default search action
Journal of Network and Systems Management, Volume 33
Volume 33, Number 1, March 2025
- Stelios Prekas, Panagiotis Trakadas, Panagiotis Karkazis:
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework. 1 - Mohammed Tarek Abdelaziz, Abdelrahman Radwan, Hesham Mamdouh, Adel Saeed Saad, Abdulrahman Salem Abuzaid, Ahmed Ayman AbdElhakeem, Salma Zakzouk, Kareem Moussa
, M. Saeed Darweesh:
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance. 2 - Oleg Kolosov, Gala Yadgar, David Breitgand, Dean H. Lorenz:
PASE: Pro-active Service Embedding in The Mobile Edge. 3 - Sudha Dubba, Balaprakasa Rao Killi:
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling. 4 - Hatem Algabroun, Lars Håkansson:
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring. 5 - Jia Hao, Yang Chen, Jianhou Gan:
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment. 6 - Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval. 7 - Ali Alfatemi
, Mohamed Rahouti, D. Frank Hsu, Christina Schweikert, Nasir Ghani, Aiman Solyman, Mohammad Iqbal Saryuddin Assaqty:
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis. 8 - Arezoo Ghasemi
:
A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment. 9 - Müge Erel-Özçevik:
Token as a Service for Software-Defined Zero Trust Networking. 10 - Lancan Yu, Jianting Yuan, Jin Zheng, Nan Yang:
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency. 11 - Wilson Souza, Marco Itaborahy, Gabriel Polvani, Andre Flaiban, José Carlos Marinello, Taufik Abrão
:
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization. 12 - Gyeong Ho Lee, Jaeseob Han:
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection. 13 - Gourish Goudar, R. Muralishankar:
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks. 14 - Vandirleya Barbosa, Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Paulo Pereira, Paulo Maciel, Tuan Anh Nguyen, Francisco Airton Silva:
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures. 15 - Xinhao Wan, Gang Xue, Yiming Zhong, Zhicheng Wang:
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion. 16 - Weiran Wang, Heng Yang
, Shanshan Li
, Xue Liu, Zhaojun Wan:
Adaptive UE Handover Management with MAR-Aided Multivariate DQN in Ultra-Dense Networks. 17 - ChengJun Guo:
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring. 18 - Bollu Priyanka, Banavath Balaji Naik, Thandava Purandeswar Reddy:
Energy and Cost Aware Workflow Offloading Using Quantum Inspired Differential Evolution in the Cloud Environments. 19 - Sarra Cherfi, Ali Lemouari, Ammar Boulaiche
:
MLP-Based Intrusion Detection for Securing IoT Networks. 20 - Alberto Robles Enciso, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Antonio F. Skarmeta-Gómez:
Dynamic Multi-Method Allocation for Intent-based Security Orchestration. 21
Volume 33, Number 2, April 2025
- Thiago Valentim Bezerra
, Gustavo Callou, Cleunio França, Eduardo Tavares:
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach. 22 - Ghattas Akkad, Elie Inaty, Jad Abou Chaaya
, Martin Maier:
FL-DBA: Fuzzy Logic Based Dynamic Bandwidth Allocation Algorithm for Next Generation Passive Optical Network. 24 - Miao Liu, Longxi Liu, Di Xu, Li Zhang:
Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm. 25 - Bipal Khanal, Chandan Kumar, Md. Sarfaraj Alam Ansari:
Real-Time Anomaly Detection Framework to Mitigate Emerging Threats in Software Defined Networks. 26 - Negar Mohammadi-Koushki
