Login / Signup
J. Netw. Comput. Appl.
1998
2008
2013
2024
1998
2024
Keyphrases
Publications
volume 231, 2024
Yi-Xiang Wang
,
Yu-Ling Hsueh
A low-storage synchronization framework for blockchain systems.
J. Netw. Comput. Appl.
231 (2024)
Zeli Wang
,
Weiqi Dai
,
Ming Li
,
Kim-Kwang Raymond Choo
,
Deqing Zou
DFier: A directed vulnerability verifier for Ethereum smart contracts.
J. Netw. Comput. Appl.
231 (2024)
Michael Frey
,
Thomas Evans
,
Angela Folz
,
Mary Gregg
,
Jeanne T. Quimby
,
Jacob D. Rezac
Anomalous state detection in radio access networks: A proof-of-concept.
J. Netw. Comput. Appl.
231 (2024)
Jitesh Pradhan
,
Ashish Singh
,
Abhinav Kumar
,
Muhammad Khurram Khan
Skin lesion classification using modified deep and multi-directional invariant handcrafted features.
J. Netw. Comput. Appl.
231 (2024)
Rong Zheng
,
Xiaoqin Feng
,
Fengyuan Ren
Designing transport scheme of 3D naked-eye system.
J. Netw. Comput. Appl.
231 (2024)
Devi D
,
Godfrey Winster Sathianesan
HRMF-DRP: A next-generation solution for overcoming provisioning challenges in cloud environments.
J. Netw. Comput. Appl.
231 (2024)
Yingya Guo
,
Mingjie Ding
,
Weihong Zhou
,
Bin Lin
,
Cen Chen
,
Huan Luo
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks.
J. Netw. Comput. Appl.
231 (2024)
Alain Bertrand Bomgni
,
Garrik Brel Jagho Mdemaya
,
Miguel Landry Foko Sindjoung
,
Mthulisi Velempini
,
Celine Cabrelle Tchuenko Djoko
,
Jean Frédéric Myoupo
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks.
J. Netw. Comput. Appl.
231 (2024)
Subhra Priyadarshini Biswal
,
Sanjeev Patel
A bandwidth delay product based modified Veno for high-speed networks: BDP-Veno.
J. Netw. Comput. Appl.
231 (2024)
volume 230, 2024
Rikhi Ram Jagat
,
Dilip Singh Sisodia
,
Pradeep Singh
Exploiting web content semantic features to detect web robots from weblogs.
J. Netw. Comput. Appl.
230 (2024)
Jong Wook Kim
,
Beakcheol Jang
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey.
J. Netw. Comput. Appl.
230 (2024)
Ala Altaweel
,
Sidra Aslam
,
Ibrahim Kamel
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks.
J. Netw. Comput. Appl.
230 (2024)
Seyedeh Soheila Shaabanzadeh
,
Marc Carrascosa-Zamacois
,
Juan Sánchez-González
,
Costas Michaelides
,
Boris Bellalta
Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques.
J. Netw. Comput. Appl.
230 (2024)
Mohand Yazid Saidi
,
Issam Abdeldjalil Ikhelef
,
Shuopeng Li
,
Ken Chen
Constrained routing in multi-partite graph to solve VNF placement and chaining problem.
J. Netw. Comput. Appl.
230 (2024)
Muhammad Abdullah
,
Humayun Zubair Khan
,
Umair Fakhar
,
Ahmad Naeem Akhtar
,
Shuja Ansari
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks.
J. Netw. Comput. Appl.
230 (2024)
Orlando Landrove
,
Rufino Cabrera
,
Eneko Iradier
,
Erick Jimenez
,
Pablo Angueira
,
Jon Montalban
Broadcast/multicast delivery integration in B5G/6G environments.
J. Netw. Comput. Appl.
230 (2024)
Yue Li
,
Yingjian Liu
,
Haoyu Yin
,
Zhongwen Guo
,
Yu Wang
RECAR: Robust and efficient collision-avoiding routing for 3D underwater named data networking.
J. Netw. Comput. Appl.
230 (2024)
Libin Yang
,
Wei Lou
On designing a profitable system model to harmonize the tripartite dissension in content delivery applications.
J. Netw. Comput. Appl.
230 (2024)
Muhammad Tahir Abbas
,
Karl-Johan Grinnemo
,
Guillaume Ferré
,
Philippe Laurent
,
Stefan Alfredsson
,
Mohammad Rajiullah
,
Johan Eklund
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things.
J. Netw. Comput. Appl.
230 (2024)
Lázaro Bustio-Martínez
,
Vitali Herrera-Semenets
,
Juan-Luis García-Mendoza
,
Miguel Ángel Álvarez-Carmona
,
Jorge Ángel González Ordiano
,
Luis N. Zúñiga-Morales
,
José Emilio Quíroz-Ibarra
,
Pedro Antonio Santander-Molina
,
Jan van den Berg
Uncovering phishing attacks using principles of persuasion analysis.
J. Netw. Comput. Appl.
230 (2024)
Yingze Liu
,
Yuanbo Guo
CL-AP2: A composite learning approach to attack prediction via attack portraying.
J. Netw. Comput. Appl.
230 (2024)
Noureddine Mouhoub
,
Maria Moloney
,
Damien Magoni
Metarouting with automatic tunneling in multilayer networks.
J. Netw. Comput. Appl.
230 (2024)
Man Li
,
Huachun Zhou
,
Shuangxing Deng
Parallel path selection mechanism for DDoS attack detection.
J. Netw. Comput. Appl.
230 (2024)
El-hacen Diallo
,
Mohameden Dieye
,
Omar Dib
,
Pierre Valiorgue
An agnostic and secure interoperability protocol for seamless asset movement.
