- Sampath Edirisinghe, Orga Galagedarage, Pubuduni Imali Dias, Chathurika Ranaweera:
Recent Development of Emerging Indoor Wireless Networks towards 6G. Network 3(2): 269-297 (2023) - Takato Fukugami, Tomofumi Matsuzawa:
Improvement of Network Flow Using Multi-Commodity Flow Problem. Network 3(2): 239-252 (2023) - Laura Galluccio, Joannes Sam Mertens, Giacomo Morabito:
Clustered Distributed Learning Exploiting Node Centrality and Residual Energy (CINE) in WSNs. Network 3(2): 253-268 (2023) - Ricardo Lent:
Improving Bundle Routing in a Space DTN by Approximating the Transmission Time of the Reliable LTP. Network 3(1): 180-198 (2023) - Yujin Nakano, Tomofumi Matsuzawa:
Preventing Black Hole Attacks in AODV Using RREQ Packets. Network 3(4): 469-481 (2023) - Nadia Niknami, Avinash Srinivasan, Ken St. Germain, Jie Wu:
Maritime Communications - Current State and the Future Potential with SDN and SDR. Network 3(4): 563-584 (2023) - Andrea Piroddi, Maurizio Torregiani:
Machine Learning Applied to LoRaWAN Network for Improving Fingerprint Localization Accuracy in Dense Urban Areas. Network 3(1): 199-217 (2023) - Md. Mamunur Rashid, Shahriar Usman Khan, Fariha Eusufzai, Md. Azharuddin Redwan, Saifur Rahman Sabuj, Mahmoud A. El-Sharief:
A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks. Network 3(1): 158-179 (2023) - Pedro Juan Roig, Salvador Alcaraz, Katja Gilly, Cristina Bernad, Carlos Juiz:
Edge Data Center Organization and Optimization by Using Cage Graphs. Network 3(1): 93-114 (2023) - Pedro Juan Roig, Salvador Alcaraz, Katja Gilly, Cristina Bernad, Carlos Juiz:
Formal Algebraic Model of an Edge Data Center with a Redundant Ring Topology. Network 3(1): 142-157 (2023) - Pedro Juan Roig, Salvador Alcaraz, Katja Gilly, Cristina Bernad, Carlos Juiz:
Arithmetic Study about Efficiency in Network Topologies for Data Centers. Network 3(3): 298-325 (2023) - Mohamed Ali Setitra, Mingyu Fan, Bless Lord Y. Agbley, Zine El Abidine Bensalem:
Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment. Network 3(4): 538-562 (2023) - Dominick Ta, Stephanie Booth, Rachel Dudukovich:
Towards Software-Defined Delay Tolerant Networks. Network 3(1): 15-38 (2023) - Gia Khanh Tran, Takuto Kamei, Shoma Tanaka:
Route Optimization of Unmanned Aerial Vehicle Sensors for Localization of Wireless Emitters in Outdoor Environments. Network 3(3): 326-342 (2023) - Juexing Wang, Xiao Zhang, Li Xiao, Tianxing Li:
Survey for Soil Sensing with IOT and Traditional Systems. Network 3(4): 482-501 (2023) - Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena:
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges. Network 3(3): 343-421 (2023) - Mikhail Zolotukhin, Di Zhang, Timo Hämäläinen, Parsa Miraghaei:
On Attacking Future 5G Networks with Adversarial Examples: Survey. Network 3(1): 39-90 (2023) - 2022
- Gizem Akman, Philip Ginzboorg, Valtteri Niemi:
Privacy-Aware Access Protocols for MEC Applications in 5G. Network 2(2): 203-224 (2022) - Frank Akpan, Gueltoum Bendiab, Stavros Shiaeles, Stavros Karamperidis, Michalis Michaloliakos:
Cybersecurity Challenges in the Maritime Sector. Network 2(1): 123-138 (2022) - Ahmed Osama Basil Al-Mashhadani, Mu Mu, Ali Al-Sharbaz:
Quality of Experience Experimentation Prediction Framework through Programmable Network Management. Network 2(4): 500-518 (2022) - Muntadher Alsabah, Marwah Abdulrazzaq Naser, Basheera M. Mahmmod, Sadiq H. Abdulhussain:
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems. Network 2(2): 329-349 (2022) - Muneera Alsayegh, Tarek Moulahi, Abdulatif Alabdulatif, Pascal Lorenz:
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain. Network 2(2): 239-256 (2022) - Sunghwan Cho, Gaojie Chen, Justin P. Coon, Pei Xiao:
Challenges in Physical Layer Security for Visible Light Communication Systems. Network 2(1): 53-65 (2022) - Tariq Daradkeh, Anjali Agarwal:
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning. Network 2(4): 643-669 (2022) - Ralph Voltaire J. Dayot, In-Ho Ra, Hyung-Jin Kim:
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources. Network 2(3): 370-388 (2022) - Issa Dia, Ehsan Ahvar, Gyu Myoung Lee:
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking. Network 2(2): 225-238 (2022) - Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo:
An Introduction of a Modular Framework for Securing 5G Networks and Beyond. Network 2(3): 419-439 (2022) - Garett T. Fox, Rajendra V. Boppana:
Detection of Malicious Network Flows with Low Preprocessing Overhead. Network 2(4): 628-642 (2022) - Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. Network 2(1): 66-80 (2022) - Pu Gong, Thomas M. Chen, Peng Xu:
Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. Network 2(1): 83-105 (2022)