


default search action
IEEE Transactions on Network and Service Management, Volume 20
Volume 20, Number 1, March 2023
- Pramit Biswas, Md Shahbaz Akhtar, Sriparna Saha

, Sudhan Majhi
, Aneek Adhya
:
Q-Learning-Based Energy-Efficient Network Planning in IP-Over-EON. 3-13 - Marco Polverini

, Antonio Cianfrani
, Marco Listanti
, Giulio Siano
, Francesco Giacinto Lavacca
, Carlo Candeloro Campanile
:
Investigating on Black Holes in Segment Routing Networks: Identification and Detection. 14-29 - Hua Wu

, Ya Liu, Shanshan Ni, Guang Cheng
, Xiaoyan Hu
:
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data. 30-45 - Rui Zhuang

, Jiangping Han
, Kaiping Xue
, Jian Li
, David S. L. Wei
, Ruidong Li
, Qibin Sun, Jun Lu:
Achieving Flexible and Lightweight Multipath Congestion Control Through Online Learning. 46-59 - Lei Wang

, Anmin Yin
, Xue Jiang
, Mingkai Chen
, Kapal Dev
, Nawab Muhammad Faseeh Qureshi
, Jiming Yao, Baoyu Zheng
:
Resource Allocation for Multi-Traffic in Cross-Modal Communications. 60-72 - Yujie Song, Kai Jiang

, Yue Cao
, Ruiting Zhou
, Chakkaphong Suthaputchakun
, Yuan Zhuang
:
STALB: A Spatio-Temporal Domain Autonomous Load Balancing Routing Protocol. 73-87 - Haonan Bai

, Yong Zhang
, Zhenyu Zhang, Siyu Yuan:
Latency Equalization Policy of End-to-End Network Slicing Based on Reinforcement Learning. 88-103 - Yun Chai

, Youguo Wang
:
Optimal Control of Information Diffusion in Temporal Networks. 104-119 - Viktoria-Maria Alevizaki

, Markos P. Anastasopoulos, Alexandros-Ioannis Manolopoulos
, Anna Tzanakaki:
Distributed Service Provisioning for Disaggregated 6G Network Infrastructures. 120-137 - A. H. M. Jakaria

, Mohammad Ashiqur Rahman
, Muneeba Asif, Alvi Ataur Khalil
, Hisham A. Kholidy
, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. 138-151 - Yahui Hu, Yujiang Zhou

, Junping Song, Luyang Xu, Xu Zhou:
Citywide Mobile Traffic Forecasting Using Spatial-Temporal Downsampling Transformer Neural Networks. 152-165 - Mohammed Seid Abegaz

, Hayla Nahom Abishu
, Yasin Habtamu Yacob
, Tewodros Alemu Ayall
, Aiman Erbad
, Mohsen Guizani
:
Blockchain-Based Resource Trading in Multi-UAV-Assisted Industrial IoT Networks: A Multi-Agent DRL Approach. 166-181 - Quan-Lin Li, Yan-Xia Chang

, Chi Zhang:
Tree Representation, Growth Rate of Blockchain and Reward Allocation in Ethereum With Multiple Mining Pools. 182-200 - Ruba Alkadi

, Abdulhadi Shoufan
:
Unmanned Aerial Vehicles Traffic Management Solution Using Crowd-Sensing and Blockchain. 201-215 - Guohuai Sang

, Jingwei Chen, Yiliang Liu
, Haiqin Wu
, Yong Zhou
, Shunrong Jiang
:
PACM: Privacy-Preserving Authentication Scheme With on-Chain Certificate Management for VANETs. 216-228 - Haritha K

, Chandramani Singh
:
Scheduling Policies for Stability and Optimal Server Running Cost in Cloud Computing Platforms. 229-245 - Aleteng Tian, Bohao Feng

, Huachun Zhou, Yunxue Huang, Keshav Sood
, Shui Yu
, Hongke Zhang
:
Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks. 246-260 - Mona Elsaadawy

, Mohamed Younis
, Jifeng Wang, Xinchen Hou, Bettina Kemme:
Dynamic Application Call Graph Formation and Service Identification in Cloud Data Centers. 261-275 - Shreshth Tuli

, Giuliano Casale
, Nicholas R. Jennings
:
DRAGON: Decentralized Fault Tolerance in Edge Federations. 276-291 - Chuan Feng

, Pengchao Han
, Xu Zhang
, Qihan Zhang
, Yue Zong
, Yejun Liu, Lei Guo
:
Cost-Minimized Computation Offloading of Online Multifunction Services in Collaborative Edge-Cloud Networks. 292-304 - Jindou Xie

, Yunjian Jia
, Wanli Wen
, Zhengchuan Chen
, Liang Liang
:
Dynamic D2D Multihop Offloading in Multi-Access Edge Computing From the Perspective of Learning Theory in Games. 305-318 - Tung V. Doan

, Giang T. Nguyen
, Martin Reisslein
, Frank H. P. Fitzek
:
SAP: Subchain-Aware NFV Service Placement in Mobile Edge Cloud. 319-341 - Shraddha Tripathi

, Om Jee Pandey
, Linga Reddy Cenkeramaddi
, Rajesh M. Hegde:
A Socially-Aware Radio Map Framework for Improving QoS of UAV-Assisted MEC Networks. 342-356 - Jie Cui

, Fengqun Wang
, Qingyang Zhang
, Chengjie Gu, Hong Zhong
:
Efficient Batch Authentication Scheme Based on Edge Computing in IIoT. 357-368 - Yao Chiang

, Chih-Ho Hsu, Guan-Hao Chen
, Hung-Yu Wei
:
Deep Q-Learning-Based Dynamic Network Slicing and Task Offloading in Edge Network. 369-384 - Hao Luo

, Hung-Yu Wei
:
Resource Orchestration at the Edge: Intelligent Management of mmWave RAN and Gaming Application QoE Enhancement. 385-399 - Jungyeon Baek

, Georges Kaddoum
:
FLoadNet: Load Balancing in Fog Networks With Cooperative Multiagent Using Actor-Critic Method. 400-414 - Francisco Muro, Eduardo Baena

, Sergio Fortes
, Lars Nielsen, Raquel Barco
:
Noisy Neighbour Impact Assessment and Prevention in Virtualized Mobile Networks. 415-425 - Zheheng Rao

, Yanyan Xu
, Shaoming Pan
, Jiabao Guo, Yuejing Yan
, Zhiheng Wang:
Cellular Traffic Prediction: A Deep Learning Method Considering Dynamic Nonlocal Spatial Correlation, Self-Attention, and Correlation of Spatiotemporal Feature Fusion. 426-440 - Andrew Lappalainen

, Yuhao Zhang
, Catherine Rosenberg
:
Planning 5G Networks for Rural Fixed Wireless Access. 441-455 - Rui Zhang

, Libing Wu, Shuqin Cao
, Dan Wu, Jianxin Li
:
A Vehicular Task Offloading Method With Eliminating Redundant Tasks in 5G HetNets. 456-470 - Mojdeh Karbalaee Motalleb

, Vahid Shah-Mansouri
, Saeedeh Parsaeefard
, Onel Luis Alcaraz López
:
Resource Allocation in an Open RAN System Using Network Slicing. 471-485 - Yan Liu

, Jinling Jia, Jun Cai
, Taiqin Huang:
Deep Reinforcement Learning for Reactive Content Caching With Predicted Content Popularity in Three-Tier Wireless Networks. 486-501 - Mandar Datar

, Eitan Altman
, Hélène Le Cadre
:
Strategic Resource Pricing and Allocation in a 5G Network Slicing Stackelberg Game. 502-520 - Genghua Yu

, Zhigang Chen
, Jian Wu:
Content-Aware Personalized Sharing Based on Cooperative User Selection and Attention in Mobile Internet of Things. 521-532 - Yudong Huang

, Shuo Wang
, Xinyuan Zhang
, Tao Huang
, Yunjie Liu:
Flexible Cyclic Queuing and Forwarding for Time-Sensitive Software-Defined Networks. 533-546 - Keigo Akahoshi

, Fujun He
, Eiji Oki
:
Service Deployment Model Based on Virtual Network Function Resizing. 547-562 - Zhiyuan Li

, Lijun Wu, Xiangyun Zeng, Xiaofeng Yue, Yulin Jing, Wei Wu
, Kaile Su
:
Online Coordinated NFV Resource Allocation via Novel Machine Learning Techniques. 563-577 - Xinxin Tang

, Xuewen Zeng
, Lei Song
:
Accelerating Protocol Oblivious Forwarding Programmable Data Plane With Flow Cache. 578-594 - Davide Borsatti

, Chiara Grasselli
, Chiara Contoli
, Luigia Micciullo, Luca Spinacci
, Marina Settembre, Walter Cerroni
, Franco Callegati
:
Mission Critical Communications Support With 5G and Network Slicing. 595-607 - Ricardo Martínez

, Luca Vettori, Jorge Baranda
, Josep Mangues-Bafalluy
, Engin Zeydan
, Bahador Bakhshi
:
Resource Abstractions in NFV Management and Orchestration: Experimental Evaluation. 608-624 - Reza Farahani, Mohammad Shojafar, Christian Timmerer, Farzad Tashtarian, Mohammed Ghanbari, Hermann Hellwagner:

ARARAT: A Collaborative Edge-Assisted Framework for HTTP Adaptive Video Streaming. 625-643 - Johannes K. Becker

