Journal: J. Network Syst. Manage.

Volume 32, Issue 2

24 -- 0Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li. Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks
25 -- 0Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa. Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks
26 -- 0Mradula Sharma, Parmeet Kaur 0001. Fog-based Federated Time Series Forecasting for IoT Data
27 -- 0Mathias De Brouwer, Filip De Turck, Femke Ongenae. Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE
28 -- 0Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya. Optimizing Completion Time of Requests in Serverless Computing
29 -- 0Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa. Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
30 -- 0Sateesh Gorikapudi, Hari Kishan Kondaveeti. Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks
31 -- 0Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz. 2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN
32 -- 0Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao. Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree
33 -- 0Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki. Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
34 -- 0Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari. A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints
35 -- 0Nathan Harris, Sajad Khorsandroo. DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks
36 -- 0Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio Oliveira Silva 0001. Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
37 -- 0Siamak Azadiabad, Ferhat Khendek. Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification
38 -- 0Mayssa Dardour, Mohamed Mosbah 0001, Toufik Ahmed. Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings
39 -- 0Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani. Placement Optimization of Virtual Network Functions in a Cloud Computing Environment
40 -- 0Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero. An Edge Cloud Based Coordination Platform for Multi-user AR Applications
41 -- 0Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song. Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach
42 -- 0Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian. Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams

Volume 32, Issue 1

1 -- 0Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki. WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment
2 -- 0Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire. A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory
3 -- 0Abdelhamid Khiat, Mohamed Haddadi, Nacera Bahnes. Genetic-Based Algorithm for Task Scheduling in Fog-Cloud Environment
4 -- 0Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari. A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition
5 -- 0Sainath Reddy Sankepally, Nishoak Kosaraju, J. L. Shreya, Vishwambhar Reddy, U. Venkanna 0001. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
6 -- 0Marwa A. Elsayed, Nur Zincir-Heywood. BoostSec: Adaptive Attack Detection for Vehicular Networks
6 -- 0Marwa A. Elsayed, Nur Zincir-Heywood. BoostSec: Adaptive Attack Detection for Vehicular Networks
7 -- 0Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba. A Novel Light Reflection-Random Walk for Smart Sensors Relocation
8 -- 0Dongjie Liu, Jong-Hyouk Lee. A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites
9 -- 0Siwapon Charoenchai, Peerapon Siripongwutikorn. Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game
10 -- 0Hamida Ikhlef, Soumia Bourebia, Ali Melit. Link State Estimator for VANETs Using Neural Networks
11 -- 0Yoji Yamato. Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation
12 -- 0Marco Silva, José Santos, Marília Curado. The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges
13 -- 0Goldie M. Meitei, Ningrinla Marchang. Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing
14 -- 0Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh 0001, Maen Alzubi, Khaled Alrfou. DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation
15 -- 0Jérôme Lacan, Emmanuel Lochin. Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing
16 -- 0Kayuã Oleques Paim, Vagner Ereno Quincozes, Diego Kreutz, Rodrigo Brandão Mansilha, Weverton Cordeiro. Regenerating Networked Systems' Monitoring Traces Using Neural Networks
17 -- 0Anselme Russel Affane Moundounga, Hassan Satori. Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks
18 -- 0Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali. Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis
19 -- 0Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments
20 -- 0Yixuan Zhang, Basem Suleiman, Muhammad Johan Alibasa, Farnaz Farid. Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach
21 -- 0Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor. C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services
22 -- 0Abdelaziz Hamdi, Amina Nahali, Rafik Brahem. Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network
23 -- 0Yannick Florian Yankam, Vianney Kengne Tchendji, Jean Frédéric Myoupo. WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks