Journal: J. Network Syst. Manage.

Volume 32, Issue 2

24 -- 0Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li. Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks
25 -- 0Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa. Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks
26 -- 0Mradula Sharma, Parmeet Kaur 0001. Fog-based Federated Time Series Forecasting for IoT Data
27 -- 0Mathias De Brouwer, Filip De Turck, Femke Ongenae. Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE
28 -- 0Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya. Optimizing Completion Time of Requests in Serverless Computing
29 -- 0Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa. Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
30 -- 0Sateesh Gorikapudi, Hari Kishan Kondaveeti. Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks
31 -- 0Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz. 2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN
32 -- 0Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao. Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree
33 -- 0Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
34 -- 0Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari. A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints
35 -- 0Nathan Harris, Sajad Khorsandroo. DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks
36 -- 0Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio Oliveira Silva 0001. Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
37 -- 0Siamak Azadiabad, Ferhat Khendek. Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification
38 -- 0Mayssa Dardour, Mohamed Mosbah 0001, Toufik Ahmed. Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings
39 -- 0Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani. Placement Optimization of Virtual Network Functions in a Cloud Computing Environment
40 -- 0Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero. An Edge Cloud Based Coordination Platform for Multi-user AR Applications
41 -- 0Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song. Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach
42 -- 0Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams