1st workshop on Autonomous Network Management in 5G and beyond systems (ANMS 2022)
2nd International workshop on “Fully-Flexible Internet Architectures and Protocols for the Next-Generation Tactile Internet” (FlexNGIA 2022)
3rd International workshop on Graph-based network Security (GraSec 2022)
Implementation and evaluation of the Multi-connection Tactile Internet Protocol and API
Authors:
Delia Rico, Universidad de Málaga, Spain
Karl-Johan Grinnemo, Karlstad University, Sweden
Anna Brunstrom, Karlstad University, Sweden
Pedro Merino, Universidad de Malaga, Spain
Data Usage in IoT: A Characterization of GTPTunnels in M2M Mobile Networks
Authors:
Simon Raffeck, University of Würzburg, Germany
Stefan Geissler, University of Würzburg, Germany
Michael Krolikowski, EMnify, Germany
Steffen Gebert, EMnify, Germany
Tobias Hossfeld, University of Würzburg, Germany
Characterizing Mobile Signaling Anomalies in the Internet-of-Things
Authors:
Viktoria Vomhoff, University of Würzburg, Germany
Stefan Geissler, University of Würzburg, Germany
Frank Loh, University of Würzburg, Germany
Wolfgang Baue, EMnify, Germany
Tobias Hossfeld, University of Würzburg, Germany
QoS-Aware Inter-Domain Connectivity: Control Plane Design and Operational Considerations
Authors:
Stanislav Lange, NTNU, Norway
Jane Frances Pajo, Telenor, Norway
Thomas Zinner, NTNU, Norway
Hakon Lonsethagen, Telenor, Norway
Min Xie, Telenor, Norway
On Minimizing TCP Retransmission Delay in Softwarized Networks
Authors:
Haythem Yahyaoui, ETS Montreal, Canada
Malek Majdoub, ISITCom - Université de Sousse, Tunisia,
Mohamed Faten Zhani, ETS Montreal, Canada
Moayad Aloqaily, Gnowit Inc., Canada
Predicting network performance using GNNs: generalization to larger unseen networks
Authors:
Miquel Farreras, Universitat de Girona, Spain
Paola Soto, University of Antwerp - imec/Universidad de Antioquia, Belgium
Miguel Camelo, University of Antwerp - imec,Belgium
Lluis Fabrega, Universitat de Girona, Spain
Pere Vilà, Universitat de Girona, Spain
Natural Language Processing Applied to Dynamic Workflow Generation for Network Management
Authors:
Andrzej Jasinski, Technological University of the Shannon, Ireland
Yuansong Qiao, Technological University of the Shannon, Ireland
Enda Fallon, Technological University of the Shannon, Ireland
Ronan Flynn, Technological University of the Shannon, Ireland
Application Placement in Fog Environments using Multi-Objective Reinforcement Learning with Maximum Reward Formulation
Authors:
Reinout Eyckerman, University of Antwerp - imec, Belgium
Philippe Reit, University of Antwerp - imec, Belgium
Steven Latré, University of Antwerp - imec, Belgium
Johann Marquez-Barja , University of Antwerp - imec, Belgium
Peter Hellinckx, University of Antwerp - imec, Belgium
Identification of Attack Paths Using Kill Chain and Attack Graphs
Authors:
Lukas Sadlek, Masaryk University, Czech Republic
Pavel Celeda, Masaryk University, Czech Republic
Daniel Tovarnak, Masaryk University, Czech Republic
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence
Authors:
Daniel Tovarnak, Masaryk University, Czech Republic
Michal Cech, Masaryk University, Czech Republic
Dusan Tichý, Masaryk University, Czech Republic
Vojtech Dohnal, Masaryk University, Czech Republic
GNN-Based Malicious Network Entities Identification In Large-Scale Network Data
Authors:
Stepan Dvorak, Cisco Systems, Czech Republic
Pavel Prochazka, Cisco Systems, Czech Republic
Lukas Bajer, Cisco Systems, Czech Republic
Cyber threat response using reinforcement learning in graph-based attack simulations
Authors:
Jakob Nyberg, KTH Royal Institute of Technology, Sweden
Pontus Johnson, KTH Royal Institute of Technology, Sweden