


default search action
IEEE Transactions on Network and Service Management, Volume 19
Volume 19, Number 1, March 2022
- Hanan Lutfiyya:
2021 Reviewers for IEEE Transactions on Network and Service Management (TNSM). 3-18 - Ricardo Misael Ayala Molina
, Sadegh Torabi
, Khaled Sarieddine, Elias Bou-Harb
, Nizar Bouguila
, Chadi Assi
:
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. 19-36 - Omran Ayoub
, Andrea Bovio, Francesco Musumeci
, Massimo Tornatore
:
Survivable Virtual Network Mapping With Fiber Tree Establishment in Filterless Optical Networks. 37-48 - Anubhab Banerjee
, Stephen S. Mwanje
, Georg Carle
:
Toward Control and Coordination in Cognitive Autonomous Networks. 49-60 - Mani Shekhar Gupta
, Krishan Kumar
:
AFSOS: An Auction Framework and Stackelberg Game Oriented Optimal Network's Resource Selection Technique in Cognitive Radio Networks. 61-72 - Tianpeng Ye
, Gaolei Li
, Ijaz Ahmad
, Chaofeng Zhang
, Xiang Lin, Jianhua Li:
FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection. 73-88 - Xingyu Lu
, Jun Liu
, Shengli Gan, Tun Li, Yunpeng Xiao
, Yanbing Liu
:
Recommendation Model Based on Dynamic Interest Group Identification and Data Compensation. 89-99 - Hiroshi Saito
:
Theoretical Design of Geographical Route of Communications Cable Network Supplied by Power Grid to Minimize Disaster Damage. 100-111 - Zelin Wan
, Jin-Hee Cho
, Mu Zhu
, Ahmed H. Anwar
, Charles A. Kamhoua
, Munindar P. Singh
:
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. 112-129 - Chengyu Wang
, Kui Wu
, Tongqing Zhou
, Guang Yu
, Zhiping Cai
:
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection. 130-145 - Yatong Wang
, Shuang Qin, Gang Feng
, Jianhong Zhou
, Fengsheng Wei
:
GAN-Based Pareto Optimization for Self-Healing of Radio Access Network Slices. 146-157 - Johannes Zerwas
, Ingmar Poese, Stefan Schmid
, Andreas Blenk
:
On the Benefits of Joint Optimization of Reconfigurable CDN-ISP Infrastructure. 158-173 - Mohd Sameen Chishti
, Farhan Sufyan
, Amit Banerjee
:
Decentralized On-Chain Data Access via Smart Contracts in Ethereum Blockchain. 174-187 - Guobiao He
, Wei Su
, Shuai Gao, Ningchun Liu
, Sajal K. Das
:
NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture. 188-202 - Suhan Jiang
, Jie Wu
:
A Blockchain-Powered Data Market for Multi-User Cooperative Search. 203-215 - Gordon Owusu Boateng
, Daniel Ayepah-Mensah
, Daniel Mawunyo Doe
, Abegaz Mohammed Seid
, Guolin Sun
, Guisong Liu
:
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G. 216-227 - Roman-Valentyn Tkachuk
, Dragos Ilie
, Kurt Tutschku
, Remi Robert
:
A Survey on Blockchain-Based Telecommunication Services Marketplaces. 228-255 - Hao Feng
, Yuhui Deng
, Yi Zhou
, Geyong Min
:
Towards Heat-Recirculation-Aware Virtual Machine Placement in Data Centers. 256-270 - Ke Gu
, Wenbin Zhang, Xiong Li
, Weijia Jia:
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. 271-288 - Hongchang Ke
, Hui Wang
, Weijia Sun
, Hongbin Sun:
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks. 289-305 - Giovanni Perin
, Michele Berno, Tomaso Erseghe
, Michele Rossi:
Towards Sustainable Edge Computing Through Renewable Energy Resources and Online, Distributed and Predictive Scheduling. 306-321 - Walter Cerroni
, Luca Foschini
, Genady Ya. Grabarnik, Filippo Poltronieri
, Larisa Shwartz
, Cesare Stefanelli
, Mauro Tortonesi
:
BDMaaS+: Business-Driven and Simulation-Based Optimization of IT Services in the Hybrid Cloud. 322-337 - Nannan Zhang
, Wei Wang
, Pan Zhou
, Aiping Huang
:
Delay-Optimal Edge Caching With Imperfect Content Fetching via Stochastic Learning. 338-352 - Bowen Bao
, Hui Yang
, Qiuyan Yao
, Ao Yu
, Bijoy Chand Chatterjee
, Eiji Oki
, Jie Zhang:
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks. 353-365 - Mah-Rukh Fida
, Andrés F. Ocampo, Ahmed Elmokashfi
:
Measuring and Localising Congestion in Mobile Broadband Networks. 366-380 - Naser Hossein Motlagh
, Shubham Kapoor, Rola Alhalaseh
, Sasu Tarkoma
, Kimmo Hätönen:
Quality of Monitoring for Cellular Networks. 381-391 - Ahan Kak
, Ian F. Akyildiz
:
Towards Automatic Network Slicing for the Internet of Space Things. 392-412 - Mohamed Mekki
, Sagar Arora
, Adlen Ksentini
:
A Scalable Monitoring Framework for Network Slicing in 5G and Beyond Mobile Networks. 413-423 - Ghasem Mirjalily
, Mina Asgarian
, Zhi-Quan Luo
:
Interference-Aware NFV-Enabled Multicast Service in Resource-Constrained Wireless Mesh Networks. 424-436 - Amirhossein Shaghaghi
, Abolfazl Zakeri
, Nader Mokari
, Mohammad Reza Javan
, Mohammad Behdadfar, Eduard A. Jorswieck
:
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach. 437-451 - Mengfei Zhu
, Fujun He
, Eiji Oki
:
Optimization Model for Primary and Backup Resource Allocation With Workload-Dependent Failure Probability. 452-471 - Rami Akrem Addad
, Diego Leonel Cadette Dutra
, Tarik Taleb
, Hannu Flinck
:
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks. 472-484 - João Victor Guimarães de Oliveira
, Pedro Clemente Pereira Bellotti
, Roberto Massi de Oliveira
, Alex Borges Vieira
, Luciano Jerez Chaves
:
Virtualizing Packet-Processing Network Functions Over Heterogeneous OpenFlow Switches. 485-496 - Matheus S. Castanho
, Cristina K. Dominicini
, Magnos Martinello
, Marcos A. M. Vieira
:
Chaining-Box: A Transparent Service Function Chaining Architecture Leveraging BPF. 497-509 - Pragati Shrivastava
, Kotaro Kataoka
:
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks. 510-523 - Yanghao Xie
, Lin Huang, Yuyang Kong, Sheng Wang
, Shizhong Xu, Xiong Wang
, Jing Ren:
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method. 524-537 - Cenk Gündogan
, Christian Amsüss
, Thomas C. Schmidt
, Matthias Wählisch
:
Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions. 538-553 - I. R. Divyasree, K. Selvamani:
DAD: Domain Adversarial Defense System Against DDoS Attacks in Cloud. 554-568 - Xiaoyan Zhang, Shunrong Jiang
, Yiliang Liu
, Tao Jiang
, Yong Zhou
:
Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain. 569-581 - Ryan Mills
, Angelos K. Marnerides
, Matthew Broadbent
, Nicholas J. P. Race
:
Practical Intrusion Detection of Emerging Threats. 582-600 - Bruno Henrique Schwengber, Andressa Vergütz, Nelson G. Prates, Michele Nogueira
:
Learning From Network Data Changes for Unsupervised Botnet Detection. 601-613 - Silvio Ereno Quincozes
, Daniel Mossé, Diego G. Passos
, Célio Vinicius N. de Albuquerque
, Luiz Satoru Ochi
, Vinícius Figueiredo dos Santos:
On the Performance of GRASP-Based Feature Selection for CPS Intrusion Detection. 614-626 - Mohammad A. Salahuddin
, Vahid Pourahmadi
, Hyame Assem Alameddine
, Md. Faizul Bari
, Raouf Boutaba
:
Chronos: DDoS Attack Detection Using Time-Based Autoencoder. 627-641 - Darshana Upadhyay
, Marzia Zaman
, Rohit Joshi
, Srinivas Sampalli
:
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems. 642-660 - Akbar Telikani
, Amir H. Gandomi
, Kim-Kwang Raymond Choo
, Jun Shen
:
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification. 661-670 - Zhijun Wu
, Pan Gao
, Lei Cui
, Jiusheng Chen
:
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection. 671-685 - Li Yang
, Abdallah Moubayed
, Abdallah Shami
, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. 686-705 - Qisheng Zhang
, Abdullah Zubair Mohammed, Zelin Wan
, Jin-Hee Cho
, Terrence J. Moore
:
Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey. 706-728 - Derian Alencar
, Cristiano Both
