


default search action
Journal of Network and Systems Management, Volume 27
Volume 27, Number 1, January 2019
- Luciano Paschoal Gaspary:

Message from the New Editor-in-Chief. 1-2 - Anisa Allahdadi

, Ricardo Morla
:
Anomaly Detection and Modeling in 802.11 Wireless Networks. 3-38 - Christos Katris

, Sophia Daskalaki:
Dynamic Bandwidth Allocation for Video Traffic Using FARIMA-Based Forecasting Models. 39-65 - Mukalel Bhaskaran Smithamol

, Rajeswari Sridhar
:
TMM: Trust Management Middleware for Cloud Service Selection by Prioritization. 66-92 - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:

Enhancing the Accuracy of Intrusion Detection Systems by Reducing the Rates of False Positives and False Negatives Through Multi-objective Optimization. 93-120 - Priyanka Das

, Pratyush Nishantkar, Tanmay De:
SECA on MIA-DTN: Tackling the Energy Issue in Monitor Incorporated Adaptive Delay Tolerant Network Using a Simplistic Energy Conscious Approach. 121-148 - JungYul Choi

:
Virtual Machine Placement Algorithm for Energy Saving and Reliability of Servers in Cloud Data Centers. 149-165 - Liudong Zuo

, Michelle M. Zhu, Chia-Han Chang:
Optimizing Trade-Off Between Cost and Performance of Data Transfers Using Bandwidth Reservation in Dedicated Networks. 166-187 - Sandrine Vaton

, Olivier Brun, Maxime Mouchet
, Pablo Belzarena, Isabel Amigo
, Balakrishna J. Prabhu, Thierry Chonavel
:
Joint Minimization of Monitoring Cost and Delay in Overlay Networks: Optimal Policies with a Markovian Approach. 188-232 - Michele Girolami

, Dimitri Belli
, Stefano Chessa
:
Collaborative Service Discovery in Mobile Social Networks. 233-268 - Rafael de Jesus Martins

, Luis Augusto Dias Knob
, Eduardo Germano da Silva, Juliano Araújo Wickboldt
, Alberto E. Schaeffer Filho
, Lisandro Zambenedetti Granville
:
Specialized CSIRT for Incident Response Management in Smart Grids. 269-285 - Acknowledgment to Reviewers. 286-287

Volume 27, Number 2, April 2019
- Hojjat Jahani, Saeed Jalili:

Online Tor Privacy Breach Through Website Fingerprinting Attack. 289-326 - Meenakshi Munjal

, Niraj Pratap Singh:
QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network. 327-350 - Zhengbing Hu

, Vadym E. Mukhin
, Yaroslav Kornaga, Oksana Herasymenko
, Yevgenii Mostoviy:
The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations. 351-365 - Aida A. Nasr

, Nirmeen A. El-Bahnasawy, Gamal Attiya
, Ayman El-Sayed
:
Using the TSP Solution Strategy for Cloudlet Scheduling in Cloud Computing. 366-387 - Rafael Lopes Gomes

, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira
:
FUZA: An Algorithm for Definition of Reliable Virtual Networks to the Edge as a Service Paradigm. 388-408 - Shengli Pan

, Yingjie Zhou, Zhiyong Zhang, Song Yang, Feng Qian, Guangmin Hu:
Identify Congested Links with Network Tomography Under Multipath Routing. 409-429 - Chirihane Gherbi

, Zibouda Aliouat
, Mohamed Benmohammed:
A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks. 430-462 - Wen-Pin Chen, Ang-Hsun Tsai

, Chung-Hsien Tsai
:
Smart Traffic Offloading with Mobile Edge Computing for Disaster-Resilient Communication Networks. 463-488 - Kanwal Mahmud, Muhammad Usman

:
Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review. 489-540 - Myung-Sup Kim, Haruo Oishi, Jiun-Long Huang, Hongtaek Ju, Kiyohito Yoshihara, Chih-Wei Yi

, Taesang Choi:
Managing a World of Things: A Report on APNOMS2017. 541-549
Volume 27, Number 3, July 2019
- Marcelo Frate

, Marcelo K. Marczuk, Fábio Luciano Verdi
:
OrchFlow: An Architecture for Orchestration of Multiple Controllers in OpenFlow Networks. 551-572 - A. Ranjith Kumar, A. Sivagami:

Security Aware Multipath Routing Protocol for WMSNs for Minimizing Effect of Compromising Attacks. 573-599 - Tao Zhang, Qi Liao

:
Dynamic Link Anomaly Analysis for Network Security Management. 600-624 - V. Viji Rajendran

, S. Swamynathan:
SD-CSR: Semantic-Based Distributed Cloud Service Registry in Unstructured P2P Networks for Augmenting Cloud Service Discovery. 625-646 - Abdel-Rahman Hedar

, Rashad Ismail
, Gamal A. El-Sayed
, Khalid M. Jamil Khayyat:
Two Meta-Heuristics Designed to Solve the Minimum Connected Dominating Set Problem for Wireless Networks Design and Management. 647-687 - Elina Pacini

, Lucas Iacono
, Cristian Mateos, Carlos García Garino:
A Bio-inspired Datacenter Selection Scheduler for Federated Clouds and Its Application to Frost Prediction. 688-729 - Adrián Flores De La Cruz

, Pilar Manzanares-Lopez
, Juan Pedro Muñoz-Gea
, Josemaria Malgosa-Sanahuja
:
OpenFlow Compatible Key-Based Routing Protocol: Adapting SDN Networks to Content/Service-Centric Paradigm. 730-755 - Hewei Yu, Biao Zhang:

A Hybrid MADM Algorithm Based on Attribute Weight and Utility Value for Heterogeneous Network Selection. 756-783 - Matias Richart

, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho, Ramón Agüero
:
Slicing in WiFi Networks Through Airtime-Based Resource Allocation. 784-814 - Guoqiang Gao, Ruixuan Li:

Collaborative Caching in P2P Streaming Networks. 815-836
Volume 27, Number 4, October 2019
- Therdpong Daengsi

, Pongpisit Wuttidittachotti
:
QoE Modeling for Voice over IP: Simplified E-model Enhancement Utilizing the Subjective MOS Prediction Model: A Case of G.729 and Thai Users. 837-859 - Xiuchen Qie, Shunfu Jin

, Wuyi Yue:
An Energy-Efficient Strategy for Virtual Machine Allocation over Cloud Data Centers. 860-882 - Fatma M. Talaat

, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
Effective Load Balancing Strategy (ELBS) for Real-Time Fog Computing Environment Using Fuzzy and Probabilistic Neural Networks. 883-929 - Mahdi Nazari Cheraghlou, Ahmad Khademzadeh, Majid Haghparast

:
New Fuzzy-Based Fault Tolerance Evaluation Framework for Cloud Computing. 930-948 - Tomotaka Kimura

, Takaya Suzuki
, Kouji Hirata, Masahiro Muraguchi:
Residual Capacity-Aware Virtual Machine Assignment for Reducing Network Loads in Multi-tenant Data Center Networks. 949-971 - Yonal Kirsal

, Glenford Mapp
, Fragkiskos Sardis:
Using Advanced Handover and Localization Techniques for Maintaining Quality-of-Service of Mobile Users in Heterogeneous Cloud-Based Environment. 972-997 - Roaa Shubbar, Mahmood Ahmadi

:
A Filter-Based Design of Pending Interest Table in Named Data Networking. 998-1019 - Sarra Naoui

, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP. 1020-1042

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














