- Souad Mallat, Samira Harrabi, Ines BenJaafar. T-PBFT: A Blockchain-Based Authentication Protocol with Trust-Aware Consensus for Secure and Scalable Internet of Vehicles. J. Network Syst. Manage., 34(2):39, April 2026.
- Nikita Tiwari, Pradeep Kumar Biswal, Prakash Ranjan. Blockchain-Enhanced Electronic Health Records: A Kafka-Based Approach for IoMT Integration. J. Network Syst. Manage., 34(2):56, April 2026.
- Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza. Intent-Driven Network Isolation for the Cloud Computing Continuum. J. Network Syst. Manage., 34(1):6, March 2026.
- Mesut Togaçar. A Novel Approach to Malware Detection: Converting Hardware Memory Data to 2D Barcodes Using Mobile Networks. J. Network Syst. Manage., 34(1):11, March 2026.
- Zoheir Karaouzene, Hicham Megnafi, Sidi Mohammed Meriah. A Hybrid Metaheuristic-GIS Approach for Cost-Efficient Planning of Radio Sites Using KPIs and Coverage Metrics. J. Network Syst. Manage., 34(3):67, July 2026.
- Khalid El Azhar, Ghizlane Hnini, Khalid El Fazazy, Mohamed Adnane Mahraz, Hamid Tairi, Jamal Riffi. Deep Learning for IoT Security: Leveraging GNNs and Attention Networks. J. Network Syst. Manage., 34(3):68, July 2026.
- Safae Khalis, Karima Hassini, Mohammed Chemmakha, Omar Habibi, Mohamed Lazaar. Robust CNN-Based Threat Detection in SDN-Enabled IoT Networks. J. Network Syst. Manage., 34(2):40, April 2026.
- Muhammad Liman Gambo, Ahmad Almulhem. Zero Trust Architecture: A Systematic Literature Review. J. Network Syst. Manage., 34(1):25, March 2026.
- Jalel Eddine Hajlaoui, Wided Khemili, Mohamed-Nazih Omri. Deep Learning and Fuzzy Logic Integration for Virtual Network Function Deployment. J. Network Syst. Manage., 34(2):50, April 2026.
- Khadija Mouatassim, Abdelfettah Mabrouk, Chaimae Ouchicha. A Novel Deep Learning-based Intrusion Detection Model for Cybersecurity in Intelligent Vehicular Ad Hoc Networks. J. Network Syst. Manage., 34(2):44, April 2026.