- Chadni Islam, Muhammad Ali Babar, Roland Croft, Helge Janicke. SmartValidator: A framework for automatic identification and classification of cyber threat data. J. Network and Computer Applications, 202:103370, 2022.
- Yadong Zhou, Hao Li 0011, Kaiyue Chen, Tian Pan 0001, Kun Qian 0004, Kai Zheng 0003, Bin Liu 0001, Peng Zhang 0011, Yazhe Tang, Chengchen Hu. Raze policy conflicts in SDN. J. Network and Computer Applications, 199:103307, 2022.
- Fanghui Sun, Shen Wang, Hongli Zhang 0001. A progressive learning method on unknown protocol behaviors. J. Network and Computer Applications, 197:103249, 2022.
- Shie-Yuan Wang, Jen-Chieh Chang. Design and implementation of an intrusion detection system by using Extended BPF in the Linux kernel. J. Network and Computer Applications, 198:103283, 2022.
- Mostafa Ayoubi Mobarhan, Mohammed Salamah. REPS-AKA3: A secure authentication and re- authentication protocol for LTE networks. J. Network and Computer Applications, 201:103345, 2022.
- Wei Wei 0016, Qi Wang, Weidong Yang, Yashuang Mu. Efficient stochastic scheduling for highly complex resource placement in edge clouds. J. Network and Computer Applications, 202:103365, 2022.
- Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha. DIMY: Enabling privacy-preserving contact tracing. J. Network and Computer Applications, 202:103356, 2022.
- Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu. A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Network and Computer Applications, 198:103281, 2022.
- Guangxian Liang, Xiaopeng Yao, Yue Gu, Hejiao Huang, Chonglin Gu. Multi-Batches Revenue Maximization for competitive products over online social network. J. Network and Computer Applications, 201:103357, 2022.
- Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione. PriSIEM: Enabling privacy-preserving Managed Security Services. J. Network and Computer Applications, 203:103397, 2022.