Content
November 2019, Volume 29, Issue 6
- e2080 Real‐time and fine‐grained network monitoring using in‐band network telemetry
by Jonghwan Hyun & Nguyen Van Tu & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2085 Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation
by Guilherme Geronimo & Rafael Uriarte & Carlos Westphall
October 2019, Volume 29, Issue 5
- e2082 Formal modeling and verification of software‐defined networks: A survey
by Nitin Shukla & Mayank Pandey & Shashank Srivastava - e2084 CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users
by Tiago O. Castro & Vitor G. R. Caitité & Daniel F. Macedo & Aldri L. dos Santos
July 2019, Volume 29, Issue 4
- e2067 A flow handover protocol to support state migration in softwarized networks
by Manuel Peuster & Hannes Küttner & Holger Karl - e2069 Techno‐economic analysis of FiWi access networks based on optimized source packet traffic
by Damir Breskovic & Dinko Begusic - e2079 Efficient allocation of elastic interfederation encrypted streaming sessions
by Rafael Xavier & Lisandro Zambenedetti Granville & Filip De Turck & Bruno Volckaert
May 2019, Volume 29, Issue 3
- e2047 A meta‐heuristic Bayesian network classification for intrusion detection
by Mahesh Kumar Prasath & Balasubramani Perumal - e2049 User identification via neural network based language models
by Tien D. Phan & Nur Zincir‐Heywood - e2050 A deep learning method to detect network intrusion through flow‐based features
by Abdurrahman Pektaş & Tankut Acarman - e2055 Securing light clients in blockchain with DLCP
by Leonardo da Costa & André Neto & Billy Pinheiro & Weverton Cordeiro & Roberto Araújo & Antônio Abelém - e2061 Blockchain and smart contracts for higher education registry in Brazil
by Lucas M. Palma & Martín A. G. Vigil & Fernando L. Pereira & Jean E. Martina - e2065 Deep mining port scans from darknet
by Sofiane Lagraa & Yutian Chen & Jérôme François - e2070 Advanced security management
by Carol Fung & Jérôme François & Weverton Cordeiro & Mohamed Faten Zhani
March 2019, Volume 29, Issue 2
- e2052 Highly efficient optical aggregation network with network functions virtualization
by Takashi Miyamura & Akira Misawa & Jun‐ichi Kani - e2056 A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier
by Rodérick Fanou & Victor Sanchez‐Agüero & Francisco Valera & Michuki Mwangi & Jane Coffin - e2059 Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems
by Emmanouil Vasilomanolakis & Max Mühlhäuser - e2060 A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
by Huru Hasanova & Ui‐jun Baek & Mu‐gon Shin & Kyunghee Cho & Myung‐Sup Kim - e2062 An approach for provisioning virtual sensors in sensor clouds
by Marcus Lemos & Ricardo Rabelo & Douglas Mendes & Carlos Carvalho & Raimir Holanda - e2066 Resource availability–aware adaptive provisioning of virtual data center networks
by Malayam Parambath Gilesh & S D Madhu Kumar & Lillykutty Jacob
January 2019, Volume 29, Issue 1
- e2042 DDoS protection with stateful software‐defined networking
by Filippo Rebecchi & Julien Boite & Pierre‐Alexis Nardin & Mathieu Bouet & Vania Conan - e2043 Smashing OpenFlow's “atomic” actions: Programmable data plane packet manipulation in hardware
by Salvatore Pontarelli & Marco Bonola & Giuseppe Bianchi - e2045 Optimal management of reusable functional blocks in 5G superfluid networks
by Luca Chiaraviglio & Lavinia Amorosi & Nicola Blefari‐Melazzi & Paolo Dell'Olmo & Mohammad Shojafar & Stefano Salsano - e2048 IEEE NetSoft 2017 special issue: Softwarization sustaining a hyper‐connected world: En route to 5G
by Franco Callegati & Walter Cerroni - e2051 Intent‐based service management for heterogeneous software‐defined infrastructure domains
by Gianluca Davoli & Walter Cerroni & Slavica Tomovic & Chiara Buratti & Chiara Contoli & Franco Callegati
