Abstract is missing.
- On the practical applicability of SDN researchRoberto di Lallo, Mirko Gradillo, Gabriele Lospoto, Claudio Pisa, Massimo Rimondini. 1-9 [doi]
- Virtual network embedding in software-defined networksLeonardo Richter Bays, Luciano Paschoal Gaspary, Reaz Ahmed, Raouf Boutaba. 10-18 [doi]
- SDEFIX - Identifying elephant flows in SDN-based IXP networksLuis Augusto Dias Knob, Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco. 19-26 [doi]
- ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDNAnderson Santos da Silva, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho. 27-35 [doi]
- Automatic discovery of sub-optimal radio performance in LTE RAN networksAnne-Marie Bosneag, Sidath Handurukande, James O'Sullivan. 36-43 [doi]
- Coordinated scheduling via frequency and power allocation optimization in LTE cellular networksNessrine Trabelsi, Chung Shue Chen, Laurent Roullet, Eitan Altman, Rachid El Azouzi. 44-51 [doi]
- Traffic offloading via Markov approximation in heterogeneous cellular networksThant Zin Oo, Nguyen H. Tran, Walid Saad, Jae Hyeok Son, Choong Seon Hong. 52-60 [doi]
- Matching-based distributed resource allocation in cognitive femtocell networksTuan LeAnh, Nguyen H. Tran, Walid Saad, Seungil Moon, Choong Seon Hong. 61-68 [doi]
- A self-stabilizing framework for dynamic bandwidth allocation in virtual networksHouda Jmila, Kaouther Drira, Djamal Zeghlache. 69-77 [doi]
- Protecting virtual networks with DRONEShihabur Rahman Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, Raouf Boutaba, Jeebak Mitra, Feng Zeng. 78-86 [doi]
- Reversing the supermarket: A distributed approach for handling elasticity in the cloudAmir Nahir, Ariel Orda, Danny Raz. 87-95 [doi]
- Cloud migration using automated planningMaja Vukovic, Jinho Hwang. 96-103 [doi]
- An HTTP/2 push-based approach for SVC adaptive streamingJeroen van der Hooft, Stefano Petrangeli, Niels Bouten, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck. 104-111 [doi]
- Managing real-time media flows through a flow state exchangeSafiqul Islam, Michael Welzl, David A. Hayes, Stein Gjessing. 112-120 [doi]
- Autonomous system based flow marking scheme for IP-TracebackVahid Aghaei Foroushani, A. Nur Zincir-Heywood. 121-128 [doi]
- QoE management in DASH systems using the segment aware rate adaptation algorithmParikshit Juluri, Venkatesh Tamarapalli, Deep Medhi. 129-136 [doi]
- A minimum spanning tree-based approach for reducing verification collisions in self-organizing networksTsvetko Tsvetkov, Janne Ali-Tolppa, Henning Sanneck, Georg Carle. 137-145 [doi]
- Modeling and optimization of self-organizing energy-saving mechanism for HetNetsZifan Li, Peng Yu, Wenjing Li, Xuesong Qiu. 146-152 [doi]
- Extensible signaling framework for decentralized network management applicationsDario Valocchi, Daphné Tuncer, Marinos Charalambides, Mauro Femminella, Gianluca Reali, George Pavlou. 153-161 [doi]
- Decentralized boolean network tomography based on network partitioningNagao Ogino, Takeshi Kitahara, Shin'ichi Arakawa, Go Hasegawa, Masayuki Murata. 162-170 [doi]
- OTCP: SDN-managed congestion control for data center networksSimon Jouet, Colin Perkins, Dimitrios P. Pezaros. 171-179 [doi]
- SDxVPN: A software-defined solution for VPN service providersBehzad Mirkhanzadeh, Naeim Taheri, Siavash Khorsandi. 180-188 [doi]
- AR2C2: Actively replicated controllers for SDN resilient control planeEros S. Spalla, Diego R. Mafioletti, Alextian B. Liberato, Gilberto Ewald, Christian Esteve Rothenberg, Lásaro J. Camargos, Rodolfo da Silva Villaça, Magnos Martinello. 189-196 [doi]
- High-level modeling and application validation for SDNFelipe A. Lopes, Leonidas Lima, Marcelo Santos, Robson Fidalgo, Stenio Fernandes. 197-205 [doi]
- Inter-data-center network traffic prediction with elephant flowsYi Li, Hong Liu, Wenjun Yang, Dianming Hu, Wei Xu. 206-213 [doi]
- Dimensioning of Store-and-Transfer WDM Network with limited storageDa Feng, Weiqiang Sun, Peng Wu, Xiaojian Zhang, Junmin Wu, Weisheng Hu. 214-221 [doi]
- Overlay network measurements with distribution evolution and geographical visualizationAndri Lareida, Sebastian Schrepfer, Thomas Bocek, Burkhard Stiller. 222-230 [doi]
- Activity-based congestion management for fair bandwidth sharing in trusted packet networksMichael Menth, Nikolas Zeitler. 231-239 [doi]
- A multi-level framework to identify HTTPS servicesWazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment. 240-248 [doi]
- KnowNet: Towards a knowledge plane for enterprise network managementRen Quinn, Josh Kunz, Aisha Syed, Joe Breen, Sneha Kumar Kasera, Robert Ricci, Jacobus E. van der Merwe. 249-256 [doi]
- OpenEdge: A dynamic and secure open service edge networkJosh Kunz, Christopher Becker, Mohamed Jamshidy, Sneha Kumar Kasera, Robert Ricci, Jacobus E. van der Merwe. 257-264 [doi]
- Changeover prediction model for improving handover support in campus area WLANBryan Ng, Alexander Deng, Ying Qu, Winston K. G. Seah. 265-272 [doi]
- ASTORIA: A framework for attack simulation and evaluation in smart gridsAlexandre Gustavo Wermann, Marcelo Cardoso Bortolozzo, Eduardo Germano da Silva, Alberto E. Schaeffer Filho, Luciano Paschoal Gaspary, Marinho P. Barcellos. 273-280 [doi]
- An SDN-based approach to enhance the end-to-end security: SSL/TLS case studyAlireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura. 281-288 [doi]
- Apples, oranges and hosting providers: Heterogeneity and security in the hosting marketSamaneh Tajalizadehkhoob, Maciej Korczynski, Arman Noroozian, Carlos Gañán, Michel van Eeten. 289-297 [doi]
- A scheme for DDoS attacks mitigation in IdM systems through reorganizationsRicardo Macedo, Aldri Luiz dos Santos, Yacine Ghamri-Doudane, Michele Nogueira Lima. 298-305 [doi]
- On the feasibility of core-rooted path addressingCong Guo, Martin Karsten. 306-314 [doi]
- Scalable BGP prefix selection for effective inter-domain traffic engineeringWenqin Shao, Luigi Iannone, Jean-Louis Rougier, Francois Devienne, Mateusz Viste. 315-323 [doi]
- LARAS: Locality aware replication algorithm for the Skip GraphYahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap. 324-332 [doi]
- Joint NFV placement and routing for multicast service on SDNSai Qian Zhang, Ali Tizghadam, Byungchul Park, Hadi Bannazadeh, Alberto Leon-Garcia. 333-341 [doi]
- Maximizing energy efficiency in off-peak hours: A novel sleep scheme for WLAN access pointsHyeontaek Oh, S. H. Shah Newaz, Sangdon Park, Jun Kyun Choi. 342-348 [doi]
- On optimal placement of low power nodes for improved performance in heterogeneous networksAlexander Sayenko, Mikhail Zolotukhin, Timo Hämäläinen 0002. 349-357 [doi]
- An architecture integrating stationary and mobile roadside units for providing communication on intelligent transportation systemsCristiano M. Silva, Wagner Meira Jr.. 358-365 [doi]
- Using the RPL protocol for supporting passive monitoring in the Internet of ThingsAnthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder. 366-374 [doi]
- Where am I? Characterizing and improving the localization performance of off-the-shelf mobile devices through cooperationHuiguang Liang, Hyong S. Kim, Hwee Pink Tan, Wai-Leong Yeow. 375-382 [doi]
- Providing producer mobility support in NDN through proactive data replicationMatheus B. Lehmann, Marinho P. Barcellos, Andreas Mauthe. 383-391 [doi]
- Not you too? Distilling local contexts of poor cellular network performance through participatory sensingHuiguang Liang, Ido Nevat, Hyong S. Kim, Hwee Pink Tan, Wai-Leong Yeow. 392-400 [doi]
- Scylla: A language for virtual network functions orchestration in enterprise WLANsRoberto Riggio, Imen Grida Ben Yahia, Steven Latré, Tinku Rasheed. 401-409 [doi]
- SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placementHui Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang. 410-417 [doi]
- Resource allocation in optical beam-steered indoor networksMaria Torres Vega, Jeroen Famaey, A. M. J. Koonen, Antonio Liotta. 418-426 [doi]
- Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networksElisa Mannes, Carlos Maziero, Luiz Carlos Lassance, Fábio Borges. 427-435 [doi]
- Practical accounting in content-centric networkingCesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh. 436-444 [doi]
- BIGAP - Seamless handover in high performance enterprise IEEE 802.11 networksAnatolij Zubow, Sven Zehl, Adam Wolisz. 445-453 [doi]
- Fast address hopping at the switches: Securing access for packet forwarding in SDNSang-Yoon Chang, Younghee Park, Akshaya Muralidharan. 454-460 [doi]
