


default search action
IEEE Transactions on Network and Service Management, Volume 19
Volume 19, Number 1, March 2022
- Hanan Lutfiyya:

2021 Reviewers for IEEE Transactions on Network and Service Management (TNSM). 3-18 - Ricardo Misael Ayala Molina

, Sadegh Torabi
, Khaled Sarieddine, Elias Bou-Harb
, Nizar Bouguila
, Chadi Assi
:
On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. 19-36 - Omran Ayoub

, Andrea Bovio, Francesco Musumeci
, Massimo Tornatore
:
Survivable Virtual Network Mapping With Fiber Tree Establishment in Filterless Optical Networks. 37-48 - Anubhab Banerjee

, Stephen S. Mwanje
, Georg Carle
:
Toward Control and Coordination in Cognitive Autonomous Networks. 49-60 - Mani Shekhar Gupta

, Krishan Kumar
:
AFSOS: An Auction Framework and Stackelberg Game Oriented Optimal Network's Resource Selection Technique in Cognitive Radio Networks. 61-72 - Tianpeng Ye

, Gaolei Li
, Ijaz Ahmad
, Chaofeng Zhang
, Xiang Lin, Jianhua Li:
FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection. 73-88 - Xingyu Lu

, Jun Liu
, Shengli Gan, Tun Li, Yunpeng Xiao
, Yanbing Liu
:
Recommendation Model Based on Dynamic Interest Group Identification and Data Compensation. 89-99 - Hiroshi Saito

:
Theoretical Design of Geographical Route of Communications Cable Network Supplied by Power Grid to Minimize Disaster Damage. 100-111 - Zelin Wan

, Jin-Hee Cho
, Mu Zhu
, Ahmed H. Anwar
, Charles A. Kamhoua
, Munindar P. Singh
:
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory. 112-129 - Chengyu Wang

, Kui Wu
, Tongqing Zhou
, Guang Yu
, Zhiping Cai
:
TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection. 130-145 - Yatong Wang

, Shuang Qin, Gang Feng
, Jianhong Zhou
, Fengsheng Wei
:
GAN-Based Pareto Optimization for Self-Healing of Radio Access Network Slices. 146-157 - Johannes Zerwas

, Ingmar Poese, Stefan Schmid
, Andreas Blenk
:
On the Benefits of Joint Optimization of Reconfigurable CDN-ISP Infrastructure. 158-173 - Mohd Sameen Chishti

, Farhan Sufyan
, Amit Banerjee
:
Decentralized On-Chain Data Access via Smart Contracts in Ethereum Blockchain. 174-187 - Guobiao He

, Wei Su
, Shuai Gao, Ningchun Liu
, Sajal K. Das
:
NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture. 188-202 - Suhan Jiang

, Jie Wu
:
A Blockchain-Powered Data Market for Multi-User Cooperative Search. 203-215 - Gordon Owusu Boateng

, Daniel Ayepah-Mensah
, Daniel Mawunyo Doe
, Abegaz Mohammed Seid
, Guolin Sun
, Guisong Liu
:
Blockchain-Enabled Resource Trading and Deep Reinforcement Learning-Based Autonomous RAN Slicing in 5G. 216-227 - Roman-Valentyn Tkachuk

, Dragos Ilie
, Kurt Tutschku
, Remi Robert
:
A Survey on Blockchain-Based Telecommunication Services Marketplaces. 228-255 - Hao Feng

, Yuhui Deng
, Yi Zhou
, Geyong Min
:
Towards Heat-Recirculation-Aware Virtual Machine Placement in Data Centers. 256-270 - Ke Gu

, Wenbin Zhang, Xiong Li
, Weijia Jia:
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. 271-288 - Hongchang Ke

, Hui Wang
, Weijia Sun
, Hongbin Sun:
Adaptive Computation Offloading Policy for Multi-Access Edge Computing in Heterogeneous Wireless Networks. 289-305 - Giovanni Perin

, Michele Berno, Tomaso Erseghe
, Michele Rossi:
Towards Sustainable Edge Computing Through Renewable Energy Resources and Online, Distributed and Predictive Scheduling. 306-321 - Walter Cerroni

, Luca Foschini
, Genady Ya. Grabarnik, Filippo Poltronieri
, Larisa Shwartz
, Cesare Stefanelli
, Mauro Tortonesi
:
BDMaaS+: Business-Driven and Simulation-Based Optimization of IT Services in the Hybrid Cloud. 322-337 - Nannan Zhang

, Wei Wang
, Pan Zhou
, Aiping Huang
:
Delay-Optimal Edge Caching With Imperfect Content Fetching via Stochastic Learning. 338-352 - Bowen Bao

, Hui Yang
, Qiuyan Yao
, Ao Yu
, Bijoy Chand Chatterjee
, Eiji Oki
, Jie Zhang:
SDFA: A Service-Driven Fragmentation-Aware Resource Allocation in Elastic Optical Networks. 353-365 - Mah-Rukh Fida

, Andrés F. Ocampo, Ahmed Elmokashfi
:
Measuring and Localising Congestion in Mobile Broadband Networks. 366-380 - Naser Hossein Motlagh

, Shubham Kapoor, Rola Alhalaseh
, Sasu Tarkoma
, Kimmo Hätönen:
Quality of Monitoring for Cellular Networks. 381-391 - Ahan Kak

, Ian F. Akyildiz
:
Towards Automatic Network Slicing for the Internet of Space Things. 392-412 - Mohamed Mekki

, Sagar Arora
, Adlen Ksentini
:
A Scalable Monitoring Framework for Network Slicing in 5G and Beyond Mobile Networks. 413-423 - Ghasem Mirjalily

, Mina Asgarian
, Zhi-Quan Luo
:
Interference-Aware NFV-Enabled Multicast Service in Resource-Constrained Wireless Mesh Networks. 424-436 - Amirhossein Shaghaghi

, Abolfazl Zakeri
, Nader Mokari
, Mohammad Reza Javan
, Mohammad Behdadfar, Eduard A. Jorswieck
:
Proactive and AoI-Aware Failure Recovery for Stateful NFV-Enabled Zero-Touch 6G Networks: Model-Free DRL Approach. 437-451 - Mengfei Zhu

, Fujun He
, Eiji Oki
:
Optimization Model for Primary and Backup Resource Allocation With Workload-Dependent Failure Probability. 452-471 - Rami Akrem Addad

, Diego Leonel Cadette Dutra
, Tarik Taleb
, Hannu Flinck
:
AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks. 472-484 - João Victor Guimarães de Oliveira

, Pedro Clemente Pereira Bellotti
, Roberto Massi de Oliveira
, Alex Borges Vieira
, Luciano Jerez Chaves
:
Virtualizing Packet-Processing Network Functions Over Heterogeneous OpenFlow Switches. 485-496 - Matheus S. Castanho

, Cristina K. Dominicini
, Magnos Martinello
, Marcos A. M. Vieira
:
Chaining-Box: A Transparent Service Function Chaining Architecture Leveraging BPF. 497-509 - Pragati Shrivastava

, Kotaro Kataoka
:
Topology Poisoning Attacks and Prevention in Hybrid Software-Defined Networks. 510-523 - Yanghao Xie

, Lin Huang, Yuyang Kong, Sheng Wang
, Shizhong Xu, Xiong Wang
, Jing Ren:
Virtualized Network Function Forwarding Graph Placing in SDN and NFV-Enabled IoT Networks: A Graph Neural Network Assisted Deep Reinforcement Learning Method. 524-537 - Cenk Gündogan

, Christian Amsüss
, Thomas C. Schmidt
, Matthias Wählisch
:
Content Object Security in the Internet of Things: Challenges, Prospects, and Emerging Solutions. 538-553 - I. R. Divyasree, K. Selvamani:

DAD: Domain Adversarial Defense System Against DDoS Attacks in Cloud. 554-568 - Xiaoyan Zhang, Shunrong Jiang

, Yiliang Liu
, Tao Jiang
, Yong Zhou
:
Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain. 569-581 - Ryan Mills

, Angelos K. Marnerides
, Matthew Broadbent
, Nicholas J. P. Race
:
Practical Intrusion Detection of Emerging Threats. 582-600 - Bruno Henrique Schwengber, Andressa Vergütz, Nelson G. Prates, Michele Nogueira

:
Learning From Network Data Changes for Unsupervised Botnet Detection. 601-613 - Silvio Ereno Quincozes

, Daniel Mossé, Diego G. Passos
, Célio Vinicius N. de Albuquerque
, Luiz Satoru Ochi
, Vinícius Figueiredo dos Santos:
On the Performance of GRASP-Based Feature Selection for CPS Intrusion Detection. 614-626 - Mohammad A. Salahuddin

, Vahid Pourahmadi
, Hyame Assem Alameddine
, Md. Faizul Bari
, Raouf Boutaba
:
Chronos: DDoS Attack Detection Using Time-Based Autoencoder. 627-641 - Darshana Upadhyay

, Marzia Zaman
, Rohit Joshi
, Srinivas Sampalli
:
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems. 642-660 - Akbar Telikani

, Amir H. Gandomi
, Kim-Kwang Raymond Choo
, Jun Shen
:
A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification. 661-670 - Zhijun Wu

, Pan Gao
, Lei Cui
, Jiusheng Chen
:
An Incremental Learning Method Based on Dynamic Ensemble RVM for Intrusion Detection. 671-685 - Li Yang

, Abdallah Moubayed
, Abdallah Shami
, Parisa Heidari, Amine Boukhtouta, Adel Larabi, Richard Brunner, Stere Preda, Daniel Migault:
Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection. 686-705 - Qisheng Zhang

, Abdullah Zubair Mohammed, Zelin Wan
, Jin-Hee Cho
, Terrence J. Moore
:
Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey. 706-728 - Derian Alencar

