Author Index
A B C D E F G H J K L M N O P Q R S T V W X Y Z
- Abdulazeez, Abdulhakeem
- Learning-Based Formation Control of UAV-fleet
- Adjei, Jeffrey
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- Agnihotri, Pratyush
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Akashi, Kazuaki
- Deep Reinforcement Learning for Network Service Recovery in Large-scale Failures
- Akbari, Elham
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- AL-Naday, Mays
- Federated Scheduling of Fog-native Applications over Multi-Domain Edge-to-Cloud Ecosystem
- Alberro, Leonardo
- BGP Control Plane Overhead in Fat-Trees: An Analytical Approach
- Ali Yahiya, Tara
- Learning-Based Formation Control of UAV-fleet
- Amannejad, Yasaman
- Predicting the Performance of DNNs to Support Efficient Resource Allocation
- Arouna, Alfred
- On large-scale IP service disruptions dependencies
- Arslan, Suayb
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks
- Aryal, Nischal
- Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
- Atwood, J. William
- ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking
- Bannour Souihi, Sondes
- Deep Learning in NLP for Anomalous HTTP Requests Detection
- Baranda, Jorge
- Disaggregating a 5G Non-Public Network via On-demand Cloud-Native UPF Deployments
- Barrachina-Muñoz, Sergio
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Disaggregating a 5G Non-Public Network via On-demand Cloud-Native UPF Deployments
- Beck, Clemens
- Path Oracle: Improving Performance of Path-Aware Applications in SCION
- Ben Letaifa, Asma
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Beneš, Tomáš
- Look at my Network: An insight into the ISP Backbone Traffic
- Bertin, Emmanuel
- Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
- Bertin, Philippe
- A Fair Approach to the Online Placement of the Network Services over the Edge
- Bhattacharjee, Bishwajit
- DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions
- Blanco, Luis
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks
- Bless, Roland
- Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks
- Borchert, Oliver
- Path Plausibility Algorithms in GoBGP
- Borsatti, Davide
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Bousalem, Badre
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Boutaba, Raouf
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN
- Bruner, Jonas
- Deciphering DDoS Attacks through a Global Lens
- Bustos-Jiménez, Javier
- Dom2Vec - Detecting DGA Domains through Word Embeddings and AI/ML-driven Lexicographic Analysis
- Camelo, Miguel
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- Capdehourat, Germán
- Dom2Vec - Detecting DGA Domains through Word Embeddings and AI/ML-driven Lexicographic Analysis
- Carle, Georg
- Synthesizing and Scaling WAN Topologies using Permutation-invariant Graph Generative Models
- Casale, Giuliano
- Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting
- Casas, Pedro
- Dom2Vec - Detecting DGA Domains through Word Embeddings and AI/ML-driven Lexicographic Analysis
- Cejka, Tomas
- Enhancing DeCrypto: Finding Cryptocurrency Miners based on Periodic Behavior
- Look at my Network: An insight into the ISP Backbone Traffic
- Network Traffic Classification based on Single Flow Time Series Analysis
- Cerroni, Walter
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Chang, Chia-Yu
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- Chen, Jingshu
- Bridging Resource Prediction and System Management: A Case Study in Cloud Systems
- Chen, Yichong
- Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting
- Cheng, Yufan
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Coelho, Bruno
- CrossBal: Data and Control Plane Cooperation for Efficient and Scalable Network Load Balancing
- Copstein, Rafael
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Crespi, Noel
- Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
- Csiszar, Zoltan
- ML-based translation methods for protocols and data formats
- D'hooge, Laurens
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- Davoli, Gianluca
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- De Block, Tom
