default search action
NOMS 2018: Taipei, Taiwan
- 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS 2018, Taipei, Taiwan, April 23-27, 2018. IEEE 2018, ISBN 978-1-5386-3416-5
- Sina Rafati Niya, Florian Shupfer, Thomas Bocek, Burkhard Stiller:
Setting up flexible and light weight trading with enhanced user privacy using smart contracts. 1-2 - Muhammad Tahir Abbas, Talha Ahmed Khan, Asif Mahmood, Javier Jose Diaz Rivera, Wang-Cheol Song:
Introducing network slice management inside M-CORD-based-5G framework. 1-2 - Leonhard Nobach, Jeremias Blendin, Hans-Jörg Kolbe, Georg Schyguda, David Hausheer:
RTP packet loss healing on a bare-metal switch. 1-2 - Lukas Kekely, Martin Spinler, Stepan Friedl, Jiri Sikora, Jan Korenek:
Live demonstration of FPGA based networking accelerator for 200 Gbps data transfers. 1-3 - Song Wang, Karina Gomez Chavez, Kandeepan Sithamparanathan, Paul Zanna:
The smallest software defined network testbed in the world: Performance and security. 1-2 - Sven van der Meer, John Keeney, Liam Fallon, Joseph McNamara:
Demo: Adaptive policy execution (APEX). 1-2 - Marc-Oliver Pahl, Francois-Xavier Aubet, Stefan Liebald:
Graph-based IoT microservice security. 1-3 - Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser:
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot. 1-2 - Jeremy Singer, Herry Herry, Philip James Basford, Wajdi Hajji, Colin S. Perkins, Fung Po Tso, Dimitrios Pezaros, Robert D. Mullins, Eiko Yoneki, Simon J. Cox, Steven J. Johnston:
Next generation single board clusters. 1-3 - Petr Velan, Martin Husák, Daniel Tovarnák:
Rapid prototyping of flow-based detection methods using complex event processing. 1-3 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Synaptic: A formal checker for SDN-based security policies. 1-2 - Jing-Yung Fang, Taiho Lin, Calvin Chang, Cheng-Feng Yang, Hsu-Chi Su, Che-Yu Lu, Bo-Chun Wang, Ching-Han Hung, Pi-Chen Chiu, Miles Wang, Din-Bin Lin, Chun-Ting Chou, Tsang-Ling Sheu, Shi-Chung Chang:
Licensed shared access by mobile networks: Proof-of-concept demonstration over ViSSA platform. 1-2 - Balázs Nagy, Peter Orosz, Pál Varga:
Low-reaction time FPGA-based DDoS detector. 1-2 - Jana Komárková, Lukás Sadlek, Martin Lastovicka:
Community based platform for vulnerability categorization. 1-2 - Tao Li, Yuanjun Sun, Marek Sobe, Thorsten Strufe, Silvia Santini:
Energy-efficient SDN control and visualization. 1-2 - Frank Loh, Theodoros Karagkioules, Michael Seufert, Bernd Zeidler, Dimitrios Tsilimantos, Phuoc Tran-Gia, Stefan Valentin, Florian Wamser:
Demo: A wrapper for automated measurements with YouTube's native app. 1-2 - Martin Lastovicka, Daniel Filakovsky:
Passive os fingerprinting prototype demonstration. 1-2 - Guan-Ru Wang, Chien Chen, Chao-Wen Chen, Li-Wen Pan, Yu-Rong Wang, Ching-Ling Fan, Cheng-Hsin Hsu:
Streaming scalable video sequences with media-aware network elements implemented in P4 programming language. 1-2 - Mikolaj Chwalisz:
Demonstration of efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11. 1-2 - Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He:
Demo: On-the-fly generation of unikernels for software-defined security in cloud infrastructures. 1-2 - Tomás Jirsík:
Stream4Flow: Real-time IP flow host monitoring using Apache Spark. 1-2 - Yu-Chen Hsieh, Hua-Jun Hong, Pei-Hsuan Tsai, Yu-Rong Wang, Qiuxi Zhu, Md. Yusuf Sarwar Uddin, Nalini Venkatasubramanian, Cheng-Hsin Hsu:
Managed edge computing on Internet-of-Things devices for smart city applications. 1-2 - Shuai Zhao, Deep Medhi:
Application performance optimization using application-aware networking. 1-6 - Amina Boubendir, Emmanuel Bertin, Noemie Simoni:
Flexibility and dynamicity for open network-as-a-service: From VNF and architecture modeling to deployment. 1-6 - Michael Seufert, Phuoc Tran-Gia:
Quality of experience and access network traffic management of HTTP adaptive video streaming. 1-8 - Safiqul Islam, Michael Welzl, Stein Gjessing:
Lightweight and flexible single-path congestion control coupling. 1-6 - Yixin Diao, Daniela Rosu:
Improving response accuracy for classification- based conversational IT services. 1-15 - Thomas Soenen, Steven van Rossem, Wouter Tavernier, Felipe Vicens, Dario Valocchi, Panos Trakadas, Panos Karkazis, George Xilouris, Philip Eardley, Stavros Kolometsos, Michail-Alexandros Kourtis, Daniel Guija, Muhammad Shuaib Siddiqui, Peer Hasselmeyer, José Bonnet, Diego R. López:
Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. 1-6 - Thomas Lin, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia:
Deploying a multi-tier heterogeneous cloud: Experiences and lessons from the SAVI testbed. 1-7 - Hung-Cheng Chang, Bo-Jun Qiu, Chen-Hao Chiu, Jyh-Cheng Chen, Fuchun Joseph Lin, David de la Bastida, Bao-Shuh Paul Lin:
Performance evaluation of Open5GCore over KVM and Docker by using Open5GMTC. 1-6 - Yongyi Ran, Xiaoban Wu, Peilong Li, Chen Xu, Yan Luo, Liang-Min Wang:
EQuery: Enable event-driven declarative queries in programmable network measurement. 1-7 - Alexander Keller, Chris Dawson:
Months into minutes: Rolling out changes faster with service management automation. 1-14 - Joseph McNamara, John Keeney, Liam Fallon, Sven van der Meer, Enda Fallon:
A testbed for policy driven closed loop network management. 1-6 - Hongtan Sun, Karin Murthy, Raghav Batta, Maja Vukovic:
Using domain knowledge for targeted alerting in PBA for IT service management. 1-6 - Mikolaj Chwalisz, Adam Wolisz:
Towards efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11. 1-7 - Alessandro Raschellà, Faycal Bouhafs, Michael Mackay, Qi Shi, Jorge Ortín, José Ramón Gállego, María Canales:
AP selection algorithm based on a potential game for large IEEE 802.11 WLANs. 1-7 - Xin Zhang, Lanlan Rui, Jiawen Li, Xuesong Qiu, Shaoyong Guo, Wei Lin:
Multi-constrained maximally disjoint routing mechanism. 1-7 - Shinnazar Seytnazarov, Young-Tak Kim:
QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs. 1-7 - Shaoteng Liu, Rebecca Steinert, Dejan Kostic:
Flexible distributed control plane deployment. 1-7 - Lingyu Zhang, Ying Wang, Xuxia Zhong, Wenjing Li, Shaoyong Guo:
Resource-saving replication for controllers in multi controller SDN against network failures. 1-7 - Sixiang Feng, Ying Wang, Xuxia Zhong, Junran Zong, Xuesong Qiu, Shaoyong Guo:
A ring-based single-link failure recovery approach in SDN data plane. 1-7 - Nicolas Schnepf, Remi Badonnel, Abdelkader Lahmadi, Stephan Merz:
Generation of SDN policies for protecting android environments based on automata learning. 1-7 - Roben Castagna Lunardi, Regio Antonio Michelin, Charles Varlei Neu, Avelino Francisco Zorzo:
Distributed access control on IoT ledger-based architecture. 1-7 - Maxime Compastié, Remi Badonnel, Olivier Festor, Ruan He, Mohamed Kassi-Lahlou:
Unikernel-based approach for software-defined security in cloud infrastructures. 1-7 - Khalid Shahbar, Nur Zincir-Heywood:
How far can we push flow analysis to identify encrypted anonymity network traffic? 1-6 - Amir Teshome, Louis Rilling, Christine Morin:
Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS. 1-7 - Fabian Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, David Hausheer:
Energy models for NFV and service provisioning on fog nodes. 1-7 - Yibin Cai, Ying Wang, Xuxia Zhong, Wenjing Li, Xuesong Qiu, Shaoyong Guo:
An approach to deploy service function chains in satellite networks. 1-7 - Takashi Miyamura, Akira Misawa, Junichi Kani:
Decomposition-based VNF placement algorithm in TDM-WDM-based optical aggregation network. 1-7 - Michel S. Bonfim, Rafael Roque, Emanuel F. Coutinho, Kelvin Lopes Dias, Stenio Fernandes:
Identifying performance bottlenecks in software data planes for cloud-based NFV services. 1-7 - Michael Steinke, Wolfgang Hommel:
A data model for federated network and security management information exchange in inter-organizational IT service infrastructures. 1-2 - Huan Zhao, Meng Li:
Centroid-based KNN query in mobile service of LBS. 1-6 - Yu-Chang Ho, Pei-Chen Lee, Hsin-Yu Yeh, Min-Te Sun, Andy An-Kai Jeng:
An IMU-based turn prediction system. 1-6 - Marc-Oliver Pahl, Markus Loipfinger:
Machine learning as a reusable microservice. 1-7 - Tomás Jirsík, Pavel Celeda:
Toward real-time network-wide cyber situational awareness. 1-7 - Alisson R. Alves, Henrique D. Moura, Jonas R. A. Borges, Vinícius F. S. Mota, Luis H. Cantelli, Daniel F. Macedo, Marcos Augusto M. Vieira:
HomeNetRescue: An SDN service for troubleshooting home networks. 1-7 - Jonghwan Hyun, Nguyen Van Tu, James Won-Ki Hong:
Towards knowledge-defined networking using in-band network telemetry. 1-7 - Bogdan Andrus, Achim Autenrieth, Thomas Szyrkowiec, J. J. Vegas Olmos, Idelfonso Tafur Monroy:
Evaluation and experimental demonstration of SDN-enabled flexi-grid optical domain controller based on NETCONF/YANG. 1-7 - Vilho Räisänen, Nokia Bell, Kasper Apajalahti:
Reasoning in agent-based network management. 1-7 - Sven van der Meer, John Keeney, Liam Fallon:
Taming policy complexity: Model to execution. 1-8 - Tony Daher, Sana Ben Jemaa, Laurent Decreusefond:
Softwarized and distributed learning for SON management systems. 1-7 - Xuxia Zhong, Ying Wang, Xuesong Qiu, Shaoyong Guo:
Cost-aware service function chain orchestration across multiple data centers. 1-7 - Neeraj Asthana, Tom Chefalas, Alexei A. Karve, Alla Segal, Mahika Dubey, Sai Zeng:
A declarative approach for service enablement on hybrid cloud orchestration engines. 1-7 - Pedro Martinez-Julia, Ved P. Kafle, Hiroaki Harai:
Filtering observations to improve resource control in virtual computer and network systems. 1-7 - Yanfu Jiang, Shaoyong Guo, Si-Ya Xu, Xuesong Qiu, Luoming Meng:
Resource discovery and share mechanism in disconnected ubiquitous stub network. 1-7 - Xueyao Zhao, Lei Feng, Xiao Cheng, Wenjing Li, Peng Yu, Xuesong Qiu, Lei Wei:
Spectrum allocation with differential pricing and admission in cognitive-radio-based neighborhood area network for smart grid. 1-7 - Andreas Johnsson, Christian Rohner:
On performance observability in IoT systems using active measurements. 1-5 - Tzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, Ce-Kuen Shieh:
Distributed control framework for mapreduce cloud on cloud computing. 1-4 - Itai Dabran, Ofir Elmakias, Ron Shmelkin, Yishai Zusman:
An intelligent sound alam recognition system for smart cars and smart homes. 1-4 - Oussama Soualah, Marouen Mechtri, Chaima Ghribi, Djamal Zeghlache:
A green VNFs placement and chaining algorithm. 1-5 - Rakesh Shrestha, Rojeena Bajracharya, Seung Yeob Nam:
Centralized approach for trustworthy message dissemination in VANET. 1-5 - Sven van der Meer, John Keeney, Liam Fallon:
5G networks must be autonomic! 1-5 - Ricardo Bianchin Gomes, Roseclea Duarte Medina, Fernando Gomes Moro:
Cloud aid - A cloud computing tool for mitigating side-channel attacks. 1-5 - Xiaotong Wang, Lanlan Rui, Hui Guo, Xuesong Qiu:
Load-aware potential-based routing for the edge communication of smart grid with content-centric network. 1-5 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Michael Meinig, Feng Cheng, Christoph Meinel, Hendrik Graupner:
A threat modeling approach for cloud storage brokerage and file sharing systems. 1-5 - Marc-Oliver Pahl, Lorenzo Donini:
Securing IoT microservices with certificates. 1-5 - Tsozen Yeh, Tingyu Chien:
Building a version control system in the Hadoop HDFS. 1-5 - Heewon Kim, Yoonhee Kim:
An adaptive data placement strategy in scientific workflows over cloud computing environments. 1-5 - Linda Shif, Fei Wang, Chung-Horng Lung:
Improvement of security and scalability for IoT network using SD-VPN. 1-5 - Yuki Minami, Atsushi Taniguchi, Taichi Kawabata, Norio Sakaida, Katsuhiro Shimano:
An architecture and implementation of automatic network slicing for microservices. 1-4 - Yangjun Qiu, Xiaofeng Qiu, Yibin Cai:
Service function chaining policy compliance checking. 1-4 - Saoussen Chaabnia, Aref Meddeb:
Slicing aware QoS/QoE in software defined smart home network. 1-5 - Song Wang, Sathyanarayanan Chandrasekharan, Karina Mabell Gomez, Kandeepan Sithamparanathan, Akram Al-Hourani, Muhammad Rizwan Asghar, Giovanni Russello, Paul Zanna:
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks. 1-5 - Estefanía Coronado, Davit Harutyunyan, Roberto Riggio, José Villalón, Antonio Garrido:
Wi-Not: Exploiting radio diversity in software-defined 802.11-based WLANs. 1-4 - Xia Zhen, Lanlan Rui, Xuesong Qiu, Biyao Li, Peng Yu:
A backup algorithm for power communication network based on fault cascade in the network virtualization environment. 1-5 - Abdelhadi Azzouni, Guy Pujolle:
NeuTM: A neural network-based framework for traffic matrix prediction in SDN. 1-5 - Sharat Chandra Madanapalli, Minzhao Lyu, Himal Kumar, Hassan Habibi Gharakheili, Vijay Sivaraman:
Real-time detection, isolation and monitoring of elephant flows using commodity SDN system. 1-5 - Erik de Britto e Silva, Henrique D. Moura, Gabriel Fanelli, Manoel da Rocha Miranda, Daniel Fernandes Macedo, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:
Comparison of data center traffic division policies using SDN. 1-5 - Junhua Ba, Ying Wang, Xuxia Zhong, Sixiang Feng, Xuesong Qiu, Shaoyong Guo:
An SDN energy saving method based on topology switch and rerouting. 1-5 - Petr Velan:
Improving network flow definition: Formalization and applicability. 1-5 - Li-Hsing Yen, Ming-Hung Wang, Song-Yu Wu, Chien-Chao Tseng:
PIM-compliant SDN-enabled IP multicast service. 1-4 - Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisinski:
