


default search action
Journal of Network and Systems Management, Volume 33
Volume 33, Number 1, March 2025
- Stelios Prekas, Panagiotis Trakadas, Panagiotis Karkazis:
Correction: Path Enumeration Solution for Evaluating Reliability, Based on the Path Algebra Framework. 1 - Mohammed Tarek Abdelaziz, Abdelrahman Radwan, Hesham Mamdouh, Adel Saeed Saad, Abdulrahman Salem Abuzaid, Ahmed Ayman AbdElhakeem, Salma Zakzouk, Kareem Moussa, M. Saeed Darweesh:
Enhancing Network Threat Detection with Random Forest-Based NIDS and Permutation Feature Importance. 2 - Oleg Kolosov, Gala Yadgar, David Breitgand, Dean H. Lorenz:
PASE: Pro-active Service Embedding in The Mobile Edge. 3 - Sudha Dubba, Balaprakasa Rao Killi:
Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling. 4 - Hatem Algabroun, Lars Håkansson:
Parametric Machine Learning-Based Adaptive Sampling Algorithm for Efficient IoT Data Collection in Environmental Monitoring. 5 - Jia Hao, Yang Chen, Jianhou Gan:
QoS-Aware Augmented Reality Task Offloading and Resource Allocation in Cloud-Edge Collaboration Environment. 6 - Abdollah Jabbari, Carol J. Fung:
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval. 7 - Ali Alfatemi
, Mohamed Rahouti, D. Frank Hsu, Christina Schweikert, Nasir Ghani, Aiman Solyman, Mohammad Iqbal Saryuddin Assaqty:
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis. 8 - Arezoo Ghasemi
:
A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment. 9 - Müge Erel-Özçevik:
Token as a Service for Software-Defined Zero Trust Networking. 10 - Lancan Yu, Jianting Yuan, Jin Zheng, Nan Yang:
A Model of Encrypted Network Traffic Classification that Trades Off Accuracy and Efficiency. 11 - Wilson Souza, Marco Itaborahy, Gabriel Polvani, Andre Flaiban, José Carlos Marinello, Taufik Abrão
:
RIS-Aided Massive MIMO Performance-Complexity Trade-off Optimization. 12 - Gyeong Ho Lee, Jaeseob Han:
An Edge-Based Intelligent IoT Control System: Achieving Energy Efficiency with Secure Real-Time Incident Detection. 13 - Gourish Goudar, R. Muralishankar:
Optimal Joint Scheduling and Congestion Window Estimation for Congestion Avoidance in Mobile Opportunistic Networks. 14 - Vandirleya Barbosa, Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Paulo Pereira, Paulo Maciel, Tuan Anh Nguyen, Francisco Airton Silva:
Performance Evaluation of IoT-Based Industrial Automation Using Edge, Fog, and Cloud Architectures. 15 - Xinhao Wan, Gang Xue, Yiming Zhong, Zhicheng Wang:
Separating Prediction and Explanation: An Approach Based on Explainable Artificial Intelligence for Analyzing Network Intrusion. 16 - Weiran Wang, Heng Yang
, Shanshan Li
, Xue Liu, Zhaojun Wan:
Adaptive UE Handover Management with MAR-Aided Multivariate DQN in Ultra-Dense Networks. 17 - ChengJun Guo:
Advanced Intelligent Routing Protocol for Energy-Aware Wireless Sensor Networks with Advanced Mobile Sink Monitoring. 18 - Bollu Priyanka, Banavath Balaji Naik, Thandava Purandeswar Reddy:
Energy and Cost Aware Workflow Offloading Using Quantum Inspired Differential Evolution in the Cloud Environments. 19 - Sarra Cherfi, Ali Lemouari, Ammar Boulaiche
:
MLP-Based Intrusion Detection for Securing IoT Networks. 20 - Alberto Robles Enciso, José Manuel Bernabé Murcia, Alejandro Molina Zarca, Antonio F. Skarmeta-Gómez:
Dynamic Multi-Method Allocation for Intent-based Security Orchestration. 21
Volume 33, Number 2, April 2025
- Thiago Valentim Bezerra
, Gustavo Callou, Cleunio França, Eduardo Tavares:
Correction: Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach. 22 - Ghattas Akkad, Elie Inaty, Jad Abou Chaaya
, Martin Maier:
FL-DBA: Fuzzy Logic Based Dynamic Bandwidth Allocation Algorithm for Next Generation Passive Optical Network. 24 - Miao Liu, Longxi Liu, Di Xu, Li Zhang:
Cognitive IoT Collusion SSDF Attack Detection Based on FP-Growth Algorithm. 25 - Bipal Khanal, Chandan Kumar, Md. Sarfaraj Alam Ansari:
Real-Time Anomaly Detection Framework to Mitigate Emerging Threats in Software Defined Networks. 26 - Negar Mohammadi-Koushki
, Ibrahim El-Shekeil
, Krishna Kant:
ConfExp: Root-Cause Analysis of Service Misconfigurations in Enterprise Systems. 27 - Nabil Nissar
, Najib Naja, Abdellah Jamali:
Cost-Sensitive Detection of DoS Attacks in Automotive Cybersecurity Using Artificial Neural Networks and CatBoost. 28 - Tran-Tuan Chu, Mohamed Aymen Labiod
, Brice Augustin, Kajanan Mathialahan, Abdelhamid Mellouk:
Empirical Evaluation of QUIC-Based Software-Defined Service Migration in Multi-access Edge Computing Over 5G Networks. 29 - Yeong-Jun Seok, Ju-Bong Kim, Youn-Hee Han, Hyun-Kyo Lim, Chankyun Lee, Wonhyuk Lee:
Deep Reinforcement Learning-Driven Optimization of End-to-End Key Provision in QKD Systems. 30 - Hamidullah Riaz, Sitki Öztürk, Sultan Aldirmaz Çolak, Ali Çalhan:
A Handover Decision Optimization Method Based on Data-Driven MLP in 5G Ultra-Dense Small Cell HetNets. 31 - Mujahid Muhammad, Ghazanfar Ali Safdar:
PV+TESLA: A Secure Integrated Approach to Reduce Message Verification Delay in V2V Networks. 32 - Keyuan Qiu, Yingjie Zhang, Yiqiang Feng
, Feng Chen:
LogAnomEX: An Unsupervised Log Anomaly Detection Method Based on Electra-DP and Gated Bilinear Neural Networks. 33 - Mohammed Belkheir, Mehdi Rouissat, Allel Mokaddem, Djamila Ziani, Pascal Lorenz:
Lightweight Novel Approach for Collaborative Packet-Based Mitigation of Blackhole Attacks in RPL-Based IoT. 34 - Jonas Vasconcelos Bistene
, Anderson Fernandes Pereira dos Santos, Clayton Escouper das Chagas
, Ronaldo Moreira Salles
:
Modeling Network Traffic Generators for Cyber Ranges: A Systematic Literature Review. 35 - Andrea Augello, Alessandra De Paola, Giuseppe Lo Re:
Hybrid Multilevel Detection of Mobile Devices Malware Under Concept Drift. 36 - Valentin Stangaciu
, Cristina Stangaciu, Bianca Gusita
, Daniel-Ioan Curiac:
Integrating Real-Time Wireless Sensor Networks into IoT Using MQTT-SN. 37 - Jonatas Adilson Marques, Kirill Levchenko, Rafael R. Obelheiro, Ricardo Parizotto, Luciano Paschoal Gaspary:
Balancing Act: Navigating Control and Data Plane Responsibilities for Fast Operation in Programmable Networks. 38 - Özge Satir Akpunar, Sener Akpinar:
A Novel Mathematical Model with Fairness Constraints for Uninterrupted Network Coverage in Disasters. 39 - C. Prajisha, A. R. Vasudevan:
MSecTrust: A Mobility-Aware Secure Trust-Based Routing Protocol for RPL Based Internet of Things. 40 - Rehab H. Serag, Mohamed S. Abdalzaher
, Hussein Abd El Atty Elsayed, M. Sobh:
Software Defined Network Traffic Classification for QoS Optimization Using Machine Learning. 41 - Özlem Sabuncu
, Bülent Bilgehan
:
Novel Statistical Modelling and Optimization Techniques of Fading Channel Coefficients for 5G Network Performance. 42 - Subhas Kumar Ghosh
, Vijay Monic Vittamsetti
:
Distributed Maximum Utility Task Offloading for Delay-Sensitive IoT Applications in Cloud and Edge Computing. 43 - MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer). 44 - Lhoussaine Daoudi, Hamid Garmani, Mohamed Baslam:
Impact of Irrational Users in a Cognitive Radio Network Game: Spectrum Market Stability Analysis. 45 - Shatakshi Singh, Umashankar Samal:
Insights and Trends in Open RAN: The Future of Mobile Networks. 46 - N. A. Bharathi, Ranjani Parthasarathi, V. Vetriselvi:
Defending Against Multifaceted Network Attacks: A Multi-Label Meta-Learning and Lorenz Chaos MTD based Security Paradigm. 47

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.