Content
January 2025, Volume 35, Issue 1
- e288 Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse
by Xiang Li & Ning Yang & Weifeng Liu & Aidong Chen & Yanlong Zhang & Shuo Wang & Jing Zhou - e2267 SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks
by Nagalapuram Selvarajan Swapna & Raguru Jaya Krishna & Avija Vishnuvardhan Reddy & Patike Kiran Rao & Perumalla Suman Prakash - e2268 Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks
by Adil Khan & Shabeer Ahmad & Ihsan Ali & Babar Hayat & Yanan Tian & Weixing Liu - e2269 Data sharing mode of dispatching automation system based on distributed machine learning
by Xiaoli He & Mi Luo & Yurui Hu & Feng Xiong - e2272 Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network
by Xin Wan & Xiang Huang & Fuzhi Wang - e2276 A distributed algorithm with network‐independent step‐size and event‐triggered mechanism for economic dispatch problem
by Baitong Chen & Jianhua Yang & Wei Lu & Witold Pedrycz & Changhai Sun - e2278 Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain
by Yazhou Zhang & Chaoyue Huang & Shaoteng Liu & Leichao Huang & Tianshu Yang & Xinpeng Zhang & Hanzhou Wu - e2279 Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things
by Bohao Jiang & Chaoyang Li & Yu Tang & Xiangjun Xin - e2290 No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation
by Diego Cardoso Nunes & Bruno Loureiro Coelho & Ricardo Parizotto & Alberto Egon Schaeffer‐Filho - e2292 Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions
by Dabin Huang & Mengyu Ge & Kunlan Xiang & Xiaolei Zhang & Haomiao Yang - e2294 An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks
by Muhammad Yousaf Saeed & Jingsha He & Nafei Zhu & Muhammad Farhan & Soumyabrata Dev & Thippa Reddy Gadekallu & Ahmad Almadhor - e2296 An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network
by Omar A. Alzubi & Jafar A. Alzubi & Issa Qiqieh & Ala' M. Al‐Zoubi - e2298 ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing
by Babar Ali & Muhammed Golec & Sukhpal Singh Gill & Felix Cuadrado & Steve Uhlig - e2299 An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing
by Geetanjali Rathee & Hemraj Saini & Selvaraj Praveen Chakkravarthy & Rajagopal Maheswar - e2302 A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse
by Yong Ding & Weiguo Huang & Hai Liang & Yujue Wang & Changsong Yang & Huiyong Wang - e2303 Homomorphic Witness Encryption and Its Applications
by Yuzhu Wang & Xingbo Wang & Mingwu Zhang - e2304 Updatable Signature Scheme With Weakened Token and No‐Directional Key Update
by Jiacheng Zhou & Zhenhua Liu & Baocang Wang - e2307 Autonomous Attack Mitigation Through Firewall Reconfiguration
by Daniele Bringhenti & Francesco Pizzato & Riccardo Sisto & Fulvio Valenza - e2308 Massive Data HBase Storage Method for Electronic Archive Management
by Huaquan Su & Junwei Li & Li Guo & Wanshuo Wang & Yongjiao Yang & You Wen & Kai Li & Pingyan Mo - e2309 The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens
by Andrei C. Azevedo & Eder J. Scheid & Muriel F. Franco & Demétrio F. F. Boeira & Luciano Zembruzki & Lisandro Z. Granville - e2310 SentinelGuard Pro: Deploying Cutting‐Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents
by Vankadhara Rajyalakshmi & Kuruva Lakshmanna - e2312 Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication
by Abdulhakim Sabur - e2313 Intent‐Based Network Configuration Using Large Language Models
by Nguyen Tu & Sukhyun Nam & James Won‐Ki Hong - e2314 MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications
by Chenxi Xiong & Ting Yang & Gang Mao - e2315 Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks
by Banoth Ravi & Utkarsh Verma - e2316 Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network
by Junwei Li & Huaquan Su & Li Guo & Wanshuo Wang & Yongjiao Yang & You Wen & Kai Li & Pingyan Mo - e2317 REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation
by Lyn Hill & Charalampos Rotsos & Chris Edwards & David Hutchison - e2318 An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing
by Saurav Tripathi & Sarsij Tripathi - e2319 A Method for Sharing English Education Resources in Multiple Virtual Networks Based on 6G
by Hongliu He - e2320 Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning
by Aristide Tanyi‐Jong Akem & Guillaume Fraysse & Marco Fiore - e2321 Multitopology Routing With Virtual Topologies and Segment Routing
by Nicolas Huin & Sébastien Martin & Jérémie Leguay - e2322 Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection
by Sukhyun Nam & Eui‐Dong Jeong & James Won‐Ki Hong - e2323 Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning
by Van Tu Nguyen & Sang‐Woo Ryu & Kyung‐Chan Ko & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2324 A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform
by Xiaozheng Liu - e2325 Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax
by Alexander Brechlin & Jochen Schäfer & Frederik Armknecht - e70000 Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice
by Honghui Zhu
July 2024, Volume 34, Issue 4
- e2260 Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges
by Wonseok Choi & Jongsoo Woo & James Won‐Ki Hong - e2261 Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity
by Srisht Fateh Singh & Panagiotis Michalopoulos & Andreas Veneris - e2266 Athena: Smart order routing on centralized crypto exchanges using a unified order book
by Robert Henker & Daniel Atzberger & Jan Ole Vollmer & Willy Scheibel & Jürgen Döllner & Markus Bick - e2277 Leveraging Ponzi‐like designs in stablecoins
by Shange Fu & Qin Wang & Jiangshan Yu & Shiping Chen - e2287 Innovations in Blockchain for Crypto Assets and Exchanges
by James Won‐Ki Hong & Andreas Veneris & Hongtaek Ju & Taeyeol Jeong & Changhoon Kang
May 2024, Volume 34, Issue 3
- e2256 Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network
by V. Karthik & R. Lakshmi & Salini Abraham & M. Ramkumar - e2257 A novel eviction policy based on shortest remaining time for software defined networking flow tables
by Kavi Priya Dhandapani & Mirnalinee Thanganadar Thangathai & Shahul Hamead Haja Moinudeen - e2258 TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
by Najmun Nisa & Adnan Shahid Khan & Zeeshan Ahmad & Johari Abdullah - e2262 Reducing the propagation delay of compact block in Bitcoin network
by Aeri Kim & Meryam Essaid & Sejin Park & Hongtaek Ju
March 2024, Volume 34, Issue 2
- e2252 Availability‐aware virtual network function placement based on multidimensional universal generating functions
by Kengo Arakawa & Eiji Oki - e2253 Topology analysis of the Ripple transaction network
by Anan Jin & Yuhang Ye & Brian Lee & Yuansong Qiao - e2254 A comprehensive review of blockchain integration in remote patient monitoring for E‐health
by Nedia Badri & Leïla Nasraoui & Leïla Azouz Saïdane - e2255 Blockchain and crypto forensics: Investigating crypto frauds
by Udit Agarwal & Vinay Rishiwal & Sudeep Tanwar & Mano Yadav
January 2024, Volume 34, Issue 1
- e2228 Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm
by Vankadhara Rajyalakshmi & Kuruva Lakshmanna - e2242 Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning
by Shengyi Yang & Shaoying Zhu - e2245 Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges
by Kyungchan Ko & Taeyeol Jeong & Jongsoo Woo & James Won‐Ki Hong - e2251 Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files
by Ziyu Qiu & Zhilei Zhou & Bradley Niblett & Andrew Johnston & Jeffrey Schwartzentruber & Nur Zincir‐Heywood & Malcolm I. Heywood
November 2023, Volume 33, Issue 6
- e2227 A novel data streaming method for detecting abnormal flows in distributed monitoring systems
by Aiping Zhou & Ye Zhu - e2230 Characterizing the Bitcoin network topology with Node‐Probe
by Meryam Essaid & Changhyun Lee & Hongteak Ju - e2232 Placement of virtual network functions for network services
