


default search action
IEEE Transactions on Network and Service Management, Volume 17
Volume 17, Number 1, March 2020
- Filip De Turck

:
2019 Reviewers for IEEE Transactions on Network and Service Management (TNSM). 1-11 - Rémi Badonnel

, Carol J. Fung, Qi Li
, Sandra Scott-Hayward
:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. 12-14 - Abbas Abou Daya

, Mohammad A. Salahuddin
, Noura Limam
, Raouf Boutaba
:
BotChase: Graph-Based Bot Detection Using Machine Learning. 15-29 - Duc C. Le

, Nur Zincir-Heywood
, Malcolm I. Heywood
:
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning. 30-44 - Ibbad Hafeez

, Markku Antikainen, Aaron Yi Ding
, Sasu Tarkoma
:
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge. 45-59 - Arunan Sivanathan

, Hassan Habibi Gharakheili
, Vijay Sivaraman
:
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning. 60-74 - Damu Ding

, Marco Savi
, Gianni Antichi
, Domenico Siracusa
:
An Incrementally-Deployable P4-Enabled Architecture for Network-Wide Heavy-Hitter Detection. 75-88 - Pragati Shrivastava

, Mohd. Saalim Jamal
, Kotaro Kataoka
:
EvilScout: Detection and Mitigation of Evil Twin Attack in SDN Enabled WiFi. 89-102 - Kyle A. Simpson

, Simon Rogers, Dimitrios P. Pezaros
:
Per-Host DDoS Mitigation by Direct-Control Reinforcement Learning. 103-117 - Ahmed A. Abd El-Latif

, Bassem Abd-El-Atty
, Wojciech Mazurczyk
, Carol J. Fung, Salvador E. Venegas-Andraca
:
Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. 118-131 - Sarath Babu

, P. V. Mithun
, B. S. Manoj
:
A Novel Framework for Resource Discovery and Self-Configuration in Software Defined Wireless Mesh Networks. 132-146 - Fengli Xu, Zhen Tu

, Yong Li
:
Connecting the Dots: User Privacy is not Preserved in ID-Removed Cellular Data. 147-159 - Vijay Varadharajan

, Udaya Kiran Tupakula
:
Counteracting Attacks From Malicious End Hosts in Software Defined Networks. 160-174 - Nicolas Kagami, Roberto Irajá Tavares da Costa Filho, Luciano Paschoal Gaspary

:
CAPEST: Offloading Network Capacity and Available Bandwidth Estimation to Programmable Data Planes. 175-189 - Wouter B. de Vries

, Roland van Rijswijk-Deij
, Pieter-Tjerk de Boer
, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. 190-200 - Santhanakrishnan Anand

, Ding Ding, Paolo Gasti
, Mike O'Neal, Mauro Conti
, Kiran S. Balagani
:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. 201-212 - Surbhi Saraswat

, Hari Prabhat Gupta
, Tanima Dutta, Sajal K. Das
:
Energy Efficient Data Forwarding Scheme in Fog-Based Ubiquitous System With Deadline Constraints. 213-226 - Minh-Tuan Thai

, Ying-Dar Lin
, Yuan-Cheng Lai
, Hsu-Tung Chien:
Workload and Capacity Optimization for Cloud-Edge Computing Systems with Vertical and Horizontal Offloading. 227-238 - Wenzhong Li

, Shuailong Wang, Yuedong Xu
, Sanglu Lu:
Charging on the Route: An Online Pricing Gateway Congestion Control for ICNs. 239-250 - Jaime Galán-Jiménez

, Marco Polverini
, Antonio Cianfrani
:
A Scalable and Error-Tolerant Solution for Traffic Matrix Assessment in Hybrid IP/SDN Networks. 251-264 - Jawad Ahmed

, Hassan Habibi Gharakheili
, Qasim Raza, Craig Russell, Vijay Sivaraman
:
Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal Hosts. 265-279 - Vignesh Sridharan

, Purnima Murali Mohan
, Mohan Gurusamy
:
QoC-Aware Control Traffic Engineering in Software Defined Networks. 280-293 - Roberto Doriguzzi Corin

, Sandra Scott-Hayward
, Domenico Siracusa
, Marco Savi
, Elio Salvadori
:
Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions. 294-307 - Yunfei Meng

, Zhiqiu Huang
, Guohua Shen
, Changbo Ke
:
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare. 308-318 - Yuhan Xue

, Jianquan Peng
, Kai Han, Zuqing Zhu
:
On Table Resource Virtualization and Network Slicing in Programmable Data Plane. 319-331 - Ke Gu

, Na Wu, Bo Yin, Weijia Jia:
Secure Data Query Framework for Cloud and Fog Computing. 332-345 - Giuseppe Baruffa

, Mauro Femminella
, Matteo Pergolesi
, Gianluca Reali
:
Comparison of MongoDB and Cassandra Databases for Spectrum Monitoring As-a-Service. 346-360 - Arslan Ahmad

, Luigi Atzori
:
MNO-OTT Collaborative Video Streaming in 5G: The Zero-Rated QoE Approach for Quality and Resource Management. 361-374 - M. Ishtiaque Aziz Zahed

, Iftekhar Ahmad
, Daryoush Habibi
, Quoc Viet Phung
, Lin Zhang
:
A Cooperative Green Content Caching Technique for Next Generation Communication Networks. 375-388 - Peerapong Uthansakul

, Patikorn Anchuen
, Monthippa Uthansakul
, Arfat Ahmad Khan
:
Estimating and Synthesizing QoE Based on QoS Measurement for Improving Multimedia Services on Cellular Networks Using ANN Method. 389-402 - Noriaki Kamiyama

:
Virtual Machine Trading in Public Clouds. 403-415 - Ting Qu

, Deke Guo
, Jie Wu
, Xiaolei Zhou, Xin Lu
, Zhong Liu:
Efficient Event Scheduling of Network Update. 416-429 - A. S. M. Sanwar Hosen

, Saurabh Singh
, Pradip Kumar Sharma
, Md. Sazzadur Rahman
, In-Ho Ra
, Gi Hwan Cho
, Deepak Puthal
:
A QoS-Aware Data Collection Protocol for LLNs in Fog-Enabled Internet of Things. 430-444 - Prasun Kanti Dey

, Murat Yuksel:
An Economic Analysis of Cloud-Assisted Routing for Wider Area SDN. 445-458 - Duong Tuan Nguyen

, Chuan Pham
, Kim Khoa Nguyen
, Mohamed Cheriet
:
Placement and Chaining for Run-Time IoT Service Deployment in Edge-Cloud. 459-472 - Himank Gupta

, Mehul Sharma
, A. Antony Franklin
, Bheemarjuna Reddy Tamma
:
Apt-RAN: A Flexible Split-Based 5G RAN to Minimize Energy Consumption and Handovers. 473-487 - Nasim Beigi Mohammadi

, Mark Shtern, Marin Litoiu
:
Adaptive Load Management of Web Applications on Software Defined Infrastructure. 488-502 - Shrinivas Petale

, Jaisingh Thangaraj:
Failure-Based Controller Placement in Software Defined Networks. 503-516 - Abdulkadir Karaagaç

, Eli De Poorter, Jeroen Hoebeke
:
In-Band Network Telemetry in Industrial Wireless Sensor Networks. 517-531 - Rong Chai

, Desheng Xie
, Lei Luo
, Qianbin Chen
:
Multi-Objective Optimization-Based Virtual Network Embedding Algorithm for Software-Defined Networking. 532-546 - Maha Mdini

, Gwendal Simon
, Alberto Blanc
, Julien Lecoeuvre
:
Introducing an Unsupervised Automated Solution for Root Cause Diagnosis in Mobile Networks. 547-561 - Lorenzo Saino

, Ioannis Psaras, George Pavlou
:
Framework and Algorithms for Operator-Managed Content Caching. 562-576 - Stefano Avallone

, Usman Ashraf
:
A DAG-Based Forwarding Paradigm for Large Scale Software Defined Networks. 577-591 - Matteo Anedda

, Maurizio Murroni
, Gabriel-Miro Muntean
:
A Novel Markov Decision Process-Based Solution for Improved Quality Prioritized Video Delivery. 592-606 - Zhiyuan Li

, Weijia Xing, Samer Khamaiseh
, Dianxiang Xu
:
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic. 607-621 - Mohammad Karimzadeh-Farshbafan

, Vahid Shah-Mansouri
, Dusit Niyato
:
Reliability Aware Service Placement Using a Viterbi-Based Algorithm. 622-636 - Mohammadhassan Safavi

, Saeed Bastani
, Björn Landfeldt
:
Online Learning and Placement Algorithms for Efficient Delivery of User Generated Contents in Telco-CDNs. 637-651
Volume 17, Number 2, June 2020
- Petra Vizarreta

, Kishor S. Trivedi
, Veena B. Mendiratta
, Wolfgang Kellerer
, Carmen Mas Machuca
:
DASON: Dependability Assessment Framework for Imperfect Distributed SDN Implementations. 652-667 - Apoorv Shukla

, Said Jawad Saidi
, Stefan Schmid
, Marco Canini
, Thomas Zinner
, Anja Feldmann
:
Toward Consistent SDNs: A Case for Network State Fuzzing. 668-681 - Victoria Huang

, Gang Chen
, Peng Zhang
, Hao Li
, Chengchen Hu, Tian Pan
, Qiang Fu
:
A Scalable Approach to SDN Control Plane Management: High Utilization Comes With Low Latency. 682-695 - Kshira Sagar Sahoo

, Pritish Mishra
, Mayank Tiwary
, Somula Ramasubbareddy, Balamurugan Balusamy
, Amir H. Gandomi
:
Improving End-Users Utility in Software-Defined Wide Area Network Systems. 696-707 - Shaofei Tang

, Deyun Li, Bin Niu, Jianquan Peng
, Zuqing Zhu
:
Sel-INT: A Runtime-Programmable Selective In-Band Network Telemetry System. 708-721 - Stefan Geissler

