International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 30, issue 6, 2020
- A framework for multi‐provider virtual private networks in software‐defined federated networks

- Habib Mostafaei, Gabriele Lospoto, Roberto Di Lallo, Massimo Rimondini and Giuseppe Di Battista
- CL‐MIPv6: A cross‐layer approach for fast‐internetwork‐mobility support in 6LoWPAN wireless sensor networks

- Zakaria Hamidi‐Alaoui, Noureddine Moussa and Abdelbaki El Belrhiti El Alaoui
- Wireless‐Fog Mesh: A framework for in‐network computing of microservices in semipermanent smart environments

- Shabir Ali, Mayank Pandey and Neeraj Tyagi
- Clustering method in protocol reverse engineering for industrial protocols

- Kyu‐Seok Shim, Young‐Hoon Goo, Min‐Seob Lee and Myung‐Sup Kim
- Network anomaly detection using a cross‐correlation‐based long‐range dependence analysis

- Basil AsSadhan, Abraham Alzoghaiby, Hamad Binsalleeh, Konstantinos G. Kyriakopoulos and Sangarapillai Lambotharan
- Trustful ad hoc cross‐organizational data exchanges based on the Hyperledger Fabric framework

- Laurens Van Hoye, Tim Wauters, Filip De Turck and Bruno Volckaert
- Next generation of microservices for the 5G Service‐Based Architecture

- João Bourbon Moreira, Henrique Mamede, Vasco Pereira and Bruno Sousa
- An efficient neural network optimized by fruit fly optimization algorithm for user equipment association in software‐defined wireless sensor network

- Xiao‐Ping Zeng, Qi Luo, Jia‐Li Zheng and Guang‐Hui Chen
Volume 30, issue 5, 2020
- Blockchain‐based access control for enterprise blockchain applications

- Lei Xu, Isaac Markus, Subhod I and Nikhil Nayab
- Weighted voting on the blockchain: Improving consensus in proof of stake protocols

- Stefanos Leonardos, Daniël Reijsbergen and Georgios Piliouras
- Incentives in Ethereum's hybrid Casper protocol

- Vitalik Buterin, Daniël Reijsbergen, Stefanos Leonardos and Georgios Piliouras
- FastFabric: Scaling hyperledger fabric to 20 000 transactions per second

- Christian Gorenflo, Stephen Lee, Lukasz Golab and Srinivasan Keshav
- Bitcoin's dynamic peer‐to‐peer topology

- Meryam Essaid, Sejin Park and Hong‐Taek Ju
- Editorial for special issue on “challenges and opportunities of Blockchain and Cryptocurrency”

- Hongtaek Ju, Raouf Boutaba, Myungsup Kim and Burkhard Stiller
Volume 30, issue 4, 2020
- A survey on indexing techniques for mobility in Internet of Things': Challenges, performances, and perspectives

- Hazem Jihad Badarneh, Sri Devi Ravana and Ali Mohammed Mansoor
- Traffic classification at the radio spectrum level using deep learning models trained with synthetic data

- Tom De Schepper, Miguel Camelo, Jeroen Famaey and Steven Latré
- Segment‐aware dynamic routing for DASH flows over software‐defined networks

- Cihat Cetinkaya, Korhan Herguner, Cornelius Hellge and Muge Sayit
- Community oriented in‐network caching and edge caching for over‐the‐top services in adaptive network conditions to improve performance

- Suman Pandey, Soyoung Park and Mi Jung Choi
- OASM: An overload‐aware workload scheduling method for cloud computing based on biogeographical optimization

- Ali Abbasi Tadi, Mohammad Reza Khayyambashi and Hadi Khosravi‐Farsani
- Dynamic credit reservation for online charging of regular Internet of things traffic

- Huai‐Sheng Huang and Da‐Yu Hung
Volume 30, issue 3, 2020
- Impact of VNF placements on QoE monitoring in the cloud

- Lam Dinh‐Xuan, Christian Popp, Valentin Burger, Florian Wamser and Tobias Hoßfeld
- An objective and subjective quality assessment study of passive gaming video streaming

- Nabajeet Barman, Saman Zadtootaghaj, Steven Schmidt, Maria G. Martini and Sebastian Möller
- Improving video QoE with IP over ICN

- Ioannis Doumanis, Alexander Phinikarides, George Xylomenos, Stuart C.M. Porter and Michael Georgiades
- Dissecting the performance of YouTube video streaming in mobile networks

- Anika Schwind, Cise Midoglu, Özgü Alay, Carsten Griwodz and Florian Wamser
- Game of protocols: Is QUIC ready for prime time streaming?

