International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 31, issue 6, 2021
- A generalized machine learning‐based model for the detection of DDoS attacks

- Murk Marvi, Asad Arfeen and Riaz Uddin
- Slicing Wi‐Fi links based on QoE video streaming fairness

- Mauricio de Oliveira and Daniel F. Macedo
- Denial of service detection using dynamic time warping

- Diab M. Diab, Basil AsSadhan, Hamad Binsalleeh, Sangarapillai Lambotharan, Konstantinos G. Kyriakopoulos and Ibrahim Ghafir
- An augmented K‐means clustering approach for the detection of distributed denial‐of‐service attacks

- Murk Marvi, Asad Arfeen and Riaz Uddin
- E‐Replacement: Efficient scanner data collection method in P4‐based software‐defined networks

- Yun‐Zhan Cai, Ting‐Yu Lin, Yu‐Ting Wang, Ya‐Pei Tuan and Meng‐Hsun Tsai
- A systematic review on distributed denial of service attack defense mechanisms in programmable networks

- Bruno L. Dalmazo, Jonatas A. Marques, Lucas R. Costa, Michel S. Bonfim, Ranyelson N. Carvalho, Anderson S. da Silva, Stenio Fernandes, Jacir L. Bordim, Eduardo Alchieri, Alberto Schaeffer‐Filho, Luciano Paschoal Gaspary and Weverton Cordeiro
- Graph neural network‐based virtual network function deployment optimization

- Hee‐Gon Kim, Suhyun Park, Stanislav Lange, Doyoung Lee, Dongnyeong Heo, Heeyoul Choi, Jae‐Hyoung Yoo and James Won‐Ki Hong
- Topic allocation method on edge servers for latency‐sensitive notification service

- Tomoya Tanaka, Tomio Kamada and Chikara Ohta
- A proposal of port scan detection method based on Packet‐In Messages in OpenFlow networks and its evaluation

- Daichi Ono, Luis Guillen, Satoru Izumi, Toru Abe and Takuo Suganuma
- Visualization of Ethereum P2P network topology and peer properties

- Soohoon Maeng, Meryam Essaid, Changhyun Lee, Sejin Park and Hongteak Ju
- Deep Q‐network‐based auto scaling for service in a multi‐access edge computing environment

- Do‐Young Lee, Se‐Yeon Jeong, Kyung‐Chan Ko, Jae‐Hyoung Yoo and James Won‐Ki Hong
- Editorial for special issue on “Towards service and networking intelligence for humanity”

- Seung‐Joon Seok, Hongtaek Ju, Yuncheng Zhu and Jen‐Jee Chen
Volume 31, issue 5, 2021
- Quality of experience and quality of service‐aware handover for video transmission in heterogeneous networks

- Iago Medeiros, Lucas Pacheco, Denis Rosário, Cristiano Both, Jéferson Nobre, Eduardo Cerqueira and Lisandro Granville
- Beyond VNFM: Filling the gaps of the ETSI VNF manager to fully support VNF life cycle operations

- Giovanni Venâncio, Vinícius Fulber Garcia, Leonardo da Cruz Marcuzzo, Thales Nicolai Tavares, Muriel Figueredo Franco, Lucas Bondan, Alberto Egon Schaeffer‐Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville and Elias P. Duarte
- SDN‐based architecture for providing quality of service to high‐performance distributed applications

- Alexandre T. Oliveira, Bruno José C. A. Martins, Marcelo F. Moreno, Antônio Tadeu A. Gomes, Artur Ziviani and Alex Borges Vieira
- Editorial for special issue on selected papers from 23rd edition of the Brazilian Workshop on Network and Service Management (WGRS)

- Denis Rosário and Leandro A. Villas
Volume 31, issue 4, 2021
- Design, implementation, and evaluation of learning algorithms for dynamic real‐time network monitoring

- Rashid Mijumbi, Abhaya Asthana, Markku Koivunen, Fu Haiyong and Qinjun Zhu
- Exploring anomalous behaviour detection and classification for insider threat identification

- Duc C. Le and Nur Zincir‐Heywood
- Minimizing protection switching time in transport networks with shared mesh protection

- Choong‐hee Cho and Jeong‐dong Ryoo
- A cost‐efficient QoS‐aware analytical model of future software content delivery networks

- Beatriz Otero, Eva Rodríguez, Otilio Rojas, Javier Verdú, Juan José Costa, Manuel Alejandro Pajuelo and Ramón Canal
- Graph theoretical approach for automated IP lifecycle management in telco networks

- Kübra Duran, Bahtiyar Karanlik and Berk Canberk
- A message keyword extraction approach by accurate identification of field boundaries

- Young‐Hoon Goo, Kyu‐Seok Shim, Min‐Seob Lee and Myung‐Sup Kim
- Decision Tree‐Based Entries Reduction scheme using multi‐match attributes to prevent flow table overflow in SDN environment

- Priyanka Nallusamy, Sapna Saravanen and Murugan Krishnan
- Optimal segments for forwarding table size minimization in segment‐routed SDNs

- Anix Anbiah and Krishna M. Sivalingam
- Detecting and analyzing border gateway protocol blackholing activity

- Talaya Farasat and Akmal Khan
- A multilevel hybrid anomaly detection scheme for industrial wireless sensor networks

- Shashank Gavel, Ajay Singh Raghuvanshi and Sudarshan Tiwari
- Migration cost optimization for service provider legacy network migration to software‐defined IPv6 network

- Babu R. Dawadi, Danda B. Rawat, Shashidhar R. Joshi, Pietro Manzoni and Martina M. Keitsch
- Offloading framework for computation service in the edge cloud and core cloud: A case study for face recognition

- Nasif Muslim, Salekul Islam and Jean‐Charles Grégoire
- Application layer classification of Internet traffic using ensemble learning models

- Asad Arfeen, Khizar Ul Haq and Syed Muhammad Yasir
- Modeling and accomplishing the BEREC network neutrality policy

- David S. Barreto, Rafael F. Reale and Joberto S. B. Martins
Volume 31, issue 3, 2021
- Counselors network for intrusion detection

- Silvio E. Quincozes, Carlos Raniery, Raul Ceretta Nunes, Célio Albuquerque, Diego Passos and Daniel Mossé
- SDN‐based teleprotection and control power systems: A study of available controllers and their suitability

- Arthur A. Zopellaro Soares, Juan Lucas Vieira, Silvio E. Quincozes, Vinicius C. Ferreira, Luana M. Uchôa, Yona Lopes, Diego Passos, Natalia C. Fernandes, Igor Monteiro Moraes, Débora Muchaluat‐Saade and Célio Albuquerque
- An analysis of the fees and pending time correlation in Ethereum

- José Eduardo de Azevedo Sousa, Vinícius Oliveira, Júlia Valadares, Glauber Dias Gonçalves, Saulo Moraes Villela, Heder Soares Bernardino and Alex Borges Vieira
- Classification and evaluation of IoT brokers: A methodology

- Eddas Bertrand‐Martinez, Phelipe Dias Feio, Vagner de Brito Nascimento, Fabio Kon and Antônio Abelém
- VNF‐Consensus: A virtual network function for maintaining a consistent distributed software‐defined network control plane

- Giovanni Venâncio, Rogério C. Turchetti, Edson T. Camargo and Elias P. Duarte
- Editorial for the special issue on research trends in network operations and management with selected papers from the ninth edition of the Latin American Network Operations and Management Symposium

- Igor Monteiro Moraes, Célio Albuquerque and Artur Ziviani
Volume 31, issue 2, 2021
- Network traffic identification of several open source secure proxy protocols

- Yidan Zhang, Jiageng Chen, Kaiming Chen, Ruoyan Xu, Jesen Teh and Shuai Zhang
- Research on adaptive beacon message broadcasting cycle based on vehicle driving stability

- Yuejin Zhang, Meng Wang, Juan Wang, Fei Du, Yong Hu, Meng Yu, Guanghui Li and Aiyun Zhan
- K‐PSO: An improved PSO‐based container scheduling algorithm for big data applications

- Bo Liu, Jiawei Li, Weiwei Lin, Weihua Bai, Pengfei Li and Qian Gao
- Privacy‐preserving cloud‐fog–based traceable road condition monitoring in VANET

- Wei Wang, Lei Wu, Wenlei Qu, Zhaoman Liu and Hao Wang
- Research on scheduling method based on traffic matrix for IoT security

- Shaohua Cao, Dongjie Zhu, Guofu Li, Yanwu Zhang, Xiani Fan, Shanshan Geng, Haiwen Du and Ning Cao
- Security and trust preserving inter‐ and intra‐cloud VM migrations

- Mudassar Aslam, Simon Bouget and Shahid Raza
- A fog‐based collaborative intrusion detection framework for smart grid

- Wenjuan Li, Man Ho Au and Yu Wang
- Secure grid‐based density peaks clustering on hybrid cloud for industrial IoT

- Liping Sun, Shang Ci, Xiaoqing Liu, Liangmin Guo, Xiaoyao Zheng and Yonglong Luo
- Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions

- Weizhi Meng, Piotr Cofta and Tyrone W.A. Grandison
Volume 31, issue 1, 2021
- Towards distributed emergency flow prioritization in software‐defined networks

- Jerico Moeyersons, Behrooz Farkiani, Tim Wauters, Bruno Volckaert and Filip De Turck
- On accounting for screen resolution in adaptive video streaming: QoE‐driven bandwidth sharing framework

- Othmane Belmoukadam, Muhammad Jawad Khokhar and Chadi Barakat
- De‐anonymizing Ethereum blockchain smart contracts through code attribution

- Shlomi Linoy, Natalia Stakhanova and Suprio Ray
- OpenBNG: Central office network functions on programmable data plane hardware

- Ralf Kundel, Leonhard Nobach, Jeremias Blendin, Wilfried Maas, Andreas Zimber, Hans‐Joerg Kolbe, Georg Schyguda, Vladimir Gurevich, Rhaban Hark, Boris Koldehofe and Ralf Steinmetz
- CNSM 2019 special issue: Embracing the new wave of artificial intelligence

- Nur Zincir‐Heywood and Rémi Badonnel
| |