![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Network Management, Volume 32
Volume 32, Number 1, January 2022
Editorial
- István Gódor, Imen Grida Ben Yahia:
Topics from networks management and operations.
- Pedro Martins
, André B. Reis
, Paulo Salvador
, Susana Sargento
:
A privacy-focused approach for anomaly detection in IoT networks. - Filippo Poltronieri
, Mauro Tortonesi
, Alessandro Morelli
, Cesare Stefanelli, Niranjan Suri:
A Value-of-Information-based management framework for fog services. - Gabor Soos
, Dániel Ficzere
, Pál Varga:
Analyzing group behavior patterns in a cellular mobile network for 5G use-cases. - Wassim Sellil Atoui
, Nour Assy, Walid Gaaloul, Imen Grida Ben Yahia
:
A model-driven approach for deployment descriptor design in network function virtualization.
- Marcin Nawrocki, Thomas C. Schmidt
, Matthias Wählisch
:
Industrial control protocols in the Internet core: Dismantling operational practices. - Godfrey Anuga Akpakwu
, Gerhard P. Hancke, Adnan M. Abu-Mahfouz:
An optimization-based congestion control for constrained application protocol. - Gustavo H. C. de Oliveira, Agnaldo de Souza Batista
, Michele Nogueira, Aldri L. dos Santos:
An access control for IoT based on network community perception and social trust against Sybil attacks. - Elif Bozkaya
, Yusuf Özçevik
, Mertkan Akkoç, Muhammed Rasit Erol
, Berk Canberk
:
Energy-aware mobility for aerial networks: A reinforcement learning approach.
Volume 32, Number 2, March 2022
Editorial
- Abdelkader Lahmadi, Emmanuel Bertin, Ruidong Li
:
BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services.
- Yuxi Cai, Nafis Irtija
, Eirini-Eleni Tsiropoulou
, Andreas G. Veneris:
Truthful Decentralized Blockchain Oracles. - Maher Alharby
, Aad van Moorsel:
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study. - Jakob Schaerer
, Severin Zumbrunn, Torsten Braun
:
Veritaa: A distributed public key infrastructure with signature store. - Fariba Ghaffari
, Komal Gilani
, Emmanuel Bertin, Noël Crespi:
Identity and access management using distributed ledger technology: A survey. - Almir Pereira Guimarães
, Paulo Maciel, Rivalino Matias Jr., Bruno Silva
, Bruno Nogueira
:
An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures. - Erick Petersen
, Marco Antonio To
:
DockSDN: A hybrid container-based software-defined networking emulation tool.
Volume 32, Number 3, May 2022
- Rongbo Zhang
, Xin Liu, Jibin Niu, Yinqing Wang:
A batch delivery mechanism of network update in software-defined wide area networks. - Merlin George
, Anu Mary Chacko
:
MediTrans - Patient-centric interoperability through blockchain. - Adrián Pekár
, Alejandra Duque-Torres
, Winston K. G. Seah
, Oscar Maurício Caicedo Rendón
:
Towards threshold-agnostic heavy-hitter classification. - Masahiro Sasabe
, Masanari Yamamoto, Yuanyu Zhang
, Shoji Kasahara
:
Block diffusion delay attack and its countermeasures in a Bitcoin network. - Guto Leoni Santos
, Pierangelo Rosati
, Theo Lynn
, Judith Kelner
, Djamel Sadok
, Patricia Takako Endo
:
Predicting short-term mobile Internet traffic from Internet activity using recurrent neural networks.
Volume 32, Number 4, July 2022
- Laurens Van Hoye
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
A secure cross-organizational container deployment approach to enable ad hoc collaborations. - Satoru Kobayashi
, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda:
amulog: A general log analysis framework for comparison and combination of diverse template generation methods. - Ranjeet B. Kagade, Santhosh Jayagopalan:
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation. - Binghao Yan, Qinrang Liu
, JianLiang Shen, Dong Liang, Xingyu Liu:
Cost-effective and accurate flow statistics collection in OpenFlow-based SDN.
Volume 32, Number 5, September 2022
- Mili Dhar
, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma, Swapan Debbarma
:
A cost-effective and load-balanced controller placement method in software-defined networks. - Carlos Pedroso
, Aldri Santos:
Dissemination control in dynamic data clustering for dense IIoT against false data injection attack. - Ian Vilar Bastos
, Igor Monteiro Moraes
, Thi Mai Trang Nguyen, Guy Pujolle:
Content Media Retrieval using Virtual Network Functions in Multi-access Edge Computing architecture. - Reza Shokri Kalan, Stuart Clayman
, Müge Sayit:
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH.
Volume 32, Number 6, November 2022
- Akhilesh Kumar
, Shashwati Banerjea, Rishabh Jain, Mayank Pandey:
Software-defined content delivery network at the edge for adaptive video streaming. - Xiaoying Huang
, Zhichuan Guo, Mangu Song:
FGLB: A fine-grained hardware intra-server load balancer based on 100 G FPGA SmartNIC. - Kiranpreet Kaur
, Fabrice Guillemin
, Françoise Sailhan
:
Container placement and migration strategies for cloud, fog, and edge data centers: A survey. - Sepehr Abbasi Zadeh
, Farid Zandi, Mohammad Amin Beiruti, Yashar Ganjali:
Load migration in distributed softwarized network controllers.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.