


default search action
Journal of Network and Systems Management, Volume 33
Volume 33, Number 1, March 2025
- Stelios Prekas, Panagiotis Trakadas, Panagiotis Karkazis:
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework. 1 - Mohammed Tarek Abdelaziz, Abdelrahman Radwan, Hesham Mamdouh, Adel Saeed Saad, Abdulrahman Salem Abuzaid, Ahmed Ayman AbdElhakeem, Salma Zakzouk, Kareem Moussa
, M. Saeed Darweesh
:
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance. 2 - Oleg Kolosov, Gala Yadgar, David Breitgand, Dean H. Lorenz:
PASE: Pro-active Service Embedding in The Mobile Edge. 3 - Sudha Dubba, Balaprakasa Rao Killi:
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling. 4 - Hatem Algabroun, Lars Håkansson:
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring. 5 - Jia Hao, Yang Chen, Jianhou Gan:
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment. 6 - Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval. 7 - Ali Alfatemi
, Mohamed Rahouti, D. Frank Hsu, Christina Schweikert, Nasir Ghani, Aiman Solyman, Mohammad Iqbal Saryuddin Assaqty:
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis. 8 - Arezoo Ghasemi
:
A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment. 9 - Müge Erel-Özçevik:
Token as a Service for Software-Defined Zero Trust Networking. 10 - Lancan Yu, Jianting Yuan, Jin Zheng, Nan Yang:
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency. 11 - Wilson Souza, Marco Itaborahy, Gabriel Polvani, Andre Flaiban, José Carlos Marinello, Taufik Abrão
:
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization. 12 - Gyeong Ho Lee, Jaeseob Han:
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection. 13 - Gourish Goudar, R. Muralishankar:
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks. 14 - Vandirleya Barbosa, Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Paulo Pereira, Paulo Maciel, Tuan Anh Nguyen, Francisco Airton Silva:
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures. 15 - Xinhao Wan, Gang Xue, Yiming Zhong, Zhicheng Wang:
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion. 16 - Weiran Wang, Heng Yang
, Shanshan Li
, Xue Liu, Zhaojun Wan:
Adaptive UE Handover Management with MAR-Aided Multivariate DQN in Ultra-Dense Networks. 17 - ChengJun Guo:
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring. 18 - Bollu Priyanka, Banavath Balaji Naik, Thandava Purandeswar Reddy:
Energy and Cost Aware Workflow Offloading Using Quantum Inspired Differential Evolution in the Cloud Environments. 19 - Sarra Cherfi, Ali Lemouari, Ammar Boulaiche
:
MLP-Based Intrusion Detection for Securing IoT Networks. 20 - Alberto Robles Enciso, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Antonio F. Skarmeta-Gómez:
Dynamic Multi-Method Allocation for Intent-based Security Orchestration. 21
Volume 33, Number 2, April 2025
- Thiago Valentim Bezerra
, Gustavo Callou, Cleunio França, Eduardo Tavares:
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach. 22 - Ghattas Akkad, Elie Inaty, Jad Abou Chaaya
, Martin Maier:
FL-DBA: Fuzzy Logic Based Dynamic Bandwidth Allocation Algorithm for Next Generation Passive Optical Network. 24 - Miao Liu, Longxi Liu, Di Xu, Li Zhang:
Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm. 25 - Bipal Khanal, Chandan Kumar, Md. Sarfaraj Alam Ansari:
Real-Time Anomaly Detection Framework to Mitigate Emerging Threats in Software Defined Networks. 26 - Negar Mohammadi-Koushki