- Federated Scheduling of Fog-native Applications over Multi-Domain Edge-to-Cloud Ecosystem
- De Bock, Yorick
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- de Snayer, Kevin
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- De Turck, Filip
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- De Vleeschauwer, Danny
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- den Hartog, Frank
- On Integrated Wired and Wireless Time-Sensitive Networking using SDN
- Dolati, Mahdi
- Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular Networks
- Workload Placement with Bounded Slowdown in Disaggregated Datacenters
- Dougall, Terri
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- Doyen, Guillaume
- A Lightweight Heuristic for Micro-services Placement and Chaining in Low Latency Services
- Dreo Rodosek, Gabi
- BGPEval: Automating Large-Scale Testbed Creation
- Path Plausibility Algorithms in GoBGP
- Duarte, Elias
- An ETSI-compliant Architecture for the Element Management System: The Key for Holistic NFV Management
- Dzeparoska, Kristina
- LLM-based policy generation for intent-based management of applications
- El-Khatib, Khalil
- Analyzing the Quality of Synthetic Adversarial Cyberattacks
- Elgazzar, Khalid
- Analyzing the Quality of Synthetic Adversarial Cyberattacks
- Elmokashfi, Ahmed
- On large-scale IP service disruptions dependencies
- Esfandiari, Babak
- Leveraging Spatiotemporal Relations for Predicting Potential Link Failures
- Farzaneh, Behnam
- DTL-IDS: Deep Transfer Learning-based Intrusion Detection System in 5G Networks
- Ficzere, Daniel
- AI Toolbox Concept for the Arrowhead Framework
- Findrik, Mislav
- Dom2Vec - Detecting DGA Domains through Word Embeddings and AI/ML-driven Lexicographic Analysis
- Flauzino, José
- An ETSI-compliant Architecture for the Element Management System: The Key for Holistic NFV Management
- Fonseca e Silva, Vinicius
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Foschini, Luca
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Frankó, Attila
- AI Toolbox Concept for the Arrowhead Framework
- Settling issues in IEEE 802.1AS networks in PI based clock servos
- Fukuda, Kensuke
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Fukuda, Nobukazu
- Deep Reinforcement Learning for Network Service Recovery in Large-scale Failures
- Fulber-Garcia, Vinicius
- An ETSI-compliant Architecture for the Element Management System: The Key for Holistic NFV Management
- Fung, Carol
- An Empirical Approach to Evaluate the Resilience of QUIC Protocol against Handshake Flood Attacks
- Gatto, Alberto
- Adaptive Entanglement Routing for Quantum Networks with Cutoff
- Geier, Timo
- Low Impact Tenant Code Updates on Multi-tenant Programmable Switches
- Ghaderi, Majid
- Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular Networks
- Workload Placement with Bounded Slowdown in Disaggregated Datacenters
- Ghaffari, Fariba
- Subscription Management for Beyond 5G and 6G Cellular Networks using Blockchain Technology
- Golchin, Pegah
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Golkarifard, Morteza
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN
- Grabarnik, Genady
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Grampín, Eduardo
- BGP Control Plane Overhead in Fat-Trees: An Analytical Approach
- Guo, ShaoYong
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Habibi, Pooyan
- Data Fabrics for Multi-Domain Information Systems
- Hadjadj-Aoul, Yassine
- A Fair Approach to the Online Placement of the Network Services over the Edge
- Hajizadeh, Mehrdad
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Harris, Dor
- Online Utilization Maximization in Resource Allocation with Minimum Service Guarantees
- Hassan, Ali
- Enterprise Application Outage Prediction Using XGBoost and LSTM
- Hausheer, David
- Path Oracle: Improving Performance of Path-Aware Applications in SCION
- Hegedus, Csaba
- Tailoring MLOps Techniques for Industry 5.0 Needs
- Helm, Max
- Synthesizing and Scaling WAN Topologies using Permutation-invariant Graph Generative Models
- Heywood, M. I.