, Rodolfo Stoffel Antunes
, Helder M. N. S. Oliveira, Eduardo Cerqueira
, Denis Rosário
:
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support. 729-740 - Ershuai Li
, Feng He
, Qiao Li
, Huagang Xiong
:
Bandwidth Allocation of Stream-Reservation Traffic in TSN. 741-755 - Arled Papa
, Alba Jano
, Serkut Ayvasik
, Onur Ayan
, H. Murat Gürsu
, Wolfgang Kellerer
:
User-Based Quality of Service Aware Multi-Cell Radio Access Network Slicing. 756-768
Volume 19, Number 2, June 2022
- Poulmanogo Illy
, Georges Kaddoum
, Kuljeet Kaur
, Sahil Garg
:
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks. 772-783 - Debobroto Das Robin
, Javed I. Khan:
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA. 784-803 - Joy Halder
, Tamaghna Acharya
, Uma Bhattacharya
:
A Novel RSCA Scheme for Offline Survivable SDM-EON With Advance Reservation. 804-817 - Yaoyao Li
, Xin Jian
, Keping Yu
, Neeraj Kumar
, Shaoxiong Cai
:
Theoretical Performance Analysis of Distributed Queue for Massive Machine Type Communications: Throughput, Latency, Energy Consumption. 818-828 - Meng Niu
, Qingmian Han, Bo Cheng
, Meng Wang
, Ziqi Xu, Wenyuan Gu, Shuhao Zhang, Junliang Chen:
HARS: A High-Available and Resource-Saving Service Function Chain Placement Approach in Data Center Networks. 829-847 - Pedro Reviriego
, Alfonso Sánchez-Macián
, Ori Rottenstreich, David Larrabeiti
:
Adaptive One Memory Access Bloom Filters. 848-859 - Priyatosh Mandal
:
Comparison of Placement Variants of Virtual Network Functions From Availability and Reliability Perspective. 860-874 - Yipeng Wang
, Xiaochun Yun, Yongzheng Zhang, Chen Zhao, Xin Liu:
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. 875-889 - Qing Li
, Yichao Wu
, Jingpu Duan, Jiahai Yang
, Yong Jiang
:
Weighted NSFIB Aggregation With Generalized Next Hop of Strict Partial Order. 890-904 - Weili Wang
, Lun Tang
, Chenmeng Wang
, Qianbin Chen
:
Real-Time Analysis of Multiple Root Causes for Anomalies Assisted by Digital Twin in NFV Environment. 905-921 - Guobing Zou
, Song Yang, Shengyu Duan
, Bofeng Zhang
, Yanglan Gan
, Yixin Chen
:
DeepLTSC: Long-Tail Service Classification via Integrating Category Attentive Deep Neural Network and Feature Augmentation. 922-935 - Hancheng Lu
, Fangyu Zhang
:
Resource Fragmentation-Aware Embedding in Dynamic Network Virtualization Environments. 936-948 - Alex S. Santos, Juliana de Santi
, Gustavo B. Figueiredo
, Biswanath Mukherjee
:
Application-Aware Service Degradation in Elastic Optical Networks. 949-961 - Ranyin Wang
, Abdol-Hamid Aghvami
, Vasilis Friderikos
:
Service-Aware Design Policy of End-to-End Network Slicing for 5G Use Cases. 962-975 - Carlos López
, Daniel Morató
, Eduardo Magaña
, Mikel Izal
:
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation. 976-990 - Fu Wang
, Haipeng Yao
, Qi Zhang
, Jingjing Wang
, Ran Gao, Dong Guo
, Mohsen Guizani
:
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks. 991-1005 - Kate Ching-Ju Lin
, Pei-Ling Chou:
VNF Embedding and Assignment for Network Function Parallelism. 1006-1016 - Zuo Xiang
, Malte Höweler
, Dongho You
, Martin Reisslein
, Frank H. P. Fitzek
:
X-MAN: A Non-Intrusive Power Manager for Energy-Adaptive Cloud-Native Network Functions. 1017-1035 - Nikolaos Koursioumpas
, Sokratis Barmpounakis
, Ioannis Stavrakakis
, Nancy Alonistioti:
AI-driven, Context-Aware Profiling for 5G and Beyond Networks. 1036-1048 - Waixi Liu
, Jinjie Lu
, Jun Cai
, Yinghao Zhu, Sen Ling, Qingchun Chen
:
DRL-PLink: Deep Reinforcement Learning With Private Link Approach for Mix-Flow Scheduling in Software-Defined Data-Center Networks. 1049-1064 - Vijay Varadharajan
, Kallol Krishna Karmakar
, Uday Kiran Tupakula, Michael Hitchens
:
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures. 1065-1082 - Yihong He
, Weibo Cai, Pan Zhou
, Gang Sun
, Shouxi Luo, Hongfang Yu
, Mohsen Guizani
:
Beamer: Stage-Aware Coflow Scheduling to Accelerate Hyper-Parameter Tuning in Deep Learning Clusters. 1083-1097 - Mengfei Zhu
, Fujun He
, Eiji Oki
:
Resource Allocation Model Against Multiple Failures With Workload-Dependent Failure Probability. 1098-1116 - Nazli Siasi
, Mohammed A. Jasim
, Aysegül Yayimli, Nasir Ghani
:
Service Function Chain Survivability Provisioning in Fog Networks. 1117-1128 - Kostas Choumas
, Thanasis Korakis:
On Using Raft Over Networks: Improving Leader Election. 1129-1141 - Runkai Yang
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Hongyue Kang
:
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack. 1142-1158 - Zhuofan Liao
, Xiang Pang, Jingyu Zhang, Bing Xiong
, Jin Wang
:
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey. 1159-1175 - Ryeong Hwan Kim
, Hyunmin Noh, Hwangjun Song
, Gi Seok Park
:
Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G Networks. 1176-1190 - Xiaoqing Wang
, Chunping Wang, Kun Zhou, Hongbing Cheng
:
ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin Network. 1191-1202 - Mahmoud Abouyoussef
, Muhammad Ismail
:
Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs. 1203-1215 - Linhui Li
, Peichang Shi, Xiang Fu
, Peng Chen, Tao Zhong, Jinzhu Kong:
Three-Dimensional Tradeoffs for Consensus Algorithms: A Review. 1216-1228 - Yanjiao Chen
, Yuyang Ran, Jingyue Zhou, Jian Zhang
, Xueluan Gong
:
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks. 1229-1242 - Xiangqiang Gao
, Rongke Liu
, Aryan Kaushik
:
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach. 1243-1259 - Cheng Hu
, Yingya Guo
, Yuhui Deng
, Longya Lang:
Improve the Energy Efficiency of Datacenters With the Awareness of Workload Variability. 1260-1273 - Hao Yang
, Xiaoqin Pan, Sicheng Zhao, Binjie Ge, Hang Yu
, Zuqing Zhu
:
On the Bilevel Optimization for Remapping Virtual Networks in an HOE-DCN. 1274-1286 - Jorge Ortín
, Pablo Serrano
, Jaime García-Reinoso
, Albert Banchs
:
Analysis of Scaling Policies for NFV Providing 5G/6G Reliability Levels With Fallible Servers. 1287-1305 - Lisheng Ma
, Wei Su
, Bin Wu, Bin Yang
, Xiaohong Jiang
:
Joint Emergency Data and Service Evacuation in Cloud Data Centers Against Early Warning Disasters. 1306-1320 - Behshid Shayesteh
, Chunyan Fu, Amin Ebrahimzadeh, Roch H. Glitho
:
Automated Concept Drift Handling for Fault Prediction in Edge Clouds Using Reinforcement Learning. 1321-1335 - Ahmed Saleh Bataineh
, Jamal Bentahar
, Rabeb Mizouni
, Omar Abdel Wahab
, Gaith Rjoub
, May El Barachi
:
Cloud Computing as a Platform for Monetizing Data Services: A Two-Sided Game Business Model. 1336-1350 - Polychronis Valsamas
, Lefteris Mamatas
, Luis M. Contreras
:
A Comparative Evaluation of Edge Cloud Virtualization Technologies. 1351-1365 - Tanya Shreedhar
, Rohit Panda, Sergey Podanev, Vaibhav Bajpai
:
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads. 1366-1381 - Zhaorui Wu
, Yuhui Deng
, Hao Feng
, Yi Zhou
, Geyong Min
, Zhen Zhang
:
Blender: A Container Placement Strategy by Leveraging Zipf-Like Distribution Within Containerized Data Centers. 1382-1398 - Yijing Li
, Shihong Hu
, Guanghui Li
:
CVC: A Collaborative Video Caching Framework Based on Federated Learning at the Edge. 1399-1412 - Anirban Lekharu
, Mitansh Jain
, Arijit Sur, Arnab Sarkar:
Deep Learning Model for Content Aware Caching at MEC Servers. 1413-1425 - Fengsheng Wei
, Shuang Qin, Gang Feng
, Yao Sun
, Jian Wang, Ying-Chang Liang
:
Hybrid Model-Data Driven Network Slice Reconfiguration by Exploiting Prediction Interval and Robust Optimization. 1426-1441 - Lalhruaizela Chhangte
