default search action
International Journal of Network Management, Volume 25
Volume 25, Number 1, January / February 2015
- Hamada Alshaer:
An overview of network virtualization and cloud network as a service. 1-30 - Mohammad Sabzinejad Farash:
Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'. 31-51 - Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Xingwei Wang:
Towards centralized and semi-automatic VLAN management. 52-73
Volume 25, Number 2, March / April 2015
- Burak Kantarci, Luca Foschini, Antonio Corradi, Hussein T. Mouftah:
Design of energy-efficient cloud systems via network and resource virtualization. 75-94 - Pavle V. Vuletic, Jovana J. Vuleta-Radoicic, Dimitrios Kalogeras:
Federated trouble ticket system for service management support in loosely coupled multi-domain environments. 95-112 - Javier Rubio-Loyola, Gregorio Toscano Pulido, Marinos Charalambides, Marisol Magaña-Aguilar, Joan Serrat-Fernández, George Pavlou, Hiram Galeana-Zapién:
Business-driven policy optimization for service management. 113-140
Volume 25, Number 3, May / June 2015
- Xiaonan Wang, Deguang Le, Hongbin Cheng, Yi Mu:
An IPv6-based mobility framework for urban vehicular networks. 141-158 - Dimitrios Dechouniotis, Nikolaos Leontiou, Nikolaos Athanasopoulos, Athanasios Christakidis, Spyros G. Denazis:
A control-theoretic approach towards joint admission control and resource allocation of cloud computing services. 159-180 - Khalid A. Darabkh, Abeer M. Awad, Alá F. Khalifeh:
New video discarding policies for improving UDP performance over wired/wireless networks. 181-202
Volume 25, Number 4, July / August 2015
Editorial
- Marinos Charalambides, Thomas Zinner, Hiroshi Saito, Prasad Calyam, Steven Latré:
Advances in management of multimedia services. 203-204
- Padraig O. Flaithearta, Hugh Melvin, Michael Schukat:
A QoS enabled multimedia WiFi access point. 205-222 - Florian Wamser, Andreas Blenk, Michael Seufert, Thomas Zinner, Wolfgang Kellerer, Phuoc Tran-Gia:
Modelling and performance analysis of application-aware resource management. 223-241 - Olli Mämmelä, Petteri Mannersalo:
User-centric versus network-centric load balancing: How to provide good QoE for gold users. 242-259
Volume 25, Number 5, September / October 2015
Editorial
- Anna Sperotto, Rick Hofstede, Alberto Dainotti, Corinna Schmitt, Gabi Dreo Rodosek:
Special issue on measure, detect and mitigate-challenges and trends in network security. 261-262
- Karel Bartos, Martin Rehák:
IFS: Intelligent flow sampling for network security-an adaptive approach. 263-282 - Johan Mazel, Pedro Casas, Romain Fontugne, Kensuke Fukuda, Philippe Owezarski:
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection. 283-305 - Yang Zhang, Hesham Mekky, Zhi-Li Zhang, Ruben Torres, Sung-Ju Lee, Alok Tongaonkar, Marco Mellia:
Detecting malicious activities with user-agent-based profiles. 306-319 - Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. 320-339 - Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini:
Iterative selection of countermeasures for intelligent threat agents. 340-354 - Petr Velan, Milan Cermák, Pavel Celeda, Martin Drasar:
A survey of methods for encrypted traffic classification and analysis. 355-374
Volume 25, Number 6, November / December 2015
- Mehran Garmehi, Morteza Analoui, Mukaddim Pathan, Rajkumar Buyya:
An economic mechanism for request routing and resource allocation in hybrid CDN-P2P networks. 375-393 - Vassilis Foteinos, Kostas Tsagkaris, Pierre Peloso, Laurent Ciavaglia, Panagiotis Demestichas:
Energy-aware traffic allocation to optical lightpaths in multilayer core networks. 394-417 - Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena, Evangelos Pallis:
Energy-efficient management using a traffic-oriented routing scheme for cognitive radio networks. 418-434 - Jae Yoon Chung, Sangtae Ha, James Won-Ki Hong:
A management architecture for client-defined cloud storage services. 435-453 - Melike Erol-Kantarci:
Cache-at-relay: energy-efficient content placement for next-generation wireless relays. 454-470 - Ismahani Binti Ismail, Muhammad Nadzir Marsono, Ban Mohammed Khammas, Sulaiman Mohd Nor:
Incorporating known malware signatures to classify new malware variants in network traffic. 471-489 - Mathieu Bouet, Jérémie Leguay, Théo Combe, Vania Conan:
Cost-based placement of vDPI functions in NFV infrastructures. 490-506 - Taeyeol Jeong, Jian Li, Jonghwan Hyun, Jae-Hyoung Yoo, James Won-Ki Hong:
LISP controller: a centralized LISP management system for ISP networks. 507-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.