![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IEEE Transactions on Network and Service Management, Volume 18
Volume 18, Number 1, March 2021
- Filip De Turck:
2020 Reviewers for IEEE Transactions on Network and Service Management (TNSM). 4-19 - Wolfgang Kellerer
, Giovanni Schembra
, Jinho Hwang
, Noriaki Kamiyama
, Joon-Myung Kang
, Barbara Martini, Rafael Pasquini
, Dimitrios Pezaros
, Hongke Zhang
, Mohamed Faten Zhani
, Thomas Zinner
:
Guest Editors Introduction: Special Issue on Advanced Management of Softwarized Networks. 20-29 - Tianzhu Zhang
, Han Qiu
, Leonardo Linguaglossa
, Walter Cerroni
, Paolo Giaccone
:
NFV Platforms: Taxonomy, Design Choices and Future Challenges. 30-48 - Mohammed Chahbar, Gladys Diaz
, Abdulhalim Dandoush
, Christophe Cérin
, Kamal Ghoumid
:
A Comprehensive Survey on the E2E 5G Network Slicing Model. 49-62 - Tejas Subramanya
, Roberto Riggio
:
Centralized and Federated Learning for Predictive VNF Autoscaling in Multi-Domain 5G Networks and Beyond. 63-78 - Quang-Trung Luu
, Sylvaine Kerboeuf
, Michel Kieffer
:
Uncertainty-Aware Resource Provisioning for Network Slicing. 79-93 - Dyego H. L. Oliveira, Thelmo P. de Araújo, Rafael L. Gomes
:
An Adaptive Forecasting Model for Slice Allocation in Softwarized Networks. 94-103 - Masahiro Sasabe
, Takanori Hara
:
Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks. 104-117 - Lei Wang
, Weixi Mao
, Jin Zhao
, Yuedong Xu
:
DDQP: A Double Deep Q-Learning Approach to Online Fault-Tolerant SFC Placement. 118-132 - Sebastiano Miano
, Fulvio Risso
, Mauricio Vásquez Bernal, Matteo Bertrone, Yunsong Lu:
A Framework for eBPF-Based Network Functions in an Era of Microservices. 133-151 - Flavio Esposito, Maria Mushtaq, Michele Berno, Gianluca Davoli, Davide Borsatti, Walter Cerroni, Michele Rossi:
Necklace: An Architecture for Distributed and Robust Service Function Chains With Guarantees. 152-166 - Lanlan Rui
, Xushan Chen
, Zhipeng Gao, Wenjing Li
, Xuesong Qiu
, Luoming Meng
:
Petri Net-Based Reliability Assessment and Migration Optimization Strategy of SFC. 167-181 - Meng Wang
, Bo Cheng
, Shangguang Wang
, Junliang Chen:
Availability- and Traffic-Aware Placement of Parallelized SFC in Data Center Networks. 182-194 - Sihao Xie
, Junte Ma
, Jin Zhao
:
FlexChain: Bridging Parallelism and Placement for Service Function Chains. 195-208 - Angelos Pentelas
, George Papathanail
, Ioakeim Fotoglou
, Panagiotis Papadimitriou
:
Network Service Embedding Across Multiple Resource Dimensions. 209-223 - Simeng Bian, Xi Huang
, Ziyu Shao
, Xin Gao
, Yang Yang
:
Service Chain Composition With Resource Failures in NFV Systems: A Game-Theoretic Perspective. 224-239 - Ying Wang
, Leyi Zhang, Peng Yu
, Ke Chen
, Xuesong Qiu
, Luoming Meng
, Michel Kadoch
, Mohamed Cheriet
:
Reliability-Oriented and Resource-Efficient Service Function Chain Construction and Backup. 240-257 - Mario Di Mauro
, Giovanni Galatro
, Maurizio Longo
, Fabio Postiglione
, Marco Tambasco:
Comparative Performability Assessment of SFCs: The Case of Containerized IP Multimedia Subsystem. 258-272 - Jiayi Liu
, Bowen Zhao, Menghan Shao
, Qinghai Yang
, Gwendal Simon
:
Provisioning Optimization for Determining and Embedding 5G End-to-End Information Centric Network Slice. 273-285 - Ali Muhammad
, Ibrahim Sorkhoh
, Long Qu
, Chadi Assi
:
Delay-Sensitive Multi-Source Multicast Resource Optimization in NFV-Enabled Networks: A Column Generation Approach. 286-300 - Dorabella Santos
, Teresa Gomes
, David Tipper
:
SDN Controller Placement With Availability Upgrade Under Delay and Geodiversity Constraints. 301-314 - Xi Huang
, Yinxu Tang, Ziyu Shao
, Yang Yang
, Hong Xu
:
Joint Switch-Controller Association and Control Devolution for SDN Systems: An Integrated Online Perspective of Control and Learning. 315-330 - Zohaib Latif
, Kashif Sharif
, Fan Li
, Md. Monjurul Karim
, Sujit Biswas
, Madiha Shahzad
, Saraju P. Mohanty
:
DOLPHIN: Dynamically Optimized and Load Balanced Path for Inter-Domain SDN Communication. 331-346 - Yang Zhang
, Jean Tourrilhes, Zhi-Li Zhang
, Puneet Sharma:
Improving SD-WAN Resilience: From Vertical Handoff to WAN-Aware MPTCP. 347-361 - Müge Erel Ozcevik
, Berk Canberk
:
OFaaS: OpenFlow Switch as a Service for Multi Tenant Slicing in SD-CDN. 362-373 - André Luiz R. Madureira
, Francisco Renato Cavalcante Araújo
, Guilherme B. Araújo
, Leobino Nascimento Sampaio
:
NDN Fabric: Where the Software-Defined Networking Meets the Content-Centric Model. 374-387 - Jiarui Xu, Sihao Xie
, Jin Zhao
:
P4Neighbor: Efficient Link Failure Recovery With Programmable Switches. 388-401 - Andrea Melis
, Siamak Layeghy
, Davide Berardi
, Marius Portmann
, Marco Prandini
, Franco Callegati
:
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane. 402-414 - Jonathan Vestin
, Andreas Kassler
, Sándor Laki
, Gergely Pongrácz
:
Toward In-Network Event Detection and Filtering for Publish/Subscribe Communication Using Programmable Data Planes. 415-428 - Yuhan Xue
, Zuqing Zhu
:
Hybrid Flow Table Installation: Optimizing Remote Placements of Flow Tables on Servers to Enhance PDP Switches for In-Network Computing. 429-440 - Jason Schnitzer
, Prasanth Prahladan, Parisa Rahimzadeh
, Chad Humble, Jinsung Lee
, Jihoon Lee, Kyunghan Lee
, Sangtae Ha
:
Toward Programmable DOCSIS 4.0 Networks: Adaptive Modulation in OFDM Channels. 441-455 - Luis Díez, Cristina Hervella
, Ramón Agüero
:
Understanding the Performance of Flexible Functional Split in 5G vRAN Controllers: A Markov Chain-Based Model. 456-468 - Robert Schmidt
, Navid Nikaein
:
RAN Engine: Service-Oriented RAN Through Containerized Micro-Services. 469-481 - Nikos Makris
, Christos Zarafetas, Alexandros Valantasis, Thanasis Korakis:
Service Orchestration Over Wireless Network Slices: Testbed Setup and Integration. 482-497 - Haonan Tong
, Tao Wang
, Yujiao Zhu
, Xuanlin Liu
, Sihua Wang
, Changchuan Yin
:
Mobility-Aware Seamless Handover With MPTCP in Software-Defined HetNets. 498-510 - Nabeel Akhtar
, Ibrahim Matta
, Ali Raza
, Leonardo Goratti, Torsten Braun
, Flavio Esposito
:
Managing Chains of Application Functions Over Multi-Technology Edge Networks. 511-525 - Chaofeng Zhang
, Mianxiong Dong
, Kaoru Ota
:
Deploying SDN Control in Internet of UAVs: Q-Learning-Based Edge Scheduling. 526-537 - Chuan Pham
, Duong Tuan Nguyen
, Nguyen Hoang Tran
, Kim Khoa Nguyen
, Mohamed Cheriet
:
Optimized IoT Service Chain Implementation in Edge Cloud Platform: A Deep Learning Framework. 538-551 - Alireza R. Erfanian
, Farzad Tashtarian
, Anatoliy Zabrovskiy, Christian Timmerer
, Hermann Hellwagner
:
OSCAR: On Optimizing Resource Utilization in Live Video Streaming. 552-569 - Ibtissam Labriji
, Francesca Meneghello
, Davide Cecchinato, Stefania Sesia, Eric Perraud, Emilio Calvanese Strinati
, Michele Rossi
:
Mobility Aware and Dynamic Migration of MEC Services for the Internet of Vehicles. 570-584 - Tingting Yuan