HoneyV: A virtualized honeynet system based on network softwarization. 1-5 - Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. 1-5 - Woojoong Kim, James Won-Ki Hong, Young-Joo Suh:
Live distributed controller migration for software-defined data center networks. 1-5 - Hongyu Deng, Yiming Wang, Cheng Wu:
Cognitive radio : A method to achieve spectrum sharing in LTE-R system. 1-5 - Takuma Tsubaki, Mika Ishizuka, Seisho Yasukawa:
A new algorithm of route design against large-scale disasters. 1-5 - Sheyda Kiani Mehr, Parikshit Juluri, Mahesh Maddumala, Deep Medhi:
An adaptation aware hybrid client-cache approach for video delivery with dynamic adaptive streaming over HTTP. 1-5 - Yuebin Bai, Xu Shao, Wentao Yang, Weitao Wang, Peng Feng, Shuai Liu, Xudong Zhang, Rui Wang:
Nodes contact probability estimation approach based on Bayesian network for DTN. 1-4 - Marzia Zaman, Chung-Horng Lung:
Evaluation of machine learning techniques for network intrusion detection. 1-5 - Sheng Luo, Shangru Zhong, Kai Lei:
IP/NDN: A multi-level translation and migration mechanism. 1-5 - Meng Zhou, Lanlan Rui, Xuesong Qiu, Zhen Xia, Biyao Li:
Evaluation of the node importance in power grid communication network and analysis of node risk. 1-5 - Jeroen van der Hooft, Cedric De Boom, Stefano Petrangeli, Tim Wauters, Filip De Turck:
An HTTP/2 push-based framework for low-latency adaptive streaming through user profiling. 1-5 - Lu Liu, Ao Xiong, Peng Yu, Lei Feng, Wenjing Li, Xuesong Qiu, Mingxiong Wang:
Energy-saving management mechanism based on hybrid energy supplies in multi-operator shared LTE networks. 1-5 - Stefano Petrangeli, Dries Pauwels, Jeroen van der Hooft, Jürgen Slowack, Tim Wauters, Filip De Turck:
Dynamic video bitrate adaptation for WebRTC-based remote teaching applications. 1-5 - Sam Leroux, Steven Bohez, Pieter-Jan Maenhaut, Nathan Meheus, Pieter Simoens, Bart Dhoedt:
Fingerprinting encrypted network traffic types using machine learning. 1-5 - Nurullah Shahin, Rashid Ali, Sung Won Kim, Young-Tak Kim:
Adaptively scaled back-off (ASB) mechanism for enhanced performance of CSMA/CA in IEEE 802.11ax high efficiency WLAN. 1-5 - Wubai Zhou, Xiaolong Zhu, Tao Li, Larisa Shwartz, Genady Ya. Grabarnik:
Multi-view feature selection for labeling noisy ticket data. 1-4 - Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras, Gabi Dreo:
DDoS defense using MTD and SDN. 1-9 - Olivier van der Toorn, Roland van Rijswijk-Deij, Bart Geesink, Anna Sperotto:
Melting the snow: Using active DNS measurements to detect snowshoe spam domains. 1-9 - Tho Le, Roland van Rijswijk-Deij, Luca Allodi, Nicola Zannone:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. 1-9 - Marios Anagnostopoulos, Georgios Kambourakis, Stefanos Gritzalis, David K. Y. Yau:
Never say never: Authoritative TLD nameserver-powered DNS amplification. 1-9 - Christopher Dabrowski, Kevin Mills:
Evaluating predictors of congestion collapse in communication networks. 1-9 - Shaowei Zhao, Junmao Li, Dagang Li:
An efficient tuple pruning scheme for packet classification using on-chip filtering and indexing. 1-7 - Ding-Fong Huang, Chien Chen, Mahadevan Thanavel:
Fast packet classification on OpenFlow switches using multiple R*-tree based bitmap intersection. 1-9 - Stanislav Lange, Lorenz Reinhart, Thomas Zinner, David Hock, Nicholas Gray, Phuoc Tran-Gia:
Integrating network management information into the SDN control plane. 1-9