November 2018, Volume 28, Issue 6
- e2024 PlaySharing: A group synchronization scheme for media streaming services in hierarchical WLANs
by Dongwoo Kwon & Hyeonwoo Kim & Hongtaek Ju - e2036 Orchestrator conversation: Distributed management of cloud applications
by Merlijn Sebrechts & Gregory Van Seghbroeck & Tim Wauters & Bruno Volckaert & Filip De Turck - e2037 New fluid approaches for studying the performance of elastic traffic under class based weighed fair queuing system
by Mohamed El Hedi Boussada & Jean Marie Garcia & Mounir Frikha - e2039 Botnet detection based on network flow summary and deep learning
by Abdurrahman Pektaş & Tankut Acarman - e2040 Sensitivity analysis of an availability model for disaster tolerant cloud computing system
by Bruno Silva & Rubens Matos & Eduardo Tavares & Paulo Maciel & Armin Zimmermann - e2041 A bottom‐up design for spatial search in large networks and clouds
by Misbah Uddin & Rolf Stadler & Alexander Clemm - e2044 On the design and performance evaluation of automatic traffic report generation systems with huge data volumes
by Carlos Vega Moreno & Eduardo Miravalls Sierra & Guillermo Julián Moreno & Jorge E. López de Vergara & Eduardo Magaña & Javier Aracil - e2046 Clustering‐based quality selection heuristics for HTTP adaptive streaming over cache networks
by Jeroen van der Hooft & Niels Bouten & Danny De Vleeschauwer & Werner Van Leekwijck & Tim Wauters & Steven Latré & Filip De Turck
September 2018, Volume 28, Issue 5
- e2025 A feature extraction method for predictive maintenance with time‐lagged correlation–based curve‐registration model
by Shouli Zhang & Chen Liu & Shen Su & Yanbo Han & XiaoHong Li - e2032 Special issue on management of IoT
by Jorge Sá Silva & António Loureiro & Antonio Skarmeta & Fernando Boavida - e2033 PYGRID: A software development and assessment framework for grid‐aware software defined networking
by Mohamed Samir & Mohamed Azab & Mohamed R. M. Rizk & Nayera Sadek - e2034 ManIoT: A 2‐tier management platform for heterogeneous IoT devices and applications
by Josué B. Antunes & István L. Denés & Tiago O. Castro & Daniel F. Macedo & Aldri L. dos Santos - e2035 Domain‐based distributed identifier‐locator mapping management in Internet‐of‐Things networks
by Nak‐Jung Choi & Moneeb Gohar & Seok‐Joo Koh - e2038 Enhancing IoT security through network softwarization and virtual security appliances
by Alejandro Molina Zarca & Jorge Bernal Bernabe & Ivan Farris & Yacine Khettab & Tarik Taleb & Antonio Skarmeta
July 2018, Volume 28, Issue 4
- e2020 A flexible, reliable, and adaptive timeslot‐based advance bandwidth‐reservation mechanism for media delivery services
by Maryam Barshan & Hendrik Moens & Bruno Volckaert & Filip De Turck - e2021 Probe generation for active probing
by A. Dusia & A. S. Sethi - e2022 DSSDN: Demand‐supply based load balancing in Software‐Defined Wide‐Area Networks
by Kshira Sagar Sahoo & Mayank Tiwary & Bibhudatta Sahoo & Ratnakar Dash & Kshirasagar Naik - e2023 Deadline‐aware TCP congestion control for HTTP adaptive streaming services
by Maxim Claeys & Niels Bouten & Danny De Vleeschauwer & Koen De Schepper & Werner Van Leekwijck & Steven Latré & Filip De Turck
May 2018, Volume 28, Issue 3
- e2015 HeS‐CoP: Heuristic switch‐controller placement scheme for distributed SDN controllers in data center networks
by Woojoong Kim & Jian Li & James Won‐Ki Hong & Young‐Joo Suh - e2016 The research on a novel structure of two‐layer distributed controllers in software‐defined networking
by Ligang Dong & Dandan Yang & Kaiqiang Guo & Shuocheng Fei & Ying Li & Weiming Wang - e2017 Analysis of monitoring and multipath support on top of OpenFlow specification
by Pedro H. A. Rezende & Paulo R. S. L. Coelho & Luis F. Faina & Lasaro J. Camargos & Rafael Pasquini - e2018 A survey and classification of controller placement problem in SDN
by Ashutosh Kumar Singh & Shashank Srivastava - e2019 Spectrum mobility management in cognitive two‐tier networks
by Kaouthar Sethom & Guy Pujolle
March 2018, Volume 28, Issue 2
- e1991 A service‐agnostic method for predicting service metrics in real time
by Rerngvit Yanggratoke & Jawwad Ahmed & John Ardelius & Christofer Flinta & Andreas Johnsson & Daniel Gillblad & Rolf Stadler - e1995 A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter
by Vennila Ganesan & Manikandan msk - e2009 Automatic data aggregation for recursively modeled NFV services
by Xuejun Cai & Wolfgang John & Catalin Meirosu - e2011 Effective behavior signature extraction method using sequence pattern algorithm for traffic identification
by Kyu‐Seok Shim & Sung‐Ho Yoon & Baraka D. Sija & Jun‐Sang Park & Kyunghee Cho & Myung‐Sup Kim - e2012 ONVisor: Towards a scalable and flexible SDN‐based network virtualization platform on ONOS
by Yoonseon Han & Thomas Vachuska & Ali Al‐Shabibi & Jian Li & Huibai Huang & William Snow & James Won‐Ki Hong - e2014 Distributed dynamic load balancing with applications in radio access networks
by Per Kreuger & Rebecca Steinert & Olof Görnerup & Daniel Gillblad
January 2018, Volume 28, Issue 1
- e1990 Design, implementation, and performance evaluation of identity‐based cryptography in ONOS
by JunHuy Lam & Sang‐Gon Lee & Hoon‐Jae Lee & Yustus Eko Oktian - e1996 A holistic approach to mitigating DoS attacks in SDN networks
by Lobna Dridi & Mohamed Faten Zhani - e1997 Fast and efficient probing of heterogeneous IoT networks
by Lionel Metongnon & Ramin Sadre - e1998 NomadiKey: User authentication for smart devices based on nomadic keys
by Artur Souza & Ítalo Cunha & Leonardo B Oliveira - e1999 Trust management in cognitive radio networks: A survey
by Jihen Bennaceur & Hanen Idoudi & Leila Azouz Saidane - e2000 Secure and efficient verification for data aggregation in wireless sensor networks
by Omar Rafik Merad Boudia & Sidi Mohammed Senouci & Mohammed Feham - e2007 Rendezvous‐based access control for information‐centric architectures
by Nikos Fotiou & Bander A. Alzahrani - e2008 Booter list generation: The basis for investigating DDoS‐for‐hire websites
by José Jair Santanna & Joey de Vries & Ricardo de O. Schmidt & Daphne Tuncer & Lisandro Z. Granville & Aiko Pras - e2010 Special issue on security for emerging open networking technologies
by Carol Fung & Mohamed Faten Zhani & Weverton Cordeiro & Jérôme François
November 2017, Volume 27, Issue 6
- e1982 Special Issue on management of SDN/NFV‐based systems
by Rémi Badonnel & Kazuhiko Kinoshita & Daphné Tuncer & Sejun Song - e1983 AirNet: An Edge‐Fabric abstraction model to manage software‐defined networks
by Messaoud Aouadj & Emmanuel Lavinal & Thierry Desprats & Michelle Sibilla - e1984 A software‐defined networking approach to improve service provision in residential networks
by Ricardo Flores Moyano & David Fernández & Luis Bellido & Carlos González - e1985 Stochastic and exact methods for service mapping in virtualized network infrastructures
by Francesco Liberati & Alessandro Giuseppi & Antonio Pietrabissa & Vincenzo Suraci & Alessandro Di Giorgio & Marco Trubian & David Dietrich & Panagiotis Papadimitriou & Francesco Delli Priscoli - e1986 New Era in shared cellular networks: Moving into open and virtualized platform
by Omer Narmanlioglu & Engin Zeydan - e1987 An adaptive approach for elephant flow detection with the rapidly changing traffic in data center network
by Zehui Liu & Deyun Gao & Ying Liu & Hongke Zhang & Chuan Heng Foh - e1988 NFV‐FD: Implementation of a failure detector using network virtualization technology
by Rogerio C. Turchetti & Elias P. Duarte Jr.
September 2017, Volume 27, Issue 5
- e1972 Power‐efficient routing for SDN with discrete link rates and size‐limited flow tables: A tree‐based particle swarm optimization approach
by Mohamad Khattar Awad & Mohammed El‐Shafei & Tassos Dimitriou & Yousef Rafique & Mohammed Baidas & Ammar Alhusaini - e1973 CRAN, H‐CRAN, and F‐RAN for 5G systems: Key capabilities and recent advances
by Zeineb Guizani & Noureddine Hamdi - e1981 Application traffic classification using payload size sequence signature
by Kyu‐Seok Shim & Jae‐Hyun Ham & Baraka D. Sija & Myung‐Sup Kim - e1989 A system for providing load‐aware virtual network service in a software‐defined data center network
by Habib Allah Khosravi & Mohammad Reza Khayyambashi - e1992 Adaptive traffic sampling for P2P botnet detection
by Jie He & Yuexiang Yang & Xiaolei Wang & Zhiguo Tan - e1993 Enabling autonomicity in wireless mesh networks with the ETSI AFI GANA reference model
by Szymon Szott & Janusz Gozdecki & Katarzyna Kosek‐Szott & Krzysztof Loziak & Marek Natkaniec & Michal Wagrowski & Ranganai Chaparadza - e1994 Universal privacy‐preserving platform for SecaaS services
by Tytus Kurek & Marcin Niemiec & Artur Lason & Andrzej R. Pach
July 2017, Volume 27, Issue 4
- e1974 Big data analytics for network and service management
by Yixin Diao & A. Nur Zincir‐Heywood - e1975 Security in IoT network based on stochastic game net model
by Rajbir Kaur & Navroop Kaur & Sandeep K. Sood - e1976 Data transformation as a means towards dynamic data storage and polyglot persistence
by Thomas Vanhove & Merlijn Sebrechts & Gregory Van Seghbroeck & Tim Wauters & Bruno Volckaert & Filip De Turck - e1977 Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
by Fariba Haddadi & A. Nur Zincir‐Heywood - e1978 Dynamic resource allocation for big data streams based on data characteristics (5Vs)
by Navroop Kaur & Sandeep K. Sood - e1979 Learning ensemble strategy for static and dynamic localization in wireless sensor networks
by Hanen Ahmadi & Federico Viani & Alessandro Polo & Ridha Bouallegue - e1980 ALACA: A platform for dynamic alarm collection and alert notification in network management systems
by Selçuk Emre Solmaz & Buğra Gedik & Hakan Ferhatosmanoğlu & Selçuk Sözüer & Engin Zeydan & Çağrı Özgenç Etemoğlu
May 2017, Volume 27, Issue 3
- e1929 Internet traffic classification based on flows' statistical properties with machine learning
by Alina Vlăduţu & Dragoş Comăneci & Ciprian Dobre - e1930 Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey
by Christos Stergiou & Kostas E. Psannis - e1932 On efficient data storage service for IoT
by Konrad Karolewicz & Andrzej Beben & Jordi Mongay Batalla & George Mastorakis & Constandinos X. Mavromoustakis - e1933 A topology‐based scaling mechanism for Apache Storm
by Ce‐Kuen Shieh & Sheng‐Wei Huang & Li‐Da Sun & Ming‐Fong Tsai & Naveen Chilamkurti - e1936 Design and implementation of application programming interface for Internet of things cloud
by Lu Hou & Shaohang Zhao & Xing Li & Periklis Chatzimisios & Kan Zheng - e1937 A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
by Qi Jiang & Neeraj Kumar & Jianfeng Ma & Jian Shen & Debiao He & Naveen Chilamkurti - e1969 Overload management with regard to fairness in session initiation protocol networks by holonic multiagent systems
by Mehdi Khazaei & Nasser Mozayani - e1970 Deploying WLAN service with OpenFlow technology
by Huai‐Wen Hsu & Kuei‐Li Huang & Yi‐Chih Kao & Shi‐Chun Tsai & Yi‐Bing Lin - e1971 Special issue on management of the Internet of things and big data
by Jordi Mongay Batalla & George Mastorakis & Constandinos X. Mavromoustakis
March 2017, Volume 27, Issue 2
- e1957 Fast failure detection and recovery in SDN with stateful data plane
by Carmelo Cascone & Davide Sanvito & Luca Pollini & Antonio Capone & Brunilde Sansò - e1960 A dynamic pricing algorithm for a network of virtual resources
by Bram Naudts & Mario Flores & Rashid Mijumbi & Sofie Verbrugge & Joan Serrat & Didier Colle - e1961 A hash‐based distributed mapping control scheme in mobile locator‐identifier separation protocol networks
by Moneeb Gohar & Faisal Bashir & Jin‐Ghoo Choi & Seok‐Joo Koh & Waleed Ahmad - e1963 Specification, composition, and placement of network services with flexible structures
by Sevil Dräxler & Holger Karl - e1964 Self‐modeling based diagnosis of network services over programmable networks
by José Manuel Sánchez Vílchez & Imen Grida Ben Yahia & Chidung Lac & Noel Crespi - e1965 CATENAE: A scalable service function chaining system for legacy mobile networks
by Roberto Bifulco & Anton Matsiuk & Alessio Silvestro - e1966 Towards performance prediction of multicore software routers
by Kalika Suksomboon & Nobutaka Matsumoto & Masaki Fukushima & Shuichi Okamoto & Michiaki Hayashi - e1967 Softwarization of networks, clouds, and internet of things
by Filip De Turck & Joon‐Myung Kang & Hyunseung Choo & Myung‐Sup Kim & Baek‐Young Choi & Remi Badonnel & James Won‐Ki Hong - e1968 A novel blind traffic analysis technique for detection of WhatsApp VoIP calls
by Antonio Cuadra‐Sanchez & Javier Aracil
January 2017, Volume 27, Issue 1
- e1958 A tree‐based algorithm for virtual infrastructure allocation with joint virtual machine and network requirements
by Ramon de Oliveira & Guilherme Piegas Koslovski - e1959 Header signature maintenance for Internet traffic identification
by Sung‐Ho Yoon & Jun‐Sang Park & Baraka D. Sija & Mi‐Jung Choi & Myung‐Sup Kim - e1962 An accurate traffic classification model based on support vector machines
by Jie Cao & Zhiyi Fang & Guannan Qu & Hongyu Sun & Dan Zhang
November 2016, Volume 26, Issue 6
- 422-434 An adaptive Paris Metro Pricing scheme for mobile data networks
by Huai‐Sheng Huang & Shu‐Chiung Hu & Po‐Han Lee & Yu‐Chee Tseng - 435-460 Seamless integration of cloud and fog networks
by Igor Duarte Cardoso & João P. Barraca & Carlos Gonçalves & Rui L. Aguiar - 461-491 Effective network management via dynamic network anomaly visualization
by Qi Liao & Ting Li - 492-514 Simple, efficient location‐based routing for data center network using IP address hierarchy
by A. R. Ashok Kumar & S. V. Rao & Diganta Goswami - 515-536 PAVM: a framework for policy‐aware virtual machine management
by Muhammad Nouman Durrani & Feroz Zahid & Jawwad A. Shamsi - 537-552 OpenCAPWAP v2.0: the new open‐source implementation of the CAPWAP protocol
by Elena Agostini & Massimo Bernaschi & Massimo Vellucci & Luca Vollero - 553-578 Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server
by Kamel Karoui
September 2016, Volume 26, Issue 5
- 334-335 Software‐defined operations
by Catalin Meirosu & Kostas Pentikousis & Mario Kind & Alberto Gonzalez Prieto - 336-354 Prediction‐based survivable virtual network mapping against disaster failures
by Ying Wang & Xiao Liu & Xuesong Qiu & Wenjing Li - 355-372 ReversePTP: A clock synchronization scheme for software‐defined networks
by Tal Mizrahi & Yoram Moses - 373-395 FlowVisor‐based cost‐aware VN embedding in OpenFlow networks
by Xuxia Zhong & Ying Wang & Xuesong Qiu & Wenjing Li - 396-418 A flexible information service for management of virtualized software‐defined infrastructures
by Lefteris Mamatas & Stuart Clayman & Alex Galis
July 2016, Volume 26, Issue 4
- 248-268 Software‐defined network‐based prioritization to avoid video freezes in HTTP adaptive streaming
by Stefano Petrangeli & Tim Wauters & Rafael Huysegems & Tom Bostoen & Filip De Turck - 269-285 Online traffic prediction in the cloud
by Bruno L. Dalmazo & João P. Vilela & Marilia Curado - 286-307 H‐LCFST: a hash lowest cost first search tree for flexible packet classification
by Xiaohong Huang & Qiong Sun & Maode Ma & Yan Ma - 308-329 Characterizing network traffic behaviour using granule‐based association rule mining
by Yongna Bian & Bin Liu & Yuefeng Li & Jianmin Gao
May 2016, Volume 26, Issue 3
- 156-175 Novel intrusion prediction mechanism based on honeypot log similarity
by Ci‐Bin Jiang & I‐Hsien Liu & Yao‐Nien Chung & Jung‐Shian Li - 176-198 Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics
by Selcuk Cevher & Mustafa Ulutas & Ibrahim Hokelek - 199-223 Performance evaluation of legacy QCN for multicast and multiple unicast traffic transmission
by Hela Mliki & Lamia Chaari & Lotfi Kamoun & Bernard Cousin - 224-244 ROUTE: run‐time robust reducer workload estimation for MapReduce
by Zhihong Liu & Qi Zhang & Raouf Boutaba & Yaping Liu & Zhenghu Gong
March 2016, Volume 26, Issue 2
- 76-94 Digital signature to help network management using flow analysis
by Mario Lemes Proença & Gilberto Fernandes & Luiz F. Carvalho & Marcos V. O. de Assis & Joel J. P. C. Rodrigues - 95-110 Optimal layer division for low latency in DHT‐based hierarchical P2P network
by Jun Li & Cuilian Li & Zhaoxi Fang & Haoyun Wang & Yaohui Wu - 111-130 Dynamic control plane management for software‐defined networks
by Jian Li & Jae‐Hyoung Yoo & James Won‐Ki Hong - 131-151 ProTru: a provenance‐based trust architecture for wireless sensor networks
by Gulustan Dogan
January 2016, Volume 26, Issue 1
- 4-5 Special issue on Software‐Defined Networking and Network Functions Virtualization for flexible network management
by Oliver Hohlfeld & Thomas Zinner & Theophilus Benson & David Hausheer - 6-24 On network operating system security
by Christian Röpke & Thorsten Holz - 25-43 Inter‐function anomaly analysis for correct SDN/NFV deployment
by Cataldo Basile & Daniele Canavese & Antonio Lioy & Christian Pitscheider & Fulvio Valenza - 44-55 Cost efficiency of mobile in‐network caching
by Nan Zhang & Maël Kimmerlin & Jose Costa‐Requena & Heikki Hämmäinen - 56-72 How can a mobile service provider reduce costs with software‐defined networking?