, Cristiano Both
, Rodolfo Stoffel Antunes
, Helder M. N. S. Oliveira, Eduardo Cerqueira
, Denis Rosário
:
Dynamic Microservice Allocation for Virtual Reality Distribution With QoE Support. 729-740 - Ershuai Li

, Feng He
, Qiao Li
, Huagang Xiong
:
Bandwidth Allocation of Stream-Reservation Traffic in TSN. 741-755 - Arled Papa

, Alba Jano
, Serkut Ayvasik
, Onur Ayan
, H. Murat Gürsu
, Wolfgang Kellerer
:
User-Based Quality of Service Aware Multi-Cell Radio Access Network Slicing. 756-768
Volume 19, Number 2, June 2022
- Poulmanogo Illy

, Georges Kaddoum
, Kuljeet Kaur
, Sahil Garg
:
ML-Based IDPS Enhancement With Complementary Features for Home IoT Networks. 772-783 - Debobroto Das Robin

, Javed I. Khan:
CLB: Coarse-Grained Precision Traffic-Aware Weighted Cost Multipath Load Balancing on PISA. 784-803 - Joy Halder

, Tamaghna Acharya
, Uma Bhattacharya
:
A Novel RSCA Scheme for Offline Survivable SDM-EON With Advance Reservation. 804-817 - Yaoyao Li

, Xin Jian
, Keping Yu
, Neeraj Kumar
, Shaoxiong Cai
:
Theoretical Performance Analysis of Distributed Queue for Massive Machine Type Communications: Throughput, Latency, Energy Consumption. 818-828 - Meng Niu

, Qingmian Han, Bo Cheng
, Meng Wang
, Ziqi Xu, Wenyuan Gu, Shuhao Zhang, Junliang Chen:
HARS: A High-Available and Resource-Saving Service Function Chain Placement Approach in Data Center Networks. 829-847 - Pedro Reviriego

, Alfonso Sánchez-Macián
, Ori Rottenstreich, David Larrabeiti
:
Adaptive One Memory Access Bloom Filters. 848-859 - Priyatosh Mandal

:
Comparison of Placement Variants of Virtual Network Functions From Availability and Reliability Perspective. 860-874 - Yipeng Wang

, Xiaochun Yun, Yongzheng Zhang, Chen Zhao, Xin Liu:
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. 875-889 - Qing Li

, Yichao Wu
, Jingpu Duan, Jiahai Yang
, Yong Jiang
:
Weighted NSFIB Aggregation With Generalized Next Hop of Strict Partial Order. 890-904 - Weili Wang

, Lun Tang
, Chenmeng Wang
, Qianbin Chen
:
Real-Time Analysis of Multiple Root Causes for Anomalies Assisted by Digital Twin in NFV Environment. 905-921 - Guobing Zou

, Song Yang, Shengyu Duan
, Bofeng Zhang
, Yanglan Gan
, Yixin Chen
:
DeepLTSC: Long-Tail Service Classification via Integrating Category Attentive Deep Neural Network and Feature Augmentation. 922-935 - Hancheng Lu

, Fangyu Zhang
:
Resource Fragmentation-Aware Embedding in Dynamic Network Virtualization Environments. 936-948 - Alex S. Santos, Juliana de Santi

, Gustavo B. Figueiredo
, Biswanath Mukherjee
:
Application-Aware Service Degradation in Elastic Optical Networks. 949-961 - Ranyin Wang

, Abdol-Hamid Aghvami
, Vasilis Friderikos
:
Service-Aware Design Policy of End-to-End Network Slicing for 5G Use Cases. 962-975 - Carlos López

, Daniel Morató
, Eduardo Magaña
, Mikel Izal
:
Validation of HTTP Response Time From Network Traffic as an Alternative to Web Browser Instrumentation. 976-990 - Fu Wang

, Haipeng Yao
, Qi Zhang
, Jingjing Wang
, Ran Gao, Dong Guo
, Mohsen Guizani
:
Dynamic Distributed Multi-Path Aided Load Balancing for Optical Data Center Networks. 991-1005 - Kate Ching-Ju Lin

, Pei-Ling Chou:
VNF Embedding and Assignment for Network Function Parallelism. 1006-1016 - Zuo Xiang

, Malte Höweler
, Dongho You
, Martin Reisslein
, Frank H. P. Fitzek
:
X-MAN: A Non-Intrusive Power Manager for Energy-Adaptive Cloud-Native Network Functions. 1017-1035 - Nikolaos Koursioumpas

, Sokratis Barmpounakis
, Ioannis Stavrakakis
, Nancy Alonistioti:
AI-driven, Context-Aware Profiling for 5G and Beyond Networks. 1036-1048 - Waixi Liu

, Jinjie Lu
, Jun Cai
, Yinghao Zhu, Sen Ling, Qingchun Chen
:
DRL-PLink: Deep Reinforcement Learning With Private Link Approach for Mix-Flow Scheduling in Software-Defined Data-Center Networks. 1049-1064 - Vijay Varadharajan

, Kallol Krishna Karmakar
, Uday Kiran Tupakula, Michael Hitchens
:
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures. 1065-1082 - Yihong He

, Weibo Cai, Pan Zhou
, Gang Sun
, Shouxi Luo, Hongfang Yu
, Mohsen Guizani
:
Beamer: Stage-Aware Coflow Scheduling to Accelerate Hyper-Parameter Tuning in Deep Learning Clusters. 1083-1097 - Mengfei Zhu

, Fujun He
, Eiji Oki
:
Resource Allocation Model Against Multiple Failures With Workload-Dependent Failure Probability. 1098-1116 - Nazli Siasi

, Mohammed A. Jasim
, Aysegül Yayimli, Nasir Ghani
:
Service Function Chain Survivability Provisioning in Fog Networks. 1117-1128 - Kostas Choumas

, Thanasis Korakis:
On Using Raft Over Networks: Improving Leader Election. 1129-1141 - Runkai Yang

, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Hongyue Kang
:
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack. 1142-1158 - Zhuofan Liao

, Xiang Pang, Jingyu Zhang, Bing Xiong
, Jin Wang
:
Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey. 1159-1175 - Ryeong Hwan Kim

, Hyunmin Noh, Hwangjun Song
, Gi Seok Park
:
Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G Networks. 1176-1190 - Xiaoqing Wang

, Chunping Wang, Kun Zhou, Hongbing Cheng
:
ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin Network. 1191-1202 - Mahmoud Abouyoussef

, Muhammad Ismail
:
Blockchain-Based Privacy-Preserving Networking Strategy for Dynamic Wireless Charging of EVs. 1203-1215 - Linhui Li

, Peichang Shi, Xiang Fu
, Peng Chen, Tao Zhong, Jinzhu Kong:
Three-Dimensional Tradeoffs for Consensus Algorithms: A Review. 1216-1228 - Yanjiao Chen

, Yuyang Ran, Jingyue Zhou, Jian Zhang
, Xueluan Gong
:
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks. 1229-1242 - Xiangqiang Gao

, Rongke Liu
, Aryan Kaushik
:
Virtual Network Function Placement in Satellite Edge Computing With a Potential Game Approach. 1243-1259 - Cheng Hu

, Yingya Guo
, Yuhui Deng
, Longya Lang:
Improve the Energy Efficiency of Datacenters With the Awareness of Workload Variability. 1260-1273 - Hao Yang

, Xiaoqin Pan, Sicheng Zhao, Binjie Ge, Hang Yu
, Zuqing Zhu
:
On the Bilevel Optimization for Remapping Virtual Networks in an HOE-DCN. 1274-1286 - Jorge Ortín

, Pablo Serrano
, Jaime García-Reinoso
, Albert Banchs
:
Analysis of Scaling Policies for NFV Providing 5G/6G Reliability Levels With Fallible Servers. 1287-1305 - Lisheng Ma

, Wei Su
, Bin Wu, Bin Yang
, Xiaohong Jiang
:
Joint Emergency Data and Service Evacuation in Cloud Data Centers Against Early Warning Disasters. 1306-1320 - Behshid Shayesteh

, Chunyan Fu, Amin Ebrahimzadeh, Roch H. Glitho
:
Automated Concept Drift Handling for Fault Prediction in Edge Clouds Using Reinforcement Learning. 1321-1335 - Ahmed Saleh Bataineh

, Jamal Bentahar
, Rabeb Mizouni
, Omar Abdel Wahab
, Gaith Rjoub
, May El Barachi
:
Cloud Computing as a Platform for Monetizing Data Services: A Two-Sided Game Business Model. 1336-1350 - Polychronis Valsamas

, Lefteris Mamatas
, Luis M. Contreras
:
A Comparative Evaluation of Edge Cloud Virtualization Technologies. 1351-1365 - Tanya Shreedhar

, Rohit Panda, Sergey Podanev, Vaibhav Bajpai
:
Evaluating QUIC Performance Over Web, Cloud Storage, and Video Workloads. 1366-1381 - Zhaorui Wu

, Yuhui Deng
, Hao Feng
, Yi Zhou
, Geyong Min
, Zhen Zhang
:
Blender: A Container Placement Strategy by Leveraging Zipf-Like Distribution Within Containerized Data Centers. 1382-1398 - Yijing Li

, Shihong Hu
, Guanghui Li
:
CVC: A Collaborative Video Caching Framework Based on Federated Learning at the Edge. 1399-1412 - Anirban Lekharu

, Mitansh Jain
, Arijit Sur, Arnab Sarkar:
Deep Learning Model for Content Aware Caching at MEC Servers. 1413-1425 - Fengsheng Wei

, Shuang Qin, Gang Feng
, Yao Sun
, Jian Wang, Ying-Chang Liang
:
Hybrid Model-Data Driven Network Slice Reconfiguration by Exploiting Prediction Interval and Robust Optimization. 1426-1441 - Lalhruaizela Chhangte

, Nikhil Karamchandani
, D. Manjunath
, Emanuele Viterbo
:
On Index Coded Video Delivery at the WiFi Edge: Performance and System Design. 1442-1457 - Atri Mukhopadhyay

, George Iosifidis, Marco Ruffini:
Migration-Aware Network Services With Edge Computing. 1458-1471 - Akshita Gupta

, Vivek Ashok Bohara
, Anand Srivastava:
Techno-Socio-Economic Impact of Joint Energy Resource Allocation Scheme in FiWi Network. 1472-1488 - Ramon Perez

, Priscilla Benedetti
, Matteo Pergolesi
, Jaime García-Reinoso
, Aitor Zabala
, Pablo Serrano
, Mauro Femminella
, Gianluca Reali
, Kris Steenhaut
, Albert Banchs
:
Monitoring Platform Evolution Toward Serverless Computing for 5G and Beyond Systems. 1489-1504 - Emanuel Lima

, Ana Aguiar
, Paulo Carvalho
, Aline Carneiro Viana
:
Human Mobility Support for Personalized Data Offloading. 1505-1520 - Vasilis Maglogiannis

, Dries Naudts
, Seilendria A. Hadiwardoyo, Daniel van den Akker, Johann Márquez-Barja
, Ingrid Moerman
:
Experimental V2X Evaluation for C-V2X and ITS-G5 Technologies in a Real-Life Highway Environment. 1521-1538 - Huijun Tang

, Huaming Wu
, Yubin Zhao
, Ruidong Li
:
Joint Computation Offloading and Resource Allocation Under Task-Overflowed Situations in Mobile-Edge Computing. 1539-1553 - Amandeep Kaur

, Krishan Kumar
:
A Reinforcement Learning-Based Green Resource Allocation for Heterogeneous Services in Cooperative Cognitive Radio Networks. 1554-1566 - Moubarak Zoure

, Toufik Ahmed
, Laurent Réveillère:
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods. 1567-1584 - Wei Kuang Lai

, You-Chiun Wang
, Yi-Chien Chen, Zong-Ting Tsai
:
TSSM: Time-Sharing Switch Migration to Balance Loads of Distributed SDN Controllers. 1585-1597 - Mahdi Dolati

, Ahmad Khonsari
, Majid Ghaderi
:
Minimizing Update Makespan in SDNs Without TCAM Overhead. 1598-1613 - Cheng Ren

, Hao Li
, Yaxin Li
, Yu Wang
, Haiyun Xiang, Xuxiang Chen
:
On Efficient Service Function Chaining in Hybrid Software Defined Networks. 1614-1628 - Yuncan Zhang

, Fujun He
, Eiji Oki
:
Service Chain Provisioning With Sub-Chain-Enabled Coordinated Protection to Satisfy Availability Requirements. 1629-1649 - Rohit Kumar

, U. Venkanna
, Vivek Tiwari
:
EOMCSR: An Energy Optimized Multi-Constrained Sustainable Routing Model for SDWSN. 1650-1661 - Pedro Pablo Cespedes Sanchez

, Bader Maluff
, Diego P. Pinto-Roa, Horacio Legal Ayala
:
Hybrid Incremental Deployment of HSDN Devices. 1662-1678 - Loïc D. Tsobdjou

, Samuel Pierre, Alejandro Quintero
:
An Online Entropy-Based DDoS Flooding Attack Detection System With Dynamic Threshold. 1679-1689 - Hongbin Luo

, Zhoubiao Liu
, Shan Zhang
:
Preventing DDoS Flooding Attacks With Cryptographic Path Identifiers in Future Internet. 1690-1704 - Beibei Li

, Shang Ma
, Ruilong Deng
, Kim-Kwang Raymond Choo
, Jin Yang
:
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach. 1705-1716 - Chenxin Duan

, Hao Gao, Guanglei Song
, Jiahai Yang
, Zhiliang Wang
:
ByteIoT: A Practical IoT Device Identification System Based on Packet Length Distribution. 1717-1728 - Claas Lorenz

, Vera Clemens
, Max Schrötter, Bettina Schnor:
Continuous Verification of Network Security Compliance. 1729-1745 - Zhen Zeng

, Zhun Yang
, Dijiang Huang
, Chun-Jen Chung:
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. 1746-1760 - Kaiping Xue

, Jiayu Yang, Qiudong Xia, David S. L. Wei, Jian Li
, Qibin Sun, Jun Lu:
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking. 1761-1775 - Nadia Pocher

, Andreas G. Veneris:
Privacy and Transparency in CBDCs: A Regulation-by-Design AML/CFT Scheme. 1776-1788 - Xiaoteng Ma

, Qing Li
, Yong Jiang
, Gabriel-Miro Muntean
, Longhao Zou:
Learning-Based Joint QoE Optimization for Adaptive Video Streaming Based on Smart Edge. 1789-1806 - Jonathan Falk

, Heiko Geppert
, Frank Dürr
, Sukanya Bhowmik
, Kurt Rothermel
:
Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows in the Real-Time Data Plane. 1807-1825 - Dimitra Tsigkari

, Thrasyvoulos Spyropoulos:
An Approximation Algorithm for Joint Caching and Recommendations in Cache Networks. 1826-1841 - Ferenc Fejes, Szilveszter Nádas

, Gergo Gombos
, Sándor Laki
:
DeepQoS: Core-Stateless Hierarchical QoS in Programmable Switches. 1842-1861 - Ammar Latif

, Rahul Parameswaran, Sachin Vishwarupe, Abdallah Khreishah
, Yaser Jararweh
, Ali Hamdan Alenezi:
MediaFlow: Multicast Routing and In-Network Monitoring for Professional Media Production. 1862-1875 - Yahuza Bello

, Ahmed Refaey Hussein
, Mehmet Ulema
, Juanita Koilpillai:
On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond. 1876-1889 - Gilson Miranda

, Daniel Fernandes Macedo
, Johann M. Márquez-Barja
:
Estimating Video on Demand QoE From Network QoS Through ICMP Probes. 1890-1902 - Tushar Bose

, Aala Suresh
, Om Jee Pandey
, Linga Reddy Cenkeramaddi
, Rajesh M. Hegde:
Improving Quality-of-Service in Cluster-Based UAV-Assisted Edge Networks. 1903-1919 - Wesley da Silva Coelho

, Amal Benhamiche, Nancy Perrot
, Stefano Secci
:
Function Splitting, Isolation, and Placement Trade-Offs in Network Slicing. 1920-1936 - Jiachen Zu

, Guyu Hu, Dongyang Peng, Shengxu Xie
, Wenbin Gao:
Corrections to "Fair Scheduling and Rate Control for Service Function Chain in NFV-Enabled Data Center". 1937
Volume 19, Number 3, September 2022
- Giovanni Schembra

, Wolfgang Kellerer
, Christian Jacquenet
, Noriaki Kamiyama
, Barbara Martini, Rafael Pasquini
, Dimitrios Pezaros
, Roberto Riggio
, Hongke Zhang
, Mohamed Faten Zhani
, Thomas Zinner
:
Guest Editors' Introduction: Special Section on Smart Management of Future Softwarized Networks. 1942-1950 - Shwetha Vittal

, A. Antony Franklin
:
HARNESS: High Availability Supportive Self Reliant Network Slicing in 5G Networks. 1951-1964 - Claudia Carballo González

, Ernesto Fontes Pupo
, Luigi Atzori
, Maurizio Murroni
:
Dynamic Radio Access Selection and Slice Allocation for Differentiated Traffic Management on Future Mobile Networks. 1965-1981 - Akito Suzuki

, Ryoichi Kawahara, Shigeaki Harada:
Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation With Traffic Fluctuations. 1982-2000 - Jean-Baptiste Monteil

, George Iosifidis
, Luiz A. DaSilva
:
Learning-Based Reservation of Virtualized Network Resources. 2001-2016 - Claudio Casetti

, Carla-Fabiana Chiasserini
, Silvio Marcato
, Corrado Puligheddu
, Josep Mangues-Bafalluy
, Jorge Baranda
, Juan Brenes
, Francesco Bocchi
, Giada Landi
, Bahador Bakhshi
:
ML-Driven Provisioning and Management of Vertical Services in Automated Cellular Networks. 2017-2033 - Raffaele Bolla, Roberto Bruschi

, Franco Davoli
, Chiara Lombardo
, Jane Frances Pajo
:
Multi-Site Resource Allocation in a QoS-Aware 5G Infrastructure. 2034-2047 - Ruixin Chen

, Jin Zhao
:
Scalable and Flexible Traffic Steering for Service Function Chains. 2048-2062 - Danyang Zheng

, Gangxiang Shen
, Xiaojun Cao
, Biswanath Mukherjee
:
Towards Optimal Parallelism-Aware Service Chaining and Embedding. 2063-2077 - Xinyi Zhang

, Kavé Salamatian
, Gaogang Xie
:
Improving Open Virtual Switch Performance Through Tuple Merge Relaxation in Software Defined Networks. 2078-2091 - Ori Rottenstreich

, Ariel Kulik
, Ananya Joshi, Jennifer Rexford, Gábor Rétvári, Daniel Sadoc Menasché
:
Data Plane Cooperative Caching With Dependencies. 2092-2106 - Prashant Kumar

, Saksham Bhushan
, Debajyoti Halder
, Anand M. Baswade
:
fybrrLink: Efficient QoS-Aware Routing in SDN Enabled Future Satellite Networks. 2107-2118 - Menglan Hu

, Jun Li
, Chao Cai
, Tianping Deng, Wenbo Xu, Yan Dong
:
Software Defined Multicast for Large-Scale Multi-Layer LEO Satellite Networks. 2119-2130 - Gianluca Davoli

