Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Network and Systems Management, Volume 32
Volume 32, Number 1, March 2024
- Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment. 1 - Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire:
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory. 2 - Abdelhamid Khiat, Mohamed Haddadi, Nacera Bahnes:
Genetic-Based Algorithm for Task Scheduling in Fog-Cloud Environment. 3 - Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari:
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition. 4 - Sainath Reddy Sankepally, Nishoak Kosaraju, J. L. Shreya, Vishwambhar Reddy, U. Venkanna:
A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices. 5 - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostSec: Adaptive Attack Detection for Vehicular Networks. 6 - Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba:
A Novel Light Reflection-Random Walk for Smart Sensors Relocation. 7 - Dongjie Liu, Jong-Hyouk Lee:
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. 8 - Siwapon Charoenchai, Peerapon Siripongwutikorn:
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game. 9 - Hamida Ikhlef, Soumia Bourebia, Ali Melit:
Link State Estimator for VANETs Using Neural Networks. 10 - Yoji Yamato:
Proposal and Evaluation of GPU Offloading Parts Reconfiguration During Applications Operations for Environment Adaptation. 11 - Marco Silva, José Santos, Marília Curado:
The Path Towards Virtualized Wireless Communications: A Survey and Research Challenges. 12 - Goldie M. Meitei, Ningrinla Marchang:
Provisioning Load Balancing in Time-Sensitive Task Allocation for Mobile Crowdsensing. 13 - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi, Khaled Alrfou:
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. 14 - Jérôme Lacan, Emmanuel Lochin:
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing. 15 - Kayuã Oleques Paim, Vagner Ereno Quincozes, Diego Kreutz, Rodrigo Brandão Mansilha, Weverton Cordeiro:
Regenerating Networked Systems' Monitoring Traces Using Neural Networks. 16 - Anselme Russel Affane Moundounga, Hassan Satori:
Stochastic Machine Learning Based Attacks Detection System in Wireless Sensor Networks. 17 - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis. 18 - Ivanilson França Vieira Júnior, Jorge Granjal, Marília Curado:
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. 19 - Yixuan Zhang, Basem Suleiman, Muhammad Johan Alibasa, Farnaz Farid:
Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach. 20 - Mohamed Oulaaffart, Rémi Badonnel, Olivier Festor:
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services. 21 - Abdelaziz Hamdi, Amina Nahali, Rafik Brahem:
Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network. 22 - Yannick Florian Yankam, Vianney Kengne Tchendji, Jean Frédéric Myoupo:
WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks. 23
Volume 32, Number 2, April 2024
- Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li:
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks. 24 - Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa:
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks. 25 - Mradula Sharma, Parmeet Kaur:
Fog-based Federated Time Series Forecasting for IoT Data. 26 - Mathias De Brouwer, Filip De Turck, Femke Ongenae:
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE. 27 - Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya:
Optimizing Completion Time of Requests in Serverless Computing. 28 - Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa:
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. 29 - Sateesh Gorikapudi, Hari Kishan Kondaveeti:
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks. 30 - Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz:
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN. 31 - Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao:
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree. 32 - Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki:
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture. 33 - Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari:
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints. 34 - Nathan Harris, Sajad Khorsandroo:
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks. 35 - Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio Oliveira Silva:
Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems. 36 - Siamak Azadiabad, Ferhat Khendek:
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification. 37 - Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings. 38 - Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani:
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment. 39 - Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gero:
An Edge Cloud Based Coordination Platform for Multi-user AR Applications. 40 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach. 41 - Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. 42 - Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab:
On Feature Selection Algorithms for Effective Botnet Detection. 43
Volume 32, Number 3, July 2024
- Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale:
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees. 44 - Tumpa Pal, Ramesh Saha, Suparna Biswas:
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network. 45 - Javier Rubio-Loyola, Christian Aguilar-Fuster:
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding. 46 - Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao:
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation. 47 - João Paulo Monteiro Santana, Taufik Abrão:
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization. 48 - Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma:
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing. 49 - Edison Moreno-Cardenas, Erwin J. Sacoto-Cabrera, Luis Guijarro:
Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network. 50 - Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi, Manhar Singh Sachdev, Sparsh Taneja:
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations. 51 - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Correction: Assuring Efficient Path Selection in an IntentBased Networking System: a Graph Neural Networks and Deep Reinforcement Learning Approach. 52 - Diego Ramos-Ramos, Alejandro González Vegas, Javier Berrocal, Jaime Galán-Jiménez:
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios. 53 - Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphaël Couturier:
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications. 54 - Sk Md Abidar Rahaman, Md. Azharuddin, Pratyay Kuila:
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach. 55 - Reham Aljohani, Anas Bushnag, Ali Alessa:
AI-Based Intrusion Detection for a Secure Internet of Things (IoT). 56 - Hanan Suwi, Nadjia Kara, Omar Abdul Wahab, Claes Edstrom, Yves Lemieux:
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution. 57 - Daniel Soares, Marcos Carvalho, Daniel F. Macedo:
Enhancing Cloud Gaming QoE Estimation by Stacking Learning. 58 - Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation. 59 - Xianfeng Li, Haoran Sun, Yan Huang:
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches. 60 - Vincent Bracke, José Santos, Tim Wauters, Filip De Turck, Bruno Volckaert:
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement. 61 - Wilson de Souza Junior, Taufik Abrão:
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels. 62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.