- Composing data and control functions to ease virtual networks programmabilityMessaoud Aouadj, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla. 461-467 [doi]
- Automatic fault detection and diagnosis in cellular networks using operations support systems dataSamira Rezaei, Hamidreza Radmanesh, Payam Alavizadeh, Hamidreza Nikoofar, Farshad Lahouti. 468-473 [doi]
- Towards flexbile SDN-based management for cloud-based mobile networksMatteo Artuso, Cosmin Caba, Henrik Lehrmann Christiansen, José Soler. 474-480 [doi]
- A min-cover based controller placement approach to build reliable control network in SDNQinghong Zhong, Ying Wang, Wenjing Li, Xuesong Qiu. 481-487 [doi]
- Efficacy of Live DDoS Detection with HadoopSufian Hameed, Usman Murad Ali. 488-494 [doi]
- A reputation-based collaborative schema for the mitigation of distributed attacks in SDN domainsKostas Giotis, Maria Apostolaki, Vasilis S. Maglaris. 495-501 [doi]
- AppShell: Making data protection practical for lost or stolen Android devicesXuxian Jiang, Kapil Singh, Yajin Zhou. 502-508 [doi]
- Event attribute tainting: A new approach for attack tracing and event correlationMartin Ussath, Feng Cheng 0002, Christoph Meinel. 509-515 [doi]
- Collaborative DDoS defense using flow-based security event informationJessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras. 516-522 [doi]
- MASTERY: A multicontext-aware system that preserves the users' privacyAlberto Huertas Celdrán, Manuel Gil Pérez, Félix J. García Clemente, Gregorio Martínez Pérez. 523-528 [doi]
- Order@Cloud: A VM organisation framework based on multi-objectives placement rankingGuilherme Arthur Geronimo, Rafael Brundo Uriarte, Carlos Becker Westphall. 529-535 [doi]
- A novel virtual network embedding scheme based on Gomory-Hu tree within cloud's backboneOussama Soualah, Ilhem Fajjari, Makhlouf Hadji, Nadjib Aitsaadi, Djamal Zeghlache. 536-542 [doi]
- Location aware decision engine to offload mobile computation to the cloudJose Leal Domingues Neto, Daniel F. Macedo, José Marcos S. Nogueira. 543-549 [doi]
- Automated anomaly detection and root cause analysis in virtualized cloud infrastructuresJieyu Lin, Qi Zhang, Hadi Bannazadeh, Alberto Leon-Garcia. 550-556 [doi]
- Daleel: Simplifying cloud instance selection using machine learningFaiza Samreen, Yehia El-khatib, Matthew Rowe, Gordon S. Blair. 557-563 [doi]
- Adaptive virtual machine allocation algorithms for cloud-hosted elastic media servicesRafael Xavier, Hendrik Moens, Bruno Volckaert, Filip De Turck. 564-570 [doi]
- Arguable anonymity from key-privacy: The deterministic crowds protocolStefan Rass, Raphael Wigoutschnigg. 571-576 [doi]
- Protecting NFC data exchange against eavesdropping with encryption record type definitionSufian Hameed, Usman Murad Jamali, Adnan Samad. 577-583 [doi]
- Towards a taxonomy for security threats on the web ecosystemCarlo Marcelo Revoredo da Silva, Ricardo Batista Rodrigues, Ruy Queiroz, Vinicius C. Garcia, Jose Silva, Daniel Gatti, Rodrigo Elia Assad, Leandro M. do Nascimento, Kellyton Brito, Pericles Miranda. 584-590 [doi]
- RoutingWatch: Visual exploration and analysis of routing eventsDavide Ceneda, Marco Di Bartolomeo, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Massimo Rimondini. 591-597 [doi]
- PMSR - Poor Man's Segment Routing, a minimalistic approach to Segment Routing and a Traffic Engineering use caseStefano Salsano, Luca Veltri, Luca Davoli, Pier Luigi Ventre, Giuseppe Siracusano. 598-604 [doi]
- Maximizing lifetime of multiple data aggregation trees in wireless sensor networksHiroshi Matsuura. 605-611 [doi]
- Flexible bandwidth-based virtual network embeddingCihangir Besiktas, Didem Gözüpek, Aydin Ulas, Erhan Lokman, Özcan Özyurt, Kazim Ulusoy. 612-617 [doi]
- Optimistic concurrency control in self-organizing networks using automatic coordination and verificationJanne Ali-Tolppa, Tsvetko Tsvetkov. 618-624 [doi]
- Adaptive SON management using KPI measurementsSimon Lohmuller, Lars-Christoph Schmelz, Soren Hahn. 625-631 [doi]
- Towards a passive measurement-based estimator for the standard deviation of the end-to-end delayHuu-Nghi Nguyen, Thomas Begin, Anthony Busson, Isabelle Guérin Lassous. 632-637 [doi]
- Network function virtualization scheduling with transmission delay optimizationLong Qu, Chadi Assi, Khaled Shaban. 638-644 [doi]
- Surviving link failures in multicast VN embedded applicationsAbdulziz M. Ghaleb, Tarek Khalifa, Sara Ayoubi, Khaled Bashir Shaban. 645-651 [doi]
- Workflow extraction for service operation using multiple unstructured trouble ticketsAkio Watanabe, Keisuke Ishibashi, Tsuyoshi Toyono, Tatsuaki Kimura, Keishiro Watanabe, Yoichi Matsuo, Kohei Shiomoto. 652-658 [doi]
- Hosting virtual machines on a cloud datacenter: A matching theoretic approachChuan Pham, Nguyen H. Tran, Minh N. H. Nguyen, Shaolei Ren, Walid Saad, Choong Seon Hong. 659-664 [doi]
- Delta-r: A novel and more economic strategy for allocating the roadside infrastructure in vehicular networks with guaranteed levels of performanceJoao F. Machry Sarubbi, Cristiano M. Silva. 665-671 [doi]
- Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate controlMaria Efthymiopoulou, Nikolaos Efthymiopoulos, Athanasios Christakidis. 672-678 [doi]
- OneClock to rule them all: Using time in networked applicationsTal Mizrahi, Yoram Moses. 679-685 [doi]
- Dispatching PACKET_INs to the right SDN control application via context interpretation in Mobile Core NetworksClarissa Cassales Marquezan, Xueli An, Zoran Despotovic, Ramin Khalili, Artur Hecker. 686-690 [doi]
- Network failures support for traffic monitoring mechanisms in software-defined networksAdrian Flores de la Cruz, Juan Pedro Muñoz-Gea, Pilar Manzanares-Lopez, Josemaria Malgosa-Sanahuja. 691-694 [doi]
- Meeting latency targets for complex SOA-based transactions in data centersMartin Johnsson, Brendan Jennings. 695-698 [doi]
- Apex: An engine for dynamic adaptive policy executionLiam Fallon, Sven van der Meer, John Keeney. 699-702 [doi]
- Is LTE-Advanced really advanced?Jonghwan Hyun, Youngjoon Won, Eunji Kim, Jae-Hyoung Yoo, James Won-Ki Hong. 703-707 [doi]
- Multisensor data fusion and decision support in wireless body sensor networksCarol Habib, Abdallah Makhoul, Rony Darazi, Raphaël Couturier. 708-712 [doi]
- Linux containers networking: Performance and scalability of kernel modulesJoris Claassen, Ralph Koning, Paola Grosso. 713-717 [doi]
- Admission control with online algorithms in SDNJeremie Leguay, Lorenzo Maggi, Moez Draief, Stefano Paris, Symeon Chouvardas. 718-721 [doi]
- NaaS architecture through SDN-enabled NFV: Network openness towards web communication service providersAmina Boubendir, Emmanuel Bertin, Noemie Simoni. 722-726 [doi]
- Evaluation of terahertz channel in data centersShahram Mollahasani, Ertan Onur. 727-730 [doi]
- Standalone eNode-B design with integrated virtual EPC in public safety networksCan Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu. 731-734 [doi]
- Outsourced invoice service: Service-clearing as SaaS in mobility service marketplacesMichael Strasser, Nico Weiner, Sahin Albayrak. 735-739 [doi]
- Empowering network operating systems with memory management techniquesRoberto Doriguzzi Corin, Domenico Siracusa, Elio Salvadori, Arne Schwabe. 740-744 [doi]
- Adaptive sampling algorithms with local emergency detection for energy saving in Wireless Body Sensor NetworksChristian Salim, Abdallah Makhoul, Rony Darazi, Raphaël Couturier. 745-749 [doi]
- Real time distributed analysis of MPLS network logs for anomaly detectionMuhammet Macit, Emrullah Delibas, Bahtiyar Karanlik, Alperen Inal, Tevfik Aytekin. 750-753 [doi]
- Compression-based technique for SDN using sparse-representation dictionaryAhmed Al-Jawad, Purav Shah, Orhan Gemikonakli, Ramona Trestian. 754-758 [doi]
- Supporting end-to-end connectivity in federated networks using SDNRoberto di Lallo, Gabriele Lospoto, Massimo Rimondini, Giuseppe Di Battista. 759-762 [doi]
- A mobile follow-me cloud content caching modelAndre S. Gomes, Vitor Fonseca, Bruno Sousa, David Palma, Paulo Simães 0001, Edmundo Monteiro, Luís Cordeiro. 763-766 [doi]
- EventFlow: Network flow aggregation based on user actionsPetr Velan. 767-771 [doi]
- Energy optimization through duty cycling scheduling in mobile social networks: A non-cooperative game theory approachSara Koulali, Essaid Sabir, Mostafa Azizi. 772-775 [doi]
- RPL version number attacks: In-depth studyAhmet Aris, Sema F. Oktug, Siddika Berna Ors Yalcin. 776-779 [doi]
