default search action
NOMS 2020: Budapest, Hungary
- NOMS 2020 - IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020. IEEE 2020, ISBN 978-1-7281-4973-8
- Varun Deshpande, Laurent George, Hakim Badis, Alemayehu Addisu Desta:
Blockchain Based Decentralized Framework for Energy Demand Response Marketplace. 1-9 - Christofer Flinta, Wenqing Yan, Andreas Johnsson:
Predicting Round-Trip Time Distributions in IoT Systems using Histogram Estimators. 1-9 - Sofiane Lagraa, Radu State:
Process mining-based approach for investigating malicious login events. 1-5 - Moussa Aboubakar, Mounir Kellil, Abdelmadjid Bouabdallah, Pierre Roux:
Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks. 1-5 - Yusufu Shehu, Robert Harper:
Improved Fault Localization using Transfer Learning and Language Modeling. 1-6 - Fujun He, Eiji Oki:
Unavailability-aware Shared Virtual Backup Allocation Model for Middleboxes. 1-7 - Marcin Nawrocki, Thomas C. Schmidt, Matthias Wählisch:
Uncovering Vulnerable Industrial Control Systems from the Internet Core. 1-9 - Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Avraham, Avraham Shalev:
NFV-based IoT Security for Home Networks using MUD. 1-9 - Michal Javorník, Jana Komárková, Lukás Sadlek, Martin Husák:
Decision Support for Mission-Centric Network Security Management. 1-6 - Hyundong Hwang, Young-Tak Kim:
Management of Smart Vehicular Handovers in Overlapped V2X Networks. 1-6 - Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure. 1-9 - Liang-Min Wang, Tim Miskell, Patrick Fu, Cunming Liang, Edwin Verplanke:
OVS-DPDK Port Mirroring via NIC Offloading. 1-2 - George Papathanail, Ioakeim Fotoglou, Christos Demertzis, Angelos Pentelas, Kyriakos Sgouromitis, Panagiotis Papadimitriou, Dimitrios Spatharakis, Ioannis Dimolitsas, Dimitrios Dechouniotis, Symeon Papavassiliou:
COSMOS: An Orchestration Framework for Smart Computation Offloading in Edge Clouds. 1-6 - Yuhong Li, Di Jin, Bailin Wang, Xiang Su, Jukka Riekki, Chao Sun, Hanyu Wei, Hao Wang, Lei Han:
Predicting Internet of Things Data Traffic Through LSTM and Autoregressive Spectrum Analysis. 1-8 - Tomás Jirsík, Pavel Celeda:
Cyber Situation Awareness via IP Flow Monitoring. 1-6 - Angelos Pentelas, George Papathanail, Ioakeim Fotoglou, Panagiotis Papadimitriou:
Network Service Embedding with Multiple Resource Dimensions. 1-9 - Wouter B. de Vries, Salman Aljammaz, Roland van Rijswijk-Deij:
Global-Scale Anycast Network Management with Verfploeter. 1-9 - Ningcheng Yuan, Wenchen He, Jing Shen, Xuesong Qiu, Shaoyong Guo, Wenjing Li:
Delay-Aware NFV Resource Allocation with Deep Reinforcement Learning. 1-7 - Adrien Hemmer, Rémi Badonnel, Isabelle Chrisment:
A Process Mining Approach for Supporting IoT Predictive Security. 1-9 - Chenhao Jia, Tian Pan, Zizheng Bian, Xingchen Lin, Enge Song, Cheng Xu, Tao Huang, Yunjie Liu:
Rapid Detection and Localization of Gray Failures in Data Centers via In-band Network Telemetry. 1-9 - Sina Ebrahimi, Abulfazl Zakeri, Behzad Akbari, Nader Mokari:
Joint Resource and Admission Management for Slice-enabled Networks. 1-7 - Hiroki Ikeuchi, Akio Watanabe, Tsutomu Hirao, Makoto Morishita, Masaaki Nishino, Yoichi Matsuo, Keishiro Watanabe:
Recovery command generation towards automatic recovery in ICT systems by Seq2Seq learning. 1-6 - Christian Moldovan, Frank Loh, Michael Seufert, Tobias Hoßfeld:
Optimizing HAS for 360-Degree Videos. 1-6 - Yang Guo, Franklin Liu, An Wang, Hang Liu:
AccuPIPE: Accurate Heavy Flow Detection in the Data Plane Using Programmable Switches. 1-5 - Yu Liu, Craig A. Shue:
Community Cleanup: Incentivizing Network Hygiene via Distributed Attack Reporting. 1-9 - Raquel Rugani Lage, Anthony Lambert:
Allocating and Scheduling Measurement Applications. 1-9 - Andrea Fendt, Christian Mannweiler, Katja Ludwig, Lars-Christoph Schmelz, Bernhard Bauer:
End-to-End Mobile Network Slice Embedding Leveraging Edge Computing. 1-7 - Talha Ahmed Khan, Asif Mehmood, Javier Jose Diaz Rivera, Muhammad Afaq, Khizar Abbas, Wang-Cheol Song:
Intent-Based Orchestration of Network Slices and Resource Assurance using Machine Learning. 1-2 - Roberto Irajá Tavares da Costa Filho, Filip De Turck, Luciano Paschoal Gaspary:
From 2D to Next Generation VR/AR Videos: Enabling Efficient Streaming via QoE-aware Mobile Networks. 1-6 - Yuki Imamura, Nobuyuki Nakamura, Taketsugu Yao, Shingo Ata, Ikuo Oka:
A Device Identification Method Based on Combination of Multiple Information. 1-4 - Basheer Al-Duwairi, Öznur Özkasap:
Preventing DDoS attacks in Path Identifiers-Based Information Centric Networks. 1-5 - Lukas Römer, Sven Erik Jeroschewski, Johannes Kristan:
Leveraging Eclipse IoT in the Arrowhead Framework. 1-6 - Mauro Femminella, Matteo Pergolesi, Gianluca Reali:
Simplification of the design, deployment, and testing of 5G vertical services. 1-7 - Ramon Barakat, Faruk Catal, Nikolay Tcholtchev, Yacine Rebahi, Ina Schieferdecker:
Industrial Grade Methodology for Firewall Simulation and Requirements Verification. 1-7 - Shiva Ketabi, Yashar Ganjali:
Perfect is the Enemy of Good: Lloyd-Max Quantization for Rate Allocation in Congestion Control Plane. 1-9 - Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Fabio Postiglione, Marco Tambasco:
Performability Management of Softwarized IP Multimedia Subsystem. 1-6 - Malte Granderath, Jürgen Schönwälder:
A Resource Efficient Implementation of the RESTCONF Protocol for OpenWrt Systems. 1-6 - Mariano Scazzariello, Lorenzo Ariemma, Tommaso Caiazzi:
Kathará: A Lightweight Network Emulation System. 1-2 - Jawwad Ahmed, Amadeu do Nascimento Júnior, Caner Kilinc, Dan Pan, Jaume Rius i Riu, Jörgen Gustafsson:
Using Blackbox ML Techniques to Diagnose QoE Problems for an IPTV Service. 1-8 - Holger Kinkelin, Richard von Seck, Christoph Rudolf, Georg Carle:
Hardening X.509 Certificate Issuance using Distributed Ledger Technology. 1-6 - Venkatraman Balasubramanian, Moayad Aloqaily, Olufogorehan Tunde-Onadele, Zhengyu Yang, Martin Reisslein:
Reinforcing Cloud Environments via Index Policy for Bursty Workloads. 1-7 - Pedro Martinez-Julia, Jose A. Ordonez-Lucena, Ved P. Kafle, Hitoshi Asaeda, Diego R. López:
Exploiting Case Based Reasoning to Automate Management of Network Slices. 1-6 - Molka Gharbaoui, Barbara Martini, Piero Castoldi:
Programmable and Automated Deployment of Tenant-Managed SDN Network Slices. 1-6 - Frederik Hauser, Mark Schmidt, Michael Menth:
xRAC: Execution and Access Control for Restricted Application Containers on Managed Hosts. 1-9 - Alexander Clemm, Toerless Eckert:
A Network Emulator for High-Precision Latency Forwarding over Packet-Programmable Networks (Demo Paper). 1-2 - Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. 1-7 - André Luiz Beltrami Rocha, Paulo Ditarso Maciel, Francesco Tusa, Celso Henrique Cesila, Christian Esteve Rothenberg, Rafael Pasquini, Fábio L. Verdi:
Design and Implementation of an Elastic Monitoring Architecture for Cloud Network Slices. 1-7 - Stephen S. Mwanje, Márton Kajó, Sayantini Majumdar, Georg Carle:
Environment Modeling and Abstraction of Network States for Cognitive Functions. 1-8 - Atsushi Takada, Toshihiko Seki, Kyoko Yamagoe:
SLA Driven Automatic Fault-Recovery Scheduling Method with Cost Evaluation. 1-6 - Kazuki Hara, Kohei Shiomoto:
Intrusion Detection System using Semi-Supervised Learning with Adversarial Auto-encoder. 1-8 - Petr Velan, Tomás Jirsík:
On the Impact of Flow Monitoring Configuration. 1-7 - Xufang Wang, Feng Lin, Wen-Kang Jia:
Interference Cancellation for Software Defined Impulse Radio by Template Design. 1-5 - Alexander Clemm, Toerless Eckert:
High-Precision Latency Forwarding over Packet-Programmable Networks. 1-8 - Duncan Cameron, Alvin C. Valera, Winston K. G. Seah:
ElasticWISP: Energy-Proportional WISP Networks. 1-9 - Tom De Schepper, Jeroen Famaey, Steven Latré:
Multi-technology Management of Heterogeneous Wireless Networks. 1-6 - Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim:
Characterising Network-Connected Devices Using Affiliation Graphs. 1-6 - Kun Yang, Junjie Zhang, Yang Xu, H. Jonathan Chao:
DDoS Attacks Detection with AutoEncoder. 1-9 - Anat Bremler-Barr, Haim Levy, Zohar Yakhini:
IoT or NoT: Identifying IoT Devices in a Short Time Scale. 1-9 - Yuncan Zhang, Fujun He, Eiji Oki:
Network Service Mapping and Scheduling under Uncertain Processing Time. 1-8 - Agathe Blaise, Mathieu Bouet, Vania Conan, Stefano Secci:
BotFP: FingerPrints Clustering for Bot Detection. 1-7 - Matias Richart, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho:
Resource Allocation and Management Techniques for Network Slicing in WiFi Networks. 1-6 - Menglei Zhang, Haoqiu Huang, Lanlan Rui, Guo Hui, Ying Wang, Xuesong Qiu:
A Service Migration Method Based on Dynamic Awareness in Mobile Edge Computing. 1-7 - Martin Lastovicka, Martin Husák, Lukás Sadlek:
Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. 1-6 - Eder J. Scheid, Daniel Lakic, Bruno Rodrigues, Burkhard Stiller:
PleBeuS: a Policy-based Blockchain Selection Framework. 1-8 - Mario Di Mauro, Giovanni Galatro, Maurizio Longo, Arcangelo Palma, Fabio Postiglione, Marco Tambasco:
Automated Generation of Availability Models for SFCs: The case of Virtualized IP Multimedia Subsystem. 1-6 - Ali Marandi, Vincent Hofer, Mikael Gasparyan, Torsten Braun, Nikolaos Thomos:
Bloom Filter-based Routing for Dominating Set-based Service-Centric Networks. 1-9 - Gábor Soós, Dániel Ficzere, Pál Varga, Zsolt Szalay:
Practical 5G KPI Measurement Results on a Non-Standalone Architecture. 1-5 - Karine Birnfeld, Diogo Campos da Silva, Weverton Cordeiro, Breno Bernard Nicolau de França:
P4 Switch Code Data Flow Analysis: Towards Stronger Verification of Forwarding Plane Software. 1-8 - Imed Hadj-Kacem, Sana Ben Jemaa, Sylvain Allio, Yosra Ben Slimen:
Anomaly prediction in mobile networks : A data driven approach for machine learning algorithm selection. 1-7 - Géza Kulcsár, Kadosa Koltai, Szvetlin Tanyi, Bálint Péceli, Ákos Horváth, Zoltán Micskei, Pál Varga:
From Models to Management and Back: Towards a System-of-Systems Engineering Toolchain. 1-6 - Talal Halabi, Omar Abdel Wahab, Mohammad Zulkernine:
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems. 1-6 - Martin Husák, Pavel Celeda:
Predictions of Network Attacks in Collaborative Environment. 1-6 - João M. Ceron, Christian Scholten, Aiko Pras, Jair Santanna:
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. 1-9 - Anan Sawabe, Takanori Iwai, Kozo Satoda, Akihiro Nakao:
Edge Concierge: Democratizing Cost-Effective and Flexible Network Operations using Network Layer AI at Private Network Edges. 1-7 - Shogo Aoki, Kohei Shiomoto, Chin Lam Eng, Sebastian Backstad:
Few-shot Learning for eNodeB Performance Metric Analysis for Service Level Assurance in LTE Networks. 1-4 - Pedro Martins, André B. Reis, Paulo Salvador, Susana Sargento:
Physical Layer Anomaly Detection Mechanisms in IoT Networks. 1-9 - Maxime Mouchet, Martín Randall, M. Ségneré, Isabel Amigo, Pablo Belzarena, Olivier Brun, Balakrishna J. Prabhu, Sandrine Vaton:
Scalable Monitoring Heuristics for Improving Network Latency. 1-9 - Janne Ali-Tolppa, Márton Kajó:
Mobility and QoS Prediction for Dynamic Coverage Optimization. 1-2 - Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. 1-4 - Steffen Haas, Florian Wilkens, Mathias Fischer:
Scan Correlation - Revealing distributed scan campaigns. 1-6 - Bo Ma, Bowei Yang, Zitian Zhang, Jie Zhang:
Modelling Mobile Traffic Patterns Using A Generative Adversarial Neural Networks. 1-7 - Sajad Sameti, Mea Wang, Diwakar Krishnamurthy:
CONTRAST: Container-based Transcoding for Interactive Video Streaming. 1-9 - José Santos, Tim Wauters, Bruno Volckaert, Filip De Turck:
Towards delay-aware container-based Service Function Chaining in Fog Computing. 1-9 - Ralf Kundel, Fridolin Siegmund, Jeremias Blendin, Amr Rizk, Boris Koldehofe:
P4STA: High Performance Packet Timestamping with Programmable Packet Processors. 1-9 - Jing Ling, Guochu Shou, Mengjie Guo, Yihong Hu:
The Service Metrics and Performance Analysis of Internet Time Service. 1-6 - Simon Bauer, Kilian Holzinger, Benedikt Jaeger, Paul Emmerich, Georg Carle:
Online Monitoring of TCP Throughput Limitations. 1-9 - Estefanía Coronado, Abin Thomas, Suzan Bayhan, Roberto Riggio:
aiOS: An Intelligence Layer for SD-WLANs. 1-9 - André B. Campolina, Azzedine Boukerche, Antonio A. F. Loureiro:
Context and Location Awareness in Eco-Driving Recommendations. 1-6 - Tra Huong Thi Le, Nguyen Hoang Tran, Yan Kyaw Tun, Oanh Tran Thi Kim, Kitae Kim, Choong Seon Hong:
Sharing Incentive Mechanism, Task Assignment and Resource Allocation for Task Offloading in Vehicular Mobile Edge Computing. 1-8 - Wael S. Afifi, Ali A. El-Moursy, Mohamed Saad, Salwa M. Nassar, Hadia M. El-Hennawy:
A Dynamic Clustering Approach for Increasing User Throughput in 5G Wireless Networks. 1-8 - Junichi Kawasaki, Genichi Mouri, Yusuke Suzuki:
Comparative Analysis of Network Fault Classification Using Machine Learning. 1-6 - Diarmuid Corcoran, Per Kreuger, Christian Schulte:
Efficient Real-Time Traffic Generation for 5G RAN. 1-9 - Tobias Vogel, Benjamin Gernhardt, Matthias L. Hemmje:
Integrating Smart Production Planning Into Smart Production. 1-6 - Ricardo Parizotto, Lucas Castanheira, Fernanda Bonetti, Anderson Santos da Silva, Alberto Schaeffer-Filho:
PRIME: Programming In-Network Modular Extensions. 1-9 - Masaru Ueno, Yuji Imai:
SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration. 1-5 - Donatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas:
On the Implementation of Matching Theory Based Resource Allocation in Networking Testbeds. 1-2 - Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer:
