Sign in
Network
2021
2022
2023
2024
2021
2024
Keyphrases
Publications
volume 4, number 1, 2024
Oliver J. Hall
,
Stavros Shiaeles
,
Fudong Li
A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities.
Network
4 (1) (2024)
Herbert Maosa
,
Karim Ouazzane
,
Mohamed Chahine Ghanem
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.
Network
4 (1) (2024)
Nadia Niknami
,
Jie Wu
IDSMatch: A Novel Deployment Method for IDS Chains in SDNs.
Network
4 (1) (2024)
Hanin Almutairi
,
Ning Zhang
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach.
Network
4 (1) (2024)
volume 3, number 1, 2023
Ricardo Lent
Improving Bundle Routing in a Space DTN by Approximating the Transmission Time of the Reliable LTP.
Network
3 (1) (2023)
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Edge Data Center Organization and Optimization by Using Cage Graphs.
Network
3 (1) (2023)
Ali Al-Allawee
,
Pascal Lorenz
,
Abdelhafid Abouaissa
,
Mosleh M. Abualhaj
A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol.
Network
3 (1) (2023)
Md. Mamunur Rashid
,
Shahriar Usman Khan
,
Fariha Eusufzai
,
Md. Azharuddin Redwan
,
Saifur Rahman Sabuj
,
Mahmoud A. El-Sharief
A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks.
Network
3 (1) (2023)
Dominick Ta
,
Stephanie Booth
,
Rachel Dudukovich
Towards Software-Defined Delay Tolerant Networks.
Network
3 (1) (2023)
Naresh Adhikari
,
Mahalingam Ramkumar
IoT and Blockchain Integration: Applications, Opportunities, and Challenges.
Network
3 (1) (2023)
Andrea Piroddi
,
Maurizio Torregiani
Machine Learning Applied to LoRaWAN Network for Improving Fingerprint Localization Accuracy in Dense Urban Areas.
Network
3 (1) (2023)
Muna Al-Saadi
,
Asiya Khan
,
Vasilios I. Kelefouras
,
David J. Walker
,
Bushra Al-Saadi
SDN-Based Routing Framework for Elephant and Mice Flows Using Unsupervised Machine Learning.
Network
3 (1) (2023)
Mikhail Zolotukhin
,
Di Zhang
,
Timo Hämäläinen
,
Parsa Miraghaei
On Attacking Future 5G Networks with Adversarial Examples: Survey.
Network
3 (1) (2023)
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Formal Algebraic Model of an Edge Data Center with a Redundant Ring Topology.
Network
3 (1) (2023)
volume 3, number 2, 2023
Sampath Edirisinghe
,
Orga Galagedarage
,
Pubuduni Imali Dias
,
Chathurika Ranaweera
Recent Development of Emerging Indoor Wireless Networks towards 6G.
Network
3 (2) (2023)
Takato Fukugami
,
Tomofumi Matsuzawa
Improvement of Network Flow Using Multi-Commodity Flow Problem.
Network
3 (2) (2023)
Laura Galluccio
,
Joannes Sam Mertens
,
Giacomo Morabito
Clustered Distributed Learning Exploiting Node Centrality and Residual Energy (CINE) in WSNs.
Network
3 (2) (2023)
volume 3, number 3, 2023
Patikiri Arachchige Don Shehan Nilmantha Wijesekara
,
Subodha Gunawardena
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges.
Network
3 (3) (2023)
Gia Khanh Tran
,
Takuto Kamei
,
Shoma Tanaka
Route Optimization of Unmanned Aerial Vehicle Sensors for Localization of Wireless Emitters in Outdoor Environments.
Network
3 (3) (2023)
Milan Chauhan
,
Stavros Shiaeles
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions.
Network
3 (3) (2023)
Aljuhara Alshagri
,
Abdulmohsen Mutairi
Evaluation of Modern Internet Transport Protocols over GEO Satellite Links.
Network
3 (3) (2023)
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Arithmetic Study about Efficiency in Network Topologies for Data Centers.
Network
3 (3) (2023)
volume 3, number 4, 2023
Mohamed Ali Setitra
,
Mingyu Fan
,
Bless Lord Y. Agbley
,
Zine El Abidine Bensalem
Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment.
Network
3 (4) (2023)
Hamza Chahed
,
Andreas Kassler
TSN Network Scheduling - Challenges and Approaches.
Network
3 (4) (2023)
Juexing Wang
,
Xiao Zhang
,
Li Xiao
,
Tianxing Li
Survey for Soil Sensing with IOT and Traditional Systems.
Network
3 (4) (2023)
Hadeel Alrubayyi
,
Gokop Goteng
,
Mona Jaber
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities.