, Wilson da Rocha Neto, Christian Esteve Rothenberg
, Katia Obraczka
, Chadi Barakat
, Thierry Turletti
:
Dynamic Controller Assignment in Software Defined Internet of Vehicles Through Multi-Agent Deep Reinforcement Learning. 585-596 - Oliver Michel
, John Sonchack, Greg Cusack, Maziyar Nazari
, Eric Keller, Jonathan M. Smith:
Software Packet-Level Network Analytics at Cloud Scale. 597-610 - Pierpaolo Loreti
, Andrea Mayer, Paolo Lungaroni
, Francesco Lombardo
, Carmine Scarpitta
, Giulio Sidoretti
, Lorenzo Bracciale
, Marco Ferrari, Stefano Salsano
, Ahmed Abdelsalam, Rakesh Gandhi
, Clarence Filsfils:
SRv6-PM: A Cloud-Native Architecture for Performance Monitoring of SRv6 Networks. 611-626 - Jetmir Haxhibeqiri
, Pedro Heleno Isolani
, Johann M. Márquez-Barja
, Ingrid Moerman
, Jeroen Hoebeke
:
In-Band Network Monitoring Technique to Support SDN-Based Wireless Networks. 627-641 - Shadi Moazzeni
, Pratchaya Jaisudthi, Anderson Bravalheri, Navdeep Uniyal
, Xenofon Vasilakos
, Reza Nejabati
, Dimitra Simeonidou
:
A Novel Autonomous Profiling Method for the Next-Generation NFV Orchestrators. 642-655 - Shixiong Qi, Sameer G. Kulkarni
, K. K. Ramakrishnan
:
Assessing Container Network Interface Plugins: Functionality, Performance, and Scalability. 656-671 - Yoann Desmouceaux
, Marcel Enguehard, Thomas H. Clausen
:
Joint Monitorless Load-Balancing and Autoscaling for Zero-Wait-Time in Data Centers. 672-686 - Ryota Kawashima
:
Software Physical/Virtual Rx Queue Mapping Toward High-Performance Containerized Networking. 687-700 - Chun-I Fan
, Yu-Tse Shih, Jheng-Jia Huang
, Wan-Ru Chiu:
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. 701-712 - Daniele Bringhenti
, Guido Marchetto
, Riccardo Sisto
, Serena Spinoso
, Fulvio Valenza
, Jalolliddin Yusupov
:
Improving the Formal Verification of Reachability Policies in Virtualized Networks. 713-728 - Stefan Achleitner
, Quinn Burke
, Patrick D. McDaniel
, Trent Jaeger
, Thomas La Porta, Srikanth V. Krishnamurthy
:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. 729-744 - Nagarathna Ravi
, S. Mercy Shalinie
, Chhagan Lal
, Mauro Conti
:
AEGIS: Detection and Mitigation of TCP SYN Flood on SDN Controller. 745-759 - Abir Laraba
, Jérôme François
, Shihabur Rahman Chowdhury
, Isabelle Chrisment, Raouf Boutaba
:
Mitigating TCP Protocol Misuse With Programmable Data Planes. 760-774 - Nur Zincir-Heywood
, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Issue on Data Analytics and Machine Learning for Network and Service Management - Part II. 775-779 - Qing Wu
, Zhe Jiang
, Kewei Hong, Huazhong Liu
, Laurence T. Yang
, Jihong Ding
:
Tensor-Based Recurrent Neural Network and Multi-Modal Prediction With Its Applications in Traffic Network Management. 780-792 - Bingnan Hou
, Changsheng Hou, Tongqing Zhou
, Zhiping Cai
, Fang Liu:
Detection and Characterization of Network Anomalies in Large-Scale RTT Time Series. 793-806 - Ruchi Tripathi
, Ketan Rajawat
:
Adaptive Network Latency Prediction From Noisy Measurements. 807-821 - Tomás Jirsík
, Petr Velan
:
Host Behavior in Computer Network: One-Year Study. 822-838 - Andrian Putina
, Dario Rossi
:
Online Anomaly Detection Leveraging Stream-Based Clustering and Real-Time Telemetry. 839-854 - Aggelos Lazaris
, Viktor K. Prasanna
:
An LSTM Framework for Software-Defined Measurement. 855-869 - Daniela M. Casas-Velasco
, Oscar Maurício Caicedo Rendón
, Nelson L. S. da Fonseca
:
Intelligent Routing Based on Reinforcement Learning for Software-Defined Networking. 870-881 - Ao Yu
, Hui Yang
, Kim Khoa Nguyen
, Jie Zhang, Mohamed Cheriet
:
Burst Traffic Scheduling for Hybrid E/O Switching DCN: An Error Feedback Spiking Neural Network Approach. 882-893 - Aicha Dridi
, Chérifa Boucetta, Seif Eddine Hammami
, Hossam Afifi, Hassine Moungla
:
STAD: Spatio-Temporal Anomaly Detection Mechanism for Mobile Network Management. 894-906 - Giuseppe Aceto
, Giampaolo Bovenzi
, Domenico Ciuonzo
, Antonio Montieri
, Valerio Persico
, Antonio Pescapè
:
Characterization and Prediction of Mobile-App Traffic Using Markov Modeling. 907-925 - Yang Syu
, Chien-Min Wang
:
QoS Time Series Modeling and Forecasting for Web Services: A Comprehensive Survey. 926-944 - Riccardo Pinciroli
, Ahsan Ali
, Feng Yan, Evgenia Smirni
:
CEDULE+: Resource Management for Burstable Cloud Instances Using Predictive Analytics. 945-957 - László Toka, Gergely Dobreff, Balázs Fodor, Balázs Sonkoly
:
Machine Learning-Based Scaling Management for Kubernetes Edge Clusters. 958-972 - Hongfang Yu
, Zhenrong Chen, Gang Sun
, Xiaojiang Du
, Mohsen Guizani
:
Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network. 973-985 - Daniel Perdices
, Jorge E. López de Vergara
, Javier Ramos
:
Deep-FDA: Using Functional Data Analysis and Neural Networks to Characterize Network Services Time Series. 986-999 - Sohee Kim Park
, Arani Bhattacharya
, Zhibo Yang
, Samir R. Das
, Dimitris Samaras:
Mosaic: Advancing User Quality of Experience in 360-Degree Video Streaming With Machine Learning. 1000-1015 - Diego Madariaga
, Javier I. Madariaga, Martín Panza, Javier Bustos-Jiménez
, Benjamin Bustos
:
Detecting Anomalies at a TLD Name Server Based on DNS Traffic Predictions. 1016-1030 - Minzhao Lyu
, Hassan Habibi Gharakheili
, Craig Russell, Vijay Sivaraman
:
Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks. 1031-1048 - Haibo Bian
, Tim Bai
, Mohammad A. Salahuddin
, Noura Limam
, Abbas Abou Daya
, Raouf Boutaba
:
Uncovering Lateral Movement Using Authentication Logs. 1049-1063 - Ferenc Mogyorósi
, Alija Pasic
, Richard Cziva
, Péter Revisnyei
, Zsolt Kenesi, János Tapolcai
:
Adaptive Protection of Scientific Backbone Networks Using Machine Learning. 1064-1076 - Pratik Satam
, Salim Hariri
:
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol. 1077-1091 - Adrien Hemmer
, Mohamed Abderrahim
, Rémi Badonnel
, Jérôme François
, Isabelle Chrisment:
Comparative Assessment of Process Mining for Supporting IoT Predictive Security. 1092-1103 - Darshana Upadhyay
, Jaume Manero
, Marzia Zaman, Srinivas Sampalli
:
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids. 1104-1116
Volume 18, Number 2, June 2021
- Rémi Badonnel
, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. 1120-1124 - Camila F. T. Pontes
, Manuela M. C. de Souza
, João J. C. Gondim
, Matt Bishop, Marcelo Antonio Marotta
:
A New Method for Flow-Based Network Intrusion Detection Using the Inverse Potts Model. 1125-1136 - Ilias Siniosoglou
, Panagiotis I. Radoglou-Grammatikis
, Georgios Efstathopoulos, Panagiotis E. Fouliras
, Panagiotis G. Sarigiannidis
:
A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments. 1137-1151 - Duc C. Le
, Nur Zincir-Heywood
:
Anomaly Detection for Insider Threats Using Unsupervised Ensembles. 1152-1164 - Mirabelle Dib
, Sadegh Torabi
, Elias Bou-Harb
, Chadi Assi
:
A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution. 1165-1177 - Andrea Agiollo
, Mauro Conti
, Pallavi Kaliyar
, Tsung-Nan Lin
, Luca Pajola
:
DETONAR: Detection of Routing Attacks in RPL-Based IoT. 1178-1190 - Damu Ding
, Marco Savi
, Federico Pederzolli
, Mauro Campanella, Domenico Siracusa
:
In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches. 1191-1202 - Naotake Ishikura, Daishi Kondo
, Vassilis Vassiliades
, Iordan Iordanov, Hideki Tode:
DNS Tunneling Detection by Cache-Property-Aware Features. 1203-1217 - Tal Shapira
, Yuval Shavitt
:
FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification. 1218-1232 - Thomas Favale
, Martino Trevisan
, Idilio Drago
, Marco Mellia
:
α-MON: Traffic Anonymizer for Passive Monitoring. 1233-1245 - Weifeng Lu, Zhihao Ren, Jia Xu
, Siguang Chen:
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid. 1246-1259 - Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
, Issa Traoré
:
Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure. 1260-1274 - Loïc D. Tsobdjou
, Samuel Pierre, Alejandro Quintero
:
A New Mutual Authentication and Key Agreement Protocol for Mobile Client - Server Environment. 1275-1286 - Qiang Wu
, Chunming Wu
, Xincheng Yan
, Qiumei Cheng
:
Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing. 1287-1304 - Lucas Miranda, Daniel Vieira, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché
, Miguel Angelo Bicudo
, Mateus Schulz Nogueira
, Matheus Martins, Leonardo Ventura, Lucas Senos, Enrico Lovat:
On the Flow of Software Security Advisories. 1305-1320 - Aimad Berady
, Mathieu Jaume
, Valérie Viet Triem Tong
, Gilles Guette:
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting. 1321-1333 - Álvaro Feal
, Pelayo Vallina
, Julien Gamba
, Sergio Pastrana
, Antonio Nappa
, Oliver Hohlfeld, Narseo Vallina-Rodriguez
, Juan Tapiador
:
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting. 1334-1349 - Christian Jacquenet
:
Optimized, Automated, and Protective: An Operator's View on Future Networks. 1350-1359 - Nemanja Deric
, Amir Varasteh
, Amaury Van Bemten
, Andreas Blenk
, Wolfgang Kellerer
:
Enabling SDN Hypervisor Provisioning Through Accurate CPU Utilization Prediction. 1360-1374 - Yi-Cheng Chang, Hsin-Tsung Lin, Hung-Mao Chu, Pi-Chung Wang
:
Efficient Topology Discovery for Software-Defined Networks. 1375-1388 - Petra Vizarreta
, Christian Sieber, Andreas Blenk
, Amaury Van Bemten
, Vinod Ramachandra
, Wolfgang Kellerer
, Carmen Mas Machuca
, Kishor S. Trivedi
:
ARES: A Framework for Management of Aging and Rejuvenation in Softwarized Networks. 1389-1400 - Pablo Fondo-Ferreiro
, Felipe J. Gil-Castiñeira
, Francisco Javier González-Castaño
, David Candal-Ventureira
:
A Software-Defined Networking Solution for Transparent Session and Service Continuity in Dynamic Multi-Access Edge Computing. 1401-1414 - Guiyan Liu
, Songtao Guo
, Baochun Li
, Chao Chen
:
Joint Traffic-Aware Consolidated Middleboxes Selection and Routing in Distributed SDNs. 1415-1429 - A. H. M. Jakaria
, Mohammad Ashiqur Rahman
, Aniruddha Gokhale
:
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model. 1430-1444 - Marco Polverini
, Jaime Galán-Jiménez
, Francesco Giacinto Lavacca
, Antonio Cianfrani
, Vincenzo Eramo
:
A Scalable and Offloading-Based Traffic Classification Solution in NFV/SDN Network Architectures. 1445-1460 - Gitanjali Chandwani
, Sadananda Behera
, Goutam Das:
Delay-Aware Control Plane Virtual Topology Design of Software Defined-Elastic Optical Network. 1461-1475 - Stanislav Lange
, Nguyen Van Tu
, Seyeon Jeong, Doyoung Lee
, Heegon Kim, Jibum Hong
, Jae-Hyoung Yoo, James Won-Ki Hong
:
A Network Intelligence Architecture for Efficient VNF Lifecycle Management. 1476-1490 - Prabhu Kaliyammal Thiruvasagam
, Abhishek Chakraborty
, Abin Mathew
, C. Siva Ram Murthy
:
Reliable Placement of Service Function Chains and Virtual Monitoring Functions With Minimal Cost in Softwarized 5G Networks. 1491-1507 - Yi Yue
, Bo Cheng
, Xuan Liu
, Meng Wang
, Biyi Li
, Junliang Chen:
Resource Optimization and Delay Guarantee Virtual Network Function Placement for Mapping SFC Requests in Cloud Networks. 1508-1523 - Amir Varasteh
, Basavaraj Madiwalar, Amaury Van Bemten
, Wolfgang Kellerer
, Carmen Mas Machuca
:
Holu: Power-Aware and Delay-Constrained VNF Placement and Chaining. 1524-1539 - Jun Cai, Zhongwei Huang
, Liping Liao
, Jianzhen Luo
, Waixi Liu
:
APPM: Adaptive Parallel Processing Mechanism for Service Function Chains. 1540-1555 - Rui Kang
, Fujun He
, Takehiro Sato
, Eiji Oki
:
Virtual Network Function Allocation to Maximize Continuous Available Time of Service Function Chains With Availability Schedule. 1556-1570 - Avi Mizrahi
, Ori Rottenstreich
:
Blockchain State Sharding With Space-Aware Representations. 1571-1583 - David Yakira, Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz
, Ori Rottenstreich
, Ronen Tamari
:
Helix: A Fair Blockchain Consensus Protocol Resistant to Ordering Manipulation. 1584-1597 - Muhammad Anas Imtiaz
, David Starobinski
, Ari Trachtenberg, Nabeel Younis
:
Churn in the Bitcoin Network. 1598-1615 - Kris Oosthoek
, Christian Doerr:
Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques. 1616-1628 - Junwei Liang
, Maode Ma
:
Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework. 1629-1645 - Guntur Dharma Putra
, Volkan Dedeoglu
, Salil S. Kanhere
, Raja Jurdak
, Aleksandar Ignjatovic
:
Trust-Based Blockchain Authorization for IoT. 1646-1658 - Bithin Alangot
, Daniël Reijsbergen, Sarad Venugopalan
, Pawel Szalachowski
, Kiat Seng Yeo
:
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains. 1659-1672 - Tianjian Dong
, Qi Qi
, Jingyu Wang
, Alex X. Liu
, Haifeng Sun
, Zirui Zhuang
, Jianxin Liao
:
Generative Adversarial Network-Based Transfer Reinforcement Learning for Routing With Prior Knowledge. 1673-1689 - Guobiao He
, Wei Su, Shuai Gao, Jiarui Yue, Sajal K. Das
:
ROAchain: Securing Route Origin Authorization With Blockchain for Inter-Domain Routing. 1690-1705 - Murat Karakus
, Evrim Guler
, Suleyman Uludag
:
QoSChain: Provisioning Inter-AS QoS in Software-Defined Networks With Blockchain. 1706-1717 - Muhammad Anas Imtiaz
, David Starobinski
, Ari Trachtenberg:
Investigating Orphan Transactions in the Bitcoin Network. 1718-1731 - Suzan Bayhan
, Setareh Maghsudi
, Anatolij Zubow:
EdgeDASH: Exploiting Network-Assisted Adaptive Video Streaming for Edge Caching. 1732-1745 - Qilin Fan
, Xiuhua Li
, Jian Li
, Qiang He
, Kai Wang
, Junhao Wen
:
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks. 1746-1757 - Jing Chen, Jia Chen, Hongke Zhang:
DRL-QOR: Deep Reinforcement Learning-Based QoS/QoE-Aware Adaptive Online Orchestration in NFV-Enabled Networks. 1758-1774 - Huan Yan, Haohao Fu, Yong Li
, Tzu-Heng Lin, Gang Wang
, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. 1775-1788 - Huan Yan, Tzu-Heng Lin, Ming Zeng
, Jing Wu, Yong Li
, Depeng Jin:
Discovering Usage Patterns of Mobile Video Service in the Cellular Networks. 1789-1802 - MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif
, Abdallah Shami
:
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection. 1803-1816 - Diogo Ferreira
, Andre Braga Reis
, Carlos R. Senna
, Susana Sargento
:
A Forecasting Approach to Improve Control and Management for 5G Networks. 1817-1831 - Sarah Wassermann, Thibaut Cuvelier
, Pavol Mulinka
, Pedro Casas
:
Adaptive and Reinforcement Learning Approaches for Online Network Monitoring and Analysis. 1832-1849 - Constantine Ayimba
, Paolo Casari
, Vincenzo Mancuso
:
SQLR: Short-Term Memory Q-Learning for Elastic Provisioning. 1850-1869 - Weibin Meng
, Ying Liu, Shenglin Zhang, Federico Zaiter, Yuzhe Zhang, Yuheng Huang, Zhaoyang Yu, Yuzhi Zhang, Lei Song, Ming Zhang, Dan Pei:
LogClass: Anomalous Log Identification and Classification With Partial Labels. 1870-1884 - Prashanth Krishnamurthy
, Farshad Khorrami
, Steve Schmidt
, Kevin Wright:
Machine Learning for NetFlow Anomaly Detection With Human-Readable Annotations. 1885-1898 - Lihai Nie
, Laiping Zhao
, Keqiu Li:
Robust Anomaly Detection Using Reconstructive Adversarial Network. 1899-1912 - Stefano Longari, Daniel Humberto Nova Valcarcel, Mattia Zago, Michele Carminati, Stefano Zanero:
CANnolo: An Anomaly Detection System Based on LSTM Autoencoders for Controller Area Network. 1913-1924 - Martin Boldt
, Selim Ickin
, Anton Borg
, Valentin Kulyk, Jörgen Gustafsson:
Alarm Prediction in Cellular Base Stations Using Data-Driven Methods. 1925-1933 - Francesco Musumeci
, Luca Magni, Omran Ayoub
, Roberto Rubino, Massimiliano Capacchione
, Gabriele Rigamonti, Michele Milano, Claudio Passera, Massimo Tornatore
:
Supervised and Semi-Supervised Learning for Failure Identification in Microwave Networks. 1934-1945 - Hoang Duy Trinh, Ángel Fernández Gambín, Lorenza Giupponi
, Michele Rossi
, Paolo Dini
:
Mobile Traffic Classification Through Physical Control Channel Fingerprinting: A Deep Learning Approach. 1946-1961 - Amir Mahdi Sadeghzadeh
, Saeed Shiravi
, Rasool Jalili
:
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification. 1962-1976 - Fan Wu
, Wang Yang
, Muhua Sun, Ju Ren
, Feng Lyu
:
Multi-Path Selection and Congestion Control for NDN: An Online Learning Approach. 1977-1989 - Omran Ayoub
, Amaro de Sousa
, Silvia Mendieta, Francesco Musumeci
, Massimo Tornatore
:
Online Virtual Machine Evacuation for Disaster Resilience in Inter-Data Center Networks. 1990-2001 - Renhai Xu
, Wenxin Li
, Keqiu Li, Xiaobo Zhou
, Heng Qi
:
Scheduling Mix-Coflows in Datacenter Networks. 2002-2015 - Hao Feng
, Yuhui Deng
, Xiao Qin
, Geyong Min
:
Criso: An Incremental Scalable and Cost-Effective Network Architecture for Data Centers. 2016-2029 - Songyuan Li
, Jiwei Huang
, Bo Cheng
:
A Price-Incentive Resource Auction Mechanism Balancing the Interests Between Users and Cloud Service Provider. 2030-2045 - Qin Liu
, Yu Peng
, Jie Wu
, Tian Wang
, Guojun Wang
:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. 2046-2062 - Germano Fenner
, Alberto Sampaio Lima
, José Neuman de Souza
, José Antão Beltrão Moura, Tárcio R. Bezerra:
Business-Driven Support for Infrastructure as a Service Capacity Management Through System Dynamics Simulations. 2063-2076 - Yu Xiang
, Hang Liu, Tian Lan
, H. Howie Huang
, Suresh Subramaniam
:
Optimizing Job Reliability Through Contention-Free, Distributed Checkpoint Scheduling. 2077-2088 - Jan Plachy
, Zdenek Becvar
, Emilio Calvanese Strinati
, Nicola di Pietro
:
Dynamic Allocation of Computing and Communication Resources in Multi-Access Edge Computing for Mobile Users. 2089-2106 - Faheem Zafari
, Kin K. Leung, Don Towsley
, Prithwish Basu, Ananthram Swami, Jian Li
:
Let's Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds. 2107-2122 - Siqi Huang
, Xueqing Huang
, Nirwan Ansari
:
Budget-Aware Video Crowdsourcing at the Cloud-Enhanced Mobile Edge. 2123-2137 - Jing Li
, Weifa Liang
, Yu Ma
:
Robust Service Provisioning With Service Function Chain Requirements in Mobile Edge Computing. 2138-2153 - Fengjun Zhao
, Ying Chen
, Yongchao Zhang
, Zhiyong Liu
, Xin Chen
:
Dynamic Offloading and Resource Scheduling for Mobile-Edge Computing With Energy Harvesting Devices. 2154-2165 - Claudio Cicconetti
, Marco Conti, Andrea Passarella
:
A Decentralized Framework for Serverless Edge Computing in the Internet of Things. 2166-2180 - Ali El-Amine
, Hussein Al Haj Hassan
, Loutfi Nuaymi:
Battery-Aware Green Cellular Networks Fed By Smart Grid and Renewable Energy. 2181-2192 - Ehsan Tohidi
, Saeedeh Parsaeefard
, Ali Akbar Hemmati
, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj
, Alberto Leon-Garcia
:
Distributed Controller-Switch Assignment in 5G Networks. 2193-2207 - Vincenzo Mancuso
, Paolo Castagno
, Matteo Sereno
, Marco Ajmone Marsan
:
Modeling MTC and HTC Radio Access in a Sliced 5G Base Station. 2208-2225 - Jasna Jankovic
, Zeljko Ilic
, Alma Oracevic
, S. M. Ahsan Kazmi
, Rasheed Hussain
:
Effects of Differentiated 5G Services on Computational and Radio Resource Allocation Performance. 2226-2241 - Amin Shahraki
, Amir Taherkordi
, Øystein Haugen, Frank Eliassen
:
A Survey and Future Directions on Clustering: From WSNs to IoT and Modern Networking Paradigms. 2242-2274 - Yuki Hirano
, Fujun He
, Takehiro Sato
, Eiji Oki
:
Preventive Start-Time Optimization to Determine Link Weights Against Probabilistic Link Failures. 2275-2293 - Puran Deo Ojha
, R. C. Hansdah
:
A Heuristic Approach to Detect MPLS L3 VPN Misconfiguration in Multi-Homed Multi-VRF Site-Redundant CE Environments. 2294-2307 - Kevser Ovaz Akpinar
, Ibrahim Özçelik
:
Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network. 2308-2319 - Ahmed Abdelsalam
, Pier Luigi Ventre
, Carmine Scarpitta
, Andrea Mayer, Stefano Salsano
, Pablo Camarillo, François Clad, Clarence Filsfils:
SRPerf: A Performance Evaluation Framework for IPv6 Segment Routing. 2320-2333 - Sándor Z. Kiss
, Éva Hosszu, János Tapolcai
, Lajos Rónyai
, Ori Rottenstreich
:
Bloom Filter With a False Positive Free Zone. 2334-2349 - Forough Shahab Samani
, Rolf Stadler
, Christofer Flinta, Andreas Johnsson
:
Conditional Density Estimation of Service Metrics for Networked Services. 2350-2364 - Trupil Limbasiya
, Debasis Das
:
VCom: Secure and Efficient Vehicle-to-Vehicle Message Communication Protocol. 2365-2376 - Ruijiu Mao
, Vaneet Aggarwal
:
NPSCS: Non-Preemptive Stochastic Coflow Scheduling With Time-Indexed LP Relaxation. 2377-2387 - Fujun He
, Eiji Oki
:
Unavailability-Aware Shared Virtual Backup Allocation for Middleboxes: A Queueing Approach. 2388-2404 - Zhiqiang Jiao
, Jieyong Zhang
, Peiyang Yao
, Lujun Wan
, Xun Wang
:
C4ISR Service Deployment Based on an Improved Quantum Evolutionary Algorithm. 2405-2419 - Kentaro Kita
, Yuki Koizumi
, Toru Hasegawa, Onur Ascigil
, Ioannis Psaras:
Producer Anonymity Based on Onion Routing in Named Data Networking. 2420-2436 - Isam Mashhour Al Jawarneh
, Paolo Bellavista
, Antonio Corradi
, Luca Foschini
, Rebecca Montanari
:
Efficient QoS-Aware Spatial Join Processing for Scalable NoSQL Storage Frameworks. 2437-2449 - S. Nithya
, M. Sangeetha
, K. N. Apinaya Prethi
, Kshira Sagar Sahoo
, Sanjaya Kumar Panda
, Amir H. Gandomi
:
Correction to "SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment". 2450
Volume 18, Number 3, September 2021
- Massimo Tornatore
, Teresa Gomes
, Carmen Mas Machuca
, Sara Ayoubi, Eiji Oki
, Chadi Assi
:
Guest Editors' Introduction: Special Section on Design and Management of Reliable Communication Networks. 2455-2459 - Besmir Tola
, Yuming Jiang
, Bjarne E. Helvik
:
Model-Driven Availability Assessment of the NFV-MANO With Software Rejuvenation. 2460-2477 - Yunyi Wu
, Weichang Zheng
, Yongbing Zhang
, Jie Li
:
Reliability-Aware VNF Placement Using a Probability-Based Approach. 2478-2491 - Kien Nguyen
, Phi Le Nguyen
, Zhetao Li
, Hiroo Sekiya
:
Empowering 5G Mobile Devices With Network Softwarization. 2492-2501 - Prabhu Kaliyammal Thiruvasagam
, Abhishek Chakraborty
, C. Siva Ram Murthy
:
Resilient and Latency-Aware Orchestration of Network Slices Using Multi-Connectivity in MEC-Enabled 5G Networks. 2502-2514 - Sihem Cherrared
, Sofiane Imadali, Eric Fabre, Gregor Gössler
:
SFC Self-Modeling and Active Diagnosis. 2515-2530 - Muhammad Taqi Raza
, Fatima Muhammad Anwar, Dongho Kim, Kyu-Han Kim:
Highly Available Service Access Through Proactive Events Execution in LTE NFV. 2531-2544 - Chengzong Peng
, Danyang Zheng
, Sumesh Philip, Xiaojun Cao
:
Latency-Bounded Off-Site Virtual Node Protection in NFV. 2545-2556 - Péter Babarczi
:
Resilient Control Plane Design for Virtual Software Defined Networks. 2557-2569 - Daniel Merling
, Steffen Lindner
, Michael Menth
:
Robust LFA Protection for Software-Defined Networks (RoLPS). 2570-2586 - Qitao Zheng
, Shaofei Tang
, Bofan Chen, Zuqing Zhu
:
Highly-Efficient and Adaptive Network Monitoring: When INT Meets Segment Routing. 2587-2597 - Yuanhao Liu
, Fen Zhou
, Cao Chen
, Zuqing Zhu
, Tao Shang
, Juan-Manuel Torres-Moreno
:
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage. 2598-2611 - Karcius Day Rosario Assis
, Raul C. Almeida
, Leonardo P. Dias
, Helio Waldman
:
Squeezed Protection in Elastic Optical Networks Subject to Multiple Link Failures. 2612-2626 - Sima Barzegar
, Marc Ruiz
, Andrea Sgambelluri
, Filippo Cugini
, Antonio Napoli
, Luis Velasco
:
Soft-Failure Detection, Localization, Identification, and Severity Prediction by Estimating QoT Model Input Parameters. 2627-2640 - Latif U. Khan
, Zhu Han
, Dusit Niyato
, Choong Seon Hong
:
Socially-Aware-Clustering-Enabled Federated Learning for Edge Networks. 2641-2658 - Yi Zhang
, Hung-Yu Wei
:
Risk-Aware Cloud-Edge Computing Framework for Delay-Sensitive Industrial IoTs. 2659-2671 - Xiaomin Ma
, Kishor S. Trivedi
:
SINR-Based Analysis of IEEE 802.11p/bd Broadcast VANETs for Safety Services. 2672-2686 - Doganalp Ergenç
, Jacek Rak
, Mathias Fischer:
Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks. 2687-2701 - Shady A. Mohammed
, Ayse Rumeysa Mohammed
, David Côté
, Shervin Shirmohammadi
:
A Machine-Learning-Based Action Recommender for Network Operation Centers. 2702-2713 - Alessio Sacco
, Matteo Flocco, Flavio Esposito
, Guido Marchetto
:
Supporting Sustainable Virtual Network Mutations With Mystique. 2714-2727 - Jovan Nikolic, Nursultan Jubatyrov, Evangelos Pournaras
:
Self-Healing Dilemmas in Distributed Systems: Fault Correction vs. Fault Tolerance. 2728-2741 - Michal Pióro
, Mariusz Mycek
, Artur Tomaszewski
:
Network Protection Against Node Attacks Based on Probabilistic Availability Measures. 2742-2763 - Peng Sun
, Robert E. Kooij
, Piet Van Mieghem
:
Reachability-Based Robustness of Controllability in Sparse Communication Networks. 2764-2775 - Krishnandu Hazra
, Vijay K. Shah
, Satyaki Roy
, Swaraj Deep, Sujoy Saha, Subrata Nandi:
Exploring Biological Robustness for Reliable Multi-UAV Networks. 2776-2788 - Yuhui Wu
, Mario Pickavet
, Didier Colle
:
Performance Analysis of Optimization Algorithms for a Cross-Layer Shadowing Recover Scheme. 2789-2799 - André Gomes
, Jacek Kibilda
, Arman Farhang
, Ronan Farrell, Luiz A. DaSilva
:
Multi-Operator Connectivity Sharing for Reliable Networks: A Data-Driven Risk Analysis. 2800-2811 - Hasita Kaja
, Rahul Arun Paropkari, Cory C. Beard
, Appie van de Liefvoort:
Survivability and Disaster Recovery Modeling of Cellular Networks Using Matrix Exponential Distributions. 2812-2824 - Larry J. Horner
:
Edge Strategies in Industry: Overview and Challenges. 2825-2831 - Tomasz Osinski
, Halina Tarasiuk
, Paul Chaignon, Mateusz Kossakowski
:
A Runtime-Enabled P4 Extension to the Open vSwitch Packet Processing Pipeline. 2832-2845 - Hasanin Harkous
, Michael Jarschel, Mu He
, Rastin Pries
, Wolfgang Kellerer
:
P8: P4 With Predictable Packet Processing Performance. 2846-2859 - Hasanin Harkous
, Chrysa Papagianni
, Koen De Schepper
, Michael Jarschel, Marinos Dimolianis
, Rastin Pries
:
Virtual Queues for P4: A Poor Man's Programmable Traffic Manager. 2860-2872 - Sharvari Komajwar
, Turgay Korkmaz
:
SPRM: Source Path Routing Model and Link Failure Handling in Software-Defined Networks. 2873-2887 - BongHwan Oh
, Serdar Vural
, Ning Wang
:
A Lightweight Scheme of Active-Port-Aware Monitoring in Software-Defined Networks. 2888-2901 - Sahar Abdollahi, Arash Deldari
, Hamid Asadi, Ahmadreza Montazerolghaem
, Sayyed Majid Mazinani:
Flow-Aware Forwarding in SDN Datacenters Using a Knapsack-PSO-Based Solution. 2902-2914 - Zhenzhen Han
, Chuan Xu
, Zhengying Xiong
, Guofeng Zhao
, Shui Yu
:
On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking. 2915-2928 - Tamal Das
, Mohan Gurusamy
:
Multi-Objective Control Plane Dimensioning in Hybrid SDN/Legacy Networks. 2929-2942 - Fujun He
, Eiji Oki
:
Backup Allocation Model With Probabilistic Protection for Virtual Networks Against Multiple Facility Node Failures. 2943-2959 - Biyi Li
, Bo Cheng
, Xuan Liu
, Meng Wang
, Yi Yue
, Junliang Chen:
Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks. 2960-2974 - Jiachen Zu
, Guyu Hu, Dongyang Peng, Shengxu Xie
, Wenbin Gao:
Fair Scheduling and Rate Control for Service Function Chain in NFV Enabled Data Center. 2975-2986 - Rui Kang
, Fujun He
, Eiji Oki
:
Robust Virtual Network Function Allocation in Service Function Chains With Uncertain Availability Schedule. 2987-3005 - Rasoul Behravesh
, Davit Harutyunyan
, Estefanía Coronado
, Roberto Riggio
:
Time-Sensitive Mobile User Association and SFC Placement in MEC-Enabled 5G Networks. 3006-3020 - Yun Wang, Chih-Kai Huang
, Shan-Hsiang Shen
, Ge-Ming Chiu:
Adaptive Placement and Routing for Service Function Chains With Service Deadlines. 3021-3036 - Lu Dong
, Nelson L. S. da Fonseca
, Zuqing Zhu
:
Application-Driven Provisioning of Service Function Chains Over Heterogeneous NFV Platforms. 3037-3048 - Xiangqiang Gao
, Rongke Liu
, Aryan Kaushik
:
Service Chaining Placement Based on Satellite Mission Planning in Ground Station Networks. 3049-3063 - Roman Matzutt
, Benedikt Kalde
, Jan Pennekamp
, Arthur Drichel
, Martin Henze
, Klaus Wehrle
:
CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively. 3064-3078 - Hongyue Kang
, Xiaolin Chang
, Runkai Yang
, Jelena V. Misic
, Vojislav B. Misic
:
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks. 3079-3091 - Jing Li
, Dusit Niyato
, Choong Seon Hong
, Kyung-Joon Park
, Li Wang
, Zhu Han
:
Cyber Insurance Design for Validator Rotation in Sharded Blockchain Networks: A Hierarchical Game-Based Approach. 3092-3106 - Vignesh Sridharan
, Mohan Gurusamy
:
Game-Theoretic Framework for Malicious Controller Detection in Software Defined Networks. 3107-3120 - Montida Pattaranantakul
, Qipeng Song, Yanmei Tian
, Licheng Wang, Zonghua Zhang
, Ahmed Meddahi
, Chalee Vorakulpipat
:
On Achieving Trustworthy Service Function Chaining. 3140-3153 - Qisheng Zhang
, Jin-Hee Cho
, Terrence J. Moore
, Ing-Ray Chen
:
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation. 3154-3169 - Osvaldo L. H. M. Fonseca, Ítalo Cunha
, Elverton C. Fazzion, Wagner Meira Jr., Brivaldo Alves da Silva, Ronaldo A. Ferreira
, Ethan Katz-Bassett:
Identifying Networks Vulnerable to IP Spoofing. 3170-3183 - Sourena Maroofi
, Maciej Korczynski
, Arnold Hölzel
, Andrzej Duda
:
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis. 3184-3196 - Pushpendu Kar
, Sudip Misra
, Ankush Kumar Mandal, Hao Wang
:
SOS: NDN Based Service-Oriented Game-Theoretic Efficient Security Scheme for IoT Networks. 3197-3208 - Feng Chen
, Man Song, Fen Zhou
, Zuqing Zhu
:
Security-Aware Planning of Packet-Over-Optical Networks in Consideration of OTN Encryption. 3209-3220 - Qian Lv, Fen Zhou
, Zuqing Zhu
:
On the Bilevel Optimization to Design Control Plane for SDONs in Consideration of Planned Physical-Layer Attacks. 3221-3230 - Renato Souza Silva
, Carlos Colman Meixner
, Rafael S. Guimarães
, Thierno Diallo, Borja O. Garcia
, Luís F. M. de Moraes
, Magnos Martinello
:
REPEL: A Strategic Approach for Defending 5G Control Plane From DDoS Signalling Attacks. 3231-3243 - Chamara Kattadige
, Kwon Nung Choi
, Achintha Wijesinghe
, Arpit Nama
, Kanchana Thilakarathna
, Suranga Seneviratne
, Guillaume Jourjon
:
SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks. 3244-3259 - Ferda Özdemir Sönmez
, Banu Günel Kiliç
:
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions. 3260-3279 - Ranjan Pal
, Junhui Li
, Jon Crowcroft
, Yong Li
, Mingyan Liu
, Nishanth Sastry
:
Privacy Risk is a Function of Information Type: Learnings for the Surveillance Capitalism Age. 3280-3296 - Claudio Marche
, Michele Nitti
:
Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT. 3297-3308 - Chi-Yu Li
, Hsin-Yi Wang, Wei-Ching Wang, Chun-Ying Huang
:
Privacy Leakage and Protection of InputConnection Interface in Android. 3309-3323 - Othmane Belmoukadam
, Chadi Barakat
:
Unveiling the End-User Viewport Resolution From Encrypted Video Traces. 3324-3335 - Alexis Huet
, Antoine Saverimoutou
, Zied Ben-Houidi
, Hao Shi
, Shengming Cai, Jinchun Xu, Bertrand Mathieu
, Dario Rossi
:
Deployable Models for Approximating Web QoE Metrics From Encrypted Traffic. 3336-3352 - Md. Shirajum Munir
, Nguyen Hoang Tran
, Walid Saad
, Choong Seon Hong
:
Multi-Agent Meta-Reinforcement Learning for Self-Powered and Sustainable Edge Computing Systems. 3353-3374 - Dongming Luan, En Wang
, Wenbin Liu
, Yongjian Yang
, Jie Wu
:
Minimum-Cost Edge-Server Location Strategy in Mobile Crowdsensing. 3375-3388 - Xuejiao Liu
, Wei Chen, Yingjie Xia
, Chenghan Yang:
SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing. 3389-3399 - Kaustabha Ray
, Ansuman Banerjee
:
Modeling and Verification of Service Allocation Policies for Multi-Access Edge Computing Using Probabilistic Model Checking. 3400-3414 - Sepideh Malektaji
, Amin Ebrahimzadeh
, Halima Elbiaze
, Roch H. Glitho
, Somayeh Kianpisheh
:
Deep Reinforcement Learning-Based Content Migration for Edge Content Delivery Networks With Vehicular Nodes. 3415-3431 - Giuseppe Ruggeri
, Marica Amadeo
, Claudia Campolo
, Antonella Molinaro
, Antonio Iera
:
Caching Popular Transient IoT Contents in an SDN-Based Edge Infrastructure. 3432-3447 - Guanjin Qu, Huaming Wu
, Ruidong Li
, Pengfei Jiao
:
DMRO: A Deep Meta Reinforcement Learning-Based Task Offloading Framework for Edge-Cloud Computing. 3448-3459 - Songyuan Li
, Jiwei Huang
, Bo Cheng
:
Resource Pricing and Demand Allocation for Revenue Maximization in IaaS Clouds: A Market-Oriented Approach. 3460-3475 - Md. Shirajum Munir
, Sarder Fakhrul Abedin
, Nguyen Hoang Tran
, Zhu Han
, Eui-Nam Huh
, Choong Seon Hong
:
Risk-Aware Energy Scheduling for Edge Computing With Microgrid: A Multi-Agent Deep Reinforcement Learning Approach. 3476-3497 - Mohammed Dahhani, André-Luc Beylot
, Gentian Jakllari
:
On Assessing the Performance of IEEE 802.11ad Beamforming Training. 3498-3508 - Alberto Martínez Alba
, Shakthivelu Janardhanan
, Wolfgang Kellerer
:
Enabling Dynamically Centralized RAN Architectures in 5G and Beyond. 3509-3526 - Hani Sami
, Hadi Otrok
, Jamal Bentahar
, Azzam Mourad
:
AI-Based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach. 3527-3540 - María Luisa Marí-Altozano
, Stephen S. Mwanje
, Salvador Luna-Ramírez
, Matías Toril
, Henning Sanneck, Carolina Gijón
:
A Service-Centric Q-Learning Algorithm for Mobility Robustness Optimization in LTE. 3541-3555 - Elnaz Alizadeh Jarchlo
, Elizabeth Eso
, Hossein Doroud, Anatolij Zubow, Falko Dressler
, Zabih Ghassemlooy
, Bernhard Siessegger, Giuseppe Caire
:
FDLA: A Novel Frequency Diversity and Link Aggregation Solution for Handover in an Indoor Vehicular VLC Network. 3556-3566 - Gopika Premsankar
, Guangyuan Piao
, Patrick K. Nicholson, Mario Di Francesco
, Diego Lugones
:
Data-Driven Energy Conservation in Cellular Networks: A Systems Approach. 3567-3582 - Peizhuang Cong
, Yuchao Zhang
, Wendong Wang
, Ning Zhang
:
DND: Driver Node Detection for Control Message Diffusion in Smart Transportations. 3583-3594 - Sisay Tadesse Arzo
, Riccardo Bassoli
, Fabrizio Granelli
, Frank H. P. Fitzek
:
Multi-Agent Based Autonomic Network Management Architecture. 3595-3618 - Julián Martin Del Fiore
, Valerio Persico
, Pascal Mérindol, Cristel Pelsser
, Antonio Pescapè
:
The Art of Detecting Forwarding Detours. 3619-3632 - Fatemehsadat Tabatabaeimehr
, Marc Ruiz
, Che-Yu Liu
, Xiaoliang Chen
, Roberto Proietti
, S. J. Ben Yoo
, Luis Velasco
:
Cooperative Learning for Disaggregated Delay Modeling in Multidomain Networks. 3633-3646 - Roni Mateless
, Haim Zlatokrilov, Liran Orevi
, Michael Segal
, Robert Moskovitch:
IPvest: Clustering the IP Traffic of Network Entities Hidden Behind a Single IP Address Using Machine Learning. 3647-3661 - Ori Rottenstreich
, Pedro Reviriego
, Ely Porat, S. Muthukrishnan:
Avoiding Flow Size Overestimation in Count-Min Sketch With Bloom Filter Constructions. 3662-3676 - Hao Tan
, Wojciech M. Golab:
Optimizing All-to-All Data Transmission in WANs. 3677-3690 - Hui Liang
, Nelson L. S. da Fonseca
, Zuqing Zhu
:
On the Cross-Layer Network Planning for Flexible Ethernet Over Elastic Optical Networks. 3691-3705 - Vaneet Aggarwal
, Tian Lan
, Suresh Subramaniam
, Maotong Xu
:
On the Approximability of Related Machine Scheduling Under Arbitrary Precedence. 3706-3718 - Guisong Yang
, Buye Wang, Xingyu He
, Jiangtao Wang
, Haris Pervaiz
:
Competition-Congestion-Aware Stable Worker-Task Matching in Mobile Crowd Sensing. 3719-3732 - Mengfei Zhu
, Fujun He
, Eiji Oki
:
Optimization Model for Multiple Backup Resource Allocation With Workload-Dependent Failure Probability. 3733-3752 - Diana Andreea Popescu
, Andrew W. Moore
:
Measuring Network Conditions in Data Centers Using the Precision Time Protocol. 3753-3770 - Barun Kumar Saha
, Luca Haab, Lukasz Podleski:
SAFAR: Simulated Annealing-Based Flow Allocation Rules for Industrial Networks. 3771-3782 - Fubao Wu
, Han Hee Song, Jiangtao Yin
, Lixin Gao
, Mario Baldi, Narendra Anand:
NEMA: Automatic Integration of Large Network Management Databases. 3783-3797 - Ermias Andargie Walelgne
, Alemnew Sheferaw Asrese
, Jukka Manner
, Vaibhav Bajpai
, Jörg Ott:
Understanding Data Usage Patterns of Geographically Diverse Mobile Users. 3798-3812 - Zhaoning Wang
, Bo Cheng, Wenkai Zhang
, Junliang Chen:
Many-Objective Automatic Service Composition Based on Temporal Goal Decomposition. 3813-3828 - Stefan Schneider
, Ramin Khalili, Adnan Manzoor
, Haydar Qarawlus
, Rafael Schellenberg
, Holger Karl
, Artur Hecker:
Self-Learning Multi-Objective Service Coordination Using Deep Reinforcement Learning. 3829-3842 - Xing Su
, Minjie Zhang
, Yi Liang, Zhi Cai
, Limin Guo
, Zhiming Ding
:
A Tensor-Based Approach for the QoS Evaluation in Service-Oriented Environments. 3843-3857 - Yong Xiao
, Jianxun Liu
, Guosheng Kang
, Buqing Cao
:
LDNM: A General Web Service Classification Framework via Deep Fusion of Structured and Unstructured Features. 3858-3872 - Ha Dao
, Johan Mazel, Kensuke Fukuda
:
CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection. 3873-3888 - Ryo Nakamura
, Noriaki Kamiyama
:
Content Availability at Network Failure in Information-Centric Networking. 3889-3899 - Amitangshu Pal
, Krishna Kant
:
A Neighborhood Aware Caching and Interest Dissemination Scheme for Content Centric Networks. 3900-3917 - Seyyed Naser Seyyed Hashemi
, Ali Bohlooli
:
3CP: Coordinated Congestion Control Protocol for Named-Data Networking. 3918-3932
Volume 18, Number 4, December 2021
- Hanan Lutfiyya
, Robert Birke
, Giuliano Casale
, Amogh Dhamdhere, Jinho Hwang
, Takeru Inoue
, Neeraj Kumar
, Deepak Puthal
, Nur Zincir-Heywood
:
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management. 3936-3941 - Ismail AlQerm
, Jianli Pan
:
DeepEdge: A New QoE-Based Resource Allocation Framework Using Deep Reinforcement Learning for Future Heterogeneous Edge-IoT Applications. 3942-3954 - Zhongliang Zhao
, Lucas Pacheco, Hugo Santos
, Minghui Liu, Antonio Di Maio
, Denis Rosário
, Eduardo Cerqueira
, Torsten Braun
, Xianbin Cao
:
Predictive UAV Base Station Deployment and Service Offloading With Distributed Edge Learning. 3955-3972 - Chongwu Dong
, Sheng Hu, Xi Chen, Wushao Wen
:
Joint Optimization With DNN Partitioning and Resource Allocation in Mobile Edge Computing. 3973-3986 - Jorge Martín-Pérez
, Kiril Antevski
, Andres Garcia-Saavedra
, Xi Li
, Carlos J. Bernardos
:
DQN Dynamic Pricing and Revenue Driven Service Federation Strategy. 3987-4001 - Xiaojin Ma
, Huahu Xu, Honghao Gao
, Minjie Bian:
Real-Time Multiple-Workflow Scheduling in Cloud Environments. 4002-4018 - Runhai Jiao
, Shuangkun Wang
, Tianle Zhang
, Hui Lu
, Hui He
, Brij B. Gupta
:
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method. 4019-4029 - Timam Ghosh
, Rituparna Saha
, Arijit Roy
, Sudip Misra
, Narendra Singh Raghuwanshi:
AI-Based Communication-as-a-Service for Network Management in Society 5.0. 4030-4041 - Mostafa Ibrahim
, Umair Sajid Hashmi
, Muhammad Nabeel
, Ali Imran, Sabit Ekin
:
Embracing Complexity: Agent-Based Modeling for HetNets Design and Optimization via Concurrent Reinforcement Learning Algorithms. 4042-4062 - Tingting Yuan
, Christian Esteve Rothenberg
, Katia Obraczka
, Chadi Barakat
, Thierry Turletti
:
Harnessing UAVs for Fair 5G Bandwidth Allocation in Vehicular Communication via Deep Reinforcement Learning. 4063-4074 - Jin Cheng
, Yulei Wu
, Yeming Lin, Yuepeng E, Fan Tang, Jingguo Ge
:
VNE-HRL: A Proactive Virtual Network Embedding Algorithm Based on Hierarchical Reinforcement Learning. 4075-4087 - Shi Su
, Wai-Tian Tan, Xiaoqing Zhu, Rob Liston
, Herb Wildfeuer
, Behnaam Aazhang
:
Motion-Aware Optimizations for Downlink MU-MIMO in 802.11ax Networks. 4088-4102 - Lixuan Yang
, Alessandro Finamore, Feng Jun
, Dario Rossi:
Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset. 4103-4118 - Chunkai Zhang
, Xinyu Wang
, Hongye Zhang, Hanyu Zhang, Peiyi Han:
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model. 4119-4133 - Yu Bi
, Carlos Colman Meixner
, Monchai Bunyakitanon
, Xenofon Vasilakos
, Reza Nejabati
, Dimitra Simeonidou
:
Multi-Objective Deep Reinforcement Learning Assisted Service Function Chains Placement. 4134-4150 - Li-Zhuang Tan
, Wei Su, Wei Zhang
, Huiling Shi, Jingying Miao, Pilar Manzanares-Lopez
:
A Packet Loss Monitoring System for In-Band Network Telemetry: Detection, Localization, Diagnosis and Recovery. 4151-4168 - Elad Rapaport
, Ingmar Poese, Polina Zilberman
, Oliver Holschke
, Rami Puzis
:
Spillover Today? Predicting Traffic Overflows on Private Peering of Major Content Providers. 4169-4182 - Guosheng Kang
, Jianxun Liu
, Yong Xiao
, Buqing Cao
, Yu Xu
, Manliang Cao:
Neural and Attentional Factorization Machine-Based Web API Recommendation for Mashup Development. 4183-4196 - Shi Dong
, Yuanjun Xia, Tao Peng
:
Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning. 4197-4212 - Jonathan M. DeAlmeida
, Camila F. T. Pontes
, Luiz A. DaSilva
, Cristiano Bonato Both
, João J. C. Gondim
, Célia Ghedini Ralha
, Marcelo Antonio Marotta
:
Abnormal Behavior Detection Based on Traffic Pattern Categorization in Mobile Networks. 4213-4224 - Alfredo Nascita
, Antonio Montieri
, Giuseppe Aceto
, Domenico Ciuonzo
, Valerio Persico
, Antonio Pescapè
:
XAI Meets Mobile Traffic Classification: Understanding and Improving Multimodal Deep Learning Architectures. 4225-4246 - Yi Yue
, Bo Cheng
, Meng Wang
, Biyi Li
, Xuan Liu
, Junliang Chen:
Throughput Optimization and Delay Guarantee VNF Placement for Mapping SFC Requests in NFV-Enabled Networks. 4247-4262 - Liang Liu
, Songtao Guo
, Guiyan Liu
, Yuanyuan Yang
:
Joint Dynamical VNF Placement and SFC Routing in NFV-Enabled SDNs. 4263-4276 - Jie Sun
, Feng Liu
, Huandong Wang
, Manzoor Ahmed, Yong Li
, Mingyue Liu:
Efficient VNF Placement for Poisson Arrived Traffic. 4277-4293 - Rui Kang
, Fujun He
, Eiji Oki
:
Virtual Network Function Allocation in Service Function Chains Using Backups With Availability Schedule. 4294-4310 - Yuhan Xue
, Zuqing Zhu
:
On the Upgrade of Service Function Chains With Heterogeneous NFV Platforms. 4311-4323 - Nguyen Van Tu
, Jae-Hyoung Yoo, James Won-Ki Hong
:
PPTMon: Real-Time and Fine-Grained Packet Processing Time Monitoring in Virtual Network Functions. 4324-4336 - Weikun Chen
, Ya-Feng Liu
, Antonio De Domenico
, Zhi-Quan Luo
, Yu-Hong Dai:
Optimal Network Slicing for Service-Oriented Networks With Flexible Routing and Guaranteed E2E Latency. 4337-4352 - Xiaoquan Zhang
, Lin Cui
, Fung Po Tso
, Weijia Jia:
pHeavy: Predicting Heavy Flows in the Programmable Data Plane. 4353-4364 - Bommareddy Lokesh
, Narendran Rajagopalan
:
Orchestrator for Synchronizing Network Events in SDNs. 4365-4375 - Santhosh Kamath
, Apoorv Srivastava
, Prathamesh Kamath
, Sanjay Singh
, M. Sathish Kumar
:
Application Aware Multiple Constraint Optimal Paths for Transport Network Using SDN. 4376-4390 - Fujun He
, Eiji Oki
:
Main and Secondary Controller Assignment With Optimal Priority Policy Against Multiple Failures. 4391-4405 - Wei Ren
, Yan Sun
, Hong Luo
, Mohsen Guizani
:
SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks. 4406-4419 - Mohamed Seifelnasr, Riham AlTawy
, Amr M. Youssef
:
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing. 4420-4433 - Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain. 4434-4449 - Yongjie Ye, Zhifeng Ren
, Xiapu Luo
, Jingjing Zhang
, Weigang Wu
:
Garou: An Efficient and Secure Off-Blockchain Multi-Party Payment Hub. 4450-4461 - Peixuan He, Kaiping Xue
, Jiayu Yang, Qiudong Xia, Jianqing Liu
, David S. L. Wei:
FASE: Fine-Grained Accountable and Space-Efficient Access Control for Multimedia Content With In-Network Caching. 4462-4475 - Jin Qin
, Kaiping Xue
, Jian Li
, Qibin Sun, Jun Lu:
Service Prioritization in Information Centric Networking With Heterogeneous Content Providers. 4476-4488 - Lalhruaizela Chhangte
, Nikhil Karamchandani
, D. Manjunath
, Emanuele Viterbo
:
Towards a Distributed Caching Service at the WiFi Edge Using Wi-Cache. 4489-4502 - Widhi Yahya
, Eiji Oki
, Ying-Dar Lin
, Yuan-Cheng Lai
:
Scaling and Offloading Optimization in Pre-CORD and Post-CORD Multi-Access Edge Computing. 4503-4516 - Zhixiong Chen
, Zhaokun Zhou
, Chen Chen
:
Code Caching-Assisted Computation Offloading and Resource Allocation for Multi-User Mobile Edge Computing. 4517-4530 - Abegaz Mohammed Seid
, Gordon Owusu Boateng
, Bruce Mareri
, Guolin Sun
, Wei Jiang
:
Multi-Agent DRL for Task Offloading and Resource Allocation in Multi-UAV Enabled IoT Edge Network. 4531-4547 - Arcangela Rago
, Giuseppe Piro
, Gennaro Boggia
, Paolo Dini
:
Anticipatory Allocation of Communication and Computational Resources at the Edge Using Spatio-Temporal Dynamics of Mobile Users. 4548-4562 - Mingyu Liu, Li Pan
, Shijun Liu
:
Keep Hot or Go Cold: A Randomized Online Migration Algorithm for Cost Optimization in STaaS Clouds. 4563-4575 - Yuang Jiang
, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee
, Leandros Tassiulas:
Resource Allocation in Data Centers Using Fast Reinforcement Learning Algorithms. 4576-4588 - Mu Yan
, Jian Yang, Keyu Chen
, Yao Sun
, Gang Feng
:
Self-Imitation Learning-Based Inter-Cell Interference Coordination in Autonomous HetNets. 4589-4601 - Arled Papa
, Raphael Durner
, Endri Goshi, Leonardo Goratti, Tinku Rasheed, Andreas Blenk
, Wolfgang Kellerer
:
MARC: On Modeling and Analysis of Software-Defined Radio Access Network Controllers. 4602-4615 - Cristian C. Erazo-Agredo
, Mario Garza-Fabre
, Ramón Agüero Calvo
, Luis Díez, Joan Serrat
, Javier Rubio-Loyola
:
Joint Route Selection and Split Level Management for 5G C-RAN. 4616-4638 - Thomas Lagkas
, Dimitrios Klonidis, Panagiotis G. Sarigiannidis
, Ioannis Tomkos
:
Optimized Joint Allocation of Radio, Optical, and MEC Resources for the 5G and Beyond Fronthaul. 4639-4653 - Sihem Bakri
, Pantelis A. Frangoudis
, Adlen Ksentini
, Maha Bouaziz
:
Data-Driven RAN Slicing Mechanisms for 5G and Beyond. 4654-4668 - Xi Li
, Carla-Fabiana Chiasserini
, Josep Mangues-Bafalluy
, Jorge Baranda
, Giada Landi
, Barbara Martini, Xavier Costa-Pérez
, Corrado Puligheddu
, Luca Valcarenghi
:
Automated Service Provisioning and Hierarchical SLA Management in 5G Systems. 4669-4684 - Rishu Raj
, Abhishek Dixit
:
Outage Analysis and Reliability Enhancement of Hybrid VLC-RF Networks Using Cooperative Non-Orthogonal Multiple Access. 4685-4696 - Habib Mostafaei
, Mohammad Shojafar
, Mauro Conti
:
TEL: Low-Latency Failover Traffic Engineering in Data Plane. 4697-4710 - Mitsuki Ito
, Fujun He
, Eiji Oki
:
Robust Optimization Model for Probabilistic Protection With Multiple Types of Resources. 4711-4729 - Mohammad Mahdi Tajiki
, Seyed Hesamedin Ghasemi Petroudi
, Stefano Salsano
, Steve Uhlig
, Ignacio Castro
:
Optimal Estimation of Link Delays Based on End-to-End Active Measurements. 4730-4743 - Elif Ak
, Berk Canberk
:
Forecasting Quality of Service for Next-Generation Data-Driven WiFi6 Campus Networks. 4744-4755 - Yvonne-Anne Pignolet
, Stefan Schmid
, Gilles Trédan:
On the Implications of Routing Models on Network Optimization. 4756-4769 - Bo He
, Jing-Yu Wang
, Qi Qi
, Haifeng Sun
, Jianxin Liao
, Chunning Du, Xiang-Yang Alex Liu, Zhu Han
:
DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention. 4770-4788 - Sravan Patchala
, Seunghyun Lee, Changhee Joo
, D. Manjunath
:
On the Economics of Network Interconnections and its Impact on Net Neutrality. 4789-4800 - Baojia Li, Ruyun Zhang, Xiaojian Tian
, Zuqing Zhu
:
Multi-Agent and Cooperative Deep Reinforcement Learning for Scalable Network Automation in Multi-Domain SD-EONs. 4801-4813 - Cenk Gündogan
, Peter Kietzmann
, Martine S. Lenders
, Hauke Petersen
, Michael Frey, Thomas C. Schmidt
, Felix Shzu-Juraschek
, Matthias Wählisch
:
The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT. 4814-4828 - Francis Boabang
, Amin Ebrahimzadeh
, Roch H. Glitho
, Halima Elbiaze
, Martin Maier
, Fatna Belqasmi
:
A Machine Learning Framework for Handling Delayed/Lost Packets in Tactile Internet Remote Robotic Surgery. 4829-4845 - Huaman Zhou, Weibo Cai, Zonghang Li
, Hongfang Yu
, Ling Liu
, Long Luo
, Gang Sun
:
TSEngine: Enable Efficient Communication Overlay in Distributed Machine Learning in WANs. 4846-4859 - Lailong Luo
, Deke Guo, Ori Rottenstreich
, Richard T. B. Ma
, Xueshan Luo, Bangbang Ren:
A Capacity-Elastic Cuckoo Filter Design for Dynamic Set Representation. 4860-4874 - Jian An
, Zhenxing Wang, Xin He
, Xiaolin Gui
, Jindong Cheng, Ruowei Gui:
Know Where You are: A Practical Privacy-Preserving Semi-Supervised Indoor Positioning via Edge-Crowdsensing. 4875-4887 - Amitangshu Pal, Krishna Kant
:
Corrections to "A Neighborhood Aware Caching and Interest Dissemination Scheme for Content Centric Networks". 4888
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.