, David Starobinski
:
Snout: A Middleware Platform for Software-Defined Radios. 644-657 - Misbah Shafi, Rakesh Kumar Jha

, Sanjeev Jain
:
LGTBIDS: Layer-Wise Graph Theory-Based Intrusion Detection System in Beyond 5G. 658-671 - Yuan-Cheng Lai

, Didik Sudyana
, Ying-Dar Lin
, Miel Verkerken
, Laurens D'hooge
, Tim Wauters
, Bruno Volckaert
, Filip De Turck
:
Task Assignment and Capacity Allocation for ML-Based Intrusion Detection as a Service in a Multi-Tier Architecture. 672-683 - Xiaoheng Deng

, Jincai Zhu
, Xinjun Pei
, Lan Zhang
, Zhen Ling
, Kaiping Xue
:
Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks. 684-696 - Namrata Tiwari

, Neminath Hubballi
:
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling. 697-710 - Huaiying Sun

, Huiqun Yu
, Guisheng Fan
, Liqiong Chen
, Zheng Liu:
Security-Aware and Time-Guaranteed Service Placement in Edge Clouds. 711-725 - Chaoqun You

, Yangming Zhao, Gang Feng
, Tony Q. S. Quek
, Lemin Li:
Hierarchical Multiresource Fair Queueing for Packet Processing. 726-740 - Muhammad Asghar Khan

, Neeraj Kumar
, Syed Agha Hassnain Mohsan
, Wali Ullah Khan
, Moustafa M. Nasralla
, Mohammed H. Alsharif
, Justyna Zywiolek
, Insaf Ullah:
Swarm of UAVs for Network Management in 6G: A Technical Review. 741-761 - Edson Rodrigues

, Denis Rosário
, Eduardo Cerqueira
, Helder M. N. S. Oliveira:
Analysis of Routing and Resource Allocation Mechanism for Space-Division Multiplexing Elastic Optical Networks. 762-773 - Angelo Tulumello

, Andrea Mayer, Marco Bonola, Paolo Lungaroni, Carmine Scarpitta
, Stefano Salsano
, Ahmed Abdelsalam, Pablo Camarillo, Darren Dukes, François Clad, Clarence Filsfils:
Micro SIDs: A Solution for Efficient Representation of Segment IDs in SRv6 Networks. 774-786 - Xiaofan Yu

, Kazim Ergun
, Xueyang Song, Ludmila Cherkasova
, Tajana Simunic Rosing:
Automating and Optimizing Reliability-Driven Deployment in Energy-Harvesting IoT Networks. 787-799 - Seyed Soheil Johari

, Sepehr Taeb, Nashid Shahriar
, Shihabur Rahman Chowdhury
, Massimo Tornatore
, Raouf Boutaba
, Jeebak Mitra
, Mahdi Hemmati
:
DRL-Assisted Reoptimization of Network Slice Embedding on EON-Enabled Transport Networks. 800-814 - Kokouvi Bénoît Nougnanke

, Yann Labit, Marc Bruyere
, Ulrich Aïvodji, Simone Ferlin
:
ML-Based Performance Modeling in SDN-Enabled Data Center Networks. 815-829 - Matthews Jose

, Kahina Lazri, Jérôme François
, Olivier Festor:
Stateful InREC: Stateful In-Network Real Number Computation With Recursive Functions. 830-845 - Filipe Bachini Lopes

, Alberto E. Schaeffer-Filho
, Gabriel Luca Nazar
:
Modular VNF Components Acceleration With FPGA Overlays. 846-857 - Jiahua Xu

, Yebo Feng
:
Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols. 858-869 - Alexander Clemm

:
High-Precision Networking Services: Problems, Approaches, and Opportunities. 870-878
Volume 20, Number 2, June 2023
- Nur Zincir-Heywood

, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. 882-889 - Tai Manh Ho

, Kim Khoa Nguyen
, Mohamed Cheriet
:
Converging Game Theory and Reinforcement Learning For Industrial Internet of Things. 890-903 - Yang Yang

, Yindong Sun
, Yuhan Long, Jingting Mei
, Peng Yu
:
Root Cause Location Based on Prophet and Kernel Density Estimation. 904-917 - Jie Zhou

, Ding Ding
, Ziteng Wu, Yuting Xiu:
Spatial Context-Aware Time-Series Forecasting for QoS Prediction. 918-931 - Yinong Li

, Jianbo Li
, Zhiqiang Lv
, Haoran Li
, Yue Wang, Zhihao Xu
:
GASTO: A Fast Adaptive Graph Learning Framework for Edge Computing Empowered Task Offloading. 932-944 - Xuanyu Liu

, Xiao Fu
, Xiaojiang Du
, Bin Luo, Mohsen Guizani
:
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes. 945-960 - Jiong Lou

, Zhiqing Tang
, Weijia Jia
:
Energy-Efficient Joint Task Assignment and Migration in Data Centers: A Deep Reinforcement Learning Approach. 961-973 - Jessica S. Mendoza

, Isabel de la Bandera
, David Palacios, Raquel Barco
:
Forecasting Framework for Mobile Networks Based on Automatic Feature Selection. 974-984 - Gorla Praveen

, V. Keerthivasan
, Vinay Chamola
, Mohsen Guizani
:
A Novel Framework of Federated and Distributed Machine Learning for Resource Provisioning in 5G and Beyond Using Mobile-Edge SCBS. 985-994 - Anubhab Banerjee

, Stephen S. Mwanje
, Georg Carle
:
Trust and Performance in Future AI-Enabled, Open, Multi-Vendor Network Management Automation. 995-1007 - Carolina Gijón

, Matías Toril
, Salvador Luna-Ramírez
:
Data-Driven Estimation of Throughput Performance in Sliced Radio Access Networks via Supervised Learning. 1008-1023 - Alaa Awad Abdellatif

, Amr Abo-eleneen, Amr Mohamed
, Aiman Erbad
, Nikhil V. Navkar, Mohsen Guizani
:
Intelligent-Slicing: An AI-Assisted Network Slicing Framework for 5G-and-Beyond Networks. 1024-1039 - Yifan He

, Zhao Li
, Zhenpeng Li, Shuigeng Zhou
, Ting Yu
, Ji Zhang:
Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management. 1040-1050 - Yaowen Qi

, Li Yang
, Chengsheng Pan
, Cheng Chi, Qilong Huang:
A Flexible Topology Reconstruction Strategy Based on Deep Q-Learning for Balance Performance and Efficiency of STINs. 1051-1064 - Ali Raza

, Nabeel Akhtar
, Vatche Isahagian
, Ibrahim Matta
, Lei Huang
:
Configuration and Placement of Serverless Applications Using Statistical Learning. 1065-1077 - Buqing Cao

, Lulu Zhang
, Mi Peng
, Yueying Qing, Guosheng Kang
, Jianxun Liu
:
Web Service Recommendation via Combining Bilinear Graph Representation and xDeepFM Quality Prediction. 1078-1092 - Chengyi Qu

, Francesco Betti Sorbelli
, Rounak Singh, Prasad Calyam
, Sajal K. Das
:
Environmentally-Aware and Energy-Efficient Multi-Drone Coordination and Networking for Disaster Response. 1093-1109 - Muhammad Sulaiman, Arash Moayyedi, Mahdieh Ahmadi

, Mohammad Ali Salahuddin
, Raouf Boutaba
, Aladdin Saleh:
Coordinated Slicing and Admission Control Using Multi-Agent Deep Reinforcement Learning. 1110-1124 - Lei Tan

, Daofu Gong
, Zhenyu Li
, Shaoyong Du
, Fenlin Liu
:
Neural Attention Networks for Recommendation With Auxiliary Data. 1125-1139 - Mohammad Ariful Islam, Hisham Siddique

, Wenbin Zhang
, Israat Haque
:
A Deep Neural Network-Based Communication Failure Prediction Scheme in 5G RAN. 1140-1152 - Sharva Garg

, Tanmoy Bag
, Andreas Mitschele-Thiel
:
Data-Driven Self-Organization With Implicit Self-Coordination for Coverage and Capacity Optimization in Cellular Networks. 1153-1169 - Ahmad M. Nagib

, Hatem Abou-Zeid, Hossam S. Hassanein
:
Accelerating Reinforcement Learning via Predictive Policy Transfer in 6G RAN Slicing. 1170-1183 - Anselme Ndikumana

, Kim Khoa Nguyen
, Mohamed Cheriet
:
Two-Level Closed Loops for RAN Slice Resources Management Serving Flying and Ground-Based Cars. 1184-1198 - Sajid Ali, Omar Abusabha, Farman Ali

, Muhammad Imran, Tamer Abuhmed
:
Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis. 1199-1209 - Subhash Sagar

, Adnan Mahmood
, Kai Wang, Quan Z. Sheng
, Jitander Kumar Pabani, Wei Emma Zhang
:
Trust-SIoT: Toward Trustworthy Object Classification in the Social Internet of Things. 1210-1223 - Ting-Li Huoh

, Yan Luo
, Peilong Li
, Tong Zhang:
Flow-Based Encrypted Network Traffic Classification With Graph Neural Networks. 1224-1237 - Steffen Lindner

, Daniel Merling
, Michael Menth
:
Learning Multicast Patterns for Efficient BIER Forwarding With P4. 1238-1253 - Anderson Bergamini de Neira

, Alex Medeiros de Araújo
, Michele Nogueira
:
An Intelligent System for DDoS Attack Prediction Based on Early Warning Signals. 1254-1266 - Alfredo Nascita

, Antonio Montieri
, Giuseppe Aceto
, Domenico Ciuonzo
, Valerio Persico
, Antonio Pescapè
:
Improving Performance, Reliability, and Feasibility in Multimodal Multitask Traffic Classification with XAI. 1267-1289 - Pratyush Kr. Deka

, Yash Verma, Adil Bin Bhutto
, Erik Elmroth
, Monowar Bhuyan
:
Semi-Supervised Range-Based Anomaly Detection for Cloud Systems. 1290-1304 - Willian Tessaro Lunardi

, Martin Andreoni Lopez
, Jean-Pierre Giacalone:
ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection. 1305-1318 - Guilherme Werneck de Oliveira

, Michele Nogueira
, Aldri Luiz dos Santos
, Daniel Macêdo Batista
:
Intelligent VNF Placement to Mitigate DDoS Attacks on Industrial IoT. 1319-1331 - Ehsan Nowroozi

, Abhishek
, Mohammadreza Mohammadi
, Mauro Conti
:
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework. 1332-1344 - Sajal Saha

, Anwar Haque
, Greg Sidebottom:
Analyzing the Impact of Outlier Data Points on Multi-Step Internet Traffic Prediction Using Deep Sequence Models. 1345-1362 - Hassan Fawaz

, Julien Lesca, Pham Tran Anh Quang
, Jérémie Leguay
, Djamal Zeghlache
, Paolo Medagliani
:
Graph Convolutional Reinforcement Learning for Collaborative Queuing Agents. 1363-1377 - Jiaxing Qi

, Zhongzhi Luan
, Shaohan Huang
, Carol J. Fung
, Hailong Yang
, Hanlu Li, Danfeng Zhu, Depei Qian:
LogEncoder: Log-Based Contrastive Representation Learning for Anomaly Detection. 1378-1391 - Andressa Vergütz, Bruna V. Dos Santos, Burak Kantarci

, Michele Nogueira
:
Data Instrumentation From IoT Network Traffic as Support for Security Management. 1392-1404 - Xiaodong Zang

, Jian Gong, Maoli Wang, Peng Gao
:
Encrypted DNS Traffic Analysis for Service Intention Inferring. 1405-1417 - Na Zhao

, Biao Han
, Ruidong Li
, Jinshu Su
, Cong Zhou:
A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training. 1418-1429 - Guangjie Han

, Zhengwei Xu
, Chuanliang Chen
, Li Liu
, Hongbo Zhu
:
Fault Diagnosis in Industrial Control Networks Using Transferability-Measured Adversarial Adaptation Network. 1430-1440 - Azzam Mourad, Hadi Otrok

, Ernesto Damiani, Mérouane Debbah, Nadra Guizani, Shiqiang Wang, Guangjie Han, Rabeb Mizouni, Jamal Bentahar
, Chamseddine Talhi:
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources. 1441-1445 - Lei Liu

, Yuxing Tian, Chinmay Chakraborty
, Jie Feng
, Qingqi Pei
, Li Zhen
, Keping Yu
:
Multilevel Federated Learning-Based Intelligent Traffic Flow Forecasting for Transportation Network Management. 1446-1458 - Xikang Jiang

, Jinhui Zhang, Lin Zhang
:
FedRadar: Federated Multi-Task Transfer Learning for Radar-Based Internet of Medical Things. 1459-1469 - Venkatraman Balasubramanian

, Moayad Aloqaily
, Martin Reisslein
:
Fed-TSN: Joint Failure Probability-Based Federated Learning for Fault-Tolerant Time-Sensitive Networks. 1470-1486 - Yuchang Sun

, Jiawei Shao
, Yuyi Mao
, Jessie Hui Wang
, Jun Zhang
:
Semi-Decentralized Federated Edge Learning With Data and Device Heterogeneity. 1487-1501 - Abdullatif Albaseer

, Mohamed M. Abdallah
, Ala I. Al-Fuqaha
, Abegaz Mohammed Seid
, Aiman Erbad
, Octavia A. Dobre
:
Fair Selection of Edge Nodes to Participate in Clustered Federated Multitask Learning. 1502-1516 - Dost Muhammad Saqib Bhatti

, Haewoon Nam
:
FedCLS: Class-Aware Federated Learning in a Heterogeneous Environment. 1517-1528 - Lin Teng

, Yulong Qiao, Muhammad Shafiq
, Gautam Srivastava
, Abdul Rehman Javed
, Thippa Reddy Gadekallu
, Shoulin Yin
:
FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction. 1529-1542 - Ibrahim Shaer

, Abdallah Shami
:
CorrFL: Correlation-Based Neural Network Architecture for Unavailability Concerns in a Heterogeneous IoT Environment. 1543-1557 - Feng Yu

, Hui Lin
, Xiaoding Wang
, Sahil Garg
, Georges Kaddoum
, Satinder Singh
, Mohammad Mehedi Hassan
:
Communication-Efficient Personalized Federated Meta-Learning in Edge Networks. 1558-1571 - Feng Sun

, Zhenjiang Zhang
, Xiaolin Chang
, Kaige Zhu
:
Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading. 1572-1586 - Ali Riahi

, Amr Mohamed
, Aiman Erbad
:
RL-Based Federated Learning Framework Over Blockchain (RL-FL-BC). 1587-1599 - Aditya Pribadi Kalapaaking

, Ibrahim Khalil
, Mohammed Atiquzzaman
:
Smart Policy Control for Securing Federated Learning Management System. 1600-1611 - Sabra Ben Saad

, Bouziane Brik
, Adlen Ksentini
:
Toward Securing Federated Learning Against Poisoning Attacks in Zero Touch B5G Networks. 1612-1624 - Xuan-Son Vu

, Maode Ma
, Monowar Bhuyan
:
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge. 1625-1643 - Alessio Sacco

, Matteo Flocco, Flavio Esposito
, Guido Marchetto
:
Partially Oblivious Congestion Control for the Internet via Reinforcement Learning. 1644-1659 - Qize Guo

, Rentao Gu
, Hao Yu
, Tarik Taleb, Yuefeng Ji
:
Probabilistic-Assured Resource Provisioning With Customizable Hybrid Isolation for Vertical Industrial Slicing. 1660-1675 - Moeen Al-Makhlafi

, Huaxi Gu
, Ahlam Almuaalemi, Eiad Almekhlafi
, Musbahu M. Adam:
RibsNet: A Scalable, High-Performance, and Cost-Effective Two-Layer-Based Cloud Data Center Network Architecture. 1676-1690 - Yitu Wang

, Takayuki Nakachi
, Wei Wang
:
Pattern Discovery and Multi-Slot-Ahead Forecast of Network Traffic: A Revisiting to Gaussian Process. 1691-1706 - Yuan Gao

, Liquan Chen
, Ge Wu
, Qianmu Li
, Tong Fu:
A Game Theory Study of Big Data Analytics in Internet of Things. 1707-1716 - Venkatarami Reddy Chintapalli

, Sai Balaram Korrapati
, Madhura Adeppady
, Bheemarjuna Reddy Tamma
, A. Antony Franklin
, Balaprakasa Rao Killi:
NFVPermit: Toward Ensuring Performance Isolation in NFV-Based Systems. 1717-1732 - Diogo Menezes Ferrazani Mattos

, Gabriel Reis Carrara
, Célio Vinicius N. de Albuquerque
, Daniel Mossé:
Exploring Overlay Topology Cost-Termination Tradeoff in Blockchain Vicinity-Based Consensus. 1733-1744 - Suhui Liu

, Jiguo Yu
, Liquan Chen
, Baobao Chai
:
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data. 1745-1758 - Hao Guo

, Wanxin Li
, Mark M. Nejad
, Chien-Chung Shen
:
A Hybrid Blockchain-Edge Architecture for Electronic Health Record Management With Attribute-Based Cryptographic Mechanisms. 1759-1774 - Mohamed A. El-Zawawy

, Alessandro Brighente
, Mauro Conti
:
Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. 1775-1789 - Subhra Mazumdar

, Prabal Banerjee
, Abhinandan Sinha
, Sushmita Ruj
, Bimal Kumar Roy
:
Strategic Analysis of Griefing Attack in Lightning Network. 1790-1803 - Joonwoo Kim

, Jaewook Lee
, Taeyun Kim, Sangheon Pack
:
Deep Q-Network-Based Cloud-Native Network Function Placement in Edge Cloud-Enabled Non-Public Networks. 1804-1816 - Wenting Wei

, Huaxi Gu
, Kun Wang, Jianjia Li
, Xuan Zhang
, Ning Wang
:
Multi-Dimensional Resource Allocation in Distributed Data Centers Using Deep Reinforcement Learning. 1817-1829 - Mahdi Dolati

, Seyed Hamed Rastegar
, Ahmad Khonsari
, Majid Ghaderi
:
Layer-Aware Containerized Service Orchestration in Edge Networks. 1830-1846 - Su Wang

, Seyyedali Hosseinalipour
, Maria Gorlatova
, Christopher G. Brinton
, Mung Chiang:
UAV-Assisted Online Machine Learning Over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach. 1847-1865 - Seyedeh Negar Afrasiabi

, Amin Ebrahimzadeh
, Carla Mouradian
, Sepideh Malektaji
, Roch H. Glitho:
Reinforcement Learning-Based Optimization Framework for Application Component Migration in NFV Cloud-Fog Environments. 1866-1883 - Nidhi Sharma

, Krishan Kumar
:
Energy Efficient Clustering and Resource Allocation Strategy for Ultra-Dense Networks: A Machine Learning Framework. 1884-1897 - Jinbin Hu, Jiawei Huang

, Zhaoyi Li
, Jianxin Wang
, Tian He
:
A Receiver-Driven Transport Protocol With High Link Utilization Using Anti-ECN Marking in Data Center Networks. 1898-1912 - Ahmad Hammoud, Maria Kantardjian

, Amir Najjar
, Azzam Mourad
, Hadi Otrok, Zbigniew Dziong
, Nadra Guizani:
Dynamic Fog Federation Scheme for Internet of Vehicles. 1913-1923 - Ahmed Alagha

, Shakti Singh
, Hadi Otrok
, Rabeb Mizouni
:
Influence- and Interest-Based Worker Recruitment in Crowdsourcing Using Online Social Networks. 1924-1936 - Mohammad Al-Quraan

, Ahsan Raza Khan
, Lina S. Mohjazi
, Anthony Centeno
, Ahmed Zoha
, Muhammad Ali Imran
:
Intelligent Beam Blockage Prediction for Seamless Connectivity in Vision-Aided Next-Generation Wireless Networks. 1937-1948 - Xing Su

, Yiting Ren, Zhi Cai
, Yi Liang
, Limin Guo
:
A Q-Learning-Based Routing Approach for Energy Efficient Information Transmission in Wireless Sensor Network. 1949-1961 - Dor Harris

, Arik Rinberg
, Ori Rottenstreich
:
Compressing Distributed Network Sketches With Traffic-Aware Summaries. 1962-1975 - Foivos Michelinakis

, Joan S. Pujol Roig
, Sara Malacarne, Min Xie, Thomas Dreibholz
, Sayantini Majumdar, Wint Yi Poe, Georgios Patounas
, Carmen Guerrero, Ahmed Elmokashfi
, Vasileios Theodorou
:
AI Anomaly Detection for Cloudified Mobile Core Architectures. 1976-1992 - Jianbang Dai

, Xiaolong Xu
, Honghao Gao
, Xinheng Wang
, Fu Xiao
:
SHAPE: A Simultaneous Header and Payload Encoding Model for Encrypted Traffic Classification. 1993-2012 - Tingyu Li

, Zuqing Zhu
:
QoS-Aware Management Reconfiguration of vNF Service Trees With Heterogeneous NFV Platforms. 2013-2024 - Haoxian Feng

, Zhaogang Shu
, Tarik Taleb
, Yuantao Wang, Zhiwei Liu:
An Aggressive Migration Strategy for Service Function Chaining in the Core Cloud. 2025-2039 - Roger Robson dos Santos, Eduardo K. Viegas

, Altair O. Santin
, Vinicius Vielmo Cogo
:
Reinforcement Learning for Intrusion Detection: More Model Longness and Fewer Updates. 2040-2055 - Wendi Feng

, Chuanchang Liu, Bo Cheng
, Junliang Chen, Zhiguo Wan
:
An End-Host-Importance-Aware Secure Service-Enabled Hybrid SDN Deployment. 2056-2070 - Onur Barut

, Yan Luo
, Peilong Li
, Tong Zhang:
R1DIT: Privacy-Preserving Malware Traffic Classification With Attention-Based Neural Networks. 2071-2085 - Rikima Mitsuhashi

, Yong Jin
, Katsuyoshi Iida
, Takahiro Shinagawa
, Yoshiaki Takai
:
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis. 2086-2095 - Ehsan Nowroozi

, Mohammadreza Mohammadi
, Erkay Savas, Yassine Mekdad
, Mauro Conti
:
Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks. 2096-2105
Volume 20, Number 3, September 2023
- Efterpi Paraskevoulakou

, Dimosthenis Kyriazis
:
ML-FaaS: Toward Exploiting the Serverless Paradigm to Facilitate Machine Learning Functions as a Service. 2110-2123 - Müge Erel-Özçevik

, Ferdi Tekçe
:
Grant-Free SCMA Design Using SDN/NFV With Physical Layer Security. 2124-2135 - Martin Westerkamp

, Axel Küpper:
Instant Function Calls Using Synchronized Cross-Blockchain Smart Contracts. 2136-2150 - Massimo Tornatore

, Teresa Gomes
, Carmen Mas Machuca, Eiji Oki, Chadi Assi, Dominic Schupke:
Guest Editors' Introduction: Special Section on Robust and Reliable Networks of the Future. 2151-2156 - Danyang Zheng

, Gangxiang Shen
, Yongcheng Li, Xiaojun Cao
, Biswanath Mukherjee:
Service Function Chaining and Embedding With Heterogeneous Faults Tolerance in Edge Networks. 2157-2171 - Roi Ben Haim, Ori Rottenstreich

:
Low-Latency and Reliable Virtual Network Function Placement in Edge Clouds. 2172-2185 - Brigitte Jaumard

, Quang Huy Duong
:
A Nested Decomposition Model for Reliable NFV 5G Network Slicing. 2186-2200 - Andrés F. Ocampo

, Mah-Rukh Fida
, Juan Felipe Botero
, Ahmed Elmokashfi
, Haakon Bryhni:
Opportunistic CPU Sharing in Mobile Edge Computing Deploying the Cloud-RAN. 2201-2217 - Masoud Taghavian

, Yassine Hadjadj-Aoul, Géraldine Texier
, Nicolas Huin
, Philippe Bertin
:
An Approach to Network Service Placement Reconciling Optimality and Scalability. 2218-2229 - Rui Li

, Bertr Decocq, Anne Barros
, Yi-Ping Fang
, Zhiguo Zeng
:
Estimating 5G Network Service Resilience Against Short Timescale Traffic Variation. 2230-2243 - Alessio Sacco

, Flavio Esposito
, Guido Marchetto
:
Completing and Predicting Internet Traffic Matrices Using Adversarial Autoencoders and Hidden Markov Models. 2244-2258 - Siamak Azadiabad

, Ferhat Khendek
, Maria Toeroe:
Runtime Adaptation Framework for Fulfilling Availability and Continuity Requirements of Network Services. 2259-2282 - Sai Shreyas Bhavanasi, Lorenzo Pappone

, Flavio Esposito
:
Dealing With Changes: Resilient Routing via Graph Neural Networks and Multi-Agent Deep Reinforcement Learning. 2283-2294 - Joël Roman Ky

, Bertrand Mathieu
, Abdelkader Lahmadi, Raouf Boutaba
:
ML Models for Detecting QoE Degradation in Low-Latency Applications: A Cloud-Gaming Case Study. 2295-2308 - Balázs Varga

, János Farkas
, Ferenc Fejes, Junaid Ansari, István Moldován, Miklós Máté:
Robustness and Reliability Provided by Deterministic Packet Networks (TSN and DetNet). 2309-2318 - Fábio L. Verdi

, Gustavo V. Luz
:
InFaRR: In-Network Fast ReRouting. 2319-2330 - Yuxiao Zhang, Qian Lv, Ruoxing Li

, Xiaojian Tian
, Zuqing Zhu
:
Planning of Survivable Wavelength-Switched Optical Networks Based on P2MP Transceivers. 2331-2342 - Giacomo Borraccini

, Stefano Straullu
, Alessio Giorgetti
, Renato Ambrosone
, Emanuele Virgillito
, Andrea D'Amico
, Rocco D'Ingillo
, Francesco Aquilino
, Antonino Nespola
, Nicola Sambo, Filippo Cugini
, Vittorio Curri
:
Experimental Demonstration of Partially Disaggregated Optical Network Control Using the Physical Layer Digital Twin. 2343-2355 - Yuanhao Liu

, Fen Zhou
, Tao Shang
, Juan-Manuel Torres-Moreno
:
Disaster Protection for Service Function Chain Provisioning in EO-DCNs. 2356-2369 - Ori Rottenstreich

:
Path Diversity and Survivability for the HyperX Datacenter Topology. 2370-2385 - Gilson Miranda

, Esteban Municio
, Jetmir Haxhibeqiri
, Jeroen Hoebeke
, Ingrid Moerman
, Johann M. Márquez-Barja
:
Enabling Time-Sensitive Network Management Over Multi-Domain Wired/Wi-Fi Networks. 2386-2399 - Badreddine Yacine Yacheur

, Toufik Ahmed
, Mohamed Mosbah
:
Efficient DRL-Based Selection Strategy in Hybrid Vehicular Networks. 2400-2411 - Amin Azari

, Meysam Masoudi
, Cedomir Stefanovic
, Cicek Cavdar
:
Reliable and Energy-Efficient IoT Systems: Design Considerations in Coexistence Deployments. 2412-2427 - Pedro Rosa, André Souto

, José Cecílio
:
Light-SAE: A Lightweight Authentication Protocol for Large-Scale IoT Environments Made With Constrained Devices. 2428-2441 - Ahmad Zainudin

, Rubina Akter
, Dong-Seong Kim
, Jae-Min Lee
:
Federated Learning Inspired Low-Complexity Intrusion Detection and Classification Technique for SDN-Based Industrial CPS. 2442-2459 - Yutaro Yoshinaka

, Kentaro Kita
, Junji Takemasa
, Yuki Koizumi
, Toru Hasegawa
:
Programmable Name Obfuscation Framework for Controlling Privacy and Performance on CCN. 2460-2474 - Giovanna Carofiglio

, Giulio Grassi
, Luca Muscariello
, Michele Papalini
, Jacques Samain
:
ROBUST: A Reliable and Flexible Media Transport for Real-Time Services. 2475-2488 - Raffaele Bolla, Roberto Bruschi

, Franco Davoli
, Chiara Lombardo
, Alireza Mohammadpour
, Riccardo Trivisonno
, Wint Yi Poe:
Adaptive Reliability for the Automated Control of Human-Robot Collaboration in Beyond-5G Networks. 2489-2503 - Dao Thanh Hai

:
On Routing, Wavelength, Network Coding Assignment, and Protection Configuration Problem in Optical-Processing-Enabled Networks. 2504-2514 - Mohammad J. Hashemi

, Eric Keller, Saeid Tizpaz-Niari
:
Detecting Unseen Anomalies in Network Systems by Leveraging Neural Networks. 2515-2528 - Ruizhi Xiao

, Hao Chen
, Jintian Lu
, Weilong Li, Shuyuan Jin
:
AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features. 2529-2543 - Merkouris Karaliopoulos

, Georgios Cheirmpos
, Iordanis Koutsopoulos
:
Sharing Data Plans for Cellular Mobile Data Access. 2544-2557 - Toru Mano

, Takeru Inoue
, Kimihiro Mizutani
, Osamu Akashi:
Redesigning the Nonblocking Clos Network to Increase Its Capacity. 2558-2574 - Albert Pagès

, Fernando Agraz
, Jordi Biosca Caro, Salvatore Spadaro
:
Machine Learning-Based Multi-Domain Actuation Orchestration in Support of End-to-End Service Quality-Assurance. 2575-2586 - Huiqiang Lian, Jiahui Li, Hao Wu

, Yiji Zhao
, Lei Zhang
, Xin Wang
:
Toward Effective Personalized Service QoS Prediction From the Perspective of Multi-Task Learning. 2587-2597 - Binglin Tao

, Mingyu Xiao
, Jingyang Zhao
:
Minimum-Weight Link-Disjoint Paths With a Bounded Number of Shared Nodes. 2598-2610 - Kotaro Hatanaka, Tatsuaki Kimura

, Yuka Komai, Keisuke Ishibashi
, Masahiro Kobayashi
, Shigeaki Harada:
Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor Factorization. 2611-2624 - Chuan Sheng, Yu Yao

, Wenxuan Li, Wei Yang, Ying Liu
:
Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique. 2625-2638 - Wenting Wei

, Liying Fu, Huaxi Gu
, Yan Zhang, Tao Zou, Chao Wang
, Ning Wang
:
GRL-PS: Graph Embedding-Based DRL Approach for Adaptive Path Selection. 2639-2651 - Jiayu Yang, Jiangping Han

, Kaiping Xue
, Yansen Wang, Jian Li
, Yitao Xing
, Hao Yue
, David S. L. Wei
:
TCCC: A Throughput Consistency Congestion Control Algorithm for MPTCP in Mixed Transmission of Long and Short Flows. 2652-2667 - Zhixuan Jia

, Yushun Fan
, Jia Zhang
:
MGMASR: Multi-Graph and Multi-Aspect Neural Network for Service Recommendation in Internet of Services. 2668-2681 - Ákos Recse

, Nattakorn Promwongsa
, Amin Ebrahimzadeh
, Seyedeh Negar Afrasiabi
, Carla Mouradian
, Wubin Li, Róbert Szabó
, Roch H. Glitho
:
Look-Ahead VNF-FG Embedding Framework for Latency-Sensitive Network Services. 2682-2697 - Adil Israr, Qiang Yang, Ali Israr:

Renewable Energy Provision and Energy-Efficient Operational Management for Sustainable 5G Infrastructures. 2698-2710 - Tong Xiao

, Zhe Quan
, Zhi-Jie Wang
, Kaiqi Zhao
, Xiangke Liao, Huang Huang, Yunfei Du
, Kenli Li
:
LPV: A Log Parsing Framework Based on Vectorization. 2711-2725 - Liangkang Zhang

, Yulai Xie
, Minpeng Jin, Pan Zhou
, Gongming Xu
, Yafeng Wu, Dan Feng
, Darrell D. E. Long
:
A Novel Hybrid Model for Docker Container Workload Prediction. 2726-2743 - Fan Yang

, Fangmin Xu
, Tao Feng, Chao Qiu
, Chenglin Zhao
:
pDPoSt+sPBFT: A High Performance Blockchain-Assisted Parallel Reinforcement Learning in Industrial Edge-Cloud Collaborative Network. 2744-2759 - Chuanyun Li

, Florian Spychiger
, Claudio J. Tessone
:
The Miner's Dilemma With Migration: The Control Effect of Solo-Mining. 2760-2770 - Harsh Kasyap

, Arpan Manna, Somanath Tripathy
:
An Efficient Blockchain Assisted Reputation Aware Decentralized Federated Learning Framework. 2771-2782 - Nisita Weerasinghe

, Raaj Anand Mishra, Pawani Porambage
, Madhusanka Liyanage
, Mika Ylianttila
:
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management. 2783-2803 - PeiYun Zhang

, WeiFeng Guo
, ZiJie Liu, MengChu Zhou
, Bo Huang, Khaled Sedraoui:
Optimized Blockchain Sharding Model Based on Node Trust and Allocation. 2804-2816 - Ke Mu

, Xuetao Wei
:
EfShard: Toward Efficient State Sharding Blockchain via Flexible and Timely State Allocation. 2817-2829 - Xu Wu

, Shuang Wei
, Zhen Zhang, Pin Lv:
Main-Secondary Blockchain Framework: Cross-Domain Trust Management Mechanism Using Trust Ticket. 2830-2844 - Muhammad Rasyid Redha Ansori

, Allwinnaldo, Revin Naufal Alief, Igboanusi Ikechi Saviour, Jae Min Lee
, Dong-Seong Kim
:
HADES: Hash-Based Audio Copy Detection System for Copyright Protection in Decentralized Music Sharing. 2845-2853 - Jing Zhang

, Huixia Fang, Hong Zhong
, Jie Cui
, Debiao He
:
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks. 2854-2868 - Xiangli Xiao

, Yushu Zhang
, Youwen Zhu
, Pengfei Hu
, Xiaochun Cao
:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. 2869-2885 - PeiYun Zhang

, ZiJie Liu, MengChu Zhou
, Bo Huang:
A Group-Based Block Storage Model With Block Splitting and Unit Encoding for Consortium Blockchains. 2886-2897 - Gang Liu

, Zhenping Wu, Yufei Zhou, Yan Liu, Hongzhaoning Kang:
Communitychain: Toward a Scalable Blockchain in Smart Home. 2898-2911 - Thomas Kwantwi

, Guolin Sun
, Noble Arden Elorm Kuadey
, Gerald Tietaa Maale
, Guisong Liu
:
Blockchain-Based Computing Resource Trading in Autonomous Multi-Access Edge Network Slicing: A Dueling Double Deep Q-Learning Approach. 2912-2928 - Jayasree Sengupta

, Sushmita Ruj
, Sipra Das Bit
:
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT. 2929-2941 - Riham AlTawy

, Hisham S. Galal, Amr M. Youssef
:
Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner. 2942-2956 - Sivaselvan N

, Vivekananda Bhat K.
, Muttukrishnan Rajarajan
, Ashok Kumar Das
:
A New Scalable and Secure Access Control Scheme Using Blockchain Technology for IoT. 2957-2974 - Juxing Zhu

, Ning Huang
, Junliang Wang, Xiaopeng Qin:
Availability Model for Data Center Networks With Dynamic Migration and Multiple Traffic Flows. 2975-2989 - Mahdi Sharara

, Sahar Hoteit
, Patrick Brown
, Véronique Vèque
:
On Coordinated Scheduling of Radio and Computing Resources in Cloud-RAN. 2990-3003 - Chengyuan Huang

, Jiao Zhang
, Tao Huang
:
SLIT: Achieving Fast Bandwidth Isolation Across Virtual Machines. 3004-3019 - Shuo Qin

, Dechang Pi
, Zhongshi Shao
, Yue Xu
:
A Discrete Interval-Based Multi-Objective Memetic Algorithm for Scheduling Workflow With Uncertainty in Cloud Environment. 3020-3037 - Guilherme Weigert Cassales

, Heitor Murilo Gomes
, Albert Bifet, Bernhard Pfahringer
, Hermes Senger
:
Balancing Performance and Energy Consumption of Bagging Ensembles for the Classification of Data Streams in Edge Computing. 3038-3054 - Vijay Kumar

, Poonam Yadav
, Leandro Soares Indrusiak
:
Resilient Edge: Building an Adaptive and Resilient Multi-Communication Network for IoT Edge Using LPWAN and WiFi. 3055-3071 - Ashish Pandey, Prasad Calyam

, Zhen Lyu, Songjie Wang
, Dmitrii Chemodanov
, Trupti Joshi
:
Knowledge-Engineered Multi-Cloud Resource Brokering for Application Workflow Optimization. 3072-3088 - Guisheng Fan

, Xingpeng Chen
, Zengpeng Li
, Huiqun Yu
, Yingxue Zhang
:
An Energy-Efficient Dynamic Scheduling Method of Deadline-Constrained Workflows in a Cloud Environment. 3089-3103 - Alireza R. Erfanian

, Hadi Amirpour
, Farzad Tashtarian
, Christian Timmerer
, Hermann Hellwagner:
CD-LwTE: Cost- and Delay-Aware Light-Weight Transcoding at the Edge. 3104-3118 - Bing Tang

, Feiyan Guo, Buqing Cao
, Mingdong Tang, Kuan-Ching Li
:
Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment. 3119-3134 - Madhura Adeppady

, Paolo Giaccone
, Holger Karl
, Carla-Fabiana Chiasserini
:
Reducing Microservices Interference and Deployment Time in Resource-Constrained Cloud Systems. 3135-3147 - Itamar Cohen

, Gil Einziger, Maayan Goldstein
, Yaniv Sa'ar, Gabriel Scalosub
, Erez Waisbard:
High Throughput VMs Placement With Constrained Communication Overhead and Provable Guarantees. 3148-3161 - Jine Tang

, Taishan Qin, Deliang Kong, Zhangbing Zhou
, Xiaocui Li
, Yongdong Wu, Junhua Gu:
Anomaly Detection in Social-Aware IoT Networks. 3162-3176 - Shuting Qiu, Qilin Fan

, Xiuhua Li
, Xu Zhang
, Geyong Min
, Yongqiang Lyu
:
OA-Cache: Oracle Approximation-Based Cache Replacement at the Network Edge. 3177-3189 - Prasun Kanti Dey

, Murat Yuksel
:
Delegating Data Plane With Cloud-Assisted Routing. 3190-3204 - Jian Yang

, Qifeng Yuan
, Shuangwu Chen
, Huasen He
, Xiaofeng Jiang
, Xiaobin Tan
:
Cooperative Task Offloading for Mobile Edge Computing Based on Multi-Agent Deep Reinforcement Learning. 3205-3219 - Zengpeng Li

, Huiqun Yu
, Guisheng Fan
, Jiayin Zhang
:
Cost-Efficient Fault-Tolerant Workflow Scheduling for Deadline-Constrained Microservice-Based Applications in Clouds. 3220-3232 - Xiaocui Li

, Zhangbing Zhou
, Qiang He
, Zhensheng Shi, Walid Gaaloul, Sami Yangui
:
Re-Scheduling IoT Services in Edge Networks. 3233-3246 - Marcos Carvalho

, Daniel Fernandes Macedo
:
Container Scheduling in Co-Located Environments Using QoE Awareness. 3247-3260 - Anselme Ndikumana

, Kim Khoa Nguyen
, Mohamed Cheriet
:
Federated Learning Assisted Deep Q-Learning for Joint Task Offloading and Fronthaul Segment Routing in Open RAN. 3261-3273 - Fernando Zanferrari Morais

, Gustavo Zanatta Bruno
, Julio Renner
, Gabriel Matheus F. de Almeida
, Luis M. Contreras
, Rodrigo da Rosa Righi
, Kleber Vieira Cardoso
, Cristiano Bonato Both
:
OPlaceRAN - A Placement Orchestrator for Virtualized Next-Generation of Radio Access Network. 3274-3288 - Khondokar Fida Hasan

, Yanming Feng
, Yu-Chu Tian
:
Precise GNSS Time Synchronization With Experimental Validation in Vehicular Networks. 3289-3301 - Endri Goshi

, Raffael Stahl, Hasanin Harkous
, Mu He
, Rastin Pries
, Wolfgang Kellerer
:
PP5GS - An Efficient Procedure-Based and Stateless Architecture for Next-Generation Core Networks. 3318-3333 - Giap Le

, Sifat Ferdousi
, Andrea Marotta
, Sugang Xu
, Yusuke Hirota
, Yoshinari Awaji, S. Sedef Savas
, Massimo Tornatore
, Biswanath Mukherjee
:
Reliable Provisioning With Degraded Service Using Multipath Routing From Multiple Data Centers in Optical Metro Networks. 3334-3347 - Peiying Zhang

, Yuanjie Li, Neeraj Kumar
, Ning Chen
, Ching-Hsien Hsu
, Ahmed Barnawi
:
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks. 3348-3358 - Zheshun Wu

, Xiaoping Wu
, Yunliang Long
:
Joint Scheduling and Robust Aggregation for Federated Localization Over Unreliable Wireless D2D Networks. 3359-3379 - Shaofeng Dong, Jinsong Zhan, Wei Hu, Amin Mohajer

, Maryam Bavaghar, Abbas Mirzaei
:
Energy-Efficient Hierarchical Resource Allocation in Uplink-Downlink Decoupled NOMA HetNets. 3380-3395 - Sujie Shao

, Juntao Zheng
, Cheng Zhong, Pengcheng Lu, Shaoyong Guo
, Xiande Bu:
IEEE 802.11ax Meet Edge Computing: AP Seamless Handover for Multi-Service Communications in Industrial WLAN. 3396-3412 - Showkat Ahmad Bhat

, Nen-Fu Huang
, Imtiyaz Hussain, Uzair Sajjad:
Correlating the Ambient Conditions and Performance Indicators of the LoRaWAN via Surrogate Gaussian Process-Based Bidirectional LSTM Stacked Autoencoder. 3413-3427 - Hani Sami

, Reem Saado
, Ahmad El Saoudi, Azzam Mourad
, Hadi Otrok, Jamal Bentahar
:
Opportunistic UAV Deployment for Intelligent On-Demand IoV Service Management. 3428-3442 - Piotr Wiecek

, Oussama Habachi
, Majed Haddad
:
To Lie or Not to Lie in Non-Cooperative User-Centric Networks: Is Lying Worth It? 3443-3459 - Jing Mei

, Longbao Dai
, Zhao Tong
, Xin Deng
, Keqin Li:
Throughput-Aware Dynamic Task Offloading Under Resource Constant for MEC With Energy Harvesting Devices. 3460-3473 - Yulun Cheng

, Haitao Zhao
, Yiyang Ni
, Wenchao Xia
, Longxiang Yang
, Hongbo Zhu
:
A Game-Theoretic Incentive Mechanism for Battery Saving in Full Duplex Mobile Edge Computing Systems With Wireless Power Transfer. 3474-3486 - Basabdatta Palit

, Argha Sen, Abhijit Mondal, Ayan Zunaid, Jay Jayatheerthan, Sandip Chakraborty
:
Improving UE Energy Efficiency Through Network-Aware Video Streaming Over 5G. 3487-3500 - Kyoomars Alizadeh Noghani

, Andreas Kassler
, Javid Taheri
, Peter Öhlén, Calin Curescu:
Multiobjective Genetic Algorithm for Fast Service Function Chain Reconfiguration. 3501-3522 - Mario Minardi

, Thang X. Vu
, Lei Lei
, Christos Politis, Symeon Chatzinotas
:
Virtual Network Embedding for NGSO Systems: Algorithmic Solution and SDN-Testbed Validation. 3523-3535 - Suneet Kumar Singh

, Christian Esteve Rothenberg
, Marcelo Caggiani Luizelli
, Gianni Antichi
, Pedro Henrique Gomes
, Gergely Pongrácz
:
HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter Detection. 3536-3548 - Misbah Shafi, Rakesh Kumar Jha

, Sanjeev Jain
:
Intelligent Trust Ranking Security Preserving Model for B5G/6G. 3549-3561 - Takehiro Sato

, Takashi Kurimoto
, Shigeo Urushidani
, Eiji Oki
:
Virtualized Network Graph Design and Embedding Model to Minimize Provisioning Cost. 3562-3584 - Shuang Qin

, Mengjie Liu
, Gang Feng
:
Dynamic Service Chaining for Ultra-Reliable Services in Softwarized Networks. 3585-3595 - Sanaz Soltani

, Mohammad Shojafar
, Habib Mostafaei
, Rahim Tafazolli
:
Real-Time Link Verification in Software-Defined Networks. 3596-3611 - Ting-Shan Wong

, Steven S. W. Lee
:
Design of an In-Band Control Plane for Automatic Bootstrapping and Fast Failure Recovery in P4 Networks. 3612-3629 - Amir Gharehgoli, Ali Nouruzi

, Nader Mokari
, Paeiz Azmi
, Mohammad Reza Javan
, Eduard A. Jorswieck
:
AI-Based Resource Allocation in End-to-End Network Slicing Under Demand and CSI Uncertainties. 3630-3651 - Hang Li

, Zixuan Kong, Yawen Chen
, Luhan Wang
, Zhaoming Lu
, Xiangming Wen
, Wenpeng Jing
, Wan Xiang
:
Slice-Based Service Function Chain Embedding for End-to-End Network Slice Deployment. 3652-3672 - Ya-Ting Yang

, Hung-Yu Wei
:
A Coalition Formation Approach for Privacy and Energy-Aware Split Deep Learning Inference in Edge Camera Network. 3673-3685 - Dan Tang

, Zhiqing Zheng
, Xiaocai Wang, Sheng Xiao
, Qiuwei Yang
:
PeakSAX: Real-Time Monitoring and Mitigation System for LDoS Attack in SDN. 3686-3698 - Minzhao Lyu

, Hassan Habibi Gharakheili
, Craig Russell, Vijay Sivaraman
:
Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis. 3699-3716 - Junchao Xiao

, Lin Yang, Fuli Zhong
, Xiaolei Wang
, Hongbo Chen
, Dongyang Li:
Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network. 3717-3733 - Rodolfo Vieira Valentim

, Idilio Drago
, Martino Trevisan
, Marco Mellia
:
URLGEN - Toward Automatic URL Generation Using GANs. 3734-3746 - Yifan Li

, Xiaohe Hu, Chengjun Jia
, Kai Wang, Jun Li:
Kano: Efficient Cloud Native Network Policy Verification. 3747-3764 - Chang-Seop Park

, Wang-Seok Park, Samuel Woo
:
Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking. 3765-3781 - Cainã Figueiredo

, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar
, Daniel Sadoc Menasché
:
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. 3782-3802 - Weibin Meng

, Federico Zaiter, Yuzhe Zhang, Ying Liu, Shenglin Zhang, Shimin Tao, Yichen Zhu, Tao Han, Yongpeng Zhao, En Wang, Yuzhi Zhang, Dan Pei:
LogSummary: Unstructured Log Summarization for Software Systems. 3803-3815 - Zelin Wan

, Jin-Hee Cho
, Mu Zhu
, Ahmed H. Anwar
, Charles A. Kamhoua
, Munindar P. Singh
:
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception. 3816-3830 - Keshav Sood

, Dinh Duc Nha Nguyen
, Mohammad Reza Nosouhi
, Neeraj Kumar
, Frank Jiang
, Morshed Chowdhury
, Robin Doss
:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. 3831-3847 - Zaid Shakir Al-Attar

, Tarek Abbes, Faouzi Zerai
:
Smartphone-Key: Hands-Free Two-Factor Authentication for Voice-Controlled Devices Using Wi-Fi Location. 3848-3864 - Wenhao Shao

, Yanyan Wei, Praboda Rajapaksha
, Dun Li
, Zhigang Luo
, Noël Crespi:
Low-Latency Dimensional Expansion and Anomaly Detection Empowered Secure IoT Network. 3865-3879 - Xiongpeng Ren

, Jin Cao
, Ruhui Ma
, Yurong Luo, Jian Guan, Yinghui Zhang
, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. 3880-3899 - Chiho Kim, Sang-Yoon Chang

, Jonghyun Kim
, Dongeun Lee
, Jinoh Kim
:
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture. 3900-3914 - Miel Verkerken

, Laurens D'hooge
, Didik Sudyana
, Ying-Dar Lin
, Tim Wauters
, Bruno Volckaert
, Filip De Turck
:
A Novel Multi-Stage Approach for Hierarchical Intrusion Detection. 3915-3929 - Amir Javadpour

, Forough Ja'fari
, Tarik Taleb
, Chafika Benzaïd
:
Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks. 3930-3946
Volume 20, Number 4, December 2023
- Shixiong Qi

, Ziteng Zeng, Leslie Monis, K. K. Ramakrishnan
:
MiddleNet: A Unified, High-Performance NFV and Middlebox Framework With eBPF and DPDK. 3950-3967 - Keita Hasegawa, Daishi Kondo

, Masato Osumi, Hideki Tode:
Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture Attack. 3968-3983 - Luigi De Simone

, Mario Di Mauro
, Maurizio Longo
, Roberto Natella
, Fabio Postiglione
:
Multi-Provider IMS Infrastructure With Controlled Redundancy: A Performability Evaluation. 3984-3998 - Zhonghui Li

, Jian Li
, Kaiping Xue
, David S. L. Wei
, Ruidong Li
, Nenghai Yu
, Qibin Sun, Jun Lu:
Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks. 3999-4012 - Daniel Merling

, Thomas Stüber
, Michael Menth
:
Efficiency of BIER Multicast in Large Networks. 4013-4027 - Ali Nikkhah

, Scott Jordan
:
Analysis of the Requirements of Settlement-Free Interconnection Policies. 4028-4046 - Bofan Chen

, Feng Chen
, Shaofei Tang
, Qitao Zheng
, Zuqing Zhu
:
On Orchestration of Segment Routing and In-Band Network Telemetry. 4047-4060 - Claudio Marche

, Gian Giuseppe Soma
, Michele Nitti
:
A Cognitive Social IoT Approach for Smart Energy Management in a Real Environment. 4061-4072 - Yang Yang

, Yu Yan, Zhipeng Gao
, Lanlan Rui
, Rui Lyu, Bowen Gao, Peng Yu
:
A Network Traffic Classification Method Based on Dual-Mode Feature Extraction and Hybrid Neural Networks. 4073-4084 - Eduardo Sant'Ana da Silva

, Hélio Pedrini, Aldri Luiz dos Santos
:
Applying Graph Neural Networks to Support Decision Making on Collective Intelligent Transportation Systems. 4085-4096 - Vinod S. Khandkar, Manjesh K. Hanawal

:
FairNet: A Measurement Framework for Traffic Discrimination Detection on the Internet. 4097-4109 - Patrick Krämer

, Oliver Zeidler
, Philip Diederich
, Johannes Zerwas
, Andreas Blenk
, Wolfgang Kellerer
:
Mistill: Distilling Distributed Network Protocols From Examples. 4110-4125 - Mauro Femminella

, Gianluca Reali
:
Gossip-Based Monitoring Protocol for 6G Networks. 4126-4140 - Rama Krishna Muni, Kolar Purushothama Naveen

:
Optimal Subscription Policies for Participation-Dependent Social-Learning Markets. 4141-4157 - Joy Halder, Bijoy Chand Chatterjee

:
A Resource Allocation Model for Mixed-Grid Optical Networks. 4158-4169 - Nagao Ogino

:
Robust Design of Interdependent Networks Considering Intra-Network Support Flow. 4170-4185 - Leyi Shi

, Yifan Miao
, Jiahao Ren
, Ran Liu
:
Game Analysis and Optimization for Evolutionary Dynamic Heterogeneous Redundancy. 4186-4197 - Dandan Niu

, Guang Cheng
, Zihan Chen
:
TDS-KRFI: Reference Frame Identification for Live Web Streaming Toward HTTP Flash Video Protocol. 4198-4215 - Arnau Romero

, Carmen Delgado
, Lanfranco Zanzi
, Xi Li
, Xavier Costa-Pérez
:
OROS: Online Operation and Orchestration of Collaborative Robots Using 5G. 4216-4230 - Paolo Notaro

, Soroush Haeri
, Jorge Cardoso
, Michael Gerndt
:
LogRule: Efficient Structured Log Mining for Root Cause Analysis. 4231-4243 - Seyyed Mohammad Mahdi Hosseini Daneshvar

, Sayyed Majid Mazinani
:
On the Best Fitness Function for the WSN Lifetime Maximization: A Solution Based on a Modified Salp Swarm Algorithm for Centralized Clustering and Routing. 4244-4254 - Bentian Li

, Yunxia Lin, Izhar Ahmed Khan
:
Self-Supervised Learning IoT Device Features With Graph Contrastive Neural Network for Device Classification in Social Internet of Things. 4255-4267 - Salma Matoussi

, Ilhem Fajjari
, Nadjib Aitsaadi, Rami Langar
:
User-Centric Slice Allocation Scheme in 5G Networks and Beyond. 4268-4282 - Yaniv Sadeh

, Ori Rottenstreich
, Haim Kaplan:
Load Balancing With Minimal Deviation in Switch Memories. 4283-4296 - Da Xiao

, J. Andrew Zhang
, Xin Liu
, Yiwen Qu
, Wei Ni
, Ren Ping Liu
:
A Two-Stage GCN-Based Deep Reinforcement Learning Framework for SFC Embedding in Multi-Datacenter Networks. 4297-4312 - Yi Liu

, Jiangping Han
, Kaiping Xue
, Jian Li
, Qibin Sun, Jun Lu:
DECC: Achieving Low Latency in Data Center Networks With Deep Reinforcement Learning. 4313-4324 - Huaiyi Zhao

, Xinyi Zhang
, Yang Wang
, Zulong Diao
, Yanbiao Li
, Gaogang Xie
:
Improving the Scalability of Distributed Network Emulations: An Algorithmic Perspective. 4325-4339 - Qian Zhang

, Shangping Wang
, Duo Zhang
, Jifang Wang, Jin Sun
:
FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding. 4340-4353 - Li Duan

, Liu Yang
, Chunhong Liu
, Wei Ni
, Wei Wang
:
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services. 4354-4368 - Faheem Zafari

, Prithwish Basu, Kin K. Leung
, Jian Li
, Don Towsley
, Ananthram Swami:
Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach. 4369-4382 - Liangmin Guo

, Hao Yang, Kaixuan Luan, Li Sun, Yonglong Luo
, Liping Sun
:
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments. 4383-4396 - Jie Li, Yuhui Deng

, Yi Zhou
, Zhaorui Wu
, Shujie Pang
, Geyong Min
:
TADRP: Toward Thermal-Aware Data Replica Placement in Data-Intensive Data Centers. 4397-4415 - Akito Suzuki

, Masahiro Kobayashi
, Eiji Oki
:
Multi-Agent Deep Reinforcement Learning for Cooperative Computing Offloading and Route Optimization in Multi Cloud-Edge Networks. 4416-4434 - Domenico Scotece

, Claudio Fiandrino
, Luca Foschini
:
Handling Data Handoff of AI-Based Applications in Edge Computing Systems. 4435-4447 - Shreshth Tuli

, Giuliano Casale
, Nicholas R. Jennings
:
CILP: Co-Simulation-Based Imitation Learner for Dynamic Resource Provisioning in Cloud Computing Environments. 4448-4460 - José Santos

, Chen Wang, Tim Wauters
, Filip De Turck
:
Diktyo: Network-Aware Scheduling in Container-Based Clouds. 4461-4477 - Wentao Fan

, Fan Yang
, Peilong Wang, Mao Miao, Pengcheng Zhao, Tao Huang
:
DRL-Based Service Function Chain Edge-to-Edge and Edge-to-Cloud Joint Offloading in Edge-Cloud Network. 4478-4493 - Long Cheng

