Login / Signup
Network
Publications
volume 4, number 1, 2024
Nadia Niknami
,
Jie Wu
IDSMatch: A Novel Deployment Method for IDS Chains in SDNs.
Network
4 (1) (2024)
Oliver J. Hall
,
Stavros Shiaeles
,
Fudong Li
A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities.
Network
4 (1) (2024)
Herbert Maosa
,
Karim Ouazzane
,
Mohamed Chahine Ghanem
A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.
Network
4 (1) (2024)
Paraskevi Christodoulou
,
Konstantinos Limniotis
Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges.
Network
4 (1) (2024)
João J. O. Pires
On the Capacity of Optical Backbone Networks.
Network
4 (1) (2024)
Hanin Almutairi
,
Ning Zhang
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach.
Network
4 (1) (2024)
volume 4, number 2, 2024
Harsha Kandula
,
Veena Chidurala
,
Yuan Cao
,
Xinrong Li
Localization of a BLE Device Based on Single-Device RSSI and DOA Measurements.
Network
4 (2) (2024)
Mounya Smara
,
Al-Sakib Khan Pathan
An Enhanced Mechanism for Fault Tolerance in Agricultural Wireless Sensor Networks.
Network
4 (2) (2024)
Jan Herbst
,
Matthias Rüb
,
Sogo Pierre Sanon
,
Christoph Lipps
,
Hans D. Schotten
Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach.
Network
4 (2) (2024)
Mourad Ouadou
,
Rachid Mafamane
,
Khalid Minaoui
A Hybrid Anti-Collision Protocol Based on Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for Radio Frequency Identification (RFID) Readers.
Network
4 (2) (2024)
Sadaf ul Zuhra
,
Prasanna Chaporkar
,
Abhay Karandikar
,
H. Vincent Poor
Multi-Connectivity for Multicast Video Streaming in Cellular Networks.
Network
4 (2) (2024)
volume 4, number 3, 2024
Aris Castillo
,
Carlos Juiz
,
Belén Bermejo
Delay and Disruption Tolerant Networking for Terrestrial and TCP/IP Applications: A Systematic Literature Review.
Network
4 (3) (2024)
Evianita Dewi Fajrianti
,
Yohanes Yohanie Fridelin Panduman
,
Nobuo Funabiki
,
Amma Liesvarastranta Haz
,
Komang Candra Brata
,
Sritrusta Sukaridhoto
A User Location Reset Method through Object Recognition in Indoor Navigation System Using Unity and a Smartphone (INSUS).
Network
4 (3) (2024)
Mohammed El-Hajj
,
Teklit Haftu Gebremariam
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0.
Network
4 (3) (2024)
volume 3, number 1, 2023
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Edge Data Center Organization and Optimization by Using Cage Graphs.
Network
3 (1) (2023)
Ricardo Lent
Improving Bundle Routing in a Space DTN by Approximating the Transmission Time of the Reliable LTP.
Network
3 (1) (2023)
Ali Al-Allawee
,
Pascal Lorenz
,
Abdelhafid Abouaissa
,
Mosleh M. Abualhaj
A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol.
Network
3 (1) (2023)
Md. Mamunur Rashid
,
Shahriar Usman Khan
,
Fariha Eusufzai
,
Md. Azharuddin Redwan
,
Saifur Rahman Sabuj
,
Mahmoud A. El-Sharief
A Federated Learning-Based Approach for Improving Intrusion Detection in Industrial Internet of Things Networks.
Network
3 (1) (2023)
Dominick Ta
,
Stephanie Booth
,
Rachel Dudukovich
Towards Software-Defined Delay Tolerant Networks.
Network
3 (1) (2023)
Naresh Adhikari
,
Mahalingam Ramkumar
IoT and Blockchain Integration: Applications, Opportunities, and Challenges.
Network
3 (1) (2023)
Andrea Piroddi
,
Maurizio Torregiani
Machine Learning Applied to LoRaWAN Network for Improving Fingerprint Localization Accuracy in Dense Urban Areas.
Network
3 (1) (2023)
Muna Al-Saadi
,
Asiya Khan
,
Vasilios I. Kelefouras
,
David J. Walker
,
Bushra Al-Saadi
SDN-Based Routing Framework for Elephant and Mice Flows Using Unsupervised Machine Learning.
Network
3 (1) (2023)
Mikhail Zolotukhin
,
Di Zhang
,
Timo Hämäläinen
,
Parsa Miraghaei
On Attacking Future 5G Networks with Adversarial Examples: Survey.
Network
3 (1) (2023)
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Formal Algebraic Model of an Edge Data Center with a Redundant Ring Topology.
Network
3 (1) (2023)
volume 3, number 2, 2023
Takato Fukugami
,
Tomofumi Matsuzawa
Improvement of Network Flow Using Multi-Commodity Flow Problem.
Network
3 (2) (2023)
Sampath Edirisinghe
,
Orga Galagedarage
,
Pubuduni Imali Dias
,
Chathurika Ranaweera
Recent Development of Emerging Indoor Wireless Networks towards 6G.
Network
3 (2) (2023)
Laura Galluccio
,
Joannes Sam Mertens
,
Giacomo Morabito
Clustered Distributed Learning Exploiting Node Centrality and Residual Energy (CINE) in WSNs.
Network
3 (2) (2023)
volume 3, number 3, 2023
Patikiri Arachchige Don Shehan Nilmantha Wijesekara
,
Subodha Gunawardena
A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges.
Network
3 (3) (2023)
Gia Khanh Tran
,
Takuto Kamei
,
Shoma Tanaka
Route Optimization of Unmanned Aerial Vehicle Sensors for Localization of Wireless Emitters in Outdoor Environments.
Network
3 (3) (2023)
Aljuhara Alshagri
,
Abdulmohsen Mutairi
Evaluation of Modern Internet Transport Protocols over GEO Satellite Links.
Network
3 (3) (2023)
Milan Chauhan
,
Stavros Shiaeles
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions.
Network
3 (3) (2023)
Pedro Juan Roig
,
Salvador Alcaraz
,
Katja Gilly
,
Cristina Bernad
,
Carlos Juiz
Arithmetic Study about Efficiency in Network Topologies for Data Centers.
Network
3 (3) (2023)
volume 3, number 4, 2023
Hadeel Alrubayyi
,
Gokop Goteng
,
Mona Jaber
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities.
Network
3 (4) (2023)
John P. Baugh
,
Jinhua Guo
Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches.
Network
3 (4) (2023)
Hamza Chahed
,
Andreas Kassler
TSN Network Scheduling - Challenges and Approaches.
Network
3 (4) (2023)
Juexing Wang
,
Xiao Zhang
,
Li Xiao
,
Tianxing Li
Survey for Soil Sensing with IOT and Traditional Systems.
Network
3 (4) (2023)
Mohamed Ali Setitra
,
Mingyu Fan
,
Bless Lord Y. Agbley
,
Zine El Abidine Bensalem
Optimized MLP-CNN Model to Enhance Detecting DDoS Attacks in SDN Environment.
Network
3 (4) (2023)
Yujin Nakano
,
Tomofumi Matsuzawa
Preventing Black Hole Attacks in AODV Using RREQ Packets.
Network
3 (4) (2023)
Nadia Niknami
,
Avinash Srinivasan
,
Ken St. Germain
,
Jie Wu
Maritime Communications - Current State and the Future Potential with SDN and SDR.
Network
3 (4) (2023)
volume 2, number 3, 2022
Tomofumi Matsuzawa
,
Kyosuke Ichikawa
Implementation and Evaluation of HTTP/3 Connectivity Check Using Happy Eyeballs Algorithm.
Network
2 (3) (2022)
volume 2, number 4, 2022
Tariq Daradkeh
,
Anjali Agarwal
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning.
Network
2 (4) (2022)
John Kafke
,
Thiago Viana
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems.
Network
2 (4) (2022)
Babatunde Ojetunde
,
Naoto Egashira
,
Kenta Suzuki
,
Takuya Kurihara
,
Kazuto Yano
,
Yoshinori Suzuki
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network.
Network
2 (4) (2022)
Radheshyam Singh
,
José Soler
,
Tidiane Sylla
,
Léo Mendiboure
,
Marion Berbineau
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial.
Network
2 (4) (2022)
Gia Khanh Tran
,
Masanori Ozasa
,
Jin Nakazato
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations.
Network
2 (4) (2022)
Maria Papathanasaki
,
Panagiotis Fountas
,
Kostas Kolomvatsos
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications.
Network
2 (4) (2022)
Ahmed Osama Basil Al-Mashhadani
,
Mu Mu
,
Ali Al-Sharbaz
Quality of Experience Experimentation Prediction Framework through Programmable Network Management.
Network
2 (4) (2022)
Shaharyar Khan
,
Stuart E. Madnick
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach.
Network
2 (4) (2022)
Doaa N. Mhawi
,
Haider W. Oleiwi
,
Nagham H. Saeed
,
Heba L. Al-Taie
An Efficient Information Retrieval System Using Evolutionary Algorithms.
Network
2 (4) (2022)
Garett T. Fox
,
Rajendra V. Boppana
Detection of Malicious Network Flows with Low Preprocessing Overhead.
Network
2 (4) (2022)