- Using Web Services for WebRTC signaling interoperabilityBasar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin. 780-783 [doi]
- Energy efficient SDN commodity switch based practical flow forwarding methodAmer AlGhadhban, Basem Shihada. 784-788 [doi]
- Software-defined and value-based information processing and dissemination in IoT applicationsMauro Tortonesi, James Michaelis, Niranjan Suri, Michael Baker. 789-793 [doi]
- Machine learning based handover management for improved QoE in LTEZoraze Ali, Nicola Baldo, Josep Mangues-Bafalluy, Lorenza Giupponi. 794-798 [doi]
- Opportunistic media sharing for mobile networksJorge Visca, Raul Fuentes, Ana R. Cavalli, Javier Baliosian. 799-803 [doi]
- Towards online anomaly detection by combining multiple detection methods and StormZiyu Wang, Jiahai Yang, Hui Zhang, Chenxi Li, Shize Zhang, Hui Wang. 804-807 [doi]
- The configuration-oriented planning for fully declarative IT system provisioning automationTakayuki Kuroda, Manabu Nakanoya, Atsushi Kitano, Aniruddha S. Gokhale. 808-811 [doi]
- SaFe-NeC: A scalable and flexible system for network data characterizationDaniele Apiletti, Elena Baralis, Tania Cerquitelli, Paolo Garza, Luca Venturini. 812-816 [doi]
- Adaptive monitoring and management of security events with SDNIris Adam, Titta Ahola, Mirko Sailio, Visa Antero Vallivaara, Felix von Eye. 817-820 [doi]
- FlowMap: Improving network management with SDNTrung Truong, Qiang Fu, Christopher Lorier. 821-824 [doi]
- PIoT: Programmable IoT using Information Centric NetworkingYuhang Ye, Yuansong Qiao, Brian Lee, Niall Murray. 825-829 [doi]
- PrivateShare: Measuring device-to-device user behavior and transmission qualityLeonhard Nobach, David Hausheer. 830-833 [doi]
- A data fusion protocol for WSN performance and data retrievalVasco Pereira, Edmundo Monteiro, Jorge Sá Silva. 834-837 [doi]
- A meta-analysis for security threats over the Web ecosystemCarlo Marcelo Revoredo da Silva, Ricardo Batista Rodrigues, Ruy Queiroz, Vinicius C. Garcia, Jose Silva, Daniel Gatti, Leandro M. do Nascimento, Kellyton Brito, Rodrigo Elia Assad. 838-842 [doi]
- Tamper-resistant autonomous agents-based mobile-cloud computingPelin Angin, Bharat K. Bhargava, Rohit Ranchal. 843-847 [doi]
- Predicting SLA conformance for cluster-based services using distributed analyticsJawwad Ahmed, Andreas Johnsson, Rerngvit Yanggratoke, John Ardelius, Christofer Flinta, Rolf Stadler. 848-852 [doi]
- Identifying DoS attacks on software defined networks: A relation context approachAhmad AlEroud, Izzat Alsmadi. 853-857 [doi]
- Towards two-dimensional measurement of highly active IP prefixes in BGPYuan Yang, Mingwei Xu, Meng Chen. 858-862 [doi]
- A reward-based incentive mechanism for file caching in delay tolerant networksSidi Ahmed Ezzahidi, Essaid Sabir, El-Houssine Bouyakhf. 863-867 [doi]
- Cross-domain 5G network management for seamless industrial communicationsChristian Mannweiler, Lars-Christoph Schmelz, Simon Lohmuller, Bernhard Bauer. 868-872 [doi]
- Application-driven network management with ProtoRINAYuefeng Wang, Ibrahim Matta, Nabeel Akhtar. 873-877 [doi]
- Netography: Troubleshoot your network with packet behavior in SDNYusu Zhao, Pengfei Zhang, Yaohui Jin. 878-882 [doi]
- Configuration of open vSwitch using OF-CONFIGTomás Cejka, Radek Krejcí. 883-888 [doi]
- Qualitative comparison of open-source SDN controllersAndrei Bondkovskii, John Keeney, Sven van der Meer, Stefan Weber. 889-894 [doi]
- Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end serviceSamuel Jero, Vijay K. Gurbani, Ray Miller, Bruce Cilli, Charles Payette, Sameer Sharma. 895-900 [doi]
- Experiences evaluating OpenStack network data plane performance and scalabilityBengi Karacali, John M. Tracey. 901-906 [doi]
- Network traffic characterisation using flow-based statisticsPetr Velan, Jana Medková, Tomás Jirsík, Pavel Celeda. 907-912 [doi]
- ENTRADA: A high-performance network traffic data streaming warehouseMaarten Wullink, Giovane C. M. Moura, Moritz Müller, Cristian Hesselman. 913-918 [doi]
- A performance benchmark for NetFlow data analysis on distributed stream processing systemsMilan Cermák, Daniel Tovarnák, Martin Lastovicka, Pavel Celeda. 919-924 [doi]
