Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Network and Systems Management, Volume 32
Volume 32, Number 1, March 2024
- Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment. 1 - Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire:
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory. 2 - Abdelhamid Khiat, Mohamed Haddadi, Nacera Bahnes:
Genetic-Based Algorithm for Task Scheduling in Fog-Cloud Environment. 3 - Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari:
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition. 4 - Sainath Reddy Sankepally, Nishoak Kosaraju, J. L. Shreya, Vishwambhar Reddy, U. Venkanna:
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices. 5 - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostSec: Adaptive Attack Detection for Vehicular Networks. 6 - Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba:
A Novel Light Reflection-Random Walk for Smart Sensors Relocation. 7 - Dongjie Liu, Jong-Hyouk Lee:
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. 8 - Siwapon Charoenchai, Peerapon Siripongwutikorn:
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game. 9 - Hamida Ikhlef, Soumia Bourebia, Ali Melit:
Link State Estimator for VANETs Using Neural Networks. 10 - Yoji Yamato:
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation. 11 - Marco Silva, José Santos, Marília Curado:
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges. 12 - Goldie M. Meitei, Ningrinla Marchang:
Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing. 13 - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou:
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. 14 - Jérôme Lacan, Emmanuel Lochin:
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing. 15 - Kayuã Oleques Paim, Vagner Ereno Quincozes, Diego Kreutz, Rodrigo Brandão Mansilha, Weverton Cordeiro:
Regenerating Networked Systems' Monitoring Traces Using Neural Networks. 16 - Anselme Russel Affane Moundounga, Hassan Satori:
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks. 17 - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis. 18 - Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado:
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. 19 - Yixuan Zhang, Basem Suleiman, Muhammad Johan Alibasa, Farnaz Farid:
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach. 20 - Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. 21 - Abdelaziz Hamdi, Amina Nahali, Rafik Brahem:
Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network. 22 - Yannick Florian Yankam, Vianney Kengne Tchendji, Jean Frédéric Myoupo:
WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks. 23
Volume 32, Number 2, April 2024
- Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li:
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks. 24 - Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa:
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks. 25 - Mradula Sharma, Parmeet Kaur:
Fog-based Federated Time Series Forecasting for IoT Data. 26 - Mathias De Brouwer, Filip De Turck, Femke Ongenae:
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE. 27 - Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya:
Optimizing Completion Time of Requests in Serverless Computing. 28 - Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa:
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. 29 - Sateesh Gorikapudi, Hari Kishan Kondaveeti:
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks. 30 - Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz:
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN. 31 - Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao:
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree. 32 - Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki:
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. 33 - Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari:
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints. 34 - Nathan Harris, Sajad Khorsandroo:
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks. 35 - Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio Oliveira Silva:
Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems. 36 - Siamak Azadiabad, Ferhat Khendek:
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification. 37 - Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings. 38 - Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani:
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment. 39 - Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero:
An Edge Cloud Based Coordination Platform for Multi-user AR Applications. 40 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach. 41 - Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. 42 - Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab:
On Feature Selection Algorithms for Effective Botnet Detection. 43
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.