, Nikhil Karamchandani
, D. Manjunath
, Emanuele Viterbo
:
On Index Coded Video Delivery at the WiFi Edge: Performance and System Design. 1442-1457 - Atri Mukhopadhyay
, George Iosifidis, Marco Ruffini:
Migration-Aware Network Services With Edge Computing. 1458-1471 - Akshita Gupta
, Vivek Ashok Bohara
, Anand Srivastava:
Techno-Socio-Economic Impact of Joint Energy Resource Allocation Scheme in FiWi Network. 1472-1488 - Ramon Perez
, Priscilla Benedetti
, Matteo Pergolesi
, Jaime García-Reinoso
, Aitor Zabala
, Pablo Serrano
, Mauro Femminella
, Gianluca Reali
, Kris Steenhaut
, Albert Banchs
:
Monitoring Platform Evolution Toward Serverless Computing for 5G and Beyond Systems. 1489-1504 - Emanuel Lima
, Ana Aguiar
, Paulo Carvalho
, Aline Carneiro Viana
:
Human Mobility Support for Personalized Data Offloading. 1505-1520 - Vasilis Maglogiannis
, Dries Naudts
, Seilendria A. Hadiwardoyo, Daniel van den Akker, Johann Márquez-Barja
, Ingrid Moerman
:
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment. 1521-1538 - Huijun Tang
, Huaming Wu
, Yubin Zhao
, Ruidong Li
:
Joint Computation Offloading and Resource Allocation Under Task-Overflowed Situations in Mobile-Edge Computing. 1539-1553 - Amandeep Kaur
, Krishan Kumar
:
A Reinforcement Learning-Based Green Resource Allocation for Heterogeneous Services in Cooperative Cognitive Radio Networks. 1554-1566 - Moubarak Zoure
, Toufik Ahmed
, Laurent Réveillère:
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods. 1567-1584 - Wei Kuang Lai
, You-Chiun Wang
, Yi-Chien Chen, Zong-Ting Tsai
:
TSSM: Time-Sharing Switch Migration to Balance Loads of Distributed SDN Controllers. 1585-1597 - Mahdi Dolati
, Ahmad Khonsari
, Majid Ghaderi
:
Minimizing Update Makespan in SDNs Without TCAM Overhead. 1598-1613 - Cheng Ren
, Hao Li
, Yaxin Li
, Yu Wang
, Haiyun Xiang, Xuxiang Chen
:
On Efficient Service Function Chaining in Hybrid Software Defined Networks. 1614-1628 - Yuncan Zhang
, Fujun He
, Eiji Oki
:
Service Chain Provisioning With Sub-Chain-Enabled Coordinated Protection to Satisfy Availability Requirements. 1629-1649 - Rohit Kumar
, U. Venkanna
, Vivek Tiwari
:
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN. 1650-1661 - Pedro Pablo Cespedes Sanchez
, Bader Maluff
, Diego P. Pinto-Roa, Horacio Legal Ayala
:
Hybrid Incremental Deployment of HSDN Devices. 1662-1678 - Loïc D. Tsobdjou
, Samuel Pierre, Alejandro Quintero
:
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold. 1679-1689 - Hongbin Luo
, Zhoubiao Liu
, Shan Zhang
:
Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet. 1690-1704 - Beibei Li
, Shang Ma
, Ruilong Deng
, Kim-Kwang Raymond Choo
, Jin Yang
:
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach. 1705-1716 - Chenxin Duan
, Hao Gao, Guanglei Song
, Jiahai Yang
, Zhiliang Wang
:
ByteIoT: A Practical IoT Device Identification System Based on Packet Length Distribution. 1717-1728 - Claas Lorenz
, Vera Clemens
, Max Schrötter, Bettina Schnor:
Continuous Verification of Network Security Compliance. 1729-1745 - Zhen Zeng
, Zhun Yang
, Dijiang Huang
, Chun-Jen Chung:
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. 1746-1760 - Kaiping Xue
, Jiayu Yang, Qiudong Xia, David S. L. Wei, Jian Li
, Qibin Sun, Jun Lu:
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking. 1761-1775 - Nadia Pocher
, Andreas G. Veneris:
Privacy and Transparency in CBDCs: A Regulation-by-Design AML/CFT Scheme. 1776-1788 - Xiaoteng Ma
, Qing Li
, Yong Jiang
, Gabriel-Miro Muntean
, Longhao Zou:
Learning-Based Joint QoE Optimization for Adaptive Video Streaming Based on Smart Edge. 1789-1806 - Jonathan Falk
, Heiko Geppert
, Frank Dürr
, Sukanya Bhowmik
, Kurt Rothermel
:
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane. 1807-1825 - Dimitra Tsigkari
, Thrasyvoulos Spyropoulos:
An Approximation Algorithm for Joint Caching and Recommendations in Cache Networks. 1826-1841 - Ferenc Fejes, Szilveszter Nádas
, Gergo Gombos
, Sándor Laki
:
DeepQoS: Core-Stateless Hierarchical QoS in Programmable Switches. 1842-1861 - Ammar Latif
, Rahul Parameswaran, Sachin Vishwarupe, Abdallah Khreishah
, Yaser Jararweh
, Ali Hamdan Alenezi:
MediaFlow: Multicast Routing and In-Network Monitoring for Professional Media Production. 1862-1875 - Yahuza Bello
, Ahmed Refaey Hussein
, Mehmet Ulema
, Juanita Koilpillai:
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond. 1876-1889 - Gilson Miranda
, Daniel Fernandes Macedo
, Johann M. Márquez-Barja
:
Estimating Video on Demand QoE From Network QoS Through ICMP Probes. 1890-1902 - Tushar Bose
, Aala Suresh
, Om Jee Pandey
, Linga Reddy Cenkeramaddi
, Rajesh M. Hegde:
Improving Quality-of-Service in Cluster-Based UAV-Assisted Edge Networks. 1903-1919 - Wesley da Silva Coelho
, Amal Benhamiche, Nancy Perrot
, Stefano Secci
:
Function Splitting, Isolation, and Placement Trade-Offs in Network Slicing. 1920-1936 - Jiachen Zu
, Guyu Hu, Dongyang Peng, Shengxu Xie
, Wenbin Gao:
Corrections to "Fair Scheduling and Rate Control for Service Function Chain in NFV-Enabled Data Center". 1937
Volume 19, Number 3, September 2022
- Giovanni Schembra
, Wolfgang Kellerer
, Christian Jacquenet
, Noriaki Kamiyama
, Barbara Martini, Rafael Pasquini
, Dimitrios Pezaros
, Roberto Riggio
, Hongke Zhang
, Mohamed Faten Zhani
, Thomas Zinner
:
Guest Editors' Introduction: Special Section on Smart Management of Future Softwarized Networks. 1942-1950 - Shwetha Vittal
, A. Antony Franklin
:
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks. 1951-1964 - Claudia Carballo González
, Ernesto Fontes Pupo
, Luigi Atzori
, Maurizio Murroni
:
Dynamic Radio Access Selection and Slice Allocation for Differentiated Traffic Management on Future Mobile Networks. 1965-1981 - Akito Suzuki
, Ryoichi Kawahara, Shigeaki Harada:
Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation With Traffic Fluctuations. 1982-2000 - Jean-Baptiste Monteil
, George Iosifidis
, Luiz A. DaSilva
:
Learning-Based Reservation of Virtualized Network Resources. 2001-2016 - Claudio Casetti
, Carla-Fabiana Chiasserini
, Silvio Marcato
, Corrado Puligheddu
, Josep Mangues-Bafalluy
, Jorge Baranda
, Juan Brenes
, Francesco Bocchi
, Giada Landi
, Bahador Bakhshi
:
ML-Driven Provisioning and Management of Vertical Services in Automated Cellular Networks. 2017-2033 - Raffaele Bolla, Roberto Bruschi
, Franco Davoli
, Chiara Lombardo
, Jane Frances Pajo
:
Multi-Site Resource Allocation in a QoS-Aware 5G Infrastructure. 2034-2047 - Ruixin Chen
, Jin Zhao
:
Scalable and Flexible Traffic Steering for Service Function Chains. 2048-2062 - Danyang Zheng
, Gangxiang Shen
, Xiaojun Cao
, Biswanath Mukherjee
:
Towards Optimal Parallelism-Aware Service Chaining and Embedding. 2063-2077 - Xinyi Zhang
, Kavé Salamatian
, Gaogang Xie
:
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks. 2078-2091 - Ori Rottenstreich
, Ariel Kulik
, Ananya Joshi, Jennifer Rexford, Gábor Rétvári, Daniel Sadoc Menasché
:
Data Plane Cooperative Caching With Dependencies. 2092-2106 - Prashant Kumar
, Saksham Bhushan
, Debajyoti Halder
, Anand M. Baswade
:
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks. 2107-2118 - Menglan Hu
, Jun Li
, Chao Cai
, Tianping Deng, Wenbo Xu, Yan Dong
:
Software Defined Multicast for Large-Scale Multi-Layer LEO Satellite Networks. 2119-2130 - Gianluca Davoli
, Walter Cerroni
, Davide Borsatti
, Mario Valieri
, Daniele Tarchi
, Carla Raffaelli
:
A Fog Computing Orchestrator Architecture With Service Model Awareness. 2131-2147 - Hao Yu
, Tarik Taleb, Jiawei Zhang
:
Deterministic Latency/Jitter-Aware Service Function Chaining Over Beyond 5G Edge Fabric. 2148-2162 - Pankaj Kumar Kashyap
, Sushil Kumar
, Ankita Jaiswal, Omprakash Kaiwartya
, Manoj Kumar, Upasana Dohare
, Amir H. Gandomi
:
DECENT: Deep Learning Enabled Green Computation for Edge Centric 6G Networks. 2163-2177 - Emeka Obiodu
, Aravindh Raman, Abdullahi Kutiriko Abubakar
, Simone Mangiante
, Nishanth Sastry
, A. Hamid Aghvami
:
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars. 2178-2194 - Moisés Felipe Silva
, Alessandro Pacini
, Andrea Sgambelluri
, Luca Valcarenghi
:
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks. 2195-2206 - Trung V. Phan
, Thomas Bauschert:
DeepAir: Deep Reinforcement Learning for Adaptive Intrusion Response in Software-Defined Networks. 2207-2218 - Sogand SadrHaghighi
, Mahdi Dolati
, Majid Ghaderi
, Ahmad Khonsari
:
Monitoring OpenFlow Virtual Networks via Coordinated Switch-Based Traffic Mirroring. 2219-2237 - Arun Raghuramu, Lianjie Cao
, Puneet Sharma, Mario Sánchez
, Joon-Myung Kang
, Chen-Nee Chuah
, David Lee, Vinay Saxena:
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems. 2238-2250 - Rémi Badonnel
, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza
, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. 2251-2254 - Tal Shapira
, Yuval Shavitt
:
AP2Vec: An Unsupervised Approach for BGP Hijacking Detection. 2255-2268 - Liyan Yang
, Yubo Song
, Shang Gao
, Aiqun Hu
, Bin Xiao
:
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN. 2269-2281 - Marco Zuppelli
, Matteo Repetto
, Andreas Schaffhauser, Wojciech Mazurczyk
, Luca Caviglione
:
Code Layering for the Detection of Network Covert Channels in Agentless Systems. 2282-2294 - Shuaishuai Tan
, Xiaoxiong Zhong
, Zhiyi Tian
, Qingkuan Dong:
Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS. 2295-2308 - Léo Lavaur
, Marc-Oliver Pahl
, Yann Busnel
, Fabien Autrel
:
The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey. 2309-2332 - Kim Hammar
, Rolf Stadler
:
Intrusion Prevention Through Optimal Stopping. 2333-2348 - Quinn Burke
, Fidan Mehmeti
, Rahul George
, Kyle Ostrowski, Trent Jaeger
, Thomas F. La Porta
, Patrick D. McDaniel
:
Enforcing Multilevel Security Policies in Unstable Networks. 2349-2365 - Quan Ren
, Zehua Guo
, Jiangxing Wu, Tao Hu
, Lu Jie
, Yuxiang Hu, Lei He:
SDN-ESRC: A Secure and Resilient Control Plane for Software-Defined Networks. 2366-2381 - Matteo Repetto
, Gianmarco Bruno
, Jalolliddin Yusupov
, Guerino Lamanna
, Benjamin Ertl
, Alessandro Carrega
:
Automating Mitigation of Amplification Attacks in NFV Services. 2382-2396 - Marco Anisetti
, Claudio A. Ardagna
, Filippo Berto
, Ernesto Damiani
:
A Security Certification Scheme for Information-Centric Networks. 2397-2408 - Lingyan Xue
, Haiping Huang
, Fu Xiao
, Wenming Wang
:
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums. 2409-2420 - Suhui Liu
, Liquan Chen
, Huaqun Wang
, Shihui Fu
, Lin Shi:
O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks. 2421-2433 - Massimo Tornatore
, Teresa Gomes
, Carmen Mas Machuca, Eiji Oki, Chadi Assi, Dominic Schupke:
Guest Editors Introduction: Special Section on Recent Advances in the Design and Management of Reliable Communication Networks. 2434-2439 - Sasko Ristov
, Dragi Kimovski
, Thomas Fahringer
:
FaaScinating Resilience for Serverless Function Choreographies in Federated Clouds. 2440-2452 - Ferenc Mogyorósi
, Péter Babarczi
, Johannes Zerwas
, Andreas Blenk
, Alija Pasic
:
Resilient Control Plane Design for Virtualized 6G Core Networks. 2453-2467 - Muhammad Taqi Raza
, Zhowei Tan, Ali Tufail
, Fatima Muhammad Anwar:
LTE NFV Rollback Recovery. 2468-2477 - Hernani D. Chantre
, Nelson L. S. da Fonseca
:
Design of 5G MEC-Based Networks With 1: N: K Protection Scheme. 2478-2491 - Mouhamad Dieye
, Amina Mseddi
, Wael Jaafar
, Halima Elbiaze
:
Towards Reliable Remote Health Monitoring in Fog Computing Networks. 2506-2520 - Alessio Sacco
, Flavio Esposito
, Guido Marchetto
:
Restoring Application Traffic of Latency-Sensitive Networked Systems Using Adversarial Autoencoders. 2521-2535 - Fernando Nakayama
, Paulo Lenz
, Michele Nogueira
:
A Resilience Management Architecture for Communication on Portable Assisted Living. 2536-2548 - Jingpei Wang
, Zhenyong Zhang
, Mufeng Wang
:
A Trust Management Method Against Abnormal Behavior of Industrial Control Networks Under Active Defense Architecture. 2549-2572 - Milan Groshev
, Jorge Martín-Pérez
, Carlos Guimarães
, Antonio de la Oliva
, Carlos J. Bernardos
:
FoReCo: A Forecast-Based Recovery Mechanism for Real-Time Remote Control of Robotic Manipulators. 2573-2586 - Rujia Zou
, Hiroshi Hasegawa, Masahiko Jinno
, Suresh Subramaniam
:
DRAMA+: Disaster Management With Mitigation Awareness for Translucent Elastic Optical Networks. 2587-2599 - Meihan Wu, Nelson L. S. da Fonseca
, Zuqing Zhu
:
Dynamic Cross-Layer Restoration to Resolve Packet Layer Outages in FlexE-Over-EONs. 2600-2611 - Wei Wang
, Yongli Zhao
, Yuanjian Zhang, Xinyi He
, Yue Liu, Jie Zhang
:
Intersatellite Laser Link Planning for Reliable Topology Design in Optical Satellite Networks: A Networking Perspective. 2612-2624 - Meenakshi Syamkumar
, Yugali Gullapalli, Wei Tang, Paul Barford
, Joel Sommers
:
BigBen: Telemetry Processing for Internet-Wide Event Monitoring. 2625-2638 - Rafael S. Guimarães
, Cristina K. Dominicini
, Victor M. Garcia Martinez
, Bruno Missi Xavier
, Diego R. Mafioletti
, Ana C. Locateli
, Rodolfo da Silva Villaça, Magnos Martinello
, Moisés R. N. Ribeiro
:
M-PolKA: Multipath Polynomial Key-Based Source Routing for Reliable Communications. 2639-2651 - Sebastian Troia
, Marco Mazzara
, Marco Savi
, Ligia Maria Moreira Zorello
, Guido Maier:
Resilience of Delay-Sensitive Services With Transport-Layer Monitoring in SD-WAN. 2652-2663 - Miaomiao Wang
, Lanlan Rui
, Yang Yang
, Zhipeng Gao
, Xingyu Chen:
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network. 2664-2676 - Ronghua Xu
, Yu Chen
:
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks. 2677-2688 - Chankyun Lee
, Il Kwon Sohn, Wonhyuk Lee:
Eavesdropping Detection in BB84 Quantum Key Distribution Protocols. 2689-2701 - Carlos Natalino
, Marco Schiano
, Andrea Di Giglio
, Marija Furdek
:
Root Cause Analysis for Autonomous Optical Network Security Management. 2702-2713 - Gorla Praveen
, Anuj Deshmukh
, Sandeep Joshi
, Vinay Chamola
, Mohsen Guizani
:
A Game Theoretic Analysis for Power Management and Cost Optimization of Green Base Stations in 5G and Beyond Communication Networks. 2714-2725 - Abd Ullah Khan
, Ghulam Abbas
, Ziaul Haq Abbas
, Muhammad Bilal
, Sayed Chhattan Shah
, Houbing Song
:
Reliability Analysis of Cognitive Radio Networks With Reserved Spectrum for 6G-IoT. 2726-2737 - Nour-El-Houda Yellas
, Selma Boumerdassi
, Alberto Ceselli
, Bilal Maaz
, Stefano Secci
:
Robust Access Point Clustering in Edge Computing Resource Optimization. 2738-2750 - Azza H. Ahmed
, Ahmed Elmokashfi
:
ICRAN: Intelligent Control for Self-Driving RAN Based on Deep Reinforcement Learning. 2751-2766 - Gabriele Gemmi
, Renato Lo Cigno
, Leonardo Maccari
:
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas. 2767-2779 - Zhuoqun Xia, Xiaoxiao Mao
, Ke Gu
, Weijia Jia
:
Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs. 2780-2797 - Prasenjit Karmakar
, Vijay K. Shah
, Satyaki Roy
, Krishnandu Hazra
, Sujoy Saha, Subrata Nandi:
Reliable Backhauling in Aerial Communication Networks Against UAV Failures: A Deep Reinforcement Learning Approach. 2798-2811 - Jie Li
, Vasileios Giotsas, Yangyang Wang, Shi Zhou:
BGP-Multipath Routing in the Internet. 2812-2826 - Mathieu Jadin
, Quentin De Coninck
, Louis Navarre
, Michael Schapira
, Olivier Bonaventure
:
Leveraging eBPF to Make TCP Path-Aware. 2827-2838 - Patrick Krämer
, Philip Diederich
, Corinna Krämer, Rastin Pries, Wolfgang Kellerer
, Andreas Blenk
:
D2A: Operating a Service Function Chain Platform With Data-Driven Scheduling Policies. 2839-2853 - Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai John Yang
:
IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry. 2854-2868 - Fujun He
, Eiji Oki
:
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks. 2869-2884 - Xiaoxuan Wang
, Rolf Stadler
:
Online Feature Selection for Efficient Learning in Networked Systems. 2885-2898 - Luxi Zhao
, Paul Pop
, Sebastian Steinhorst
:
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking. 2899-2928 - Vincenzo Eramo
, Tiziana Catena:
Application of an Innovative Convolutional/LSTM Neural Network for Computing Resource Allocation in NFV Network Architectures. 2929-2943 - Haiyang Yu
, Zhen Yang
, Shanshan Tu
, Muhammad Waqas
, Huan Liu
:
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. 2944-2956 - Qiuyun Lyu
, Hao Li
, Zhining Deng
, Xiaochen Zhang, Yizhen Qi, Huaping Liu
, Mengzhou Gao
:
JRS: A Joint Regulating Scheme for Secretly Shared Content Based on Blockchain. 2957-2971 - Hao Guo
, Wanxin Li
, Mark M. Nejad
:
A Hierarchical and Location-Aware Consensus Protocol for IoT-Blockchain Applications. 2972-2986 - Ammar Ayman Battah
, Youssef Iraqi
, Ernesto Damiani
:
A Trust and Reputation System for IoT Service Interactions. 2987-3005 - Yuchen Li, Weifa Liang
, Jing Li
:
Profit Driven Service Provisioning in Edge Computing via Deep Reinforcement Learning. 3006-3019 - Kostas Kolomvatsos
, Christos Anagnostopoulos
:
A Proactive Statistical Model Supporting Services and Tasks Management in Pervasive Applications. 3020-3031 - Rahul Mishra
, Hari Prabhat Gupta
, Preti Kumari
, Doug Young Suh
, Md. Jalil Piran
:
A Task Offloading and Reallocation Scheme for Passenger Assistance Using Fog Computing. 3032-3047 - Deepika Saxena
, Ishu Gupta
, Ashutosh Kumar Singh
, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services. 3048-3061 - Ahmad Hammoud, Hadi Otrok
, Azzam Mourad
, Zbigniew Dziong
:
On Demand Fog Federations for Horizontal Federated Learning in IoV. 3062-3075 - Kanika Sharma
, Bernard Butler
, Brendan Jennings
:
Graph-Based Heuristic Solution for Placing Distributed Video Processing Applications on Moving Vehicle Clusters. 3076-3089 - Apostolos Galanopoulos
, George Iosifidis
, Theodoros Salonidis, Douglas J. Leith
:
Selective Edge Computing for Mobile Analytics. 3090-3104 - Mohammad Furqan Ali
, Dushantha Nalin K. Jayakody
, Sahil Garg
, Georges Kaddoum
, M. Shamim Hossain
:
Dual-Hop Mixed FSO-VLC Underwater Wireless Communication Link. 3105-3120 - Nadine Abbas
, Wissam Fawaz
, Sanaa Sharafeddine
, Azzam Mourad
, Chadi Abou-Rjeily
:
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network. 3121-3135 - Quang-Trung Luu
, Sylvaine Kerboeuf
, Michel Kieffer
:
Admission Control and Resource Reservation for Prioritized Slice Requests With Guaranteed SLA Under Uncertainties. 3136-3153 - Serena Santi
, Filip Lemic
, Jeroen Famaey
:
Location-Based Discovery and Network Handover Management for Heterogeneous IEEE 802.11ah IoT Applications. 3154-3162 - Yangguang Lu
, Xin Chen
, Yongchao Zhang
, Ying Chen
:
Cost-Efficient Resources Scheduling for Mobile Edge Computing in Ultra-Dense Networks. 3163-3173 - Amir Varasteh
, Saeed Akhoondian Amiri
, Carmen Mas Machuca
:
Homa: Online In-Flight Service Provisioning With Dynamic Bipartite Matching. 3174-3187 - S. Suja Golden Shiny
, S. Sathya Priya
, Krishnan Murugan
:
Control Message Quenching-Based Communication Protocol for Energy Management in SDWSN. 3188-3201 - Sourav Mondal
, Marco Ruffini
:
Optical Front/Mid-Haul With Open Access-Edge Server Deployment Framework for Sliced O-RAN. 3202-3219 - Bardia Safaei
, Hossein Taghizade
, Amir Mahdi Hosseini Monazzah
, Kimia Talaei Khoosani, Parham Sadeghi, Ali Asghar Mohammadsalehi, Jörg Henkel
, Alireza Ejlali
:
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis. 3220-3238 - Alberto Martínez Alba
, Wolfgang Kellerer
:
Dynamic Functional Split Adaptation in Next-Generation Radio Access Networks. 3239-3263 - Yang Chen
, Dechang Pi
, Shengxiang Yang
, Yue Xu
, Junfu Chen
, Ali Wagdy Mohamed
:
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing. 3264-3275 - Ali Nouruzi
, Abolfazl Zakeri
, Mohammad Reza Javan
, Nader Mokari
, Rasheed Hussain
, S. M. Ahsan Kazmi:
Online Service Provisioning in NFV-Enabled Networks Using Deep Reinforcement Learning. 3276-3289 - Yan-Wei Chen
, Chi-Yu Li
, Chien-Chao Tseng
, Min-Zhi Hu:
P4-TINS: P4-Driven Traffic Isolation for Network Slicing With Bandwidth Guarantee and Management. 3290-3303 - Tomohiro Korikawa
, Eiji Oki
:
Memory Network Architecture for Packet Processing in Functions Virtualization. 3304-3322 - Khoa Nguyen
, Changcheng Huang
:
Toward Adaptive Joint Node and Link Mapping Algorithms for Embedding Virtual Networks: A Conciliation Strategy. 3323-3340 - Min Zhu
, Qi Chen, Jiahua Gu
, Pingping Gu:
Deep Reinforcement Learning for Provisioning Virtualized Network Function in Inter-Datacenter Elastic Optical Networks. 3341-3351 - Godfrey Kibalya
, Joan Serrat-Fernández
, Juan-Luis Gorricho
, Peiying Zhang
:
A Reinforcement Learning Approach for Virtual Network Function Chaining and Sharing in Softwarized Networks. 3352-3370 - Cheng Ren
, Xuxiang Chen
, Haiyun Xiang, Yu Wang
, Yaxin Li
, Hao Li
:
On Efficient Delay-Aware Multisource Multicasting in NFV-Enabled Softwarized Networks. 3371-3386 - Ehsan Nowroozi
, Yassine Mekdad
, Mohammad Hajian Berenjestanaki
, Mauro Conti
, Abdeslam El Fergougui
:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. 3387-3400 - Nilesh Kumar Jadav
, Rajesh Gupta
, Mohammad Dahman Alshehri
, Harsh Mankodiya, Sudeep Tanwar
, Neeraj Kumar
:
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks. 3401-3412 - Haiyan Xu
, Zhaoxin Zhang, Jianen Yan
, Tingting Chai:
Name Dependency and Domain Name Resolution Risk Assessment. 3413-3424 - Hengwei Zhang
, Jinglei Tan
, Xiaohu Liu
, Shirui Huang
, Hao Hu, Yuchen Zhang:
Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games. 3425-3437 - Ahmed H. Anwar
, Charles A. Kamhoua
, Nandi O. Leslie, Christopher Kiekintveld:
Honeypot Allocation for Cyber Deception Under Uncertainty. 3438-3452 - Haotian Yan
, Haibo Hu
, Qingqing Ye
, Li Tang
:
SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things. 3453-3464 - Prasanta Kumar Roy
, Ansuman Bhattacharya:
SDIWSN: A Software-Defined Networking-Based Authentication Protocol for Real-Time Data Transfer in Industrial Wireless Sensor Networks. 3465-3477 - Rajesh Gupta
, Sudeep Tanwar
:
A Zero-Sum Game-Based Secure and Interference Mitigation Scheme for Socially Aware D2D Communication With Imperfect CSI. 3478-3486 - Gioacchino Manfredi
, Luca De Cicco
, Saverio Mascolo:
Optimal QoE-Fair Resource Allocation in Multipath Video Delivery Network. 3487-3500 - Jun Huang
, Qiang Duan
, Cong-Cong Xing
, Bo Gu
, Guodong Wang, Sherali Zeadally
, Erich J. Baker
:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. 3501-3515 - Susanna Schwarzmann
, Clarissa Cassales Marquezan, Riccardo Trivisonno
, Shinichi Nakajima, Vincent Barriac, Thomas Zinner
:
ML-Based QoE Estimation in 5G Networks Using Different Regression Techniques. 3516-3532 - Fehmina Malik
, Manjesh K. Hanawal
, Yezekael Hayel
:
Profit Sharing Contracts Between Content and Service Providers for Enhanced Network Quality. 3533-3546 - Ivan Bartolec
, Irena Orsolic
, Lea Skorin-Kapov
:
Impact of User Playback Interactions on In-Network Estimation of Video Streaming Performance. 3547-3561 - Ismael Castell-Uroz
, Rubén Sanz-García, Josep Solé-Pareta, Pere Barlet-Ros
:
Demystifying Content-Blockers: Measuring Their Impact on Performance and Quality of Experience. 3562-3573 - Alekha Kumar Mishra
, Osho Singh
, Abhay Kumar
, Deepak Puthal
:
Hybrid Mode of Operations for RPL in IoT: A Systematic Survey. 3574-3586 - Shuang Wang
, Xiaoping Li
, Quan Z. Sheng
, Amin Beheshti
:
Performance Analysis and Optimization on Scheduling Stochastic Cloud Service Requests: A Survey. 3587-3602 - Christian Killer
, Bruno Rodrigues
, Eder John Scheid
, Muriel Figueredo Franco
, Burkhard Stiller
:
Blockchain-Based Voting Considered Harmful? 3603-3618 - Jinoh Kim
, Makiya Nakashima, Wenjun Fan
, Simeon Wuthier
, Xiaobo Zhou
, Ikkyun Kim
, Sang-Yoon Chang
:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. 3619-3632 - Natkamon Tovanich
, Nicolas Soulié
, Nicolas Heulot
, Petra Isenberg
:
The Evolution of Mining Pools and Miners' Behaviors in the Bitcoin Blockchain. 3633-3644 - Emerson de O. Antunes
, Marcos F. Caetano
, Marcelo Antonio Marotta
, Aletéia P. F. Araújo
, Lucas Bondan
, Rodolfo I. Meneguette
, Geraldo P. Rocha Filho
:
Optimized Solutions for Deploying a Militarized 4G/LTE Network With Maximum Coverage and Minimum Interference. 3645-3656 - Aécio dos Santos Pires
, Fernando Menezes Matos
, Aldri Luiz dos Santos
, Diego Ernesto Rosa Pessoa
, Paulo Ditarso Maciel
:
PipeConf: An Integrated Architecture for the Automated Configuration of Network Assets. 3657-3669 - Dario Rossi
, Liang Zhang:
Landing AI on Networks: An Equipment Vendor Viewpoint on Autonomous Driving Networks. 3670-3684 - Rui Yang
, Jiangran Wang
, Jiyu Hu
, Shichu Zhu, Yifei Li, Indranil Gupta
:
Medley: A Membership Service for IoT Networks. 2492-2505
Volume 19, Number 4, December 2022
- Salil S. Kanhere
, Andreas G. Veneris, Sachiko Yoshihama, Sandip Chakraborty, Ori Rottenstreich, Marta Beltrán Pardo, Bruno Rodriguez:
Guest Editorial: Special Issue on Recent Advances on Blockchain for Network and Service Management. 3689-3693 - Kun Zhou, Chunping Wang, Xiaoqing Wang
, Shenghang Chen, Hongbing Cheng
:
A Novel Scheme to Improve the Scalability of Bitcoin Combining IPFS With Block Compression. 3694-3705 - Tzu-Lun Huang
, Jason Huang:
An Efficient Storage Structure and Management for Distributed Ledgers in Blockchain Systems: An Exploration Based on Purely Theoretical Approach. 3706-3723 - Jun Wook Heo
, Gowri Sankar Ramachandran
, Ali Dorri
, Raja Jurdak
:
Blockchain Storage Optimisation With Multi-Level Distributed Caching. 3724-3736 - Zening Zhao
, Jinsong Wang
, Kai Shi, Hongwei Zhang:
Improving Address Clustering in Bitcoin by Proposing Heuristics. 3737-3749 - Shuangjie Bai
, Geng Yang
, Guoxiu Liu, Hua Dai
, Chunming Rong
:
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain. 3750-3763 - Qinghao Wang
, Yongxin Zhang
, Zijian Bao
, Wenbo Shi
, Hong Lei
, Han Liu
, Bangdao Chen
:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. 3764-3780 - Rodrigo Dutra Garcia
, Gowri Sankar Ramachandran
, Raja Jurdak
, Jo Ueyama
:
Blockchain-Aided and Privacy-Preserving Data Governance in Multi-Stakeholder Applications. 3781-3793 - Yuhan Song
, Fushan Wei
, Kaijie Zhu
, Yuefei Zhu
:
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner. 3794-3809 - Wei-Chen Wu
, Chit-Jie Chew, Ying-Chin Chen, Cheng-Han Wu, Tzu Hao Chen
, Jung-San Lee
:
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation. 3810-3821 - Baojun Rong
, Zhaohui Zheng
:
FRCR: Raft Consensus Scheme Based on Semi Asynchronous Federal Reconstruction. 3822-3834 - Eder J. Scheid
, Ratanak Hy, Muriel Figueredo Franco
, Christian Killer
, Burkhard Stiller
:
On the Employment of Machine Learning in the Blockchain Selection Process. 3835-3846 - Cesar Castellon
, Swapnoneel Roy
, O. Patrick Kreidl
, Ayan Dutta
, Ladislau Bölöni
:
Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization. 3847-3857 - Ismaeel Al Ridhawi
, Moayad Aloqaily
, Ali Abbas, Fakhri Karray:
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management. 3858-3871 - Vincenzo Botta
, Vincenzo Iovino, Ivan Visconti
:
Towards Data Redaction in Bitcoin. 3872-3883 - Yu Jiang
, Xiaolong Xu
, Fu Xiao
:
Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records. 3884-3895 - Umit Demirbaga
, Gagangeet Singh Aujla
:
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem. 3896-3907 - Jin Qi
, Yali Liu, Yaochen Ling, Bin Xu
, Zhenjiang Dong
, Yanfei Sun:
Research on an Intelligent Computing Offloading Model for the Internet of Vehicles Based on Blockchain. 3908-3918 - Sarra Benadla
, Omar Rafik Merad Boudia
, Sidi Mohammed Senouci
, Mohamed Lehsaini:
Detecting Sybil Attacks in Vehicular Fog Networks Using RSSI and Blockchain. 3919-3935 - Pin Lv
, Linyan Xie, Jia Xu
, Xu Wu, Taoshen Li:
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain. 3936-3948 - Xinhua Zhang
, Lin You
, Gengran Hu
:
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. 3949-3959 - Muhammad Anas Imtiaz
, David Starobinski
, Ari Trachtenberg:
Empirical Comparison of Block Relay Protocols. 3960-3974 - Befekadu Gezaheng Gebraselase
, Bjarne E. Helvik
, Yuming Jiang
:
Bitcoin P2P Network Measurements: A Testbed Study of the Effect of Peer Selection on Transaction Propagation and Confirmation Times. 3975-3987 - Nur Zincir-Heywood
, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib
, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami
, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. 3988-3994 - Minxian Xu
, Chenghao Song
, Shashikant Ilager
, Sukhpal Singh Gill
, Juanjuan Zhao
, Kejiang Ye
, Cheng-Zhong Xu
:
CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning. 3995-4009 - Aroosa Hameed, John Violos
, Aris Leivadeas
, Nina Santi
, Rémy Grünblatt
, Nathalie Mitton
:
Toward QoS Prediction Based on Temporal Transformers for IoT Applications. 4010-4027 - Zhiyuan Yao
, Yoann Desmouceaux
, Juan Antonio Cordero Fuertes
, Mark Townsley
, Thomas H. Clausen
:
Aquarius - Enable Fast, Scalable, Data-Driven Service Management in the Cloud. 4028-4044 - Shaozhi Dai
, Zhongzhi Luan
, Shaohan Huang, Carol J. Fung, He Wang, Hailong Yang
, Depei Qian
:
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network. 4045-4057 - Dan Xia
, Jiafu Wan
, Pengpeng Xu, Jinbiao Tan:
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks. 4058-4068 - Ke Lu
, Zhekai Du
, Jingjing Li
, Geyong Min
:
Resource-Efficient Distributed Deep Neural Networks Empowered by Intelligent Software-Defined Networking. 4069-4081 - Guosheng Kang
, Jianxun Liu
, Yong Xiao
, Yingcheng Cao, Buqing Cao
, Min Shi
:
Web Services Clustering via Exploring Unified Content and Structural Semantic Representation. 4082-4096 - Roghayeh Joda
, Turgay Pamuklu
, Pedro Enrique Iturria-Rivera
