EconPapers    
Economics at your fingertips  
 

International Journal of Network Management

2015 - 2025

From John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 35, issue 2, 2025

Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks Downloads
Daniel Spiekermann
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time‐Sensitive Networks Downloads
Chang Liu, Jin Wang, Chang Liu, Jie Wang, Li Tian, Xiao Yu and Min Wei
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility Downloads
Nils Höger, Nils Rodday and Gabi Dreo Rodosek
Network Security Threats and Defense Mechanisms for 6G Multi‐Virtual Network Scenarios Downloads
Yu Zhou
Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles Downloads
Xueqin Ni, Zhiyuan Dong and Xia Rong
Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges Downloads
Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris and Jeffrey Klinck
Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem Downloads
Jaime Galán‐Jiménez, Mohamed Faten Zhani, José Gómez‐delaHiz and John Kaippallimalil
Computationally Efficient Approach for 6G‐AI‐IoT Network Slicing and Error‐Free Transmission Downloads
Yunxiang Qi
Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture Downloads
Peng Li and Jianing Du
Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing Downloads
Na Liu
An Adaptive Routing Architecture for IoT Multipath Video Transmission Downloads
Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos and Katia Obraczka

Volume 35, issue 1, 2025

SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things‐enabled wireless sensor networks Downloads
Nagalapuram Selvarajan Swapna, Raguru Jaya Krishna, Avija Vishnuvardhan Reddy, Patike Kiran Rao and Perumalla Suman Prakash
Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks Downloads
Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian and Weixing Liu
Data sharing mode of dispatching automation system based on distributed machine learning Downloads
Xiaoli He, Mi Luo, Yurui Hu and Feng Xiong
Workload prediction based on improved error correlation logistic regression algorithm and Cross‐TRCN of spatiotemporal neural network Downloads
Xin Wan, Xiang Huang and Fuzhi Wang
A distributed algorithm with network‐independent step‐size and event‐triggered mechanism for economic dispatch problem Downloads
Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz and Changhai Sun
Screen‐shooting resistant robust document watermarking in the Discrete Fourier Transform domain Downloads
Yazhou Zhang, Chaoyue Huang, Shaoteng Liu, Leichao Huang, Tianshu Yang, Xinpeng Zhang and Hanzhou Wu
Secure cross‐chain transactions for medical data sharing in blockchain‐based Internet of Medical Things Downloads
Bohao Jiang, Chaoyang Li, Yu Tang and Xiangjun Xin
No Worker Left (Too Far) Behind: Dynamic Hybrid Synchronization for In‐Network ML Aggregation Downloads
Diego Cardoso Nunes, Bruno Loureiro Coelho, Ricardo Parizotto and Alberto Egon Schaeffer‐Filho
Privacy Preservation of Large Language Models in the Metaverse Era: Research Frontiers, Categorical Comparisons, and Future Directions Downloads
Dabin Huang, Mengyu Ge, Kunlan Xiang, Xiaolei Zhang and Haomiao Yang
An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks Downloads
Muhammad Yousaf Saeed, Jingsha He, Nafei Zhu, Muhammad Farhan, Soumyabrata Dev, Thippa Reddy Gadekallu and Ahmad Almadhor
An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network Downloads
Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh and Ala' M. Al‐Zoubi
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing Downloads
Babar Ali, Muhammed Golec, Sukhpal Singh Gill, Felix Cuadrado and Steve Uhlig
An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing Downloads
Geetanjali Rathee, Hemraj Saini, Selvaraj Praveen Chakkravarthy and Rajagopal Maheswar
A Fast Cross‐Chain Protocol Based on Trusted Notary Group for Metaverse Downloads
Yong Ding, Weiguo Huang, Hai Liang, Yujue Wang, Changsong Yang and Huiyong Wang
Homomorphic Witness Encryption and Its Applications Downloads
Yuzhu Wang, Xingbo Wang and Mingwu Zhang
Updatable Signature Scheme With Weakened Token and No‐Directional Key Update Downloads
Jiacheng Zhou, Zhenhua Liu and Baocang Wang
Autonomous Attack Mitigation Through Firewall Reconfiguration Downloads
Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto and Fulvio Valenza
Massive Data HBase Storage Method for Electronic Archive Management Downloads
Huaquan Su, Junwei Li, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li and Pingyan Mo
The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens Downloads
Andrei C. Azevedo, Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki and Lisandro Z. Granville
SentinelGuard Pro: Deploying Cutting‐Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents Downloads
Vankadhara Rajyalakshmi and Kuruva Lakshmanna
Lightweight Flow‐Based Policy Enforcement for SDN‐Based Multi‐Domain Communication Downloads
Abdulhakim Sabur
Intent‐Based Network Configuration Using Large Language Models Downloads
Nguyen Tu, Sukhyun Nam and James Won‐Ki Hong
MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications Downloads
Chenxi Xiong, Ting Yang and Gang Mao
Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks Downloads
Banoth Ravi and Utkarsh Verma
Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network Downloads
Junwei Li, Huaquan Su, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li and Pingyan Mo
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation Downloads
Lyn Hill, Charalampos Rotsos, Chris Edwards and David Hutchison
An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing Downloads
Saurav Tripathi and Sarsij Tripathi
A Method for Sharing English Education Resources in Multiple Virtual Networks Based on 6G Downloads
Hongliu He
Real‐Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning Downloads
Aristide Tanyi‐Jong Akem, Guillaume Fraysse and Marco Fiore
Multitopology Routing With Virtual Topologies and Segment Routing Downloads
Nicolas Huin, Sébastien Martin and Jérémie Leguay
Log‐TF‐IDF and NETCONF‐Based Network Switch Anomaly Detection Downloads
Sukhyun Nam, Eui‐Dong Jeong and James Won‐Ki Hong
Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning Downloads
Nguyen Van Tu, Sang‐Woo Ryu, Kyung‐Chan Ko, Jae‐Hyoung Yoo and James Won‐Ki Hong
A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform Downloads
Xiaozheng Liu
Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax Downloads
Alexander Brechlin, Jochen Schäfer and Frederik Armknecht
Domain‐Adaptive Power Profiling Analysis Strategy for the Metaverse Downloads
Xiang Li, Ning Yang, Weifeng Liu, Aidong Chen, Yanlong Zhang, Shuo Wang and Jing Zhou
Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice Downloads
Honghui Zhu