All that Glitters is not Bitcoin - Unveiling the Centralized Nature of the BTC (IP) Network. 1-9 - Carol J. Fung, Yadunandan Pillai:
A Privacy-Aware Collaborative DDoS Defence Network. 1-5 - Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:
Paddy: An Event Log Parsing Approach using Dynamic Dictionary. 1-8 - Juan Luis Herrera, Marco Polverini, Jaime Galán-Jiménez:
A Machine Learning-Based Framework to Estimate the Lifetime of Network Line Cards. 1-5 - Donatos Stavropoulos, Vasileios Miliotis, Thanasis Korakis, Leandros Tassiulas:
Matching Theory Application for Efficient Allocation of Indivisible Testbed Resources. 1-7 - Thomas Lin, Alberto Leon-Garcia:
Towards a Client-Centric QoS Auto-Scaling System. 1-9 - Abdurhman Albasir, Q. Hu, Mustafa Al-tekreeti, Kshirasagar Naik, N. Naik, A. James Kozlowski, Nishith Goel:
Unsupervised Detection of Anomalous Behavior in Wireless Devices based on Auto-Encoders. 1-7 - Mariano Scazzariello, Lorenzo Ariemma, Giuseppe Di Battista, Maurizio Patrignani:
Megalos: A Scalable Architecture for the Virtualization of Network Scenarios. 1-7 - Estefanía Coronado, Faqir Zarrar Yousaf, Roberto Riggio:
Demo: Deploying Transparent Applications at the Network Edges with LightEdge. 1-2 - Fan Jiang, Kyle Ferriter, Claris Castillo:
A Cloud-Agnostic Framework to Enable Cost-Aware Scheduling of Applications in a Multi-Cloud Environment. 1-9 - Benjamin Burr, Shelly Wang, Geoff Salmon, Hazem M. Soliman:
On the Detection of Persistent Attacks using Alert Graphs and Event Feature Embeddings. 1-4 - Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Distributed DDoS Defense: A collaborative Approach at Internet Scale. 1-6 - Andrei Privalov, Ekaterina Skudneva, Igor V. Kotenko, Igor Saenko:
Graph-based evaluation of probability of disclosing the network structure by targeted attacks. 1-6 - Linzhi Zou, Chun-Xiang Chen, Kenichi Nagaoka:
An Empirical Study of the Effectiveness of Fallback on the ECN. 1-4 - Davide Aureli, Antonio Cianfrani, Alessio Diamanti, José Manuel Sánchez-Vílchez, Stefano Secci:
Going Beyond DiffServ in IP Traffic Classification. 1-6 - Erisa Karafili, Fulvio Valenza, Yichen Chen, Emil C. Lupu:
Towards a Framework for Automatic Firewalls Configuration via Argumentation Reasoning. 1-4 - Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi:
Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids. 1-9 - Emeka Obiodu, Nishanth Sastry, Aravindh Raman:
Is it time for a 999-like (or 112/911) system for critical information servicesƒ. 1-6 - Panagiotis Karamichailidis, Kostas Choumas, Thanasis Korakis:
OpenFlow enabled Integrated Routing and Bridging over Ethernet Virtual Private Networks. 1-5 - Miguel Borges de Freitas, Pedro Quitério, Luís Rosa, Tiago Cruz, Paulo Simões:
SDN-assisted containerized security and monitoring components. 1-5 - Gábor Soós, Dániel Ficzere, Pál Varga:
User Group Behavioural Pattern in a Cellular Mobile Network for 5G Use-cases. 1-7 - Attila Hilt, József Varga, Gábor Járó:
Capacity Expansion and Modernization of Core Network Elements Running on ATCA Platform. 1-5 - Ryan Mills, Nicholas J. P. Race, Matthew Broadbent:
Citrus: Orchestrating Security Mechanisms via Adversarial Deception. 1-4 - Nicholas Hart, Charalampos Rotsos, Vasileios Giotsas, Nicholas J. P. Race, David Hutchison:
λBGP: Rethinking BGP programmability. 1-9 - Verónica Quintuna Rodriguez, Fabrice Guillemin, Amina Boubendir:
Network Slice Management on top of ONAP. 1-2