default search action
International Journal of Network Management, Volume 29
Volume 29, Number 1, January 2019
Editorial
- Franco Callegati, Walter Cerroni:
IEEE NetSoft 2017 special issue: Softwarization sustaining a hyper-connected world: En route to 5G.
- Filippo Rebecchi, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
DDoS protection with stateful software-defined networking. - Salvatore Pontarelli, Marco Bonola, Giuseppe Bianchi:
Smashing OpenFlow's "atomic" actions: Programmable data plane packet manipulation in hardware. - Luca Chiaraviglio, Lavinia Amorosi, Nicola Blefari-Melazzi, Paolo Dell'Olmo, Mohammad Shojafar, Stefano Salsano:
Optimal management of reusable functional blocks in 5G superfluid networks. - Gianluca Davoli, Walter Cerroni, Slavica Tomovic, Chiara Buratti, Chiara Contoli, Franco Callegati:
Intent-based service management for heterogeneous software-defined infrastructure domains.
Volume 29, Number 2, March 2019
- Takashi Miyamura, Akira Misawa, Junichi Kani:
Highly efficient optical aggregation network with network functions virtualization. - Rodérick Fanou, Victor Sanchez-Agüero, Francisco Valera, Michuki Mwangi, Jane Coffin:
A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier. - Emmanouil Vasilomanolakis, Max Mühlhäuser:
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems. - Huru Hasanova, Ui-Jun Baek, Mu-Gon Shin, Kyunghee Cho, Myung-Sup Kim:
A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. - Marcus Lemos, Ricardo A. L. Rabêlo, Douglas Mendes, Carlos Giovanni Carvalho, Raimir Holanda:
An approach for provisioning virtual sensors in sensor clouds. - Malayam Parambath Gilesh, S. D. Madhu Kumar, Lillykutty Jacob:
Resource availability-aware adaptive provisioning of virtual data center networks.
Volume 29, Number 3, May 2019
Editorial
- Carol J. Fung, Jérôme François, Weverton Cordeiro, Mohamed Faten Zhani:
Advanced security management.
- Tien D. Phan, Nur Zincir-Heywood:
User identification via neural network based language models. - Abdurrahman Pektas, Tankut Acarman:
A deep learning method to detect network intrusion through flow-based features. - Mahesh Kumar Prasath, Balasubramani Perumal:
A meta-heuristic Bayesian network classification for intrusion detection. - Sofiane Lagraa, Yutian Chen, Jérôme François:
Deep mining port scans from darknet. - Lucas M. Palma, Martín A. Gagliotti Vigil, Fernando Lauro Pereira, Jean Everson Martina:
Blockchain and smart contracts for higher education registry in Brazil. - Leonardo B. da Costa, André Silva Neto, Billy Pinheiro, Weverton Cordeiro, Roberto Araújo, Antônio Abelém:
Securing light clients in blockchain with DLCP.
Volume 29, Number 4, July 2019
- Manuel Peuster, Hannes Kuttner, Holger Karl:
A flow handover protocol to support state migration in softwarized networks. - Damir Breskovic, Dinko Begusic:
Techno-economic analysis of FiWi access networks based on optimized source packet traffic. - Rafael Xavier, Lisandro Zambenedetti Granville, Filip De Turck, Bruno Volckaert:
Efficient allocation of elastic interfederation encrypted streaming sessions.
Volume 29, Number 5, September 2019
- Nitin Shukla, Mayank Pandey, Shashank Srivastava:
Formal modeling and verification of software-defined networks: A survey. - Tiago O. Castro, Vitor Gabriel Reis Caitité, Daniel F. Macedo, Aldri L. dos Santos:
CASA-IoT: Scalable and context-aware IoT access control supporting multiple users.
Volume 29, Number 6, November 2019
- Jonghwan Hyun, Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:
Real-time and fine-grained network monitoring using in-band network telemetry. - Guilherme Arthur Geronimo, Rafael Brundo Uriarte, Carlos Becker Westphall:
Order@Cloud: An agnostic meta-heuristic for VM provisioning, adaptation, and organisation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.