- Unifying LISP and TRILL control-planes for distributed data-center networkingRoua Touihri, Patrick Raad, Nicolas Turpault, Francois Cachereul, Stefano Secci. 925-930 [doi]
- Diagnosing channel issues using GTP protocol messages in LTE core networksSaman Feghhi, John Keeney, Liam Fallon, Douglas J. Leith. 931-936 [doi]
- Towards establishing causality between change and incidentSinem Guven, Karin Murthy, Larisa Shwartz, Amit M. Paradkar. 937-942 [doi]
- Real-world experiences with CQI-based analyses for dense LTE networksAnne-Marie Bosneag, Sidath Handurukande, James O'Sullivan, MingXue Wang. 943-948 [doi]
- Structured cybersecurity information exchange for streamlining incident response operationsTakeshi Takahashi, Daisuke Miyamoto. 949-954 [doi]
- Management of customizable Software-as-a-Service in cloud and network environmentsHendrik Moens, Bart Dhoedt, Filip De Turck. 955-960 [doi]
- Resource management of replicated service systems provisioned in the cloudMathias Björkqvist, Robert Birke, Walter Binder. 961-966 [doi]
- Workload interleaving with performance guarantees in data centersFeng Yan, Evgenia Smirni. 967-972 [doi]
- Dynamic virtual network restoration with optimal standby virtual router selectionXuan Liu, Deep Medhi. 973-978 [doi]
- Distributed smart space orchestrationMarc-Oliver Pahl, Georg Carle, Gudrun Klinker. 979-984 [doi]
- A bottom-up approach to real-time search in large networks and cloudsMisbah Uddin, Rolf Stadler. 985-990 [doi]
- Demonstrator for adaptive SON managementLars-Christoph Schmelz, Dario Gotz, Soren Hahn, Andreas Lobinger, Simon Lohmuller. 991-992 [doi]
- Exploring security vulnerabilities of unmanned aerial vehiclesNils Miro Rodday, Ricardo de Oliveira Schmidt, Aiko Pras. 993-994 [doi]
- ITSA: Internet traffic statistics archiveMartijn Hoogesteger, Ricardo de Oliveira Schmidt, Aiko Pras. 995-996 [doi]
- Demo: AirNet in actionMessaoud Aouadj, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla. 997-998 [doi]
- GENCROBAT: Efficient transmission and processing of the massive genomic dataM. Oguzhan Külekci, M. Gamil Sagiroglu. 999-1000 [doi]
- An application of real-time micro-location updates for event management industryTaner Yuksel, Nermin Sarifakioflu, Basar Öztaysi. 1001-1002 [doi]
- Online experts for admission control in SDNStefano Paris, Jeremie Leguay, Lorenzo Maggi, Moez Draief, Symeon Chouvardas. 1003-1004 [doi]
- Managing NFV using SDN and control theoryNabeel Akhtar, Ibrahim Matta, Yuefeng Wang. 1005-1006 [doi]
- A non-disruptive automated approach to update SDN applications at runtimeAntonio Marsico, Roberto Doriguzzi Corin, Matteo Gerola, Domenico Siracusa, Arne Schwabe. 1007-1008 [doi]
- Energy-efficiency enablers and operations in software-defined environmentsStuart Clayman, Lefteris Mamatas, Alex Galis. 1009-1010 [doi]
- Dynamic load management for IMS networks using network function virtualizationKaan Dandin, Ibrahim Hökelek, Gunes Karabulut Kurt. 1011-1012 [doi]
- Load balancing in OpenFlow-enabled switches for wireless access traffic aggregationHakan Selvi, Engin Zeydan, Gürkan Gür, Fatih Alagöz. 1013-1014 [doi]
- BIGAP - A seamless handover scheme for high performance enterprise IEEE 802.11 networksSven Zehl, Anatolij Zubow, Adam Wolisz. 1015-1016 [doi]
- A simulation tool for evaluating the constraint-based allocation of storage resources for multi-tenant cloud applicationsPieter-Jan Maenhaut, Hendrik Moens, Bruno Volckaert, Veerle Ongenae, Filip De Turck. 1017-1018 [doi]
- Real-time analysis of NetFlow data for generating network traffic statistics using Apache SparkMilan Cermák, Tomás Jirsík, Martin Lastovicka. 1019-1020 [doi]
- Streaming alarm data analytics for mobile service providersEngin Zeydan, Utku Yabas, Selcuk Sozuer, Çagri Özgenc Etemoglu. 1021-1022 [doi]
- On-demand dynamic network service deployment over NaaS architectureAmina Boubendir, Emmanuel Bertin, Noemie Simoni. 1023-1024 [doi]
- Price/cooling aware and delay sensitive scheduling in geographically distributed data centersAhsan Ali, Öznur Özkasap. 1025-1030 [doi]
- WAN capacity forecasting for large enterprisesTaghrid Samak, Mark Miklic. 1031-1036 [doi]
- Dynamic placement of virtual network functions based on model predictive controlKota Kawashima, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata. 1037-1042 [doi]
