default search action
Journal of Network and Systems Management, Volume 31
Volume 31, Number 1, March 2023
- Debdas Barik, Judhajit Sanyal, Tuhina Samanta:
Denial-of-Service Attack Mitigation in Multi-hop 5G D2D Wireless Communication Networks Employing Double Auction Game. 1 - Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu:
Efficient Intelligent Intrusion Detection System for Heterogeneous Internet of Things (HetIoT). 2 - Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann:
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. 3 - Ramzi Snoussi, Habib Youssef:
VAE-Based Latent Representations Learning for Botnet Detection in IoT Networks. 4 - Kohei Shiomoto:
Network Intrusion Detection System Based on an Adversarial Auto-Encoder with Few Labeled Training Samples. 5 - Yepeng Ding, Hiroyuki Sato:
Bloccess: Enabling Fine-Grained Access Control Based on Blockchain. 6 - Vibha Jain, Bijendra Kumar:
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning. 7 - Imane Oussakel, Philippe Owezarski, Pascal Berthou, Laurent Houssin:
Toward Radio Access Network Slicing Enforcement in Multi-cell 5G System. 8 - Anurag Thantharate, Cory C. Beard:
ADAPTIVE6G: Adaptive Resource Management for Network Slicing Architectures in Current 5G and Future 6G Systems. 9 - Laurens Van Hoye, Tim Wauters, Filip De Turck, Bruno Volckaert:
Enabling the Rescheduling of Containerized Workloads in an Ad Hoc Cross-Organizational Collaboration. 10 - Pedro Heleno Isolani, Jetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke, Lisandro Z. Granville, Steven Latré, Johann M. Márquez-Barja:
SD-RAN Interactive Management Using In-band Network Telemetry in IEEE 802.11 Networks. 11 - Sergio Armando Gutierrez, Juan Felipe Botero, John Willian Branch Bedoya:
An Adaptable and Agnostic Flow Scheduling Approach for Data Center Networks. 12 - Bing Li, Maode Ma:
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking. 13 - Intidhar Bedhief, Meriem Kassar, Taoufik Aguili:
Empowering SDN-Docker Based Architecture for Internet of Things Heterogeneity. 14 - Chunlin Li, Qingzhe Zhang, Cheng Huang, Youlong Luo:
Optimal Service Selection and Placement Based on Popularity and Server Load in Multi-access Edge Computing. 15 - Diego S. M. Gonçalves, Rodrigo S. Couto, Marcelo G. Rubinstein:
A Protection System Against HTTP Flood Attacks Using Software Defined Networking. 16 - Saravanan Velrajan, Victor Ceronmani Sharmila:
QoS-Aware Service Migration in Multi-access Edge Compute Using Closed-Loop Adaptive Particle Swarm Optimization Algorithm. 17 - Thi-Thuy-Lien Nguyen, Tuan-Minh Pham, Linh Manh Pham:
Efficient Redundancy Allocation for Reliable Service Function Chains in Edge Computing. 18 - Marius Letourneau, Guillaume Doyen, Rémi Cogranne, Bertrand Mathieu:
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S. 19 - Sebastian Gallenmüller, Florian Wiedner, Johannes Naab, Georg Carle:
How Low Can You Go? A Limbo Dance for Low-Latency Network Functions. 20 - Hefei Hu, Wei Zhang, Lingyi Xu, Panjie Qi:
A Mobility-Aware Service Function Chain Migration Strategy Based on Deep Reinforcement Learning. 21 - Maher Alharby:
Transaction Latency Within Permissionless Blockchains: Analysis, Improvement, and Security Considerations. 22 - Fan Yang, Cristina Comaniciu, P. Krishnan, Krishan K. Sabnani, Lloyd G. Greenwald:
A Game Theoretic Framework for Distributed Mission Slice Allocation and Management for Tactical Networks. 23 - Takanori Hara, Masahiro Sasabe:
Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem. 24 - André Luís Machado Martinez, Cristiane A. Pendeza Martinez, Taufik Abrão:
Random Point Evolution-Based Heuristic for Resource Efficiency in OCDMA Networks. 25 - Rajarshi Roy Chowdhury, Azam Che-Idris, Pg Emeroylariffion Abas:
A Deep Learning Approach for Classifying Network Connected IoT Devices Using Communication Traffic Characteristics. 26 - Ammad Ali Syed, Serkan Ayaz, Tim Leinmüller, Madhu Chandra:
Network Coding Based Fault-Tolerant Dynamic Scheduling and Routing for In-Vehicle Networks. 27 - Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Seán McSweeney, Donna O'Shea:
SECAP Switch - Defeating Topology Poisoning Attacks Using P4 Data Planes. 28 - Stuart Clayman, Müge Sayit:
Low Latency Low Loss Media Delivery Utilizing In-Network Packet Wash. 29
Volume 31, Number 2, April 2023
- Pedro H. A. Rezende, Marília Curado, Edmundo R. M. Madeira:
NS-ENFORCER: Enforcing Network Slicing on Radio Access Networks. 30 - Jen-Jee Chen, Ryo Yamamoto, Kyungbaek Kim, Jiun-Long Huang, Kazuhiko Kinoshita, Woojin Seok, Li-Hsing Yen:
Networking Data and Intelligent Management in the Post-COVID19 Era: A Report on APNOMS 2021. 31 - Antônio Augusto Fröhlich, Leonardo Passig Horstmann, José Luis Conradi Hoffmann:
A Secure IIoT Gateway Architecture based on Trusted Execution Environments. 32 - Olivia Jullian, Beatriz Otero, Eva Rodríguez, Norma Gutiérrez, Héctor Antona, Ramon Canal:
Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework. 33 - Toerless Eckert, Alexander Clemm, Stewart Bryant:
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF). 34 - Roland Mark Erdei, László Toka:
Minimizing Resource Allocation for Cloud-Native Microservices. 35 - Rafael de Jesus Martins, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville:
Assisted Monitoring and Security Provisioning for 5G Microservices-Based Network Slices with SWEETEN. 36 - Giuseppe Di Modica, Luca Foschini:
A Survey on the Use of Lightweight Virtualization in I4.0 Manufacturing Environments. 37 - Yufan Feng, Changda Wang:
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning. 38 - Xavier Marchal, Philippe Graff, Joël Roman Ky, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor:
An Analysis of Cloud Gaming Platforms Behaviour Under Synthetic Network Constraints and Real Cellular Networks Conditions. 39 - Asma Bellili, Nadjia Kara:
An Efficient Adaptive Meta Learning Model Based VNFs Affinity for Resource Prediction Optimization in Virtualized Networks. 40 - Hakan Gökcesu, Özgür Erçetin, Gökhan Kalem, Salih Ergüt:
QoE Evaluation in Adaptive Streaming: Enhanced MDT with Deep Learning. 41 - Samia El Haddouti, Abdellah Ouaguid, Mohamed Dafir Ech-Cherif El Kettani:
Fedidchain: An Innovative Blockchain-Enabled Framework for Cross-Border Interoperability and Trust Management in Identity Federation Systems. 42 - Huu-Thanh Nguyen, Nguyen Ngoc Tuan, Dang Anh Khoa, Le Cong Tuan, Nguyen Trung Kien, Nguyen Xuan Dung, Thu Ngo Quynh, Florian Wamser:
On Profiling, Benchmarking and Behavioral Analysis of SDN Architecture Under DDoS Attacks. 43
Volume 31, Number 3, July 2023
- Laurens Van Hoye, Tim Wauters, Filip De Turck, Bruno Volckaert:
Enabling Organizations to Participate in the Ad Hoc Scheduling of a Cross-Organizational Data Pipeline. 44 - Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, Ouns Bouachir:
On Ensuring Full Yet Cost-Efficient Survivability of Service Function Chains in NFV Environments. 45 - Alef Vinicius Cardoso e Silva, Felipe Taliar Giuntini, Caetano Mazzoni Ranieri, Rodolfo Ipolito Meneguette, Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Bhaskar Krishnamachari, Jó Ueyama:
MADCS: A Middleware for Anomaly Detection and Content Sharing for Blockchain-Based Systems. 46 - Tarek Menouer, Amina Khedimi, Christophe Cérin, Congfeng Jiang:
Cloud-Native Placement Strategies of Service Function Chains with Dependencies. 47 - Bhanu Priya, Jyoteesh Malhotra:
Intelligent Multi-connectivity Based Energy-Efficient Framework for Smart City. 48 - Delia Rico, Karl-Johan Grinemmo, Anna Brunström, Pedro Merino:
Performance Analysis of the Multi-connection Tactile Internet Protocol over 5G. 49 - Subrata Joardar, Nilanjan Sinhababu, Soumyodeep Dey, Prasenjit Choudhury:
Mitigating DoS Attack in MANETs Considering Node Reputation with AI. 50 - Aiping Zhou, Jin Qian:
An Adaptive Method for Identifying Super Nodes from Network-wide View. 51 - Benjamin Lewis, Matthew Broadbent, Charalampos Rotsos, Nicholas J. P. Race:
4MIDable: Flexible Network Offloading For Security VNFs. 52 - Zhongwei Huang, Weijian Zhong, Dagang Li, Hua Lu:
Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT: A DRL Approach. 53 - Mimi Cherian, Satishkumar L. Varma:
Secure SDN-IoT Framework for DDoS Attack Detection Using Deep Learning and Counter Based Approach. 54 - Tiago Linhares, Ahmed Patel, Ana Luiza Bessa de Paula Barros, Marcial Fernández:
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN). 55 - Divya D. Kulkarni, Raj K. Jaiswal:
An Intrusion Detection System Using Extended Kalman Filter and Neural Networks for IoT Networks. 56 - Teresa Gomes, Lúcia Martins, José M. F. Craveirinha, Deep Medhi:
Two Algorithms for the k-Widest Path Problem. 57 - Jaume Comellas, Fakhriy Hario, Gabriel Junyent:
Quantifying Bypass Traffic in Partially Meshed Transparent Optical Networks. 58 - Mahdi Jemmali, Abir Ben Hmida, Akram Y. Sarhan:
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks. 59 - Rishav Dubey, Pavan Kumar Mishra, Sudhakar Pandey:
SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks. 60 - Felipe Sampaio Dantas da Silva, Emidio P. Neto, Rodrigo S. S. Nunes, Cristian H. Martins de Souza, Augusto J. V. Neto, Túlio Pascoal:
Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities. 61 - Vojdan Kjorveziroski, Sonja Filiposka:
WebAssembly Orchestration in the Context of Serverless Computing. 62 - Damir Breskovic, Dinko Begusic:
Access Networks Brownfield Investments Based on Characteristic Infrastructure Parameters Optimization. 63 - Krzysztof Rusek, Piotr Borylo, Piotr Jaglarz, Fabien Geyer, Albert Cabellos, Piotr Cholda:
RiskNet: Neural Risk Assessment in Networks of Unreliable Resources. 64 - Miquel Farreras, Paola Soto, Miguel Camelo, Lluís Fàbrega, Pere Vilà:
Improving Network Delay Predictions Using GNNs. 65
Volume 31, Number 4, October 2023
- Zakia Zaman, Sabidur Rahman, Fazle Rafsani, Ishraq R. Rahman, Mahmuda Naznin:
DeepVRM: Deep Learning Based Virtual Resource Management for Energy Efficiency. 66 - Diego R. Gomes, Fernando Antônio Aires Lins, Obionor O. Nóbrega, Eduardo F. Felix, Bruno A. Jesus, Marco Vieira:
Security Evaluation of Authentication Requirements in IoT Gateways. 67 - Oscar G. Bautista, Mohammad Hossein Manshaei, Richard Hernandez, Kemal Akkaya, Soamar Homsi, Arif Selcuk Uluagac:
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. 68 - Abderrahim Bouchair, Belabbas Yagoubi, Sid Ahmed Makhlouf:
Joint Policy for Virtual Network Embedding in Distributed SDN-Enabled Cloud. 69 - Deep Chandra Binwal, Rajeev Tiwari, Monit Kapoor:
A Lightweight Energy-Efficient Technique for QoS Enhancement in Urban VFC for Intelligent Transportation System. 70 - Vinicius Fulber-Garcia, Marcelo Caggiani Luizelli, Carlos Raniery Paula dos Santos, Eduardo Jaques Spinosa, Elias P. Duarte:
Customizable Mapping of Virtualized Network Services in Multi-datacenter Environments Based on Genetic Metaheuristics. 71 - John Bosco Ssemakula, Juan-Luis Gorricho, Godfrey Kibalya, Joan Serrat-Fernández:
Deployment of Future Services in a Multi-access Edge Computing Environment Using Intelligence at the Edge. 72 - Ippokratis Sartzetakis, Emmanouel A. Varvarigos:
Network Tomography with Partial Topology Knowledge and Dynamic Routing. 73 - Karina Bernardin Rosa, Taufik Abrão:
Improving the Resource Efficiency in Massive MIMO-NOMA Systems. 74 - Alexander Clemm, Raouf Boutaba, Guillaume Doyen, Bertrand Mathieu, Mohamed Faten Zhani:
High-Precision, Predictable and Low-Latency Networking. 75 - Mohammed Falih Hassan, Bahaa Al-Musawi, Ali Kadhim Al-Janabi:
Innovative Fitness Functions for Robust Energy Management in WSNs. 76 - Libardo Andrey Quintero González, Lucas Castanheira, Jonatas Adilson Marques, Alberto E. Schaeffer-Filho, Luciano Paschoal Gaspary:
Bungee-ML: A Cross-Plane Approach for a Collaborative Defense Against DDoS Attacks. 77 - Igor Virgílio Araújo, André Domingos Brízido, Solange Rito Lima:
Virtual Network Function Development for NG-PON Access Network Architecture. 78 - Anas Toma, Sufyan Samara, Manar Qamhieh:
Edge Computing Systems: Modeling and Resource Optimization for Augmented Reality and Soft Real-time Applications. 79 - Vincent Bracke, Gillis Werrebrouck, José Santos, Tim Wauters, Filip De Turck, Bruno Volckaert:
Online Dynamic Container Rescheduling for Improved Application Service Time. 80 - Panteleimon Rodis, Panagiotis Papadimitriou:
Intelligent and Resource-Conserving Service Function Chain (SFC) Embedding. 81 - Ahmad Taher Azar, Esraa Shehab, Ahmed M. Mattar, Ibrahim A. Hameed, Shaimaa Ahmed El-Said:
Deep Learning Based Hybrid Intrusion Detection Systems to Protect Satellite Networks. 82 - Ahlem Menaceur, Hamza Drid, Mohamed Rahouti:
Fault Tolerance and Failure Recovery Techniques in Software-Defined Networking: A Comprehensive Approach. 83 - Kiranpreet Kaur, Fabrice Guillemin, Françoise Sailhan:
Dynamic Migration of Microservices for End-to-End Latency Control in 5G/6G Networks. 84 - M. Mohan, V. Tamizhazhagan, S. Balaji:
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach. 85
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.