 1-9 - Stanislav Lange, Lorenz Reinhart, Thomas Zinner, David Hock, Nicholas Gray, Phuoc Tran-Gia:

Integrating network management information into the SDN control plane. 1-9 - Abdelhadi Azzouni, Raouf Boutaba, Thi Mai Trang Nguyen, Guy Pujolle:

sOFTDP: Secure and efficient OpenFlow topology discovery protocol. 1-7 - Felipe A. Lopes

, Pablo Tiburcio, Robert Bauer, Stenio Fernandes, Martina Zitterbart:
Model-based flow delegation for improving SDN infrastructure compatibility. 1-9 - Amer AlGhadhban

, Basem Shihada
:
Delay analysis of new-flow setup time in software defined networks. 1-7 - Seyeon Jeong, Doyoung Lee, Jian Li, James Won-Ki Hong:

OpenFlow-based virtual TAP using open vSwitch and DPDK. 1-9 - Haitao Tang, Kaj Stenberg, Vilho Räisänen, Joonas Kylliainen:

Avoidance of improper configuration based on self- operation. 1-8 - Jawwad Ahmed, Tim Josefsson, Andreas Johnsson, Christofer Flinta, Farnaz Moradi, Rafael Pasquini, Rolf Stadler:

Automated diagnostic of virtualized service performance degradation. 1-9 - Takaya Miyazawa, Masahiro Jibiki, Ved P. Kafle

, Hiroaki Harai:
Autonomic resource arbitration and service-continuable network function migration along service function chains. 1-9 - Kostas Katsalis, Navid Nikaein, Anta Huang:

JOX: An event-driven orchestrator for 5G network slicing. 1-9 - Igor Jochem Sanz, Diogo Menezes Ferrazani Mattos

, Otto Carlos Muniz Bandeira Duarte:
SFCPerf: An automatic performance evaluation framework for service function chaining. 1-9 - Safwan Alwan

, Ilhem Fajjari, Nadjib Aitsaadi:
Joint multicast routing and OFDM resource allocation in LTE-D2D 5G cellular network. 1-9 - Tao Li, Hani Salah, Mu He

, Thorsten Strufe, Silvia Santini:
REMO: Resource efficient distributed network monitoring. 1-9 - Tianrong Zhang, Yufeng Xin

:
A truthful online auction mechanism for deadline-aware cloud resource allocation. 1-9 - Prashanth Podili

, Kotaro Kataoka
:
Effective resource provisioning for QoS-aware virtual networks in SDN. 1-9 - Noriaki Kamiyama:

Trading virtual machines to stabilize revenue in public clouds. 1-8 - Andri Lareida, Burkhard Stiller:

Big torrent measurement: A country-, network-, and content-centric analysis of video sharing in BitTorrent. 1-9 - Minh N. H. Nguyen, Nguyen Hoang Tran

, Mohammad A. Islam
, Chuan Pham
, Shaolei Ren
, Choong Seon Hong
:
Multi-operator backup power sharing in wireless base stations. 1-9 - Ashis Talukder, Md. Golam Rabiul Alam

, Nguyen Hoang Tran
, Choong Seon Hong
:
A cost optimized reverse influence maximization in social networks. 1-9 - Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne

, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor
:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. 1-9 - Felix Erlacher, Falko Dressler

:
FIXIDS: A high-speed signature-based flow intrusion detection system. 1-8 - Rui Huang, Bidi Ying, Amiya Nayak

:
Protecting location privacy in opportunistic mobile social networks. 1-8 - Igor Drummond Alvarenga, Gabriel A. F. Rebello, Otto Carlos M. B. Duarte:

Securing configuration management and migration of virtual network functions using blockchain. 1-9 - Lin Qi, Wenbin Yao, Jingkun Chang:

A large scale transactional service selection approach based on skyline and ant colony optimization algorithm. 1-7 - Jasmina Bogojeska, Dorothea Wiesmann:

Transfer learning for server behavior classification in small IT environments. 1-9 - Weitao Wang, Yuebin Bai, Chao Yu, Yuhao Gu

, Peng Feng, Xiaojing Wang, Rui Wang:
A network traffic flow prediction with deep learning approach for large-scale metropolitan area network. 1-9 - Arthur Selle Jacobs

, Ricardo José Pfitscher
, Ricardo Luis dos Santos, Muriel Figueredo Franco
, Eder John Scheid
, Lisandro Zambenedetti Granville
:
Artificial neural network model to predict affinity for virtual network functions. 1-9 - David de la Bastida, Fuchun Joseph Lin

:
Extending IoT/M2M system scalability by network slicing. 1-8 - Mariusz Slabicki

, Gopika Premsankar
, Mario Di Francesco:
Adaptive configuration of lora networks for dense IoT deployments. 1-9 - Gopika Premsankar

, Bissan Ghaddar
, Mario Di Francesco, Rudi Verago:
Efficient placement of edge computing devices for vehicular applications in smart cities. 1-9 - José Santos

, Philip Leroux, Tim Wauters, Bruno Volckaert, Filip De Turck
:
Anomaly detection for Smart City applications over 5G low power wide area networks. 1-9 - Davit Harutyunyan, Supreeth Herle, Dimitri Maradin, George Agapiu, Roberto Riggio

:
Traffic-aware user association in heterogeneous LTE/WiFi radio access networks. 1-8 - Ahmed Mohammed Mikaeil, Weisheng Hu:

Optimized XG-PON DBA mechanism for front-haul upstream traffic in virtualized small cell cloud-RAN architecture. 1-7 - Anupam Kumar Bairagi, Nguyen Hoang Tran

, Walid Saad, Choong Seon Hong
:
Bargaining game for effective coexistence between LTE-U and Wi-Fi systems. 1-8 - Ermias Andargie Walelgne, Jukka Manner

, Vaibhav Bajpai
, Jörg Ott:
Analyzing throughput and stability in cellular networks. 1-9 - Martin Lastovicka

, Tomás Jirsík
, Pavel Celeda
, Stanislav Spacek, Daniel Filakovsky:
Passive os fingerprinting methods in the jungle of wireless networks. 1-9 - Marton Kajo, Benedek Schultz, Janne Ali-Tolppa, Georg Carle:

Equal-volume quantization of mobile network data using bounding spheres and boxes. 1-9 - Tai Manh Ho, Nguyen Hoang Tran

, S. M. Ahsan Kazmi, Zhu Han, Choong Seon Hong
:
Wireless network virtualization with non-orthogonal multiple access. 1-9 - Estefanía Coronado

, Roberto Riggio
, José Villalón
, Antonio Garrido:
Wi-balance: Channel-aware user association in software-defined Wi-Fi networks. 1-9 - Roberto Riggio

, Shah Nawaz Khan, Tejas Subramanya, Imen Grida Ben Yahia, Diego R. López:
LightMANO: Converging NFV and SDN at the edges of the network. 1-9 - Gaetano Bonofiglio, Veronica Iovinella, Gabriele Lospoto, Giuseppe Di Battista:

Kathará: A container-based framework for implementing network function virtualization and software defined networks. 1-9 - Ricardo J. Pfitscher

, Arthur Selle Jacobs
, Eder J. Scheid
, Muriel Figueredo Franco
, Ricardo Luis dos Santos, Alberto E. Schaeffer Filho
, Lisandro Zambenedetti Granville
:
A model for quantifying performance degradation in virtual network function service chains. 1-9 - Frederico Schardong

, Ingrid Nunes
, Alberto E. Schaeffer Filho
:
Providing cognitive components with a bidding heuristic for emergent NFV orchestration. 1-9 - Qiong Zhang, Xiaoyong Liang, Yi Zhu, Xi Wang, Paparao Palacharla, Vibha Sarin, Tadashi Ikeuchi:

Vertex-centric distributed computation for mapping virtual networks across domains. 1-8 - Salvatore Dipietro, Rajkumar Buyya

, Giuliano Casale:
PAX: Partition-aware autoscaling for the Cassandra NoSQL database. 1-9 - Mirza Mohd Shahriar Maswood

, Robayet Nasim, Andreas J. Kassler, Deep Medhi:
Cost-efficient resource scheduling under QoS constraints for geo-distributed data centers. 1-9 - Fan Jiang, Claris Castillo, Stan Ahalt:

Cachalot: A network-aware, cooperative cache network for geo-distributed, data-intensive applications. 1-9 - Mirza Mohd Shahriar Maswood

, Deep Medhi:
An adaptive allocation scheme for load balancing and SLA maintenance in multi-location data center networks. 1-9 - Francisco Carpio

, Admela Jukan, Rastin Pries:
Balancing the migration of virtual network functions with replications in data centers. 1-8 - Stuart Clayman, Daphné Tuncer:

Lessons from operating systems for layering and abstractions in 5G networks. 1-7 - Akhila Rao, Rebecca Steinert:

Probabilistic multi-RAT performance abstractions. 1-6 - Tatsuji Miyamoto, Keisuke Kuroki, Masanori Miyazawa, Michiaki Hayashi:

Al-assisted workflow management framework for automated closed-loop operation. 1-6 - Slawomir Kuklinski

, Lechoslaw Tomaszewski
:
DASMO: A scalable approach to network slices management and orchestration. 1-6 - Jordi Pérez-Romero

