default search action
NOMS 2024: Seoul, Korea
- NOMS 2024 IEEE Network Operations and Management Symposium, Seoul, Republic of Korea, May 6-10, 2024. IEEE 2024, ISBN 979-8-3503-2793-9
- Johannes F. Loevenich, Roberto Rigolin F. Lopes:
DRL meets GNN to improve QoS in Tactical MANETs. 1-4 - Radek Hranický, Adam Horák, Jan Polisenský, Kamil Jerábek, Ondrej Rysavý:
Unmasking the Phishermen: Phishing Domain Detection with Machine Learning and Multi-Source Intelligence. 1-5 - Csaba Hegedüs, Pál Varga:
Co-pilots for Arrowhead-based Cyber-Physical System of Systems Engineering. 1-6 - Suhwan Jung, Seokwoo Choi, Hyoil Kim, Youngkeun Yoon, Ho-Kyung Son:
Modeling the Coexistence Performance between Wi-Fi 7 and legacy Wi-Fi. 1-4 - Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Automatic and optimized firewall reconfiguration. 1-9 - Chengyuan Zhang, Changqing An, Tao Yu, Zhiyan Zheng, Jilong Wang:
Investigate and Improve the Certificate Revocation in Web PKI. 1-5 - Christian Lübben, Marc-Oliver Pahl:
Similarity-Based Selective Federated Learning for Distributed Device-Specific Anomaly Detection. 1-5 - Sumiko Miyata:
Improvement of Segment Length Selection Method for DASH Considering Shared Bottleneck Links. 1-4 - Chao Feng, Alberto Huertas Celdrán, Michael Vuong, Gérôme Bovet, Burkhard Stiller:
Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL. 1-9 - Nicolas Dupuis, Axel Van Damme, Philippe Dierickx, Olivier Delaby:
Upsampling Aggregated Network Traffic Data with Denoising Diffusion Probabilistic Models. 1-6 - Juan Chafla Altamirano, Mariem Guitouni, Hassan Hassan, Khalil Drira:
Routing optimization based on DRL and Generative Adversarial Networks for SDN environments. 1-5 - Aurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila:
SDN-based Mitigation of Synchronization Attacks on Distributed and Cooperative Controls in Microgrid. 1-3 - Li-Yin Bai, Pei-Hsuan Tsai:
A Secure Framework in Vertical and Horizontal Federated Learning Utilizing Homomorphic Encryption. 1-5 - Andikan Otung, Kenji Hikichi, Yasuki Fujii, Motoyoshi Sekiya:
IP Geolocation with Adversarial Probe Mitigation. 1-7 - Hanif Kukkalli, Mehrdad Hajizadeh, Thomas Bauschert:
Practical Evaluation of Dynamic Service Function Chaining (SFC) for Softwarized Mobile Services in an SDN-based Cloud Network. 1-6 - José Santos, Mattia Zaccarini, Filippo Poltronieri, Mauro Tortonesi, Cesare Sleianelli, Nicola Di Cicco, Filip De Turck:
Efficient Microservice Deployment in Kubernetes Multi-Clusters through Reinforcement Learning. 1-9 - Ángela Burgaleta, Ignacio Dominguez Martinez-Casanueva, Amit Karamchandani, Diego R. López, Antonio Pastor:
Framework for the development of a Network Digital Twin. 1-5 - José Oliveira, Pedro Almeida, Pedro Rito, Duarte M. G. Raposo, Susana Sargento:
Over-The-Air updates for Software Defined Vehicle services with IPFS. 1-9 - Rafael Adán-López, David Fernández-Martínez, Rafael A. Rodríguez-Gómez, José Camacho:
Coupled Design and Analysis of Experiments in Network Management. 1-5 - Marco Polverini, Antonio Cianfrani, Tommaso Caiazzi, Mariano Scazzariello, Ahmed Abdelsalam, Clarence Filsfils, Pablo Camarillo:
Achieving Best-path Selection at Line Rate through the SRv6 Live-Live Behavior. 1-5 - Ibirisol Fontes Ferreira, Eiji Oki:
Latency-Aware Cache Mechanism for Resolver Service of Domain Name Systems. 1-4 - Chanmin Lee, Shinyoung Cho, Hyungbin Park, Jihyun Park, Sukyoung Lee:
GAN-Enhanced Vertical Federated Learning System for WHAR with non-IID Data. 1-5 - Bokkeun Kim, Gyeongsik Kim, Jin Kim, Syed M. Raza, Hyunseung Choo:
Deep Tailored Dynamic Registration in B5G/6G with Lightweight Recurrent Model. 1-5 - Chao Xu, Jessie Hui Wang, Rui Li, Zongpeng Li, Hao Wu, Jilong Wang:
An Efficient FEC Scheme with SLA Consideration for Low Latency Transmissions. 1-9 - Chih-Wei Chang, Pei Jung, Chien-Che Hung, Yuan-Chih Chang:
Detect Silent Failures with Network Sentinel. 1-3 - Aristide Tanyi-Jong Akem, Guillaume Fraysse, Marco Fiore:
Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning. 1-9 - Nour-El-Houda Yellas, Jeongku Choi, Prosper Chemouil, Stefano Secci, Deep Medhi:
Network Slice Robustness with Function Sets. 1-9 - Luigi Cannarozzo, Thiago Bortoluzzi Morais, Paulo Silas Severo de Souza, Leonardo Reinehr Gobatto, Ivan Peter Lamb, Pedro Arthur P. R. Duarte, José Rodrigo Furlanetto Azambuja, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Weverton Cordeiro, Marcelo Caggiani Luizelli:
Spinner: Enabling In-network Flow Clustering Entirely in a Programmable Data Plane. 1-9 - Asad Malik, Ayan Roy, Sanjay Madria:
Trusted Digital Twin Network for Intelligent Vehicles. 1-5 - Pascal Hennen, Poornima Mani, Anja Feldmann:
Peaking Beyond the Best Route: An Extensive Dataset for Looking Glasses. 1-7 - Tamás Tóthfalusi, Zoltán Csiszár, Pál Varga:
Utilizing Generative AI for Test Data Generation - use-cases for IoT and 5G Core Signaling. 1-6 - Simon G. E. Gökstorp, Jakob Nyberg, Yeongwoo Kim, Pontus Johnson, György Dán:
Anomaly Detection in Security Logs using Sequence Modeling. 1-9 - Flaviene Scheidt de Cristo, Jorge Augusto Meira, Jean-Philippe Eisenbarth, Radu State:
A 9-dimensional Analysis of GossipSub over the XRP Ledger Consensus Protocol. 1-7 - Li-Hsuan Chu, Yen-Lin Tung, Yong-Zen Huang, Jhih-Heng Yan, Kuang-Heng Shen:
Dynamic Wavelength Switching for Open All-Photonics Networks. 1-5 - A. Almazi Bipon, Md Shantanu Islam, A. Taufiq Asyhari, Adel Aneiba, Raouf Abozariba:
Radio Environment Maps through Spatial Interpolation: A Web-based Approach. 1-7 - Ali Mazloum, Ali AlSabeh, Elie F. Kfoury, Jorge Crichigno:
perfSONAR: Enhancing Data Collection through Adaptive Sampling. 1-6 - Aristide Tanyi-Jong Akem, Marco Fiore:
Towards Data-Driven Management of Mobile Networks through User Plane Inference. 1-4 - Thanh-Nguyen Nguyen, Jangwon Lee, Mafeni Vitumbiko, Younghan Kim:
A Design and Development of Operator for Logical Kubernetes Cluster over Distributed Clouds. 1-6 - Kyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service. 1-5 - Carlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, Leonel Feitosa, Iure Fé, André Soares, Eunmi Choi, Tuan Anh Nguyen, Dugki Min:
Optimal Resource Utilization in Hyperledger Fabric: A Comprehensive SPN-Based Performance Evaluation Paradigm. 1-7 - Thomas Moser, Josef Wolfartsberger, Sabrina Romina Sorko, Belal Abu-Naim:
Extended Reality Based Education and Training for Human-Centric Industry 5.0 Skill Enhancement. 1-4 - Selman Sezgin, Kahina Mokrani, Sylvain Allio, Nour-El-Houda Yellas:
Residence Time Aware Client Selection in Federated Learning in Vehicular Network. 1-7 - Ibrahim Aliyu, Awwal M. Arigi, Seungmin Oh, Tai-Won Um, Jinsul Kim:
Towards a Partial Computation offloading in In-networking Computing-Assisted MEC: A Digital Twin Approach. 1-9 - Robin Buchta, Tobias Fritz, Carsten Kleiner, Felix Heine, Gabi Dreo Rodosek:
One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems. 1-5 - Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy:
ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification. 1-9 - Xiaoxuan Wang, Rolf Stadler:
IT Intrusion Detection Using Statistical Learning and Testbed Measurements. 1-7 - Sebastian Rieger, Martin Stiemerling:
ProNA: A Virtual Lab Framework to Teach Network Automation and SDN in Undergraduate Courses. 1-3 - Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong:
Log-TF-IDF for Anomaly Detection in Network Switches. 1-9 - Ranjan Patowary, Gautam Barua, Radhika Sukapuram:
Correctness of Flow Migration for Service Function Chains. 1-9 - Yuki Kanto, Kohei Watabe:
Wireless Link Quality Estimation Using LSTM Model. 1-5 - Kazuhiro Yasuda, Sho Tsugawa, Kohei Watabe:
Impact of Graph-to-Sequence Conversion Methods on the Accuracy of Graph Generation for Network Simulations. 1-5 - Nicolas Huin, Sébastien Martin, Jérémie Leguay:
Virtual Multi-Topology Routing for QoS Constraints. 1-9 - Yongyang Cheng, Feng Jiang:
A Novel Service Node Selection Approach Towards Resource-intensive Cloud Computing Environment. 1-4 - Moin Ali, Hyundong Hwang, Young-Tak Kim:
Enhanced C-V2X Mode-3 with Smart Handover and Wide-area Propagation of Emergency Warnings. 1-9 - Thiago Henrique Silva Rodrigues, Fábio Luciano Verdi:
Detecting Heavy Hitters in Network-Wide Programmable Multi-Pipe Devices. 1-5 - Thierry M. Ndimis Ndimis Toko, Martine Bellaïche, Talal Halabi:
A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking. 1-5 - Pham Tran Anh Quang, Jérémie Leguay, Feng Zeng, Jianqiang Hou, Boyuan Yu, Davide Restivo:
Dynamic QoS for High Quality SD-WAN Overlays. 1-3 - Mizuki Asano, Takumi Miyoshi, Taku Yamazaki:
Comparing Two-stage Clustering Methods for Traffic Pattern Analysis in IoT Device Identification. 1-6 - Ashot N. Harutyunyan, Arnak V. Poghosyan, Tigran Bunarjyan, Naira Grigoryan, Artur Grigoryan, Vahan Tadevosyan, Nelson Baloian:
Discovery of Cloud Incidents through Streaming Consolidation of Events across Timeline and Topology Hierarchy. 1-7 - Frederico Meletti Rappa, Roberto Rodrigues Filho, Alison R. Panisson, Leandro Soriano Marcolino, Luiz F. Bittencourt:
Multi-armed Bandits for Self-distributing Stateful Services across Networking Infrastructures. 1-6 - Song Guo, Minzhao Lyu, Hassan Habibi Gharakheili:
Realizing Open and Decentralized Marketplace for Exchanging Data of Expected IoT Behaviors. 1-5 - David Balla, István Moldován, Miklós Máté, Markosz Maliosz, János Harmatos:
Time Sensitive Industrial Applications in Kubernetes. 1-7 - Kinda Khawam, Hussein Taleb, Samer Lahoud, Hassan Fawaz, Dominique Quadri, Steven Martin:
Non-Cooperative Edge Server Selection Game for Federated Learning in IoT. 1-6 - Cristopher Chiaro, Doriana Monaco, Alessio Sacco, Claudio Casetti, Guido Marchetto:
Latency-aware Scheduling in the Cloud-Edge Continuum. 1-5 - Quazi Mishkatul Alam, Israat Haque, Nael B. Abu-Ghazaleh:
Learn to Compress (LtC): Efficient Learning-based Streaming Video Analytics. 1-9 - Lorenzo Colombi, Alessandro Gilli, Simon Dahdal, Ion Boleac, Mauro Tortonesi, Cesare Stefanelli, Massimiliano Vignoli:
A Machine Learning Operations Platform for Streamlined Model Serving in Industry 5.0. 1-6 - Belal Abu-Naim, Yasin Ghafourian, Anna Ryabokon, Francesca Flamigni, Ralph Baldrian:
A Generic Framework for Resource-Limited Microcontrollers Deployment in I-IoT Systems. 1-6 - Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Security Automation in next-generation Networks and Cloud environments. 1-4 - Timo Geier, Sebastian Rieger:
Orchestrating Multi-Tenant Code Updates Across Multiple Programmable Switches. 1-3 - Sayantini Majumdar, Susanna Schwarzmann, Riccardo Trivisonno, Georg Carle:
Distributed Intelligence for Dynamic Task Migration in the 6G User Plane using Deep Reinforcement Learning. 1-9 - Van Vi Vo, Syed M. Raza, Duc Tai Le, Moonseong Kim, Hyunseung Choo:
Graph Neural Networks for IoT Data Aggregation Scheduling. 1-7 - Michael Boch, Christian Hirsch, Yukari Susaki, Stefan Gindl, Markus Tauber:
Harvesting Innovation: Analysis of Decentralized MAPE-K Loops in Cyber-Physical Production Systems. 1-7 - Alex Huang Feng, Pierre François, Kensuke Fukuda, Wanting Du, Thomas Graf, Paolo Lucente, Stéphane Frénot:
Practical Anomaly Detection in Internet Services: An ISP centric approach. 1-4 - Zeyou Xia, Go Hasegawa:
Machine learning-based estimation of the number of competing flows at a bottleneck link. 1-4 - Tung V. Doan, Frank H. P. Fitzek, Giang T. Nguyen:
StateOS: Enabling Versatile Network Function Virtualization in Edge Clouds. 1-9 - Ondrej Sedlácek, Václav Bartos:
Fusing Heterogeneous Data for Network Asset Classification - A Two-layer Approach. 1-6 - Yu Qiao, Apurba Adhikary, Chaoning Zhang, Choong Seon Hong:
Towards Robust Federated Learning via Logits Calibration on Non-IID Data. 1-7 - Akhila Rao, Hassam Riaz, Aleksandr Zavodovski, Rami Mochaourab, Viktor Berggren, Andreas Johnsson:
Generalizable One-Way Delay Prediction Models for Heterogeneous UEs in 5G Networks. 1-9 - Snigdha, Venkatarami Reddy Chintapalli, A. Antony Franklin:
Delay-aware Service Function Chain Provisioning with VNF Instance Sharing. 1-9 - Siddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin:
RECAP 5GC: Resilience and CAP aware 5G Core for Consistent and High Availability Service. 1-7 - Yu Min Park, Yan Kyaw Tun, Choong Seon Hong:
Joint User Pairing and Beamforming Design of Multi-STAR-RISs-Aided NOMA in the Indoor Environment via Multi-Agent Reinforcement Learning. 1-8 - Carlos Fraga, Antônio J. G. Abelém, Vinicius C. M. Borges, Billy Pinheiro, Weverton Cordeiro:
A Blockchain-based Approach for Continuous Auditing in IT Change Management. 1-4 - Ui-Jun Baek, Min-Seong Lee, Jee-Tae Park, Jeong Woo Choi, Chang-Yui Shin, Ju-Sung Kim, Yoon-Seong Jang, Myung-Sup Kim:
Lightweight Multi-Input Shape CNN-based Application Traffic Classification. 1-5 - Kitae Kim, Yan Kyaw Tun, Md. Shirajum Munir, Walid Saad, Choong Seon Hong:
Pilot Optimization and Channel Estimation Scheme for Semantic Communication: A Framework for Edge Intelligence. 1-7 - Lukás Jancicka, Josef Koumar, Dominik Soukup, Tomás Cejka:
Analysis of Statistical Distribution Changes of Input Features in Network Traffic Classification Domain. 1-4 - Mengjie Guo, Guochu Shou, Yaqiong Liu, Yihong Hu:
Adaptive Configuration with Deep Reinforcement Learning in Software-Defined Time-Sensitive Networking. 1-7 - Katharina O. E. Müller, Daria Schumm, Elliott Wallace, Bruno Rodrigues, Burkhard Stiller:
SHIFT: a Security and Home Integration Framework for IoT. 1-7 - Kristina Dzeparoska, Ali Tizghadam, Alberto Leon-Garcia:
Intent Assurance using LLMs guided by Intent Drift. 1-7 - Theodora Adufu, Jiwon Ha, Yoonhee Kim:
Application-aware Resource Sharing using Software and Hardware Partitioning on Modern GPUs. 1-8 - Jiyong Oh, Syed M. Raza, Lusungu Josh Mwasinga, Moonseong Kim, Hyunseung Choo:
Deep UAV Path Planning with Assured Connectivity in Dense Urban Setting. 1-5 - Patrik Goldschmidt, Jan Kucera:
Windower: Feature Extraction for Real-Time DDoS Detection Using Machine Learning. 1-10 - Shangdong Wang, Zhiliang Wang, Chenglong Li, Dongqi Han, Jiahai Yang, Hui Zhang:
TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning. 1-9 - Takamichi Miyata:
Completion of Traffic Matrix by Tensor Nuclear Norm Minus Frobenius Norm Minimization and Time Slicing. 1-5 - Hyunsung Kim, Yeji Choi, JeongJun Park, Lusungu Josh Mwasinga, Hyunseung Choo:
Federated Learning-Driven Edge AI for Enhanced Mobile Traffic Prediction. 1-4 - Esra Ceylan, Krishnendu Chatterjee, Stefan Schmid, Jakub Svoboda:
Congestion-Free Rerouting of Network Flows: Hardness and an FPT Algorithm. 1-7 - Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda:
iCPN: Scalable Control Plane for the Network Service Automation System. 1-5 - Khanh-Huu-The Dam, Gorby Kabasele Ndonda, Axel Legay, Ramin Sadre:
Avoiding "Hot Potato" Problems in Internet Service Providers. 1-6 - Jan Pennekamp:
Evolving the Industrial Internet of Things: The Advent of Secure Collaborations. 1-6 - Kouichi Genda:
On-demand network bandwidth reservation method exploiting machine learning intuitive judgment. 1-5 - Guan-Wen Chen, Yi-Hsiu Lin, Tsì-Uí Ik:
TrafficEd: Deployment and Management System of Edge AI Cameras. 1-7 - Xiaojie Zhang, Amitangshu Pal, Saptarshi Debroy:
EdgeURB: Edge-driven Unified Resource Broker for Real-time Video Analytics. 1-8 - Gautam Kumar, Brent Lagesse:
Thimblerig: A Game-Theoretic, Adaptive, Risk-limiting Security System for Cloud Systems. 1-6 - Lars Wüstrich, Sebastian Gallenmüller, Stephan M. Günther, Georg Carle, Marc-Oliver Pahl:
Shells Bells: Cyber-Physical Anomaly Detection in Data Centers. 1-10 - Avi Deb Raha, Apurba Adhikary, Mrityunjoy Gain, Yu Min Park, Choong Seon Hong:
Towards Ultra-Reliable 6G: Semantics Empowered Robust Beamforming for Millimeter-Wave Networks. 1-7 - Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Securing P4-SDN Data Plane against Flow Table Modification Attack. 1-5 - Takaya Miyazawa, Ved P. Kafle, Hitoshi Asaeda:
Distributed and Adaptive Workload Prediction for In-Network Computing. 1-7 - José Camacho:
ANOVA Simultaneous Component Analysis for the Efficient Exploration of Massive Network Traffic. 1-5 - Sebastian Rieger, Leon-Niklas Lux, Jannik Schmitt, Martin Stiemerling:
DigSiNet: Using Multiple Digital Twins to Provide Rhythmic Network Consistency. 1-5 - Zied Ennaceur, Mounir Bensalem, Cao Vien Phung, André C. Drummond, Admela Jukan:
Enabling 6G Campus Networks Intelligent Control with Digital Twin: A case study. 1-6 - Nils Rodday, Gabi Dreo Rodosek, Aiko Pras, Roland van Rijswijk-Deij:
Exploring the Benefit of Path Plausibility Algorithms in BGP. 1-10 - Sayantini Majumdar, Susanna Schwarzmann, Riccardo Trivisonno, Georg Carle:
Distributed Intelligence for Automated 6G Network Management Using Reinforcement Learning. 1-4 - Venkateswarlu Gudepu, Rajashekhar Reddy Tella, Carlo Centofanti, José Santos, Andrea Marotta, Koteswararao Kondepu:
Demonstrating the Energy Consumption of Radio Access Networks in Container Clouds. 1-3 - Klement Hagenhoff, Gabi Dreo Rodosek:
Eliminating Bottlenecks in MANETs. 1-5 - Tianshi Wang, Yiran Zhang, Ao Zhou, Shangguang Wang:
An Enhancement Framework for RDMA Congestion Control in Multi-tenant Datacenters. 1-9 - Akrit Mudvari, Leandros Tassiulas:
Joint SDN Synchronization and Controller Placement in Wireless Networks using Deep Reinforcement Learning. 1-9