| 2 | -- | 3 | Xuemin Shen. Mobile crowdsourcing [Editor's note] |
| 4 | -- | 5 | Kejie Lu, Shucheng Liu, Fred Feisullin, Mehmet Ersue, Yu Cheng. Network function virtualization: opportunities and challenges [Guest editorial] |
| 6 | -- | 14 | Brent Hirschman, Pranav Mehta, Kannan Babu Ramia, Ashok Sunder Rajan, Edwin Dylag, Ajaypal Singh, Martin Mcdonald. High-performance evolved packet core signaling and bearer processing on general-purpose processors |
| 15 | -- | 21 | Róbert Szabó, Mario Kind, Fritz-Joachim Westphal, Hagen Woesner, David Jocha, András Császár. Elastic network functions: opportunities and challenges |
| 22 | -- | 29 | Zvika Bronstein, Evelyne Roch, Jinwei Xia, Adi Molkho. Uniform handling and abstraction of NFV hardware accelerators |
| 30 | -- | 35 | Wanfu Ding, Wen Qi, Jianping Wang, Biao Chen. OpenSCaaS: an open service chain as a service platform toward the integration of SDN and NFV |
| 36 | -- | 41 | Timothy Wood, K. K. Ramakrishnan, Jinho Hwang, Grace Liu, Wei Zhang. Toward a software-based network: integrating software defined networking and network function virtualization |
| 42 | -- | 47 | Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Xiang Zhang. Network function virtualization in the multi-tenant cloud |
| 48 | -- | 53 | Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, Yuan-Cheng Lai. An extended SDN architecture for network function virtualization with a case study on intrusion prevention |
| 54 | -- | 59 | Songlin Sun, Michel Kadoch, Liang Gong, Bo Rong. Integrating network function virtualization with SDR and SDN for 4G/5G networks |
| 60 | -- | 67 | Enrique J. Hernandez-Valencia, Steven Izzo, Beth Polonsky. How will NFV/SDN transform service provider opex? |
| 68 | -- | 74 | Chengchao Liang, F. Richard Yu, Xi Zhang. Information-centric network function virtualization over 5g mobile wireless networks |
| 75 | -- | 81 | Yi Liu, Yan Zhang, Rong Yu, Shengli Xie. Integrated energy and spectrum harvesting for 5G wireless communications |
| 82 | -- | 87 | Bingyang Liu, Jun Bi. On the deployability of inter-AS spoofing defenses |
| 89 | -- | 95 | Chunxiao Jiang, Norman C. Beaulieu, Lin Zhang, Yong Ren, Mugen Peng, Hsiao-Hwa Chen. Cognitive radio networks with asynchronous spectrum sensing and access |
| 96 | -- | 103 | Daojing He, Sammy Chan, Mohsen Guizani. Handover authentication for mobile networks: security and efficiency aspects |
| 104 | -- | 112 | Imran Khan, Fatna Belqasmi, Roch H. Glitho, Noël Crespi, Monique Morrow, Paul Polakos. Wireless sensor network virtualization: early architecture and research perspectives |