by Brajesh Kumar Umrao & Dharmendra Kumar Yadav - e2233 Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure
by Haruto Taka & Fujun He & Eiji Oki - e2249 Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment
by Jabin Prakash J & Ramesh K & Saravanan K & Lakshmi Prabha G
September 2023, Volume 33, Issue 5
- e2224 Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review
by Banoth Ravi & Manoj Kumar & Yu‐Chen Hu & Shamsul Hassan & Bittu Kumar - e2225 A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment
by Wenjun Song & Mengqi Liu & Thar Baker & Qikun Zhang & Yu‐an Tan - e2226 Blockchain‐inspired lightweight trust‐based system in vehicular networks
by Sandeep Kumar Arora & Gulshan Kumar & Mustapha Hedabou & El Mehdi Amhoud & Celestine Iwendi - e2231 Dynamic management network system of automobile detection applying edge computing
by Xianhong Cao - e2240 A blockchain‐enabled security management framework for mobile edge computing
by Jafar A. Alzubi & Omar A. Alzubi & Ashish Singh & Tareq Mahmod Alzubi - e2243 Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing
by Jitendra Kumar Samriya & Mohit Kumar & Sukhpal Singh Gill - e2244 Load balancing clustering and routing for IoT‐enabled wireless sensor networks
by Shashank Singh & Veena Anand - e2248 Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system
by Erukala Suresh Babu & Mekala Srinivasa Rao & Gandharba Swain & A. Kousar Nikhath & Rajesh Kaluri - e2250 Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things
by Praveen Kumar Donta & Edmundo Monteiro & Chinmaya Kumar Dehury & Ilir Murturi
July 2023, Volume 33, Issue 4
- e2213 RNN‐EdgeQL: An auto‐scaling and placement approach for SFC
by Suman Pandey & Minji Choi & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2215 SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting
by Gagan Nandha Kumar & Kostas Katsalis & Panagiotis Papadimitriou & Paul Pop & Georg Carle - e2221 Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios
by Luis M. Contreras & Alberto Solano & Francisco Cano & Jesus Folgueira - e2241 Accelerating network softwarization in the cognitive age
by Kohei Shiomoto & Young‐Tak Kim & Christian Esteve Rothenberg & Barbara Martini & Eiji Oki
May 2023, Volume 33, Issue 3
- e2192 Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks
by Lei Wu & Shengnan Zhao & Xia Wei & Lingzhen Meng - e2193 Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard
by Shixiong Yao & Xingjian Tian & Jiageng Chen & Yi Xiong - e2198 Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis
by Peng Zeng & Guanjun Lin & Jun Zhang & Ying Zhang - e2200 MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
by Sangjukta Das & Suyel Namasudra - e2222 A federated semi‐supervised learning approach for network traffic classification
by Zhiping Jin & Zhibiao Liang & Meirong He & Yao Peng & Hanxiao Xue & Yu Wang - e2229 Editorial for special issue on security and trust on networked systems
by Weizhi Meng & Sokratis K. Katsikas & Jiageng Chen & Chao Chen
March 2023, Volume 33, Issue 2
- e2219 Audit‐based correction mechanism for malicious statistics information of data plane
by Dong Liang & Qinrang Liu & Ke Song & Binghao Yan & Tao Hu - e2220 On minimizing flow monitoring costs in large‐scale software‐defined network networks
by Haythem Yahyaoui & Mohamed Faten Zhani & Ouns Bouachir & Moayad Aloqaily - e2223 Optimal network‐aware virtual data center embedding
by Ameni Hbaieb & Mahdi Khemakhem
January 2023, Volume 33, Issue 1
- e2216 EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network
by Tanima Bhowmik & Indrajit Banerjee - e2217 Graph neural network‐based virtual network function deployment optimization
by Hee‐Gon Kim & Suhyun Park & Stanislav Lange & Doyoung Lee & Dongnyeong Heo & Heeyoul Choi & Jae‐Hyoung Yoo & JamesWon‐Ki Hong - e2218 Towards optimal synchronization in NFV‐based environments
by Zakaria Alomari & Mohamed Faten Zhani & Moayad Aloqaily & Ouns Bouachir
November 2022, Volume 32, Issue 6
- e2210 Software‐defined content delivery network at the edge for adaptive video streaming
by Akhilesh Kumar & Shashwati Banerjea & Rishabh Jain & Mayank Pandey - e2211 FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC
by Xiaoying Huang & Zhichuan Guo & Mangu Song - e2212 Container placement and migration strategies for cloud, fog, and edge data centers: A survey
by Kiranpreet Kaur & Fabrice Guillemin & Francoise Sailhan - e2214 Load migration in distributed softwarized network controllers
by Sepehr Abbasi Zadeh & Farid Zandi & Mohammad Amin Beiruti & Yashar Ganjali
September 2022, Volume 32, Issue 5
- e2199 A cost‐effective and load‐balanced controller placement method in software‐defined networks
by Mili Dhar & Bidyut K. Bhattacharyya & Mrinal Kanti Debbarma & Swapan Debbarma - e2201 Dissemination control in dynamic data clustering for dense IIoT against false data injection attack
by Carlos Pedroso & Aldri Santos - e2208 Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture
by Ian Vilar Bastos & Igor Monteiro Moraes & Thi‐Mai‐Trang Nguyen & Guy Pujolle - e2209 vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH
by Reza Shokri Kalan & Stuart Clayman & Muge Sayıt
July 2022, Volume 32, Issue 4
- e2194 A secure cross‐organizational container deployment approach to enable ad hoc collaborations
by Laurens Van Hoye & Tim Wauters & Filip De Turck & Bruno Volckaert - e2195 amulog: A general log analysis framework for comparison and combination of diverse template generation methods
by Satoru Kobayashi & Yuya Yamashiro & Kazuki Otomo & Kensuke Fukuda - e2196 Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation
by Ranjeet B. Kagade & Santhosh Jayagopalan - e2197 Cost‐effective and accurate flow statistics collection in OpenFlow‐based SDN
by Binghao Yan & Qinrang Liu & Jianliang Shen & Dong Liang & Xingyu Liu
May 2022, Volume 32, Issue 3
- e2186 A batch delivery mechanism of network update in software‐defined wide area networks
by RongBo Zhang & Xin Li & Jibin Niu & Yinqing Wang - e2187 MediTrans—Patient‐centric interoperability through blockchain
by Merlin George & Anu Mary Chacko - e2188 Towards threshold‐agnostic heavy‐hitter classification
by Adrian Pekar & Alejandra Duque‐Torres & Winston K.G. Seah & Oscar M. Caicedo Rendon - e2190 Block diffusion delay attack and its countermeasures in a Bitcoin network
by Masahiro Sasabe & Masanari Yamamoto & Yuanyu Zhang & Shoji Kasahara - e2191 Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks
by Guto Leoni Santos & Pierangelo Rosati & Theo Lynn & Judith Kelner & Djamel Sadok & Patricia Takako Endo
March 2022, Volume 32, Issue 2
- e2161 An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures
by Almir Guimarães & Paulo Maciel & Rivalino Matias & Bruno Silva & Bruno Nogueira - e2166 DockSDN: A hybrid container‐based software‐defined networking emulation tool
by Erick Petersen & Marco Antonio To - e2179 Truthful Decentralized Blockchain Oracles
by Yuxi Cai & Nafis Irtija & Eirini Eleni Tsiropoulou & Andreas Veneris - e2180 Identity and access management using distributed ledger technology: A survey
by Fariba Ghaffari & Komal Gilani & Emmanuel Bertin & Noel Crespi - e2183 Veritaa: A distributed public key infrastructure with signature store
by Jakob Schaerer & Severin Zumbrunn & Torsten Braun - e2184 Simulating permissionless blockchains: Distribution fitting, tool support, and a case study
by Maher Alharby & Aad van Moorsel - e2189 BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services
by Abdelkader Lahmadi & Emmanuel Bertin & Ruidong Li
January 2022, Volume 32, Issue 1
- e2154 A privacy‐focused approach for anomaly detection in IoT networks
by Pedro Martins & André B. Reis & Paulo Salvador & Susana Sargento - e2156 A Value‐of‐Information‐based management framework for fog services
by Filippo Poltronieri & Mauro Tortonesi & Alessandro Morelli & Cesare Stefanelli & Niranjan Suri - e2157 Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases
by Gabor Soos & Daniel Ficzere & Pal Varga - e2158 Industrial control protocols in the Internet core: Dismantling operational practices
by Marcin Nawrocki & Thomas C. Schmidt & Matthias Wählisch - e2165 A model‐driven approach for deployment descriptor design in network function virtualization
by Wassim Sellil Atoui & Nour Assy & Walid Gaaloul & Imen Grida Ben Yahia - e2178 An optimization‐based congestion control for constrained application protocol
by Godfrey A. Akpakwu & Gerhard P. Hancke & Adnan M. Abu‐Mahfouz - e2181 An access control for IoT based on network community perception and social trust against Sybil attacks
by Gustavo H. C. de Oliveira & Agnaldo de Souza Batista & Michele Nogueira & Aldri L. dos Santos - e2182 Topics from networks management and operations
by István Gódor & Imen Grida Ben Yahia - e2185 Energy‐aware mobility for aerial networks: A reinforcement learning approach
by Elif Bozkaya & Yusuf Özçevik & Mertkan Akkoç & Muhammed Raşit Erol & Berk Canberk
November 2021, Volume 31, Issue 6
- e2152 A generalized machine learning‐based model for the detection of DDoS attacks
by Murk Marvi & Asad Arfeen & Riaz Uddin - e2155 Slicing Wi‐Fi links based on QoE video streaming fairness
by Mauricio de Oliveira & Daniel F. Macedo - e2159 Denial of service detection using dynamic time warping
by Diab M. Diab & Basil AsSadhan & Hamad Binsalleeh & Sangarapillai Lambotharan & Konstantinos G. Kyriakopoulos & Ibrahim Ghafir - e2160 An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks
by Murk Marvi & Asad Arfeen & Riaz Uddin - e2162 E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks
by Yun‐Zhan Cai & Ting‐Yu Lin & Yu‐Ting Wang & Ya‐Pei Tuan & Meng‐Hsun Tsai - e2163 A systematic review on distributed denial of service attack defense mechanisms in programmable networks
by Bruno L. Dalmazo & Jonatas A. Marques & Lucas R. Costa & Michel S. Bonfim & Ranyelson N. Carvalho & Anderson S. da Silva & Stenio Fernandes & Jacir L. Bordim & Eduardo Alchieri & Alberto Schaeffer‐Filho & Luciano Paschoal Gaspary & Weverton Cordeiro - e2164 Graph neural network‐based virtual network function deployment optimization
by Hee‐Gon Kim & Suhyun Park & Stanislav Lange & Doyoung Lee & Dongnyeong Heo & Heeyoul Choi & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2173 Topic allocation method on edge servers for latency‐sensitive notification service
by Tomoya Tanaka & Tomio Kamada & Chikara Ohta - e2174 A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation
by Daichi Ono & Luis Guillen & Satoru Izumi & Toru Abe & Takuo Suganuma - e2175 Visualization of Ethereum P2P network topology and peer properties
by Soohoon Maeng & Meryam Essaid & Changhyun Lee & Sejin Park & Hongteak Ju - e2176 Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment
by Do‐Young Lee & Se‐Yeon Jeong & Kyung‐Chan Ko & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2177 Editorial for special issue on “Towards service and networking intelligence for humanity”
by Seung‐Joon Seok & Hongtaek Ju & Yuncheng Zhu & Jen‐Jee Chen
September 2021, Volume 31, Issue 5
- e2064 Quality of experience and quality of service‐aware handover for video transmission in heterogeneous networks
by Iago Medeiros & Lucas Pacheco & Denis Rosário & Cristiano Both & Jéferson Nobre & Eduardo Cerqueira & Lisandro Granville - e2068 Beyond VNFM: Filling the gaps of the ETSI VNF manager to fully support VNF life cycle operations
by Giovanni Venâncio & Vinícius Fulber Garcia & Leonardo da Cruz Marcuzzo & Thales Nicolai Tavares & Muriel Figueredo Franco & Lucas Bondan & Alberto Egon Schaeffer‐Filho & Carlos Raniery Paula dos Santos & Lisandro Zambenedetti Granville & Elias P. Duarte - e2078 SDN‐based architecture for providing quality of service to high‐performance distributed applications
by Alexandre T. Oliveira & Bruno José C. A. Martins & Marcelo F. Moreno & Antônio Tadeu A. Gomes & Artur Ziviani & Alex Borges Vieira - e2151 Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS)
by Denis Rosário & Leandro A. Villas
July 2021, Volume 31, Issue 4
- e2108 Design, implementation, and evaluation of learning algorithms for dynamic real‐time network monitoring
by Rashid Mijumbi & Abhaya Asthana & Markku Koivunen & Fu Haiyong & Qinjun Zhu - e2109 Exploring anomalous behaviour detection and classification for insider threat identification
by Duc C. Le & Nur Zincir‐Heywood - e2136 Minimizing protection switching time in transport networks with shared mesh protection
by Choong‐hee Cho & Jeong‐dong Ryoo - e2137 A cost‐efficient QoS‐aware analytical model of future software content delivery networks
by Beatriz Otero & Eva Rodríguez & Otilio Rojas & Javier Verdú & Juan José Costa & Manuel Alejandro Pajuelo & Ramón Canal - e2138 Graph theoretical approach for automated IP lifecycle management in telco networks
by Kübra Duran & Bahtiyar Karanlik & Berk Canberk - e2140 A message keyword extraction approach by accurate identification of field boundaries
by Young‐Hoon Goo & Kyu‐Seok Shim & Min‐Seob Lee & Myung‐Sup Kim - e2141 Decision Tree‐Based Entries Reduction scheme using multi‐match attributes to prevent flow table overflow in SDN environment
by Priyanka Nallusamy & Sapna Saravanen & Murugan Krishnan - e2142 Optimal segments for forwarding table size minimization in segment‐routed SDNs
by Anix Anbiah & Krishna M. Sivalingam - e2143 Detecting and analyzing border gateway protocol blackholing activity
by Talaya Farasat & Akmal Khan - e2144 A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks
by Shashank Gavel & Ajay Singh Raghuvanshi & Sudarshan Tiwari - e2145 Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network
by Babu R. Dawadi & Danda B. Rawat & Shashidhar R. Joshi & Pietro Manzoni & Martina M. Keitsch - e2146 Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition
by Nasif Muslim & Salekul Islam & Jean‐Charles Grégoire - e2147 Application layer classification of Internet traffic using ensemble learning models
by Asad Arfeen & Khizar Ul Haq & Syed Muhammad Yasir - e2148 Modeling and accomplishing the BEREC network neutrality policy
by David S. Barreto & Rafael F. Reale & Joberto S. B. Martins
May 2021, Volume 31, Issue 3
- e2111 Counselors network for intrusion detection
by Silvio E. Quincozes & Carlos Raniery & Raul Ceretta Nunes & Célio Albuquerque & Diego Passos & Daniel Mossé - e2112 SDN‐based teleprotection and control power systems: A study of available controllers and their suitability
by Arthur A. Zopellaro Soares & Juan Lucas Vieira & Silvio E. Quincozes & Vinicius C. Ferreira & Luana M. Uchôa & Yona Lopes & Diego Passos & Natalia C. Fernandes & Igor Monteiro Moraes & Débora Muchaluat‐Saade & Célio Albuquerque - e2113 An analysis of the fees and pending time correlation in Ethereum
by José Eduardo de Azevedo Sousa & Vinícius Oliveira & Júlia Valadares & Glauber Dias Gonçalves & Saulo Moraes Villela & Heder Soares Bernardino & Alex Borges Vieira - e2115 Classification and evaluation of IoT brokers: A methodology
by Eddas Bertrand‐Martinez & Phelipe Dias Feio & Vagner de Brito Nascimento & Fabio Kon & Antônio Abelém - e2124 VNF‐Consensus: A virtual network function for maintaining a consistent distributed software‐defined network control plane
by Giovanni Venâncio & Rogério C. Turchetti & Edson T. Camargo & Elias P. Duarte - e2153 Editorial for the special issue on research trends in network operations and management with selected papers from the ninth edition of the Latin American Network Operations and Management Symposium
by Igor Monteiro Moraes & Célio Albuquerque & Artur Ziviani
March 2021, Volume 31, Issue 2
- e2090 Network traffic identification of several open source secure proxy protocols
by Yidan Zhang & Jiageng Chen & Kaiming Chen & Ruoyan Xu & Jesen Teh & Shuai Zhang - e2091 Research on adaptive beacon message broadcasting cycle based on vehicle driving stability
by Yuejin Zhang & Meng Wang & Juan Wang & Fei Du & Yong Hu & Meng Yu & Guanghui Li & Aiyun Zhan - e2092 K‐PSO: An improved PSO‐based container scheduling algorithm for big data applications
by Bo Liu & Jiawei Li & Weiwei Lin & Weihua Bai & Pengfei Li & Qian Gao - e2096 Privacy‐preserving cloud‐fog–based traceable road condition monitoring in VANET
by Wei Wang & Lei Wu & Wenlei Qu & Zhaoman Liu & Hao Wang - e2101 Research on scheduling method based on traffic matrix for IoT security
by Shaohua Cao & Dongjie Zhu & Guofu Li & Yanwu Zhang & Xiani Fan & Shanshan Geng & Haiwen Du & Ning Cao - e2103 Security and trust preserving inter‐ and intra‐cloud VM migrations
by Mudassar Aslam & Simon Bouget & Shahid Raza - e2107 A fog‐based collaborative intrusion detection framework for smart grid
by Wenjuan Li & Man Ho Au & Yu Wang - e2139 Secure grid‐based density peaks clustering on hybrid cloud for industrial IoT
by Liping Sun & Shang Ci & Xiaoqing Liu & Liangmin Guo & Xiaoyao Zheng & Yonglong Luo - e2150 Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions
by Weizhi Meng & Piotr Cofta & Tyrone W.A. Grandison
January 2021, Volume 31, Issue 1
- e2127 Towards distributed emergency flow prioritization in software‐defined networks
by Jerico Moeyersons & Behrooz Farkiani & Tim Wauters & Bruno Volckaert & Filip De Turck - e2128 On accounting for screen resolution in adaptive video streaming: QoE‐driven bandwidth sharing framework
by Othmane Belmoukadam & Muhammad Jawad Khokhar & Chadi Barakat - e2130 De‐anonymizing Ethereum blockchain smart contracts through code attribution
by Shlomi Linoy & Natalia Stakhanova & Suprio Ray - e2134 OpenBNG: Central office network functions on programmable data plane hardware
by Ralf Kundel & Leonhard Nobach & Jeremias Blendin & Wilfried Maas & Andreas Zimber & Hans‐Joerg Kolbe & Georg Schyguda & Vladimir Gurevich & Rhaban Hark & Boris Koldehofe & Ralf Steinmetz - e2149 CNSM 2019 special issue: Embracing the new wave of artificial intelligence
by Nur Zincir‐Heywood & Rémi Badonnel
November 2020, Volume 30, Issue 6
- e2116 A framework for multi‐provider virtual private networks in software‐defined federated networks
by Habib Mostafaei & Gabriele Lospoto & Roberto Di Lallo & Massimo Rimondini & Giuseppe Di Battista - e2123 CL‐MIPv6: A cross‐layer approach for fast‐internetwork‐mobility support in 6LoWPAN wireless sensor networks
by Zakaria Hamidi‐Alaoui & Noureddine Moussa & Abdelbaki El Belrhiti El Alaoui - e2125 Wireless‐Fog Mesh: A framework for in‐network computing of microservices in semipermanent smart environments
by Shabir Ali & Mayank Pandey & Neeraj Tyagi - e2126 Clustering method in protocol reverse engineering for industrial protocols
by Kyu‐Seok Shim & Young‐Hoon Goo & Min‐Seob Lee & Myung‐Sup Kim - e2129 Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
by Basil AsSadhan & Abraham Alzoghaiby & Hamad Binsalleeh & Konstantinos G. Kyriakopoulos & Sangarapillai Lambotharan - e2131 Trustful ad hoc cross‐organizational data exchanges based on the Hyperledger Fabric framework
by Laurens Van Hoye & Tim Wauters & Filip De Turck & Bruno Volckaert - e2132 Next generation of microservices for the 5G Service‐Based Architecture
by João Bourbon Moreira & Henrique Mamede & Vasco Pereira & Bruno Sousa - e2135 An efficient neural network optimized by fruit fly optimization algorithm for user equipment association in software‐defined wireless sensor network
by Xiao‐Ping Zeng & Qi Luo & Jia‐Li Zheng & Guang‐Hui Chen
September 2020, Volume 30, Issue 5
- e2089 Blockchain‐based access control for enterprise blockchain applications
by Lei Xu & Isaac Markus & Subhod I & Nikhil Nayab - e2093 Weighted voting on the blockchain: Improving consensus in proof of stake protocols
by Stefanos Leonardos & Daniël Reijsbergen & Georgios Piliouras - e2098 Incentives in Ethereum's hybrid Casper protocol
by Vitalik Buterin & Daniël Reijsbergen & Stefanos Leonardos & Georgios Piliouras - e2099 FastFabric: Scaling hyperledger fabric to 20 000 transactions per second
by Christian Gorenflo & Stephen Lee & Lukasz Golab & Srinivasan Keshav - e2106 Bitcoin's dynamic peer‐to‐peer topology
by Meryam Essaid & Sejin Park & Hong‐Taek Ju - e2133 Editorial for special issue on “challenges and opportunities of Blockchain and Cryptocurrency”
by Hongtaek Ju & Raouf Boutaba & Myungsup Kim & Burkhard Stiller
July 2020, Volume 30, Issue 4
- e2097 A survey on indexing techniques for mobility in Internet of Things': Challenges, performances, and perspectives
by Hazem Jihad Badarneh & Sri Devi Ravana & Ali Mohammed Mansoor - e2100 Traffic classification at the radio spectrum level using deep learning models trained with synthetic data
by Tom De Schepper & Miguel Camelo & Jeroen Famaey & Steven Latré - e2102 Segment‐aware dynamic routing for DASH flows over software‐defined networks
by Cihat Cetinkaya & Korhan Herguner & Cornelius Hellge & Muge Sayit - e2104 Community oriented in‐network caching and edge caching for over‐the‐top services in adaptive network conditions to improve performance
by Suman Pandey & Soyoung Park & Mi Jung Choi - e2105 OASM: An overload‐aware workload scheduling method for cloud computing based on biogeographical optimization
by Ali Abbasi Tadi & Mohammad Reza Khayyambashi & Hadi Khosravi‐Farsani - e2114 Dynamic credit reservation for online charging of regular Internet of things traffic
by Huai‐Sheng Huang & Da‐Yu Hung
May 2020, Volume 30, Issue 3
- e2053 Impact of VNF placements on QoE monitoring in the cloud
by Lam Dinh‐Xuan & Christian Popp & Valentin Burger & Florian Wamser & Tobias Hoßfeld - e2054 An objective and subjective quality assessment study of passive gaming video streaming
by Nabajeet Barman & Saman Zadtootaghaj & Steven Schmidt & Maria G. Martini & Sebastian Möller - e2057 Improving video QoE with IP over ICN
by Ioannis Doumanis & Alexander Phinikarides & George Xylomenos & Stuart C.M. Porter & Michael Georgiades - e2058 Dissecting the performance of YouTube video streaming in mobile networks
by Anika Schwind & Cise Midoglu & Özgü Alay & Carsten Griwodz & Florian Wamser - e2063 Game of protocols: Is QUIC ready for prime time streaming?
by Sevket Arisu & Ertan Yildiz & Ali C. Begen - e2081 Muslin: A QoE‐aware CDN resources provisioning and advertising system for cost‐efficient multisource live streaming
by Simon Da Silva & Joachim Bruneau‐Queyreix & Mathias Lacaud & Daniel Negru & Laurent Réveillère - e2083 Quality of experience for unified communications: A survey
by Jasmina Baraković Husić & Sabina Baraković & Enida Cero & Nina Slamnik & Merima Oćuz & Azer Dedović & Osman Zupčić - e2110 IJNM Special Issue—International Journal of Network Management: QoE‐centric analysis and management of communication networks
by Florian Wamser & Özgü Alay & Florian Metzger & Stefan Valentin
March 2020, Volume 30, Issue 2
- e2087 Pluggable SDN framework for managing heterogeneous SDN networks
by Jerico Moeyersons & Pieter‐Jan Maenhaut & Filip Turck & Bruno Volckaert - e2094 A proactive defense method for the stealthy EDoS attacks in a cloud environment
by Neha Agrawal & Shashikala Tapaswi - e2095 QoS‐aware cross‐domain collaborative energy‐saving mechanism for FiWi virtual networks
by Siya Xu & Xujing Peng & Shaoyong Guo & Xuesong Qiu & Wenchen He
January 2020, Volume 30, Issue 1
- e2086 CU placement over a reconfigurable wireless fronthaul in 5G networks with functional splits
by Davit Harutyunyan & Roberto Riggio & Slawomir Kuklinski & Toufik Ahmed - e2088 A review of mobility management entity in LTE networks: Power consumption and signaling overhead
by Alaa A. R. Alsaeedy & Edwin K. P. Chong