


default search action
48th LCN 2023: Daytona Beach, FL, USA
- Sharief Oteafy, Eyuphan Bulut, Florian Tschorsch, Kanchana Thilakarathna:

48th IEEE Conference on Local Computer Networks, LCN 2023, Daytona Beach, FL, USA, October 1-5, 2023. IEEE 2023, ISBN 979-8-3503-0074-1 - Alexander Brundiers

, Timmy Schüller, Nils Aschenbruck:
Combining Midpoint Optimization and Conventional End-to-End Segment Routing for Traffic Engineering. 1-9 - Alvi Ataur Khalil

, Mohammad Ashiqur Rahman
:
Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVs. 1-9 - Nehal Baganal Krishna, Tuan-Dat Tran

, Ralf Kundel, Amr Rizk:
RPM: Reverse Path Congestion Marking on P4 Programmable Switches. 1-4 - Ekaterina Volodina, Erwin P. Rathgeb:

The ACK Policy Optimization Algorithm for QUIC. 1-8 - Katharina O. E. Müller, Louis Bienz, Bruno Rodrigues

, Chao Feng
, Burkhard Stiller:
HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices. 1-9 - Nirhoshan Sivaroopan, Chamara Madarasingha

, Shashika Muramudalige, Guillaume Jourjon, Anura P. Jayasumana, Kanchana Thilakarathna:
SyNIG: Synthetic Network Traffic Generation through Time Series Imaging. 1-9 - Roman Rader, Kamil Jerábek, Ondrej Rysavý:

Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study. 1-4 - Eric Lanfer

, Sophia Sylvester
, Nils Aschenbruck, Martin Atzmueller:
Leveraging Explainable AI Methods Towards Identifying Classification Issues on IDS Datasets. 1-4 - Fatih Senel, Nils Aschenbruck:

Optimizing the Deployment of UAV for Mesh Access Network Coverage. 1-9 - Artur Sterz

, Robin Klose, Markus Sommer
, Jonas Höchst, Jakob Link, Bernd Simon, Anja Klein, Matthias Hollick
, Bernd Freisleben:
Energy-efficient Broadcast Trees for Decentralized Data Dissemination in Wireless Networks. 1-4 - Junkai He, Makhlouf Hadji, Djamal Zeghlache:

Constrained Dynamic Virtual Network Embedding. 1-6 - Pia Baumstark, David Monschein, Oliver P. Waldhorst:

Secure Plaintext Acquisition of Homomorphically Encrypted Results for Remote Processing. 1-4 - Nikolas Wintering, Jannis Mast, Thomas Hänel, Nils Aschenbruck:

Trade-Off Between Compression and FEC in Image Transmission Over Wifibroadcast. 1-9 - Farinaz Jowkarishasaltaneh, Jason But:

msTEACUP - Running Repeatable Experiments with MPTCP over Complex Network Topologies. 1-4 - Mohammad Majid Akhtar, Ishan Karunanayake, Bibhas Sharma, Rahat Masood, Muhammad Ikram

, Salil S. Kanhere:
Towards Automatic Annotation and Detection of Fake News. 1-9 - Asif Ali Mehmuda, Reza Hedayati Majdabadi, Mea Wang, Diwakar Krishnamurthy:

Antifreeze: High-Quality Adaptive Live Streaming with Real-time Transcoder. 1-4 - Jonas Schulz, Hristina Radak, Phuong T. Nguyen

, Giang T. Nguyen
, Frank H. P. Fitzek
:
On the Limits of Lossy Compression for Human Activity Recognition in Sensor Networks. 1-4 - Daniel Otten, Max Ilsen

, Markus Chimani, Nils Aschenbruck:
Green Traffic Engineering by Line Card Minimization. 1-8 - Daniel Weber

, Christoph Fuchs, Nils Auler, Bertram Schütz, Nils Aschenbruck:
Multipath TCP Scheduling in the Age of Buffer Bloat Optimizations. 1-8 - Gatien Roujanski, Michel Marot, Hossam Afifi, Adel Mounir Sareh Said:

Cellular network offloading through Drone Cooperation. 1-4 - Arshiya Rezaie Hezaveh, Mehdi Nobakht:

On Priority-Based Scheduling for Network Updates in SDN. 1-4 - Taylor Bradley, Lanier A. Watkins, Elie Alhajjar

:
Autonomic Cyber Security Enhanced with Survival Analysis (ACSeSA). 1-9 - Karthik Muthineni

, Alexander Artemenko
:
From C-Band to mmWave-Band: Ray-Tracing-Assisted 5G-Based Indoor Positioning in Industrial Scenario. 1-7 - Ying Li, Junwu Zhu, Xu Liu

:
Effective Resource Allocation and Pricing Mechanism for MEC under Two-Price Equilibrium. 1-9 - Ahmed Shokry, Moustafa Youssef:

QRadar: A Deployable Quantum Euclidean Similarity Large-scale Localization System. 1-8 - Tyler Kvochick, Julia Byon, Mike Candler, Kendra Lockard, Eli Phillips, Tommy Schaefer, Alex Serriere, Sana Moghul, Casey Wittkop, Marc Wolfe:

Demo: Software-Based Design of Data Center Networking Infrastructure. 1-4 - Jingyuan Zhang, Douglas M. Blough

:
Coverage Analysis for Multi-Hop Communication in Intelligent-Surface-Assisted mmWave WLANs. 1-9 - Hauton Tsang, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba:

Meta-ATMoS+: A Meta-Reinforcement Learning Framework for Threat Mitigation in Software-Defined Networks. 1-9 - Kai Cui

, Lars Baumgärtner, Mustafa Burak Yilmaz, Mengguang Li, Christian Fabian
, Benjamin Becker, Lin Xiang
, Maximilian Bauer
, Heinz Koeppl:
UAV Swarms for Joint Data Ferrying and Dynamic Cell Coverage via Optimal Transport Descent and Quadratic Assignment. 1-8 - Daniel Commey

, Benjamin Appiah, Bill K. Frimpong, Isaac Osei
, Ebenezer N. A. Hammond, Garth V. Crosby:
EGAN: Evolutional GAN for Ransomware Evasion. 1-9 - Michael Burke, Mohamed Younis:

Humidity Estimation Using WiFi Channel State Information. 1-4 - Ahmad Sarlak, Abolfazl Razi, Xiwen Chen, Rahul Amin:

Diversity Maximized Scheduling in RoadSide Units for Traffic Monitoring Applications. 1-4 - Mohammed Nasereddin

, Mert Nakip, Erol Gelenbe:
Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed. 1-4 - Hugo Santos

, Bruno S. Martins, Denis Rosário, Eduardo Cerqueira, Torsten Braun:
Mobility-aware Service Function Chaining Orchestration for Multi-user Augmented Reality. 1-9 - Michael König

, Oliver P. Waldhorst, Martina Zitterbart:
QUIC(k) Enough in the Long Run? Sustained Throughput Performance of QUIC Implementations. 1-4 - Carlos Ruiz De Mendoza

, Cristina Cervelló-Pastor, Sebastià Sallent:
Optimal Resource Placement in 5G/6G MEC for Connected Autonomous Vehicles Routes Powered by Deep Reinforcement Learning. 1-4 - Maryam Ataei Kachooei, Jae Chung, Feng Li, Benjamin Peters, Mark Claypool:

SEARCH: Robust TCP Slow Start Performance over Satellite Networks. 1-4 - Aya Jaradat, Moad Mowafi

, Eyad Taqieddin:
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps. 1-4 - Daniel Otten, Alexander Brundiers

, Timmy Schüller, Nils Aschenbruck:
Green Segment Routing for Improved Sustainability of Backbone Networks. 1-9 - Md Washik Al Azad, Hasniuj Zahan, Sifat Ut Taki, Spyridon Mastorakis:

DarkHorse: A UDP-based Framework to Improve the Latency of Tor Onion Services. 1-6 - Lucas Bréhon-Grataloup, Rahim Kacimi, André-Luc Beylot:

Field Trial for Enhanced V2X Multi-RAT Handover in Autonomous Vehicle Networks. 1-8 - Erik Daniel, Marcel Ebert, Florian Tschorsch:

Improving Bitswap Privacy with Forwarding and Source Obfuscation. 1-4 - Xuejian Li, Mingguang Wang:

Trusted Sharing of Data Under Cloud-Edge-End Collaboration and Its Formal Verification. 1-4 - Bulat Nasrulin, Rowdy Chotkan, Johan Pouwelse

:
Sustainable Cooperation in Peer-To-Peer Networks. 1-9 - Hnin Pann Phyu, Diala Naboulsi, Razvan Stanica, Gwenael Poitau:

Towards Energy Efficiency in RAN Network Slicing. 1-9 - Marek Michalski

:
The Virtual Test Bed for EON FPGA Controllers based on UVM Mechanisms and Tools. 1-4 - Bryan Martin, Chad A. Bollmann:

Characterizing Changes in Self-Similarity Between Edge and Core Network Traffic. 1-4 - Richard Hernandez

, Oscar G. Bautista, Mohammad Hossein Manshaei, Abdulhadi Sahin, Kemal Akkaya:
Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC. 1-4 - Eloise Stein, Quentin Bramas, Tommaso Colombo, Cristel Pelsser:

Fault-adaptive Scheduling for Data Acquisition Networks. 1-4 - Luyao Chen, Yong Tang, Siyang Chen, Jingwen Xia, Ting Yang, Wenyong Wang:

Beyond the Field of View: Neglected Audio Part in VR Video Transmission Frameworks. 1-4 - Tasdiqul Islam, Engin Arslan:

A Heuristic Approach for Scalable Quantum Repeater Deployment Modeling. 1-9 - Wei Wan, Ke Wang, Jinxia Wei, Liangyi Gong, Pan Huang, Hao Fu, Yuhao Fu:

Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder. 1-4 - Huapeng Yang, Zhangqin Huang, Yu Liang

, Xiaobo Zhang, Ling Huang, Shen Qiu:
IVAS: An Intelligent Video Analysis System based on Edge Computing. 1-4 - Negar Emami, Antonio Di Maio, Torsten Braun:

FedForce: Network-adaptive Federated Learning for Reinforced Mobility Prediction. 1-9 - Philippe Ea

, Paul Vidart, Osman Salem, Ahmed Mehaoua:
Cyberbullying Messages Detection: A Comparative Study of Machine Learning Algorithms. 1-4 - Eric Wagner

, Nils Rothaug
, Konrad Wolsing
, Lennart Bader, Klaus Wehrle, Martin Henze
:
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols. 1-9 - Amirahmad Chapnevis, Eyuphan Bulut:

AoI-Optimal Cellular-Connected UAV Trajectory Planning for IoT Data Collection. 1-6 - Jonas Andre, Stephan M. Günther, Georg Carle:

An Accuracy Study of Emulation Daemons for IEEE 802.11 Networks. 1-9 - Abdelhamid Garah, Nader Mbarek, Sergey Kirgizov:

Decision Tree-Based Confidentiality Self-Management in the Internet of Things. 1-4 - Yuxin Zhao, Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu

:
Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles. 1-4 - Cuong Dao

, Van Tong, Nam-Thang Hoang
, Hai Anh Tran, Truong X. Tran
:
Enhancing Encrypted Traffic Classification with Deep Adaptation Networks. 1-4 - Olga Kondrateva, Stefan Dietzel, Björn Scheuermann:

Joint Source-and-Channel Coding for Small Satellite Applications. 1-9 - Ibrahim M. Amer

, Sharief M. A. Oteafy
, Hossam S. Hassanein
:
Affective Communication of Sensorimotor Emotion Synthesis over URLLC. 1-4 - Rathindra Nath Dutta

, Sasthi C. Ghosh:
Non-optimal is Good! Resource Allocation in Presence of Dynamic Obstacles in D2D Networks. 1-7 - Rathindra Nath Dutta

, Sasthi C. Ghosh:
Energy Efficient Resource Allocation for D2D Communications using Reinforcement Learning. 1-7 - Konrad Wolsing

, Antoine Saillard, Elmar Padilla, Jan Bauer:
XLab-UUV - A Virtual Testbed for Extra-Large Uncrewed Underwater Vehicles. 1-6 - Stefanie Thieme, Dominic Laniewski, Leonhard Brüggemann, Eric Lanfer

, Bertram Schütz, Nils Aschenbruck:
Demo: A Reproducible Link Emulation Environment for the Evaluation of Network-Coded Video Streaming. 1-3 - Giacomo Longo

, Alessio Merlo, Alessandro Armando, Enrico Russo:
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems. 1-6 - Logan Drazovich, Susanne Wetzel:

Cyber Insurance in the Maritime Transportation System. 1-6 - Brien Croteau:

Lessons Learned from Teaching a Maritime Industrial Control Systems Cybersecurity Course. 1-6 - Alisa Stiballe, Simon Welzel, Johannes Dorfschmidt, Darvin Schluter, Dominik Delgado Steuter, Jannik Lukas Hense, Florian Klingler:

Demo: Chat based Emergency Service via Long Range Wireless Communication (LoRa). 1-3 - Matthias Frank, Spartak Ehrlich:

Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) Protocol. 1-3 - Gunnar Schneider, Michael Goetz, Ivor Nissen:

Design and Implementation of a Gateway Buoy for the Underwater-IoT. 1-6 - Joanna Sliwa, Konrad S. Wrona

, Tsvetelina Shabanska, Alim Solmaz:
Lightweight quantum-safe cryptography in underwater scenarios. 1-6 - Mustafa Ilhan Akbas, Mahesh Menase, Rahul Razdan:

Demo: Modular Test Frameworks for PolyVerif Autonomous Vehicle Validation Environment. 1-4 - Jose A. Gonzalez Nuñez, Mustafa Ilhan Akbas:

Demo: Agent-Based Crowdsensing Simulation for Urban Meteorological Data Collection and Hybrid Aerial-Terrestrial Route Determination. 1-4 - Ibrahim M. Amer

, Sarah Adel Bargal, Sharief M. A. Oteafy
, Hossam S. Hassanein
:
Demo: Leveraging Edge Intelligence for Affective Communication over URLLC. 1-4 - Sara Yavari, Sharief Oteafy

:
Demo: Remote Heart Assessment using Deep Learning over IoT Phonocardiograms. 1-4 - Giulio Meucci, Bertan Karahoda, Amir Hosein Oveis, Francesco Mancuso, Edmond Jajaga, Alessandro Cantelli-Forti:

Naval Cybersecurity in the Age of AI: deceptive ISAR Images Generation with GANs. 1-6 - Alessandro Cantelli-Forti, Michele Colajanni, Silvio Russo

:
Penetrating the Silence: Data Exfiltration in Maritime and Underwater Scenarios. 1-6 - Jeroen Pijpker

, Stephen James McCombie
:
A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