Network
3 (4) (2023)
Nadia Niknami
,
Avinash Srinivasan
,
Ken St. Germain
,
Jie Wu
Maritime Communications - Current State and the Future Potential with SDN and SDR.
Network
3 (4) (2023)
Yujin Nakano
,
Tomofumi Matsuzawa
Preventing Black Hole Attacks in AODV Using RREQ Packets.
Network
3 (4) (2023)
John P. Baugh
,
Jinhua Guo
Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches.
Network
3 (4) (2023)
volume 2, number 2, 2022
Hongliang Mao
,
Jie Zhong
,
Siyuan Yu
,
Pei Xiao
,
Xinghao Yang
,
Gaoyuan Lu
An Atmospheric Turbulence Compensation Algorithm Based on FSM-DM Cascaded AO Architecture for FSO Communications.
Network
2 (2) (2022)
Yi-Hang Zhu
,
Gilles Callebaut
,
Hatice Çalik
,
Liesbet Van der Perre
,
François Rottenberg
Energy Efficient Access Point Placement for Distributed Massive MIMO.
Network
2 (2) (2022)
Muneera Alsayegh
,
Tarek Moulahi
,
Abdulatif Alabdulatif
,
Pascal Lorenz
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain.
Network
2 (2) (2022)
Issa Dia
,
Ehsan Ahvar
,
Gyu Myoung Lee
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking.
Network
2 (2) (2022)
Muntadher Alsabah
,
Marwah Abdulrazzaq Naser
,
Basheera M. Mahmmod
,
Sadiq H. Abdulhussain
A Computationally Efficient Gradient Algorithm for Downlink Training Sequence Optimization in FDD Massive MIMO Systems.
Network
2 (2) (2022)
volume 2, number 3, 2022
Tomofumi Matsuzawa
,
Kyosuke Ichikawa
Implementation and Evaluation of HTTP/3 Connectivity Check Using Happy Eyeballs Algorithm.
Network
2 (3) (2022)
Ralph Voltaire J. Dayot
,
In-Ho Ra
,
Hyung-Jin Kim
A Deep Contextual Bandit-Based End-to-End Slice Provisioning Approach for Efficient Allocation of 5G Network Resources.
Network
2 (3) (2022)
Zongze Li
,
Shuai Wang
,
Qingfeng Lin
,
Yang Li
,
Miaowen Wen
,
Yik-Chung Wu
,
H. Vincent Poor
Phase Shift Design in RIS Empowered Wireless Networks: From Optimization to AI-Based Methods.
Network
2 (3) (2022)
Ed Kamya Kiyemba Edris
,
Mahdi Aiash
,
Jonathan Loo
An Introduction of a Modular Framework for Securing 5G Networks and Beyond.
Network
2 (3) (2022)
Stavros Karageorgiou
,
Vasileios Karyotis
Markov-Based Malware Propagation Modeling and Analysis in Multi-Layer Networks.
Network
2 (3) (2022)
Dennis Krummacker
,
Benedikt Veith
,
Christoph Fischer
,
Hans Dieter Schotten
Analysis of 5G Channel Access for Collaboration with TSN Concluding at a 5G Scheduling Mechanism.
Network
2 (3) (2022)
volume 2, number 4, 2022
Tariq Daradkeh
,
Anjali Agarwal
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning.
Network
2 (4) (2022)
John Kafke
,
Thiago Viana
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems.
Network
2 (4) (2022)
Babatunde Ojetunde
,
Naoto Egashira
,
Kenta Suzuki
,
Takuya Kurihara
,
Kazuto Yano
,
Yoshinori Suzuki
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network.
Network
2 (4) (2022)
Radheshyam Singh
,
José Soler
,
Tidiane Sylla
,
Léo Mendiboure
,
Marion Berbineau
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial.
Network
2 (4) (2022)
Gia Khanh Tran
,
Masanori Ozasa
,
Jin Nakazato
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations.
Network
2 (4) (2022)
Maria Papathanasaki
,
Panagiotis Fountas
,
Kostas Kolomvatsos
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications.
Network
2 (4) (2022)
Ahmed Osama Basil Al-Mashhadani
,
Mu Mu
,
Ali Al-Sharbaz
Quality of Experience Experimentation Prediction Framework through Programmable Network Management.
Network
2 (4) (2022)
Shaharyar Khan
,
Stuart E. Madnick
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach.
Network
2 (4) (2022)
Doaa N. Mhawi
,
Haider W. Oleiwi
,
Nagham H. Saeed
,
Heba L. Al-Taie
An Efficient Information Retrieval System Using Evolutionary Algorithms.
Network
2 (4) (2022)
Garett T. Fox
,
Rajendra V. Boppana
Detection of Malicious Network Flows with Low Preprocessing Overhead.
Network
2 (4) (2022)