![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Network and Systems Management, Volume 33
Volume 33, Number 1, March 2025
- Stelios Prekas, Panagiotis Trakadas, Panagiotis Karkazis:
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework. 1 - Mohammed Tarek Abdelaziz, Abdelrahman Radwan, Hesham Mamdouh, Adel Saeed Saad, Abdulrahman Salem Abuzaid, Ahmed Ayman AbdElhakeem, Salma Zakzouk, Kareem Moussa, M. Saeed Darweesh:
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance. 2 - Oleg Kolosov, Gala Yadgar, David Breitgand, Dean H. Lorenz:
PASE: Pro-active Service Embedding in The Mobile Edge. 3 - Sudha Dubba, Balaprakasa Rao Killi:
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling. 4 - Hatem Algabroun, Lars Håkansson:
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring. 5 - Jia Hao, Yang Chen, Jianhou Gan:
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment. 6 - Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval. 7 - Ali Alfatemi, Mohamed Rahouti, D. Frank Hsu, Christina Schweikert, Nasir Ghani, Aiman Solyman, Mohammad Iqbal Saryuddin Assaqty:
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis. 8 - Arezoo Ghasemi:
A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment. 9 - Müge Erel-Özçevik:
Token as a Service for Software-Defined Zero Trust Networking. 10 - Lancan Yu, Jianting Yuan, Jin Zheng, Nan Yang:
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency. 11 - Wilson Souza, Marco Itaborahy, Gabriel Polvani, Andre Flaiban, José Carlos Marinello, Taufik Abrão:
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization. 12 - Gyeong Ho Lee, Jaeseob Han:
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection. 13 - Gourish Goudar, R. Muralishankar:
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks. 14 - Vandirleya Barbosa, Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Paulo Pereira, Paulo Maciel, Tuan Anh Nguyen, Francisco Airton Silva:
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures. 15 - Xinhao Wan, Gang Xue, Yiming Zhong, Zhicheng Wang:
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion. 16 - Weiran Wang, Heng Yang
, Shanshan Li
, Xue Liu, Zhaojun Wan:
Adaptive UE Handover Management with MAR-Aided Multivariate DQN in Ultra-Dense Networks. 17 - ChengJun Guo:
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring. 18 - Bollu Priyanka, Banavath Balaji Naik, Thandava Purandeswar Reddy:
Energy and Cost Aware Workflow Offloading Using Quantum Inspired Differential Evolution in the Cloud Environments. 19 - Sarra Cherfi, Ali Lemouari, Ammar Boulaiche:
MLP-Based Intrusion Detection for Securing IoT Networks. 20 - Alberto Robles Enciso, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Antonio F. Skarmeta-Gómez:
Dynamic Multi-Method Allocation for Intent-based Security Orchestration. 21
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.