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Hezaveh, Arshiya
- pUpdate: Priority-based Scheduling for Continuous and Consistent Network Updates in SDN
- Höger, Nils
- Path Plausibility Algorithms in GoBGP
- Hollósi, Gergely
- AI Toolbox Concept for the Arrowhead Framework
- Settling issues in IEEE 802.1AS networks in PI based clock servos
- Hong, James
- Log Analysis and Prediction for Anomaly Detection in Network Switches
- SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement Learning
- Hong, Jibum
- Log Analysis and Prediction for Anomaly Detection in Network Switches
- Houidi, Ines
- Energy Efficient VNF-FG Embedding via Attention-based Deep Reinforcement Learning
- Houidi, Omar
- Energy Efficient VNF-FG Embedding via Attention-based Deep Reinforcement Learning
- Huang, Jun
- Bridging Resource Prediction and System Management: A Case Study in Cloud Systems
- Huin, Nicolas
- A Fair Approach to the Online Placement of the Network Services over the Edge
- Hynek, Karel
- Network Traffic Classification based on Single Flow Time Series Analysis
- Jaafar, Wael
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Jaberi, Solmaz
- ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking
- Jaumard, Brigitte
- 5G E2E Network Slicing Predictable Traffic Generator
- Jeong, Eui-Dong
- Log Analysis and Prediction for Anomaly Detection in Network Switches
- SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement Learning
- Jiang, Nan
- TinyG: Accurate IP Geolocation Using a Tiny Number of Probers
- Jimenez Agudelo, Julian
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- Joarder, Y A
- An Empirical Approach to Evaluate the Resilience of QUIC Protocol against Handshake Flood Attacks
- Johnston, Andrew
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Kanai, Shunsuke
- Deep Reinforcement Learning for Network Service Recovery in Large-scale Failures
- Kanhere, Salil
- Deciphering DDoS Attacks through a Global Lens
- Kant, Krishna
- Improving System Configurations using Domain Knowledge Assisted Semi-Supervised Learning
- Karagiannis, Vasileios
- Federated Scheduling of Fog-native Applications over Multi-Domain Edge-to-Cloud Ecosystem
- Kellerer, Wolfgang
- ADFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks
- Khan, Nasik Sami
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- Khanyari, Azan
- On large-scale IP service disruptions dependencies
- Kimura, Tatsuaki
- Deep Reinforcement Learning based Command Control System for Automating Fault Diagnosis
- Kobayashi, Satoru
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Koerner, Marc
- Vendor Agnostic Network Service Orchestration with Stacked NSO Services
- Koumar, Josef
- Enhancing DeCrypto: Finding Cryptocurrency Miners based on Periodic Behavior
- Network Traffic Classification based on Single Flow Time Series Analysis
- Krishnamurthy, Diwakar
- Predicting the Performance of DNNs to Support Efficient Resource Allocation
- Krueger, Thorben
- Path Oracle: Improving Performance of Path-Aware Applications in SCION
- Kumar, Vedant
- Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model
- Kundel, Ralf
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Kunz, Thomas
- Leveraging Spatiotemporal Relations for Predicting Potential Link Failures
- Kur, Justin
- Bridging Resource Prediction and System Management: A Case Study in Cloud Systems
- Langar, Rami
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Latré, Steven
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- Lefebvre, Cédric
- An explainable-by-design ensemble learning system to detect unknown network attacks
- Leon-Garcia, Alberto
- Data Fabrics for Multi-Domain Information Systems
- LLM-based policy generation for intent-based management of applications
- Limam, Noura
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA
- Lin, Jieyu
- LLM-based policy generation for intent-based management of applications
- Liu, Jun
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4
- Livadariu, Ioana
- On large-scale IP service disruptions dependencies
- Loginov, Alexander
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- Macedo, Daniel
- Improved Video QoE in Wireless Networks using Deep Reinforcement Learning
- Madani, Mohamed Abderrahmane
- Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing
- Magnouche, Hichem
- A Lightweight Heuristic for Micro-services Placement and Chaining in Low Latency Services
- Mahrt, Hendrik
- Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks
- Maillé, Patrick
- Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model
- Malekghaini, Navid
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Manca, Lorenzo
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Mangues-Bafalluy, Josep
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks
- Disaggregating a 5G Non-Public Network via On-demand Cloud-Native UPF Deployments
- Martin, Steven
- Learning-Based Formation Control of UAV-fleet
- Mathieu, Bertrand
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Matsuo, Yoichi
- Empirical analysis of the fine-tuning for Unsupervised Anomaly Detection in the ICT system
- Meddahi, Ahmed
- Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing
- Michelinakis, Foivos
- On large-scale IP service disruptions dependencies
- Minh, Céline
- An explainable-by-design ensemble learning system to detect unknown network attacks