, Ibrahim El-Shekeil
, Krishna Kant:
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems. 27 - Nabil Nissar
, Najib Naja, Abdellah Jamali:
Cost-Sensitive Detection of DoS Attacks in Automotive Cybersecurity Using Artificial Neural Networks and CatBoost. 28 - Tran-Tuan Chu
, Mohamed Aymen Labiod
, Brice Augustin, Kajanan Mathialahan, Abdelhamid Mellouk:
Empirical Evaluation of QUIC-Based Software-Defined Service Migration in Multi-access Edge Computing Over 5G Networks. 29 - Yeong-Jun Seok, Ju-Bong Kim, Youn-Hee Han, Hyun-Kyo Lim, Chankyun Lee, Wonhyuk Lee:
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems. 30 - Hamidullah Riaz
, Sitki Öztürk, Sultan Aldirmaz Çolak, Ali Çalhan:
A Handover Decision Optimization Method Based on Data-Driven MLP in 5G Ultra-Dense Small Cell HetNets. 31 - Mujahid Muhammad, Ghazanfar Ali Safdar:
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks. 32 - Keyuan Qiu, Yingjie Zhang, Yiqiang Feng
, Feng Chen:
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks. 33 - Mohammed Belkheir, Mehdi Rouissat, Allel Mokaddem, Djamila Ziani, Pascal Lorenz:
Lightweight Novel Approach for Collaborative Packet-Based Mitigation of Blackhole Attacks in RPL-Based IoT. 34 - Jonas Vasconcelos Bistene
, Anderson Fernandes Pereira dos Santos, Clayton Escouper das Chagas
, Ronaldo Moreira Salles
:
Modeling Network Traffic Generators for Cyber Ranges: A Systematic Literature Review. 35 - Andrea Augello, Alessandra De Paola, Giuseppe Lo Re:
Hybrid Multilevel Detection of Mobile Devices Malware Under Concept Drift. 36 - Valentin Stangaciu
, Cristina Stangaciu, Bianca Gusita
, Daniel-Ioan Curiac:
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN. 37 - Jonatas Adilson Marques, Kirill Levchenko, Rafael R. Obelheiro, Ricardo Parizotto, Luciano Paschoal Gaspary:
Balancing Act: Navigating Control and Data Plane Responsibilities for Fast Operation in Programmable Networks. 38 - Özge Satir Akpunar, Sener Akpinar:
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters. 39 - C. Prajisha, A. R. Vasudevan:
MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things. 40 - Rehab H. Serag, Mohamed S. Abdalzaher
, Hussein Abd El Atty Elsayed, M. Sobh:
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning. 41 - Özlem Sabuncu
, Bülent Bilgehan
:
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance. 42 - Subhas Kumar Ghosh
, Vijay Monic Vittamsetti
:
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing. 43 - MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer). 44 - Lhoussaine Daoudi, Hamid Garmani, Mohamed Baslam:
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis. 45 - Shatakshi Singh, Umashankar Samal:
Insights and Trends in Open RAN: The Future of Mobile Networks. 46 - N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi:
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm. 47
Volume 33, Number 3, July 2025
- Peng Wang
, Yafei Song, Xiaodan Wang, Xiangke Guo:
DIFT: A Diffusion-Transformer for Intrusion Detection of IoT with Imbalanced Learning. 48 - Kolichala Rajashekar, Ashutosh Garg, Anand M. Baswade, Subhajit Sidhanta:
Optimizing Drone Deployment for Maximized User Connectivity in Areas of Interest Via Deep Reinforcement Learning. 49 - Chunhong Liu, Dehao Wang, Li Duan, Kun Wang, Junna Zhang:
Responsible Workload Sequence Anomaly Detection with Bi-View Feature Fusion. 50 - Shoaib Ahmed, Sayonto Khan, Kumudu S. Munasinghe
, Md. Farhad Hossain:
A Cognitive Network Architecture for Vehicle-to-Network (V2N) Communications over Smart Meters for URLLC. 51 - Xiao Yan, Fan Xiumei, Kok-Lim Alvin Yau, Zhixin Xie, Rui Men, Gang Yuan:
A Review of Reinforcement Learning for Semantic Communications. 52 - Chih-Yu Lin, Chien-Ting Tseng, Li-Yu An:
Employing Federated Semi-supervised Learning for Network Traffic Classification. 53 - Molka Gharbaoui, Barbara Martini, Piero Castoldi:
A WAN Infrastructure Manager Prototype for QoS-based Multi-Site SDN-Enabled NFV Orchestration. 54 - MohammadHossein Homaei
, Agustín Javier Di Bartolo, Rubén Molano Gómez
, Pablo García Rodríguez, Andrés Caro:
Enabling RPL on the Internet of Underwater Things. 55 - Supriya Singh, Deo Prakash Vidyarthi:
A Self-learning Approach for Service Offloading in Heterogeneous Fog-Integrated Cloud System. 57 - Akram Chhaybi, Saiida Lazaar
:
A Novel Wavelet-Based Model For Android Malware Detection Utilizing System Calls Features. 58 - Sangeetha Dharmapuri Patel, Shivkumar Rangasamy:
Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN. 59 - Zoheir Karaouzene, Hicham Megnafi, Sidi Mohammed Meriah:
Improving Cellular Network Coverage Through Optimization of Sector Antenna Azimuths: A Hybrid Approach Combining AI and GIS. 60 - Wenbo Xiao, Chenchen Xu, Min Peng, Caihong Kai, Tian Chen:
X-CLNN: A Hybrid Neural Network-Based Approach Combining CNN and RNN for Communication Services Classification. 61 - Dominique Barth, Maël Guiraud, Yann Strozecki:
Deterministic Scheduling of Periodic Messages for Low Latency in Cloud RAN. 62 - Wilker de Oliveira Delfino, Silvio E. Quincozes, Juan Lucas Vieira, Diego G. Passos, Débora Christina Muchaluat-Saade, Célio Albuquerque, Daniel Mossé:
Proactive Fault-Recovery on Distributed Software-Defined Network Controllers. 63 - Luís Gustavo Coutinho do Rêgo, Ticiana L. Coelho da Silva, Atslands Rego da Rocha, Matheus R. Monteiro, Lívia A. Cruz, Karine Zeitouni, Jorge Barbosa Soares, José Antônio Fernandes de Macêdo:
A Workflow for Synthetic Biometric in-Edge Data Generation using GAN based models. 64 - Mingyang Liang, Bo Wang:
A Hybrid Heuristic Task Offloading Algorithm in Mobile Edge Computing for Joint Optimization of Delay and Energy Consumption. 65 - David H. S. Lima, André L. L. de Aquino, Marília Curado:
Efficient Task Allocation in Data Center Environments Based on Information Theory. 66 - Nour El Houda Larouci, Somia Sahraoui, Abdelhamid Djeffal:
Machine Learning Based Routing Protocol (MLBRP) for Mobile Internet of Things Networks. 67 - Cezary Clapa
, Artur Lason
, Vinay Kanitkar, Piotr Cholda
:
Scalable Prioritization of Restoration Activities in Highly Distributed CDNs with Cost and Performance Awareness. 68 - Arbab Waseem Abbas, Safdar Nawaz Khan Marwat, Ala I. Al-Fuqaha, Ghassen Ben Brahim, Salman Ahmed, Waseem Ullah Khan:
Mathematical Modelling of ANP for Trust Based IoT Device Categorization in Secured Smart Logistics. 69 - Pankaj Jain
, Richa Jain, Bhawana Tyagi:
RLSK_US: An Improved Dynamic Virtual Machine Consolidation Model to Optimize Energy and SLA Violations in Cloud Datacenter. 70 - Muhammad Hamza Shahab
, Yogesh Sharma
:
Fault Tolerance in Service Function Chains: A Taxonomy, Survey and Future Directions. 71 - Xuesong Wu, Tianshuai Zheng, Runfang Wu, Jie Ren, Junyan Guo, Ye Du:
Hi-SAM: A High-Scalable Authentication Model for Satellite-Ground Zero-Trust System Using Mean Field Game. 72 - Tao Zhang, Yujie Peng, Zhenbo Li, Yuchen Wang, Xidao Luan, Yunsheng Liu, Siyuan Fan, Hui Yin:
Load Balancing With Proactive Traffic Separation in Data Center Network. 73 - Oumeima Boubertakh, Ali Sahnoun, Abdelhafid Zitouni, Saad Harous:
HyMD2I: Hybrid Metaheuristic-Deep Learning Approach for Intrusion Detection in IoT. 74
Volume 33, Number 4, October 2025
- Adilson G. Filho, Eduardo K. Viegas, Altair O. Santin, Jhonatan Geremias:
A Dynamic Network Intrusion Detection Model for Infrastructure as Code Deployed Environments. 75 - Mitali Sinha, Joy Chandra Mukherjee, Padmalochan Bera, Manoranjan Satpathy:
SynFloWatch: An Entropy-Based Live Defense System against SYN Spoofing DDoS Attacks in Hybrid SDN. 76 - Michael Weyns, Sander Vanden Hautte, Annelies Lejon, Veerle Ledoux, Pieter Bonte, Filip De Turck, Sofie Van Hoecke, Femke Ongenae:
Enabling Cross-Context Learning with Knowledge Graphs for Anomaly Detection in Communications Networks. 77 - Francisco Airton Silva, Fernando A. M. Trinta, Michel S. Bonfim, José Antônio Fernandes de Macêdo, Paulo A. L. Rego, Vinícius Lagrota:
Performance Evaluation of Cloud Native Applications: A Systematic Mapping Study. 78 - Rafael Marasca Martins, Luis Carlos Mathias, Taufik Abrão:
3-D Indoor Visible Light Positioning Using Machine Learning and Hyperparameter Tuning. 79 - Ranjan Patowary, Gautam Barua, Radhika Sukapuram:
Flow Migration for Service Function Chains: Correctness Criteria and Their Relaxation. 80 - Sanae Seidi, Abderrahim Abdellaoui:
Securing and Ensuring the Confidentiality of Medical Data in the Era of Decentralized Technologies: A Blockchain and Self-Sovereign Identity-Based Approach. 81 - Hadiseh Rezaei, Rahim Taheri, Ivan Jordanov, Mohammad Shojafar:
Federated RNN for Intrusion Detection System in IoT Environment Under Adversarial Attack. 82 - Mahdi Sharara, Sahar Hoteit, Yannick Carlinet, Antonia Maria Masucci, Nancy Perrot:
Policy-Gradient-Based Reinforcement Learning for Maximizing Operator's Profit in Open-RAN. 83 - Arezoo Jahani, Paria Jourabchi Amirkhizi:
Anomaly Detection in Cloud Computing Workloads Based on Resource Usage. 84 - Aparna Ganesan, Kamil Saraç:
Adversarial Evasion Attack Detection using Ensemble Classifiers in P4 Data Plane. 85 - Nguyen Van Tu, Sukhyun Nam, Lizhuang Tan, James Won-Ki Hong:
DRAFAS: Dynamic Resource Allocation for AI-Native Services. 86 - Deng Zhang, Juan Wang, Hanjun Gao, Zhou Wei Ni, Hao Zhang:
Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism. 87 - Shivani Sharma, Sateesh Kumar Awasthi:
Distributed RSU-Based Potential Crash Detection and Avoidance Mechanism for Unsignaled Intersections. 88 - Natesha Banavase Venkategowda, Luiz Fernando Bittencourt:
Service Placement in the Computing Continuum for Delay-Sensitive IoT/IIoT Applications. 89 - Maiko Andrade, Juliano Araújo Wickboldt:
A Study on 5G Network Slice Isolation Based on Native Cloud and Edge Computing Tools. 90 - Zhongyu Ma, Yajuan Gao, Jing Li, Qun Guo, Yingting Liu:
Energy-Efficient Power Controlling for mmWave Integrated Access and Backhaul Network: Deep Reinforcement Learning Based Designment. 91 - Sangeetha Dharmapuri Patel, Shivakumar Rangasamy:
Correction to: Proactive Self-Scheduling Energy Balancing Routing Approach Based Lifetime Maximization Using Cluster Control Fragmentation in WSN. 92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.