To keep up with increasing demands on quality of experience, assessing a...
The Internet Engineering Task Force is standardizing new DNS resource
re...
Integrating native AI support into the network architecture is an essent...
The new QUIC protocol can be implemented in user space, and various
impl...
Internet measurements are a crucial foundation of IPv6-related research....
Network slicing enables operators to efficiently support diverse applica...
Deep reinforcement learning (DRL) has been increasingly employed to hand...
The long-running IPv6 Hitlist service is an important foundation for IPv...
In this paper, we study the potentials of passive measurements to gain
a...
Apple recently published its first Beta of the iCloud Private Relay, a
p...
Active measurements can be used to collect server characteristics on a l...
In this work, we introduce two schemes to construct reusable garbled cir...
Network slicing enables the operator to configure virtual network instan...
Network automation is gaining significant attention in the development o...
Deep learning will play a crucial role in enabling cognitive automation ...
Deep Learning methods have been adopted in mobile networks, especially f...
Cognitive Autonomous Networks (CAN) deploys learning based Cognitive
Fun...
We propose a decentralized digital contact tracing service that preserve...
The security of cryptographic communication protocols that use X.509
cer...
The SYN flood attack is a common attack strategy on the Internet, which ...
Cognitive Autonomous Networks (CAN) are promoted to advance Self Organiz...
Many applications require positioning. Time of Flight (ToF) methods calc...
Today, many applications such as production or rescue settings rely on h...
Network slicing is considered a key enabler to 5th Generation (5G)
commu...
Drivers are written in C or restricted subsets of C++ on all production-...
Linear network coding requires arithmetic operations over Galois fields,...
Cyber-Physical Systems (CPS) consist of distributed engineered environme...
In the industrial Internet of Things domain, applications are moving fro...
Secure communication is an integral feature of many Internet services. T...
Configuration management in networks with highest security demands must ...
Linux Containers, such as those managed by Docker, are an increasingly
p...
The rise of user space packet processing frameworks like DPDK and netmap...
The rise of user space packet processing frameworks like DPDK and netmap...
In the Internet of Things and smart environments data, collected from
di...
In this paper, we analyze the evolution of Certificate Transparency (CT)...
Centralized systems in the Internet of Things---be it local middleware o...
Network measurements are an important tool in understanding the Internet...
Numerous IoT applications, like building automation or process control o...
Secure multiparty computation (SMC) is a promising technology for
privac...
In recent years, secure multiparty computation (SMC) advanced from a
the...
Active Internet measurement studies rely on a list of targets to be scan...
A large user base relies on software updates provided through package
ma...