, Walter Cerroni
, Davide Borsatti
, Mario Valieri
, Daniele Tarchi
, Carla Raffaelli
:
A Fog Computing Orchestrator Architecture With Service Model Awareness. 2131-2147 - Hao Yu

, Tarik Taleb, Jiawei Zhang
:
Deterministic Latency/Jitter-Aware Service Function Chaining Over Beyond 5G Edge Fabric. 2148-2162 - Pankaj Kumar Kashyap

, Sushil Kumar
, Ankita Jaiswal, Omprakash Kaiwartya
, Manoj Kumar, Upasana Dohare
, Amir H. Gandomi
:
DECENT: Deep Learning Enabled Green Computation for Edge Centric 6G Networks. 2163-2177 - Emeka Obiodu

, Aravindh Raman, Abdullahi Kutiriko Abubakar
, Simone Mangiante
, Nishanth Sastry
, A. Hamid Aghvami
:
DSM-MoC as Baseline: Reliability Assurance via Redundant Cellular Connectivity in Connected Cars. 2178-2194 - Moisés Felipe Silva

, Alessandro Pacini
, Andrea Sgambelluri
, Luca Valcarenghi
:
Learning Long- and Short-Term Temporal Patterns for ML-Driven Fault Management in Optical Communication Networks. 2195-2206 - Trung V. Phan

, Thomas Bauschert:
DeepAir: Deep Reinforcement Learning for Adaptive Intrusion Response in Software-Defined Networks. 2207-2218 - Sogand SadrHaghighi

, Mahdi Dolati
, Majid Ghaderi
, Ahmad Khonsari
:
Monitoring OpenFlow Virtual Networks via Coordinated Switch-Based Traffic Mirroring. 2219-2237 - Arun Raghuramu, Lianjie Cao

, Puneet Sharma, Mario Sánchez
, Joon-Myung Kang
, Chen-Nee Chuah
, David Lee, Vinay Saxena:
Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems. 2238-2250 - Rémi Badonnel

, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza
, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. 2251-2254 - Tal Shapira

, Yuval Shavitt
:
AP2Vec: An Unsupervised Approach for BGP Hijacking Detection. 2255-2268 - Liyan Yang

, Yubo Song
, Shang Gao
, Aiqun Hu
, Bin Xiao
:
Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN. 2269-2281 - Marco Zuppelli

, Matteo Repetto
, Andreas Schaffhauser, Wojciech Mazurczyk
, Luca Caviglione
:
Code Layering for the Detection of Network Covert Channels in Agentless Systems. 2282-2294 - Shuaishuai Tan

, Xiaoxiong Zhong
, Zhiyi Tian
, Qingkuan Dong:
Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS. 2295-2308 - Léo Lavaur

, Marc-Oliver Pahl
, Yann Busnel
, Fabien Autrel
:
The Evolution of Federated Learning-Based Intrusion Detection and Mitigation: A Survey. 2309-2332 - Kim Hammar

, Rolf Stadler
:
Intrusion Prevention Through Optimal Stopping. 2333-2348 - Quinn Burke

, Fidan Mehmeti
, Rahul George
, Kyle Ostrowski, Trent Jaeger
, Thomas F. La Porta
, Patrick D. McDaniel
:
Enforcing Multilevel Security Policies in Unstable Networks. 2349-2365 - Quan Ren

, Zehua Guo
, Jiangxing Wu, Tao Hu
, Lu Jie
, Yuxiang Hu, Lei He
:
SDN-ESRC: A Secure and Resilient Control Plane for Software-Defined Networks. 2366-2381 - Matteo Repetto

, Gianmarco Bruno
, Jalolliddin Yusupov
, Guerino Lamanna
, Benjamin Ertl
, Alessandro Carrega
:
Automating Mitigation of Amplification Attacks in NFV Services. 2382-2396 - Marco Anisetti

, Claudio A. Ardagna
, Filippo Berto
, Ernesto Damiani
:
A Security Certification Scheme for Information-Centric Networks. 2397-2408 - Lingyan Xue

, Haiping Huang
, Fu Xiao
, Wenming Wang
:
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums. 2409-2420 - Suhui Liu

, Liquan Chen
, Huaqun Wang
, Shihui Fu
, Lin Shi:
O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks. 2421-2433 - Massimo Tornatore

, Teresa Gomes
, Carmen Mas Machuca, Eiji Oki, Chadi Assi, Dominic Schupke:
Guest Editors Introduction: Special Section on Recent Advances in the Design and Management of Reliable Communication Networks. 2434-2439 - Sasko Ristov

, Dragi Kimovski
, Thomas Fahringer
:
FaaScinating Resilience for Serverless Function Choreographies in Federated Clouds. 2440-2452 - Ferenc Mogyorósi

, Péter Babarczi
, Johannes Zerwas
, Andreas Blenk
, Alija Pasic
:
Resilient Control Plane Design for Virtualized 6G Core Networks. 2453-2467 - Muhammad Taqi Raza

, Zhowei Tan, Ali Tufail
, Fatima Muhammad Anwar:
LTE NFV Rollback Recovery. 2468-2477 - Hernani D. Chantre

, Nelson L. S. da Fonseca
:
Design of 5G MEC-Based Networks With 1: N: K Protection Scheme. 2478-2491 - Mouhamad Dieye

, Amina Mseddi
, Wael Jaafar
, Halima Elbiaze
:
Towards Reliable Remote Health Monitoring in Fog Computing Networks. 2506-2520 - Alessio Sacco

, Flavio Esposito
, Guido Marchetto
:
Restoring Application Traffic of Latency-Sensitive Networked Systems Using Adversarial Autoencoders. 2521-2535 - Fernando Nakayama

, Paulo Lenz
, Michele Nogueira
:
A Resilience Management Architecture for Communication on Portable Assisted Living. 2536-2548 - Jingpei Wang

, Zhenyong Zhang
, Mufeng Wang
:
A Trust Management Method Against Abnormal Behavior of Industrial Control Networks Under Active Defense Architecture. 2549-2572 - Milan Groshev

, Jorge Martín-Pérez
, Carlos Guimarães
, Antonio de la Oliva
, Carlos J. Bernardos
:
FoReCo: A Forecast-Based Recovery Mechanism for Real-Time Remote Control of Robotic Manipulators. 2573-2586 - Rujia Zou

, Hiroshi Hasegawa, Masahiko Jinno
, Suresh Subramaniam
:
DRAMA+: Disaster Management With Mitigation Awareness for Translucent Elastic Optical Networks. 2587-2599 - Meihan Wu, Nelson L. S. da Fonseca

, Zuqing Zhu
:
Dynamic Cross-Layer Restoration to Resolve Packet Layer Outages in FlexE-Over-EONs. 2600-2611 - Wei Wang

, Yongli Zhao
, Yuanjian Zhang, Xinyi He
, Yue Liu, Jie Zhang
:
Intersatellite Laser Link Planning for Reliable Topology Design in Optical Satellite Networks: A Networking Perspective. 2612-2624 - Meenakshi Syamkumar

, Yugali Gullapalli, Wei Tang, Paul Barford
, Joel Sommers
:
BigBen: Telemetry Processing for Internet-Wide Event Monitoring. 2625-2638 - Rafael S. Guimarães

, Cristina K. Dominicini
, Victor M. Garcia Martinez
, Bruno Missi Xavier
, Diego R. Mafioletti
, Ana C. Locateli
, Rodolfo da Silva Villaça, Magnos Martinello
, Moisés R. N. Ribeiro
:
M-PolKA: Multipath Polynomial Key-Based Source Routing for Reliable Communications. 2639-2651 - Sebastian Troia

, Marco Mazzara
, Marco Savi
, Ligia Maria Moreira Zorello
, Guido Maier:
Resilience of Delay-Sensitive Services With Transport-Layer Monitoring in SD-WAN. 2652-2663 - Miaomiao Wang

, Lanlan Rui
, Yang Yang
, Zhipeng Gao
, Xingyu Chen:
A Blockchain-Based Multi-CA Cross-Domain Authentication Scheme in Decentralized Autonomous Network. 2664-2676 - Ronghua Xu

, Yu Chen
:
μDFL: A Secure Microchained Decentralized Federated Learning Fabric Atop IoT Networks. 2677-2688 - Chankyun Lee

, Il Kwon Sohn, Wonhyuk Lee:
Eavesdropping Detection in BB84 Quantum Key Distribution Protocols. 2689-2701 - Carlos Natalino

, Marco Schiano
, Andrea Di Giglio
, Marija Furdek
:
Root Cause Analysis for Autonomous Optical Network Security Management. 2702-2713 - Gorla Praveen

, Anuj Deshmukh
, Sandeep Joshi
, Vinay Chamola
, Mohsen Guizani
:
A Game Theoretic Analysis for Power Management and Cost Optimization of Green Base Stations in 5G and Beyond Communication Networks. 2714-2725 - Abd Ullah Khan

, Ghulam Abbas
, Ziaul Haq Abbas
, Muhammad Bilal
, Sayed Chhattan Shah
, Houbing Song
:
Reliability Analysis of Cognitive Radio Networks With Reserved Spectrum for 6G-IoT. 2726-2737 - Nour-El-Houda Yellas

, Selma Boumerdassi
, Alberto Ceselli
, Bilal Maaz
, Stefano Secci
:
Robust Access Point Clustering in Edge Computing Resource Optimization. 2738-2750 - Azza H. Ahmed

, Ahmed Elmokashfi
:
ICRAN: Intelligent Control for Self-Driving RAN Based on Deep Reinforcement Learning. 2751-2766 - Gabriele Gemmi

