default search action
8th NetSoft 2022: Milan, Italy
- Alexander Clemm, Guido Maier, Carmen Mas Machuca, K. K. Ramakrishnan, Fulvio Risso, Prosper Chemouil, Noura Limam:
8th IEEE International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-0694-9 - Raffaele Bolla, Roberto Bruschi, Alessandro Carrega, Franco Davoli, Chiara Lombardo:
Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units. 1-6 - Walter Zibusiso Ncube, Ahmad Adnan Qidan, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
On the energy efficiency of Laser-based Optical Wireless Networks. 7-12 - Abrar S. Alhazmi, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
OWC-enabled Spine and Leaf Architecture Towards Energy Efficient Data Center Networks. 13-18 - Tobias Hoßfeld, Simon Raffeck, Frank Loh, Stefan Geißler:
Analytical Model for the Energy Efficiency in Low Power IoT Deployments. 19-24 - Antonino Angi, Alessio Sacco, Flavio Esposito, Guido Marchetto, Alexander Clemm:
NLP4: An Architecture for Intent-Driven Data Plane Programmability. 25-30 - Davide Borsatti, Walter Cerroni, Stuart Clayman:
From Category Theory to Functional Programming: A Formal Representation of Intent. 31-36 - Kashif Mehmood, David Palma, Katina Kralevska:
Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective. 37-42 - Alexander Clemm, Cédric Westphal:
Challenges and Opportunities in Green Networking. 43-48 - Chung-Horng Lung, Hesham Elbakoury:
Exploiting Segment Routing and SDN Features for Green Traffic Engineering. 49-54 - Hao Fu, Timothy O'Farrell:
The Spectral and Energy Efficiency of Ultra-Dense IoT Networks. 55-60 - Paul Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, Nicholas J. P. Race:
Improving Intent Correctness with Automated Testing. 61-66 - Korian Edeline, Thomas Carlisi, Justin Iurman, Benoit Claise, Benoit Donnet:
Towards a Closed-Looped Automation for Service Assurance with the DxAgent. 67-72 - Ahmet Cihat Baktir, Amadeu do Nascimento Júnior, András Zahemszky, Ankita Likhyani, Dagnachew Azene Temesgene, Dinand Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo:
Intent-based cognitive closed-loop management with built-in conflict handling. 73-78 - Ikuo Otani, Kei Fujimoto, Akinori Shiraga:
Accelerator-Resource Sharing with Offload-Mediated Proxy for vRAN. 79-84 - Ralf Kundel, Leonard Anderweit, Jonas Markussen, Carsten Griwodz, Osama Abboud, Benjamin Becker, Tobias Meuser:
Host Bypassing: Let your GPU speak Ethernet. 85-90 - Josef Hammer, Hermann Hellwagner:
Efficient Transparent Access to 5G Edge Services. 91-96 - Ko Natori, Kei Fujimoto, Akinori Shiraga:
Low-Latency and Energy-Efficient Frame Forwarding for vRAN Traffic. 97-102 - Alireza Mohammadpour, Chiara Lombardo, Raffaele Bolla, Roberto Bruschi, Franco Davoli, Lorenzo Ivaldi:
A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network Environments. 103-108 - Haruna Umar Adoga, Yehia Elkhatib, Dimitrios P. Pezaros:
On the Performance Benefits of Heterogeneous Virtual Network Function Execution Frameworks. 109-114 - Minh-Ngoc Tran, Younghan Kim:
Network Performance Benchmarking for Containerized Infrastructure in NFV environment. 115-120 - Alexandros Valantasis, Nikos Makris, Thanasis Korakis:
Orchestration Software for Resource Constrained Datacenters: an Experimental Evaluation. 121-126 - George Papathanail, Ioannis Dimolitsas, Ioakeim Fotoglou, Dimitrios Dechouniotis, Symeon Papavassiliou, Panagiotis Papadimitriou:
Towards Secure and Optimized Cross-Slice Communication Establishment. 127-132 - Ajay Kattepur, Sushanth David, Swarup Mohalik:
MUESLI: Multi-objective Radio Resource Slice Management via Reinforcement Learning. 133-138 - Menuka Perera Jayasuriya Kuranage, Loutfi Nuaymi, Ahmed Bouabdallah, Thomas Ferrandiz, Philippe Bertin:
Deep learning based resource forecasting for 5G core network scaling in Kubernetes environment. 139-144 - Sanaz Mohammadi, Didier Colle, Wouter Tavernier:
Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks. 145-150 - Anton Hölscher, Mikael Asplund, Felipe Boeira:
Evaluation of an SDN-based Microservice Architecture. 151-156 - Francesco D'Alterio, Marco Teodori, Luca Rea, Francesco Matera:
Probability-based dispatching framework for speed-test applications: design and implementation. 157-162 - Elia Battiston, Daniele Moro, Giacomo Verticale, Antonio Capone:
CHIMA: a Framework for Network Services Deployment and Performance Assurance. 163-170 - Marco Häberle, Benjamin Steinert, Michael Weiss, Michael Menth:
A Caching SFC Proxy Based on eBPF. 171-179 - Ziteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan:
MiddleNet: A High-Performance, Lightweight, Unified NFV and Middlebox Framework. 180-188 - Matthews Jose, Kahina Lazri, Jérôme François, Olivier Festor:
NetREC: Network-wide in-network REal-value Computation. 189-197 - Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:
Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement. 198-206 - Irene Vilà Muñoz, Jordi Pérez-Romero, Oriol Sallent:
On the Training of Reinforcement Learning-based Algorithms in 5G and Beyond Radio Access Networks. 207-215 - Dor Harris, Danny Raz:
Dynamic VNF Placement in 5G Edge Nodes. 216-224 - Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Miguel Razo, Marco Tacca, Luca Valcarenghi, Andrea Fumagalli:
Demonstration of Containerized Central Unit Live Migration in 5G Radio Access Network. 225-227 - Badre Bousalem, Vinicius F. Silva, Rami Langar, Sylvain Cherrier:
Deep Learning-based Approach for DDoS Attacks Detection and Mitigation in 5G and Beyond Mobile Networks. 228-230 - Rafael Direito, Diogo Gomes, Rui L. Aguiar:
Towards a Fully Automated System for Testing and Validating NetApps. 231-233 - Ziqiang Wang, Abdullah Bittar, Changcheng Huang, Chung-Horng Lung, Gauravdeep Shami:
A Web-based Orchestrator for Dynamic Service Function Chaining Development with Kubernetes. 234-236 - Oscar Delgado, Brigitte Jaumard, Zhiyi Ding, Fadi Bishay, Vincent Bissonnette:
Demo: A Network Simulator for 5G Virtualized Networks. 237-239 - Daniel Lukaszewski, Geoffrey G. Xie:
Demo: Towards Software Defined Layer 4.5 Customization. 240-242 - Md. Shamim Towhid, Nashid Shahriar:
Encrypted Network Traffic Classification in SDN using Self-supervised Learning. 243-245 - Ziteng Zeng, Leslie Monis, Shixiong Qi, K. K. Ramakrishnan:
DEMO: MiddleNet: A High-Performance, Lightweight, Unified NFV & Middlebox Framework. 246-248 - Csaba Györgyi, Károly Kecskeméti, Hiba Mallouhi, Péter Vörös, Sándor Laki:
NETREACT: Distributed Event Detection in Sensor Data Streams with Disaggregated Packet Processing Pipelines. 249-253 - Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso:
Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case. 254-258 - Pedro Casas, Michael Seufert, Sarah Wassermann, Bruno Gardlo, Nikolas Wehner, Raimund Schatz:
DeepCrypt - Deep Learning for QoE Monitoring and Fingerprinting of User Actions in Adaptive Video Streaming. 259-263 - Sherry Bai, Hyojoon Kim, Jennifer Rexford:
Passive OS Fingerprinting on Commodity Switches. 264-268 - Hiroki Baba, Shiku Hirai, Takayuki Nakamura, Sho Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru:
End-to-end 5G network slice resource management and orchestration architecture. 269-271 - Supriya Dilip Tambe, Shwetha Vittal, Pratik Abhijeet Bendre, Supriya Kumari, A. Antony Franklin:
Demonstration of 5G-MEC assisted Location Services for Mission Critical Applications. 272-274 - Arif Ishaq, Daniele Ronzani, Andrea Spinato, Nicola di Pietro, Marco Centenaro, Arturo Bellin, Daniele Munaretto:
Service-Based Management Architecture for On-Demand Creation, Configuration, and Control of a Network Slice Subnet. 275-277 - Fetia Bannour, Stefania Dumbrava, Alex Danduran-Lembezat:
GOX: Towards a Scalable Graph Database-Driven SDN Controller. 278-280 - Lluis Gifre, Carlos Manso, Ramon Casellas, Ricardo Martínez, Ricard Vilalta, Raul Muñoz:
Experimental Demonstration of End-to-end NFV Orchestration on Top of the ADRENALINE Testbed. 281-283 - Roberto Doriguzzi Corin, Silvio Cretti, Tiziana Catena, Simone Magnani, Domenico Siracusa:
Towards Application-Aware Provisioning of Security Services with Kubernetes. 284-286 - Kyota Hattori, Tomohiro Korikawa, Chikako Takasaki, Hidenari Oowada, Masafumi Shimizu, Naoki Takaya:
Network Digital Replica using Neural-Network-based Network Node Modeling. 287-291 - Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa:
Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch. 292-296 - Himank Gupta, A. Antony Franklin, Mayank Kumar, Bheemarjuna Reddy Tamma:
Traffic-Aware Dynamic Functional Split for 5G Cloud Radio Access Networks. 297-301 - Sagar Agarwal, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma:
FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement. 302-306 - Nabhasmita Sen, A. Antony Franklin:
Intelligent Admission and Placement of O-RAN Slices Using Deep Reinforcement Learning. 307-311 - Arled Papa, Polina Kutsevol, Fidan Mehmeti, Wolfgang Kellerer:
Effects of SD-RAN Control Plane Design on User Quality of Service. 312-320 - Yacine Anser, Chrystel Gaber, Jean-Philippe Wary, Sara Nieves Matheu-García, Samia Bouzefrane:
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum. 321-329 - Daniel Lukaszewski, Geoffrey G. Xie:
Towards Software Defined Layer 4.5 Customization. 330-338 - Mehul Sharma, Ujjwal Pawar, A. Antony Franklin, Bheemarjuna Reddy Tamma:
Proactive Clustering of Base Stations in 5GC-RAN using Cellular Traffic Prediction. 339-347 - Matthew Buckley, Sepehr Abbasi Zadeh, Mohammad Amin Beiruti, Soheil Abbasloo, Yashar Ganjali:
Switch Migration Scheduling in Distributed SDN Controllers. 348-356 - Amir Mohamad, Hossam S. Hassanein:
At the Edge? Wait no More: Immediate Placement of Time-Critical SFCs with VNF Sharing. 357-365 - Md. Shamim Towhid, Nashid Shahriar:
Encrypted Network Traffic Classification using Self-supervised Learning. 366-374 - Kento Yokouchi, Fujun He, Eiji Oki:
Backup Resource Allocation Model with Two-Stage Probabilistic Protection. 375-383 - Nozomi Kita, Fujun He, Eiji Oki:
Unavailability-Aware Backup Allocation Model for Middleboxes with Two-Stage Shared Protection. 384-392 - Shinji Noda, Takehiro Sato, Eiji Oki:
Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network. 393-401 - Stefan Senk, Marian Ulbricht, Javier Acevedo, Giang T. Nguyen, Patrick Seeling, Frank H. P. Fitzek:
Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications. 402-410 - Conor Black, Sandra Scott-Hayward:
Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks. 411-419 - Hélio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia Castro Fernandes:
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing. 420-428 - Jacob Steadman, Sandra Scott-Hayward:
Detecting Data Exfiltration over Encrypted DNS. 429-437 - Roshan Sedar, Charalampos Kalalas, Jesus Alonso-Zarate, Francisco Vázquez Gallego:
Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance. 438-443 - Tom Tuunainen, Olli Isohanni, Mitha Rachel Jose:
An application of Netspot to Detect Anomalies in IoT. 444-449 - Daniel González-Sánchez, Ignacio Dominguez Martinez-Casanueva, Antonio Pastor, Luis Bellido Triana, Cristina Pinar Muñoz Zamarro, Alejandro Antonio Moreno Sancho, David Fernández Cambronero, Diego R. López:
Model-Driven Network Monitoring Using NetFlow Applied to Threat Detection. 450-455 - Matteo Repetto, Guerino Lamanna:
Evaluation of the data handling pipeline of the ASTRID framework. 456-461 - Athanasios Liatifis, Pedro Ruzafa Alcazar, Panagiotis I. Radoglou-Grammatikis, Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Thomas Krousarlis, Alberto Molinuevo Martín, Iñaki Angulo, Antonios Sarigiannidis, Thomas Lagkas, Vasileios Argyriou, Antonio F. Skarmeta, Panagiotis G. Sarigiannidis:
Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach. 462-467 - Giovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco:
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains. 468-473 - Cataldo Basile, Daniele Canavese, Leonardo Regano, Ignazio Pedone, Antonio Lioy:
A model of capabilities of Network Security Functions. 474-479 - Vincent Lefebvre, Gianni Santinelli:
Always-Sustainable Software Security. 480-485 - Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Security Automation using Traffic Flow Modeling. 486-491
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.