


default search action
19th CNSM 2023: Niagara Falls, ON, Canada
- 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023. IEEE 2023, ISBN 978-3-903176-59-1

- Bruno Loureiro Coelho

, Alberto E. Schaeffer-Filho:
CrossBal: Data and Control Plane Cooperation for Efficient and Scalable Network Load Balancing. 1-9 - Pooyan Habibi, Morteza Moghaddassian, Shayan Shafaghi, Alberto Leon-Garcia:

Data Fabrics for Multi-Domain Information Systems. 1-5 - José Santos, Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:

Performance Impact of Queue Sorting in Container-Based Application Scheduling. 1-9 - Masoud Taghavian, Yassine Hadjadj-Aoul, Géraldine Texier, Nicolas Huin, Philippe Bertin:

A Fair Approach to the Online Placement of the Network Services Over the Edge. 1-7 - Alfred Arouna, Ioana Livadariu, Azan Latif Khanyari, Ahmed Elmokashfi:

On Large-Scale IP Service Disruptions Dependencies. 1-5 - Julian Jimenez, Paola Soto, Danny De Vleeschauwer, Chia-Yu Chang, Yorick De Bock, Steven Latré, Miguel Camelo:

Resource Allocation of Multi-User Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning. 1-5 - Paul Seehofer

, Roland Bless
, Hendrik Mahrt, Martina Zitterbart:
Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks. 1-9 - Dor Harris, David Naori, Danny Raz:

Online Utilization Maximization in Resource Allocation with Minimum Service Guarantees. 1-9 - Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:

A Lightweight Heuristic for Micro-Services Placement and Chaining in Low Latency Services. 1-9 - Yichong Chen

, Manuel Roveri, Shreshth Tuli, Giuliano Casale:
Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting. 1-9 - Bruck Wubete, Babak Esfandiari, Thomas Kunz:

Leveraging Spatiotemporal Relations for Predicting Potential Link Failures. 1-5 - Nischal Aryal

, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi:
Subscription Management for Beyond 5G and 6G Cellular Networks Using Blockchain Technology. 1-7 - Leonardo Alberro

, Eduardo Grampín:
BGP Control Plane Overhead in Fat-Trees: An Analytical Approach. 1-7 - Md Mahir Shahriyar, Gourab Saha, Bishwajit Bhattacharjee, Rezwana Reaz:

DEFT: Distributed, Elastic, and Fault-Tolerant State Management of Network Functions. 1-7 - Csaba Hegedüs, Pál Varga:

Tailoring MLOps Techniques for Industry 5.0 Needs. 1-7 - Engin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan

, Yekta Turk:
Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks. 1-7 - Céline Minh, Kevin Vermeulen, Cédric Lefebvre, Philippe Owezarski, William Ritchie:

An Explainable-by-Design Ensemble Learning System to Detect Unknown Network Attacks. 1-9 - Dániel Ficzere, Gergely Hollósi, Attila Frankó, Pál Varga:

AI Toolbox Concept for the Arrowhead Framework. 1-7 - Henrique D. Moura

, Júnia Maísa Oliveira
, Daniel Soares, Daniel F. Macedo
, Marcos A. M. Vieira:
Improved Video QoE in Wireless Networks Using Deep Reinforcement Learning. 1-7 - Tomás Benes, Jaroslav Pesek

, Tomás Cejka:
Look at my Network: An Insight into the ISP Backbone Traffic. 1-7 - Omar Houidi

, Oussama Soualah, Ines Houidi, Djamal Zeghlache:
Energy Efficient VNF-FG Embedding via Attention-Based Deep Reinforcement Learning. 1-7 - Mahtab Movahedian, Mahdi Dolati, Majid Ghaderi:

Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular Networks. 1-9 - Marc Koerner:

Vendor Agnostic Network Service Orchestration with Stacked NSO Services. 1-4 - Maria Mushtaq, Morteza Golkarifard, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:

Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN. 1-5 - Md. Shamim Towhid, Nasik Sami Khan, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh:

A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification. 1-7 - Engin Zeydan, Luis Blanco, Sergio Barrachina-Muñoz, Farhad Rezazadeh

