Content
July 2024, Volume 34, Issue 4
- e2260 Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges
by Wonseok Choi & Jongsoo Woo & James Won‐Ki Hong - e2261 Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity
by Srisht Fateh Singh & Panagiotis Michalopoulos & Andreas Veneris - e2266 Athena: Smart order routing on centralized crypto exchanges using a unified order book
by Robert Henker & Daniel Atzberger & Jan Ole Vollmer & Willy Scheibel & Jürgen Döllner & Markus Bick - e2277 Leveraging Ponzi‐like designs in stablecoins
by Shange Fu & Qin Wang & Jiangshan Yu & Shiping Chen - e2287 Innovations in Blockchain for Crypto Assets and Exchanges
by James Won‐Ki Hong & Andreas Veneris & Hongtaek Ju & Taeyeol Jeong & Changhoon Kang
May 2024, Volume 34, Issue 3
- e2256 Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network
by V. Karthik & R. Lakshmi & Salini Abraham & M. Ramkumar - e2257 A novel eviction policy based on shortest remaining time for software defined networking flow tables
by Kavi Priya Dhandapani & Mirnalinee Thanganadar Thangathai & Shahul Hamead Haja Moinudeen - e2258 TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
by Najmun Nisa & Adnan Shahid Khan & Zeeshan Ahmad & Johari Abdullah - e2262 Reducing the propagation delay of compact block in Bitcoin network
by Aeri Kim & Meryam Essaid & Sejin Park & Hongtaek Ju
March 2024, Volume 34, Issue 2
- e2252 Availability‐aware virtual network function placement based on multidimensional universal generating functions
by Kengo Arakawa & Eiji Oki - e2253 Topology analysis of the Ripple transaction network
by Anan Jin & Yuhang Ye & Brian Lee & Yuansong Qiao - e2254 A comprehensive review of blockchain integration in remote patient monitoring for E‐health
by Nedia Badri & Leïla Nasraoui & Leïla Azouz Saïdane - e2255 Blockchain and crypto forensics: Investigating crypto frauds
by Udit Agarwal & Vinay Rishiwal & Sudeep Tanwar & Mano Yadav
January 2024, Volume 34, Issue 1
- e2228 Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm
by Vankadhara Rajyalakshmi & Kuruva Lakshmanna - e2242 Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning
by Shengyi Yang & Shaoying Zhu - e2245 Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges
by Kyungchan Ko & Taeyeol Jeong & Jongsoo Woo & James Won‐Ki Hong - e2251 Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files
by Ziyu Qiu & Zhilei Zhou & Bradley Niblett & Andrew Johnston & Jeffrey Schwartzentruber & Nur Zincir‐Heywood & Malcolm I. Heywood
November 2023, Volume 33, Issue 6
- e2227 A novel data streaming method for detecting abnormal flows in distributed monitoring systems
by Aiping Zhou & Ye Zhu - e2230 Characterizing the Bitcoin network topology with Node‐Probe
by Meryam Essaid & Changhyun Lee & Hongteak Ju - e2232 Placement of virtual network functions for network services
by Brajesh Kumar Umrao & Dharmendra Kumar Yadav - e2233 Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure
by Haruto Taka & Fujun He & Eiji Oki - e2249 Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment
by Jabin Prakash J & Ramesh K & Saravanan K & Lakshmi Prabha G
September 2023, Volume 33, Issue 5
- e2224 Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review
by Banoth Ravi & Manoj Kumar & Yu‐Chen Hu & Shamsul Hassan & Bittu Kumar - e2225 A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment
by Wenjun Song & Mengqi Liu & Thar Baker & Qikun Zhang & Yu‐an Tan - e2226 Blockchain‐inspired lightweight trust‐based system in vehicular networks
by Sandeep Kumar Arora & Gulshan Kumar & Mustapha Hedabou & El Mehdi Amhoud & Celestine Iwendi - e2231 Dynamic management network system of automobile detection applying edge computing
by Xianhong Cao - e2240 A blockchain‐enabled security management framework for mobile edge computing
by Jafar A. Alzubi & Omar A. Alzubi & Ashish Singh & Tareq Mahmod Alzubi - e2243 Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing
by Jitendra Kumar Samriya & Mohit Kumar & Sukhpal Singh Gill - e2244 Load balancing clustering and routing for IoT‐enabled wireless sensor networks
by Shashank Singh & Veena Anand - e2248 Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system
