


default search action
8th NetSoft 2022: Milan, Italy
- Alexander Clemm, Guido Maier, Carmen Mas Machuca, K. K. Ramakrishnan, Fulvio Risso, Prosper Chemouil

, Noura Limam:
8th IEEE International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-0694-9 - Raffaele Bolla, Roberto Bruschi, Alessandro Carrega

, Franco Davoli, Chiara Lombardo:
Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units. 1-6 - Walter Zibusiso Ncube, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:

On the energy efficiency of Laser-based Optical Wireless Networks. 7-12 - Abrar S. Alhazmi, Sanaa H. Mohamed

, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
OWC-enabled Spine and Leaf Architecture Towards Energy Efficient Data Center Networks. 13-18 - Tobias Hoßfeld

, Simon Raffeck, Frank Loh, Stefan Geißler:
Analytical Model for the Energy Efficiency in Low Power IoT Deployments. 19-24 - Antonino Angi

, Alessio Sacco, Flavio Esposito, Guido Marchetto, Alexander Clemm:
NLP4: An Architecture for Intent-Driven Data Plane Programmability. 25-30 - Davide Borsatti

, Walter Cerroni, Stuart Clayman:
From Category Theory to Functional Programming: A Formal Representation of Intent. 31-36 - Kashif Mehmood, David Palma

, Katina Kralevska
:
Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective. 37-42 - Alexander Clemm, Cédric Westphal:

Challenges and Opportunities in Green Networking. 43-48 - Chung-Horng Lung, Hesham Elbakoury:

Exploiting Segment Routing and SDN Features for Green Traffic Engineering. 49-54 - Hao Fu, Timothy O'Farrell

:
The Spectral and Energy Efficiency of Ultra-Dense IoT Networks. 55-60 - Paul Alcock

, Ben Simms, Will Fantom, Charalampos Rotsos
, Nicholas J. P. Race
:
Improving Intent Correctness with Automated Testing. 61-66 - Korian Edeline, Thomas Carlisi, Justin Iurman, Benoit Claise, Benoit Donnet:

Towards a Closed-Looped Automation for Service Assurance with the DxAgent. 67-72 - Ahmet Cihat Baktir, Amadeu do Nascimento Júnior, András Zahemszky, Ankita Likhyani, Dagnachew Azene Temesgene, Dinand Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo:

Intent-based cognitive closed-loop management with built-in conflict handling. 73-78 - Ikuo Otani, Kei Fujimoto

, Akinori Shiraga:
Accelerator-Resource Sharing with Offload-Mediated Proxy for vRAN. 79-84 - Ralf Kundel, Leonard Anderweit, Jonas Markussen

, Carsten Griwodz, Osama Abboud, Benjamin Becker, Tobias Meuser:
Host Bypassing: Let your GPU speak Ethernet. 85-90 - Josef Hammer, Hermann Hellwagner:

Efficient Transparent Access to 5G Edge Services. 91-96 - Ko Natori

, Kei Fujimoto
, Akinori Shiraga:
Low-Latency and Energy-Efficient Frame Forwarding for vRAN Traffic. 97-102 - Alireza Mohammadpour

, Chiara Lombardo, Raffaele Bolla, Roberto Bruschi, Franco Davoli, Lorenzo Ivaldi:
A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network Environments. 103-108 - Haruna Umar Adoga

, Yehia Elkhatib, Dimitrios P. Pezaros:
On the Performance Benefits of Heterogeneous Virtual Network Function Execution Frameworks. 109-114 - Minh-Ngoc Tran, Younghan Kim:

Network Performance Benchmarking for Containerized Infrastructure in NFV environment. 115-120 - Alexandros Valantasis, Nikos Makris

, Thanasis Korakis:
Orchestration Software for Resource Constrained Datacenters: an Experimental Evaluation. 121-126 - George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, Symeon Papavassiliou, Panagiotis Papadimitriou:

Towards Secure and Optimized Cross-Slice Communication Establishment. 127-132 - Ajay Kattepur, Sushanth David, Swarup Mohalik:

MUESLI: Multi-objective Radio Resource Slice Management via Reinforcement Learning. 133-138 - Menuka Perera Jayasuriya Kuranage, Loutfi Nuaymi, Ahmed Bouabdallah, Thomas Ferrandiz, Philippe Bertin:

Deep learning based resource forecasting for 5G core network scaling in Kubernetes environment. 139-144 - Sanaz Mohammadi, Didier Colle, Wouter Tavernier:

Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks. 145-150 - Anton Hölscher, Mikael Asplund, Felipe Boeira:

Evaluation of an SDN-based Microservice Architecture. 151-156 - Francesco D'Alterio, Marco Teodori, Luca Rea, Francesco Matera:

Probability-based dispatching framework for speed-test applications: design and implementation. 157-162 - Elia Battiston, Daniele Moro, Giacomo Verticale

, Antonio Capone:
CHIMA: a Framework for Network Services Deployment and Performance Assurance. 163-170 - Marco Häberle, Benjamin Steinert, Michael Weiss, Michael Menth:

A Caching SFC Proxy Based on eBPF. 171-179 - Ziteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan:

MiddleNet: A High-Performance, Lightweight, Unified NFV and Middlebox Framework. 180-188 - Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:

NetREC: Network-wide in-network REal-value Computation. 189-197 - Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:

Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement. 198-206 - Irene Vilà Muñoz

, Jordi Pérez-Romero
, Oriol Sallent:
On the Training of Reinforcement Learning-based Algorithms in 5G and Beyond Radio Access Networks. 207-215 - Dor Harris, Danny Raz:

Dynamic VNF Placement in 5G Edge Nodes. 216-224 - Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu

, Miguel Razo, Marco Tacca, Luca Valcarenghi, Andrea Fumagalli:
Demonstration of Containerized Central Unit Live Migration in 5G Radio Access Network. 225-227 - Badre Bousalem, Vinicius F. Silva, Rami Langar, Sylvain Cherrier:

Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks. 228-230 - Rafael Direito, Diogo Gomes

, Rui L. Aguiar
:
Towards a Fully Automated System for Testing and Validating NetApps. 231-233 - Ziqiang Wang, Abdullah Bittar, Changcheng Huang, Chung-Horng Lung, Gauravdeep Shami:

A Web-based Orchestrator for Dynamic Service Function Chaining Development with Kubernetes. 234-236 - Oscar Delgado, Brigitte Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette:

Demo: A Network Simulator for 5G Virtualized Networks. 237-239 - Daniel Lukaszewski, Geoffrey G. Xie:

Demo: Towards Software Defined Layer 4.5 Customization. 240-242 - Md. Shamim Towhid, Nashid Shahriar

:
Encrypted Network Traffic Classification in SDN using Self-supervised Learning. 243-245 - Ziteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan:

DEMO: MiddleNet: A High-Performance, Lightweight, Unified NFV & Middlebox Framework. 246-248 - Csaba Györgyi, Károly Kecskeméti

, Hiba Mallouhi, Péter Vörös, Sándor Laki:
NETREACT: Distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing Pipelines. 249-253 - Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso:

Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case. 254-258 - Pedro Casas

, Michael Seufert
, Sarah Wassermann, Bruno Gardlo, Nikolas Wehner, Raimund Schatz:
DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video Streaming. 259-263 - Sherry Bai, Hyojoon Kim

, Jennifer Rexford
:
Passive OS Fingerprinting on Commodity Switches. 264-268 - Hiroki Baba, Shiku Hirai, Takayuki Nakamura, Sho Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru:

End-to-end 5G network slice resource management and orchestration architecture. 269-271 - Supriya Dilip Tambe

, Shwetha Vittal, Pratik Abhijeet Bendre, Supriya Kumari, A. Antony Franklin:
Demonstration of 5G-MEC assisted Location Services for Mission Critical Applications. 272-274 - Arif Ishaq, Daniele Ronzani, Andrea Spinato, Nicola di Pietro, Marco Centenaro, Arturo Bellin

, Daniele Munaretto:
Service-Based Management Architecture for On-Demand Creation, Configuration, and Control of a Network Slice Subnet. 275-277 - Fetia Bannour

, Stefania Dumbrava, Alex Danduran-Lembezat:
GOX: Towards a Scalable Graph Database-Driven SDN Controller. 278-280 - Lluis Gifre, Carlos Manso, Ramon Casellas, Ricardo Martínez

, Ricard Vilalta, Raul Muñoz:
Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE Testbed. 281-283 - Roberto Doriguzzi Corin

, Silvio Cretti, Tiziana Catena, Simone Magnani
, Domenico Siracusa
:
Towards Application-Aware Provisioning of Security Services with Kubernetes. 284-286 - Kyota Hattori, Tomohiro Korikawa, Chikako Takasaki, Hidenari Oowada, Masafumi Shimizu, Naoki Takaya:

Network Digital Replica using Neural-Network-based Network Node Modeling. 287-291 - Yutaro Yoshinaka

, Junji Takemasa, Yuki Koizumi, Toru Hasegawa:
Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch. 292-296 - Himank Gupta, A. Antony Franklin, Mayank Kumar, Bheemarjuna Reddy Tamma:

Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Access Networks. 297-301 - Sagar Agarwal, Venkatarami Reddy Chintapalli

, Bheemarjuna Reddy Tamma:
FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement. 302-306 - Nabhasmita Sen, A. Antony Franklin:

Intelligent Admission and Placement of O-RAN Slices Using Deep Reinforcement Learning. 307-311 - Arled Papa, Polina Kutsevol, Fidan Mehmeti, Wolfgang Kellerer

:
Effects of SD-RAN Control Plane Design on User Quality of Service. 312-320 - Yacine Anser, Chrystel Gaber

, Jean-Philippe Wary, Sara Nieves Matheu-García
, Samia Bouzefrane:
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. 321-329 - Daniel Lukaszewski, Geoffrey G. Xie:

Towards Software Defined Layer 4.5 Customization. 330-338 - Mehul Sharma, Ujjwal Pawar, A. Antony Franklin, Bheemarjuna Reddy Tamma:

Proactive Clustering of Base Stations in 5GC-RAN using Cellular Traffic Prediction. 339-347 - Matthew Buckley, Sepehr Abbasi Zadeh, Mohammad Amin Beiruti, Soheil Abbasloo

, Yashar Ganjali:
Switch Migration Scheduling in Distributed SDN Controllers. 348-356 - Amir Mohamad, Hossam S. Hassanein

:
At the Edge? Wait no More: Immediate Placement of Time-Critical SFCs with VNF Sharing. 357-365 - Md. Shamim Towhid, Nashid Shahriar

:
Encrypted Network Traffic Classification using Self-supervised Learning. 366-374 - Kento Yokouchi, Fujun He, Eiji Oki:

Backup Resource Allocation Model with Two-Stage Probabilistic Protection. 375-383 - Nozomi Kita, Fujun He, Eiji Oki:

Unavailability-Aware Backup Allocation Model for Middleboxes with Two-Stage Shared Protection. 384-392 - Shinji Noda, Takehiro Sato, Eiji Oki:

Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network. 393-401 - Stefan Senk, Marian Ulbricht, Javier Acevedo, Giang T. Nguyen

, Patrick Seeling, Frank H. P. Fitzek
:
Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications. 402-410 - Conor Black, Sandra Scott-Hayward:

Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks. 411-419 - Hélio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia Castro Fernandes:

FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing. 420-428 - Jacob Steadman, Sandra Scott-Hayward:

Detecting Data Exfiltration over Encrypted DNS. 429-437 - Roshan Sedar

, Charalampos Kalalas
, Jesus Alonso-Zarate, Francisco Vázquez Gallego:
Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance. 438-443 - Tom Tuunainen, Olli Isohanni, Mitha Rachel Jose

:
An application of Netspot to Detect Anomalies in IoT. 444-449 - Daniel González-Sánchez

, Ignacio Dominguez Martinez-Casanueva
, Antonio Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López:
Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection. 450-455 - Matteo Repetto, Guerino Lamanna:

Evaluation of the data handling pipeline of the ASTRID framework. 456-461 - Athanasios Liatifis

, Pedro Ruzafa Alcazar, Panagiotis I. Radoglou-Grammatikis
, Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Thomas Krousarlis, Alberto Molinuevo Martín
, Iñaki Angulo, Antonios Sarigiannidis, Thomas Lagkas, Vasileios Argyriou, Antonio F. Skarmeta, Panagiotis G. Sarigiannidis:
Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach. 462-467 - Giovanni Grieco

, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco:
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains. 468-473 - Cataldo Basile

, Daniele Canavese
, Leonardo Regano
, Ignazio Pedone, Antonio Lioy:
A model of capabilities of Network Security Functions. 474-479 - Vincent Lefebvre, Gianni Santinelli:

Always-Sustainable Software Security. 480-485 - Simone Bussa, Riccardo Sisto, Fulvio Valenza

:
Security Automation using Traffic Flow Modeling. 486-491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