, Stefan Herrnleben
, Robert Bauer, Alexej Grigorjew
, Thomas Zinner
, Michael Jarschel:
The Power of Composition: Abstracting a Multi-Device SDN Data Path Through a Single API. 722-735 - Beakal Gizachew Assefa

, Öznur Özkasap
:
RESDN: A Novel Metric and Method for Energy Efficient Routing in Software Defined Networks. 736-749 - Yang Tian

, Weiwei Chen
, Chin-Tau Lea
:
Monitor Placement for Link Latency Measurement in Hybrid SDNs. 750-763 - Yuncan Zhang

, Fujun He
, Takehiro Sato
, Eiji Oki
:
Network Service Scheduling With Resource Sharing and Preemption. 764-778 - Carlos Hernan Tobar Arteaga

, Faiber Botina Anacona, Kelly Tatiana Tobar Ortega
, Oscar Maurício Caicedo Rendón
:
A Scaling Mechanism for an Evolved Packet Core Based on Network Functions Virtualization. 779-792 - Farzad Tashtarian

, Mohamed Faten Zhani
, Bita Fatemipour
, Delaram Yazdani:
CoDeC: A Cost-Effective and Delay-Aware SFC Deployment. 793-806 - Raphael Durner

, Wolfgang Kellerer
:
Network Function Offloading Through Classification of Elephant Flows. 807-820 - Meng Wang

, Bo Cheng
, Junliang Chen:
Joint Availability Guarantee and Resource Optimization of Virtual Network Function Placement in Data Center Networks. 821-834 - Long Qu

, Chadi Assi
, Maurice J. Khabbaz
, Yinghua Ye:
Reliability-Aware Service Function Chaining With Function Decomposition and Multipath Routing. 835-848 - Federico Civerchia

, Maxime Pelcat, Luca Maggiani
, Koteswararao Kondepu
, Piero Castoldi
, Luca Valcarenghi
:
Is OpenCL Driven Reconfigurable Hardware Suitable for Virtualising 5G Infrastructure? 849-863 - Haipeng Yao

, Sihan Ma, Jingjing Wang
, Peiying Zhang
, Chunxiao Jiang
, Song Guo:
A Continuous-Decision Virtual Network Embedding Scheme Relying on Reinforcement Learning. 864-875 - Roberto Doriguzzi Corin

, Stuart Millar, Sandra Scott-Hayward
, Jesús Martínez del Rincón
, Domenico Siracusa
:
Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection. 876-889 - Saptarshi Debroy

, Prasad Calyam
, Minh Nguyen, Roshan Lal Neupane, Bidyut Mukherjee
, Ajay Kumar Eeralla, Khaled Salah
:
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems. 890-903 - Weifeng Hao, Jiajie Zeng, Xiaohai Dai

, Jiang Xiao
, Qiang-Sheng Hua
, Hanhua Chen
, Kuan-Ching Li
, Hai Jin
:
Towards a Trust-Enhanced Blockchain P2P Topology for Enabling Fast and Reliable Broadcast. 904-917 - Wenxiu Ding

, Rui Hu, Zheng Yan
, Xinren Qian
, Robert H. Deng
, Laurence T. Yang
, Mianxiong Dong
:
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control. 918-930 - Haiping Huang

, Dongjun Zhang, Fu Xiao
, Kai Wang, Jiateng Gu, Ruchuan Wang:
Privacy-Preserving Approach PBCN in Social Network With Differential Privacy. 931-945 - Yuan Cao

, Yongli Zhao
, Jun Li
, Rui Lin
, Jie Zhang, Jiajia Chen
:
Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study. 946-957 - Joydeep Mukherjee

, Diwakar Krishnamurthy
:
PRIMA: Subscriber-Driven Interference Mitigation for Cloud Services. 958-971 - Xuan Liu

, Bo Cheng
, Shangguang Wang
:
Availability-Aware and Energy-Efficient Virtual Cluster Allocation Based on Multi-Objective Optimization in Cloud Datacenters. 972-985 - Alessio Sacco

, Flavio Esposito
, Guido Marchetto
:
RoPE: An Architecture for Adaptive Data-Driven Routing Prediction at the Edge. 986-999 - Yang Bai, Lixing Chen

, Linqi Song
, Jie Xu
:
Risk-Aware Edge Computation Offloading Using Bayesian Stackelberg Game. 1000-1012 - Jessica Fernandes Lopes

, Everton Jose Santana
, Victor G. Turrisi da Costa, Bruno Bogaz Zarpelão
, Sylvio Barbon Junior
:
Evaluating the Four-Way Performance Trade-Off for Data Stream Classification in Edge Computing. 1013-1025 - Hani Sami

, Azzam Mourad
:
Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment. 1026-1039 - Huaiying Sun

, Huiqun Yu, Guisheng Fan
:
Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment. 1040-1053 - Imen Triki, Rachid El Azouzi

, Majed Haddad
:
NEWCAST: Joint Resource Management and QoE-Driven Optimization for Mobile Video Streaming. 1054-1067 - Pablo Salva-Garcia

, José M. Alcaraz-Calero
, Qi Wang
, Miguel Arevalillo-Herráez
, Jorge Bernal Bernabé
:
Scalable Virtual Network Video-Optimizer for Adaptive Real-Time Video Transmission in 5G Networks. 1068-1081 - Flavia Salutari

, Diego N. da Hora, Gilles Dubuc, Dario Rossi:
Analyzing Wikipedia Users' Perceived Quality of Experience: A Large-Scale Study. 1082-1095 - César Díaz

, Pablo Pérez
, Julián Cabrera
, Jaime J. Ruiz, Narciso García
:
XLR (piXel Loss Rate): A Lightweight Indicator to Measure Video QoE in IP Networks. 1096-1109 - Ioan-Sorin Comsa

, Ramona Trestian
, Gabriel-Miro Muntean
, Gheorghita Ghinea
:
5MART: A 5G SMART Scheduling Framework for Optimizing QoS Through Reinforcement Learning. 1110-1124 - Vijay K. Shah

, Brian Luciano, Simone Silvestri
, Shameek Bhattacharjee
, Sajal K. Das
:
A Diverse Band-Aware Dynamic Spectrum Access Network Architecture for Delay-Tolerant Smart City Applications. 1125-1139 - Ángel Fernández Gambín, Michele Rossi

:
A Sharing Framework for Energy and Computing Resources in Multi-Operator Mobile Networks. 1140-1152 - Amer AlGhadhban

, Abdulkadir Celik
, Basem Shihada
, Mohamed-Slim Alouini
:
LightFDG: An Integrated Approach to Flow Detection and Grooming in Optical Wireless DCNs. 1153-1166 - Ouassim Karrakchou

, Nancy Samaan, Ahmed Karmouch:
FCTrees: A Front-Coded Family of Compressed Tree-Based FIB Structures for NDN Routers. 1167-1180 - Shu Yang

, Laizhong Cui
, Xinhao Deng
, Qi Li
, Yulei Wu
, Mingwei Xu, Dan Wang
, Jianping Wu:
FISE: A Forwarding Table Structure for Enterprise Networks. 1181-1196 - Zheng Wu

, Yuning Dong
, Wei Tian, Jiong Jin
:
Enhanced Rough K-Means Based Flow Aggregation for QoS Mapping in Heterogeneous Network Environments. 1197-1210 - Jeongseop Kim

, JinSoo Park
, Ganguk Hwang
:
Gaussian Process Regression-Based Traffic Load Balancing for Multimedia Multipath Systems. 1211-1223 - Ike Kunze

, Jan Rüth
, Oliver Hohlfeld
:
Congestion Control in the Wild - Investigating Content Provider Fairness. 1224-1238 - Jean-Romain Luttringer

, Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet
:
Let There Be Light: Revealing Hidden MPLS Tunnels With TNT. 1239-1253 - Yuki Hirano

, Fujun He
, Takehiro Sato
, Eiji Oki
:
Backup Network Design Against Multiple Link Failures to Avoid Link Capacity Overestimation. 1254-1267 - Jean-François Grailet

, Benoit Donnet
:
Virtual Insanity: Linear Subnet Discovery. 1268-1281 - Awnish Kumar

, Sandeep Vidyapu
, Vijaya V. Saradhi, Venkatesh Tamarapalli
:
A Multi-View Subspace Learning Approach to Internet Traffic Matrix Estimation. 1282-1293
Volume 17, Number 3, September 2020
- Guang Yu

, Zhiping Cai
, Siqi Wang, Haiwen Chen
, Fang Liu, Anfeng Liu
:
Unsupervised Online Anomaly Detection With Parameter Adaptation for KPI Abrupt Changes. 1294-1308 - Petrônio C. L. Silva

, Patrícia de Oliveira e Lucas
, Hossein Javedani Sadaei
, Frederico Gadelha Guimarães
:
Distributed Evolutionary Hyperparameter Optimization for Fuzzy Time Series. 1309-1321 - Sabidur Rahman

, Tanjila Ahmed, Minh Huynh, Massimo Tornatore
, Biswanath Mukherjee
:
Auto-Scaling Network Service Chains Using Machine Learning and Negotiation Game. 1322-1336 - Amandeep Kaur

, Krishan Kumar
:
Energy-Efficient Resource Allocation in Cognitive Radio Networks Under Cooperative Multi-Agent Model-Free Reinforcement Learning Schemes. 1337-1348 - Trung V. Phan

, Tri Gia Nguyen
, Nhu-Ngoc Dao
, Truong Thu Huong
, Huu-Thanh Nguyen
, Thomas Bauschert:
DeepGuard: Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring. 1349-1362 - Hui Yu

, Jiahai Yang
, Carol J. Fung:
Fine-Grained Cloud Resource Provisioning for Virtual Network Function. 1363-1376 - Qingyu Shi

, Fang Wang
, Dan Feng:
IntFlow: Integrating Per-Packet and Per-Flowlet Switching Strategy for Load Balancing in Datacenter Networks. 1377-1388 - Omar Houidi

