Intent-based end-to-end network service orchestration system for multi-platforms

A Rafiq, A Mehmood, T Ahmed Khan, K Abbas, M Afaq… - Sustainability, 2020 - mdpi.com
… Authors have reported various techniques related to the policies of schedule MANO VNF in
… of vSPGW-C is to manage the session between the core network, access network, and data …

Authentication protocol for an IoT-enabled LTE network

N Saxena, S Grijalva, NS Chaudhari - ACM Transactions on Internet …, 2016 - dl.acm.org
… In realistic scenarios, the entity’s … the session key KASME at the UE in the LTE network,
which is also securely received by an honest serving MME network from the home HSS network. …

A deep joint network for session-based news recommendations with contextual augmentation

L Zhang, P Liu, JA Gulla - Proceedings of the 29th on Hypertext and …, 2018 - dl.acm.org
… For example, large publishers release hundreds of … network (CNN) is exploited to consider
item IDs and all content features including hierarchical categories, keywords and entities as …

Dynamic multi-connectivity performance in ultra-dense urban mmWave deployments

V Petrov, D Solomitckii, A Samuylov… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
… multi-connectivity network behavior to preserve sessionsystem framework with multiple
arrival processes that models different session types, multiple service entities each associated

A software deep packet inspection system for network traffic analysis and anomaly detection

W Song, M Beshley, K Przystupa, H Beshley, O Kochan… - Sensors, 2020 - mdpi.com
… the network (trunk links and connections to higher networks) … This technique assumes that
there are two classes of entities … traffic, which allowed releasing the system throughput and …

Achieving end-to-end reliability of mission-critical traffic in softwarized 5G networks

V Petrov, MA Lema, M Gapeyenko… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… to model the process of critical session transfers in a softwarized 5G access network, and the
… This information is to be used at the session departure time to release resources. When the …

X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory

F Moriconi, O Levillain, A Francillon… - Proceedings of the 19th …, 2024 - dl.acm.org
process is released (ie, SIGCONT). We only dump writable memory regions as TLS … network
packet to its originating process and to trigger memory snapshots before and after session

Self-supervised graph co-training for session-based recommendation

X Xia, H Yin, J Yu, Y Shao, L Cui - Proceedings of the 30th ACM …, 2021 - dl.acm.org
… ] dynamically constructs session-educed graphs and employs self-attention networks on the
… leverage informative self-supervision signals from other entities. In this paper, we design a …

Public diplomacy networks: China's public diplomacy communication practices in twitter during Two Sessions

R Jia, W Li - Public Relations Review, 2020 - Elsevier
… of communication and persuasion by a political entity charged with the cultivation of nation
… Firstly, a proportional sampling of the tweets released by each participant was conducted to …

Autonomic security for zero trust networks

D Eidle, SY Ni, C DeCusatis… - 2017 IEEE 8th Annual …, 2017 - ieeexplore.ieee.org
… of whether such entities are inside or outside a secure network. This approach is based …
release 3.1 [9]. Explicit trust is established by generating a network identity token during session