Search Results - "2020 16th International Conference on Network and Service Management (CNSM)"

Refine Results
  1. 1

    Accelerating Virtual Network Embedding with Graph Neural Networks by Habibi, Farzad, Dolati, Mahdi, Khonsari, Ahmad, Ghaderi, Majid

    “…Virtual Network Embedding (VNE) is an essential component of network virtualization technology. Prior works on VNE mainly focused on resource efficiency and…”
    Get full text
    Conference Proceeding
  2. 2

    Heuristic for Edge-enabled Network Slicing Optimization using the "Power of Two Choices" by Alves Esteves, Jose Jurandir, Boubendir, Amina, Guillemin, Fabrice, Sens, Pierre

    “…We propose an online heuristic algorithm for the problem of network slice placement optimization. The solution is adapted to support placement on large scale…”
    Get full text
    Conference Proceeding
  3. 3

    A Novel SDN Dataset for Intrusion Detection in IoT Networks by Kaan Sarica, Alper, Angin, Pelin

    “…The number of Internet of Things (IoT) devices and the use cases they aim to support have increased sharply in the past decade with the rapid developments in…”
    Get full text
    Conference Proceeding
  4. 4

    Recent Advances and Trends in Lightweight Cryptography for IoT Security by Gunathilake, Nilupulee A., Al-Dubai, Ahmed, Buchana, William J.

    “…Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit…”
    Get full text
    Conference Proceeding
  5. 5

    Finding Effective Security Strategies through Reinforcement Learning and Self-Play by Hammar, Kim, Stadler, Rolf

    “…We present a method to automatically find security strategies for the use case of intrusion prevention. Following this method, we model the interaction between…”
    Get full text
    Conference Proceeding
  6. 6

    Time-based Anomaly Detection using Autoencoder by Salahuddin, Mohammad A., Faizul Bari, Md, Alameddine, Hyame Assem, Pourahmadi, Vahid, Boutaba, Raouf

    “…Distributed Denial of Service (DDoS) attacks continue to draw significant attention, especially with the recent surge in cyber attacks that targeted the…”
    Get full text
    Conference Proceeding
  7. 7

    Deep Q-Networks based Auto-scaling for Service Function Chaining by Lee, Doyoung, Yoo, Jae-Hyoung, Hong, James Won-Ki

    “…Network function virtualization (NFV) is a key technology of the 5G network era. NFV decouples a network function from proprietary hardware so that the network…”
    Get full text
    Conference Proceeding
  8. 8

    An IoT Device Identification Method based on Semi-supervised Learning by Fan, Linna, Zhang, Shize, Wu, Yichao, Wang, Zhiliang, Duan, Chenxin, Li, Jia, Yang, Jiahai

    “…With the rapid proliferation of IoT devices, device management and network security are becoming significant challenges. Knowing how many IoT devices are in…”
    Get full text
    Conference Proceeding
  9. 9

    UDP Flow Entry Eviction Strategy Using Q-Learning in Software Defined Networking by Choi, Hanhimnara, Raza, Syed M., Kim, Moonseong, Choo, Hyunseung

    “…Software-defined networking provides a programmable and flexible way to manage the network by separating and centralizing the control plane. The data plane…”
    Get full text
    Conference Proceeding
  10. 10

    SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management by Franco, Muriel Figueredo, Rodrigues, Bruno, Scheid, Eder John, Jacobs, Arthur, Killer, Christian, Granville, Lisandro Zambenedetti, Stiller, Burkhard

    “…Businesses were moving during the past decades to-ward full digital models, which made companies face new threats and cyberattacks affecting their services…”
    Get full text
    Conference Proceeding
  11. 11

    On the impact of novel function mappings, sharing policies, and split settings in network slice design by da Silva Coelho, Wesley, Benhamiche, Amal, Perrot, Nancy, Secci, Stefano

    “…In this work, we model the network slice provisioning as an optimization problem including novel mapping and provisioning requirements rising with new 5G radio…”
    Get full text
    Conference Proceeding
  12. 12

    Self-Driving Network and Service Coordination Using Deep Reinforcement Learning by Schneider, Stefan, Manzoor, Adnan, Qarawlus, Haydar, Schellenberg, Rafael, Karl, Holger, Khalili, Ramin, Hecker, Artur

    “…Modern services comprise interconnected components, e.g., microservices in a service mesh, that can scale and run on multiple nodes across the network on…”
    Get full text
    Conference Proceeding
  13. 13

    On Minimizing Synchronization Cost in NFV-based Environments by Alomari, Zakaria, Zhani, Mohamed Faten, Aloqaily, Moayad, Bouachir, Ouns

    “…Network Function Virtualization is known for its ability to reduce deployment costs and improve the flexibility and scalability of network functions. Due to…”
    Get full text
    Conference Proceeding
  14. 14

    A QoE Inference Method for DASH Video Using ICMP Probing by Miranda, Gilson, Macedo, Daniel Fernandes, Marquez-Barja, Johann M.

    “…An increase of Video on Demand (VoD) consumption has occurred in recent years. Delivering high Quality of Experience (QoE) for users consuming VoD is crucial…”
    Get full text
    Conference Proceeding
  15. 15

    Dynamic Service Placement and Load Distribution in Edge Computing by Maia, Adyson Magalhaes, Ghamri-Doudane, Yacine, Vieira, Dario, Franklin de Castro, Miguel

    “…Edge computing enables a wide variety of application services for the Internet of Things, including those with performance-critical requirements. To achieve…”
    Get full text
    Conference Proceeding
  16. 16

    Micro SIDs: a solution for Efficient Representation of Segment IDs in SRv6 Networks by Tulumello, Angelo, Mayer, Andrea, Bonola, Marco, Lungaroni, Paolo, Scarpitta, Carmine, Salsano, Stefano, Abdelsalam, Ahmed, Camarillo, Pablo, Dukes, Darren, Clad, Francoid, Filsfils, Clarence

    “…The Segment Routing (SR) architecture is based on loose source routing. A list of instructions, called segments can be added to the packet headers, to…”
    Get full text
    Conference Proceeding
  17. 17

    Challenges Towards Automation of Live Telco Network Management: Closed Control Loops by Vaishnavi, Ishan, Ciavaglia, Laurent

    “…Higher automation is seen as a key milestone in the evolution of telecom networks. Maintaining a myriad of different technologies over constantly evolving…”
    Get full text
    Conference Proceeding
  18. 18

    Interpretable Unsupervised Anomaly Detection For RAN Cell Trace Analysis by Chawla, Ashima, Jacob, Paul, Feghhi, Saman, Rughwani, Devashish, van der Meer, Sven, Fallon, Sheila

    “…The high complexity of modern communication networks requires an increasing degree of automation for performance and fault management tasks. A key task is the…”
    Get full text
    Conference Proceeding
  19. 19

    DASH QoE Performance Evaluation Framework with 5G Datasets by Ul Mustafa, Raza, Islam, Md Tariqul, Rothenberg, Christian, Ferlin, Simone, Raca, Darijo, Quinlan, Jason J.

    “…Fifth Generation (5G) networks provide high throughput and low delay, contributing to enhanced Quality of Experience (QoE) expectations. The exponential growth…”
    Get full text
    Conference Proceeding
  20. 20

    A Performance Analysis of Native JSON Parsers in Java, Python, MS.NET Core, JavaScript, and PHP by Dhalla, Hardeep Kaur

    “…JavaScript Object Notation (JSON) has gained prominence over Extensible Markup Language (XML) due to its lightweight and flexible nature. This has also made it…”
    Get full text
    Conference Proceeding