by Bram Naudts & Mario Kind & Sofie Verbrugge & Didier Colle & Mario Pickavet
November 2015, Volume 25, Issue 6
- 375-393 An economic mechanism for request routing and resource allocation in hybrid CDN–P2P networks
by Mehran Garmehi & Morteza Analoui & Mukaddim Pathan & Rajkumar Buyya - 394-417 Energy‐aware traffic allocation to optical lightpaths in multilayer core networks
by Vassilis Foteinos & Kostas Tsagkaris & Pierre Peloso & Laurent Ciavaglia & Panagiotis Demestichas - 418-434 Energy‐efficient management using a traffic‐oriented routing scheme for cognitive radio networks
by Constandinos X. Mavromoustakis & George Mastorakis & Athina Bourdena & Evangelos Pallis - 435-453 A management architecture for client‐defined cloud storage services
by Jae Yoon Chung & Sangtae Ha & James Won‐Ki Hong - 454-470 Cache‐at‐relay: energy‐efficient content placement for next‐generation wireless relays
by Melike Erol‐Kantarci - 471-489 Incorporating known malware signatures to classify new malware variants in network traffic
by Ismahani Ismail & Muhammad Nadzir Marsono & Ban Mohammed Khammas & Sulaiman Mohd Nor - 490-506 Cost‐based placement of vDPI functions in NFV infrastructures
by Mathieu Bouet & Jérémie Leguay & Théo Combe & Vania Conan - 507-525 LISP controller: a centralized LISP management system for ISP networks
by Taeyeol Jeong & Jian Li & Jonghwan Hyun & Jae‐Hyoung Yoo & James Won‐Ki Hong
September 2015, Volume 25, Issue 5
- 261-262 Special issue on measure, detect and mitigate–challenges and trends in network security
by A. Sperotto & R. Hofstede & A. Dainotti & C. Schmitt & G. Dreo Rodosek - 263-282 IFS: Intelligent flow sampling for network security–an adaptive approach
by Karel Bartos & Martin Rehak - 283-305 Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection
by Johan Mazel & Pedro Casas & Romain Fontugne & Kensuke Fukuda & Philippe Owezarski - 306-319 Detecting malicious activities with user‐agent‐based profiles
by Yang Zhang & Hesham Mekky & Zhi‐Li Zhang & Ruben Torres & Sung‐Ju Lee & Alok Tongaonkar & Marco Mellia - 320-339 Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks
by Anthéa Mayzaud & Anuj Sehgal & Rémi Badonnel & Isabelle Chrisment & Jürgen Schönwälder - 340-354 Iterative selection of countermeasures for intelligent threat agents
by Fabrizio Baiardi & Federico Tonelli & Alessandro Bertolini - 355-374 A survey of methods for encrypted traffic classification and analysis
by Petr Velan & Milan Čermák & Pavel Čeleda & Martin Drašar
July 2015, Volume 25, Issue 4
- 203-204 Advances in management of multimedia services
by Marinos Charalambides & Thomas Zinner & Hiroshi Saito & Prasad Calyam & Steven Latré - 205-222 A QoS enabled multimedia WiFi access point
by Padraig O Flaithearta & Hugh Melvin & Michael Schukat - 223-241 Modelling and performance analysis of application‐aware resource management
by Florian Wamser & Andreas Blenk & Michael Seufert & Thomas Zinner & Wolfgang Kellerer & Phuoc Tran‐Gia - 242-259 User‐centric versus network‐centric load balancing: How to provide good QoE for gold users
by Olli Mämmelä & Petteri Mannersalo
May 2015, Volume 25, Issue 3
- 141-158 An IPv6‐based mobility framework for urban vehicular networks
by Xiaonan Wang & Deguang Le & Hongbin Cheng & Yi Mu - 159-180 A control‐theoretic approach towards joint admission control and resource allocation of cloud computing services
by Dimitrios Dechouniotis & Nikolaos Leontiou & Nikolaos Athanasopoulos & Athanasios Christakidis & Spyros Denazis - 181-202 New video discarding policies for improving UDP performance over wired/wireless networks
by Khalid A. Darabkh & Abeer M. Awad & Ala' F. Khalifeh
March 2015, Volume 25, Issue 2
- 75-94 Design of energy‐efficient cloud systems via network and resource virtualization
by Burak Kantarci & Luca Foschini & Antonio Corradi & Hussein T. Mouftah - 95-112 Federated trouble ticket system for service management support in loosely coupled multi‐domain environments
by Pavle V. Vuletić & Jovana J. Vuleta‐Radoičić & Dimitrios Kalogeras - 113-140 Business‐driven policy optimization for service management
by Javier Rubio‐Loyola & Gregorio Toscano‐Pulido & Marinos Charalambides & Marisol Magaña‐Aguilar & Joan Serrat‐Fernández & George Pavlou & Hiram Galeana‐Zapién
January 2015, Volume 25, Issue 1
- 1-30 An overview of network virtualization and cloud network as a service
by Hamada Alshaer - 31-51 Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
by Mohammad Sabzinejad Farash - 52-73 Towards centralized and semi‐automatic VLAN management
by Fuliang Li & Jiahai Yang & Changqing An & Jianping Wu & Xingwei Wang