


default search action
20th CNSM 2024: Prague, Czech Republic
- Pál Varga, Pavel Celeda, Tim Wauters, Mauro Tortonesi, Jérôme François, Jaime Galán-Jiménez:
20th International Conference on Network and Service Management, CNSM 2024, Prague, Czech Republic, October 28-31, 2024. IEEE 2024, ISBN 978-3-903176-66-9 - Teodor Karkashina, Awais Aziz Shah, Dimitrios P. Pezaros:
In-network real-time flow classification using hierarchical decision trees. 1-5 - Jeffrey A. Adjei, Nur Zincir-Heywood, Biswajit Nandy, Nabil Seddigh:
IoT Device and State Identification based on Usage Patterns. 1-7 - Katharina O. E. Müller, Delia Datsomor, Daria Schumm, Bruno Rodrigues, Burkhard Stiller:
Big Brother is Watching You: Non-Intrusive ZigBee User Profiling. 1-7 - Stefania Zinno, Giuseppe Caso, Nicola Pasquino, Alessio Botta, Anna Brunström, Giorgio Ventre:
QoE for Interactive Services in 5G Networks: Data-driven Analysis and ML-based Prediction. 1-7 - Katharina Dietz, Mehrdad Hajizadeh, Johannes Schleicher, Nikolas Wehner, Stefan Geißler, Pedro Casas
, Michael Seufert, Tobias Hoßfeld:
Agree to Disagree: Exploring Consensus of XAI Methods for ML-based NIDS. 1-7 - Elham Dehghan Biyar, Ahmet Cihat Baktir, Deniz Çokuslu, Yunus Donmez:
Future Directions on Enhanced Positioning Services with Predictions for Smart Factories. 1-4 - Lorenzo Pappone, Cristian Zilli, Alessio Sacco, Flavio Esposito:
ResCue: Inferring Fine-Grained Traffic Matrices via Distributed Deep Residual Networks. 1-9 - Rie Tagyo, Hideaki Kinsho, Akihiro Shiozu, Kazuhisa Yamagishi:
Throughput-Constrained Antenna Sleep Management for Saving Power. 1-9 - Ivan Peter Lamb, Pedro Arthur Pinheiro Rosa Duarte, Marcelo Caggiani Luizelli, Luciano Paschoal Gaspary, José Rodrigo Azambuja, Weverton Luis sa Costa Cordeiro:
Multi-Tenant Programmable Switch Virtualization Leveraging Explicit Resource Sharing. 1-9 - Salah Eddine Elgharbi, Mauricio Iturralde, Yohan Dupuis
, Alain Gaugue:
OSR: Advancing Multi-Hop Routing for LoRaWAN Mesh Networks in Maritime Scenarios. 1-7 - Kokthay Poeng
, Laurent Schumacher
:
Lateral Movement Identification in Cross-Cloud Deployment. 1-4 - Rafael Copstein, Nur Zincir-Heywood, Malcolm I. Heywood:
Improving Real-Time Anomaly Detection using Multiple Instances of Micro-Cluster Detection. 1-6 - Aleksandra Knapinska, Piotr Lechowicz, Krzysztof Walkowiak:
Impact of Time-Varying Traffic Type on the Performance of Multilayer Networks. 1-5 - Lukás Jancicka, Dominik Soukup, Josef Koumar, Filip Nemec, Tomás Cejka:
MFWDD: Model-based Feature Weight Drift Detection Showcased on TLS and QUIC Traffic. 1-5 - Sousan Tarahomi, Raffaele Sommese, Pieter-Tjerk de Boer, Jeroen Linssen, Ralph Holz
, Anna Sperotto:
Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records. 1-5 - Andrea Caruso
, Giovanni Schembra, Christian Grasso, Juan Brenes, Pietro G. Giardina, Giada Landi, Leonardo Lossi, Gabriele Scivoletto:
Adaptive 360° Video Streaming over a Federated 6G Network: Experimenting In-Network Computing for Enhanced User Experience. 1-7 - Nikolas Wintering, Eric Lanfer, Nils Aschenbruck:
Automating Network Perimeter Threat Prevention for Decentralized Network Administration. 1-7 - Michaela Novotná, Václav Bartos:
URL Evaluator: Semi-automatic evaluation of suspicious URLs from honeypots. 1-4 - Martin Husák, Lukás Sadlek, Martin Hesko, Vít Sebela, Stanislav Spacek:
The Evolution of the CRUSOE Toolset: Enhancing Decision Support in Network Security Management. 1-3 - Supratim Chakraborty, Nithin Chitta, Rajesh Sundaresan:
Automation of Network Configuration Generation using Large Language Models. 1-7 - Anna Prado, Zifan Ding, Fidan Mehmeti, Wolfgang Kellerer:
Mobility Management for Computation-Intensive Tasks in Cellular Networks with SD-RAN. 1-9 - Nicola Di Cicco, Filippo Poltronieri
, José Santos, Mattia Zaccarini
, Mauro Tortonesi
, Cesare Stefanelli, Filip De Turck:
Multi-Objective Scheduling and Resource Allocation of Kubernetes Replicas Across the Compute Continuum. 1-9 - Syed Mohsan Raza, Roberto Minerva, Noël Crespi, Maira Alvi, Manoj Herath, Hrishikesh Dutta:
Exploiting the Efficient Data Modeling in Network Digital Twin to Empower Edge-Cloud Continuum. 1-4 - Alexander Daichendt, Florian Wiedner, Jonas Andre, Georg Carle:
Applicability of Hardware-Supported Containers in Low-Latency Networking. 1-7 - Petr Matousek, Ondrej Rysavý, Ivana Burgetova:
Experience Report: Using JA4+ Fingerprints for Malware Detection in Encrypted Traffic. 1-5 - Lars-Christian Schulz, David Hausheer:
ID-INT: Secure Inter-Domain In-Band Telemetry. 1-9 - Gergely Hollósi, Dániel Ficzere, Pál Varga:
Generative AI for Low-Level NETCONF Configuration in Network Management Based on YANG Models. 1-7 - Flaviene Scheidt de Cristo, Jean-Philippe Eisenbarth, Jorge Augusto Meira, Radu State:
Causal AI for XRPL/GossipSub network configuration. 1-5 - Martin Husák, Darshan Manoj, Priyanka Kumar:
Machine Learning in Intrusion Detection: An Operational Perspective. 1-7 - Akram Boutouchent, Karim Boutiba, Adlen Ksentini:
Budget-Aware Resource Pricing in Cloud and Edge Computing Continuum. 1-7 - Ramin Yazdani, Max Resing, Anna Sperotto:
Glossy Mirrors: On the Role of Open Resolvers in Reflection and Amplification DDoS Attacks. 1-9 - Souryendu Das, Jacob Adamson, Aaron Lee, Vedant Vaideswar, Stavros Kalafatis:
Optimizing Data Center Network Performance: A Comprehensive Analysis of Speed Testing, Caching, and Network Coding in Software Defined Networking. 1-9 - Oleg Karandin
, Aleix Lahoz Torres, Nicola Di Cicco, Francesco Musumeci, Massimo Tornatore:
Resource-Efficient Implementation of Multiple Concurrent Tree-Based Models in P4 Switches using Feature Sharing. 1-5 - Chiara Camerota, Lorenzo Pappone, Tommaso Pecorella
, Flavio Esposito:
Addressing Data Security in IoT: Minimum Sample Size and Denoising Diffusion Models for Improved Malware Detection. 1-7 - Frank Loh, Gülnaziye Bingöl, Reza Farahani, Andrea Pimpinella
, Radu Prodan, Luigi Atzori, Tobias Hoßfeld:
High Complexity and Bad Quality? Efficiency Assessment for Video QoE Prediction Approaches. 1-5 - Etienne Khan
, Elisa Chiapponi, Martijn Verkleij, Anna Sperotto, Roland van Rijswijk-Deij
, Jeroen van der Ham-de Vos
:
A First Look at User-Installed Residential Proxies From a Network Operator's Perspective. 1-9 - Beining Yang, Alassane Samba, Guillaume Fraysse, Sihem Cherrared:
Generating Commit Messages for Configuration Files in 5G Network Deployment Using LLMs. 1-7 - Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood:
Evaluating the Robustness of ADVENT on the VeReMi-Extension Dataset. 1-7 - Manoj Herath, Maira Alvi, Roberto Minerva, Hrishikesh Dutta, Noël Crespi, Syed Mohsan Raza:
Smart City Digital Twins: A Modular and Adaptive Architecture for Real-Time Data-Driven Urban Management. 1-7 - Alexander Frank, Michael Steinke, Wolfgang Hommel:
Lowcaf: A Low-Code Protocol Analysis Framework. 1-7 - Motahare Mounesan, Xiaojie Zhang, Saptarshi Debroy:
EdgeRL: Reinforcement Learning-driven Deep Learning Model Inference Optimization at Edge. 1-5 - Radek Hranický
, Adam Horák, Jan Polisenský, Ondrej Ondryás, Kamil Jerábek, Ondrej Rysavý:
Spotting the Hook: Leveraging Domain Data for Advanced Phishing Detection. 1-7 - Abdullah Aydeger, Engin Zeydan:
Blockchain-Based Self-Sovereign Identity in 6G Non-Public Networks: Enhanced Security in Industrial Cyber-Physical Systems. 1-7 - Casper Haems
, Jeroen van der Hooft, Hannes Mareen, Peter Steenkiste
, Glenn Van Wallendael, Tim Wauters, Filip De Turck:
Real-Time Demonstration of Low-Latency Video Delivery via Hybrid Unicast-Broadcast Networks. 1-3 - Vaishnavi Kasuluru
, Luis Blanco, Miguel Ángel Vázquez, Cristian J. Vaca-Rubio, Engin Zeydan:
Minimizing Power Consumption under SINR Constraints for Cell-Free Massive MIMO in O-RAN. 1-7 - Maximilian Stephan, Johannes Zerwas, Wolfgang Kellerer:
T-MAW: Online Network Traffic Monitoring and Analysis using Weighted Stochastic Block Models. 1-9 - Supratim Chakraborty, Nithin Chitta, Rajesh Sundaresan:
Demonstration of Automation of Network Configuration Generation using Generative AI. 1-3 - Lukás Sadlek, Martin Husák, Pavel Celeda:
Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs. 1-5 - Jan von der Assen, Alberto Huertas Celdrán, Jamo Sharif, Chao Feng, Gérôme Bovet, Burkhard Stiller:
ThreatFinderAI: Automated Threat Modeling Applied to LLM System Integration. 1-3 - Henrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis:
QoE Models for Virtual Reality Cloud-based First Person Shooter Game over Mobile Networks. 1-5 - Sebastian Rieger, Leon-Niklas Lux, Sven Schickentanz, David Hermann, Thomas Mott, Moritz Freund:
Challenges of Event-based Streaming and Queuing as Data Exchange for Network Digital Twins. 1-7 - Péter Orosz, Tamás Marosits, Tamas Skopko:
Assessing Application-Level Network Neutrality using Digital Twins. 1-3 - Miel Verkerken, José Santos, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
ChronosGuards: A Hierarchical Machine Learning Intrusion Detection System for Modern Clouds. 1-9 - Stuart Clayman, Müge Sayit, David Griffin, Miguel Rio:
Enhancing Bandwidth Utilization for Video Streaming with Packet Trimming in 6G. 1-5 - Mohamad Zalat, Maede Davoudzade, Chris Barber, David Krauss, Babak Esfandiari, Thomas Kunz:
A Practical Network Digital Twin for IGP Weight Optimization. 1-7 - Kyota Hattori, Tomohiro Korikawa, Chikako Takasaki:
Feature Name Decoration Enhanced Router Performance Prediction by a Large Language Model. 1-5 - Yash Deshpande, Philip Diederich, Muhamad Luthfi, Laura Becker, José Fontalvo-Hernández, Wolfgang Kellerer:
Integrating Deterministic Networking with 5G. 1-3 - Jean Steve Tamo Tchomgui, Vincent Barriac, Guillaume Fraysse, Julien Jacques, Stéphane Chrétien:
Functional Linear Regression for the prediction of streaming video QoE. 1-7 - Péter Orosz, Tamás Marosits, Tamas Skopko:
NAPlr: Multi-Gigabit Internet Access Profiling in Web Browser. 1-3 - Richard Plný, Karel Hynek, Pavel Siska:
WIF: Efficient Library for Network Traffic Analysis. 1-5 - John Bousfield, Chung-Horng Lung, Betty Liu, Aroosh Elahi:
Indoor Radio Dot Placement Optimization using UE Positioning and K-Means Clustering. 1-7 - Manuel Simon, Sebastian Gallenmüller, Georg Carle:
On-the-fly Table Insertions on Programmable Software Data Planes. 1-7 - Brandon Ru, Winston K. G. Seah, Alvin C. Valera:
Synchronization Control-Plane Protocol for Quantum Link Layer. 1-9 - Gabriele Gemmi, Michele Polese, Tommaso Melodia, Leonardo Maccari:
Optimizing and Managing Wireless Backhaul for Resilient Next-Generation Cellular Networks. 1-9 - Andrés F. Ocampo, José Santos:
Reinforcement Learning-Driven Service Placement in 6G Networks across the Compute Continuum. 1-9 - Amr Abouelkhair, Kiarash Majdi, Noura Limam, Mohammad A. Salahuddin, Raouf Boutaba:
5GProvGen: 5G Provenance Dataset Generation Framework. 1-9 - Emilio Paolini, Andrea Pinto, Luca Valcarenghi, Nicola Andriolli, Luca Maggiani, Flavio Esposito:
Efficient Distributed Learning Over Lossy Wireless Networks. 1-7 - David Raunecker, Stefan Geissler, Alexej Grigorjew, Philip Diederich, Wolfgang Kellerer, Tobias Hossfeld:
Centralized vs. Decentralized: A Hybrid Performance Model of the TSN Resource Allocation Protocol. 1-9 - Jacob Van Groningen, Chung-Horng Lung:
Green Network Traffic Engineering Using Segment Routing: an Experiment Report. 1-4 - Bohan Zhang
, Mohammad A. Salahuddin, Peng Hu, Yunli Wang, Noura Limam, Bo Sun, Diogo Barradas, Raouf Boutaba:
Signalling Load-aware Conditional Handover in 5G Non-Terrestrial Networks. 1-9 - Aleksandra Simic, David Palma:
Using Knowledge Graphs to Automate Network Compliance of Containerized Services. 1-5 - Federica De Trizio, Giancarlo Sciddurlo, Dominga Rutigliano, Giuseppe Piro, Gennaro Boggia:
A Novel Malicious Intent Detection Approach in Intent-Based Enterprise Networks. 1-7 - Okwudilichukwu Okafor, Flavio Esposito, Tommaso Pecorella
:
EdgeVerse: Multi-User Virtual Reality via Edge Computing and eBPF. 1-4 - Jingli Zhou, Yuqian Song, Xinyuan Li, Wenli Zhou, Jun Liu:
Link2Link: A Robust Probabilistic Routing Algorithm via Edge-centric Graph Reinforcement Learning. 1-7 - Yara Mulla, Isaac Keslassy:
Per-CCA Queueing. 1-7 - Yoichi Matsuo, Yuichi Suto, Yusuke Makino, Kazumich Sato:
Improving Fault Device Identification Method using Alarm Clustering Approach. 1-7 - Raffaele Cuorvo, Nicola d'Ambrosio
, Domenico Iorio, Gaetano Perrone, Simon Pietro Romano:
Securing Industrial Systems: A Testbed for Cyber-Defense Evaluation and Data Collection. 1-7 - Katharina Dietz, Mehrdad Hajizadeh, Nikolas Wehner, Stefan Geißler, Pedro Casas
, Michael Seufert, Tobias Hoßfeld:
Certainly Uncertain: Demystifying ML Uncertainty for Active Learning in Network Monitoring Tasks. 1-7 - Fabian Brisch, Andreas Kassler, Sándor Laki, Péter Hudoba:
P4-MTAGG - a Framework for Multi-Tenant P4 Network Devices. 1-3 - Adamo Mariani, Matteo Liberato, Anna Sperotto, Antonia Affinito:
Analyzing Privacy Implications of Mobile Apps Data Collection across Age Groups. 1-7 - Soroosh Esmaeilian, Mahdi Dolati, Sogand SadrHaghighi, Majid Ghaderi:
Coordinated Sampling in SDNs with Dynamic Flow Rates. 1-7 - Shumpei Kawaguchi, Yuichi Ohsita, Masahisa Kawashima, Hideyuki Shimonishi:
Task Completion Time Prediction Scaled by Machine Learning Model Uncertainty. 1-7 - Mounir Kellil, Siwar Ben Hadj Said, Minh-Thuyen Thi, Christophe Janneteau, Alexis Olivereau:
Addressing the Scalability of Network Digital Twins: A Network Sampling Approach. 1-7 - Andreas Flatscher, Branka Stojanovic, Ozan Özdenizci:
Enhancing Adversarial Robustness of Anomaly Detection-Based IDS in OT Environments. 1-7 - Chanbin Bae, Kyeongtak Lee, Heewon Kim, Seongyeon Yoon, Junkyu Hong, Sangheon Pack, Dongjin Lee:
Quantized In-band Network Telemetry for Low Bandwidth Overhead Monitoring. 1-5 - Hesam Rahimi, Lluis Gifre, Ricard Vilalta, Raul Muñoz, Henry Yu, Yanpeng Wang, Ruilin Cai, Christopher Janz:
Enabling Quality-on-Demand and Service Differentiation on a Novel Network-as-a-Service Platform Using Slicing Technology for Control and Management of Optical Networks. 1-3 - Mohamed Zalat, Maede Davoudzade, Chris Barber, David Krauss, Babak Esfandiari, Thomas Kunz:
Network Digital Twin for IGP Weight Optimization Demo. 1-3 - Simon Raffeck, Sebastian G. Grøsvik, Stanislav Lange, Tobias Hossfeld, Thomas Zinner, Stefan Geissler:
Parameterizing 5G New Radio: A Comparative Measurement Study on Throughput and Delay. 1-7 - Balint Bicski, Adrián Pekár:
Early Detection of Network Service Degradation: An Intra-Flow Approach. 1-5 - Maria C. M. M. Ferreira, Silvio E. S. B. Ribeiro, Francisco Valderlan Nobre, Maria L. Linhares, Thelmo P. de Araújo, Rafael L. Gomes:
Mitigating Measurement Failures in Throughput Performance Forecasting. 1-7 - Kurdman Rasol, Alfonso Egio, Miguel Catalan-Cid, Leonardo Lossi, Helio Simeão, Shuaib Siddiqui:
5GaaS: DLT and Smart Contract-Based Network Slice Management in a Decentralized Marketplace. 1-7 - Patient Ntumba, Nour-El-Houda Yellas, Salah Bin Ruba, Fehmi Ben Abdesslem, Stefano Secci:
Data Pipeline System Designs for In-network Learning. 1-9 - Ruba Almahasneh, Gergely Hollósi, Dániel Ficzere, Máté Bancsics, Csaba Lukovszki, Pál Varga:
Uncovering Common AI Challenges Across Industrial Domains in the Transition to Industry 5.0. 1-7 - Quang-Trung Luu, Minh-Thanh Nguyen
, Tai-Hung Nguyen, Michel Kieffer, Van-Dinh Nguyen, Quang-Lap Luu, Trung-Toan Nguyen:
Admission Control and Embedding of Network Slices with Flexible VNF Order. 1-5 - Xinqi Long, Guillaume Fraysse:
Safe RL for Core Network autoscaling. 1-7 - Daniel Grimm, Moritz Zink, Marc Schindewolf, Eric Sax:
Cyber Situational Awareness in Vehicle Security Operations: Holistic Monitoring and a Data Model. 1-7 - Kaili Wang, Muqing Wu, Min Zhao:
Finding Key Nodes in Complex Networks via Deep Reinforcement Learning and Multi Attention Node Connectivity. 1-5 - Majd Latah
, Mathias Fischer:
DTN-Core: Towards a Framework for Designing and Operating Digital Twin Networks. 1-7 - Chiara Camerota, Tommaso Pecorella
, Andrew D. Bagdanov:
The intrinsic convenience of federated learning in malware IoT detection. 1-7 - Takumi Bushi, Toshiro Nakahira, Shoko Shinohara, Yusuke Asai, Kenji Ohira, Hideyuki Shimonishi:
Real Time Reconstruction of Radio Environment Maps in Indoor Millimeter-Wave Beamforming with Beam Changes. 1-7 - Gabin Noblet, Cédric Lefebvre, Philippe Owezarski, William Ritchie:
NetGlyph: Representation Learning to generate Network Traffic with Transformers. 1-9 - Mohammad Hosseini, Sina Darabi, Mohammad Nakhjiri, Patrick Eugster:
Uncovering Secrets of Microbursts in Datacenter Network Traffic. 1-5 - Kota Yagi, Katsuki Isobe
, Daishi Kondo, Hideki Tode:
Impact of DANE on Webpage Load Time. 1-9 - Prashanth P. S, Ranjitha K., Ankit Sharma, Arjun Temura, Rinku Shah, Praveen Tammana:
DL3: Adaptive Load Balancing for Latency-critical Edge Cloud Applications. 1-5 - Markus Sosnowski
, Richard von Seck, Florian Wiedner, Georg Carle:
CRDT Web Caching: Enabling Distributed Writes and Fast Cache Consistency for REST APIs. 1-7 - Zarin Tasnim, Mouhamad Dieye, Felipe Estrada Solano, Roch H. Glitho, Halima Elbiaze, Wessam Ajib:
An Ontology-Based Model for In-Network Computing Components Description and Discovery. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.