International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 33, issue 6, 2023
- A novel data streaming method for detecting abnormal flows in distributed monitoring systems

- Aiping Zhou and Ye Zhu
- Characterizing the Bitcoin network topology with Node‐Probe

- Meryam Essaid, Changhyun Lee and Hongteak Ju
- Placement of virtual network functions for network services

- Brajesh Kumar Umrao and Dharmendra Kumar Yadav
- Joint service placement and user assignment model in multi‐access edge computing networks against base‐station failure

- Haruto Taka, Fujun He and Eiji Oki
- Blockchain‐based data deduplication using novel content‐defined chunking algorithm in cloud environment

- Jabin Prakash J, Ramesh K, Saravanan K and Lakshmi Prabha G
Volume 33, issue 5, 2023
- Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review

- Banoth Ravi, Manoj Kumar, Yu‐Chen Hu, Shamsul Hassan and Bittu Kumar
- A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment

- Wenjun Song, Mengqi Liu, Thar Baker, Qikun Zhang and Yu‐an Tan
- Blockchain‐inspired lightweight trust‐based system in vehicular networks

- Sandeep Kumar Arora, Gulshan Kumar, Mustapha Hedabou, El Mehdi Amhoud and Celestine Iwendi
- Dynamic management network system of automobile detection applying edge computing

- Xianhong Cao
- A blockchain‐enabled security management framework for mobile edge computing

- Jafar A. Alzubi, Omar A. Alzubi, Ashish Singh and Tareq Mahmod Alzubi
- Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing

- Jitendra Kumar Samriya, Mohit Kumar and Sukhpal Singh Gill
- Load balancing clustering and routing for IoT‐enabled wireless sensor networks

- Shashank Singh and Veena Anand
- Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system

- Erukala Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, A. Kousar Nikhath and Rajesh Kaluri
- Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things

- Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury and Ilir Murturi
Volume 33, issue 4, 2023
- RNN‐EdgeQL: An auto‐scaling and placement approach for SFC

- Suman Pandey, Minji Choi, Jae‐Hyoung Yoo and James Won‐Ki Hong
- SRv6‐based Time‐Sensitive Networks (TSN) with low‐overhead rerouting

- Gagan Nandha Kumar, Kostas Katsalis, Panagiotis Papadimitriou, Paul Pop and Georg Carle
- Analysis of network function sharing in Content Delivery Network‐as‐a‐service slicing scenarios

- Luis M. Contreras, Alberto Solano, Francisco Cano and Jesus Folgueira
- Accelerating network softwarization in the cognitive age

- Kohei Shiomoto, Young‐Tak Kim, Christian Esteve Rothenberg, Barbara Martini and Eiji Oki
Volume 33, issue 3, 2023
- Privacy‐preserving and efficient user matching based on attribute encryption in mobile social networks

- Lei Wu, Shengnan Zhao, Xia Wei and Lingzhen Meng
- Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard

- Shixiong Yao, Xingjian Tian, Jiageng Chen and Yi Xiong
- Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis

- Peng Zeng, Guanjun Lin, Jun Zhang and Ying Zhang
- MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure

- Sangjukta Das and Suyel Namasudra
- A federated semi‐supervised learning approach for network traffic classification

- Zhiping Jin, Zhibiao Liang, Meirong He, Yao Peng, Hanxiao Xue and Yu Wang
- Editorial for special issue on security and trust on networked systems

- Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen and Chao Chen
Volume 33, issue 2, 2023
- Audit‐based correction mechanism for malicious statistics information of data plane

- Dong Liang, Qinrang Liu, Ke Song, Binghao Yan and Tao Hu
- On minimizing flow monitoring costs in large‐scale software‐defined network networks

- Haythem Yahyaoui, Mohamed Faten Zhani, Ouns Bouachir and Moayad Aloqaily
- Optimal network‐aware virtual data center embedding

- Ameni Hbaieb and Mahdi Khemakhem
Volume 33, issue 1, 2023
- EEPPDA—Edge‐enabled efficient privacy‐preserving data aggregation in smart healthcare Internet of Things network

- Tanima Bhowmik and Indrajit Banerjee
- Graph neural network‐based virtual network function deployment optimization

- Hee‐Gon Kim, Suhyun Park, Stanislav Lange, Doyoung Lee, Dongnyeong Heo, Heeyoul Choi, Jae‐Hyoung Yoo and JamesWon‐Ki Hong
- Towards optimal synchronization in NFV‐based environments

- Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily and Ouns Bouachir
Volume 32, issue 6, 2022
- Software‐defined content delivery network at the edge for adaptive video streaming

- Akhilesh Kumar, Shashwati Banerjea, Rishabh Jain and Mayank Pandey
- FGLB: A fine‐grained hardware intra‐server load balancer based on 100 G FPGA SmartNIC

- Xiaoying Huang, Zhichuan Guo and Mangu Song
- Container placement and migration strategies for cloud, fog, and edge data centers: A survey

- Kiranpreet Kaur, Fabrice Guillemin and Francoise Sailhan
- Load migration in distributed softwarized network controllers

- Sepehr Abbasi Zadeh, Farid Zandi, Mohammad Amin Beiruti and Yashar Ganjali
Volume 32, issue 5, 2022
- A cost‐effective and load‐balanced controller placement method in software‐defined networks

- Mili Dhar, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma and Swapan Debbarma
- Dissemination control in dynamic data clustering for dense IIoT against false data injection attack

- Carlos Pedroso and Aldri Santos
- Content Media Retrieval using Virtual Network Functions in Multi‐access Edge Computing architecture

- Ian Vilar Bastos, Igor Monteiro Moraes, Thi‐Mai‐Trang Nguyen and Guy Pujolle
- vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH

- Reza Shokri Kalan, Stuart Clayman and Muge Sayıt
Volume 32, issue 4, 2022
- A secure cross‐organizational container deployment approach to enable ad hoc collaborations

- Laurens Van Hoye, Tim Wauters, Filip De Turck and Bruno Volckaert
- amulog: A general log analysis framework for comparison and combination of diverse template generation methods

- Satoru Kobayashi, Yuya Yamashiro, Kazuki Otomo and Kensuke Fukuda
- Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation

- Ranjeet B. Kagade and Santhosh Jayagopalan
- Cost‐effective and accurate flow statistics collection in OpenFlow‐based SDN

- Binghao Yan, Qinrang Liu, Jianliang Shen, Dong Liang and Xingyu Liu
Volume 32, issue 3, 2022
- A batch delivery mechanism of network update in software‐defined wide area networks

- RongBo Zhang, Xin Li, Jibin Niu and Yinqing Wang
- MediTrans—Patient‐centric interoperability through blockchain

- Merlin George and Anu Mary Chacko
- Towards threshold‐agnostic heavy‐hitter classification

- Adrian Pekar, Alejandra Duque‐Torres, Winston K.G. Seah and Oscar M. Caicedo Rendon
- Block diffusion delay attack and its countermeasures in a Bitcoin network

- Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang and Shoji Kasahara
- Predicting short‐term mobile Internet traffic from Internet activity using recurrent neural networks

- Guto Leoni Santos, Pierangelo Rosati, Theo Lynn, Judith Kelner, Djamel Sadok and Patricia Takako Endo
Volume 32, issue 2, 2022
- An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures

- Almir Guimarães, Paulo Maciel, Rivalino Matias, Bruno Silva and Bruno Nogueira
- DockSDN: A hybrid container‐based software‐defined networking emulation tool

- Erick Petersen and Marco Antonio To
- Truthful Decentralized Blockchain Oracles

- Yuxi Cai, Nafis Irtija, Eirini Eleni Tsiropoulou and Andreas Veneris
- Identity and access management using distributed ledger technology: A survey

- Fariba Ghaffari, Komal Gilani, Emmanuel Bertin and Noel Crespi
- Veritaa: A distributed public key infrastructure with signature store

- Jakob Schaerer, Severin Zumbrunn and Torsten Braun
- Simulating permissionless blockchains: Distribution fitting, tool support, and a case study

- Maher Alharby and Aad van Moorsel
- BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services

- Abdelkader Lahmadi, Emmanuel Bertin and Ruidong Li
Volume 32, issue 1, 2022
- A privacy‐focused approach for anomaly detection in IoT networks

- Pedro Martins, André B. Reis, Paulo Salvador and Susana Sargento
- A Value‐of‐Information‐based management framework for fog services

- Filippo Poltronieri, Mauro Tortonesi, Alessandro Morelli, Cesare Stefanelli and Niranjan Suri
- Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases

- Gabor Soos, Daniel Ficzere and Pal Varga
- Industrial control protocols in the Internet core: Dismantling operational practices

- Marcin Nawrocki, Thomas C. Schmidt and Matthias Wählisch
- A model‐driven approach for deployment descriptor design in network function virtualization

- Wassim Sellil Atoui, Nour Assy, Walid Gaaloul and Imen Grida Ben Yahia
- An optimization‐based congestion control for constrained application protocol

- Godfrey A. Akpakwu, Gerhard P. Hancke and Adnan M. Abu‐Mahfouz
- An access control for IoT based on network community perception and social trust against Sybil attacks

- Gustavo H. C. de Oliveira, Agnaldo de Souza Batista, Michele Nogueira and Aldri L. dos Santos
- Topics from networks management and operations

- István Gódor and Imen Grida Ben Yahia
- Energy‐aware mobility for aerial networks: A reinforcement learning approach

- Elif Bozkaya, Yusuf Özçevik, Mertkan Akkoç, Muhammed Raşit Erol and Berk Canberk
| |