Sign in
J. Netw. Comput. Appl.
1998
2007
2015
2024
1998
2024
Keyphrases
Publications
volume 223, 2024
Eunjin Kim
,
Junsu Kim
,
Jae-Hyun Kim
,
Howon Lee
HiMAQ: Hierarchical multi-agent Q-learning-based throughput and fairness improvement for UAV-Aided IoT networks.
J. Netw. Comput. Appl.
223 (2024)
Harpreet Kaur
,
Simranjit Singh
,
Ranjit Kaur
,
Rajandeep Singh
Advances in fronthauling of communication technologies: A review.
J. Netw. Comput. Appl.
223 (2024)
Muhammad Adil
,
Houbing Song
,
Muhammad Khurram Khan
,
Ahmed Farouk
,
Zhanpeng Jin
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions.
J. Netw. Comput. Appl.
223 (2024)
Ming Zhou
,
Zhen Yang
,
Haiyang Yu
,
Shui Yu
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain.
J. Netw. Comput. Appl.
223 (2024)
Omar Lajam
,
Salahadin Mohammed
Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions.
J. Netw. Comput. Appl.
223 (2024)
Shah Zeb
,
Aamir Mahmood
,
Sunder Ali Khowaja
,
Kapal Dev
,
Syed Ali Hassan
,
Mikael Gidlund
,
Paolo Bellavista
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey.
J. Netw. Comput. Appl.
223 (2024)
Hao Hao
,
Wei Ding
,
Wei Zhang
Time-continuous computing offloading algorithm with user fairness guarantee.
J. Netw. Comput. Appl.
223 (2024)
Muna Al-Hawawreh
,
Mamoun Alazab
,
Mohamed Amine Ferrag
,
M. Shamim Hossain
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms.
J. Netw. Comput. Appl.
223 (2024)
Naser AlDuaij
mPillBox: An open framework for a smarter pillbox.
J. Netw. Comput. Appl.
223 (2024)
Xiaobo Yu
,
Weizhi Meng
,
Yi-Ning Liu
,
Fei Zhou
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications.
J. Netw. Comput. Appl.
223 (2024)
Jeongho Kang
,
Kwangsue Chung
RL-based HTTP adaptive streaming with edge collaboration in multi-client environment.
J. Netw. Comput. Appl.
223 (2024)
Vincenzo Agate
,
Pierluca Ferraro
,
Giuseppe Lo Re
,
Sajal K. Das
BLIND: A privacy preserving truth discovery system for mobile crowdsensing.
J. Netw. Comput. Appl.
223 (2024)
volume 222, 2024
Mohammed Shurrab
,
Dunia Amin J. Mahboobeh
,
Rabeb Mizouni
,
Shakti Singh
,
Hadi Otrok
Overcoming cold start and sensor bias: A deep learning-based framework for IoT-enabled monitoring applications.
J. Netw. Comput. Appl.
222 (2024)
Shahmir Khan Mohammed
,
Shakti Singh
,
Rabeb Mizouni
,
Hadi Otrok
TRACE: Transformer-based continuous tracking framework using IoT and MCS.
J. Netw. Comput. Appl.
222 (2024)
David Herranz-Oliveros
,
Ivan Marsá-Maestre
,
José Manuel Giménez-Guzmán
,
Marino Tejedor-Romero
,
Enrique de la Hoz
Surgical immunization strategies against lateral movement in Active Directory environments.
J. Netw. Comput. Appl.
222 (2024)
Ali El Kamel
Using FlowVisor and evolutionary algorithms to improve the switch migration in SDN.
J. Netw. Comput. Appl.
222 (2024)
Hongwei Zhang
,
Wei Fan
,
Jinsong Wang
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges.
J. Netw. Comput. Appl.
222 (2024)
Gabriel F. C. de Queiroz
,
José Ferreira de Rezende
,
Valmir C. Barbosa
A flexible algorithm to offload DAG applications for edge computing.
J. Netw. Comput. Appl.
222 (2024)
Puneet Kumar
,
Behnam Dezfouli
quicSDN: Transitioning from TCP to QUIC for southbound communication in software-defined networks.
J. Netw. Comput. Appl.
222 (2024)
Mohammed Alabbad
,
Neerja Mhaskar
,
Ridha Khédri
Two formal design solutions for the generalization of network segmentation.
J. Netw. Comput. Appl.
222 (2024)
Sabir Saheel
,
Anik Alvi
,
Aninda Roy Ani
,
Tarem Ahmed
,
Mohammad Faisal Uddin
Semi-supervised, Neural Network based approaches to face mask and anomaly detection in surveillance networks.
J. Netw. Comput. Appl.
222 (2024)
Yuxiao Qi
,
Li Pan
,
Shijun Liu
An online bi-objective scheduling algorithm for service provisioning in cloud computing.
J. Netw. Comput. Appl.
222 (2024)
Wanqi Yang
,
Pengfei Chen
,
Guangba Yu
,
Haibin Zhang
,
Huxing Zhang
Network shortcut in data plane of service mesh with eBPF.
J. Netw. Comput. Appl.
222 (2024)
Yuanhang Qi
,
M. Shamim Hossain
Harnessing federated generative learning for green and sustainable Internet of Things.
J. Netw. Comput. Appl.
222 (2024)
Zihang Zhen
,
Xiaoding Wang
,
Hui Lin
,
Sahil Garg
,
Prabhat Kumar
,
M. Shamim Hossain
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems.
