


default search action
Journal of Network and Systems Management, Volume 34
Volume 34, Number 1, March 2026
- Asia Maqsood, Hamid Turab Mirza, Faiza Iqbal, Reem Ibrahim Alkanhel, Naveed Hussain, Ayesha Afzaal, Ayesha Altaf, Imran Ashraf:

Feature Fusion-Based Ensemble Approach for Robust Malware Detection with Reduced False Positives. 2 - Jin Wang

, Yang Yang:
Attention-Based High-Dimensional Offloading with Deep Recurrent Q-Network in a Cloud-Edge Environment. 3 - Jolahn Vaudey, Stéphane Mocanu

, Éric Rutten
, Gwenaël Delaval:
Self-Reconfiguration of Industrial Control Systems as a Response to Cyberattacks. 4 - Lorenzo Ferro

, Enrico Bravi
, Silvia Sisinni
, Antonio Lioy
:
Privacy-Preserving Container Attestation. 5 - Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:

Intent-Driven Network Isolation for the Cloud Computing Continuum. 6 - Jacopo Catalano, Enrico Bravi, Silvia Sisinni, Antonio Lioy:

Enabling Integrity Measurement for Secure Applications in the Enarx Framework. 7 - Birglang Bargayary, Nabajyoti Medhi:

Cross-DistBlock: Blockchain-Enabled Multi-stage Flow Verification in Multi-domain Software-Defined Networks. 8 - Paulo Roberto de Oliveira, Altair Olivo Santin

, Pedro Horchulhack, Eduardo Kugler Viegas
, Aldri Santos
:
Defense-in-Depth and Machine Learning-Based Intrusion Detection for Industrial Control Systems. 9 - Konstantinos Giapantzis, Apostolis Zarras, Sarantis Kalafatidis, Antonios Lalas, Konstantinos Votis, Christos Xenakis:

GORGO: A Reinforcement Learning Model for DoS Vulnerability Analysis on 5G and Beyond Networks. 10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