, Oriol Sallent, Ramon Ferrús
, Ramón Agustí:
On the configuration of radio resource management in a sliced RAN. 1-6 - Aldo Febro

, Hannan Xiao
, Joseph Spring
:
Telephony Denial of Service defense at data plane (TDoSD@DP). 1-6 - Ahmet Cihat Baktir, Atay Ozgovde

, Cem Ersoy
:
Implementing service-centric model with P4: A fully-programmable approach. 1-6 - Risto Vaarandi

, Bernhards Blumbergs
, Markus Kont:
An unsupervised framework for detecting anomalous messages from syslog log files. 1-6 - Robert Harper, Philip Tee

:
Cookbook, a recipe for fault localization. 1-6 - Yanghu Guo, Wenbin Yao:

A container scheduling strategy based on neighborhood division in micro service. 1-6 - Luis Guillen

, Satoru Izumi, Toru Abe, Takuo Suganuma, Hiroaki Muraoka:
SDN-based hybrid server and link load balancing in multipath distributed storage systems. 1-6 - Fenfen Huang, Wenbin Yao:

Optimization on parametric model. 1-5 - Marco Polverini

, Antonio Cianfrani, Andrea Baiocchi, Marco Listanti, Valentina Salvatore:
From raw data packets to ingress egress traffic matrix: The distributed MapReduce-based solution. 1-6 - Antoine Messager, George Parisis

, Robert Harper, Philip Tee
, Istvan Z. Kiss
, Luc Berthouze:
Network events in a large commercial network: What can we learn? 1-6 - Yanghu Guo, Wenbin Yao:

Applying gated recurrent units pproaches for workload prediction. 1-6 - Meng Xu, Qiaoling Wang, Qinliang Lin:

Hybrid holiday traffic predictions in cellular networks. 1-6 - Xiang Zhang, Fanqin Zhou, Jiayi Ning, Peng Yu, Wenjing Li:

Hotspot localization and prediction in wireless cellular networks via spatial traffic fitting. 1-6 - Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood

:
Streaming Botnet traffic analysis using bio-inspired active learning. 1-6 - Ouzhou Dong, Peng Yu, Huiyong Liu, Lei Feng, Wenjing Li, Fang Chen, Lei Shi:

A service routing reconstruction approach in cyber-physical power system based on risk balance. 1-6 - Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:

Detecting malicious authentication events trustfully. 1-6 - Xiao Cheng, Lei Feng, Fanqin Zhou, Wenjing Li, Peng Yu, Xuesong Qiu, Lei Wei:

Uplink resource allocation for trade-off between throughput and fairness in C-RAN-based neighborhood area network. 1-6 - Pál Varga, Tamas Tothfalusi, Zsolt Balog, Gábor Sey:

Complex solution for VoLTE monitoring and cross-protocol data analysis. 1-4 - Robin Mueller-Bady, Martin Kappes, Inmaculada Medina-Bulo, Francisco Palomo-Lozano

:
On the feasibility of using hybrid evolutionary dynamic optimization for optimal monitor selection in dynamic communication networks. 1-4 - Balázs Nagy, Peter Orosz, Tamas Tothfalusi, László Kovács, Pál Varga:

Detecting DDoS attacks within milliseconds by using FPGA-based hardware acceleration. 1-4 - Meng Li, Wenjing Li, Xiangjian Zeng, Peng Yu, Xuesong Qiu:

A decision-making mechanism of network risk control based on grey relation. 1-4 - Masaki Aida, Chisa Takano, Masayuki Murata:

Generation mechanism of flaming phenomena in on-line social networks described by perturbation of asymmetric link effects. 1-4 - Beibei Yang, Akihiro Nakao:

Two-stage anomaly detection using application specific heavy hitter analysis. 1-4 - Shahzoob Bilal Chundrigar, Osamah Ibrahiem Abdullaziz, Hsien-Wen Chang, Samer T. Talat, Chia-Lin Lai:

Evaluation of energy efficient radio-over-fiber for high-speed train testbed. 1-4 - Yang Yang, He Li, Xuesong Qiu, Shaoyong Guo, XiaoXiao Zeng, Kang Zhao, Haoran Xin:

Research on lifetime prediction-based recharging scheme in rechargeable WSNs. 1-4 - Jee-Tae Park, Sung-Ho Lee, Young-Hoon Goo, Ui-Jun Baek, Myung-Sup Kim:

Network attack traffic detection using seed based sequential grouping model. 1-4 - Jiwon Bang, Siwoon Son, Hajin Kim, Yang-Sae Moon, Mi-Jung Choi:

Design and implementation of a load shedding engine for solving starvation problems in Apache Kafka. 1-4 - Young-Hoon Goo, Kyu-Seok Shim, Byeong-Min Chae, Myung-Sup Kim:

Framework for precise protocol reverse engineering based on network traces. 1-4 - Ming-Yen Wu, Yu-Hsiang Lin, Tse-Hsiang Tseng, Chen-Min Hsu, Kai-Sheng Hsu, Hey-Chyi Young:

A QoS monitoring system for LTE small cells. 1-4 - Leonardo B. da Costa, André Silva Neto, Billy Pinheiro, Roberto Araújo, Antônio Abelém

, Weverton Cordeiro:
DLCP: A protocol for securing light client operation in blockchains. 1-6 - Michael Grabatin, Wolfgang Hommel:

Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technology. 1-6 - Kyu-Seok Shim, Young-Hoon Goo, Min-Seob Lee, Huru Hasanova, Myung-Sup Kim:

Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure. 1-4 - Su-Chin Lin, Po-Wei Huang, Hsin-Yi Wang, Hsu-Chun Hsiao:

DAMUP: Practical and privacy-aware cloud-based DDoS mitigation. 1-6 - Charles V. Neu, Cassio G. Tatsch, Roben Castagna Lunardi

, Regio A. Michelin, Alex M. S. Orozco, Avelino F. Zorzo
:
Lightweight IPS for port scan in OpenFlow SDN networks. 1-6 - Bahman Rashidi, Carol J. Fung, Mohammad Ashiqur Rahman

:
A scalable and flexible DDoS mitigation system using network function virtualization. 1-6 - Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis

:
HoneyDrone: A medium-interaction unmanned aerial vehicle honeypot. 1-6 - Wei Chang, Guochu Shou, Yaqiong Liu, Zhigang Guo, Yihong Hu, Jing Liu:

An efficient topology reconfiguration algorithm under targeted attacks and failures. 1-5 - Nur Zincir-Heywood

, Tien D. Phan:
A language model for compromised user analysis. 1-4 - Faisal Alsubaei

, Abdullah Abuhussein
, Sajjan G. Shiva:
Quantifying security and privacy in Internet of Things solutions. 1-6 - Wenjun Jin, Peng Yu, Ao Xiong, Qiang Zhang, Dan Jin, Geng Zhang, Yang Wang:

An approximate all-terminal reliability evaluation method for large-scale smart grid communication systems. 1-5 - Xinting Hu, Wenjing Li, Peng Yu, Fang Chen, Fangzheng Chen, Yuan Tian:

Risk modeling and optimization approach for system protection communication networks. 1-4 - Cecil Wöbker

, Andreas Seitz, Harald Müller, Bernd Bruegge:
Fogernetes: Deployment and management of fog computing applications. 1-7 - Marcel von Maltitz

, Stefan Smarzly, Holger Kinkelin
, Georg Carle:
A management framework for secure multiparty computation in dynamic environments. 1-7 - Herry Herry, Emily Band, Colin Perkins

, Jeremy Singer
:
Peer-to-peer secure updates for heterogeneous edge devices. 1-5 - Holger Kinkelin

, Valentin Hauner, Heiko Niedermayer, Georg Carle:
Trustworthy configuration management for networked devices using distributed ledgers. 1-5 - Nida Khan, Abdelkader Lahmadi, Jérôme François

, Radu State:
Towards a management plane for smart contracts: Ethereum case study. 1-6 - Beltran Borja Fiz Pontiveros

, Robert Norvill, Radu State:
Monitoring the transaction selection policy of Bitcoin mining pools. 1-6 - Sina Rafati Niya, Sanjiv S. Jha

, Thomas Bocek, Burkhard Stiller:
Design and implementation of an automated and decentralized pollution monitoring system with blockchains, smart contracts, and LoRaWAN. 1-4 - Christopher G. Harris

:
The risks and dangers of relying on blockchain technology in underdeveloped countries. 1-4 - Joanna Moubarak, Maroun Chamoun, Eric Filiol

:
Developing a Κ-ary malware using blockchain. 1-4 - Robert Norvill, Beltran Borja Fiz Pontiveros

, Radu State, Andrea J. Cullen:
Visual emulation for Ethereum's virtual machine. 1-4 - Alexander Yakubov, Wazen M. Shbair

, Anders Wallbom, David Sanda, Radu State:
A blockchain-based PKI management framework. 1-6 - Yao Zhang, Lanlan Rui, Hui Guo, Xuesong Qiu, Linwei:

A QoS guarantee mechanism based on multi-priority bionic competition model in vehicular edge etwork. 1-5 - Wazen M. Shbair

, Mathis Steichen, Jérôme François, Radu State:
Blockchain orchestration and experimentation framework: A case study of KYC. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