- Miura, Ryosuke
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Miwa, Shinsuke
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Miyachi, Toshiyuki
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Moghaddassian, Morteza
- Data Fabrics for Multi-Domain Information Systems
- Mohammadi Koushki, Negar
- Improving System Configurations using Domain Knowledge Assisted Semi-Supervised Learning
- Momo Ziazet, Junior
- 5G E2E Network Slicing Predictable Traffic Generator
- Moteau, Stephanie
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Moura, Henrique
- Improved Video QoE in Wireless Networks using Deep Reinforcement Learning
- Movahedian Attar, Mahtab
- Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular Networks
- Muktadir, Abu Hena Al
- DTL-IDS: Deep Transfer Learning-based Intrusion Detection System in 5G Networks
- Müller, Katharina
- Deciphering DDoS Attacks through a Global Lens
- Mushtaq, Maria
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN
- Musumeci, Francesco
- Adaptive Entanglement Routing for Quantum Networks with Cutoff
- Nam, Sukhyun
- Log Analysis and Prediction for Anomaly Detection in Network Switches
- Naori, David
- Online Utilization Maximization in Resource Allocation with Minimum Service Guarantees
- Nguyen, Tien Anh
- Deep Learning in NLP for Anomalous HTTP Requests Detection
- Niblett, Bradley
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Nikbakht, Rasoul
- Disaggregating a 5G Non-Public Network via On-demand Cloud-Native UPF Deployments
- Nobakht, Mehdi
- On Integrated Wired and Wireless Time-Sensitive Networking using SDN
- pUpdate: Priority-based Scheduling for Continuous and Consistent Network Updates in SDN
- Oliveira, Junia
- Improved Video QoE in Wireless Networks using Deep Reinforcement Learning
- Owezarski, Philippe
- An explainable-by-design ensemble learning system to detect unknown network attacks
- Paquet, Joey
- ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking
- Payaró, Miquel
- Disaggregating a 5G Non-Public Network via On-demand Cloud-Native UPF Deployments
- Pešek, Jaroslav
- Look at my Network: An insight into the ISP Backbone Traffic
- Plný, Richard
- Enhancing DeCrypto: Finding Cryptocurrency Miners based on Periodic Behavior
- Poltronieri, Filippo
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Prodhon, Caroline
- A Lightweight Heuristic for Micro-services Placement and Chaining in Low Latency Services
- Qiu, Xuesong
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Raz, Danny
- Online Utilization Maximization in Resource Allocation with Minimum Service Guarantees
- Reaz, Rezwana
- DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions
- Rezazadeh, Farhad
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Rieger, Sebastian
- Low Impact Tenant Code Updates on Multi-tenant Programmable Switches
- Ritchie, William
- An explainable-by-design ensemble learning system to detect unknown network attacks
- Rodday, Nils
- BGPEval: Automating Large-Scale Testbed Creation
- Path Plausibility Algorithms in GoBGP
- Rodrigues, Bruno
- Deciphering DDoS Attacks through a Global Lens
- Roveri, Manuel
- Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting
- Sabeel, Ulya
- Analyzing the Quality of Synthetic Adversarial Cyberattacks
- Saha, Gourab
- DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions
- Sakka, Mohamed Anis
- DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-based Approach
- Salahuddin, Mohammad
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Saleh, Aladdin
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN
- Sampalli, Srinivas
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- Santos, Carlos Raniery
- An ETSI-compliant Architecture for the Element Management System: The Key for Holistic NFV Management
- Santos, José
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- Schaeffer-Filho, Alberto
- CrossBal: Data and Control Plane Cooperation for Efficient and Scalable Network Load Balancing
- Schmidt, Sebastian
- ADFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks
- Schwartzentruber, Jeff
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Scotece, Domenico
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Seehofer, Paul
- Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks
- Sefati, Amirhossein
- Workload Placement with Bounded Slowdown in Disaggregated Datacenters
- Shafaghi, Shayan
- Data Fabrics for Multi-Domain Information Systems
- Shah, Sarah
- Predicting the Performance of DNNs to Support Efficient Resource Allocation
- Shah Heydari, Shahram
- Analyzing the Quality of Synthetic Adversarial Cyberattacks
- Enterprise Application Outage Prediction Using XGBoost and LSTM
- Shahriar, Nashid
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- DTL-IDS: Deep Transfer Learning-based Intrusion Detection System in 5G Networks
- Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN
- Shahriyar, Md Mahir
- DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions
- Shiiba, Ryusei
- dot2net: A labeled graph approach for template-based configuration of emulation networks
- Shwartz, Larisa
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Soares, Daniel
- Improved Video QoE in Wireless Networks using Deep Reinforcement Learning
- Sondur, Sanjeev
- Improving System Configurations using Domain Knowledge Assisted Semi-Supervised Learning