, Ibrahim El-Shekeil
, Krishna Kant:
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems. 27 - Nabil Nissar
, Najib Naja, Abdellah Jamali:
Cost-Sensitive Detection of DoS Attacks in Automotive Cybersecurity Using Artificial Neural Networks and CatBoost. 28 - Tran-Tuan Chu
, Mohamed Aymen Labiod
, Brice Augustin, Kajanan Mathialahan, Abdelhamid Mellouk:
Empirical Evaluation of QUIC-Based Software-Defined Service Migration in Multi-access Edge Computing Over 5G Networks. 29 - Yeong-Jun Seok, Ju-Bong Kim, Youn-Hee Han, Hyun-Kyo Lim, Chankyun Lee, Wonhyuk Lee:
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems. 30 - Hamidullah Riaz
, Sitki Öztürk, Sultan Aldirmaz Çolak, Ali Çalhan:
A Handover Decision Optimization Method Based on Data-Driven MLP in 5G Ultra-Dense Small Cell HetNets. 31 - Mujahid Muhammad, Ghazanfar Ali Safdar:
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks. 32 - Keyuan Qiu, Yingjie Zhang, Yiqiang Feng
, Feng Chen:
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks. 33 - Mohammed Belkheir, Mehdi Rouissat, Allel Mokaddem, Djamila Ziani, Pascal Lorenz:
Lightweight Novel Approach for Collaborative Packet-Based Mitigation of Blackhole Attacks in RPL-Based IoT. 34 - Jonas Vasconcelos Bistene
, Anderson Fernandes Pereira dos Santos, Clayton Escouper das Chagas
, Ronaldo Moreira Salles
:
Modeling Network Traffic Generators for Cyber Ranges: A Systematic Literature Review. 35 - Andrea Augello, Alessandra De Paola, Giuseppe Lo Re:
Hybrid Multilevel Detection of Mobile Devices Malware Under Concept Drift. 36 - Valentin Stangaciu
, Cristina Stangaciu, Bianca Gusita
, Daniel-Ioan Curiac:
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN. 37 - Jonatas Adilson Marques, Kirill Levchenko, Rafael R. Obelheiro, Ricardo Parizotto, Luciano Paschoal Gaspary:
Balancing Act: Navigating Control and Data Plane Responsibilities for Fast Operation in Programmable Networks. 38 - Özge Satir Akpunar, Sener Akpinar:
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters. 39 - C. Prajisha, A. R. Vasudevan:
MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things. 40 - Rehab H. Serag, Mohamed S. Abdalzaher
, Hussein Abd El Atty Elsayed, M. Sobh:
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning. 41 - Özlem Sabuncu
, Bülent Bilgehan
:
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance. 42 - Subhas Kumar Ghosh
, Vijay Monic Vittamsetti
:
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing. 43 - MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer). 44 - Lhoussaine Daoudi, Hamid Garmani, Mohamed Baslam:
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis. 45 - Shatakshi Singh, Umashankar Samal:
Insights and Trends in Open RAN: The Future of Mobile Networks. 46 - N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi:
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm. 47
Volume 33, Number 3, July 2025
- Peng Wang
, Yafei Song, Xiaodan Wang, Xiangke Guo:
DIFT: A Diffusion-Transformer for Intrusion Detection of IoT with Imbalanced Learning. 48 - Kolichala Rajashekar, Ashutosh Garg, Anand M. Baswade, Subhajit Sidhanta:
Optimizing Drone Deployment for Maximized User Connectivity in Areas of Interest Via Deep Reinforcement Learning. 49 - Chunhong Liu, Dehao Wang, Li Duan, Kun Wang, Junna Zhang:
Responsible Workload Sequence Anomaly Detection with Bi-View Feature Fusion. 50 - Shoaib Ahmed, Sayonto Khan, Kumudu S. Munasinghe
, Md. Farhad Hossain:
A Cognitive Network Architecture for Vehicle-to-Network (V2N) Communications over Smart Meters for URLLC. 51 - Xiao Yan, Fan Xiumei, Kok-Lim Alvin Yau, Zhixin Xie, Rui Men, Gang Yuan:
A Review of Reinforcement Learning for Semantic Communications. 52 - Chih-Yu Lin, Chien-Ting Tseng, Li-Yu An:
Employing Federated Semi-supervised Learning for Network Traffic Classification. 53 - Molka Gharbaoui, Barbara Martini, Piero Castoldi:
A WAN Infrastructure Manager Prototype for QoS-based Multi-Site SDN-Enabled NFV Orchestration. 54 - MohammadHossein Homaei
, Agustín Javier Di Bartolo, Rubén Molano Gómez
, Pablo García Rodríguez, Andrés Caro
:
Enabling RPL on the Internet of Underwater Things. 55 - Supriya Singh, Deo Prakash Vidyarthi:
A Self-learning Approach for Service Offloading in Heterogeneous Fog-Integrated Cloud System. 57 - Akram Chhaybi, Saiida Lazaar
:
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features. 58 - Sangeetha Dharmapuri Patel, Shivkumar Rangasamy:
Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN. 59 - Zoheir Karaouzene, Hicham Megnafi, Sidi Mohammed Meriah:
Improving Cellular Network Coverage Through Optimization of Sector Antenna Azimuths: A Hybrid Approach Combining AI and GIS. 60 - Wenbo Xiao, Chenchen Xu, Min Peng, Caihong Kai, Tian Chen:
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification. 61 - Dominique Barth, Maël Guiraud, Yann Strozecki:
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN. 62 - Wilker de Oliveira Delfino, Silvio E. Quincozes, Juan Lucas Vieira, Diego G. Passos, Débora Christina Muchaluat-Saade, Célio Albuquerque, Daniel Mossé:
Proactive Fault-Recovery on Distributed Software-Defined Network Controllers. 63 - Luís Gustavo Coutinho do Rêgo, Ticiana L. Coelho da Silva, Atslands Rego da Rocha, Matheus R. Monteiro, Lívia A. Cruz, Karine Zeitouni, Jorge Barbosa Soares, José Antônio Fernandes de Macêdo:
A Workflow for Synthetic Biometric in-Edge Data Generation using GAN based models. 64 - Mingyang Liang, Bo Wang:
A Hybrid Heuristic Task Offloading Algorithm in Mobile Edge Computing for Joint Optimization of Delay and Energy Consumption. 65 - David H. S. Lima, André L. L. de Aquino, Marília Curado:
Efficient Task Allocation in Data Center Environments Based on Information Theory. 66 - Nour El Houda Larouci, Somia Sahraoui, Abdelhamid Djeffal:
Machine Learning Based Routing Protocol (MLBRP) for Mobile Internet of Things Networks. 67 - Cezary Clapa
, Artur Lason
, Vinay Kanitkar, Piotr Cholda
:
Scalable Prioritization of Restoration Activities in Highly Distributed CDNs with Cost and Performance Awareness. 68 - Arbab Waseem Abbas, Safdar Nawaz Khan Marwat
, Ala I. Al-Fuqaha, Ghassen Ben Brahim, Salman Ahmed, Waseem Ullah Khan:
Mathematical Modelling of ANP for Trust Based IoT Device Categorization in Secured Smart Logistics. 69 - Pankaj Jain
, Richa Jain, Bhawana Tyagi:
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter. 70 - Muhammad Hamza Shahab
, Yogesh Sharma
:
Fault Tolerance in Service Function Chains: A Taxonomy, Survey and Future Directions. 71 - Xuesong Wu, Tianshuai Zheng, Runfang Wu, Jie Ren, Junyan Guo, Ye Du:
Hi-SAM: A High-Scalable Authentication Model for Satellite-Ground Zero-Trust System Using Mean Field Game. 72 - Tao Zhang, Yujie Peng, Zhenbo Li, Yuchen Wang, Xidao Luan, Yunsheng Liu, Siyuan Fan, Hui Yin:
Load Balancing With Proactive Traffic Separation in Data Center Network. 73 - Oumeima Boubertakh, Ali Sahnoun, Abdelhafid Zitouni, Saad Harous:
HyMD2I: Hybrid Metaheuristic-Deep Learning Approach for Intrusion Detection in IoT. 74
Volume 33, Number 4, October 2025
- Adilson G. Filho, Eduardo K. Viegas, Altair O. Santin, Jhonatan Geremias:
A Dynamic Network Intrusion Detection Model for Infrastructure as Code Deployed Environments. 75 - Mitali Sinha, Joy Chandra Mukherjee, Padmalochan Bera, Manoranjan Satpathy:
SynFloWatch: An Entropy-Based Live Defense System against SYN Spoofing DDoS Attacks in Hybrid SDN. 76 - Michael Weyns, Sander Vanden Hautte, Annelies Lejon, Veerle Ledoux, Pieter Bonte, Filip De Turck, Sofie Van Hoecke, Femke Ongenae:
Enabling Cross-Context Learning with Knowledge Graphs for Anomaly Detection in Communications Networks. 77 - Francisco Airton Silva, Fernando A. M. Trinta, Michel S. Bonfim, José Antônio Fernandes de Macêdo, Paulo A. L. Rego, Vinícius Lagrota
:
Performance Evaluation of Cloud Native Applications: A Systematic Mapping Study. 78 - Rafael Marasca Martins, Luis Carlos Mathias, Taufik Abrão:
3-D Indoor Visible Light Positioning Using Machine Learning and Hyperparameter Tuning. 79 - Ranjan Patowary, Gautam Barua, Radhika Sukapuram:
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation. 80 - Sanae Seidi, Abderrahim Abdellaoui:
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach. 81 - Hadiseh Rezaei
, Rahim Taheri
, Ivan Jordanov
, Mohammad Shojafar:
Federated RNN for Intrusion Detection System in IoT Environment Under Adversarial Attack. 82 - Mahdi Sharara, Sahar Hoteit, Yannick Carlinet, Antonia Maria Masucci, Nancy Perrot:
Policy-Gradient-Based Reinforcement Learning for Maximizing Operator's Profit in Open-RAN. 83 - Arezoo Jahani, Paria Jourabchi Amirkhizi:
Anomaly Detection in Cloud Computing Workloads Based on Resource Usage. 84 - Aparna Ganesan, Kamil Saraç:
Adversarial Evasion Attack Detection using Ensemble Classifiers in P4 Data Plane. 85 - Nguyen Van Tu, Sukhyun Nam, Lizhuang Tan, James Won-Ki Hong:
DRAFAS: Dynamic Resource Allocation for AI-Native Services. 86 - Deng Zhang, Juan Wang, Hanjun Gao, Zhou Wei Ni, Hao Zhang:
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism. 87 - Shivani Sharma
, Sateesh Kumar Awasthi:
Distributed RSU-Based Potential Crash Detection and Avoidance Mechanism for Unsignaled Intersections. 88 - Natesha Banavase Venkategowda, Luiz Fernando Bittencourt:
Service Placement in the Computing Continuum for Delay-Sensitive IoT/IIoT Applications. 89 - Maiko Andrade, Juliano Araújo Wickboldt:
A Study on 5G Network Slice Isolation Based on Native Cloud and Edge Computing Tools. 90 - Zhongyu Ma, Yajuan Gao, Jing Li, Qun Guo, Yingting Liu:
Energy-Efficient Power Controlling for mmWave Integrated Access and Backhaul Network: Deep Reinforcement Learning Based Designment. 91 - Sangeetha Dharmapuri Patel, Shivakumar Rangasamy:
Correction to: Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN. 92 - Gabriel Avanzi Ubiali, Wilson Souza, José Carlos Marinello, Taufik Abrão:
User Scheduling in Crowded XL-MIMO Under Multi-state LoS/NLoS Channels. 93 - Javier Palomares, Estefanía Coronado, Achilleas Tzenetopoulos, George Lentaris, Cristina Cervelló-Pastor, Muhammad Shuaib Siddiqui:
Hardware-Accelerated Edge AI Orchestration on the Multi-Tier Edge-to-Cloud Continuum. 94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.