, Renato Lo Cigno
, Leonardo Maccari
:
On Cost-Effective, Reliable Coverage for LoS Communications in Urban Areas. 2767-2779 - Zhuoqun Xia, Xiaoxiao Mao

, Ke Gu
, Weijia Jia
:
Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs. 2780-2797 - Prasenjit Karmakar

, Vijay K. Shah
, Satyaki Roy
, Krishnandu Hazra
, Sujoy Saha, Subrata Nandi:
Reliable Backhauling in Aerial Communication Networks Against UAV Failures: A Deep Reinforcement Learning Approach. 2798-2811 - Jie Li

, Vasileios Giotsas
, Yangyang Wang, Shi Zhou:
BGP-Multipath Routing in the Internet. 2812-2826 - Mathieu Jadin

, Quentin De Coninck
, Louis Navarre
, Michael Schapira
, Olivier Bonaventure
:
Leveraging eBPF to Make TCP Path-Aware. 2827-2838 - Patrick Krämer

, Philip Diederich
, Corinna Krämer, Rastin Pries, Wolfgang Kellerer
, Andreas Blenk
:
D2A: Operating a Service Function Chain Platform With Data-Driven Scheduling Policies. 2839-2853 - Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai John Yang

:
IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry. 2854-2868 - Fujun He

, Eiji Oki
:
Shared Protection-Based Virtual Network Embedding Over Elastic Optical Networks. 2869-2884 - Xiaoxuan Wang

, Rolf Stadler
:
Online Feature Selection for Efficient Learning in Networked Systems. 2885-2898 - Luxi Zhao

, Paul Pop
, Sebastian Steinhorst
:
Quantitative Performance Comparison of Various Traffic Shapers in Time-Sensitive Networking. 2899-2928 - Vincenzo Eramo

, Tiziana Catena:
Application of an Innovative Convolutional/LSTM Neural Network for Computing Resource Allocation in NFV Network Architectures. 2929-2943 - Haiyang Yu

, Zhen Yang
, Shanshan Tu
, Muhammad Waqas
, Huan Liu
:
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. 2944-2956 - Qiuyun Lyu

, Hao Li
, Zhining Deng
, Xiaochen Zhang, Yizhen Qi, Huaping Liu
, Mengzhou Gao
:
JRS: A Joint Regulating Scheme for Secretly Shared Content Based on Blockchain. 2957-2971 - Hao Guo

, Wanxin Li
, Mark M. Nejad
:
A Hierarchical and Location-Aware Consensus Protocol for IoT-Blockchain Applications. 2972-2986 - Ammar Ayman Battah

, Youssef Iraqi
, Ernesto Damiani
:
A Trust and Reputation System for IoT Service Interactions. 2987-3005 - Yuchen Li, Weifa Liang

, Jing Li
:
Profit Driven Service Provisioning in Edge Computing via Deep Reinforcement Learning. 3006-3019 - Kostas Kolomvatsos

, Christos Anagnostopoulos
:
A Proactive Statistical Model Supporting Services and Tasks Management in Pervasive Applications. 3020-3031 - Rahul Mishra

, Hari Prabhat Gupta
, Preti Kumari
, Doug Young Suh
, Md. Jalil Piran
:
A Task Offloading and Reallocation Scheme for Passenger Assistance Using Fog Computing. 3032-3047 - Deepika Saxena

, Ishu Gupta
, Ashutosh Kumar Singh
, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services. 3048-3061 - Ahmad Hammoud, Hadi Otrok

, Azzam Mourad
, Zbigniew Dziong
:
On Demand Fog Federations for Horizontal Federated Learning in IoV. 3062-3075 - Kanika Sharma

, Bernard Butler
, Brendan Jennings
:
Graph-Based Heuristic Solution for Placing Distributed Video Processing Applications on Moving Vehicle Clusters. 3076-3089 - Apostolos Galanopoulos

, George Iosifidis
, Theodoros Salonidis, Douglas J. Leith
:
Selective Edge Computing for Mobile Analytics. 3090-3104 - Mohammad Furqan Ali

, Dushantha Nalin K. Jayakody
, Sahil Garg
, Georges Kaddoum
, M. Shamim Hossain
:
Dual-Hop Mixed FSO-VLC Underwater Wireless Communication Link. 3105-3120 - Nadine Abbas

, Wissam Fawaz
, Sanaa Sharafeddine
, Azzam Mourad
, Chadi Abou-Rjeily
:
SVM-Based Task Admission Control and Computation Offloading Using Lyapunov Optimization in Heterogeneous MEC Network. 3121-3135 - Quang-Trung Luu

, Sylvaine Kerboeuf
, Michel Kieffer
:
Admission Control and Resource Reservation for Prioritized Slice Requests With Guaranteed SLA Under Uncertainties. 3136-3153 - Serena Santi

, Filip Lemic
, Jeroen Famaey
:
Location-Based Discovery and Network Handover Management for Heterogeneous IEEE 802.11ah IoT Applications. 3154-3162 - Yangguang Lu

, Xin Chen
, Yongchao Zhang
, Ying Chen
:
Cost-Efficient Resources Scheduling for Mobile Edge Computing in Ultra-Dense Networks. 3163-3173 - Amir Varasteh

, Saeed Akhoondian Amiri
, Carmen Mas Machuca
:
Homa: Online In-Flight Service Provisioning With Dynamic Bipartite Matching. 3174-3187 - S. Suja Golden Shiny

, S. Sathya Priya
, Krishnan Murugan
:
Control Message Quenching-Based Communication Protocol for Energy Management in SDWSN. 3188-3201 - Sourav Mondal

, Marco Ruffini
:
Optical Front/Mid-Haul With Open Access-Edge Server Deployment Framework for Sliced O-RAN. 3202-3219 - Bardia Safaei

, Hossein Taghizade
, Amir Mahdi Hosseini Monazzah
, Kimia Talaei Khoosani, Parham Sadeghi, Ali Asghar Mohammadsalehi, Jörg Henkel
, Alireza Ejlali
:
Introduction and Evaluation of Attachability for Mobile IoT Routing Protocols With Markov Chain Analysis. 3220-3238 - Alberto Martínez Alba

, Wolfgang Kellerer
:
Dynamic Functional Split Adaptation in Next-Generation Radio Access Networks. 3239-3263 - Yang Chen

, Dechang Pi
, Shengxiang Yang
, Yue Xu
, Junfu Chen
, Ali Wagdy Mohamed
:
HNIO: A Hybrid Nature-Inspired Optimization Algorithm for Energy Minimization in UAV-Assisted Mobile Edge Computing. 3264-3275 - Ali Nouruzi

, Abolfazl Zakeri
, Mohammad Reza Javan
, Nader Mokari
, Rasheed Hussain
, S. M. Ahsan Kazmi:
Online Service Provisioning in NFV-Enabled Networks Using Deep Reinforcement Learning. 3276-3289 - Yan-Wei Chen

, Chi-Yu Li
, Chien-Chao Tseng
, Min-Zhi Hu:
P4-TINS: P4-Driven Traffic Isolation for Network Slicing With Bandwidth Guarantee and Management. 3290-3303 - Tomohiro Korikawa

, Eiji Oki
:
Memory Network Architecture for Packet Processing in Functions Virtualization. 3304-3322 - Khoa Nguyen

, Changcheng Huang
:
Toward Adaptive Joint Node and Link Mapping Algorithms for Embedding Virtual Networks: A Conciliation Strategy. 3323-3340 - Min Zhu

, Qi Chen, Jiahua Gu
, Pingping Gu:
Deep Reinforcement Learning for Provisioning Virtualized Network Function in Inter-Datacenter Elastic Optical Networks. 3341-3351 - Godfrey Kibalya

, Joan Serrat-Fernández
, Juan-Luis Gorricho
, Peiying Zhang
:
A Reinforcement Learning Approach for Virtual Network Function Chaining and Sharing in Softwarized Networks. 3352-3370 - Cheng Ren

, Xuxiang Chen
, Haiyun Xiang, Yu Wang
, Yaxin Li
, Hao Li
:
On Efficient Delay-Aware Multisource Multicasting in NFV-Enabled Softwarized Networks. 3371-3386 - Ehsan Nowroozi

, Yassine Mekdad
, Mohammad Hajian Berenjestanaki
, Mauro Conti
, Abdeslam El Fergougui
:
Demystifying the Transferability of Adversarial Attacks in Computer Networks. 3387-3400 - Nilesh Kumar Jadav

, Rajesh Gupta
, Mohammad Dahman Alshehri
, Harsh Mankodiya, Sudeep Tanwar
, Neeraj Kumar
:
Deep Learning and Onion Routing-Based Collaborative Intelligence Framework for Smart Homes Underlying 6G Networks. 3401-3412 - Haiyan Xu

, Zhaoxin Zhang, Jianen Yan
, Tingting Chai:
Name Dependency and Domain Name Resolution Risk Assessment. 3413-3424 - Hengwei Zhang

, Jinglei Tan
, Xiaohu Liu
, Shirui Huang
, Hao Hu, Yuchen Zhang:
Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games. 3425-3437 - Ahmed H. Anwar

, Charles A. Kamhoua
, Nandi O. Leslie, Christopher Kiekintveld:
Honeypot Allocation for Cyber Deception Under Uncertainty. 3438-3452 - Haotian Yan

, Haibo Hu
, Qingqing Ye
, Li Tang
:
SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of Things. 3453-3464 - Prasanta Kumar Roy

, Ansuman Bhattacharya:
SDIWSN: A Software-Defined Networking-Based Authentication Protocol for Real-Time Data Transfer in Industrial Wireless Sensor Networks. 3465-3477 - Rajesh Gupta

, Sudeep Tanwar
:
A Zero-Sum Game-Based Secure and Interference Mitigation Scheme for Socially Aware D2D Communication With Imperfect CSI. 3478-3486 - Gioacchino Manfredi

, Luca De Cicco
, Saverio Mascolo:
Optimal QoE-Fair Resource Allocation in Multipath Video Delivery Network. 3487-3500 - Jun Huang

, Qiang Duan
, Cong-Cong Xing
, Bo Gu
, Guodong Wang, Sherali Zeadally
, Erich J. Baker
:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. 3501-3515 - Susanna Schwarzmann

, Clarissa Cassales Marquezan, Riccardo Trivisonno
, Shinichi Nakajima, Vincent Barriac, Thomas Zinner
:
ML-Based QoE Estimation in 5G Networks Using Different Regression Techniques. 3516-3532 - Fehmina Malik

, Manjesh K. Hanawal
, Yezekael Hayel
:
Profit Sharing Contracts Between Content and Service Providers for Enhanced Network Quality. 3533-3546 - Ivan Bartolec

, Irena Orsolic
, Lea Skorin-Kapov
:
Impact of User Playback Interactions on In-Network Estimation of Video Streaming Performance. 3547-3561 - Ismael Castell-Uroz

, Rubén Sanz-García, Josep Solé-Pareta, Pere Barlet-Ros
:
Demystifying Content-Blockers: Measuring Their Impact on Performance and Quality of Experience. 3562-3573 - Alekha Kumar Mishra

, Osho Singh
, Abhay Kumar
, Deepak Puthal
:
Hybrid Mode of Operations for RPL in IoT: A Systematic Survey. 3574-3586 - Shuang Wang

, Xiaoping Li
, Quan Z. Sheng
, Amin Beheshti
:
Performance Analysis and Optimization on Scheduling Stochastic Cloud Service Requests: A Survey. 3587-3602 - Christian Killer

, Bruno Rodrigues
, Eder John Scheid
, Muriel Figueredo Franco
, Burkhard Stiller
:
Blockchain-Based Voting Considered Harmful? 3603-3618 - Jinoh Kim

, Makiya Nakashima, Wenjun Fan
, Simeon Wuthier
, Xiaobo Zhou
, Ikkyun Kim
, Sang-Yoon Chang
:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. 3619-3632 - Natkamon Tovanich

, Nicolas Soulié
, Nicolas Heulot
, Petra Isenberg
:
The Evolution of Mining Pools and Miners' Behaviors in the Bitcoin Blockchain. 3633-3644 - Emerson de O. Antunes

, Marcos F. Caetano
, Marcelo Antonio Marotta
, Aletéia P. F. Araújo
, Lucas Bondan
, Rodolfo I. Meneguette
, Geraldo P. Rocha Filho
:
Optimized Solutions for Deploying a Militarized 4G/LTE Network With Maximum Coverage and Minimum Interference. 3645-3656 - Aécio dos Santos Pires

, Fernando Menezes Matos
, Aldri Luiz dos Santos
, Diego Ernesto Rosa Pessoa
, Paulo Ditarso Maciel
:
PipeConf: An Integrated Architecture for the Automated Configuration of Network Assets. 3657-3669 - Dario Rossi

, Liang Zhang:
Landing AI on Networks: An Equipment Vendor Viewpoint on Autonomous Driving Networks. 3670-3684 - Rui Yang

, Jiangran Wang
, Jiyu Hu
, Shichu Zhu, Yifei Li, Indranil Gupta
:
Medley: A Membership Service for IoT Networks. 2492-2505
Volume 19, Number 4, December 2022
- Salil S. Kanhere

, Andreas G. Veneris, Sachiko Yoshihama, Sandip Chakraborty, Ori Rottenstreich, Marta Beltrán Pardo, Bruno Rodriguez:
Guest Editorial: Special Issue on Recent Advances on Blockchain for Network and Service Management. 3689-3693 - Kun Zhou, Chunping Wang, Xiaoqing Wang

, Shenghang Chen, Hongbing Cheng
:
A Novel Scheme to Improve the Scalability of Bitcoin Combining IPFS With Block Compression. 3694-3705 - Tzu-Lun Huang

, Jason Huang:
An Efficient Storage Structure and Management for Distributed Ledgers in Blockchain Systems: An Exploration Based on Purely Theoretical Approach. 3706-3723 - Jun Wook Heo

, Gowri Sankar Ramachandran
, Ali Dorri
, Raja Jurdak
:
Blockchain Storage Optimisation With Multi-Level Distributed Caching. 3724-3736 - Zening Zhao

, Jinsong Wang
, Kai Shi, Hongwei Zhang:
Improving Address Clustering in Bitcoin by Proposing Heuristics. 3737-3749 - Shuangjie Bai

, Geng Yang
, Guoxiu Liu, Hua Dai
, Chunming Rong
:
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain. 3750-3763 - Qinghao Wang

, Yongxin Zhang
, Zijian Bao
, Wenbo Shi
, Hong Lei
, Han Liu
, Bangdao Chen
:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. 3764-3780 - Rodrigo Dutra Garcia

, Gowri Sankar Ramachandran
, Raja Jurdak
, Jo Ueyama
:
Blockchain-Aided and Privacy-Preserving Data Governance in Multi-Stakeholder Applications. 3781-3793 - Yuhan Song

, Fushan Wei
, Kaijie Zhu
, Yuefei Zhu
:
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner. 3794-3809 - Wei-Chen Wu

, Chit-Jie Chew, Ying-Chin Chen, Cheng-Han Wu, Tzu Hao Chen
, Jung-San Lee
:
Blockchain-Based WDP Solution for Real-Time Heterogeneous Computing Resource Allocation. 3810-3821 - Baojun Rong

, Zhaohui Zheng
:
FRCR: Raft Consensus Scheme Based on Semi Asynchronous Federal Reconstruction. 3822-3834 - Eder J. Scheid

, Ratanak Hy, Muriel Figueredo Franco
, Christian Killer
, Burkhard Stiller
:
On the Employment of Machine Learning in the Blockchain Selection Process. 3835-3846 - Cesar Castellon

, Swapnoneel Roy
, O. Patrick Kreidl
, Ayan Dutta
, Ladislau Bölöni
:
Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization. 3847-3857 - Ismaeel Al Ridhawi

, Moayad Aloqaily
, Ali Abbas, Fakhri Karray:
An Intelligent Blockchain-Assisted Cooperative Framework for Industry 4.0 Service Management. 3858-3871 - Vincenzo Botta

, Vincenzo Iovino, Ivan Visconti
:
Towards Data Redaction in Bitcoin. 3872-3883 - Yu Jiang

, Xiaolong Xu
, Fu Xiao
:
Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records. 3884-3895 - Umit Demirbaga

, Gagangeet Singh Aujla
:
MapChain: A Blockchain-Based Verifiable Healthcare Service Management in IoT-Based Big Data Ecosystem. 3896-3907 - Jin Qi

, Yali Liu, Yaochen Ling, Bin Xu
, Zhenjiang Dong
, Yanfei Sun:
Research on an Intelligent Computing Offloading Model for the Internet of Vehicles Based on Blockchain. 3908-3918 - Sarra Benadla

, Omar Rafik Merad Boudia
, Sidi Mohammed Senouci
, Mohamed Lehsaini:
Detecting Sybil Attacks in Vehicular Fog Networks Using RSSI and Blockchain. 3919-3935 - Pin Lv

, Linyan Xie, Jia Xu
, Xu Wu, Taoshen Li:
Misbehavior Detection in Vehicular Ad Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain. 3936-3948 - Xinhua Zhang

, Lin You
, Gengran Hu
:
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. 3949-3959 - Muhammad Anas Imtiaz

, David Starobinski
, Ari Trachtenberg:
Empirical Comparison of Block Relay Protocols. 3960-3974 - Befekadu Gezaheng Gebraselase

, Bjarne E. Helvik
, Yuming Jiang
:
Bitcoin P2P Network Measurements: A Testbed Study of the Effect of Peer Selection on Transaction Propagation and Confirmation Times. 3975-3987 - Nur Zincir-Heywood

, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib
, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami
, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. 3988-3994 - Minxian Xu

, Chenghao Song
, Shashikant Ilager
, Sukhpal Singh Gill
, Juanjuan Zhao
, Kejiang Ye
, Cheng-Zhong Xu
:
CoScal: Multifaceted Scaling of Microservices With Reinforcement Learning. 3995-4009 - Aroosa Hameed, John Violos

, Aris Leivadeas
, Nina Santi
, Rémy Grünblatt
, Nathalie Mitton
:
Toward QoS Prediction Based on Temporal Transformers for IoT Applications. 4010-4027 - Zhiyuan Yao

, Yoann Desmouceaux
, Juan Antonio Cordero Fuertes
, Mark Townsley
, Thomas H. Clausen
:
Aquarius - Enable Fast, Scalable, Data-Driven Service Management in the Cloud. 4028-4044 - Shaozhi Dai

, Zhongzhi Luan
, Shaohan Huang, Carol J. Fung, He Wang, Hailong Yang
, Depei Qian
:
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network. 4045-4057 - Dan Xia

, Jiafu Wan
, Pengpeng Xu, Jinbiao Tan:
Deep Reinforcement Learning-Based QoS Optimization for Software-Defined Factory Heterogeneous Networks. 4058-4068 - Ke Lu

, Zhekai Du
, Jingjing Li
, Geyong Min
:
Resource-Efficient Distributed Deep Neural Networks Empowered by Intelligent Software-Defined Networking. 4069-4081 - Guosheng Kang

, Jianxun Liu
, Yong Xiao
, Yingcheng Cao, Buqing Cao
, Min Shi
:
Web Services Clustering via Exploring Unified Content and Structural Semantic Representation. 4082-4096 - Roghayeh Joda