- Song, Yuqian
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4
- Soto, Paola
- Resource Allocation of Multi-user Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning
- Soualah, Oussama
- Energy Efficient VNF-FG Embedding via Attention-based Deep Reinforcement Learning
- Souihi, Sami
- Deep Learning in NLP for Anomalous HTTP Requests Detection
- Stefanelli, Cesare
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Steinmetz, Ralf
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Stiller, Burkhard
- Deciphering DDoS Attacks through a Global Lens
- Taghavian, Masoud
- A Fair Approach to the Online Placement of the Network Services over the Edge
- Tahmid, Sheikh
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Tayama, Kenichi
- Deep Reinforcement Learning for Network Service Recovery in Large-scale Failures
- Texier, Geraldine
- A Fair Approach to the Online Placement of the Network Services over the Edge
- Teyssier, Benjamin
- An Empirical Approach to Evaluate the Resilience of QUIC Protocol against Handshake Flood Attacks
- Tizghadam, Ali
- LLM-based policy generation for intent-based management of applications
- Tong, Van
- Deep Learning in NLP for Anomalous HTTP Requests Detection
- Tornatore, Massimo
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- Adaptive Entanglement Routing for Quantum Networks with Cutoff
- Torrealba, Lucas
- Dom2Vec - Detecting DGA Domains through Word Embeddings and AI/ML-driven Lexicographic Analysis
- Tortonesi, Mauro
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Tóthfalusi, Tamás
- ML-based translation methods for protocols and data formats
- Towhid, Md. Shamim
- A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification
- DTL-IDS: Deep Transfer Learning-based Intrusion Detection System in 5G Networks
- Tuffin, Bruno
- Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model
- Tuffin, Stephane
- A Critical Study of Few-shot Learning for Encrypted Traffic Classification
- Tuli, Shreshth
- Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting
- Turk, Yekta
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks
- Varga, Eszter
- ML-based translation methods for protocols and data formats
- Varga, Pál
- AI Toolbox Concept for the Arrowhead Framework
- ML-based translation methods for protocols and data formats
- Tailoring MLOps Techniques for Industry 5.0 Needs
- Verkerken, Miel
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- Vermeulen, Kevin
- An explainable-by-design ensemble learning system to detect unknown network attacks
- Vettori, Luca
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Vieira, Marcos
- Improved Video QoE in Wireless Networks using Deep Reinforcement Learning
- Volckaert, Bruno
- Federated Scheduling of Fog-native Applications over Multi-Domain Edge-to-Cloud Ecosystem
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- Wang, Jessie Hui
- TinyG: Accurate IP Geolocation Using a Tiny Number of Probers
- Wang, Jilong
- TinyG: Accurate IP Geolocation Using a Tiny Number of Probers
- Wang, Peiran
- TinyG: Accurate IP Geolocation Using a Tiny Number of Probers
- Wang, Ying
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Wang, Yixing
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4
- Wauters, Tim
- Performance Impact of Queue Sorting in Container-based Application Scheduling
- Wubete, Bruck
- Leveraging Spatiotemporal Relations for Predicting Potential Link Failures
- Xiao, Yang
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4
- Xiong, Jiaheng
- Adaptive Entanglement Routing for Quantum Networks with Cutoff
- Xue, Ji
- Bridging Resource Prediction and System Management: A Case Study in Cloud Systems
- Yamauchi, Hiroshi
- Deep Reinforcement Learning based Command Control System for Automating Fault Diagnosis
- Yoo, Jae-Hyoung
- Log Analysis and Prediction for Anomaly Detection in Network Switches
- SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement Learning
- Yu, Peng
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Zaccarini, Mattia
- Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach
- Zeghlache, Djamal
- Energy Efficient VNF-FG Embedding via Attention-based Deep Reinforcement Learning
- Zeinaty, Paul
- Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA
- Zema, Nicola Roberto
- Learning-Based Formation Control of UAV-fleet
- Zerwas, Johannes
- ADFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks
- Zeydan, Engin
- A Marketplace Solution for Distributed Network Management and Orchestration of Slices
- Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks
- Zhang, Bohan
- Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA
- Zhang, Junye
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Zhang, Qiaolun
- Adaptive Entanglement Routing for Quantum Networks with Cutoff
- Zhou, Chengbo
- CML-IDS: Enhancing Intrusion Detection in SDN through Collaborative Machine Learning
- Zhou, Fen
- Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing
- Zhou, Jingli
- Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4
- Zhuang, Zhihan
- Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN
- Zincir-Heywood, Nur
- MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection
- Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices
- Zitterbart, Martina
- Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks