International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 35, issue 2, 2025
- Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks

- Daniel Spiekermann
- SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time‐Sensitive Networks

- Chang Liu, Jin Wang, Chang Liu, Jie Wang, Li Tian, Xiao Yu and Min Wei
- Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

- Nils Höger, Nils Rodday and Gabi Dreo Rodosek
- Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios

- Yu Zhou
- Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles

- Xueqin Ni, Zhiyuan Dong and Xia Rong
- Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges

- Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris and Jeffrey Klinck
- Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem

- Jaime Galán‐Jiménez, Mohamed Faten Zhani, José Gómez‐delaHiz and John Kaippallimalil
- Computationally Efficient Approach for 6G‐AI‐IoT Network Slicing and Error‐Free Transmission

- Yunxiang Qi
- Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture

- Peng Li and Jianing Du
- Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing

- Na Liu
- An Adaptive Routing Architecture for IoT Multipath Video Transmission

- Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos and Katia Obraczka
Volume 35, issue 1, 2025
- SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks

- Nagalapuram Selvarajan Swapna, Raguru Jaya Krishna, Avija Vishnuvardhan Reddy, Patike Kiran Rao and Perumalla Suman Prakash
- Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks

- Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian and Weixing Liu
- Data sharing mode of dispatching automation system based on distributed machine learning

- Xiaoli He, Mi Luo, Yurui Hu and Feng Xiong
- Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network

- Xin Wan, Xiang Huang and Fuzhi Wang
- A distributed algorithm with network‐independent step‐size and event‐triggered mechanism for economic dispatch problem

- Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz and Changhai Sun
- Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain

- Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang and Hanzhou Wu
- Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things

- Bohao Jiang, Chaoyang Li, Yu Tang and Xiangjun Xin
- No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation

- Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto and Alberto Egon Schaeffer‐Filho
- Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions

- Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang and Haomiao Yang
- An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks

- Muhammad Yousaf Saeed, Jingsha He, Nafei Zhu, Muhammad Farhan, Soumyabrata Dev, Thippa Reddy Gadekallu and Ahmad Almadhor
- An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network

- Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh and Ala' M. Al‐Zoubi
- ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing

- Babar Ali, Muhammed Golec, Sukhpal Singh Gill, Felix Cuadrado and Steve Uhlig
- An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing

- Geetanjali Rathee, Hemraj Saini, Selvaraj Praveen Chakkravarthy and Rajagopal Maheswar
- A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse

- Yong Ding, Weiguo Huang, Hai Liang, Yujue Wang, Changsong Yang and Huiyong Wang
- Homomorphic Witness Encryption and Its Applications

- Yuzhu Wang, Xingbo Wang and Mingwu Zhang
- Updatable Signature Scheme With Weakened Token and No‐Directional Key Update

- Jiacheng Zhou, Zhenhua Liu and Baocang Wang
- Autonomous Attack Mitigation Through Firewall Reconfiguration

- Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto and Fulvio Valenza
- Massive Data HBase Storage Method for Electronic Archive Management

- Huaquan Su, Junwei Li, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li and Pingyan Mo
- The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens

- Andrei C. Azevedo, Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki and Lisandro Z. Granville
- SentinelGuard Pro: Deploying Cutting‐Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents

- Vankadhara Rajyalakshmi and Kuruva Lakshmanna
- Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication

- Abdulhakim Sabur
- Intent‐Based Network Configuration Using Large Language Models

- Nguyen Tu, Sukhyun Nam and James Won‐Ki Hong
- MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications

- Chenxi Xiong, Ting Yang and Gang Mao
- Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks

- Banoth Ravi and Utkarsh Verma
- Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network

- Junwei Li, Huaquan Su, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li and Pingyan Mo
- REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation

- Lyn Hill, Charalampos Rotsos, Chris Edwards and David Hutchison
- An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing

- Saurav Tripathi and Sarsij Tripathi
- A Method for Sharing English Education Resources in Multiple Virtual Networks Based on 6G

- Hongliu He
- Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning

- Aristide Tanyi‐Jong Akem, Guillaume Fraysse and Marco Fiore
- Multitopology Routing With Virtual Topologies and Segment Routing

- Nicolas Huin, Sébastien Martin and Jérémie Leguay
- Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection

- Sukhyun Nam, Eui‐Dong Jeong and James Won‐Ki Hong
- Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning

- Nguyen Van Tu, Sang‐Woo Ryu, Kyung‐Chan Ko, Jae‐Hyoung Yoo and James Won‐Ki Hong
- A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform

- Xiaozheng Liu
- Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax

- Alexander Brechlin, Jochen Schäfer and Frederik Armknecht
- Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse

- Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang and Jing Zhou
- Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice

- Honghui Zhu
Volume 34, issue 4, 2024
- Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges

- Wonseok Choi, Jongsoo Woo and James Won‐Ki Hong
- Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity

- Srisht Fateh Singh, Panagiotis Michalopoulos and Andreas Veneris
- Athena: Smart order routing on centralized crypto exchanges using a unified order book

- Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner and Markus Bick
- Leveraging Ponzi‐like designs in stablecoins

- Shange Fu, Qin Wang, Jiangshan Yu and Shiping Chen
- Innovations in Blockchain for Crypto Assets and Exchanges

- James Won‐Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong and Changhoon Kang
Volume 34, issue 3, 2024
- Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network

- V. Karthik, R. Lakshmi, Salini Abraham and M. Ramkumar
- A novel eviction policy based on shortest remaining time for software defined networking flow tables

- Kavi Priya Dhandapani, Mirnalinee Thanganadar Thangathai and Shahul Hamead Haja Moinudeen
- TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network

- Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad and Johari Abdullah
- Reducing the propagation delay of compact block in Bitcoin network

- Aeri Kim, Meryam Essaid, Sejin Park and Hongtaek Ju
Volume 34, issue 2, 2024
- Availability‐aware virtual network function placement based on multidimensional universal generating functions

- Kengo Arakawa and Eiji Oki
- Topology analysis of the Ripple transaction network

- Anan Jin, Yuhang Ye, Brian Lee and Yuansong Qiao
- A comprehensive review of blockchain integration in remote patient monitoring for E‐health

- Nedia Badri, Leïla Nasraoui and Leïla Azouz Saïdane
- Blockchain and crypto forensics: Investigating crypto frauds

- Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar and Mano Yadav
Volume 34, issue 1, 2024
- Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm

- Vankadhara Rajyalakshmi and Kuruva Lakshmanna
- Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning

- Shengyi Yang and Shaoying Zhu
- Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges

- Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo and James Won‐Ki Hong
- Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files

- Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir‐Heywood and Malcolm I. Heywood
| |