- Collating time-series resource data for system-wide job profilingVernon K. Cody Bumgardner, Victor W. Marek, Ray L. Hyatt. 1043-1048 [doi]
- Towards an approximate graph entropy measure for identifying incidents in network event dataPhil Tee, George Parisis, Ian Wakeman. 1049-1054 [doi]
- A new approach for clustering alarm sequences in mobile operatorsSelcuk Sozuer, Çagri Özgenc Etemoglu, Engin Zeydan. 1055-1060 [doi]
- nDEWS: A new domains early warning system for TLDsGiovane C. M. Moura, Moritz Müller, Maarten Wullink, Cristian Hesselman. 1061-1066 [doi]
- Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypotsNaomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba, Masayuki Murata. 1067-1072 [doi]
- Optimizing ATM cash flow network managementYixin Diao, Ronnie Sarkar, Ea-Ee Jan. 1073-1078 [doi]
- How to choose from different botnet detection systems?Fariba Haddadi, Duong-Tien Phan, A. Nur Zincir-Heywood. 1079-1084 [doi]
- Online feature selected semi-supervised decision trees for network intrusion detectionZehra Cataltepe, Ümit Ekmekçi, Tanju Cataltepe, Ismail Kelebek. 1085-1088 [doi]
- Toward a cloud-based security intelligence with big data processingKarim Benzidane, Hassan El Alloussi, Othman El Warrak, Leila Fetjah, Said Jai-Andaloussi, Abderrahim Sekkaki. 1089-1092 [doi]
- SLA analytics for adaptive service provisioning in the cloudObinna Anya, Heiko Ludwig, Mohamed Mohamed, Samir Tata. 1093-1096 [doi]
- VEGAS: Visualizing, exploring and grouping alertsDamien Cremilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent. 1097-1100 [doi]
- Clustering-based KPI data association analysis method in cellular networksXingyu Guo, Peng Yu, Wenjing Li, Xuesong Qiu. 1101-1104 [doi]
- Improve round-trip time measurement quality via clustering in inter-domain traffic engineeringWenqin Shao, Jean-Louis Rougier, Francois Devienne, Mateusz Viste. 1105-1108 [doi]
- A classification approach for adaptive mitigation of SYN flood attacks: Preventing performance loss due to SYN flood attacksAlptugay Degirmencioglu, Hasan Tugrul Erdogan, Mehrdad A. Mizani, Oguz Yilmaz. 1109-1112 [doi]
- Managing NFV using SDN and control theoryNabeel Akhtar, Ibrahim Matta, Yuefeng Wang. 1113-1118 [doi]
- Making queueing theory more palatable to SDN/OpenFlow-based network practitionersJordan Ansell, Winston K. G. Seah, Bryan Ng, Stuart Marshall. 1119-1124 [doi]
- Joint bandwidth scheduling and routing method for large file transfer with time constraintMasahiko Aihara, Shiori Kono, Kazuhiko Kinoshita, Nariyoshi Yamai, Takashi Watanabe. 1125-1130 [doi]
- OpenFlow-based migration and management of the TouIX IXPRemy Lapeyrade, Marc Bruyere, Philippe Owezarski. 1131-1136 [doi]
- A fair spectrum sharing method in consideration of CoMPShusaku Shibata, Kazuhiko Kinoshita, Keita Kawano, Takashi Watanabe. 1137-1142 [doi]
- Towards self-adaptive network management for a recursive network architectureJason Barron, Micheal Crotty, Ehsan Elahi, Roberto Riggio, Diego R. Lopez, Miguel Ponce de Leon. 1143-1148 [doi]
- Design of a dynamic adaptive reservation system in media production networksMaryam Barshan, Hendrik Moens, Bruno Volckaert, Filip De Turck. 1149-1152 [doi]
- Integration and management of Wi-Fi offloading in service provider infrastructuresEngin Zeydan, Ahmet Serdar Tan, Yavuz Mester, Gozde Ozcan. 1153-1156 [doi]
- Understanding daily mobility patterns in urban road networks using traffic flow analyticsIbai Lana, Javier Del Ser, Ignacio (Iñaki) Olabarrieta. 1157-1162 [doi]
- Railway transportation system's resilience: Integration of operating conditions into topological indicatorsKpotissan Adjetey-Bahun, Jean-Luc Planchet, Babiga Birregah, Eric Châtelet. 1163-1168 [doi]
- On the mobile intelligence of autonomous vehiclesJosé Azevedo, Pedro M. d'Orey, Michel Ferreira. 1169-1174 [doi]
- A strategy for clustering students minimizing the number of bus stops for solving the school bus routing problemJoao F. M. Sarubbi, Caio M. R. Mesquita, Elizabeth F. Wanner, Vinicius F. Santos, Cristiano M. Silva. 1175-1180 [doi]
- Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilitiesTaqwa Saeed, Marios Lestas, Yiannos Mylonas, Andreas Pitsillides, Vicky Papadopoulou. 1181-1186 [doi]
