IEEE/IFIP Network Operations and Management Symposium
20-24 April 2020 // Budapest, Hungary
Management in the Age of Softwarization and Artificial Intelligence


View Presenter Instructions >>

All times listed are in Central European Summer Time (CEST)

Monday, 20 April 2020


MC 1: SDN and NFV - Management Architectures, Design & Orchestration
Room 4, Chair: Luis Miguel Contreras Murillo

Megalos: A Scalable Architecture for the Virtualization of Network Scenarios
Maurizio Patrignani (Roma Tre University), Giuseppe Di Battista (Roma Tre University), Mariano Scazzariello (Roma Tre University), Lorenzo Ariemma (Roma Tre University)

Design and Implementation of an Elastic Monitoring Architecture for Cloud Network Slices
Andre Beltrami Rocha (UFSCAR), Paulo Ditarso Maciel Jr. (IFPB), Francesco Tusa (University College of London), Celso Cesila (UNICAMP), Christian Esteve Rothenberg (University of Campinas - UNICAMP), Rafael Pasquini (Federal University of Uberlândia (UFU)), Fábio Verdi (Universidade Federal de São Carlos)

Unavailability-aware Shared Virtual Backup Allocation Model for Middleboxes
Fujun He (Kyoto University), Eiji Oki (Kyoto University)

Performability Management of Softwarized IP Multimedia Subsystem
Mario Di Mauro (University of Salerno), Giovanni Galatro (University of Salerno), Maurizio Longo (University of Salerno), Fabio Postiglione (University of Salerno), Marco Tambasco (Consortium of Research on Telecommunications)

Simplification of the design, deployment, and testing of 5G vertical services
Mauro Femminella (University of Perugia), Matteo Pergolesi (CNIT), Gianluca Reali (University of Perugia)

Automated optimal firewall orchestration and configuration in virtualized networks
Daniele Bringhenti (Politecnico di Torino), Guido Marchetto (Politecnico di Torino), Riccardo Sisto (Politecnico di Torino), Fulvio Valenza (Politecnico di Torino), Jalolliddin Yusupov (Politecnico di Torino)



MC 3: Industry 14.0 / NOM - Monitoring & I4.0
Room 5, Chair: Francesco Tusa

ElasticSDK: A Monitoring Software Development Kit for enabling Data-driven Management and Control in 5G
Xenofon Vasilakos (EURECOM), Berkay Koksal (EURECOM), Dwi Hartati Izaldi (URECOM, France), Navid Nikaein (Eurecom), Robert Schmidt (EURECOM), Nasim Ferdosian (EURECOM, France), Riri Fitri Sari (University of Indonesia), Ray-Guang Cheng (National Taiwan University of Science and Technology)

On the Impact of Flow Monitoring Configuration
Petr Velan (Masaryk University), Tomas Jirsik (Masaryk University)

The rise of eBPF for non-intrusive performance monitoring
Cyril Cassagnes (University of Luxembourg), Lucian Trestioreanu (University of Luxembourg), Clément Joly (University of Luxembourg), Radu State (University of Luxembourg)

Data Quality Maximization for Mobile Crowdsensing
Cheng Zhang (Waseda University), Noriaki Kamiyama (Fukuoka University)

Impact of False Data Injection Attacks on Deep Learning Enabled Predictive Analytics
Gautam Raj Mode (University of Missouri-Columbia), Prasad Calyam (University of Missouri-Columbia), Khaza Anuarul Hoque (University of Missouri-Columbia)



MC 2: SDN and NFV - Resource & Slice Management
Room 4, Chair: Didier Colle

End-to-End Mobile Network Slice Embedding Leveraging Edge Computing
Andrea Fendt (University of Augsburg), Christian Mannweiler (Nokia Bell Labs), Katja Ludwig (University of Augsburg), Lars Christoph Schmelz (Nokia Bell Labs), Bernhard Bauer (University of Augsburg)

Joint Resource and Admission Management for Slice-enabled Networks
Sina Ebrahimi (Tarbiat Modares University), Abulfazl Zakeri (Tarbiat Modares University), Behzad Akbari (University of Tarbiat Modares), Nader Mokari (Electrical and Computer Engineering Tarbiat Modares University)

Delay-Aware NFV Resource Allocation with Deep Reinforment Learning
Ningcheng Yuan (Beijing University of Posts and Telecommunications), Wenchen He (Beijing University of Posts and Telecommunications, Beijing, China), Jing Shen (State Grid Henan Electric Power Company Information & Telecommunication Company), Xuesong Qiu (Beijing University of Posts and Telecommunications), Shaoyong Guo (Beijing University of Posts and Telecommunications), Wenjing Li (Beijing University of Posts and Telecommunication)

Enabling Enhanced Elasticity Control Functions to Cloud-Network Slice-Defined Domains
Alisson Medeiros (Universidade Federal do Rio Grande do Norte), Augusto Neto (Universidade Federal do Rio Grande do Norte - UFRN), Silvio Costa Sampaio (Federal University of Rio Grande do Norte (UFRN)), Rafael Pasquini (Federal University of Uberlândia (UFU)), Javier Baliosian (Universitat Politècnica de Catalunya)



MC 4: Network Operations, Management Approaches & Techniques
Room 5, Chair: Javier Baliosian

Matching Theory Application for Efficient Allocation of Indivisible Testbed Resources
Donatos Stavropoulos (University of Thessaly), Vasileios Miliotis (University of Thessaly), Thanasis Korakis (University of Thessaly), Leandros Tassiulas (Yale University)

Scalable Traffic Engineering for Higher Throughput in Heavily-loaded Software Defined Networks
Che Zhang (Southern University of Science and Technology), Shiwei Zhang (Southern University of Science and Technology), Yi Wang (Southern University of Science and Technology), Weichao Li (Southern University of Science and Technology), Bo Jin (Southern University of Science and Technology), Ka Pui Mok (CAIDA/UCSD), Qing Li (Southern University of Science and Technology), Hong Xu (City University of Hong Kong)

A Service Migration Method Based on Dynamic Awareness in Mobile Edge Computing
Menglei Zhang (BEIJING UNIVERSITY OF POST AND TELECOM), Haoqiu Huang (China Aerospace Science and Industry Corporation Limited Network Information Department), LanLan Rui (Beijing University of Posts and Telecommunications), Guo Hui (Beijing University of Posts and Telecommunications), Ying Wang (Beijing University of Posts and Telecommunications), Xuesong Qiu (Beijing University of Posts and Telecommunications)

LoCHiP: A Distributed Collaborative Cache Management Scheme at the Network Edge
Junaid Khan (NYU), Cedric Westphal (UCSC), J.J. Garcia-Luna-Aceves (University of California at Santa Cruz), Yacine Ghamri-Doudane (University of La Rochelle)


Friday, 24 April 2020


MC 5: AI & ML Techniques for Network Management
Room 3, Chair: Peter Orosz

Modelling Mobile Traffic Patterns Using A Generative Adversarial Neural Networks
Bo Ma (The University of Sheffield)

Deep Clustering of Mobile Network Data with Sparse Autoencoders
Marton Kajo (Technical University of Munich), Benedek Schultz (Nokia Bell Labs), Georg Carle (Technical University of Munich)

Exploiting Case Based Reasoning to Automate Management of Network Slices
Pedro Martinez-Julia (National Institute of Information and Communications Technology (NICT)), Ved Kafle (NICT), Hitoshi Asaeda (National Institute of Information and Communications Technology), Jose Ordonez-Lucena (Telefonica I+D), Diego Lopez (Telefonica I+D)

Recovery command generation towards automatic recovery in ICT systems by Seq2Seq learning
Hiroki Ikeuchi (NTT Corporation), Akio Watanabe (NTT), Tsutomu Hirao (NTT), Makoto Morishita (NTT), Masaaki Nishino (NTT), Yoichi Matsuo (NTT corporation), Keishiro Watanabe (NTT)

Reinforcing Cloud Environments via Index Policy for Bursty Workloads
Venkatraman Balasubramanian (Arizona State University), Moayad Aloqaily (Gnowit Inc., Ottawa), ZHENGYU YANG (NORTHEASTERN UNIVERSITY), Martin Reisslein (Arizona State University), Olufogorehan Tunde-Onadele (North Carolina State University)

Edge Concierge: Democratizing Cost-Effective and Flexible Network Operations using Network Layer AI at Private Network Edge
Anan Sawabe (NEC Corporation), Takanori Iwai (NEC), Kozo Satoda (NEC Corporation), Akihiro Nakao (The University of Tokyo)



MC 6: AI & ML Techniques for Security
Room 3, Chair: Rolland Vida

BotFP: FingerPrints Clustering for Bot Detection
Agathe Blaise (LIP6, UPMC / Thales), Mathieu Bouet (Université Pierre et Marie Curie (UPMC)), Vania Conan (Thales), Stefano Secci (Cnam)

Anomaly prediction in mobile networks : A data driven approach for machine learning algorithm selection
Imed Hadj-Kacem (Orange Labs.), Sana Ben Jemaa (Orange Labs), Sylvain Allio (Orange Labs.), Yosra Ben Slimen (Orange Labs)

Unsupervised Detection of Anomalous Behavior in Wireless Devices based on Auto-Encoders
Abdurhman Albasir (University of Waterloo)

A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning
Nadia Chaabouni (University of Bordeaux), Mohamed Mosbah (LaBRI-University of Bordeaux1)



MC 7: Network Operations, Management - Security Management
Room 3, Chair: Tiago Cruz

A Proactive Cache Privacy Attack on CCN
Alberto Compagno (Cisco Systems), Mauro Conti (University of Padova), Eleonora Losiouk (University of Padova), Gene Tsudik (UC Irvine), Sebastiano Valle (University of Padova)

Industrial Grade Methodology for Firewall Simulation and Requirements Verification
Ramon Barakat (Fraunhofer FOKUS), Faruk Catal (Fraunhofer FOKUS), Nikolay Tcholtchev (FOKUS Fraunhofer Institute for Open Communication Systems), Yacine Rebahi (Fraunhofer Fokus), Ina Schieferdecker (Fraunhofer FOKUS)

Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks
Gi Kim (Perspecta Labs), Constantin Serban (Perspecta Labs), Ritu Chadha (Perspecta Labs)

Presenter Instructions

As you are already aware, the Covid-19 pandemic has forced the NOMS 2020 conference to go online - as such, there was the need to adjust the conference session formats in order to make them compatible with an online synchronous event. Naturally, technical sessions were not exempt from this.

You are asked to get prepared to do you presentation via Webex Events, which is available on all major computer platforms and in browser, as well.

Please prepare with a 16:9 sized presentation format either in pdf or ppt(x) that you can share from your computer.

Dedicated Webex Events sessions will be assigned to the technical sessions, where you can share your screen and give a live talk together with camera feed. You will have a 20 minute long slot altogether, including take over the screen, give the talk and give room for the questions (to be collected in the chat field of Webex Events). Hence, the maximum length of the presentation 15 minutes, please do not exceed that. The presenter must be available on-line for take the questions and answer them part of the slot, even if the presentation is pre-recorded. Each session will have a chair as usual, who will give the control to the actual presenter.

A guided test session will be provided where you can check your presentation.

While we all prefer live presentation (even if on-line), it is wise to have a plan B for unexpected situations. As a best practice we suggest all authors to prepare a pre-recorded video of their presentation (e.g., ppt with voice-over, or even more elaborated video styles; uploaded as a hidden YouTube video). Even if we use a pre-recorded video, the author has to be there for the Q & A session, otherwise the paper cannot make it into the proceedings and IEEExplore.

Please upload your presentation material (pdf/ppt or video, even a zip file) to JEMS latest after your presentation. A dedicated upload possibility is opened for that case.

More technical details should come, they will available at

Don’t hesitate to contact the chairs, in case you have any doubts.

Best Regards,
--NOMS 2020 TPC Chairs