


default search action
International Journal of Network Management, Volume 34
Volume 34, Number 1, January/February 2024
RESEARCH ARTICLES
- Vankadhara Rajyalakshmi, Kuruva Lakshmanna
:
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm. - Shengyi Yang
, Shaoying Zhu:
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning. - Kyungchan Ko
, Taeyeol Jeong
, Jongsoo Woo
, James Won-Ki Hong
:
Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges. - Ziyu Qiu, Zhilei Zhou, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files.
Volume 34, Number 2, March/April 2024
RESEARCH ARTICLES
- Kengo Arakawa, Eiji Oki
:
Availability-aware virtual network function placement based on multidimensional universal generating functions. - Anan Jin
, Yuhang Ye, Brian Lee, Yuansong Qiao
:
Topology analysis of the Ripple transaction network. - Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane:
A comprehensive review of blockchain integration in remote patient monitoring for E-health. - Udit Agarwal
, Vinay Rishiwal
, Sudeep Tanwar
, Mano Yadav:
Blockchain and crypto forensics: Investigating crypto frauds.
Volume 34, Number 3, May/June 2024
RESEARCH ARTICLES
- V. Karthik
, R. Lakshmi, Salini Abraham, M. Ramkumar
:
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network. - Kavi Priya Dhandapani
, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen
:
A novel eviction policy based on shortest remaining time for software defined networking flow tables. - Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad
, Johari Abdullah:
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network. - Aeri Kim
, Meryam Essaid, Sejin Park, Hongtaek Ju
:
Reducing the propagation delay of compact block in Bitcoin network.
Volume 34, Number 4, July/August 2024
Editorial
- James Won-Ki Hong, Andreas G. Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang:
Innovations in Blockchain for Crypto Assets and Exchanges.
Special Issue Paper
- Wonseok Choi, Jongsoo Woo, James Won-Ki Hong
:
Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges. - Shange Fu, Qin Wang
, Jiangshan Yu, Shiping Chen:
Leveraging Ponzi-like designs in stablecoins. - Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel
, Jürgen Döllner, Markus Bick:
Athena: Smart order routing on centralized crypto exchanges using a unified order book. - Srisht Fateh Singh
, Panagiotis Michalopoulos, Andreas G. Veneris:
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity.
Volume 34, Number 5, September/October 2024
Editorial
- Laura Ricci, Moayad Aloqaily, Vinayaka Pandit:
Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 "Advancing Blockchain and Cryptocurrency".
Special Issue Paper
- Jack Nicholls
, Aditya Kuppa, Nhien-An Le-Khac
:
The next phase of identifying illicit activity in Bitcoin. - Novak Boskov
, Xingyu Chen, Sevval Simsek, Ari Trachtenberg, David Starobinski:
Out-of-band transaction pool sync for large dynamic blockchain networks. - Jens Leth Hougaard, Mohsen Pourpouneh
, Haiting Han:
Transaction fee mechanisms with farsighted miners. - F. Javier Fernández-Bravo Peñuela
, Jordi Arjona Aroca, Francesc D. Muñoz-Escoí
, Yuriy Yatsyk Gravrylyak, Ismael Illán García, José M. Bernabéu-Aubán:
DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases. - Suvam Basak
, Satish Narayana Srirama
:
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA. - Ali Alqahtani, Surbhi Bhatia Khan:
An optimal hybrid cascade regional convolutional network for cyberattack detection.
Research Article
- Wesley dos Reis Bezerra
, Fernando Koch, Carlos Becker Westphall:
Performance of security options for message protocols: A comparative analysis. - S. Vidhya
, P. M. Siva Raja, R. P. Sumithra:
Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy.
Volume 34, Number 6, November/December 2024
Editorial
- Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Security, Privacy, and Trust Management on Decentralized Systems and Networks.
Special Issue Paper
- Xiangyu Cao
, Zhengjun Jing
, Xiaorong Zhao, Xiaolong Xu:
A security-enhanced equipment predictive maintenance solution for the ETO manufacturing. - Qiuhua Wang, Chuangchuang Li, Dong Wang, Lifeng Yuan, Gaoning Pan, Yanyu Cheng, Mingde Hu, Yizhi Ren:
IGXSS: XSS payload detection model based on inductive GCN. - Chao Zhang, Jinmei Zhang, Lijun Yun, Jun Zhang, Junbo Su:
Privacy-protected object detection through trustworthy image fusion. - Kayalvizhi Manikandan, Ramamoorthy Sriramulu:
ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles. - Xinyang Li
, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang:
Privacy-preserving data aggregation achieving completeness of data queries in smart grid. - Shubh Mittal, Tisha Chawla
, Saifur Rahman
, Shantanu Pal
, Chandan K. Karmakar
:
A secure and light-weight patient survival prediction in Internet of Medical Things framework. - Dongying Gao, Caiwei Guo, Yi Zhang, Wen Ji, Zhilei Lv, Zheng Li, Kunsan Zhang, Ruibin Lin:
Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning.
Research Article
- Renya Nath N, Hiran V. Nath:
A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks. - Chandra Umakantham Om Kumar
, Suguna Marappan
, Bhavadharini Murugeshan
, P. Mercy Rajaselvi Beaulah
:
Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture-Fully Convolutional Variational Autoencoder Model. - C. H. Sarada Devi
, R. Anand, R. Hemalatha, B. Uma Maheswari:
Duo-H: An Effectual Consensus Algorithm Using Two-Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection. - Chunhua Jin, Zhiwei Chen, Wenyu Qin, Kaijun Sun, Guanhua Chen, Liqing Chen:
A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV. - Yifan Liu, Heng Zhang, Yang Zhou, Kai Qi, Qingxiang Li:
Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.