, Oussama Soualah, Wajdi Louati, Djamal Zeghlache
:
Dynamic VNF Forwarding Graph Extension Algorithms. 1389-1402 - Mohamad Khattar Awad

, Ali A. M. R. Behiry
, Ebrahim A. Alrashed
:
A Robust and Resilient Load Balancing Framework for SoftRAN-Based HetNets With Hybrid Energy Supplies. 1403-1417 - Nashid Shahriar

, Sepehr Taeb, Shihabur Rahman Chowdhury
, Mubeen Zulfiqar, Massimo Tornatore
, Raouf Boutaba
, Jeebak Mitra
, Mahdi Hemmati
:
Reliable Slicing of 5G Transport Networks With Bandwidth Squeezing and Multi-Path Provisioning. 1418-1431 - Arled Papa

, Tomaso de Cola
, Petra Vizarreta
, Mu He
, Carmen Mas Machuca
, Wolfgang Kellerer
:
Design and Evaluation of Reconfigurable SDN LEO Constellations. 1432-1445 - Yi Liu

, Hongqi Zhang, Dexian Chang, Hao Hu
:
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding. 1446-1459 - Paolo Bellavista

, Carlo Giannelli
, Dmitrij David Padalino Montenero
:
A Reference Model and Prototype Implementation for SDN-Based Multi Layer Routing in Fog Environments. 1460-1473 - Nguyen Van Tu

, Jae-Hyoung Yoo, James Won-Ki Hong
:
Accelerating Virtual Network Functions With Fast-Slow Path Architecture Using eXpress Data Path. 1474-1486 - Haitao Wu

, Fen Zhou
, Yaojun Chen
, Ran Zhang
:
On Virtual Network Embedding: Paths and Cycles. 1487-1500 - Sifat Ferdousi

, Massimo Tornatore
, Ferhat Dikbiyik, Charles U. Martel
, Sugang Xu
, Yusuke Hirota
, Yoshinari Awaji, Biswanath Mukherjee
:
Joint Progressive Network and Datacenter Recovery After Large-Scale Disasters. 1501-1514 - Sultan Alamro

, Maotong Xu
, Tian Lan
, Suresh Subramaniam
:
Shed+: Optimal Dynamic Speculation to Meet Application Deadlines in Cloud. 1515-1526 - Ruben H. Milocco, Pascale Minet

, Éric Renault, Selma Boumerdassi
:
Evaluating the Upper Bound of Energy Cost Saving by Proactive Data Center Management. 1527-1541 - Nazih Salhab

, Rana Rahim
, Rami Langar
:
Optimization of Virtualization Cost, Processing Power and Network Load of 5G Software-Defined Data Centers. 1542-1553 - Xuan Liu

, Bo Cheng
, Shangguang Wang
, Junliang Chen:
Joint Availability Enhancement and Traffic Optimization of Virtual Cluster Allocation in Cloud Datacenters. 1554-1567 - Meng Niu

, Bo Cheng
, Yimeng Feng
, Junliang Chen:
GMTA: A Geo-Aware Multi-Agent Task Allocation Approach for Scientific Workflows in Container-Based Cloud. 1568-1581 - Abubakr O. Al-Abbasi

, Vaneet Aggarwal
:
TTLCache: Taming Latency in Erasure-Coded Storage Through TTL Caching. 1582-1596 - Joel Guerreiro

, Luis Rodrigues
, Noélia Correia
:
Allocation of Resources in SAaaS Clouds Managing Thing Mashups. 1597-1609 - Tengfei Cao, Changqiao Xu

, Junping Du
, Yawen Li, Han Xiao
, Changhui Gong, Lujie Zhong
, Dusit Niyato
:
Reliable and Efficient Multimedia Service Optimization for Edge Computing-Based 5G Networks: Game Theoretic Approaches. 1610-1625 - Mario Di Mauro

, Antonio Liotta
:
An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network. 1626-1639 - Vidhyalakshmi Karthikeyan

, Brahim Allan
, Detlef D. Nauck
, Miguel Rio
:
Benchmarking Video Service Quality: Quantifying the Viewer Impact of Loss-Related Impairments. 1640-1652 - Seunghyun Yoon

, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
Attack Graph-Based Moving Target Defense in Software-Defined Networks. 1653-1668 - Shu Yang

, Laizhong Cui
, Ziteng Chen
, Wei Xiao:
An Efficient Approach to Robust SDN Controller Placement for Security. 1669-1682 - Hao Hu

, Yuling Liu
, Chen Chen, Hongqi Zhang, Yi Liu
:
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game. 1683-1700 - Agathe Blaise

, Mathieu Bouet
, Vania Conan
, Stefano Secci
:
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection. 1701-1714 - Nagarathna Ravi

, S. Mercy Shalinie
, D. Danyson Jose Theres:
BALANCE: Link Flooding Attack Detection and Mitigation via Hybrid-SDN. 1715-1729 - Neminath Hubballi