- Sevket Arisu, Ertan Yildiz and Ali C. Begen
- Muslin: A QoE‐aware CDN resources provisioning and advertising system for cost‐efficient multisource live streaming

- Simon Da Silva, Joachim Bruneau‐Queyreix, Mathias Lacaud, Daniel Negru and Laurent Réveillère
- Quality of experience for unified communications: A survey

- Jasmina Baraković Husić, Sabina Baraković, Enida Cero, Nina Slamnik, Merima Oćuz, Azer Dedović and Osman Zupčić
- IJNM Special Issue—International Journal of Network Management: QoE‐centric analysis and management of communication networks

- Florian Wamser, Özgü Alay, Florian Metzger and Stefan Valentin
Volume 30, issue 2, 2020
- Pluggable SDN framework for managing heterogeneous SDN networks

- Jerico Moeyersons, Pieter‐Jan Maenhaut, Filip Turck and Bruno Volckaert
- A proactive defense method for the stealthy EDoS attacks in a cloud environment

- Neha Agrawal and Shashikala Tapaswi
- QoS‐aware cross‐domain collaborative energy‐saving mechanism for FiWi virtual networks

- Siya Xu, Xujing Peng, Shaoyong Guo, Xuesong Qiu and Wenchen He
Volume 30, issue 1, 2020
- CU placement over a reconfigurable wireless fronthaul in 5G networks with functional splits

- Davit Harutyunyan, Roberto Riggio, Slawomir Kuklinski and Toufik Ahmed
- A review of mobility management entity in LTE networks: Power consumption and signaling overhead

- Alaa A. R. Alsaeedy and Edwin K. P. Chong
Volume 29, issue 6, 2019
- Real‐time and fine‐grained network monitoring using in‐band network telemetry

- Jonghwan Hyun, Nguyen Van Tu, Jae‐Hyoung Yoo and James Won‐Ki Hong
- Order@Cloud: An agnostic meta‐heuristic for VM provisioning, adaptation, and organisation

- Guilherme Geronimo, Rafael Uriarte and Carlos Westphall
Volume 29, issue 5, 2019
- Formal modeling and verification of software‐defined networks: A survey

- Nitin Shukla, Mayank Pandey and Shashank Srivastava
- CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users

- Tiago O. Castro, Vitor G. R. Caitité, Daniel F. Macedo and Aldri L. dos Santos
Volume 29, issue 4, 2019
- A flow handover protocol to support state migration in softwarized networks

- Manuel Peuster, Hannes Küttner and Holger Karl
- Techno‐economic analysis of FiWi access networks based on optimized source packet traffic

- Damir Breskovic and Dinko Begusic
- Efficient allocation of elastic interfederation encrypted streaming sessions

- Rafael Xavier, Lisandro Zambenedetti Granville, Filip De Turck and Bruno Volckaert
Volume 29, issue 3, 2019
- A meta‐heuristic Bayesian network classification for intrusion detection

- Mahesh Kumar Prasath and Balasubramani Perumal
- User identification via neural network based language models

- Tien D. Phan and Nur Zincir‐Heywood
- A deep learning method to detect network intrusion through flow‐based features

- Abdurrahman Pektaş and Tankut Acarman
- Securing light clients in blockchain with DLCP

- Leonardo da Costa, André Neto, Billy Pinheiro, Weverton Cordeiro, Roberto Araújo and Antônio Abelém
- Blockchain and smart contracts for higher education registry in Brazil

- Lucas M. Palma, Martín A. G. Vigil, Fernando L. Pereira and Jean E. Martina
- Deep mining port scans from darknet

- Sofiane Lagraa, Yutian Chen and Jérôme François
- Advanced security management

- Carol Fung, Jérôme François, Weverton Cordeiro and Mohamed Faten Zhani
Volume 29, issue 2, 2019
- Highly efficient optical aggregation network with network functions virtualization

- Takashi Miyamura, Akira Misawa and Jun‐ichi Kani
- A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier

- Rodérick Fanou, Victor Sanchez‐Agüero, Francisco Valera, Michuki Mwangi and Jane Coffin
- Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems

- Emmanouil Vasilomanolakis and Max Mühlhäuser
- A survey on blockchain cybersecurity vulnerabilities and possible countermeasures

- Huru Hasanova, Ui‐jun Baek, Mu‐gon Shin, Kyunghee Cho and Myung‐Sup Kim
- An approach for provisioning virtual sensors in sensor clouds

- Marcus Lemos, Ricardo Rabelo, Douglas Mendes, Carlos Carvalho and Raimir Holanda
- Resource availability–aware adaptive provisioning of virtual data center networks

- Malayam Parambath Gilesh, S D Madhu Kumar and Lillykutty Jacob
Volume 29, issue 1, 2019
- DDoS protection with stateful software‐defined networking

- Filippo Rebecchi, Julien Boite, Pierre‐Alexis Nardin, Mathieu Bouet and Vania Conan
- Smashing OpenFlow's “atomic” actions: Programmable data plane packet manipulation in hardware

- Salvatore Pontarelli, Marco Bonola and Giuseppe Bianchi
- Optimal management of reusable functional blocks in 5G superfluid networks

- Luca Chiaraviglio, Lavinia Amorosi, Nicola Blefari‐Melazzi, Paolo Dell'Olmo, Mohammad Shojafar and Stefano Salsano
- IEEE NetSoft 2017 special issue: Softwarization sustaining a hyper‐connected world: En route to 5G

- Franco Callegati and Walter Cerroni
- Intent‐based service management for heterogeneous software‐defined infrastructure domains

- Gianluca Davoli, Walter Cerroni, Slavica Tomovic, Chiara Buratti, Chiara Contoli and Franco Callegati
| |