


default search action
International Journal of Network Management, Volume 26
Volume 26, Number 1, January / February 2016
Editorial
- Oliver Hohlfeld

, Thomas Zinner, Theophilus Benson, David Hausheer
:
Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management. 4-5
- Christian Röpke, Thorsten Holz

:
On network operating system security. 6-24 - Cataldo Basile

, Daniele Canavese
, Antonio Lioy
, Christian Pitscheider, Fulvio Valenza
:
Inter-function anomaly analysis for correct SDN/NFV deployment. 25-43 - Nan Zhang, Maël Kimmerlin, José Costa-Requena, Heikki Hämmäinen:

Cost efficiency of mobile in-network caching. 44-55 - Bram Naudts, Mario Kind, Sofie Verbrugge, Didier Colle, Mario Pickavet

:
How can a mobile service provider reduce costs with software-defined networking? 56-72
Volume 26, Number 2, March / April 2016
- Mario Lemes Proença Jr.

, Gilberto Fernandes Jr.
, Luiz Fernando Carvalho
, Marcos V. O. de Assis, Joel J. P. C. Rodrigues:
Digital signature to help network management using flow analysis. 76-94 - Jun Li, Cuilian Li, Zhaoxi Fang, Haoyun Wang, Yao-hui Wu:

Optimal layer division for low latency in DHT-based hierarchical P2P network. 95-110 - Jian Li, Jae-Hyoung Yoo, James Won-Ki Hong:

Dynamic control plane management for software-defined networks. 111-130 - Gulustan Dogan:

ProTru: a provenance-based trust architecture for wireless sensor networks. 131-151
Volume 26, Number 3, May - June 2016
- Ci-Bin Jiang, I-Hsien Liu

, Yao-Nien Chung, Jung-Shian Li:
Novel intrusion prediction mechanism based on honeypot log similarity. 156-175 - Selcuk Cevher, Mustafa Ulutas

, Ibrahim Hökelek:
Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics. 176-198 - Hela Mliki

, Lamia Chaari
, Lotfi Kamoun, Bernard Cousin:
Performance evaluation of legacy QCN for multicast and multiple unicast traffic transmission. 199-223 - Zhihong Liu, Qi Zhang, Raouf Boutaba, Yaping Liu, Zhenghu Gong:

ROUTE: run-time robust reducer workload estimation for MapReduce. 224-244
Volume 26, Number 4, July / August 2016
- Stefano Petrangeli

, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck
:
Software-defined network-based prioritization to avoid video freezes in HTTP adaptive streaming. 248-268 - Bruno Lopes Dalmazo

, João P. Vilela, Marília Curado
:
Online traffic prediction in the cloud. 269-285 - Xiaohong Huang, Qiong Sun, Maode Ma, Yan Ma:

H-LCFST: a hash lowest cost first search tree for flexible packet classification. 286-307 - Yongna Bian, Bin Liu, Yuefeng Li, Jianmin Gao:

Characterizing network traffic behaviour using granule-based association rule mining. 308-329
Volume 26, Number 5, September / October 2016
Editorial
- Catalin Meirosu

, Kostas Pentikousis, Mario Kind, Alberto Gonzalez Prieto:
Software-defined operations. 334-335
- Ying Wang, Xiao Liu

, Xuesong Qiu, Wenjing Li:
Prediction-based survivable virtual network mapping against disaster failures. 336-354 - Tal Mizrahi

, Yoram Moses:
ReversePTP: A clock synchronization scheme for software-defined networks. 355-372 - Xuxia Zhong, Ying Wang, Xuesong Qiu, Wenjing Li:

FlowVisor-based cost-aware VN embedding in OpenFlow networks. 373-395 - Lefteris Mamatas

, Stuart Clayman, Alex Galis:
A flexible information service for management of virtualized software-defined infrastructures. 396-418
Volume 26, Number 6, November / December 2016
- Huai-Sheng Huang, Shu-Chiung Hu, Po-Han Lee, Yu-Chee Tseng:

An adaptive Paris Metro Pricing scheme for mobile data networks. 422-434 - Igor Duarte Cardoso, João Paulo Barraca

, Carlos Goncalves, Rui L. Aguiar
:
Seamless integration of cloud and fog networks. 435-460 - Qi Liao, Ting Li:

Effective network management via dynamic network anomaly visualization. 461-491 - A. R. Ashok Kumar

, S. V. Rao, Diganta Goswami:
Simple, efficient location-based routing for data center network using IP address hierarchy. 492-514 - Muhammad Nouman Durrani, Feroz Zahid, Jawwad A. Shamsi:

PAVM: a framework for policy-aware virtual machine management. 515-536 - Elena Agostini, Massimo Bernaschi, Massimo Vellucci, Luca Vollero:

OpenCAPWAP v2.0: the new open-source implementation of the CAPWAP protocol. 537-552 - Kamel Karoui

:
Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server. 553-578

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














