


default search action
6th SDS 2019: Rome, Italy
- 6th International Conference on Software Defined Systems, SDS 2019, Rome, Italy, June 10-13, 2019. IEEE 2019, ISBN 978-1-7281-0722-6

Software Defined Systems
- Marios Touloupou

, Evgenia Kapassa
, Argyro Mavrogiorgou, Dimosthenis Kyriazis:
Towards Optimized Verification and Validation of 5G Services. 5-10 - Markus Krueckemeier, Fabian Schwartau, Carsten Monka-Ewe

, Joerg Schoebel:
Synchronization of Multiple USRP SDRs for Coherent Receiver Applications. 11-16 - Oliver Michel, Eric Keller, Fernando M. V. Ramos

:
Network Defragmentation in Virtualized Data Centers. 17-24 - Mauro Conti

, Edlira Dushku
, Luigi V. Mancini:
RADIS: Remote Attestation of Distributed IoT Services. 25-32 - Reem Melki, Ali Hussein, Ali Chehab

:
Enhancing Multipath TCP Security Through Software Defined Networking. 33-38 - Pilar Manzanares-Lopez

, Juan Pedro Muñoz-Gea
, Josemaria Malgosa-Sanahuja
:
An MPTCP-Compatible Load Balancing Solution for Pools of Servers in OpenFlow SDN Networks. 39-46 - Mohamed Escheikh, Kamel Barkaoui:

Scalable Load Balancing Scheme for Distributed Controllers in Software Defined Data Centers. 47-54 - Dorjan Hitaj

, Briland Hitaj
, Luigi V. Mancini:
Evasion Attacks Against Watermarking Techniques found in MLaaS Systems. 55-63 - Kazuki Hayashi, Hiroki Watanabe, Takao Kondo

, Fumio Teraoka:
LiON: A L3 Protocol Agnostic Experimental Network Construction Tool Based on Infrastructure as Code. 64-71 - Alexander Kern, Reiner Anderl:

Securing Industrial Remote Maintenance Sessions using Software-Defined Networking. 72-79 - Haiming Chen, Valerio Persico, Antonio Pescapè:

eMES: Easing Maintenance of Entity Services in Service Oriented Software-Defined Internet of Things. 80-87 - Thomas Rauber, Gudula Rünger:

Enabling Scalability, Adaptivity, and Resilience in Cloud Applications by Software-defined M-Task-based Programming. 88-95 - Huda Saadeh, Wesam Almobaideen

, Khair Eddin Sabri, Maha Saadeh
:
Hybrid SDN-ICN Architecture Design for the Internet of Things. 96-101 - Gabriele Gualandi, Emiliano Casalicchio

:
Use of Redundancy in the Design of a Secure Software Defined Industrial Control Application. 102-109 - Ebtesam J. Alqahtani

, Rachid Zagrouba
, Abdullah Mohammed Almuhaideb
:
A Survey on Android Malware Detection Techniques Using Machine Learning Algorithms. 110-117 - Sufyan Almajali

, Haythem Bany Salameh
, Moussa Ayyash
, Hany Elgala
:
Extending NS3 to Simulate Cognitive Radio Wireless Networks in a Jammed Environment. 118-122 - Diogo Oliveira, Mahsa Pourvali, Jorge Crichigno

, Elias Bou-Harb, Mohamed Rahouti, Nasir Ghani:
An Efficient Multi-Objective Resiliency Scheme for Routing of Virtual Functions in Failure Scenarios. 123-129 - Paolo Benedetti, Agnese V. Ventrella, Giuseppe Piro, Luigi Alfredo Grieco:

An SDN-aided Information Centric Networking Approach to Publish-Subscribe with Mobile Consumers. 130-137 - Awais Aziz Shah

, Giuseppe Piro, Luigi Alfredo Grieco, Gennaro Boggia:
A Qualitative Cross-Comparison of Emerging Technologies for Software-Defined Systems. 138-145 - Ali Hussein, Ola Salman, Ali Chehab

, Imad H. Elhajj
, Ayman I. Kayssi:
Machine Learning for Network Resiliency and Consistency. 146-153 - M. Junaid Gul

, Rabia Riaz
, Yaser Jararweh, M. Mazhar Rathore, Anand Paul
:
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device. 154-159 - Mahdi Akil

, Luigi V. Mancini, Daniele Venturi:
Multi-Covert Channel Attack in the Cloud. 160-165 - Bilal Hawashin

