


default search action
Journal of Network and Systems Management, Volume 32
Volume 32, Number 1, March 2024
- Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment. 1 - Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire:
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory. 2 - Abdelhamid Khiat, Mohamed Haddadi, Nacera Bahnes:
Genetic-Based Algorithm for Task Scheduling in Fog-Cloud Environment. 3 - Salma Hameche
, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari:
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition. 4 - Sainath Reddy Sankepally, Nishoak Kosaraju, J. L. Shreya
, Vishwambhar Reddy, U. Venkanna:
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices. 5 - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostSec: Adaptive Attack Detection for Vehicular Networks. 6 - Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba:
A Novel Light Reflection-Random Walk for Smart Sensors Relocation. 7 - Dongjie Liu, Jong-Hyouk Lee:
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. 8 - Siwapon Charoenchai, Peerapon Siripongwutikorn:
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game. 9 - Hamida Ikhlef, Soumia Bourebia, Ali Melit:
Link State Estimator for VANETs Using Neural Networks. 10 - Yoji Yamato:
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation. 11 - Marco Silva
, José Santos, Marília Curado
:
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges. 12 - Goldie M. Meitei, Ningrinla Marchang:
Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing. 13 - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi
, Khaled Alrfou:
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. 14 - Jérôme Lacan, Emmanuel Lochin:
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing. 15 - Kayuã Oleques Paim
, Vagner Ereno Quincozes, Diego Kreutz, Rodrigo Brandão Mansilha
, Weverton Cordeiro:
Regenerating Networked Systems' Monitoring Traces Using Neural Networks. 16 - Anselme Russel Affane Moundounga
, Hassan Satori:
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks. 17 - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis. 18 - Ivanilson França Vieira Júnior
, Jorge Granjal
, Marília Curado
:
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. 19 - Yixuan Zhang, Basem Suleiman
, Muhammad Johan Alibasa
, Farnaz Farid
:
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach. 20 - Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. 21 - Abdelaziz Hamdi, Amina Nahali, Rafik Brahem:
Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network. 22 - Yannick Florian Yankam
, Vianney Kengne Tchendji
, Jean Frédéric Myoupo
:
WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks. 23
Volume 32, Number 2, April 2024
- Pengzhao Li, Heng Yang
, Iksang Kim, Zhenyu Liu, Shanshan Li:
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks. 24 - Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa:
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks. 25 - Mradula Sharma
, Parmeet Kaur:
Fog-based Federated Time Series Forecasting for IoT Data. 26 - Mathias De Brouwer, Filip De Turck, Femke Ongenae:
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE. 27 - Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya:
Optimizing Completion Time of Requests in Serverless Computing. 28 - Adeeb Mansoor Ansari
, Mohammed Nazir, Khurram Mustafa:
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. 29 - Sateesh Gorikapudi, Hari Kishan Kondaveeti:
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks. 30 - Mustafa Al Samara
, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz:
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN. 31 - Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao:
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree. 32 - Hichem Sedjelmaci, Nesrine Kaaniche
, Kamel Tourki:
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. 33 - Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari:
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints. 34 - Nathan Harris, Sajad Khorsandroo:
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks. 35 - Kelson Carvalho Santos
, Rodrigo Sanches Miani, Flávio Oliveira Silva
:
Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems. 36 - Siamak Azadiabad, Ferhat Khendek
:
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification. 37 - Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings. 38 - Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani
:
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment. 39 - Balázs Sonkoly
, Bálint György Nagy
, János Dóka
, Zsófia Kecskés-Solymosi
, János Czentye
, Bence Formanek, Dávid Jocha, Balázs Péter Gero:
An Edge Cloud Based Coordination Platform for Multi-user AR Applications. 40 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach. 41 - Stylianos Karagiannis
, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. 42 - Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab:
On Feature Selection Algorithms for Effective Botnet Detection. 43
Volume 32, Number 3, July 2024
- Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale:
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees. 44 - Tumpa Pal, Ramesh Saha
, Suparna Biswas:
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network. 45 - Javier Rubio-Loyola
, Christian Aguilar-Fuster
:
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding. 46 - Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao:
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation. 47 - João Paulo Monteiro Santana, Taufik Abrão:
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization. 48 - Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma:
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing. 49 - Edison Moreno-Cardenas
, Erwin J. Sacoto-Cabrera, Luis Guijarro:
Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network. 50 - Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi, Manhar Singh Sachdev, Sparsh Taneja:
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations. 51 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Correction: Assuring Efficient Path Selection in an IntentBased Networking System: a Graph Neural Networks and Deep Reinforcement Learning Approach. 52 - Diego Ramos-Ramos, Alejandro González Vegas, Javier Berrocal, Jaime Galán-Jiménez:
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios. 53 - Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphaël Couturier:
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications. 54 - Sk Md Abidar Rahaman, Md. Azharuddin, Pratyay Kuila:
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach. 55 - Reham Aljohani, Anas Bushnag, Ali Alessa:
AI-Based Intrusion Detection for a Secure Internet of Things (IoT). 56 - Hanan Suwi
, Nadjia Kara, Omar Abdul Wahab, Claes Edstrom, Yves Lemieux:
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution. 57 - Daniel Soares, Marcos Carvalho, Daniel F. Macedo:
Enhancing Cloud Gaming QoE Estimation by Stacking Learning. 58 - Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation. 59 - Xianfeng Li, Haoran Sun, Yan Huang:
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches. 60 - Vincent Bracke
, José Santos
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement. 61 - Wilson de Souza Junior, Taufik Abrão:
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels. 62 - Van Tong, Cuong Dao
, Hai Anh Tran, Truong X. Tran, Sami Souihi:
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain. 63 - Hélio Pesanhane, Wesley dos Reis Bezerra, Fernando Koch, Carlos Becker Westphall:
Distributed AgriFood Supply Chains. 64 - Gourav Prateek Sharma, Wouter Tavernier, Didier Colle, Mario Pickavet, Jetmir Haxhibeqiri, Jeroen Hoebeke, Ingrid Moerman:
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks. 65
Volume 32, Number 4, October 2024
- Birglang Bargayary
, Nabajyoti Medhi:
SDBlock-IoT: A Blockchain-Enabled Software-Defined Multicontroller Architecture to Safeguard OpenFlow Tables. 66 - Zbigniew Kotulski
, Tomasz Wojciech Nowak, Mariusz Sepczuk, Krzysztof Bocianiak, Tomasz Pawlikowski, Aleksandra Podlasek, Jean-Philippe Wary:
Keeping Verticals' Sovereignty During Application Migration in Continuum. 67 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Correction: Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach. 68 - Nikola Gavric, Guru Prasad Bhandari, Andrii Shalaginov:
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics. 69 - Amir Bannoura, Hamid Chekenbah
, Frank Meyer, Suhail Odeh, Rafik Lasri:
Overcoming Real-World IoT Deployment Challenges with Enhanced Fuzzy Logic Decision Algorithms. 70 - Hazim Shakhatreh, Wa'ed Al-Dagamseh, Samah Albasheer, Khaled Bani-Hani, Khaled F. Hayajneh:
On the Deployment Problem of Multiple Drones in Millimeter Wave Systems. 71 - Shuyu Lyu, Xinfa Dai, Zhong Ma, Yi Gao, Zhekun Hu:
Modeling and Controller Design of a Cloud-Based Control Switching System in an Uncertain Network Environment. 72 - Arijit Dutta, Luis Miguel Samaniego Campoverde, Mauro Tropea, Floriano De Rango:
A Comprehensive Review of Recent Developments in VANET for Traffic, Safety & Remote Monitoring Applications. 73 - Andre Flaiban, Taufik Abrão:
Performance of Massive MIMO Aided by Reflective Intelligent Surfaces. 74 - Stelios Prekas
, Panagiotis Trakadas, Panagiotis Karkazis:
Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework. 75 - Cheemaladinne Kondaiah, Alwyn Roshan Pais, Routhu Srinivasa Rao:
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble. 76 - Sana Said, Jalel Eddine Hajlaoui, Mohamed Nazih Omri:
A Survey on the Optimization of Security Components Placement in Internet of Things. 77 - Hemanth Kumar Ravuri, Jakob Struye, Jeroen van der Hooft, Tim Wauters, Filip De Turck, Jeroen Famaey, Maria Torres Vega:
Context-Aware and Reliable Transport Layer Framework for Interactive Immersive Media Delivery Over Millimeter Wave. 78 - Madjed Bencheikh Lehocine, Hacene Belhadef:
Preprocessing-Based Approach for Prompt Intrusion Detection in SDN Networks. 79 - Sawsan Ali Hamid, Yassine Boujelben, Faouzi Zarai:
Enhancing Cloud Gaming Experience through Optimized Virtual Machine Placement: A Comprehensive Review. 80 - Ameur Bennaoui, Mustapha Guezouri, Mokhtar Keche:
Improving VANET Data Dissemination Efficiency with Deep Neural Networks. 81 - Filipe Augusto da Luz Lemos, Thiago dos Santos Cavali, Keiko Verônica Ono Fonseca, Mauro Sérgio Pereira Fonseca, Rubens Alexandre De Faria:
Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis. 82 - Garrik Brel Jagho Mdemaya, Vianney Kengne Tchendji, Mthulisi Velempini, Ariege Atchaze:
ATENA: Adaptive TEchniques for Network Area Coverage and Routing in IoT-Based Edge Computing. 83 - Syed Mohsan Raza
, Roberto Minerva, Barbara Martini, Noël Crespi:
Empowering Microservices: A Deep Dive into Intelligent Application Component Placement for Optimal Response Time. 84 - Hazem M. El-Hageen, Yousef H. Alfaifi, Hani A. Albalawi, Ahmed Alzahmi, Aadel M. Alatwi, Ahmed F. Ali
, Mohamed A. Mead:
Chaotic Zebra Optimization Algorithm for Increasing the Lifetime of Wireless Sensor Network. 85 - Abhinav Tomar, Raj Anwit, Piyush Nawnath Raut, Gaurav Singal:
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks. 86 - Priyal Thakkar, Ashish Singh Patel, Gaurav Shukla, Arzad Alam Kherani, Brejesh Lall:
Dynamic Microservice Provisioning in 5G Networks Using Edge-Cloud Continuum. 87 - Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Rabeeba Abdul Rasheed, Mauro Conti
:
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. 88 - Huda Alrammah, Yi Gu, Daqing Yun
, Ning Zhang:
Tri-objective Optimization for Large-Scale Workflow Scheduling and Execution in Clouds. 89 - Mohamed Amine Ould Rabah, Hamza Drid, Mohamed Rahouti, Nadjib Lazaar:
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency. 90 - Remya Krishnan P.
, Ritesh Koushik
:
Decentralized Distance-based Strategy for Detection of Sybil Attackers and Sybil Nodes in VANET. 91 - Noura ben Henda, Amina Msolli, Imen Haggui, Abdelhamid Helali, Hassen Maaref:
Attack Detection in IoT Network Using Support Vector Machine and Improved Feature Selection Technique. 92 - Alexandro Marcelo Zacaron, Daniel M. Brandão Lent, Vitor G. da Silva Ruffo
, Luiz Fernando Carvalho, Mario Lemes Proença Jr.
:
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks. 93 - Kolichala Rajashekar, Souradyuti Paul, Sushanta Karmakar, Subhajit Sidhanta:
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster. 94 - Thiago Valentim Bezerra, Gustavo Callou, Cleunio França, Eduardo Tavares:
Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach. 95 - Mohammed Chemmakha, Omar Habibi, Mohamed Lazaar:
Towards a Deep Learning Approach for IoT Attack Detection Based on a New Generative Adversarial Network Architecture and Gated Recurrent Unit. 96 - Qianheng Yang, Yuer Yang
, Shiyuan Xu, Rongrong Guo, Huiguang Xian, Yifeng Lin, Xue Chen, Wuzheng Tan, Siu-Ming Yiu:
PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality. 97 - Lucas C. B. Guimarães, Rodrigo S. Couto:
A Performance Evaluation of Neural Networks for Botnet Detection in the Internet of Things. 98 - Francisco Rocha, Bruno C. S. Nogueira, Luiz Marcos Garcia Gonçalves, Francisco Airton Silva:
Smart Hospital Patient Monitoring System Aided by Edge-Fog-Cloud Continuum: A Performability Evaluation Focusing on Distinct Sensor Sources. 99 - Hira Zaheer, Muhammad Shoaib, Faiza Iqbal, Shazia Arshad, Ayesha Altaf, Eduardo Garcia Villena, Isabel de la Torre Díez, Imran Ashraf:
An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain. 100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.