, Luca Vettori, Josep Mangues:
A Marketplace Solution for Distributed Network Management and Orchestration of Slices. 1-6 - Ying Wang, Yufan Cheng, Zhihan Zhuang, Junye Zhang, Peng Yu, Shaoyong Guo, Xuesong Qiu:

Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN. 1-5 - Max Helm, Georg Carle:

Synthesizing and Scaling WAN Topologies Using Permutation-Invariant Graph Generative Models. 1-7 - Kristina Dzeparoska, Jieyu Lin, Ali Tizghadam, Alberto Leon-Garcia:

LLM-Based Policy Generation for Intent-Based Management of Applications. 1-7 - Mays F. Al-Naday, Vasileios Karagiannis, Tom De Block, Bruno Volckaert:

Federated Scheduling of Fog-Native Applications Over Multi-Domain Edge-to-Cloud Ecosystem. 1-7 - Mehdi Nobakht

, Arshiya Rezaie Hezaveh:
pUpdate: Priority-Based Scheduling for Continuous and Consistent Network Updates in SDN. 1-7 - Lorenzo Manca

, Davide Borsatti, Filippo Poltronieri
, Mattia Zaccarini
, Domenico Scotece, Gianluca Davoli
, Luca Foschini, Genady Ya. Grabarnik, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi
, Walter Cerroni:
Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach. 1-9 - Thorben Krüger, Clemens Beck, David Hausheer:

Path Oracle: Improving Performance of Path-Aware Applications in SCION. 1-5 - Yoichi Matsuo

:
Empirical Analysis of the Fine-Tuning for Unsupervised Anomaly Detection in the ICT System. 1-7 - Nils Höger, Nils Rodday, Oliver Borchert, Gabi Dreo Rodosek:

Path Plausibility Algorithms in GoBGP. 1-3 - Jorge Baranda, Sergio Barrachina-Muñoz, Rasoul Nikbakht, Miquel Payaró, Josep Mangues-Bafalluy:

Disaggregating a 5G Non-Public Network via On-Demand Cloud-Native UPF Deployments. 1-3 - Tamas Tothfalusi, Eszter Varga, Zoltan Csiszar, Pál Varga:

ML-Based Translation Methods for Protocols and Data Formats. 1-5 - Elham Akbari, Sheikh A. Tahmid, Navid Malekghaini, Mohammad Ali Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin

:
A Critical Study of Few-Shot Learning for Encrypted Traffic Classification. 1-9 - Attila Frankó, Gergely Hollósi:

Settling Issues in IEEE 802.1AS Networks in PI Based Clock Servos. 1-7 - Ulya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar:

Analyzing the Quality of Synthetic Adversarial Cyberattacks. 1-5 - Ali Hassan, Shahram Shah-Heydari:

Enterprise Application Outage Prediction Using XGBoost and LSTM. 1-5 - Solmaz Jaberi

, J. William Atwood
, Joey Paquet
:
ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking. 1-5 - Pegah Golchin, Chengbo Zhou

, Pratyush Agnihotri
, Mehrdad Hajizadeh, Ralf Kundel, Ralf Steinmetz:
CML-IDS: Enhancing Intrusion Detection in SDN Through Collaborative Machine Learning. 1-9 - Rafael Copstein, Brad Niblett, Andrew Johnston, Jeff Schwartzentruber, Malcolm I. Heywood

, Nur Zincir-Heywood:
MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection. 1-7 - Satoru Kobayashi

, Ryusei Shiiba, Ryosuke Miura, Shinsuke Miwa, Toshiyuki Miyachi, Kensuke Fukuda:
dot2net: A Labeled Graph Approach for Template-Based Configuration of Emulation Networks. 1-9 - Timo Geier, Sebastian Rieger:

Low Impact Tenant Code Updates on Multi-Tenant Programmable Switches. 1-5 - Hiroshi Yamauchi

, Tatsuaki Kimura:
Deep Reinforcement Learning Based Command Control System for Automating Fault Diagnosis. 1-5 - Yixing Wang, Yang Xiao

, Yuqian Song, Jingli Zhou, Jun Liu:
Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4. 1-7 - Vedant Joseph Kumar, Patrick Maillé, Bruno Tuffin:

Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model. 1-7 - Amirhossein Sefati, Mahdi Dolati, Majid Ghaderi:

Workload Placement with Bounded Slowdown in Disaggregated Datacenters. 1-9 - Mehdi Nobakht

