


default search action
Journal of Network and Systems Management, Volume 30
Volume 30, Number 1, January 2022
- Hemanth Kumar Ravuri
, Maria Torres Vega
, Jeroen van der Hooft, Tim Wauters, Filip De Turck:
A Scalable Hierarchically Distributed Architecture for Next-Generation Applications. 1 - Deva Priya Isravel
, Salaja Silas
, Elijah Blessing Rajsingh
:
Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN. 2 - Matheus Torquato
, Paulo R. M. Maciel, Marco Vieira
:
Model-Based Performability and Dependability Evaluation of a System with VM Migration as Rejuvenation in the Presence of Bursty Workloads. 3 - Guto Leoni Santos
, Diego de Freitas Bezerra
, Élisson da Silva Rocha
, Leylane Ferreira
, André Luis Cavalcanti Moreira
, Glauco Estácio Gonçalves
, Maria Valéria Marquezini
, Ákos Recse, Amardeep Mehta
, Judith Kelner
, Djamel Sadok
, Patricia Takako Endo
:
Service Function Chain Placement in Distributed Scenarios: A Systematic Review. 4 - Abolfazl Ghazizadeh, Behzad Akbari, Mohammad Mahdi Tajiki:
Joint Reliability-Aware and Cost Efficient Path AllocationFig and VNF Placement using Sharing Scheme. 5 - Joy Halder
, Tamaghna Acharya, Uma Bhattacharya:
On Crosstalk Aware Energy and Spectrum Efficient Survivable RSCA Scheme in Offline SDM-EON. 6 - José María Jorquera Valero
, Pedro Miguel Sánchez Sánchez
, Alexios Lekidis
, Javier Fernandez Hidalgo, Manuel Gil Pérez
, Muhammad Shuaib Siddiqui
, Alberto Huertas Celdrán
, Gregorio Martínez Pérez
:
Design of a Security and Trust Framework for 5G Multi-domain Scenarios. 7 - Stefanos Tsimenidis, Thomas Lagkas
, Konstantinos Rantos
:
Deep Learning in IoT Intrusion Detection. 8 - P. R. Vishnu, P. Vinod, Suleiman Y. Yerima
:
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network. 9 - Samaneh Mahdavifar, Fatemeh Deldar
, Hassan Mahdikhani:
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points. 10 - Farouq Aliyu
, Tarek R. Sheltami, Mohamed Deriche, Nidal Nasser
:
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing. 11 - Miel Verkerken
, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques. 12 - Sanjay Murmu, Harsh Kasyap
, Somanath Tripathy:
PassMon: A Technique for Password Generation and Strength Estimation. 13 - Parvinder Singh
, Rajeshwar Singh:
Energy-Efficient Delay-Aware Task Offloading in Fog-Cloud Computing System for IoT Sensor Applications. 14 - Rabah Rahal
, Abdelaziz Amara Korba, Nacira Ghoualmi-Zine
, Yacine Challal
, Yacine Ghamri-Doudane:
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks. 15 - Jiawei Huang, Zhuoran Liu, Jingling Liu
, Weihe Li, Qichen Su
, Jianxin Wang:
Achieving High Utilization by Elastic Chunk Scheduling in DASH Systems. 16 - Mahsa Moradi, Mahmood Ahmadi
, Rojia Nikbazm:
Comparison of Machine Learning Techniques for VNF Resource Requirements Prediction in NFV. 17 - Murad Abusubaih
:
Intelligent Wireless Networks: Challenges and Future Research Topics. 18 - Sisay Tadesse Arzo
, Domenico Scotece
, Riccardo Bassoli
, Daniel Barattini, Fabrizio Granelli, Luca Foschini
, Frank H. P. Fitzek
:
MSN: A Playground Framework for Design and Evaluation of MicroServices-Based sdN Controller. 19 - Muhammad Umar Farooq, Muhammad Zeeshan