J. Netw. Comput. Appl.
230 (2024)
Zainab Hassan Ali
,
Nora El-Rashidy
,
Mostafa A. Elhosseini
,
Sarah M. Ayyad
SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET.
J. Netw. Comput. Appl.
230 (2024)
Sekione Reward Jeremiah
,
Haotian Chen
,
Stefanos Gritzalis
,
Jong Hyuk Park
Leveraging application permissions and network traffic attributes for Android ransomware detection.
J. Netw. Comput. Appl.
230 (2024)
Sulyman Age Abdulkareem
,
Chuan Heng Foh
,
François Carrez
,
Klaus Moessner
A lightweight SEL for attack detection in IoT/IIoT networks.
J. Netw. Comput. Appl.
230 (2024)
Namkyung Yoon
,
Hwangnam Kim
Detecting DDoS based on attention mechanism for Software-Defined Networks.
J. Netw. Comput. Appl.
230 (2024)
Yakoub Mordjana
,
Badis Djamaa
,
Mustapha Réda Senouci
,
Aymen Herzallah
A Contextual Multi-Armed Bandit approach for NDN forwarding.
J. Netw. Comput. Appl.
230 (2024)
Emna Baccour
,
Aiman Erbad
,
Amr Mohamed
,
Mounir Hamdi
,
Mohsen Guizani
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems.
J. Netw. Comput. Appl.
230 (2024)
Riya Goyal
,
Abhinav Tomar
Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks.
J. Netw. Comput. Appl.
230 (2024)
Guangchen Chen
,
Benjie Shi
,
Yinhui Zhang
,
Zifen He
,
Pengcheng Zhang
CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake.
J. Netw. Comput. Appl.
230 (2024)
Quang Tuan Do
,
Duc Thien Hua
,
Anh-Tien Tran
,
Dongwook Won
,
Geeranuch Woraphonbenjakul
,
Wonjong Noh
,
Sungrae Cho
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network.
J. Netw. Comput. Appl.
230 (2024)
Diana Hawashin
,
Mohamed Nemer
,
Senay A. Gebreab
,
Khaled Salah
,
Raja Jayaraman
,
Muhammad Khurram Khan
,
Ernesto Damiani
Blockchain applications in UAV industry: Review, opportunities, and challenges.
J. Netw. Comput. Appl.
230 (2024)
K. G. Raghavendra Narayan
,
Rakesh Ganesula
,
Tamminaina Sai Somasekhar
,
Srijanee Mookherji
,
Vanga Odelu
,
Rajendra Prasath
,
Alavalapati Goutham Reddy
Attenuating majority attack class bias using hybrid deep learning based IDS framework.
J. Netw. Comput. Appl.
230 (2024)
B. Padmavathi
,
Vanaja Selvaraj
Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking.
J. Netw. Comput. Appl.
230 (2024)
volume 229, 2024
Anmol Kumar
,
Mayank Agarwal
Quick service during DDoS attacks in the container-based cloud environment.
J. Netw. Comput. Appl.
229 (2024)
Weitao Yang
,
Li Pan
,
Shijun Liu
Caching or not: An online cost optimization algorithm for geodistributed data analysis in cloud environments.
J. Netw. Comput. Appl.
229 (2024)
Jie Ma
,
Wei Su
,
Yikun Li
,
Yuan Yuan
,
Ziqing Zhang
Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN.
J. Netw. Comput. Appl.
229 (2024)
Ying-Dar Lin
,
Hao-Xuan Huang
,
Didik Sudyana
,
Yuan-Cheng Lai
AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities.
J. Netw. Comput. Appl.
229 (2024)
Hua Qin
,
Ni Li
,
Tao Wang
,
Gelan Yang
,
Yang Peng
CDT: Cross-interface Data Transfer scheme for bandwidth-efficient LoRa communications in energy harvesting multi-hop wireless networks.
J. Netw. Comput. Appl.
229 (2024)
Javad Mohajerani
,
Mokhtar Mohammadi Ghanatghestani
,
Malihe Hashemipour
MCTE-RPL: A multi-context trust-based efficient RPL for IoT.
J. Netw. Comput. Appl.
229 (2024)
Sami Nadif
,
Essaid Sabir
,
Halima Elbiaze
,
Abdelkrim Haqiq
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective.
J. Netw. Comput. Appl.
229 (2024)
Wendi Feng
,
Ke Liu
,
Shuo Sun
,
Bo Cheng
,
Wei Zhang
Seraph: Towards secure and efficient multi-controller authentication with (t,n)-threshold signature in multi-domain SDWAN.
J. Netw. Comput. Appl.
229 (2024)
Mingjie Ding
,
Yingya Guo
,
Zebo Huang
,
Bin Lin
,
Huan Luo
GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning.
J. Netw. Comput. Appl.
229 (2024)
Van Tong
,
Sami Souihi
,
Hai Anh Tran
,
Abdelhamid Mellouk
Troubleshooting solution for traffic congestion control.
J. Netw. Comput. Appl.
229 (2024)
Xu Zhao
,
Yichuan Wu
,
Tianhao Zhao
,
Feiyu Wang
,
Maozhen Li
Federated deep reinforcement learning for task offloading and resource allocation in mobile edge computing-assisted vehicular networks.
J. Netw. Comput. Appl.
229 (2024)
Sana Younès
,
Maroua Idi
Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network.
J. Netw. Comput. Appl.
229 (2024)
Antonio Matencio-Escolar
,
Qi Wang
,
José Maria Alcaraz Calero
Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments.
J. Netw. Comput. Appl.
229 (2024)
Tao Ju
,
Linjuan Li
,
Shuai Liu
,
Yu Zhang
A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning.
J. Netw. Comput. Appl.
229 (2024)