default search action
Journal of Network and Systems Management, Volume 27
Volume 27, Number 1, January 2019
- Luciano Paschoal Gaspary:
Message from the New Editor-in-Chief. 1-2 - Anisa Allahdadi, Ricardo Morla:
Anomaly Detection and Modeling in 802.11 Wireless Networks. 3-38 - Christos Katris, Sophia Daskalaki:
Dynamic Bandwidth Allocation for Video Traffic Using FARIMA-Based Forecasting Models. 39-65 - Mukalel Bhaskaran Smithamol, Rajeswari Sridhar:
TMM: Trust Management Middleware for Cloud Service Selection by Prioritization. 66-92 - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:
Enhancing the Accuracy of Intrusion Detection Systems by Reducing the Rates of False Positives and False Negatives Through Multi-objective Optimization. 93-120 - Priyanka Das, Pratyush Nishantkar, Tanmay De:
SECA on MIA-DTN: Tackling the Energy Issue in Monitor Incorporated Adaptive Delay Tolerant Network Using a Simplistic Energy Conscious Approach. 121-148 - JungYul Choi:
Virtual Machine Placement Algorithm for Energy Saving and Reliability of Servers in Cloud Data Centers. 149-165 - Liudong Zuo, Michelle M. Zhu, Chia-Han Chang:
Optimizing Trade-Off Between Cost and Performance of Data Transfers Using Bandwidth Reservation in Dedicated Networks. 166-187 - Sandrine Vaton, Olivier Brun, Maxime Mouchet, Pablo Belzarena, Isabel Amigo, Balakrishna J. Prabhu, Thierry Chonavel:
Joint Minimization of Monitoring Cost and Delay in Overlay Networks: Optimal Policies with a Markovian Approach. 188-232 - Michele Girolami, Dimitri Belli, Stefano Chessa:
Collaborative Service Discovery in Mobile Social Networks. 233-268 - Rafael de Jesus Martins, Luis Augusto Dias Knob, Eduardo Germano da Silva, Juliano Araujo Wickboldt, Alberto E. Schaeffer Filho, Lisandro Zambenedetti Granville:
Specialized CSIRT for Incident Response Management in Smart Grids. 269-285 - Acknowledgment to Reviewers. 286-287
Volume 27, Number 2, April 2019
- Hojjat Jahani, Saeed Jalili:
Online Tor Privacy Breach Through Website Fingerprinting Attack. 289-326 - Meenakshi Munjal, Niraj Pratap Singh:
QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network. 327-350 - Zhengbing Hu, Vadym E. Mukhin, Yaroslav Kornaga, Oksana Herasymenko, Yevgenii Mostoviy:
The Analytical Model for Distributed Computer System Parameters Control Based on Multi-factoring Estimations. 351-365 - Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed:
Using the TSP Solution Strategy for Cloudlet Scheduling in Cloud Computing. 366-387 - Rafael Lopes Gomes, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira:
FUZA: An Algorithm for Definition of Reliable Virtual Networks to the Edge as a Service Paradigm. 388-408 - Shengli Pan, Yingjie Zhou, Zhiyong Zhang, Song Yang, Feng Qian, Guangmin Hu:
Identify Congested Links with Network Tomography Under Multipath Routing. 409-429 - Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks. 430-462 - Wen-Pin Chen, Ang-Hsun Tsai, Chung-Hsien Tsai:
Smart Traffic Offloading with Mobile Edge Computing for Disaster-Resilient Communication Networks. 463-488 - Kanwal Mahmud, Muhammad Usman:
Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review. 489-540 - Myung-Sup Kim, Haruo Oishi, Jiun-Long Huang, Hongtaek Ju, Kiyohito Yoshihara, Chih-Wei Yi, Taesang Choi:
Managing a World of Things: A Report on APNOMS2017. 541-549
Volume 27, Number 3, July 2019
- Marcelo Frate, Marcelo K. Marczuk, Fábio Luciano Verdi:
OrchFlow: An Architecture for Orchestration of Multiple Controllers in OpenFlow Networks. 551-572 - A. Ranjith Kumar, A. Sivagami:
Security Aware Multipath Routing Protocol for WMSNs for Minimizing Effect of Compromising Attacks. 573-599 - Tao Zhang, Qi Liao:
Dynamic Link Anomaly Analysis for Network Security Management. 600-624 - V. Viji Rajendran, S. Swamynathan:
SD-CSR: Semantic-Based Distributed Cloud Service Registry in Unstructured P2P Networks for Augmenting Cloud Service Discovery. 625-646 - Abdel-Rahman Hedar, Rashad Ismail, Gamal A. El-Sayed, Khalid M. Jamil Khayyat:
Two Meta-Heuristics Designed to Solve the Minimum Connected Dominating Set Problem for Wireless Networks Design and Management. 647-687 - Elina Pacini, Lucas Iacono, Cristian Mateos, Carlos García Garino:
A Bio-inspired Datacenter Selection Scheduler for Federated Clouds and Its Application to Frost Prediction. 688-729 - Adrián Flores De La Cruz, Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja:
OpenFlow Compatible Key-Based Routing Protocol: Adapting SDN Networks to Content/Service-Centric Paradigm. 730-755 - Hewei Yu, Biao Zhang:
A Hybrid MADM Algorithm Based on Attribute Weight and Utility Value for Heterogeneous Network Selection. 756-783 - Matias Richart, Javier Baliosian, Joan Serrat, Juan-Luis Gorricho, Ramón Agüero:
Slicing in WiFi Networks Through Airtime-Based Resource Allocation. 784-814 - Guoqiang Gao, Ruixuan Li:
Collaborative Caching in P2P Streaming Networks. 815-836
Volume 27, Number 4, October 2019
- Therdpong Daengsi, Pongpisit Wuttidittachotti:
QoE Modeling for Voice over IP: Simplified E-model Enhancement Utilizing the Subjective MOS Prediction Model: A Case of G.729 and Thai Users. 837-859 - Xiuchen Qie, Shunfu Jin, Wuyi Yue:
An Energy-Efficient Strategy for Virtual Machine Allocation over Cloud Data Centers. 860-882 - Fatma M. Talaat, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali:
Effective Load Balancing Strategy (ELBS) for Real-Time Fog Computing Environment Using Fuzzy and Probabilistic Neural Networks. 883-929 - Mahdi Nazari Cheraghlou, Ahmad Khademzadeh, Majid Haghparast:
New Fuzzy-Based Fault Tolerance Evaluation Framework for Cloud Computing. 930-948 - Tomotaka Kimura, Takaya Suzuki, Kouji Hirata, Masahiro Muraguchi:
Residual Capacity-Aware Virtual Machine Assignment for Reducing Network Loads in Multi-tenant Data Center Networks. 949-971 - Yonal Kirsal, Glenford Mapp, Fragkiskos Sardis:
Using Advanced Handover and Localization Techniques for Maintaining Quality-of-Service of Mobile Users in Heterogeneous Cloud-Based Environment. 972-997 - Roaa Shubbar, Mahmood Ahmadi:
A Filter-Based Design of Pending Interest Table in Named Data Networking. 998-1019 - Sarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Lightweight and Secure Password Based Smart Home Authentication Protocol: LSP-SHAP. 1020-1042
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.