J. Netw. Comput. Appl.
222 (2024)
volume 221, 2024
Pranjal Kumar Nandi
,
Md. Rejaul Islam Reaj
,
Sujan Sarker
,
Md. Abdur Razzaque
,
Md. Mamun-Or-Rashid
,
Palash Roy
Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things.
J. Netw. Comput. Appl.
221 (2024)
Shaik Sharmila
,
Ch. Aparna
Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter.
J. Netw. Comput. Appl.
221 (2024)
Shahid Latif
,
Wadii Boulila
,
Anis Koubaa
,
Zhuo Zou
,
Jawad Ahmad
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm.
J. Netw. Comput. Appl.
221 (2024)
Rongji Liao
,
Yuan Zhang
,
Jinyao Yan
,
Yang Cai
,
Narisu Tao
STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning.
J. Netw. Comput. Appl.
221 (2024)
S. Periyanayagi
,
S. P. Raja
,
S. Vairachilai
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks.
J. Netw. Comput. Appl.
221 (2024)
Ruijin Wang
,
Jinshan Lai
,
Xiong Li
,
Donglin He
,
Muhammad Khurram Khan
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things.
J. Netw. Comput. Appl.
221 (2024)
Shunmugapriya Ramanathan
,
Abhishek Bhattacharyya
,
Koteswararao Kondepu
,
Andrea Fumagalli
Enabling containerized Central Unit live migration in 5G radio access network: An experimental study.
J. Netw. Comput. Appl.
221 (2024)
Ala Altaweel
,
Sidra Aslam
,
Ibrahim Kamel
Security attacks in Opportunistic Mobile Networks: A systematic literature review.
J. Netw. Comput. Appl.
221 (2024)
Mustafa Ibrahim Khaleel
Region-aware dynamic job scheduling and resource efficiency for load balancing based on adaptive chaotic sparrow search optimization and coalitional game in cloud computing environments.
J. Netw. Comput. Appl.
221 (2024)
Ali Nauman
,
Haya Mesfer Alshahrani
,
Nadhem Nemri
,
Kamal M. Othman
,
Nojood O. Aljehane
,
Mashael S. Maashi
,
Ashit Kumar Dutta
,
Mohammed Assiri
,
Wali Ullah Khan
Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning.
J. Netw. Comput. Appl.
221 (2024)
Dénes László Fekete
,
Attila Kiss
Trust-minimized optimistic cross-rollup arbitrary message bridge.
J. Netw. Comput. Appl.
221 (2024)
Cristiano Costa Argemon Vieira
,
Luiz Fernando Bittencourt
,
Thiago Augusto Lopes Genez
,
Maycon Leone Maciel Peixoto
,
Edmundo Roberto Mauro Madeira
RAaaS: Resource Allocation as a Service in multiple cloud providers.
J. Netw. Comput. Appl.
221 (2024)
Guangxuan He
,
Chunlin Li
,
Yong Shu
,
Youlong Luo
Fine-grained access control policy in blockchain-enabled edge computing.
J. Netw. Comput. Appl.
221 (2024)
Sachin Kadam
,
Kaustubh S. Bhargao
,
Gaurav S. Kasbekar
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station.
J. Netw. Comput. Appl.
221 (2024)
Miguel Rodríguez-Pérez
,
Sergio Herrería-Alonso
,
José Carlos López-Ardao
,
Raúl Fernando Rodríguez Rubio
End-to-end active queue management with Named-Data Networking.
J. Netw. Comput. Appl.
221 (2024)
Fatma Foad Ashrif
,
Elankovan A. Sundararajan
,
Rami Ahmad
,
Mohammad Kamrul Hasan
,
Elaheh Yadegaridehkordi
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction.
J. Netw. Comput. Appl.
221 (2024)
Jean Nestor M. Dahj
,
Kingsley A. Ogudo
,
Leandro Boonzaaier
A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks.
J. Netw. Comput. Appl.
221 (2024)
Peiying Zhang
,
Zhihu Luo
,
Neeraj Kumar
,
Mohsen Guizani
,
Hongxia Zhang
,
Jian Wang
CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks.
J. Netw. Comput. Appl.
221 (2024)
Songyut Phoemphon
,
Nutthanon Leelathakul
,
Chakchai So-In
An enhanced node segmentation and distance estimation scheme with a reduced search space boundary and improved PSO for obstacle-aware wireless sensor network localization.
J. Netw. Comput. Appl.
221 (2024)
Angel Cañete
,
Mercedes Amor
,
Lidia Fuentes
HADES: An NFV solution for energy-efficient placement and resource allocation in heterogeneous infrastructures.
J. Netw. Comput. Appl.
221 (2024)
Anitha P.
,
Vimala H. S.
,
Shreyas J.
Comprehensive review on congestion detection, alleviation, and control for IoT networks.
J. Netw. Comput. Appl.
221 (2024)
Shie-Yuan Wang
,
Cheng-Da Lin
Using deep reinforcement learning to train and periodically re-train a data-collecting drone based on real-life measurements.
J. Netw. Comput. Appl.
221 (2024)
Wu Chen
,
Jiayi Zhu
,
Jiajia Liu
,
Hongzhi Guo
A fast coordination approach for large-scale drone swarm.
J. Netw. Comput. Appl.
221 (2024)
volume 220, 2023
Hamza Kheddar
,
Yassine Himeur
,
Ali Ismail Awad
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review.
J. Netw. Comput. Appl.
220 (2023)
Zarrin Tasnim Sworna
,
Zahra Mousavi
,
Muhammad Ali Babar
NLP methods in host-based intrusion detection systems: A systematic review and future directions.
J. Netw. Comput. Appl.
220 (2023)