Internet of Things (IoT) devices are becoming increasingly ubiquitous, e...
Ransomware attacks are among the most severe cyber threats. They have ma...
IPv6 is being more and more adopted, in part to facilitate the millions ...
We present a Federated Learning (FL) based solution for building a
distr...
BGP communities are a popular mechanism used by network operators for tr...
In this paper, we show that adoption of the SNMPv3 network management
pr...
Many network operations, ranging from attack investigation and mitigatio...
BGP communities are widely used to tag prefix aggregates for policy, tra...
Consumer Internet of Things (IoT) devices are extremely popular, providi...
Due to the COVID-19 pandemic, many governments imposed lock downs that f...
Is it possible to patch software bugs in P4 programs without human
invol...
We turn our attention to the elephant in the room of data protection, wh...
Reproducibility is one of the key characteristics of good science, but h...