, Melike Erol-Kantarci
:
Deep Reinforcement Learning-Based Joint User Association and CU-DU Placement in O-RAN. 4097-4110 - Peiying Zhang
, Yu Su, Jingjing Wang
, Chunxiao Jiang
, Ching-Hsien Hsu
, Shigen Shen
:
Reinforcement Learning Assisted Bandwidth Aware Virtual Network Resource Allocation. 4111-4123 - Ons Aouedi
, Kandaraj Piamrat
, Benoît Parrein
:
Ensemble-Based Deep Learning Model for Network Traffic Classification. 4124-4135 - Chuanhao Sun
, Kai Xu, Marco Fiore
, Mahesh K. Marina, Yue Wang, Cezary Ziemlicki:
AppShot: A Conditional Deep Generative Model for Synthesizing Service-Level Mobile Traffic Snapshots at City Scale. 4136-4150 - Haiyuan Li
, Karcius Day Rosario Assis
, Shuangyi Yan
, Dimitra Simeonidou
:
DRL-Based Long-Term Resource Planning for Task Offloading Policies in Multiserver Edge Computing Networks. 4151-4164 - Lanlan Rui
, Siqi Yang, Shiyou Chen
, Yang Yang
, Zhipeng Gao
:
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering. 4165-4175 - Bruno Missi Xavier
, Rafael Silva Guimaraes
, Giovanni Comarela
, Magnos Martinello
:
MAP4: A Pragmatic Framework for In-Network Machine Learning Traffic Classification. 4176-4188 - Liang Zhao
, Zhihong Yin, Keping Yu
, Xiongyan Tang, Lexi Xu
, Zhenzhou Guo, Pulkit Nehra:
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs. 4189-4200 - Ting Cao
, Lei Liu
, Kan Wang
, Junhuai Li
:
A Fractional Integral and Fractal Dimension-Based Deep Learning Approach for Pavement Crack Detection in Transportation Service Management. 4201-4212 - Konstantinos D. Stergiou
, Konstantinos E. Psannis
:
Federated Learning Approach Decouples Clients From Training a Local Model and With the Communication With the Server. 4213-4218 - Zhuangzhuang Zhang
, Libing Wu, Debiao He, Qian Wang
, Dan Wu, Xiaochuan Shi
, Chao Ma
:
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning. 4219-4231 - Yawei Yue
, Xingshu Chen
, Zhenhui Han, Xuemei Zeng
, Yi Zhu:
Contrastive Learning Enhanced Intrusion Detection. 4232-4247 - Yuhan Chai
, Jing Qiu
, Lihua Yin, Lejun Zhang, Brij B. Gupta
, Zhihong Tian
:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification. 4248-4261 - Yangyang Mei
, Weihong Han
, Shudong Li
, Kaihan Lin, Cui Luo:
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm. 4262-4272 - Poulmanogo Illy
, Georges Kaddoum
, Paulo Freitas de Araujo-Filho
, Kuljeet Kaur
, Sahil Garg:
A Hybrid Multistage DNN-Based Collaborative IDPS for High-Risk Smart Factory Networks. 4273-4283 - Zhenghao Yang, Ze Wang
, Lei Guo, Wenju Liu, Shimin Sun
:
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN. 4284-4297 - Muhammad Arslan Tariq
, Muhammad Umar Farooq
, Muhammad Zeeshan
, Ali Hassan, Adnan Akhunzada
:
FIPAM: Fuzzy Inference Based Placement and Migration Approach for NFV-Based IoTs. 4298-4309 - Ali El-Amine
, Jean-Paul Chaiban
, Hussein Al Haj Hassan
, Paolo Dini
, Loutfi Nuaymi, Roger Achkar
:
Energy Optimization With Multi-Sleeping Control in 5G Heterogeneous Networks Using Reinforcement Learning. 4310-4322 - Kenta Takeda
, Takehiro Sato
, Bijoy Chand Chatterjee
, Eiji Oki
:
Joint Inter-Core Crosstalk- and Intra-Core Impairment-Aware Lightpath Provisioning Model in Space-Division Multiplexing Elastic Optical Networks. 4323-4337 - Ryota Nakamura
, Ryoichi Kawahara, Takefumi Wakayama, Shigeaki Harada:
Virtual Network Control for Power Bills Reduction and Network Stability. 4338-4349 - Christian Grasso
, Raoul Raftopoulos
, Giovanni Schembra
:
Smart Zero-Touch Management of UAV-Based Edge Network. 4350-4368 - Bijoy Chand Chatterjee
, Imran Ahmed
, Abdul Wadud
, Mukulika Maity
, Eiji Oki
:
BPRIA: Crosstalk-Avoided Bi-Partitioning-Based Counter-Propagation Resource Identification and Allocation for Spectrally-Spatially Elastic Optical Networks. 4369-4383 - Luyao Zou
, Md. Shirajum Munir
, Yan Kyaw Tun
, Seok Won Kang, Choong Seon Hong
:
Intelligent EV Charging for Urban Prosumer Communities: An Auction and Multi-Agent Deep Reinforcement Learning Approach. 4384-4407 - Novak Boskov
, Ari Trachtenberg, David Starobinski
:
GenSync: A New Framework for Benchmarking and Optimizing Reconciliation of Data. 4408-4423 - Inan Kazanci
, Suat Ozdemir
, Suleyman Tosun:
Computation Power and Energy Optimized Task Allocation in Internet of Things. 4424-4433 - Alessio Diamanti
, José Manuel Sánchez-Vílchez, Stefano Secci
:
An AI-Empowered Framework for Cross-Layer Softwarized Infrastructure State Assessment. 4434-4448 - Seunghyun Lee, D. Manjunath
, Changhee Joo
:
On the Economics Effects of CDN-Mediated Delivery on Content Providers. 4449-4460 - Erzhou Zhu
, Zhile Chen, Jie Cui
, Hong Zhong
:
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest. 4461-4478 - Peng-Yong Kong
, Yuming Jiang
:
VNF Orchestration and Power-Disjoint Traffic Flow Routing for Optimal Communication Robustness in Smart Grid With Cyber-Physical Interdependence. 4479-4490 - Gengbiao Shen
, Qing Li
, Wanxin Shi
, Feixue Han, Yong Jiang
, Liang Gu:
Poche: A Priority-Based Flow-Aware In-Network Caching Scheme in Data Center Networks. 4491-4504 - Faezeh Samimi Vajd
, Mohammad Hadi
, Chayan Bhar
, Mohammad Reza Pakravan
, Erik Agrell
:
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul. 4505-4515 - Tal Shapira
, Yuval Shavitt
:
BGP2Vec: Unveiling the Latent Characteristics of Autonomous Systems. 4516-4530 - Qilin Fan
, Pan Pan, Xiuhua Li
, Sen Wang, Jian Li
, Junhao Wen
:
DRL-D: Revenue-Aware Online Service Function Chain Deployment via Deep Reinforcement Learning. 4531-4545 - Kuo Guo
, Jia Chen
, Ping Dong
, Shang Liu
, Deyun Gao
:
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection. 4546-4565 - Shayan Hajipour
, Mehdi Habibi
, Hamzeh Beyranvand
:
Artificial Neural Network-Aided Multiclass Service Provisioning and Prioritization in EONs. 4566-4582 - Ying Hu
, Guang Cheng
, Wenchao Chen, Bomiao Jiang:
Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification. 4583-4599 - Zheng Qu
, Chen Lyu
, Chi-Hung Chi:
MUSH: Multi-Stimuli Hawkes Process Based Sybil Attacker Detector for User-Review Social Networks. 4600-4614 - Chunyu Wei
, Yushun Fan
, Jia Zhang
:
High-Order Social Graph Neural Network for Service Recommendation. 4615-4628 - Giorgia Cappello, Gabriella Colajanni, Patrizia Daniele, Laura Galluccio
, Christian Grasso
, Giovanni Schembra
, Laura Scrimali:
Optimizing FANET Lifetime for 5G Softwarized Network Provisioning. 4629-4649 - Alexandre Heideker
, Carlos Kamienski
:
Network Queuing Assessment: A Method to Detect Bottlenecks in Service Function Chaining. 4650-4661 - Yusufu Shehu
, Robert Harper
:
Enhancements to Language Modeling Techniques for Adaptable Log Message Classification. 4662-4675 - Gianluca Perna, Dena Markudova, Martino Trevisan
, Paolo Garza
, Michela Meo
, Maurizio M. Munafò
, Giovanna Carofiglio
:
Real-Time Classification of Real-Time Communications. 4676-4690 - Jiejun Hu
, Martin J. Reed
, Nikolaos Thomos
, Mays F. Al-Naday
, Kun Yang
:
A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace. 4691-4705 - Yong Liu
, Huaxi Gu
, Zhaoxing Zhou, Ning Wang
:
RSLB: Robust and Scalable Load Balancing in Software-Defined Data Center Networks. 4706-4720 - Yao-Chun Wang
, Ren-Hung Hwang
, Ying-Dar Lin
:
Low-Latency Service Chaining With Predefined NSH-Based Multipath Across Multiple Datacenters. 4721-4733 - Habib Mostafaei
, Georgios Smaragdakis
, Thomas Zinner
, Anja Feldmann
:
Delay-Resistant Geo-Distributed Analytics. 4734-4749 - ZengRi Zeng
, Wei Peng