, Turgay Pamuklu
, Pedro Enrique Iturria-Rivera
, Melike Erol-Kantarci
:
Deep Reinforcement Learning-Based Joint User Association and CU-DU Placement in O-RAN. 4097-4110 - Peiying Zhang

, Yu Su, Jingjing Wang
, Chunxiao Jiang
, Ching-Hsien Hsu
, Shigen Shen
:
Reinforcement Learning Assisted Bandwidth Aware Virtual Network Resource Allocation. 4111-4123 - Ons Aouedi

, Kandaraj Piamrat
, Benoît Parrein
:
Ensemble-Based Deep Learning Model for Network Traffic Classification. 4124-4135 - Chuanhao Sun

, Kai Xu, Marco Fiore
, Mahesh K. Marina, Yue Wang, Cezary Ziemlicki:
AppShot: A Conditional Deep Generative Model for Synthesizing Service-Level Mobile Traffic Snapshots at City Scale. 4136-4150 - Haiyuan Li

, Karcius Day Rosario Assis
, Shuangyi Yan
, Dimitra Simeonidou
:
DRL-Based Long-Term Resource Planning for Task Offloading Policies in Multiserver Edge Computing Networks. 4151-4164 - Lanlan Rui

, Siqi Yang, Shiyou Chen
, Yang Yang
, Zhipeng Gao
:
Smart Network Maintenance in an Edge Cloud Computing Environment: An Adaptive Model Compression Algorithm Based on Model Pruning and Model Clustering. 4165-4175 - Bruno Missi Xavier

, Rafael Silva Guimarães
, Giovanni Comarela
, Magnos Martinello
:
MAP4: A Pragmatic Framework for In-Network Machine Learning Traffic Classification. 4176-4188 - Liang Zhao

, Zhihong Yin, Keping Yu
, Xiongyan Tang, Lexi Xu
, Zhenzhou Guo, Pulkit Nehra:
A Fuzzy Logic-Based Intelligent Multiattribute Routing Scheme for Two-Layered SDVNs. 4189-4200 - Ting Cao

, Lei Liu
, Kan Wang
, Junhuai Li
:
A Fractional Integral and Fractal Dimension-Based Deep Learning Approach for Pavement Crack Detection in Transportation Service Management. 4201-4212 - Konstantinos D. Stergiou

, Konstantinos E. Psannis
:
Federated Learning Approach Decouples Clients From Training a Local Model and With the Communication With the Server. 4213-4218 - Zhuangzhuang Zhang

, Libing Wu, Debiao He, Qian Wang
, Dan Wu, Xiaochuan Shi
, Chao Ma
:
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning. 4219-4231 - Yawei Yue

, Xingshu Chen
, Zhenhui Han, Xuemei Zeng
, Yi Zhu:
Contrastive Learning Enhanced Intrusion Detection. 4232-4247 - Yuhan Chai

, Jing Qiu
, Lihua Yin
, Lejun Zhang, Brij B. Gupta
, Zhihong Tian
:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification. 4248-4261 - Yangyang Mei

, Weihong Han
, Shudong Li
, Kaihan Lin, Cui Luo:
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm. 4262-4272 - (Withdrawn) A Hybrid Multistage DNN-Based Collaborative IDPS for High-Risk Smart Factory Networks. 4273-4283

- Zhenghao Yang, Ze Wang

, Lei Guo, Wenju Liu, Shimin Sun
:
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN. 4284-4297 - Muhammad Arslan Tariq

, Muhammad Umar Farooq
, Muhammad Zeeshan
, Ali Hassan, Adnan Akhunzada
:
FIPAM: Fuzzy Inference Based Placement and Migration Approach for NFV-Based IoTs. 4298-4309 - Ali El-Amine

, Jean-Paul Chaiban
, Hussein Al Haj Hassan
, Paolo Dini
, Loutfi Nuaymi, Roger Achkar
:
Energy Optimization With Multi-Sleeping Control in 5G Heterogeneous Networks Using Reinforcement Learning. 4310-4322 - Kenta Takeda

, Takehiro Sato
, Bijoy Chand Chatterjee
, Eiji Oki
:
Joint Inter-Core Crosstalk- and Intra-Core Impairment-Aware Lightpath Provisioning Model in Space-Division Multiplexing Elastic Optical Networks. 4323-4337 - Ryota Nakamura

, Ryoichi Kawahara, Takefumi Wakayama, Shigeaki Harada:
Virtual Network Control for Power Bills Reduction and Network Stability. 4338-4349 - Christian Grasso

, Raoul Raftopoulos
, Giovanni Schembra
:
Smart Zero-Touch Management of UAV-Based Edge Network. 4350-4368 - Bijoy Chand Chatterjee

, Imran Ahmed
, Abdul Wadud
, Mukulika Maity
, Eiji Oki
:
BPRIA: Crosstalk-Avoided Bi-Partitioning-Based Counter-Propagation Resource Identification and Allocation for Spectrally-Spatially Elastic Optical Networks. 4369-4383 - Luyao Zou

, Md. Shirajum Munir
, Yan Kyaw Tun
, Seok Won Kang, Choong Seon Hong
:
Intelligent EV Charging for Urban Prosumer Communities: An Auction and Multi-Agent Deep Reinforcement Learning Approach. 4384-4407 - Novak Boskov

, Ari Trachtenberg, David Starobinski
:
GenSync: A New Framework for Benchmarking and Optimizing Reconciliation of Data. 4408-4423 - Inan Kazanci

, Suat Ozdemir
, Suleyman Tosun:
Computation Power and Energy Optimized Task Allocation in Internet of Things. 4424-4433 - Alessio Diamanti

, José Manuel Sánchez-Vílchez, Stefano Secci
:
An AI-Empowered Framework for Cross-Layer Softwarized Infrastructure State Assessment. 4434-4448 - Seunghyun Lee, D. Manjunath

, Changhee Joo
:
On the Economics Effects of CDN-Mediated Delivery on Content Providers. 4449-4460 - Erzhou Zhu

, Zhile Chen, Jie Cui
, Hong Zhong
:
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest. 4461-4478 - Peng-Yong Kong

, Yuming Jiang
:
VNF Orchestration and Power-Disjoint Traffic Flow Routing for Optimal Communication Robustness in Smart Grid With Cyber-Physical Interdependence. 4479-4490 - Gengbiao Shen

, Qing Li
, Wanxin Shi
, Feixue Han, Yong Jiang
, Liang Gu:
Poche: A Priority-Based Flow-Aware In-Network Caching Scheme in Data Center Networks. 4491-4504 - Faezeh Samimi Vajd

, Mohammad Hadi
, Chayan Bhar
, Mohammad Reza Pakravan
, Erik Agrell
:
Dynamic Joint Functional Split and Resource Allocation Optimization in Elastic Optical Fronthaul. 4505-4515 - Tal Shapira

, Yuval Shavitt
:
BGP2Vec: Unveiling the Latent Characteristics of Autonomous Systems. 4516-4530 - Qilin Fan

, Pan Pan, Xiuhua Li
, Sen Wang, Jian Li
, Junhao Wen
:
DRL-D: Revenue-Aware Online Service Function Chain Deployment via Deep Reinforcement Learning. 4531-4545 - Kuo Guo

, Jia Chen
, Ping Dong
, Shang Liu
, Deyun Gao
:
FullSight: A Feasible Intelligent and Collaborative Framework for Service Function Chains Failure Detection. 4546-4565 - Shayan Hajipour

, Mehdi Habibi
, Hamzeh Beyranvand
:
Artificial Neural Network-Aided Multiclass Service Provisioning and Prioritization in EONs. 4566-4582 - Ying Hu

, Guang Cheng
, Wenchao Chen, Bomiao Jiang:
Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification. 4583-4599 - Zheng Qu

, Chen Lyu
, Chi-Hung Chi:
MUSH: Multi-Stimuli Hawkes Process Based Sybil Attacker Detector for User-Review Social Networks. 4600-4614 - Chunyu Wei

, Yushun Fan
, Jia Zhang
:
High-Order Social Graph Neural Network for Service Recommendation. 4615-4628 - Giorgia Cappello, Gabriella Colajanni, Patrizia Daniele, Laura Galluccio

, Christian Grasso
, Giovanni Schembra
, Laura Scrimali:
Optimizing FANET Lifetime for 5G Softwarized Network Provisioning. 4629-4649 - Alexandre Heideker

, Carlos Kamienski
:
Network Queuing Assessment: A Method to Detect Bottlenecks in Service Function Chaining. 4650-4661 - Yusufu Shehu

, Robert Harper
:
Enhancements to Language Modeling Techniques for Adaptable Log Message Classification. 4662-4675 - Gianluca Perna, Dena Markudova, Martino Trevisan

, Paolo Garza
, Michela Meo
, Maurizio M. Munafò
, Giovanna Carofiglio
:
Real-Time Classification of Real-Time Communications. 4676-4690 - Jiejun Hu

, Martin J. Reed
, Nikolaos Thomos
, Mays F. Al-Naday
, Kun Yang
:
A Dynamic Service Trading in a DLT-Assisted Industrial IoT Marketplace. 4691-4705 - Yong Liu

, Huaxi Gu
, Zhaoxing Zhou, Ning Wang
:
RSLB: Robust and Scalable Load Balancing in Software-Defined Data Center Networks. 4706-4720 - Yao-Chun Wang

, Ren-Hung Hwang
, Ying-Dar Lin
:
Low-Latency Service Chaining With Predefined NSH-Based Multipath Across Multiple Datacenters. 4721-4733 - Habib Mostafaei

, Georgios Smaragdakis
, Thomas Zinner
, Anja Feldmann
:
Delay-Resistant Geo-Distributed Analytics. 4734-4749 - ZengRi Zeng

, Wei Peng
, Detian Zeng:
Improving the Stability of Intrusion Detection With Causal Deep Learning. 4750-4763 - Clovis Anicet Ouedraogo

, Samir Medjiah
, Christophe Chassot, Khalil Drira
, José Aguilar
:
Adaptive Performance Analysis in IoT Platforms. 4764-4778 - Rasoul Behravesh

, Akhila Rao, Daniel F. Perez-Ramirez
, Davit Harutyunyan
, Roberto Riggio
, Magnus Boman
:
Machine Learning at the Mobile Edge: The Case of Dynamic Adaptive Streaming Over HTTP (DASH). 4779-4793 - José Jurandir Alves Esteves

, Amina Boubendir
, Fabrice Guillemin
, Pierre Sens
:
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement. 4794-4806 - Daniela M. Casas-Velasco

, Oscar Maurício Caicedo Rendón
, Nelson L. S. da Fonseca
:
DRSIR: A Deep Reinforcement Learning Approach for Routing in Software-Defined Networking. 4807-4820 - Saikat Das

, Sajal Saha
, Annita Tahsin Priyoti
, Etee Kawna Roy, Frederick T. Sheldon
, Anwar Haque
, Sajjan G. Shiva
:
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection. 4821-4833 - Sunghwan Kim

, Seunghyun Yoon
, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework. 4834-4846 - Yanjiao Chen, Xuxian Li, Jian Zhang

, Hongliang Bi
:
Multi-Party Payment Channel Network Based on Smart Contract. 4847-4857 - Bo Yin

, Jiaqi Li
, Xuetao Wei
:
EBSF: Node Characteristics-Based Block Allocation Plans for Efficient Blockchain Storage. 4858-4871 - Ahmed Samy

, Ibrahim A. Elgendy
, Haining Yu
, Weizhe Zhang
, Hongli Zhang
:
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning. 4872-4887 - Engin Zeydan

, Jorge Baranda
, Josep Mangues-Bafalluy
, Yekta Turk, S. Bugrahan Ozturk
:
Blockchain-Based Service Orchestration for 5G Vertical Industries in Multicloud Environment. 4888-4904 - Rafael Roque de Souza

, Marcelo Santos
, Michel S. Bonfim
, Kelvin Lopes Dias
, Stenio F. L. Fernandes
:
KDN-Based Fault-Tolerant Scheduling for VNFs in Data Centers. 4905-4917 - Guobing Zou

, Zhiwei Xu
, Xiaoyu Xia, Ya Liu
, Yanglan Gan
, Bofeng Zhang
, Min Zhou
, Qiang He
:
Spatial-Temporal Edge User Allocation: An Expectation Confirmation Perspective Approach. 4918-4931 - Jiayu Yang, Yuxin Chen

, Kaiping Xue
, Jiangping Han, Jian Li
, David S. L. Wei
, Qibin Sun, Jun Lu:
IEACC: An Intelligent Edge-Aided Congestion Control Scheme for Named Data Networking With Deep Reinforcement Learning. 4932-4947 - Kaixuan Kang

, Ding Ding
, Huamao Xie
, Qian Yin, Jing Zeng
:
Adaptive DRL-Based Task Scheduling for Energy-Efficient Cloud Computing. 4948-4961 - Xiaoyang Zhao

, Chuan Wu
:
Large-Scale Machine Learning Cluster Scheduling via Multi-Agent Graph Reinforcement Learning. 4962-4974 - Jianming Guo

, Lei Yang
, David Rincón
, Sebastià Sallent
, Quan Chen
, Xianfeng Liu
:
Static Placement and Dynamic Assignment of SDN Controllers in LEO Satellite Networks. 4975-4988 - Pronaya Bhattacharya

, Farnazbanu Patel, Abdulatif Alabdulatif
, Rajesh Gupta
, Sudeep Tanwar
, Neeraj Kumar
, Ravi Sharma
:
A Deep-Q Learning Scheme for Secure Spectrum Allocation and Resource Management in 6G Environment. 4989-5005 - Ioannis Sarrigiannis

, Angelos Antonopoulos
, Kostas Ramantas
, Maria Efthymiopoulou
, Luis M. Contreras
, Christos V. Verikoukis:
Cost-Aware Placement and Enhanced Lifecycle Management of Service Function Chains in a Multidomain 5G Architecture. 5006-5020 - Trung Thanh Nguyen, Truong Thao Nguyen, Thanh-Hung Nguyen, Phi Le Nguyen:

Fuzzy Q-Learning-Based Opportunistic Communication for MEC-Enhanced Vehicular Crowdsensing. 5021-5033 - Sumanta Dey

, Anusha Mujumdar, Pallab Dasgupta, Soumyajit Dey
:
Adaptive Safety Shields for Reinforcement Learning-Based Cell Shaping. 5034-5043 - Miguel Camelo

, Paola Soto
, Steven Latré:
A General Approach for Traffic Classification in Wireless Networks Using Deep Learning. 5044-5063 - Meiyi Yang

, Deyun Gao
, Chuan Heng Foh
, Yajuan Qin, Victor C. M. Leung
:
A Learned Bloom Filter-Assisted Scheme for Packet Classification in Software-Defined Networking. 5064-5077 - Asad Waqar Malik

, Anis Ur Rahman
, Arsalan Ahmad
, Max Mauro Dias Santos
:
Over-the-Air Software-Defined Vehicle Updates Using Federated Fog Environment. 5078-5089 - Menglan Hu

, Mai Xiao
, Wenbo Xu, Tianping Deng, Yan Dong
, Kai Peng
:
Traffic Engineering for Software-Defined LEO Constellations. 5090-5103 - Ligia Maria Moreira Zorello

, Laurens Bliek
, Sebastian Troia
, Tias Guns
, Sicco Verwer
, Guido Maier:
Baseband-Function Placement With Multi-Task Traffic Prediction for 5G Radio Access Networks. 5104-5119 - Fadoua Debbabi

, Rihab Jmal
, Lamia Chaari Fourati
, Rui Luis Andrade Aguiar
:
An Overview of Interslice and Intraslice Resource Allocation in B5G Telecommunication Networks. 5120-5132 - Josué Castañeda Cisneros

, Saúl E. Pomares Hernández
, Julio César Pérez Sansalvador
, Lil María Rodríguez-Henríquez
, Sami Yangui
, Khalil Drira:
Coordination-Free Multi-Domain NFV Orchestration for Consistent VNF Forwarding Graph Reconfiguration. 5133-5151 - Giovanni Apruzzese

, Luca Pajola
, Mauro Conti
:
The Cross-Evaluation of Machine Learning-Based Network Intrusion Detection Systems. 5152-5169 - Mehdi Zakroum

, Jérôme François
, Isabelle Chrisment, Mounir Ghogho
:
Monitoring Network Telescopes and Inferring Anomalous Traffic Through the Prediction of Probing Rates. 5170-5182 - Zhigang Lu

, Hong Shen
:
Augmentation-Based Edge Differentially Private Path Publishing in Networks. 5183-5195 - Zewei Liu

, Chunqiang Hu
, Hui Xia
, Tao Xiang
, Baolin Wang
, Jiajun Chen
:
SPDTS: A Differential Privacy-Based Blockchain Scheme for Secure Power Data Trading. 5196-5207 - Ankur Chowdhary

, Abdulhakim Sabur
, Neha Vadnere, Dijiang Huang
:
Intent-Driven Security Policy Management for Software-Defined Systems. 5208-5223 - Pedro Reviriego

, Alfonso Sánchez-Macián
, Salvatore Pontarelli
, Shanshan Liu
, Fabrizio Lombardi
:
Attacking Adaptive Cuckoo Filters: Too Much Adaptation Can Kill You. 5224-5236 - Nils Mäurer

, Thomas Gräupl
, Corinna Schmitt, Gabi Dreo Rodosek, Helmut Reiser
:
Advancing the Security of LDACS. 5237-5251 - Aimad Berady

, Mathieu Jaume
, Valérie Viet Triem Tong
, Gilles Guette:
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns. 5252-5264 - Eric Osterweil

, Pouyan Fotouhi Tehrani
, Thomas C. Schmidt
, Matthias Wählisch
:
From the Beginning: Key Transitions in the First 15 Years of DNSSEC. 5265-5283 - Joao F. Santos

, Davi da Silva Brilhante
, José Ferreira de Rezende
, Nicola Marchetti
, Marco Ruffini, Luiz A. DaSilva
:
Optimal Embedding of Heterogeneous RAN Slices for Secure and Technology-Agnostic RANaaS. 5284-5298 - Zhongyi Zhai

, Guibing Lai, Bo Cheng
, Junyan Qian
, Lingzhong Zhao, Jinsong Wu
, Zhiguo Wan
:
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC. 5299-5311 - Giovanni Apruzzese

, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov:
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. 5312-5332 - Xiaojun Zhang

, Xin Wang, Dawu Gu
, Jingting Xue, Wei Tang
:
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. 5333-5347 - Kurian Polachan

, Joydeep Pal
, Chandramani Singh
, Prabhakar Venkata Tamma
:
Assessing Quality of Control in Tactile Cyber-Physical Systems. 5348-5365 - Oswaldo Sebastian Peñaherrera-Pulla, Carlos Baena

, Sergio Fortes
, Eduardo Baena
, Raquel Barco
:
KQI Assessment of VR Services: A Case Study on 360-Video Over 4G and 5G. 5366-5382 - Rami A. Khalil

, Naranker Dulay:
AC/DC: Adaptive Cutoffs and Disputable Cutoffs for Robust Critical Transactions in Smart-Contracts. 5383-5394 - Gerald M. Karam

, Markus Gruber
, Iris Adam, François Boutigny, Yoan Miche
, Sarit Mukherjee
:
The Evolution of Networks and Management in a 6G World: An Inventor's View. 5395-5407

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














