


default search action
7th NetSoft 2021: Tokyo, Japan
- Kohei Shiomoto, Young-Tak Kim, Christian Esteve Rothenberg, Barbara Martini, Eiji Oki, Baek-Young Choi, Noriaki Kamiyama, Stefano Secci:

7th IEEE International Conference on Network Softwarization, NetSoft 2021, Tokyo, Japan, June 28 - July 2, 2021. IEEE 2021, ISBN 978-1-6654-0522-5 - Xin Zhe Khooi

, Levente Csikor, Jialin Li, Dinil Mon Divakaran:
In-Network Applications: Beyond Single Switch Pipelines. 1-8 - Zaoxing Liu, Hun Namkung, Anup Agarwal, Antonis Manousis, Peter Steenkiste

, Srinivasan Seshan
, Vyas Sekar:
Sketchy With a Chance of Adoption: Can Sketch-Based Telemetry Be Ready for Prime Time? 9-16 - Molka Gharbaoui, Barbara Martini, Piero Castoldi:

Implementation of an Intent Layer for SDN-enabled and QoS-Aware Network Slicing. 17-23 - Talha Ahmed Khan, Muhammad Afaq

, Waleed Akbar, Asif Mehmood
, Adeel Rafiq, Wang-Cheol Song:
Intent-based Networking Approach for Service Route and QoS control on KOREN SDI. 24-30 - Mehdi Bezahaf

, Eleanor Davies, Charalampos Rotsos
, Nicholas J. P. Race
:
To All Intents and Purposes: Towards Flexible Intent Expression. 31-37 - Lucian Beraldo, Angelos Pentelas, Fábio Luciano Verdi, Panagiotis Papadimitriou

, Cesar Augusto Cavalheiro Marcondes:
Tenant-Oriented Resource optimization for Cloud Network Slicing with Performance Guarantees. 38-44 - Pedro Martinez-Julia, Ved P. Kafle

, Hitoshi Asaeda:
Automated and Optimized Embedding of Virtual Networks and Network Slices. 45-51 - Aerman Tuerxun

, Ping Du, Junji Yumoto, Akihiro Nakao:
Design and Manufacture of Narrow-Band BPF for Local 5G Network Slicing. 52-55 - David Breitgand

, Alexios Lekidis
, Rasoul Behravesh, Avi Weit, Pietro G. Giardina, Vasileios Theodorou
, Cristina E. Costa
, Katherine Barabash
:
Dynamic Slice Scaling Mechanisms for 5G Multi-domain Environments. 56-62 - Kostis Trantzas

, Christos Tranoris
, Spyros G. Denazis:
Defining a management function based architecture for 5G network slicing. 63-69 - Nemanja Ðeric, Amir Varasteh, Amaury Van Bemten, Carmen Mas Machuca, Wolfgang Kellerer

:
Towards Understanding the Performance of Traffic Policing in Programmable Hardware Switches. 70-78 - Xin Zhe Khooi

, Levente Csikor, Jialin Li, Min Suk Kang, Dinil Mon Divakaran:
Revisiting Heavy-Hitter Detection on Commodity Programmable Switches. 79-87 - Tomohiro Korikawa

, Eiji Oki:
Memory Network Architecture for Packet Processing in Functions Virtualization. 88-96 - Hao Jiang, Nakjung Choi

, Marina Thottan, Jacobus E. van der Merwe:
FestNet: A Flexible and Efficient Sliced Transport Network. 97-105 - Matthias Sander Frigau, Tianyi Zhang

, Hongwei Zhang, Ahmed E. Kamal, Arun K. Somani:
Physical Wireless Resource Virtualization for Software-Defined Whole-Stack Slicing. 106-114 - Belma Turkovic, Sjors Nijhuis, Fernando A. Kuipers:

Elastic Slicing in Programmable Networks. 115-123 - Suman Pandey, James Won-Ki Hong, Jae-Hyoung Yoo:

GRU and EdgeQ-Learning based Traffic Prediction and Scaling of SFC. 124-132 - Aziza Alzadjali, Maria Mushtaq, Flavio Esposito, Claudio Fiandrino

, Jitender S. Deogun:
OctoMap: Supporting Service Function Chaining via Supervised Learning and Online Contextual Bandit. 133-141 - Petra Gabriela, Doyoung Lee, Nguyen Van Tu, James Won-Ki Hong:

Machine Learning-Based Auto-Scaler for Video Conferencing Systems. 142-150 - Jiyoon Lim, Jae-Hyoung Yoo, James Won-Ki Hong:

Reinforcement Learning based Load Balancing for Data Center Networks. 151-155 - Mona Elsaadawy, Petar Basta

, Yunjia Zheng, Bettina Kemme, Mohamed F. Younis
:
Flow-based Service Type Identification using Deep Learning. 156-160 - Haneen Alfauri, Flavio Esposito:

A Distributed Consensus Protocol for Sustainable Federated Learning. 161-165 - Kohei Shiomoto, Takashi Kurimoto:

Policy Gradient-based Deep Reinforcement Learning for Deadline-aware Transfer over Wide Area Networks. 166-170 - Yuki Nagai, Hiroki Watanabe, Takao Kondo

, Fumio Teraoka:
LiONv2: An Experimental Network Construction Tool Considering Disaggregation of Network Configuration and Device Configuration. 171-175 - Lars Larsson, William Tärneberg, Cristian Klein, Maria Kihl, Erik Elmroth:

Adaptive and Application-agnostic Caching in Service Meshes for Resilient Cloud Applications. 176-180 - Nicolas Herbaut, Camilo Correa, Jacques Robin, Raúl Mazo:

SDN Intent-based conformance checking: application to security policies. 181-185 - Christian Grasso, Raoul Raftopoulos

, Giovanni Schembra:
Deep Q-Learning for Job Offloading Orchestration in a Fleet of MEC UAVs in 5G Environments. 186-190 - Csaba Györgyi, Károly Kecskeméti

, Péter Vörös, Géza Szabó, Sándor Laki:
In-network Solution for Network Traffic Reduction in Industrial Data Communication. 191-195 - Stuart Clayman, Mustafa Tüker, Halil Arasan, Müge Sayit:

Managing Video Processing and Delivery using Big Packet Protocol with SDN Controllers. 196-200 - Luis M. Contreras, Jose A. Ordonez-Lucena:

On Slice Isolation Options in the Transport Network and Associated Feasibility Indicators. 201-205 - Peter Okelmann, Leonardo Linguaglossa, Fabien Geyer, Paul Emmerich, Georg Carle:

Adaptive Batching for Fast Packet Processing in Software Routers using Machine Learning. 206-210 - Ramon Perez

, Aitor Zabala
, Albert Banchs:
Alviu: An Intent-Based SD-WAN Orchestrator of Network Slices for Enterprise Networks. 211-215 - Belma Turkovic, Soovam Biswal, Abhishek Vijay, Antonia Hüfner, Fernando A. Kuipers:

P4QoS: QoS-based Packet Processing with P4. 216-220 - Federico Parola, Fulvio Risso, Sebastiano Miano

:
Providing Telco-oriented Network Services with eBPF: the Case for a 5G Mobile Gateway. 221-225 - Gagan Nandha Kumar, Kostas Katsalis, Panagiotis Papadimitriou

, Paul Pop
, Georg Carle:
Failure Handling for Time-Sensitive Networks using SDN and Source Routing. 226-234 - Cristian Hernandez Benet, Andreas Kassler, Gianni Antichi

, Theophilus A. Benson, Gergely Pongrácz:
Providing In-network Support to Coflow Scheduling. 235-243 - Enio Marku, Gergely Biczók

, Colin Boyd:
SafeLib: a practical library for outsourcing stateful network functions securely. 244-252 - Wenjun Fan, Sang-Yoon Chang, Shubham Kumar, Xiaobo Zhou, Younghee Park:

Blockchain-based Secure Coordination for Distributed SDN Control Plane. 253-257 - Jesse Chen, Ananya Gopal, Behnam Dezfouli:

Modeling Control Traffic in Software-Defined Networks. 258-262 - Mustafa Soylu, Luis Guillen

, Satoru Izumi, Toru Abe, Takuo Suganuma:
NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV. 263-267 - Aparna Ganesan, Kamil Saraç:

Mitigating Evasion Attacks on Machine Learning based NIDS Systems in SDN. 268-272 - Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar

:
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services. 273-277 - Yusaku Hayamizu, Kazuhisa Matsuzono, Takahiro Hirayama, Hitoshi Asaeda:

Design and Implementation of ICN-Based Elastic Function Offloading Network for SFC. 278-282 - Yuhan Xue, Zuqing Zhu:

Leveraging Heterogeneous NFV Platforms to Upgrade Service Function Chains in DCNs. 283-287 - Walid A. Y. Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma:

DiffPerf: An In-Network Performance Optimization for Improving User-Perceived QoE. 288-292 - Ganesh C. Sankaran, Joaquin Chung, Raj Kettimuthu:

Leveraging In-Network Computing and Programmable Switches for Streaming Analysis of Scientific Data. 293-297 - Miheer Kulkarni, Michael Baddeley, Israat Haque:

Embedded vs. External Controllers in Software-Defined IoT Networks. 298-302 - Sogand SadrHaghighi, Mahdi Dolati

, Majid Ghaderi, Ahmad Khonsari:
SoftTap: A Software-Defined TAP via Switch-Based Traffic Mirroring. 303-311 - Anu Mercian, Faraz Ahmed, Puneet Sharma, Shaun Wackerly, Charles Clark:

Mind the Semantic Gap: Policy Intent Inference from Network Metadata. 312-320 - Michael Sjoholmsierchio, Britta Hale, Daniel Lukaszewski, Geoffrey G. Xie:

Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks. 321-329 - José Alberto Hernández

, Marco Quagliotti, Laura Serra:
On the cloudification of Metropolitan Area Networks: impact on cost and energy consumption. 330-338 - Fujun He, Eiji Oki:

Robust Virtual Network Function Deployment against Uncertain Traffic Arrival Rates. 339-347 - Luis M. Contreras, Alberto Solano, Francisco Cano, Jesús Folgueira:

Efficiency Gains due to Network Function Sharing in CDN-as-a-Service Slicing Scenarios. 348-356 - Giuseppe Di Lena, Frédéric Giroire, Thierry Turletti, Chidung Lac:

CloudTrace Demo: Tracing Cloud Network Delay. 357-359 - Mengfei Zhu, Rui Kang

, Fujun He, Eiji Oki:
Implementation of Backup Resource Management Controller for Reliable Function Allocation in Kubernetes. 360-362 - Tom Goethals, Filip De Turck, Bruno Volckaert:

Live Demonstration of a Highly Scalable Fog Service Orchestrator. 363-365 - Chia-Yu Chang, Manuel A. Jiménez, Molka Gharbaoui, Javier Sacido

, Fabio Ubaldi, Chrysa Papagianni
, Aitor Zabala
, Luca Valcarenghi, Davide Scano, Konstantin Tomakh, Alessio Giorgetti, Andrea Boddi, Koen De Schepper:
Slice Isolation for 5G Transport Networks. 366-368 - Adnan Aijaz, Ben Holden, Fanyu Meng:

Open and Programmable 5G Network-in-a-Box: Technology Demonstration and Evaluation Results. 369-371 - Qiong Zhang, Paparao Palacharla, Motoyoshi Sekiya, Junichi Suga, Toru Katagiri:

Blockchain-based Secure Aggregation for Federated Learning with a Traffic Prediction Use Case. 372-374 - Yue Hu, Yongan Guo:

Survivable Service Function Chain Mapping in NFV-Enabled 5G Networks. 375-380 - Zhe Han, Bin Wang, Haitao Zhao, Yue Chen:

Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous Networks. 381-387 - Bruno Miguel Sousa, Henrique M. Simões Silva, Noé Godinho

, Marília Curado:
Service Function Chaining in Wildfire Scenarios. 388-394 - Fatima Khashab, Joanna Moubarak, Antoine Feghali, Carole Bassil:

DDoS Attack Detection and Mitigation in SDN using Machine Learning. 395-401 - Odnan Ref Sanchez, Matteo Repetto, Alessandro Carrega

, Raffaele Bolla:
Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization. 402-408 - Joseph R. Rose, Matthew Swann

, Gueltoum Bendiab, Stavros Shiaeles
, Nicholas Kolokotronis
:
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT. 409-415 - Sisay Tadesse Arzo

, Francesco Zambotto, Fabrizio Granelli, Riccardo Bassoli
, Michael Devetsikiotis, Frank H. P. Fitzek
:
A Translator as Virtual Network Function for Network Level Interoperability of Different IoT Technologies. 416-422 - Yaohui Zhong, Yongan Guo:

Security Technologies in Ad-hoc Networks: A Survey. 423-429 - Tianyi Feng, Bin Wang, Haitao Zhao, Tangwei Zhang, Jiawen Tang, Zhenkun Wang:

Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge Network. 430-436 - Daniel Spiekermann, Jörg Keller:

Encapcap: Transforming Network Traces to Virtual Networks. 437-442 - Matteo Repetto, Alessandro Carrega

, Guerino Lamanna, Jalolliddin Yusupov, Orazio Toscano, Gianmarco Bruno, Michele Nuovo, Marco Cappelli:
Leveraging the 5G architecture to mitigate amplification attacks. 443-449 - Luca Caviglione, Marco Zuppelli

, Wojciech Mazurczyk, Andreas Schaffhauser, Matteo Repetto:
Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label. 450-456 - Daniele Bringhenti

, Guido Marchetto, Riccardo Sisto, Fulvio Valenza
:
A novel approach for security function graph configuration and deployment. 457-463 - Dimitrios Pliatsios

, Panagiotis G. Sarigiannidis, George F. Fragulis
, Apostolos Tsiakalos
, Dimitrios Margounakis:
A Dynamic Recommendation-based Trust Scheme for the Smart Grid. 464-469 - Shanay Behrad, David Espes

, Philippe Bertin, Cao-Thanh Phan:
Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function. 470-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