by Erukala Suresh Babu & Mekala Srinivasa Rao & Gandharba Swain & A. Kousar Nikhath & Rajesh Kaluri - e2250 Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things
by Praveen Kumar Donta & Edmundo Monteiro & Chinmaya Kumar Dehury & Ilir Murturi
July 2023, Volume 33, Issue 4
- e2213 RNN‐EdgeQL: An auto‐scaling and placement approach for SFC
by Suman Pandey & Minji Choi & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2215 SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting
by Gagan Nandha Kumar & Kostas Katsalis & Panagiotis Papadimitriou & Paul Pop & Georg Carle - e2221 Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios
by Luis M. Contreras & Alberto Solano & Francisco Cano & Jesus Folgueira - e2241 Accelerating network softwarization in the cognitive age
by Kohei Shiomoto & Young‐Tak Kim & Christian Esteve Rothenberg & Barbara Martini & Eiji Oki
May 2023, Volume 33, Issue 3
- e2192 Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks
by Lei Wu & Shengnan Zhao & Xia Wei & Lingzhen Meng - e2193 Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard
by Shixiong Yao & Xingjian Tian & Jiageng Chen & Yi Xiong - e2198 Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis
by Peng Zeng & Guanjun Lin & Jun Zhang & Ying Zhang - e2200 MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
by Sangjukta Das & Suyel Namasudra - e2222 A federated semi‐supervised learning approach for network traffic classification
by Zhiping Jin & Zhibiao Liang & Meirong He & Yao Peng & Hanxiao Xue & Yu Wang - e2229 Editorial for special issue on security and trust on networked systems
by Weizhi Meng & Sokratis K. Katsikas & Jiageng Chen & Chao Chen
March 2023, Volume 33, Issue 2
- e2219 Audit‐based correction mechanism for malicious statistics information of data plane
by Dong Liang & Qinrang Liu & Ke Song & Binghao Yan & Tao Hu - e2220 On minimizing flow monitoring costs in large‐scale software‐defined network networks
by Haythem Yahyaoui & Mohamed Faten Zhani & Ouns Bouachir & Moayad Aloqaily - e2223 Optimal network‐aware virtual data center embedding
by Ameni Hbaieb & Mahdi Khemakhem
January 2023, Volume 33, Issue 1
- e2216 EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network
by Tanima Bhowmik & Indrajit Banerjee - e2217 Graph neural network‐based virtual network function deployment optimization
by Hee‐Gon Kim & Suhyun Park & Stanislav Lange & Doyoung Lee & Dongnyeong Heo & Heeyoul Choi & Jae‐Hyoung Yoo & JamesWon‐Ki Hong - e2218 Towards optimal synchronization in NFV‐based environments
by Zakaria Alomari & Mohamed Faten Zhani & Moayad Aloqaily & Ouns Bouachir
November 2022, Volume 32, Issue 6
- e2210 Software‐defined content delivery network at the edge for adaptive video streaming
by Akhilesh Kumar & Shashwati Banerjea & Rishabh Jain & Mayank Pandey - e2211 FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC
by Xiaoying Huang & Zhichuan Guo & Mangu Song - e2212 Container placement and migration strategies for cloud, fog, and edge data centers: A survey
by Kiranpreet Kaur & Fabrice Guillemin & Francoise Sailhan - e2214 Load migration in distributed softwarized network controllers
by Sepehr Abbasi Zadeh & Farid Zandi & Mohammad Amin Beiruti & Yashar Ganjali
September 2022, Volume 32, Issue 5
- e2199 A cost‐effective and load‐balanced controller placement method in software‐defined networks
by Mili Dhar & Bidyut K. Bhattacharyya & Mrinal Kanti Debbarma & Swapan Debbarma - e2201 Dissemination control in dynamic data clustering for dense IIoT against false data injection attack
by Carlos Pedroso & Aldri Santos - e2208 Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture
by Ian Vilar Bastos & Igor Monteiro Moraes & Thi‐Mai‐Trang Nguyen & Guy Pujolle - e2209 vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH
by Reza Shokri Kalan & Stuart Clayman & Muge Sayıt
July 2022, Volume 32, Issue 4
- e2194 A secure cross‐organizational container deployment approach to enable ad hoc collaborations
by Laurens Van Hoye & Tim Wauters & Filip De Turck & Bruno Volckaert - e2195 amulog: A general log analysis framework for comparison and combination of diverse template generation methods
by Satoru Kobayashi & Yuya Yamashiro & Kazuki Otomo & Kensuke Fukuda - e2196 Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation
by Ranjeet B. Kagade & Santhosh Jayagopalan - e2197 Cost‐effective and accurate flow statistics collection in OpenFlow‐based SDN
by Binghao Yan & Qinrang Liu & Jianliang Shen & Dong Liang & Xingyu Liu
May 2022, Volume 32, Issue 3
- e2186 A batch delivery mechanism of network update in software‐defined wide area networks
by RongBo Zhang & Xin Li & Jibin Niu & Yinqing Wang - e2187 MediTrans—Patient‐centric interoperability through blockchain
by Merlin George & Anu Mary Chacko - e2188 Towards threshold‐agnostic heavy‐hitter classification
by Adrian Pekar & Alejandra Duque‐Torres & Winston K.G. Seah & Oscar M. Caicedo Rendon - e2190 Block diffusion delay attack and its countermeasures in a Bitcoin network
by Masahiro Sasabe & Masanari Yamamoto & Yuanyu Zhang & Shoji Kasahara - e2191 Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks
by Guto Leoni Santos & Pierangelo Rosati & Theo Lynn & Judith Kelner & Djamel Sadok & Patricia Takako Endo
March 2022, Volume 32, Issue 2
- e2161 An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures
by Almir Guimarães & Paulo Maciel & Rivalino Matias & Bruno Silva & Bruno Nogueira - e2166 DockSDN: A hybrid container‐based software‐defined networking emulation tool
by Erick Petersen & Marco Antonio To - e2179 Truthful Decentralized Blockchain Oracles
by Yuxi Cai & Nafis Irtija & Eirini Eleni Tsiropoulou & Andreas Veneris - e2180 Identity and access management using distributed ledger technology: A survey
by Fariba Ghaffari & Komal Gilani & Emmanuel Bertin & Noel Crespi - e2183 Veritaa: A distributed public key infrastructure with signature store
by Jakob Schaerer & Severin Zumbrunn & Torsten Braun - e2184 Simulating permissionless blockchains: Distribution fitting, tool support, and a case study
by Maher Alharby & Aad van Moorsel - e2189 BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services
by Abdelkader Lahmadi & Emmanuel Bertin & Ruidong Li
January 2022, Volume 32, Issue 1
- e2154 A privacy‐focused approach for anomaly detection in IoT networks
by Pedro Martins & André B. Reis & Paulo Salvador & Susana Sargento - e2156 A Value‐of‐Information‐based management framework for fog services
by Filippo Poltronieri & Mauro Tortonesi & Alessandro Morelli & Cesare Stefanelli & Niranjan Suri - e2157 Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases
by Gabor Soos & Daniel Ficzere & Pal Varga - e2158 Industrial control protocols in the Internet core: Dismantling operational practices
by Marcin Nawrocki & Thomas C. Schmidt & Matthias Wählisch - e2165 A model‐driven approach for deployment descriptor design in network function virtualization
by Wassim Sellil Atoui & Nour Assy & Walid Gaaloul & Imen Grida Ben Yahia - e2178 An optimization‐based congestion control for constrained application protocol
by Godfrey A. Akpakwu & Gerhard P. Hancke & Adnan M. Abu‐Mahfouz - e2181 An access control for IoT based on network community perception and social trust against Sybil attacks
by Gustavo H. C. de Oliveira & Agnaldo de Souza Batista & Michele Nogueira & Aldri L. dos Santos - e2182 Topics from networks management and operations
by István Gódor & Imen Grida Ben Yahia - e2185 Energy‐aware mobility for aerial networks: A reinforcement learning approach
by Elif Bozkaya & Yusuf Özçevik & Mertkan Akkoç & Muhammed Raşit Erol & Berk Canberk
November 2021, Volume 31, Issue 6
- e2152 A generalized machine learning‐based model for the detection of DDoS attacks
by Murk Marvi & Asad Arfeen & Riaz Uddin - e2155 Slicing Wi‐Fi links based on QoE video streaming fairness
by Mauricio de Oliveira & Daniel F. Macedo - e2159 Denial of service detection using dynamic time warping
by Diab M. Diab & Basil AsSadhan & Hamad Binsalleeh & Sangarapillai Lambotharan & Konstantinos G. Kyriakopoulos & Ibrahim Ghafir - e2160 An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks
by Murk Marvi & Asad Arfeen & Riaz Uddin - e2162 E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks
by Yun‐Zhan Cai & Ting‐Yu Lin & Yu‐Ting Wang & Ya‐Pei Tuan & Meng‐Hsun Tsai - e2163 A systematic review on distributed denial of service attack defense mechanisms in programmable networks
by Bruno L. Dalmazo & Jonatas A. Marques & Lucas R. Costa & Michel S. Bonfim & Ranyelson N. Carvalho & Anderson S. da Silva & Stenio Fernandes & Jacir L. Bordim & Eduardo Alchieri & Alberto Schaeffer‐Filho & Luciano Paschoal Gaspary & Weverton Cordeiro - e2164 Graph neural network‐based virtual network function deployment optimization
by Hee‐Gon Kim & Suhyun Park & Stanislav Lange & Doyoung Lee & Dongnyeong Heo & Heeyoul Choi & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2173 Topic allocation method on edge servers for latency‐sensitive notification service
by Tomoya Tanaka & Tomio Kamada & Chikara Ohta - e2174 A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation
by Daichi Ono & Luis Guillen & Satoru Izumi & Toru Abe & Takuo Suganuma - e2175 Visualization of Ethereum P2P network topology and peer properties
by Soohoon Maeng & Meryam Essaid & Changhyun Lee & Sejin Park & Hongteak Ju - e2176 Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment
by Do‐Young Lee & Se‐Yeon Jeong & Kyung‐Chan Ko & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2177 Editorial for special issue on “Towards service and networking intelligence for humanity”
by Seung‐Joon Seok & Hongtaek Ju & Yuncheng Zhu & Jen‐Jee Chen
September 2021, Volume 31, Issue 5
- e2064 Quality of experience and quality of service‐aware handover for video transmission in heterogeneous networks
by Iago Medeiros & Lucas Pacheco & Denis Rosário & Cristiano Both & Jéferson Nobre & Eduardo Cerqueira & Lisandro Granville - e2068 Beyond VNFM: Filling the gaps of the ETSI VNF manager to fully support VNF life cycle operations
by Giovanni Venâncio & Vinícius Fulber Garcia & Leonardo da Cruz Marcuzzo & Thales Nicolai Tavares & Muriel Figueredo Franco & Lucas Bondan & Alberto Egon Schaeffer‐Filho & Carlos Raniery Paula dos Santos & Lisandro Zambenedetti Granville & Elias P. Duarte - e2078 SDN‐based architecture for providing quality of service to high‐performance distributed applications
by Alexandre T. Oliveira & Bruno José C. A. Martins & Marcelo F. Moreno & Antônio Tadeu A. Gomes & Artur Ziviani & Alex Borges Vieira - e2151 Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS)
by Denis Rosário & Leandro A. Villas
July 2021, Volume 31, Issue 4
- e2108 Design, implementation, and evaluation of learning algorithms for dynamic real‐time network monitoring
by Rashid Mijumbi & Abhaya Asthana & Markku Koivunen & Fu Haiyong & Qinjun Zhu - e2109 Exploring anomalous behaviour detection and classification for insider threat identification
by Duc C. Le & Nur Zincir‐Heywood - e2136 Minimizing protection switching time in transport networks with shared mesh protection
by Choong‐hee Cho & Jeong‐dong Ryoo - e2137 A cost‐efficient QoS‐aware analytical model of future software content delivery networks
by Beatriz Otero & Eva Rodríguez & Otilio Rojas & Javier Verdú & Juan José Costa & Manuel Alejandro Pajuelo & Ramón Canal - e2138 Graph theoretical approach for automated IP lifecycle management in telco networks
by Kübra Duran & Bahtiyar Karanlik & Berk Canberk - e2140 A message keyword extraction approach by accurate identification of field boundaries
by Young‐Hoon Goo & Kyu‐Seok Shim & Min‐Seob Lee & Myung‐Sup Kim - e2141 Decision Tree‐Based Entries Reduction scheme using multi‐match attributes to prevent flow table overflow in SDN environment
by Priyanka Nallusamy & Sapna Saravanen & Murugan Krishnan - e2142 Optimal segments for forwarding table size minimization in segment‐routed SDNs
by Anix Anbiah & Krishna M. Sivalingam - e2143 Detecting and analyzing border gateway protocol blackholing activity
by Talaya Farasat & Akmal Khan - e2144 A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks
by Shashank Gavel & Ajay Singh Raghuvanshi & Sudarshan Tiwari - e2145 Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network
by Babu R. Dawadi & Danda B. Rawat & Shashidhar R. Joshi & Pietro Manzoni & Martina M. Keitsch - e2146 Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition
by Nasif Muslim & Salekul Islam & Jean‐Charles Grégoire - e2147 Application layer classification of Internet traffic using ensemble learning models
by Asad Arfeen & Khizar Ul Haq & Syed Muhammad Yasir - e2148 Modeling and accomplishing the BEREC network neutrality policy
by David S. Barreto & Rafael F. Reale & Joberto S. B. Martins
May 2021, Volume 31, Issue 3
- e2111 Counselors network for intrusion detection
by Silvio E. Quincozes & Carlos Raniery & Raul Ceretta Nunes & Célio Albuquerque & Diego Passos & Daniel Mossé - e2112 SDN‐based teleprotection and control power systems: A study of available controllers and their suitability
by Arthur A. Zopellaro Soares & Juan Lucas Vieira & Silvio E. Quincozes & Vinicius C. Ferreira & Luana M. Uchôa & Yona Lopes & Diego Passos & Natalia C. Fernandes & Igor Monteiro Moraes & Débora Muchaluat‐Saade & Célio Albuquerque - e2113 An analysis of the fees and pending time correlation in Ethereum
by José Eduardo de Azevedo Sousa & Vinícius Oliveira & Júlia Valadares & Glauber Dias Gonçalves & Saulo Moraes Villela & Heder Soares Bernardino & Alex Borges Vieira - e2115 Classification and evaluation of IoT brokers: A methodology
by Eddas Bertrand‐Martinez & Phelipe Dias Feio & Vagner de Brito Nascimento & Fabio Kon & Antônio Abelém - e2124 VNF‐Consensus: A virtual network function for maintaining a consistent distributed software‐defined network control plane
by Giovanni Venâncio & Rogério C. Turchetti & Edson T. Camargo & Elias P. Duarte - e2153 Editorial for the special issue on research trends in network operations and management with selected papers from the ninth edition of the Latin American Network Operations and Management Symposium
by Igor Monteiro Moraes & Célio Albuquerque & Artur Ziviani
March 2021, Volume 31, Issue 2
- e2090 Network traffic identification of several open source secure proxy protocols
by Yidan Zhang & Jiageng Chen & Kaiming Chen & Ruoyan Xu & Jesen Teh & Shuai Zhang - e2091 Research on adaptive beacon message broadcasting cycle based on vehicle driving stability
by Yuejin Zhang & Meng Wang & Juan Wang & Fei Du & Yong Hu & Meng Yu & Guanghui Li & Aiyun Zhan - e2092 K‐PSO: An improved PSO‐based container scheduling algorithm for big data applications
by Bo Liu & Jiawei Li & Weiwei Lin & Weihua Bai & Pengfei Li & Qian Gao - e2096 Privacy‐preserving cloud‐fog–based traceable road condition monitoring in VANET
by Wei Wang & Lei Wu & Wenlei Qu & Zhaoman Liu & Hao Wang - e2101 Research on scheduling method based on traffic matrix for IoT security
by Shaohua Cao & Dongjie Zhu & Guofu Li & Yanwu Zhang & Xiani Fan & Shanshan Geng & Haiwen Du & Ning Cao - e2103 Security and trust preserving inter‐ and intra‐cloud VM migrations
by Mudassar Aslam & Simon Bouget & Shahid Raza - e2107 A fog‐based collaborative intrusion detection framework for smart grid
by Wenjuan Li & Man Ho Au & Yu Wang - e2139 Secure grid‐based density peaks clustering on hybrid cloud for industrial IoT
by Liping Sun & Shang Ci & Xiaoqing Liu & Liangmin Guo & Xiaoyao Zheng & Yonglong Luo - e2150 Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions
by Weizhi Meng & Piotr Cofta & Tyrone W.A. Grandison
January 2021, Volume 31, Issue 1
- e2127 Towards distributed emergency flow prioritization in software‐defined networks
by Jerico Moeyersons & Behrooz Farkiani & Tim Wauters & Bruno Volckaert & Filip De Turck - e2128 On accounting for screen resolution in adaptive video streaming: QoE‐driven bandwidth sharing framework
by Othmane Belmoukadam & Muhammad Jawad Khokhar & Chadi Barakat - e2130 De‐anonymizing Ethereum blockchain smart contracts through code attribution
by Shlomi Linoy & Natalia Stakhanova & Suprio Ray - e2134 OpenBNG: Central office network functions on programmable data plane hardware
by Ralf Kundel & Leonhard Nobach & Jeremias Blendin & Wilfried Maas & Andreas Zimber & Hans‐Joerg Kolbe & Georg Schyguda & Vladimir Gurevich & Rhaban Hark & Boris Koldehofe & Ralf Steinmetz - e2149 CNSM 2019 special issue: Embracing the new wave of artificial intelligence
by Nur Zincir‐Heywood & Rémi Badonnel
November 2020, Volume 30, Issue 6
- e2116 A framework for multi‐provider virtual private networks in software‐defined federated networks
by Habib Mostafaei & Gabriele Lospoto & Roberto Di Lallo & Massimo Rimondini & Giuseppe Di Battista - e2123 CL‐MIPv6: A cross‐layer approach for fast‐internetwork‐mobility support in 6LoWPAN wireless sensor networks
by Zakaria Hamidi‐Alaoui & Noureddine Moussa & Abdelbaki El Belrhiti El Alaoui - e2125 Wireless‐Fog Mesh: A framework for in‐network computing of microservices in semipermanent smart environments
by Shabir Ali & Mayank Pandey & Neeraj Tyagi - e2126 Clustering method in protocol reverse engineering for industrial protocols
by Kyu‐Seok Shim & Young‐Hoon Goo & Min‐Seob Lee & Myung‐Sup Kim - e2129 Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis
by Basil AsSadhan & Abraham Alzoghaiby & Hamad Binsalleeh & Konstantinos G. Kyriakopoulos & Sangarapillai Lambotharan - e2131 Trustful ad hoc cross‐organizational data exchanges based on the Hyperledger Fabric framework
by Laurens Van Hoye & Tim Wauters & Filip De Turck & Bruno Volckaert - e2132 Next generation of microservices for the 5G Service‐Based Architecture
by João Bourbon Moreira & Henrique Mamede & Vasco Pereira & Bruno Sousa - e2135 An efficient neural network optimized by fruit fly optimization algorithm for user equipment association in software‐defined wireless sensor network
by Xiao‐Ping Zeng & Qi Luo & Jia‐Li Zheng & Guang‐Hui Chen
September 2020, Volume 30, Issue 5
- e2089 Blockchain‐based access control for enterprise blockchain applications
by Lei Xu & Isaac Markus & Subhod I & Nikhil Nayab - e2093 Weighted voting on the blockchain: Improving consensus in proof of stake protocols
by Stefanos Leonardos & Daniël Reijsbergen & Georgios Piliouras - e2098 Incentives in Ethereum's hybrid Casper protocol
by Vitalik Buterin & Daniël Reijsbergen & Stefanos Leonardos & Georgios Piliouras - e2099 FastFabric: Scaling hyperledger fabric to 20 000 transactions per second
by Christian Gorenflo & Stephen Lee & Lukasz Golab & Srinivasan Keshav - e2106 Bitcoin's dynamic peer‐to‐peer topology
by Meryam Essaid & Sejin Park & Hong‐Taek Ju - e2133 Editorial for special issue on “challenges and opportunities of Blockchain and Cryptocurrency”
by Hongtaek Ju & Raouf Boutaba & Myungsup Kim & Burkhard Stiller
July 2020, Volume 30, Issue 4
- e2097 A survey on indexing techniques for mobility in Internet of Things': Challenges, performances, and perspectives
by Hazem Jihad Badarneh & Sri Devi Ravana & Ali Mohammed Mansoor - e2100 Traffic classification at the radio spectrum level using deep learning models trained with synthetic data
by Tom De Schepper & Miguel Camelo & Jeroen Famaey & Steven Latré - e2102 Segment‐aware dynamic routing for DASH flows over software‐defined networks
by Cihat Cetinkaya & Korhan Herguner & Cornelius Hellge & Muge Sayit - e2104 Community oriented in‐network caching and edge caching for over‐the‐top services in adaptive network conditions to improve performance
by Suman Pandey & Soyoung Park & Mi Jung Choi - e2105 OASM: An overload‐aware workload scheduling method for cloud computing based on biogeographical optimization
by Ali Abbasi Tadi & Mohammad Reza Khayyambashi & Hadi Khosravi‐Farsani - e2114 Dynamic credit reservation for online charging of regular Internet of things traffic
by Huai‐Sheng Huang & Da‐Yu Hung
May 2020, Volume 30, Issue 3
- e2053 Impact of VNF placements on QoE monitoring in the cloud
by Lam Dinh‐Xuan & Christian Popp & Valentin Burger & Florian Wamser & Tobias Hoßfeld - e2054 An objective and subjective quality assessment study of passive gaming video streaming
by Nabajeet Barman & Saman Zadtootaghaj & Steven Schmidt & Maria G. Martini & Sebastian Möller - e2057 Improving video QoE with IP over ICN
by Ioannis Doumanis & Alexander Phinikarides & George Xylomenos & Stuart C.M. Porter & Michael Georgiades - e2058 Dissecting the performance of YouTube video streaming in mobile networks
by Anika Schwind & Cise Midoglu & Özgü Alay & Carsten Griwodz & Florian Wamser - e2063 Game of protocols: Is QUIC ready for prime time streaming?