Volume 34, issue 4, 2024

Fractional non‐fungible tokens: Overview, evaluation, marketplaces, and challenges Downloads
Wonseok Choi, Jongsoo Woo and James Won‐Ki Hong
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity Downloads
Srisht Fateh Singh, Panagiotis Michalopoulos and Andreas Veneris
Athena: Smart order routing on centralized crypto exchanges using a unified order book Downloads
Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner and Markus Bick
Leveraging Ponzi‐like designs in stablecoins Downloads
Shange Fu, Qin Wang, Jiangshan Yu and Shiping Chen
Innovations in Blockchain for Crypto Assets and Exchanges Downloads
James Won‐Ki Hong, Andreas Veneris, Hongtaek Ju, Taeyeol Jeong and Changhoon Kang

Volume 34, issue 3, 2024

Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network Downloads
V. Karthik, R. Lakshmi, Salini Abraham and M. Ramkumar
A novel eviction policy based on shortest remaining time for software defined networking flow tables Downloads
Kavi Priya Dhandapani, Mirnalinee Thanganadar Thangathai and Shahul Hamead Haja Moinudeen
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network Downloads
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad and Johari Abdullah
Reducing the propagation delay of compact block in Bitcoin network Downloads
Aeri Kim, Meryam Essaid, Sejin Park and Hongtaek Ju

Volume 34, issue 2, 2024

Availability‐aware virtual network function placement based on multidimensional universal generating functions Downloads
Kengo Arakawa and Eiji Oki
Topology analysis of the Ripple transaction network Downloads
Anan Jin, Yuhang Ye, Brian Lee and Yuansong Qiao
A comprehensive review of blockchain integration in remote patient monitoring for E‐health Downloads
Nedia Badri, Leïla Nasraoui and Leïla Azouz Saïdane
Blockchain and crypto forensics: Investigating crypto frauds Downloads
Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar and Mano Yadav

Volume 34, issue 1, 2024

Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm Downloads
Vankadhara Rajyalakshmi and Kuruva Lakshmanna
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning Downloads
Shengyi Yang and Shaoying Zhu
Survey on blockchain‐based non‐fungible tokens: History, technologies, standards, and open challenges Downloads
Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo and James Won‐Ki Hong
Assessing the impact of bag‐of‐words versus word‐to‐vector embedding methods and dimension reduction on anomaly detection from log files Downloads
Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir‐Heywood and Malcolm I. Heywood
Page updated 2025-04-06