, Ying Wang
, Rutvij H. Jhaveri
, Qingle Wang, Ying Mao:
Toward Network-Aware Query Execution Systems in Large Datacenters. 4494-4504 - Georgios Boulougaris

, Kostas Kolomvatsos
:
An Inference Mechanism for Proactive Service Migration at the Edge. 4505-4516 - Claudio Marche

, Valeria Loscrì
, Michele Nitti
:
A Channel Selection Model Based on Trust Metrics for Wireless Communications. 4517-4527 - Zhuofan Liao

, Shuangle Xu, Jiawei Huang
, Jianxin Wang
:
Task Migration and Resource Allocation Scheme in IoV With Roadside Unit. 4528-4541 - Hui Xiao

, Jiawei Huang
, Zhigang Hu, Meiguang Zheng
, Keqin Li
:
Collaborative Cloud-Edge-End Task Offloading in MEC-Based Small Cell Networks With Distributed Wireless Backhaul. 4542-4557 - Qiang Tang

, Yong Yang
, Lixin Liu, Kun Yang
:
Minimal Throughput Maximization of UAV-Enabled Wireless Powered Communication Network in Cuboid Building Perimeter Scenario. 4558-4571 - Xin Wang

, Hong Shen
, Hui Tian
:
Efficient and Fair: Information-Agnostic Online Coflow Scheduling by Combining Limited Multiplexing With DRL. 4572-4584 - Neha Sharma

, Udit Agarwal
, Sunny Shaurya
, Shashank Mishra, Om Jee Pandey
:
Energy-Efficient and QoS-Aware Data Routing in Node Fault Prediction Based IoT Networks. 4585-4599 - Kaushik Mishra, Goluguri N. V. Rajareddy

, Umashankar Ghugar, Gurpreet Singh Chhabra
, Amir H. Gandomi
:
A Collaborative Computation and Offloading for Compute-Intensive and Latency-Sensitive Dependency-Aware Tasks in Dew-Enabled Vehicular Fog Computing: A Federated Deep Q-Learning Approach. 4600-4614 - Sepideh Malektaji

, Marsa Rayani
, Amin Ebrahimzadeh
, Vahid Maleki Raee
, Halima Elbiaze
, Roch H. Glitho
:
Dynamic Joint VNF Forwarding Graph Composition and Embedding: A Deep Reinforcement Learning Framework. 4615-4633 - Hang Li

, Luhan Wang
, Zhenghe Zhu, Yawen Chen
, Zhaoming Lu
, Xiangming Wen
:
Multicast Service Function Chain Orchestration in SDN/NFV-Enabled Networks: Embedding, Readjustment, and Expanding. 4634-4651 - Rahul Mishra

, Dharavath Ramesh
, Paolo Bellavista
, Damodar Reddy Edla
:
Redactable Blockchain-Assisted Secure Data Aggregation Scheme for Fog-Enabled Internet-of-Farming-Things. 4652-4667 - Jingyu Liang

, Bowen Ma
, Zihan Feng
, Jiwei Huang
:
Reliability-Aware Task Processing and Offloading for Data-Intensive Applications in Edge computing. 4668-4680 - Zeyuan Yang

, Rentao Gu
, Yuefeng Ji
:
Virtual Network Embedding Over Multi-Band Elastic Optical Network Based on Cross-Matching Mechanism and Hypergraph Theory. 4681-4697 - Wissal Attaoui

, Essaid Sabir
, Halima Elbiaze
, Mohsen Guizani
:
VNF and CNF Placement in 5G: Recent Advances and Future Trends. 4698-4733 - Zhuo Li

, Xingdi Shen
, Hao Xun
, Yang Miao, Weizhe Zhang
, Peng Luo, Kaihua Liu
:
CoopCon: Cooperative Hybrid Congestion Control Scheme for Named Data Networking. 4734-4750 - Ningyuan Sun

, Xiaole Li, Hongyun Zheng
, Yongxiang Zhao, Yuchun Guo:
Dynamic Upgrade to SDN From a Global Perspective: Model and Its Heuristic Solutions. 4751-4764 - Hasanin Harkous

, Bassel Aboul Hosn, Mu He
, Michael Jarschel
, Rastin Pries
, Wolfgang Kellerer
:
Performance-Aware Orchestration of P4-Based Heterogeneous Cloud Environments. 4765-4778 - Shintaro Ozaki

, Takehiro Sato
, Eiji Oki
:
Service Chain Provisioning Model Considering Traffic Changes Due to Virtualized Network Functions. 4779-4802 - Zhenke Chen

, He Li
, Kaoru Ota
, Mianxiong Dong
:
HyScaler: A Dynamic, Hybrid VNF Scaling System for Building Elastic Service Function Chains Across Multiple Servers. 4803-4814 - Hai Yang

, Bingli Guo
, Xuwei Xue
, Xinyuan Deng, Yisong Zhao, Xinbin Cui, Chengguang Pang, Huilin Ren, Shanguo Huang
:
Interruption Tolerance Strategy for LEO Constellation With Optical Inter-Satellite Link. 4815-4830 - Antonio Petrosino

, Giuseppe Piro
, Luigi Alfredo Grieco
, Gennaro Boggia
:
On the Optimal Deployment of Virtual Network Functions in Non-Terrestrial Segments. 4831-4845 - Arled Papa

, Polina Kutsevol
, Fidan Mehmeti
, Wolfgang Kellerer
:
Delphi: Computing the Maximum Achievable Throughput in SD-RAN Environments. 4846-4860 - Fujun He

, Eiji Oki
:
Service Deployment With Priority Queueing for Traffic Processing and Transmission in Network Function Virtualization. 4861-4874 - Qianqian Wu

, Qiang Liu
, Zequn Jia
, Ning Xin
, Te Chen:
P4SQA: A P4 Switch-Based QoS Assurance Mechanism for SDN. 4875-4886 - Shinji Noda

, Takehiro Sato
, Eiji Oki
:
Fault-Tolerant Controller Placement Model Considering Load-Dependent Sojourn Time in Software-Defined Network. 4887-4908 - Konstantinos Papadopoulos

, Panagiotis Papadimitriou
, Chrysa Papagianni
:
Deterministic and Probabilistic P4-Enabled Lightweight In-Band Network Telemetry. 4909-4922 - Run-Hua Shi

, Hui Yu:
Privacy-Preserving Range Query Quantum Scheme With Single Photons in Edge-Based Internet of Things. 4923-4936 - Ghulam Mohiuddin

, Zhiqiang Liu, Jiangbin Zheng, Sifei Wang, Zhijun Lin, Muhammad Asim
, Yuxuan Zhong, Yuxin Chen:
Intrusion Detection Using Hybrid Enhanced CSA-PSO and Multivariate WLS Random-Forest Technique. 4937-4950 - Paulo Freitas de Araujo-Filho

, Mohamed Naili, Georges Kaddoum
, Emmanuel Thepie Fapi
, Zhongwen Zhu
:
Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention. 4951-4963 - Ziling Shao

, Tingzheng Chen
, Guang Cheng
, Xiaoyan Hu
, Weina Li
, Hua Wu
:
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing. 4964-4981 - Ke Gu

, Wenbin Zhang, Xingqiang Wang, Xiong Li
, Weijia Jia
:
Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification. 4982-4999 - Ari Adler

, Lior Bass, Yuval Elovici
, Rami Puzis:
How Polynomial Regression Improves DeNATing. 5000-5011 - Francesca Soro, Thomas Favale

, Danilo Giordano
, Idilio Drago
, Tommaso Rescio, Marco Mellia
, Zied Ben-Houidi
, Dario Rossi
:
Enlightening the Darknets: Augmenting Darknet Visibility With Active Probes. 5012-5025 - Jude Tchaye-Kondi

, Yanlong Zhai
, Jun Shen
, Liehuang Zhu
:
Privacy-Preserving Offloading in Edge Intelligence Systems With Inductive Learning and Local Differential Privacy. 5026-5037 - Hnin Pann Phyu

, Razvan Stanica
, Diala Naboulsi
:
Multi-Slice Privacy-Aware Traffic Forecasting at RAN Level: A Scalable Federated-Learning Approach. 5038-5052 - Aida Meftah

, Tri Nhu Do
, Georges Kaddoum
, Chamseddine Talhi, Satinder Singh
:
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks. 5053-5072 - Dan Tang

, Chenjun Gao
, Wei Liang
, Jiliang Zhang, Keqin Li
:
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN. 5073-5084 - Kento Yokouchi

, Fujun He
, Eiji Oki
:
Backup Resource Allocation of Virtual Machines With Two-Stage Probabilistic Protection. 5085-5102 - Peng Zhou

, Chengyuan Li, Chong Chen, Dakui Wu
, Minrui Fei
:
P3 AD: Privacy-Preserved Payload Anomaly Detection for Industrial Internet of Things. 5103-5114 - Gaith Rjoub

, Jamal Bentahar
, Omar Abdel Wahab
, Rabeb Mizouni
, Alyssa Song, Robin Cohen, Hadi Otrok
, Azzam Mourad
:
A Survey on Explainable Artificial Intelligence for Cybersecurity. 5115-5140 - Umar S. Suryahatmaja

, Mehdi Mrad
, Mohamed Naceur Azaiez, Asma Ben Yaghlane, Anis Gharbi
:
The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources. 5141-5154 - Lihe Hou

, Weiwei Ni, Sen Zhang
, Nan Fu, Dongyue Zhang
:
WDP-GAN: Weighted Graph Generation With GAN Under Differential Privacy. 5155-5165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