, Detian Zeng:
Improving the Stability of Intrusion Detection With Causal Deep Learning. 4750-4763 - Clovis Anicet Ouedraogo
, Samir Medjiah
, Christophe Chassot, Khalil Drira
, José Aguilar:
Adaptive Performance Analysis in IoT Platforms. 4764-4778 - Rasoul Behravesh
, Akhila Rao, Daniel F. Perez-Ramirez, Davit Harutyunyan
, Roberto Riggio
, Magnus Boman
:
Machine Learning at the Mobile Edge: The Case of Dynamic Adaptive Streaming Over HTTP (DASH). 4779-4793 - José Jurandir Alves Esteves
, Amina Boubendir
, Fabrice Guillemin
, Pierre Sens
:
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement. 4794-4806 - Daniela M. Casas-Velasco
, Oscar Maurício Caicedo Rendón
, Nelson L. S. da Fonseca
:
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking. 4807-4820 - Saikat Das
, Sajal Saha
, Annita Tahsin Priyoti
, Etee Kawna Roy, Frederick T. Sheldon
, Anwar Haque
, Sajjan G. Shiva
:
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection. 4821-4833 - Sunghwan Kim
, Seunghyun Yoon
, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework. 4834-4846 - Yanjiao Chen, Xuxian Li, Jian Zhang
, Hongliang Bi
:
Multi-Party Payment Channel Network Based on Smart Contract. 4847-4857 - Bo Yin
, Jiaqi Li
, Xuetao Wei
:
EBSF: Node Characteristics-Based Block Allocation Plans for Efficient Blockchain Storage. 4858-4871 - Ahmed Samy
, Ibrahim A. Elgendy
, Haining Yu
, Weizhe Zhang
, Hongli Zhang
:
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning. 4872-4887 - Engin Zeydan
, Jorge Baranda
, Josep Mangues-Bafalluy
, Yekta Turk, S. Bugrahan Ozturk
:
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment. 4888-4904 - Rafael Roque de Souza
, Marcelo Santos
, Michel S. Bonfim
, Kelvin Lopes Dias
, Stenio F. L. Fernandes
:
KDN-Based Fault-Tolerant Scheduling for VNFs in Data Centers. 4905-4917 - Guobing Zou
, Zhiwei Xu
, Xiaoyu Xia, Ya Liu
, Yanglan Gan
, Bofeng Zhang
, Min Zhou
, Qiang He
:
Spatial-Temporal Edge User Allocation: An Expectation Confirmation Perspective Approach. 4918-4931 - Jiayu Yang, Yuxin Chen, Kaiping Xue
, Jiangping Han, Jian Li
, David S. L. Wei
, Qibin Sun, Jun Lu:
IEACC: An Intelligent Edge-Aided Congestion Control Scheme for Named Data Networking With Deep Reinforcement Learning. 4932-4947 - Kaixuan Kang
, Ding Ding
, Huamao Xie
, Qian Yin, Jing Zeng
:
Adaptive DRL-Based Task Scheduling for Energy-Efficient Cloud Computing. 4948-4961 - Xiaoyang Zhao
, Chuan Wu
:
Large-Scale Machine Learning Cluster Scheduling via Multi-Agent Graph Reinforcement Learning. 4962-4974 - Jianming Guo
, Lei Yang
, David Rincón
, Sebastià Sallent
, Quan Chen
, Xianfeng Liu
:
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks. 4975-4988 - Pronaya Bhattacharya
, Farnazbanu Patel, Abdulatif Alabdulatif
, Rajesh Gupta
, Sudeep Tanwar
, Neeraj Kumar
, Ravi Sharma
:
A Deep-Q Learning Scheme for Secure Spectrum Allocation and Resource Management in 6G Environment. 4989-5005 - Ioannis Sarrigiannis
, Angelos Antonopoulos
, Kostas Ramantas
, Maria Efthymiopoulou
, Luis M. Contreras
, Christos V. Verikoukis:
Cost-Aware Placement and Enhanced Lifecycle Management of Service Function Chains in a Multidomain 5G Architecture. 5006-5020 - Trung Thanh Nguyen, Truong Thao Nguyen, Thanh-Hung Nguyen, Phi Le Nguyen:
Fuzzy Q-Learning-Based Opportunistic Communication for MEC-Enhanced Vehicular Crowdsensing. 5021-5033 - Sumanta Dey
, Anusha Mujumdar, Pallab Dasgupta, Soumyajit Dey
:
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping. 5034-5043 - Miguel Camelo
, Paola Soto
, Steven Latré:
A General Approach for Traffic Classification in Wireless Networks Using Deep Learning. 5044-5063 - Meiyi Yang
, Deyun Gao
, Chuan Heng Foh
, Yajuan Qin, Victor C. M. Leung
:
A Learned Bloom Filter-Assisted Scheme for Packet Classification in Software-Defined Networking. 5064-5077 - Asad Waqar Malik
, Anis Ur Rahman
, Arsalan Ahmad
, Max Mauro Dias Santos
:
Over-the-Air Software-Defined Vehicle Updates Using Federated Fog Environment. 5078-5089 - Menglan Hu
, Mai Xiao
, Wenbo Xu, Tianping Deng, Yan Dong
, Kai Peng
:
Traffic Engineering for Software-Defined LEO Constellations. 5090-5103 - Ligia Maria Moreira Zorello
, Laurens Bliek
, Sebastian Troia
, Tias Guns
, Sicco Verwer
, Guido Maier:
Baseband-Function Placement With Multi-Task Traffic Prediction for 5G Radio Access Networks. 5104-5119 - Fadoua Debbabi
, Rihab Jmal
, Lamia Chaari Fourati
, Rui Luis Andrade Aguiar
:
An Overview of Interslice and Intraslice Resource Allocation in B5G Telecommunication Networks. 5120-5132 - Josué Castañeda Cisneros
, Saúl E. Pomares Hernández
, Julio César Pérez Sansalvador
, Lil María Rodríguez-Henríquez
, Sami Yangui
, Khalil Drira:
Coordination-Free Multi-Domain NFV Orchestration for Consistent VNF Forwarding Graph Reconfiguration. 5133-5151 - Giovanni Apruzzese
, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. 5152-5169 - Mehdi Zakroum
, Jérôme François
, Isabelle Chrisment, Mounir Ghogho
:
Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates. 5170-5182 - Zhigang Lu
, Hong Shen
:
Augmentation-Based Edge Differentially Private Path Publishing in Networks. 5183-5195 - Zewei Liu
, Chunqiang Hu
, Hui Xia
, Tao Xiang
, Baolin Wang
, Jiajun Chen
:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. 5196-5207 - Ankur Chowdhary
, Abdulhakim Sabur
, Neha Vadnere, Dijiang Huang
:
Intent-Driven Security Policy Management for Software-Defined Systems. 5208-5223 - Pedro Reviriego
, Alfonso Sánchez-Macián
, Salvatore Pontarelli
, Shanshan Liu
, Fabrizio Lombardi
:
Attacking Adaptive Cuckoo Filters: Too Much Adaptation Can Kill You. 5224-5236 - Nils Mäurer
, Thomas Gräupl
, Corinna Schmitt, Gabi Dreo Rodosek, Helmut Reiser
:
Advancing the Security of LDACS. 5237-5251 - Aimad Berady
, Mathieu Jaume
, Valérie Viet Triem Tong
, Gilles Guette:
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns. 5252-5264 - Eric Osterweil
, Pouyan Fotouhi Tehrani
, Thomas C. Schmidt
, Matthias Wählisch
:
From the Beginning: Key Transitions in the First 15 Years of DNSSEC. 5265-5283 - Joao F. Santos
, Davi da Silva Brilhante
, José Ferreira de Rezende
, Nicola Marchetti
, Marco Ruffini, Luiz A. DaSilva
:
Optimal Embedding of Heterogeneous RAN Slices for Secure and Technology-Agnostic RANaaS. 5284-5298 - Zhongyi Zhai
, Guibing Lai, Bo Cheng
, Junyan Qian
, Lingzhong Zhao, Jinsong Wu
, Zhiguo Wan
:
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC. 5299-5311 - Giovanni Apruzzese
, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov:
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. 5312-5332 - Xiaojun Zhang
, Xin Wang, Dawu Gu
, Jingting Xue, Wei Tang
:
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. 5333-5347 - Kurian Polachan
, Joydeep Pal
, Chandramani Singh
, Prabhakar Venkata Tamma
:
Assessing Quality of Control in Tactile Cyber-Physical Systems. 5348-5365 - Oswaldo Sebastian Peñaherrera-Pulla, Carlos Baena
, Sergio Fortes
, Eduardo Baena
, Raquel Barco
:
KQI Assessment of VR Services: A Case Study on 360-Video Over 4G and 5G. 5366-5382 - Rami A. Khalil
, Naranker Dulay:
AC/DC: Adaptive Cutoffs and Disputable Cutoffs for Robust Critical Transactions in Smart-Contracts. 5383-5394 - Gerald M. Karam
, Markus Gruber
, Iris Adam, François Boutigny, Yoan Miche
, Sarit Mukherjee
:
The Evolution of Networks and Management in a 6G World: An Inventor's View. 5395-5407

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.