, Muhammad Talha Jahangir, Muhammad Asif:
A Novel Cooperative Micro-Caching Algorithm Based on Fuzzy Inference Through NFV in Ultra-Dense IoT Networks. 20 - Francesco Musumeci
, Ali Can Fidanci, Francesco Paolucci
, Filippo Cugini, Massimo Tornatore:
Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks. 21 - Samaneh Mahdavifar
, Dima Alhadidi, Ali A. Ghorbani:
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder. 22 - Tarik Moufakir, Mohamed Faten Zhani
, Abdelouahed Gherbi, Ouns Bouachir:
Collaborative Multi-domain Routing in SDN Environments. 23
Volume 30, Number 2, April 2022
- Javier Pastor-Galindo
, Gabriel López Millán, Rafael Marín López, Fernando Pereñíguez-Garcia
, Óscar Cánovas:
A Framework for Dynamic Configuration of TLS Connections Based on Standards. 24 - Saadat Izadi, Mahmood Ahmadi
, Amir Rajabzadeh:
Network Traffic Classification Using Deep Learning Networks and Bayesian Data Fusion. 25 - Godfrey A. Mills
, Pamela Pomary, Emmanuel Togo, Robert A. Sowah:
Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa. 26 - Abolfazl Ghazizadeh, Behzad Akbari, Mohammad Mahdi Tajiki:
Correction to: Joint Reliability-Aware and Cost Efficient Path Allocation and VNF Placement using Sharing Scheme. 27 - Hong-Wei Li, Yu-Sung Wu
, Yennun Huang:
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events. 28 - Sulaiman Khan
, Suleman Khan, Yasir Ali, Muhammad Khalid
, Zahid Ullah, Shahid Mumtaz:
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. 29 - Teodor Malbasic
, Petar D. Bojovic
, Zivko Bojovic
, Jelena Suh
, Dusan Vujosevic
:
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme. 30 - Engin Zeydan
, Yekta Turk, Baris Berk Zorba:
Enhancing the Capabilities of Mobile Backhaul: A User Plane Perspective. 31 - Engin Zeydan
, Josep Mangues-Bafalluy, Jorge Baranda, Ricardo Martínez
, Luca Vettori
:
A Multi-criteria Decision Making Approach for Scaling and Placement of Virtual Network Functions. 32 - Ensar Zeljkovic
, Dimitris Gogos, Gerwin Dox, Steven Latré, Johann M. Márquez-Barja
:
ALPACA: A PCI Assignment Algorithm Taking Advantage of Weighted ANR. 33 - André Luiz Beltrami Rocha
, Celso Henrique Cesila, Paulo Ditarso Maciel
, Sand Luz Correa, Javier Rubio-Loyola
, Christian Esteve Rothenberg
, Fábio Luciano Verdi
:
CNS-AOM: Design, Implementation and Integration of an Architecture for Orchestration and Management of Cloud-Network Slices. 34 - Dener Silva
, Alexandre Heideker
, Ivan D. Zyrianoff
, João H. Kleinschmidt
, Luca Roffia, Juha-Pekka Soininen, Carlos Alberto Kamienski
:
A Management Architecture for IoT Smart Solutions: Design and Implementation. 35 - Shunsuke Kanai
, Fumika Asai, Kazuaki Akashi, Norio Yamamoto, Kenichi Tayama, Tomoko Shibata:
An Algorithm to Speed up Network Recovery Fault Point Estimation and Recovery Action Recommendation. 36
Volume 30, Number 3, July 2022
- Shankar K. Ghosh
, Sasthi C. Ghosh:
A Blackout Aware Handover Mechanism for Ultra Dense Networks. 37 - Leandro Ordoñez-Ante
, Jeroen van der Hooft, Tim Wauters, Gregory van Seghbroeck
, Bruno Volckaert, Filip De Turck:
Explora-VR: Content Prefetching for Tile-Based Immersive Video Streaming Applications. 38 - Moayad Aloqaily, Salil S. Kanhere, Paolo Bellavista