, Mayank Swarnkar
, Mauro Conti
:
BitProb: Probabilistic Bit Signatures for Accurate Application Identification. 1730-1741 - Maissa Dammak

, Sidi-Mohammed Senouci
, Mohamed Ayoub Messous
, Mohamed Houcine Elhdhili, Christophe Gransart
:
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments. 1742-1757 - Om Jee Pandey

, Ved Gautam
, Ha H. Nguyen
, Mahendra Kumar Shukla
, Rajesh M. Hegde:
Fault-Resilient Distributed Detection and Estimation Over a SW-WSN Using LCMV Beamforming. 1758-1773 - Yuming Xiao

, Jiawei Zhang
, Yuefeng Ji
:
Can Fine-Grained Functional Split Benefit to the Converged Optical-Wireless Access Networks in 5G and Beyond? 1774-1787 - Narges Gholipoor, Hamid Saeedi

, Nader Mokari
, Eduard A. Jorswieck:
E2E QoS Guarantee for the Tactile Internet via Joint NFV and Radio Resource Allocation. 1788-1804 - Yigit Özcan

, Jad Oueis
, Catherine Rosenberg
, Razvan Stanica
, Fabrice Valois
:
Robust Planning and Operation of Multi-Cell Homogeneous and Heterogeneous Networks. 1805-1821 - Matias Richart

, Javier Baliosian
, Joan Serrat, Juan-Luis Gorricho
, Ramón Agüero
:
Slicing With Guaranteed Quality of Service in WiFi Networks. 1822-1837 - Suzan Bayhan

, Estefanía Coronado
, Roberto Riggio
, Anatolij Zubow
:
User-AP Association Management in Software-Defined WLANs. 1838-1852 - Surender Redhu

, Rajesh M. Hegde
:
Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning. 1853-1864 - Fábio Luciano Verdi

, Hélio Tibagí de Oliveira, Leobino N. Sampaio
, Luciana A. M. Zaina
:
Usability Matters: A Human-Computer Interaction Study on Network Management Tools. 1865-1878 - Pan Zhou

, Hongfang Yu
, Gang Sun
:
Grouper: Accelerating Hyperparameter Searching in Deep Learning Clusters With Network Scheduling. 1879-1895 - Vitor Pereira

, Miguel Rocha
, Pedro Sousa
:
Traffic Engineering With Three-Segments Routing. 1896-1909 - Yunpeng Xiao

, Qiufan Yang
, Chunyan Sang, Yanbing Liu
:
Rumor Diffusion Model Based on Representation Learning and Anti-Rumor. 1910-1923 - Marco Polverini

, Antonio Cianfrani
, Marco Listanti
:
A Theoretical Framework for Network Monitoring Exploiting Segment Routing Counters. 1924-1940 - Xiaoqian Li

, Kwan L. Yeung:
Traffic Engineering in Segment Routing Networks Using MILP. 1941-1953 - Andrea Detti

, Ludovico Funari
, Nicola Blefari-Melazzi
:
Sub-Linear Scalability of MQTT Clusters in Topic-Based Publish-Subscribe Applications. 1954-1968
Volume 17, Number 4, December 2020
- Nur Zincir-Heywood

, Giuliano Casale
, David Carrera
, Lydia Y. Chen
, Amogh Dhamdhere, Takeru Inoue
, Hanan Lutfiyya, Taghrid Samak:
Guest Editorial: Special Section on Data Analytics and Machine Learning for Network and Service Management-Part I. 1971-1974 - Giovanni Apruzzese

, Mauro Andreolini
, Mirco Marchetti
, Andrea Venturi
, Michele Colajanni
:
Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks. 1975-1987 - Said Jawad Saidi

, Aniss Maghsoudlou
, Damien Foucard, Georgios Smaragdakis
, Ingmar Poese, Anja Feldmann
:
Exploring Network-Wide Flow Data With Flowyager. 1988-2006 - Sarah Wassermann, Michael Seufert

, Pedro Casas
, Li Gang, Kuang Li:
ViCrypt to the Rescue: Real-Time, Machine-Learning-Driven Video-QoE Monitoring for Encrypted Streaming Traffic. 2007-2023 - Ruben Mennes

, Jakob Struye, Carlos Donato, Miguel Camelo
, Irfan Jabandzic
, Spilios Giannoulis
, Ingrid Moerman
, Steven Latré:
Collaborative Flow Control in the DARPA Spectrum Collaboration Challenge. 2024-2038 - David Buchaca Prats

, Felipe Albuquerque Portella
, Carlos H. A. Costa, Josep Lluis Berral
:
You Only Run Once: Spark Auto-Tuning From a Single Run. 2039-2051 - Muhammad Abdullah

, Waheed Iqbal
, Faisal Bukhari
, Abdelkarim Erradi
:
Diminishing Returns and Deep Learning for Adaptive CPU Resource Allocation of Containers. 2052-2063 - Shaohan Huang

, Yi Liu
, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang
, Zhongzhi Luan
:
HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log. 2064-2076 - Shogo Aoki, Kohei Shiomoto

, Chin Lam Eng:
Few-Shot Learning and Self-Training for eNodeB Log Analysis for Service-Level Assurance in LTE Networks. 2077-2089 - Carolina Gijón

, Matías Toril
, Salvador Luna-Ramírez
, Juan L. Bejarano-Luque
, María Luisa Marí-Altozano
:
Estimating Pole Capacity From Radio Network Performance Statistics by Supervised Learning. 2090-2101 - Zhongliang Zhao

, Mostafa Karimzadeh, Lucas Pacheco, Hugo Santos
, Denis do Rosário
, Torsten Braun
, Eduardo Cerqueira
:
Mobility Management With Transferable Reinforcement Learning Trajectory Prediction. 2102-2116 - Sanaz Mohammadjafari

, Sophie Roginsky, Emir Kavurmacioglu
, Mucahit Cevik, Jonathan Ethier, Ayse Basar Bener
:
Machine Learning-Based Radio Coverage Prediction in Urban Environments. 2117-2130 - Tanmoy Bag

, Sharva Garg
, Diego Fernando Preciado Rojas
, Andreas Mitschele-Thiel
:
Machine Learning-Based Recommender Systems to Achieve Self-Coordination Between SON Functions. 2131-2144 - Azzam Mourad

, Ali Srour
, Haidar M. Harmanani, Cathia Jenainatiy, Mohamad Arafeh:
Critical Impact of Social Networks Infodemic on Defeating Coronavirus COVID-19 Pandemic: Twitter-Based Study and Research Directions. 2145-2155 - Javier Pastor-Galindo

, Mattia Zago
, Pantaleone Nespoli
, Sergio López Bernal
, Alberto Huertas Celdrán
, Manuel Gil Pérez
, José A. Ruipérez-Valiente
, Gregorio Martínez Pérez
, Félix Gómez Mármol
:
Spotting Political Social Bots in Twitter: A Use Case of the 2019 Spanish General Election. 2156-2170 - Ke Yu

, Hao Jiang
, Ting Li
, Song Han
, Xiaofei Wu
:
Data Fusion Oriented Graph Convolution Network Model for Rumor Detection. 2171-2181 - Ivana Kovacevic

, Alireza Shams Shafigh, Savo Glisic
, Beatriz Lorenzo
, Ekram Hossain
:
Multi-Domain Network Slicing With Latency Equalization. 2182-2196 - Fengsheng Wei

, Gang Feng
, Yao Sun
, Yatong Wang, Shuang Qin, Ying-Chang Liang
:
Network Slice Reconfiguration by Exploiting Deep Reinforcement Learning With Large Action Space. 2197-2211 - Antonio Matencio-Escolar

, Qi Wang
, José M. Alcaraz Calero
:
SliceNetVSwitch: Definition, Design and Implementation of 5G Multi-Tenant Network Slicing in Software Data Paths. 2212-2225 - Nattakorn Promwongsa

, Mohammad Abu-Lebdeh
, Somayeh Kianpisheh
, Fatna Belqasmi
, Roch H. Glitho
, Halima Elbiaze
, Noël Crespi, Omar Alfandi
:
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices. 2226-2241 - Sisay Tadesse Arzo

, Riccardo Bassoli
, Fabrizio Granelli
, Frank H. P. Fitzek
:
Study of Virtual Network Function Placement in 5G Cloud Radio Access Network. 2242-2259 - Yang Chen

, Jie Wu
, Bo Ji
:
Deploying Virtual Network Functions With Non-Uniform Models in Tree-Structured Networks. 2260-2274 - Minh Nguyen

, Mahdi Dolati
, Majid Ghaderi
:
Deadline-Aware SFC Orchestration Under Demand Uncertainty. 2275-2290 - Davide Andreoletti

, Tanya Velichkova, Giacomo Verticale
, Massimo Tornatore
, Silvia Giordano
:
A Privacy-Preserving Reinforcement Learning Algorithm for Multi-Domain Virtual Network Embedding. 2291-2304 - Meilian Lu

, Yun Gu
, Dongliang Xie
:
A Dynamic and Collaborative Multi-Layer Virtual Network Embedding Algorithm in SDN Based on Reinforcement Learning. 2305-2317 - Sarath Babu

, Aravind Rajeev
, B. S. Manoj
:
A Medium-Term Disruption Tolerant SDN for Wireless TCP/IP Networks. 2318-2334 - Shaifu Gupta

, Aroor Dinesh Dileep, Timothy A. Gonsalves
:
Online Sparse BLSTM Models for Resource Usage Prediction in Cloud Datacentres. 2335-2349 - Tao Wang

, Wenbo Zhang, Jiwei Xu, Zeyu Gu:
Workflow-Aware Automatic Fault Diagnosis for Microservice-Based Applications With Statistics. 2350-2363 - Liudong Zuo

:
Intelligent and Flexible Bandwidth Scheduling for Data Transfers in Dedicated High-Performance Networks. 2364-2379 - Jon Patman

, Dmitrii Chemodanov
, Prasad Calyam
, Kannappan Palaniappan, Claudio Sterle
, Maurizio Boccia
:
Predictive Cyber Foraging for Visual Cloud Computing in Large-Scale IoT Systems. 2380-2395 - Subhrendu Chattopadhyay

, Soumyajit Chatterjee
, Sukumar Nandi
, Sandip Chakraborty
:
Aloe: Fault-Tolerant Network Management and Orchestration Framework for IoT Applications. 2396-2409 - Ibrahim A. Elgendy

, Weizhe Zhang
, Yiming Zeng, Hui He, Yu-Chu Tian
, Yuanyuan Yang
:
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks. 2410-2422 - S. Nithya

, M. Sangeetha
, K. N. Apinaya Prethi
, Kshira Sagar Sahoo
, Sanjaya Kumar Panda, Amir H. Gandomi
:
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment. 2423-2435 - Francescomaria Faticanti

, Francesco De Pellegrini
, Domenico Siracusa
, Daniele Santoro, Silvio Cretti
:
Throughput-Aware Partitioning and Placement of Applications in Fog Computing. 2436-2450 - Borja Molina-Coronado

, Usue Mori
, Alexander Mendiburu
, José Miguel-Alonso
:
Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process. 2451-2479 - Mario Di Mauro

, Giovanni Galatro
, Antonio Liotta
:
Experimental Review of Neural-Based Approaches for Network Intrusion Management. 2480-2495 - Gaurav Choudhary

, Philip Virgil Astillo
, Ilsun You
, Kangbin Yim, Ing-Ray Chen
, Jin-Hee Cho
:
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. 2496-2510 - N. G. Bhuvaneswari Amma

, S. Selvakumar
, R. Leela Velusamy
:
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks. 2511-2522 - Zakaria Abou El Houda

, Lyes Khoukhi
, Abdelhakim Senhaji Hafid
:
Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks. 2523-2535 - Dinh C. Nguyen

, Pubudu N. Pathirana
, Ming Ding
, Aruna Seneviratne
:
Privacy-Preserved Task Offloading in Mobile Blockchain With Deep Reinforcement Learning. 2536-2549 - Huandong Wang

, Chen Gao, Yong Li
, Zhi-Li Zhang
, Depeng Jin:
Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs. 2550-2566 - Georgios Patounas

, Xenofon Foukas
, Ahmed Elmokashfi
, Mahesh K. Marina:
Characterization and Identification of Cloudified Mobile Network Performance Bottlenecks. 2567-2583 - Murk Marvi

, Adnan Aijaz, Muhammad Khurram:
Toward an Automated Data Offloading Framework for Multi-RAT 5G Wireless Networks. 2584-2597 - Preti Kumari

, Hari Prabhat Gupta
, Tanima Dutta:
An Incentive Mechanism-Based Stackelberg Game for Scheduling of LoRa Spreading Factors. 2598-2609 - Joao F. Santos

, Maicon Kist, Juergen Rochol, Luiz A. DaSilva
:
Virtual Radios, Real Services: Enabling RANaaS Through Radio Virtualisation. 2610-2619 - Yao Sun

, Wei Jiang, Gang Feng
, Paulo Valente Klaine, Lei Zhang
, Muhammad Ali Imran
, Ying-Chang Liang
:
Efficient Handover Mechanism for Radio Access Network Slicing by Exploiting Distributed Learning. 2620-2633 - Lanfranco Zanzi

, Vincenzo Sciancalepore
, Andres Garcia-Saavedra
, Xavier Costa-Pérez
, Georgios Agapiou, Hans Dieter Schotten:
ARENA: A Data-Driven Radio Access Networks Analysis of Football Events. 2634-2647 - Xiaoqian Li

, Kwan L. Yeung:
Monitoring Trail Design Based on Segment Routing. 2648-2661 - Christoph Hardegen

, Benedikt Pfülb
, Sebastian Rieger
, Alexander Gepperth
:
Predicting Network Flow Characteristics Using Deep Learning and Real-World Network Traffic. 2662-2676 - Qianqian Wang

, Lei Chen
, Qin Wang
, Hongbo Zhu, Xianbin Wang
:
Anomaly-Aware Network Traffic Estimation via Outlier-Robust Tensor Completion. 2677-2689 - Pedro Reviriego

, Jorge Martínez
, David Larrabeiti
, Salvatore Pontarelli
:
Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification. 2690-2701 - Simone Porcu

, Alessandro Floris
, Jan-Niklas Voigt-Antons
, Luigi Atzori
, Sebastian Möller
:
Estimation of the Quality of Experience During Video Streaming From Facial Expression and Gaze Direction. 2702-2716 - Guobing Zou

, Jin Chen
, Qiang He
, Kuan-Ching Li
, Bofeng Zhang
, Yanglan Gan
:
NDMF: Neighborhood-Integrated Deep Matrix Factorization for Service QoS Prediction. 2717-2730 - Maria Ines Robles

, Nanjangud C. Narendra
, Sauli Matti Kiviranta
:
Pragmatic Distance in IoT Devices. 2731-2743

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