, Frank T. H. den Hartog:
On Integrated Wired and Wireless Time-Sensitive Networking using SDN. 1-5 - Josef Koumar

, Karel Hynek, Tomás Cejka:
Network Traffic Classification Based on Single Flow Time Series Analysis. 1-7 - Negar Mohammadi-Koushki, Sanjeev Sondur, Krishna Kant:

Improving System Configurations Using Domain Knowledge Assisted Semi-Supervised Learning. 1-5 - Sukhyun Nam, Euidong Jeong

, Jibum Hong, Jae-Hyoung Yoo, James Won-Ki Hong:
Log Analysis and Prediction for Anomaly Detection in Network Switches. 1-7 - Bohan Zhang

, Paul Zeinaty, Noura Limam, Raouf Boutaba:
Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA. 1-9 - Vinicius Fulber-Garcia

, José Wilson Vieira Flauzino, Carlos Raniery Paula dos Santos, Elias P. Duarte:
An ETSI-Compliant Architecture for the Element Management System: The Key for Holistic NFV Management. 1-9 - Kazuaki Akashi, Nobukazu Fukuda, Shunsuke Kanai, Kenichi Tayama:

Deep Reinforcement Learning for Network Service Recovery in Large-Scale Failures. 1-5 - Nan Jiang, Jessie Hui Wang, Jilong Wang, Peiran Wang:

TinyG: Accurate IP Geolocation Using a Tiny Number of Probers. 1-9 - Jonas Brunner, Bruno Rodrigues

, Katharina O. E. Müller, Salil S. Kanhere, Burkhard Stiller:
Deciphering DDoS Attacks Through a Global Lens. 1-7 - Manh-Tien-Anh Nguyen, Van Tong, Sondes Bannour Souihi

, Sami Souihi:
Deep Learning in NLP for Anomalous HTTP Requests Detection. 1-8 - Justin Kur, Ji Xue, Jingshu Chen

, Jun Huang
:
Bridging Resource Prediction and System Management: A Case Study in Cloud Systems. 1-5 - Sarah Shah, Yasaman Amannejad

, Diwakar Krishnamurthy:
Predicting the Performance of DNNs to Support Efficient Resource Allocation. 1-7 - Sebastian Schmidt, Johannes Zerwas, Wolfgang Kellerer:

AdFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks. 1-5 - Abdulhakeem Abdulazeez, Nicola Roberto Zema, Tara Ali-Yahiya, Steven Martin:

Learning-Based Formation Control of UAV-Fleet. 1-7 - Eui-Dong Jeong

, Jae-Hyoung Yoo, James Won-Ki Hong:
SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement Learning. 1-5 - Josef Koumar

, Richard Plný
, Tomás Cejka:
Enhancing DeCrypto: Finding Cryptocurrency Miners Based on Periodic Behavior. 1-7 - Nils Rodday, Gabi Dreo Rodosek:

BGPEval: Automating Large-Scale Testbed Creation. 1-5 - Benjamin Teyssier, Y A Joarder

, Carol J. Fung:
An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks. 1-9 - Brigitte Jaumard, Junior Momo Ziazet:

5G E2E Network Slicing Predictable Traffic Generator. 1-7 - Jiaheng Xiong

, Qiaolun Zhang, Alberto Gatto, Francesco Musumeci, Raouf Boutaba, Massimo Tornatore:
Adaptive Entanglement Routing for Quantum Networks with Cutoff. 1-5 - Lucas Torrealba Aravena, Pedro Casas

, Javier Bustos-Jiménez, Germán Capdehourat
, Mislav Findrik:
Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic Analysis. 1-5 - Alexander Loginov, Jeffrey Adjei, Nur Zincir-Heywood, Srinivas Sampalli, Kevin de Snayer, Terri Dougall:

Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices. 1-5 - Mohamed Abderrahmane Madani

, Fen Zhou, Ahmed Meddahi:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. 1-5 - Badre Bousalem

, Mohamed Anis Sakka, Vinicius F. Silva, Wael Jaafar, Asma Ben Letaifa, Rami Langar:
DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-Based Approach. 1-5 - Behnam Farzaneh, Nashid Shahriar, Abu Hena Al Muktadir, Md. Shamim Towhid:

DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G Networks. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