, Michele Nogueira:
Special Issue on Cybersecurity Management in the Era of AI. 39 - Touraj Sattari Naseri, Farhad Soleimanian Gharehchopogh
:
A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems. 40 - Parnika Kansal
, M. Gangadharappa, Ashwni Kumar:
Long Boosted Memory Algorithm for Intelligent Spectrum Sensing in 5G and Beyond Systems. 41 - Wided Khemili, Jalel Eddine Hajlaoui, Mohamed Nazih Omri:
Energy Aware Fuzzy Approach for VNF Placement and Consolidation in Cloud Data Centers. 42 - José Jurandir Alves Esteves
, Amina Boubendir, Fabrice Guillemin
, Pierre Sens:
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement. 43 - Mohaddeseh Shahhosseini, Hoda Mashayekhi
, Mohsen Rezvani:
A Deep Learning Approach for Botnet Detection Using Raw Network Traffic Data. 44 - Mengyang He, Lei Zhuang, Sijin Yang, Zexi Xu, Wencui Li, Jizhao Lu:
An Energy-Efficient VNE Algorithm Based on Bidirectional Long Short-Term Memory. 45 - Nathan Franklin Saraiva de Sousa
, Md. Tariqul Islam, Raza Ul-Mustafa
, Danny Alex Lachos Perez, Christian Esteve Rothenberg, Pedro Henrique Gomes:
Machine Learning-Assisted Closed-Control Loops for Beyond 5G Multi-Domain Zero-Touch Networks. 46 - Natesha B. V.
, Ram Mohana Reddy Guddeti:
Meta-heuristic Based Hybrid Service Placement Strategies for Two-Level Fog Computing Architecture. 47 - Arman Mahmoudi, Mahmood Ahmadi
:
2DNCF-PIT: Two-Dimensional Neighbor-Based Cuckoo Filter for Pending Interest Table Lookup in Named Data Networking. 48 - Guoyan Li
, Wentao Cui, Shudong Liu
, Weifeng Zhao:
A Load Balancing Strategy Based on Fuzzy Satisfaction Among Multiple Controllers in Software-Defined Networking. 49 - Maliha Safdar, Yawar Abbas, Waseem Iqbal
, Mir Yasir Umair, Abdul Wakeel:
ARP Overhead Reduction Framework for Software Defined Data Centers. 50 - Nasrin Firouz, Mohammad Masdari, Amin Babazadeh Sangar
, Kambiz Majidzadeh:
A Hybrid Multi-objective Algorithm for Imbalanced Controller Placement in Software-Defined Networks. 51 - Andrews A. Okine
, Xu Bao, Janice Mongoungou, Winfred Adjardjah, Wence Zhang:
A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks. 52
Volume 30, Number 4, October 2022
- Jean-Philippe Eisenbarth
, Thibault Cholez
, Olivier Perrin:
Ethereum's Peer-to-Peer Network Monitoring and Sybil Attack Prevention. 1-26 - Badr Bellaj, Aafaf Ouaddah
, Emmanuel Bertin, Noël Crespi, Abdellatif Mezrioui, Khalid Bellaj:
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing. 1-31 - Filippo Poltronieri
, Cesare Stefanelli, Niranjan Suri, Mauro Tortonesi
:
Value is King: The MECForge Deep Reinforcement Learning Solution for Resource Management in 5G and Beyond. 1-35 - Sina Rafati Niya
, Simon Bachmann, Claudio Brasser, Michael Bucher, Nicolas Spielmann, Burkhard Stiller:
DeTi: A Decentralized Ticketing Management Platform. 1-40 - Bidisha Goswami
, Hiten Choudhury
:
A Blockchain-Based Authentication Scheme for 5G-Enabled IoT. 1-33 - Ruilin Wang, Xin Wang
, Ping Xie, Muhua Liu, Xuhui Zhao, Mingchuan Zhang:
DSEA: A Traffic Control Method of Information Center Networking Based on Multi-objective Genetic Algorithms. 1-27 - Mohamed Mohamadi