by Sevket Arisu & Ertan Yildiz & Ali C. Begen - e2081 Muslin: A QoE‐aware CDN resources provisioning and advertising system for cost‐efficient multisource live streaming
by Simon Da Silva & Joachim Bruneau‐Queyreix & Mathias Lacaud & Daniel Negru & Laurent Réveillère - e2083 Quality of experience for unified communications: A survey
by Jasmina Baraković Husić & Sabina Baraković & Enida Cero & Nina Slamnik & Merima Oćuz & Azer Dedović & Osman Zupčić - e2110 IJNM Special Issue—International Journal of Network Management: QoE‐centric analysis and management of communication networks
by Florian Wamser & Özgü Alay & Florian Metzger & Stefan Valentin
March 2020, Volume 30, Issue 2
- e2087 Pluggable SDN framework for managing heterogeneous SDN networks
by Jerico Moeyersons & Pieter‐Jan Maenhaut & Filip Turck & Bruno Volckaert - e2094 A proactive defense method for the stealthy EDoS attacks in a cloud environment
by Neha Agrawal & Shashikala Tapaswi - e2095 QoS‐aware cross‐domain collaborative energy‐saving mechanism for FiWi virtual networks
by Siya Xu & Xujing Peng & Shaoyong Guo & Xuesong Qiu & Wenchen He
January 2020, Volume 30, Issue 1
- e2086 CU placement over a reconfigurable wireless fronthaul in 5G networks with functional splits
by Davit Harutyunyan & Roberto Riggio & Slawomir Kuklinski & Toufik Ahmed - e2088 A review of mobility management entity in LTE networks: Power consumption and signaling overhead
by Alaa A. R. Alsaeedy & Edwin K. P. Chong
November 2019, Volume 29, Issue 6
- e2080 Real‐time and fine‐grained network monitoring using in‐band network telemetry
by Jonghwan Hyun & Nguyen Van Tu & Jae‐Hyoung Yoo & James Won‐Ki Hong - e2085 Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation
by Guilherme Geronimo & Rafael Uriarte & Carlos Westphall
October 2019, Volume 29, Issue 5
- e2082 Formal modeling and verification of software‐defined networks: A survey
by Nitin Shukla & Mayank Pandey & Shashank Srivastava - e2084 CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users
by Tiago O. Castro & Vitor G. R. Caitité & Daniel F. Macedo & Aldri L. dos Santos
July 2019, Volume 29, Issue 4
- e2067 A flow handover protocol to support state migration in softwarized networks
by Manuel Peuster & Hannes Küttner & Holger Karl - e2069 Techno‐economic analysis of FiWi access networks based on optimized source packet traffic
by Damir Breskovic & Dinko Begusic - e2079 Efficient allocation of elastic interfederation encrypted streaming sessions
by Rafael Xavier & Lisandro Zambenedetti Granville & Filip De Turck & Bruno Volckaert
May 2019, Volume 29, Issue 3
- e2047 A meta‐heuristic Bayesian network classification for intrusion detection
by Mahesh Kumar Prasath & Balasubramani Perumal - e2049 User identification via neural network based language models
by Tien D. Phan & Nur Zincir‐Heywood - e2050 A deep learning method to detect network intrusion through flow‐based features
by Abdurrahman Pektaş & Tankut Acarman - e2055 Securing light clients in blockchain with DLCP
by Leonardo da Costa & André Neto & Billy Pinheiro & Weverton Cordeiro & Roberto Araújo & Antônio Abelém - e2061 Blockchain and smart contracts for higher education registry in Brazil
by Lucas M. Palma & Martín A. G. Vigil & Fernando L. Pereira & Jean E. Martina - e2065 Deep mining port scans from darknet
by Sofiane Lagraa & Yutian Chen & Jérôme François - e2070 Advanced security management
by Carol Fung & Jérôme François & Weverton Cordeiro & Mohamed Faten Zhani
March 2019, Volume 29, Issue 2
- e2052 Highly efficient optical aggregation network with network functions virtualization
by Takashi Miyamura & Akira Misawa & Jun‐ichi Kani - e2056 A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier
by Rodérick Fanou & Victor Sanchez‐Agüero & Francisco Valera & Michuki Mwangi & Jane Coffin - e2059 Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems
by Emmanouil Vasilomanolakis & Max Mühlhäuser - e2060 A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
by Huru Hasanova & Ui‐jun Baek & Mu‐gon Shin & Kyunghee Cho & Myung‐Sup Kim - e2062 An approach for provisioning virtual sensors in sensor clouds
by Marcus Lemos & Ricardo Rabelo & Douglas Mendes & Carlos Carvalho & Raimir Holanda - e2066 Resource availability–aware adaptive provisioning of virtual data center networks
by Malayam Parambath Gilesh & S D Madhu Kumar & Lillykutty Jacob
January 2019, Volume 29, Issue 1
- e2042 DDoS protection with stateful software‐defined networking
by Filippo Rebecchi & Julien Boite & Pierre‐Alexis Nardin & Mathieu Bouet & Vania Conan - e2043 Smashing OpenFlow's “atomic” actions: Programmable data plane packet manipulation in hardware
by Salvatore Pontarelli & Marco Bonola & Giuseppe Bianchi - e2045 Optimal management of reusable functional blocks in 5G superfluid networks
by Luca Chiaraviglio & Lavinia Amorosi & Nicola Blefari‐Melazzi & Paolo Dell'Olmo & Mohammad Shojafar & Stefano Salsano - e2048 IEEE NetSoft 2017 special issue: Softwarization sustaining a hyper‐connected world: En route to 5G
by Franco Callegati & Walter Cerroni - e2051 Intent‐based service management for heterogeneous software‐defined infrastructure domains
by Gianluca Davoli & Walter Cerroni & Slavica Tomovic & Chiara Buratti & Chiara Contoli & Franco Callegati
November 2018, Volume 28, Issue 6
- e2024 PlaySharing: A group synchronization scheme for media streaming services in hierarchical WLANs
by Dongwoo Kwon & Hyeonwoo Kim & Hongtaek Ju - e2036 Orchestrator conversation: Distributed management of cloud applications
by Merlijn Sebrechts & Gregory Van Seghbroeck & Tim Wauters & Bruno Volckaert & Filip De Turck - e2037 New fluid approaches for studying the performance of elastic traffic under class based weighed fair queuing system
by Mohamed El Hedi Boussada & Jean Marie Garcia & Mounir Frikha - e2039 Botnet detection based on network flow summary and deep learning
by Abdurrahman Pektaş & Tankut Acarman - e2040 Sensitivity analysis of an availability model for disaster tolerant cloud computing system
by Bruno Silva & Rubens Matos & Eduardo Tavares & Paulo Maciel & Armin Zimmermann - e2041 A bottom‐up design for spatial search in large networks and clouds
by Misbah Uddin & Rolf Stadler & Alexander Clemm - e2044 On the design and performance evaluation of automatic traffic report generation systems with huge data volumes
by Carlos Vega Moreno & Eduardo Miravalls Sierra & Guillermo Julián Moreno & Jorge E. López de Vergara & Eduardo Magaña & Javier Aracil - e2046 Clustering‐based quality selection heuristics for HTTP adaptive streaming over cache networks
by Jeroen van der Hooft & Niels Bouten & Danny De Vleeschauwer & Werner Van Leekwijck & Tim Wauters & Steven Latré & Filip De Turck
September 2018, Volume 28, Issue 5
- e2025 A feature extraction method for predictive maintenance with time‐lagged correlation–based curve‐registration model
by Shouli Zhang & Chen Liu & Shen Su & Yanbo Han & XiaoHong Li - e2032 Special issue on management of IoT
by Jorge Sá Silva & António Loureiro & Antonio Skarmeta & Fernando Boavida - e2033 PYGRID: A software development and assessment framework for grid‐aware software defined networking
by Mohamed Samir & Mohamed Azab & Mohamed R. M. Rizk & Nayera Sadek