![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Network and Systems Management, Volume 29
Volume 29, Number 1, January 2021
- Barbara Valera-Muros
, Laura Panizo
, Alvaro Rios
, Pedro Merino Gómez
:
An Architecture for Creating Slices to Experiment on Wireless Networks. 1 - Ermeson C. Andrade
, Bruno C. S. Nogueira, Ivaldir de Farias Júnior, Danilo Araújo:
Performance and Availability Trade-Offs in Fog-Cloud IoT Environments. 2 - Taejune Park, Seungwon Shin:
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor. 3 - Ali Kadhum Idrees
, Ali Kadhum M. Al-Qurabat
:
Energy-Efficient Data Transmission and Aggregation Protocol in Periodic Sensor Networks Based Fog Computing. 4 - Weipeng Jing, Chuanyu Zhao, Qiucheng Miao
, Houbing Song
, Guangsheng Chen:
QoS-DPSO: QoS-aware Task Scheduling for Cloud Computing System. 5 - Sujit Bebortta
, Amit Kumar Singh, Bibudhendu Pati, Dilip Senapati
:
A Robust Energy Optimization and Data Reduction Scheme for IoT Based Indoor Environments Using Local Processing Framework. 6 - Seyed Morteza Mirhoseini Nejad, Ghada H. Badawy, Douglas G. Down
:
A Data-driven, Multi-setpoint Model Predictive Thermal Control System for Data Centers. 7 - Vinicius F. e Silva
, Vinícius F. S. Mota
, Daniel F. Macedo
, Marcelo Dias de Amorim
:
Joint Content-Mobility Priority Modeling for Cached Content Selection in D2D Networks. 1-37 - Ali Safari Khatouni
, Nabil Seddigh, Biswajit Nandy, Ayse Nur Zincir-Heywood:
Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors. 8 - Suhail Ahmad
, Ajaz Hussain Mir:
Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers. 9 - Acknowledgment to Reviewers. 10
Volume 29, Number 2, April 2021
- Shivani Gupta, Vandana Khaitan
:
Reliability and Survivability Analysis of Long-Term Evolution Vehicular Ad-Hoc Networks: An Analytical Approach. 11 - Neha Agrawal
, Shashikala Tapaswi:
An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment. 12 - João Henrique G. M. Corrêa
, Patrick Marques Ciarelli
, Moisés R. N. Ribeiro, Rodolfo da Silva Villaça:
ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring. 13 - Angela M. Vargas-Arcila
, Juan Carlos Corrales
, Araceli Sanchis
, Álvaro Rendón Gallón
:
Peripheral Diagnosis for Propagated Network Faults. 14 - J. Kok Konjaang
, Lina Xu:
Meta-heuristic Approaches for Effective Scheduling in Infrastructure as a Service Cloud: A Systematic Review. 15 - Tom Goethals
, Filip De Turck
, Bruno Volckaert:
Self-organizing Fog Support Services for Responsive Edge Computing. 16 - Valentina Nejkovic
, Filip Jelenkovic, Nikos Makris, Virgilios Passas, Thanasis Korakis, Milorad Tosic:
Semantic Coordination on the Edge of Heterogeneous Ultra Dense Networks. 17 - Mohamad Khattar Awad
, Marwa Hassan Hafez Ahmed, Ali F. Almutairi, Imtiaz Ahmad:
Machine Learning-Based Multipath Routing for Software Defined Networks. 18 - Mohammad Al-Omari
, Majdi Rawashdeh, Fadi Taher Qutaishat, Mohammad H. Alshira'H, Nedal K. Al-Ababneh:
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security. 20
Volume 29, Number 3, July 2021
- Sara Afzal, Muhammad Asim
, Abdul Rehman Javed, Mirza Omer Beg, Thar Baker
:
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models. 21 - Yazan Alshboul
, Abed Al-Raoof Bsoul
, Mohammed G. H. al Zamil
, Samer Samarah
:
Cybersecurity of Smart Home Systems: Sensor Identity Protection. 22 - Yazan Otoum
, Amiya Nayak
:
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things. 23 - Adrián Pekár
, Alejandra Duque-Torres
, Winston K. G. Seah
, Oscar M. Caicedo
:
Knowledge Discovery: Can It Shed New Light on Threshold Definition for Heavy-Hitter Detection? 24 - Moustafa Najm
, Rakesh Tripathi, Mohammad Shadi Al Hakeem
, Venkatesh Tamarapalli
:
A Cost-Aware Management Framework for Placement of Data-Intensive Applications on Federated Cloud. 25 - Weimin Gao
, Jiawei Huang, Shaojun Zou, Weihe Li, Jianxin Wang, Jianer Chen:
AAC: Adaptively Adjusting Concurrency by Exploiting Path Diversity in Datacenter Networks. 26 - Lucas Santos, Benedito Cunha, Iure Fé, Marco Vieira
, Francisco Airton Pereira da Silva
:
Data Processing on Edge and Cloud: A Performability Evaluation and Sensitivity Analysis. 27 - Liudong Zuo
:
Data Transfers Using Bandwidth Reservation Through Multiple Disjoint Paths of Dynamic HPNs. 28 - Péter Orosz, Tamás Tóthfalusi:
A New Application-Aware No-Reference Quality Assessment Method for IP Voice Services. 29 - Glauber Dias Gonçalves
, Idilio Drago
, Alex Borges Vieira, Ana Paula Couto da Silva
, Jussara Marques de Almeida:
A Study of Costs and Benefits of Content Sharing in Personal Cloud Storage. 30 - Ali Mohammadzadeh
, Mohammad Masdari, Farhad Soleimanian Gharehchopogh
:
Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm. 31 - Cristiano M. Silva, Fernanda Sumika Hojo de Souza, Andreas Pitsillides, Daniel L. Guidoni
:
Solutions for the Deployment of Communication Roadside Infrastructure for Streaming Delivery in Vehicular Networks. 32 - A. Balamurugan
, Deva Priya M.
, Sengathir Janakiraman, A. Christy Jeba Malar:
Hybrid Stochastic Ranking and Opposite Differential Evolution-Based Enhanced Firefly Optimization Algorithm for Extending Network Lifetime Through Efficient Clustering in WSNs. 33 - Minsu Kim, Muhammad Jaseemuddin, Alagan Anpalagan
:
Deep Reinforcement Learning Based Active Queue Management for IoT Networks. 34 - Sandhya Rathee
, Nitin Varyani, K. Haribabu, Aakash Bajaj, Ashutosh Bhatia, Ram Jashnani, Zhi-Li Zhang:
GlobeSnap: An Efficient Globally Consistent Statistics Collection for Software-Defined Networks. 35 - Vinicius Fulber-Garcia
, Alexandre Huff, Leonardo da Cruz Marcuzzo, Marcelo Caggiani Luizelli, Alberto E. Schaeffer-Filho, Lisandro Zambenedetti Granville, Carlos R. P. dos Santos, Elias P. Duarte Jr.:
Customizable Deployment of NFV Services. 36
Volume 29, Number 4, October 2021
- Matteo Repetto, Domenico Striccoli
, Giuseppe Piro, Alessandro Carrega
, Gennaro Boggia, Raffaele Bolla:
An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains. 37 - Mostafa Bastam
, Keyvan RahimiZadeh
, Ruhollah Yousefpour:
Design and Performance Evaluation of a New Traffic Engineering Technique for Software-Defined Network Datacenters. 38 - Sengathir Janakiraman, Deva Priya M.
:
Improved Artificial Bee Colony Using Monarchy Butterfly Optimization Algorithm for Load Balancing (IABC-MBOA-LB) in Cloud Environments. 39 - Hong Liu, Chen Zhong
, Awny Alnusair
, Sheikh Rabiul Islam:
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques. 40 - Abdul Jabbar Siddiqui
, Azzedine Boukerche:
A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems. 41 - Usman Ahmed, Gautam Srivastava
, Jerry Chun-Wei Lin
:
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems. 42 - Prasanta Kumar Jena
, Subhojit Ghosh
, Ebha Koley, Murli Manohar
:
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation. 43 - Seung-Joon Seok
, Yuncheng Zhu, Jen-Jee Chen, Woojin Seok, Kazuhiko Kinoshita, Jiun-Long Huang, Hongtaek Ju:
Towards Service and Networking Intelligence for Humanity: A Report on APNOMS 2020. 44 - Qussai Yaseen
, Yaser Jararweh:
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System. 45
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.