, Badis Djamaa
, Mustapha Réda Senouci, Yacine Grine, Riad Laribi:
An Effective Channel Selection Solution for Reliable Scheduling in Industrial IoT Networks. 1-33 - Hongtai Liu, Shengduo Ding, Shunyi Wang, Gang Zhao, Chao Wang
:
Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning. 1-25 - Weihong Yang, Yang Qin
, Yuanyuan Yang, Xiaoxiong Zhong:
Leveraging Multi-rate Multicast for Content Caching and Transmission Rate Allocation in Cache-Enabled Networks. 1-32 - Seyed Nima Khezr
, Abdulsalam Yassine, Rachid Benlamri:
Towards a Trustful Game-Theoretic Mechanism for Data Trading in the Blockchain-IoT Ecosystem. 1-33 - Prashanth Podili
, Sumanth Reddy Cherupally, Srinivas Boga, Kotaro Kataoka:
Inter-Domain Prefix and Route Validation Using Fast and Scalable DAG Based Distributed Ledger for Secure BGP Routing. 1-35 - Abdelaziz Said Abohamama, Amir El-Ghamry, Eslam Hamouda
:
Real-Time Task Scheduling Algorithm for IoT-Based Applications in the Cloud-Fog Environment. 1-35 - Reiner H. Santos Filho, Tadeu N. Ferreira, Diogo M. F. Mattos, Dianne S. V. Medeiros
:
An Efficient and Decentralized Fuzzy Reinforcement Learning Bandwidth Controller for Multitenant Data Centers. 1-24 - Afonso Oliveira
, Teresa Vazão
:
Flexible RAN Slicing for Mobile Wireless Networks. 66 - Lal Pratap Verma, Varun Kumar Sharma, Mahesh Kumar, Dimitris Kanellopoulos, Aniket Mahanti
:
DB-CMT: A New Concurrent Multi-path Stream Control Transport Protocol. 67 - Haneul Ko, Jaewook Lee, Sangheon Pack
:
PDRAS: Priority-Based Dynamic Resource Allocation Scheme in 5G Network Slicing. 68 - Gustavo V. Maia, Thiago M. Coutinho
, Eduardo B. Gonçalves, Gustavo Rodrigues Lacerda Silva
, Eduardo M. A. M. Mendes, Marcelo M. A. M. Mendes, Sandro R. Caetano, Gustavo M. Mitt, Antônio P. Braga:
One Class Density Estimation Approach for Fault Detection and Rootcause Analysis in Computer Networks. 69 - Kemal Cagri Serdaroglu
, Baris Inanç, Sebnem Baydere:
Effect of Messaging Model on the Reliable Data Transfer Latency in a Fog System. 70 - Vincent Angilella, Filip Krasniqi, Paolo Medagliani, Sébastien Martin
, Jérémie Leguay, Shoushou Ren, Xuan Liu:
High Capacity and Resilient Large-Scale Deterministic IP Networks. 71 - Muhammad Asif Khan
, Ridha Hamila, Adel Gastli, Serkan Kiranyaz, Nasser Ahmed Al-Emadi:
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks. 72 - Anichur Rahman
, Antonio Montieri
, Dipanjali Kundu, Md. Razaul Karim, Md. Jahidul Islam, Sara Umme
, Alfredo Nascita, Antonio Pescapè:
On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives. 73 - Filip Rezabek
, Marcin Bosk
, Thomas Paul, Kilian Holzinger, Sebastian Gallenmüller
, Angela Gonzalez Mariño
, Abdoul Kane, Francesc Fons, Haigang Zhang, Georg Carle, Jörg Ott:
EnGINE: Flexible Research Infrastructure for Reliable and Scalable Time Sensitive Networks. 74 - Pablo Salva-Garcia
, Ruben Ricart-Sanchez, Enrique Chirivella-Perez, Qi Wang, José M. Alcaraz-Calero
:
XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks. 75 - Miklós Máté
, Csaba Simon, Markosz Maliosz
:
Asynchronous Time-Aware Shaper for Time-Sensitive Networking. 76

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.