- A GRASP-based heuristic for allocating the roadside infrastructure maximizing the number of distinct vehicles experiencing contact opportunitiesJoao F. Machry Sarubbi, Daniel Craviee de A. Vieira, Elizabeth F. Wanner, Cristiano M. Silva. 1187-1192 [doi]
- Dimming support for visible light communication in intelligent transportation and traffic systemSeyhan Ucar, Bugra Turan, Sinem Coleri Ergen, Öznur Özkasap, Mustafa Ergen. 1193-1196 [doi]
- Temporal segmentation of traffic videos based on traffic phase discoveryParvin Ahmadi, Razie Kaviani, Iman Gholampour, Mahmoud Tabandeh. 1197-1202 [doi]
- A new mobility-based clustering algorithm for vehicular ad hoc networks (VANETs)Mengying Ren, Lyes Khoukhi, Houda Labiod, Jun Zhang, Véronique Vèque. 1203-1208 [doi]
- Towards the creation of synthetic, yet realistic, intrusion detection datasetsEmmanouil Vasilomanolakis, Carlos Garcia Cordero, Nikolay Milanov, Max Mühlhäuser. 1209-1214 [doi]
- Expedite feature extraction for enhanced cloud anomaly detectionBruno Lopes Dalmazo, João P. Vilela, Paulo Simões 0001, Marília Curado. 1215-1220 [doi]
- Anomaly detection for SOME/IP using complex event processingNadine Herold, Stephan-Alexander Posselt, Oliver Hanka, Georg Carle. 1221-1226 [doi]
- Multi-stage attack detection and signature generation with ICS honeypotsEmmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser. 1227-1232 [doi]
- User-centered security management of API-based data integration workflowsBojan Suzic. 1233-1238 [doi]
- BotTracer: Bot user detection using clustering method in RecDroidBahman Rashidi, Carol J. Fung. 1239-1244 [doi]
- Handling malicious switches in software defined networksRami Ghannam, Anthony Chung. 1245-1248 [doi]
- Private VNFs for collaborative multi-operator service delivery: An architectural caseGergely Biczók, Balázs Sonkoly, Nikolett Bereczky, Colin Boyd. 1249-1252 [doi]
- Numerical encoding to Tame SQL injection attacksSolomon Ogbomon Uwagbole, William J. Buchanan, Lu Fan. 1253-1256 [doi]
- Context aware data aggregation in vehicular ad-hoc networksZubair Amjad, Wang-Cheol Song, Khi-Jung Ahn, Muhammad Shoaib. 1257-1260 [doi]
- Intelligent transportation as the key enabler of smart citiesStephen W. Turner, Suleyman Uludag. 1261-1264 [doi]
- Short term traffic speed prediction using different feature sets and sensor clustersHalil Gulacar, Yusuf Yaslan, Sema F. Oktug. 1265-1268 [doi]
- BeaSmart: A beacon enabled smarter workplaceAdegboyega Akinsiku, Divyesh Jadav. 1269-1272 [doi]
- Smart mobility in Istanbul with "IBB CepTrafik"Esma Dilek, Yunus Emre Ayozen. 1273-1278 [doi]
- Can machine learning aid in delivering new use cases and scenarios in 5G?Teodora Sandra Buda, Haytham Assem, Lei Xu, Danny Raz, Udi Margolin, Elisha J. Rosensweig, Diego R. Lopez, Marius Iulian Corici, Mikhail Smirnov, Robert Mullins, Olga Uryupina, Alberto Mozo, Bruno Ordozgoiti Rubio, Angel Martin, Alaa Alloush, Pat O'Sullivan, Imen Grida Ben Yahia. 1279-1284 [doi]
- Agile service manager for 5GMarouen Mechtri, Imen Grida Benyahia, Djamal Zeghlache. 1285-1290 [doi]
- Efficient management solutions for software-defined infrastructuresStuart Clayman, Lefteris Mamatas, Alex Galis. 1291-1296 [doi]
- Emerging management challenges for the 5G era: Multi-service provision through optimal end-to-end resource slicing in virtualized infrastructures problem statements and solution approachesKostas Tsagkaris, Imen Gridabenyahia, Andreas Georgakopoulos, Panagiotis Demestichas. 1297-1300 [doi]
- Compound implementation of chained network functions and virtual resource management performance evaluationWolfgang Hahn, Borislava Gajic, Christian Mannweiler. 1301-1304 [doi]
- Orchestrating 5G virtual network functions as a modular Programmable Data PlaneFabio Pianese, Massimo Gallo, Alberto Conte, Diego Perino. 1305-1308 [doi]
- Advanced communication modes for the publish/subscribe C-DAX middlewareMichael Höfling, Florian Heimgaertner, Michael Menth. 1309-1314 [doi]
- Performance evaluation of CoAP, SNMP and NETCONF protocols in fog computing architectureMariusz Slabicki, Krzysztof Grochla. 1315-1319 [doi]
- On-demand provisioning of long-tail services in distributed cloudsPiet Smet, Bart Dhoedt, Pieter Simoens. 1320-1323 [doi]