, Darah Aqel, Shadi AlZu'bi
, Yaser Jararweh:
Novel Weighted Interest Similarity Measurement for Recommender Systems Using Rating Timestamp. 166-170 - Ilias Mavridis, Helen D. Karatza

:
Lightweight Virtualization Approaches for Software-Defined Systems and Cloud Computing: An Evaluation of Unikernels and Containers. 171-178 - Abdul Razaque

, Muder Almiani
, Meer Jaro Khan
, Basel Magableh, Ayman Al-Dmour
, Amer Al-Rahayfeh:
Fuzzy-GRA Trust Model for Cloud Risk Management. 179-185 - Amine Guidara, Saúl E. Pomares Hernández

, Lil María Rodríguez-Henríquez
, Hatem Hadj Kacem
, Ahmed Hadj Kacem:
A Study of the Forwarding Blackhole phenomenon during Software-Defined Network Updates. 186-193 - Yanal Alahmad

, Tariq Daradkeh
, Anjali Agarwal:
Optimized Availability-Aware Component Scheduler for Applications in Container-Based Cloud. 194-199 - Alia Abu Ghazleh

, Muder Almiani
, Basel Magableh, Abdul Razaque
:
Intelligent Intrusion Detection Using Radial Basis Function Neural Network. 200-208 - Darah Aqel, Shadi AlZu'bi

, Siham Hamadah:
Comparative Study for Recent Technologies in Arabic Language Parsing. 209-212 - Mehmet Demir, Ozgur Turetken

, Alexander Ferworn
:
Blockchain Based Transparent Vehicle Insurance Management. 213-220 - Albert Rego-Mañez

, Sandra Sendra, José Luis García-Navas, Jaime Lloret:
Managing a Multi-device Multimedia Service Using Software Defined Networks. 221-228 - Mustafa Daraghmeh

, Anjali Agarwal, Nishith Goel, Jim Kozlowski:
Local Regression Based Box-Cox Transformations for Resource Management in Cloud Networks. 229-235
Software Defined Networks and Network Function Virtualization
- Dharma Rajan:

Achieving High Performance with Virtualized Data Plane Workloads for 5G Networks. 236-241 - Nariman Torkzaban, Chrysa Papagianni

, John S. Baras:
Trust-Aware Service Chain Embedding. 242-247 - Jorge Martínez, Pedro Reviriego

, Salvatore Pontarelli:
Accelerating Packet Classification with Two Class Cuckoo Filters (TC-CF). 248-253 - Gourav Prateek Sharma

, Wouter Tavernier, Didier Colle, Mario Pickavet:
Dynamic Hardware-Acceleration of VNFs in NFV Environments. 254-259 - Pedro Heleno Isolani, Nelson Cardona, Carlos Donato, Johann Marquez-Barja

, Lisandro Zambenedetti Granville
, Steven Latré:
SDN-based Slice Orchestration and MAC Management for QoS delivery in IEEE 802.11 Networks. 260-265
Blockchain Applications and Theory
- Hongwei Meng, Evan Bian, Cong Tang:

Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third Parties. 266-271 - Sven Schlarb, Roman Karl, Ross King, Thomas J. Lampoltshammer, Lörinc Thurnay

, Bernd-Peter Ivanschitz, Víctor Mireles:
Using Blockchain Technology to Manage Membership and Legal Contracts in a Distributed Data Market. 272-277 - Padraig Scully, Michael Höbig:

Exploring the impact of blockchain on digitized Supply Chain flows: A literature review. 278-283 - Yanal Alahmad

, Anjali Agarwal:
VNF Placement Strategy for Availability and Reliability of Network Services in NFV. 284-289 - Gökay Saldamli, Shreyas Babji, Miroslav Grubic, Nischala Raja Shekar, Chaitra Satyanarayana:

Blockchain based Application for Exchange of Left over Foreign Currency. 290-293 - Maximilian Ernst Tschuchnig

, Dejan Radovanovic
, Eduard Hirsch, Anna-Maria Oberluggauer, Georg Schäfer:
Immutable and Democratic Data in Permissionless Peer-to-Peer Systems. 294-299 - Gyeong-Jin Ra, Im-Yeong Lee:

A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion. 300-305 - Nafissatou Diarra:

Choosing a Consensus Protocol for Uses Cases in Distributed Ledger Technologies. 306-309 - Duoaa Khalifa, Nadya Abdel Madjid, Davor Svetinovic:

Trust Requirements in Blockchain Systems: A Preliminary Study. 310-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














