International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 28, issue 6, 2018
- PlaySharing: A group synchronization scheme for media streaming services in hierarchical WLANs

- Dongwoo Kwon, Hyeonwoo Kim and Hongtaek Ju
- Orchestrator conversation: Distributed management of cloud applications

- Merlijn Sebrechts, Gregory Van Seghbroeck, Tim Wauters, Bruno Volckaert and Filip De Turck
- New fluid approaches for studying the performance of elastic traffic under class based weighed fair queuing system

- Mohamed El Hedi Boussada, Jean Marie Garcia and Mounir Frikha
- Botnet detection based on network flow summary and deep learning

- Abdurrahman Pektaş and Tankut Acarman
- Sensitivity analysis of an availability model for disaster tolerant cloud computing system

- Bruno Silva, Rubens Matos, Eduardo Tavares, Paulo Maciel and Armin Zimmermann
- A bottom‐up design for spatial search in large networks and clouds

- Misbah Uddin, Rolf Stadler and Alexander Clemm
- On the design and performance evaluation of automatic traffic report generation systems with huge data volumes

- Carlos Vega Moreno, Eduardo Miravalls Sierra, Guillermo Julián Moreno, Jorge E. López de Vergara, Eduardo Magaña and Javier Aracil
- Clustering‐based quality selection heuristics for HTTP adaptive streaming over cache networks

- Jeroen van der Hooft, Niels Bouten, Danny De Vleeschauwer, Werner Van Leekwijck, Tim Wauters, Steven Latré and Filip De Turck
Volume 28, issue 5, 2018
- A feature extraction method for predictive maintenance with time‐lagged correlation–based curve‐registration model

- Shouli Zhang, Chen Liu, Shen Su, Yanbo Han and XiaoHong Li
- Special issue on management of IoT

- Jorge Sá Silva, António Loureiro, Antonio Skarmeta and Fernando Boavida
- PYGRID: A software development and assessment framework for grid‐aware software defined networking

- Mohamed Samir, Mohamed Azab, Mohamed R. M. Rizk and Nayera Sadek
- ManIoT: A 2‐tier management platform for heterogeneous IoT devices and applications

- Josué B. Antunes, István L. Denés, Tiago O. Castro, Daniel F. Macedo and Aldri L. dos Santos
- Domain‐based distributed identifier‐locator mapping management in Internet‐of‐Things networks

- Nak‐Jung Choi, Moneeb Gohar and Seok‐Joo Koh
- Enhancing IoT security through network softwarization and virtual security appliances

- Alejandro Molina Zarca, Jorge Bernal Bernabe, Ivan Farris, Yacine Khettab, Tarik Taleb and Antonio Skarmeta
Volume 28, issue 4, 2018
- A flexible, reliable, and adaptive timeslot‐based advance bandwidth‐reservation mechanism for media delivery services

- Maryam Barshan, Hendrik Moens, Bruno Volckaert and Filip De Turck
- Probe generation for active probing

- A. Dusia and A. S. Sethi
- DSSDN: Demand‐supply based load balancing in Software‐Defined Wide‐Area Networks

- Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo, Ratnakar Dash and Kshirasagar Naik
- Deadline‐aware TCP congestion control for HTTP adaptive streaming services

- Maxim Claeys, Niels Bouten, Danny De Vleeschauwer, Koen De Schepper, Werner Van Leekwijck, Steven Latré and Filip De Turck
Volume 28, issue 3, 2018
- HeS‐CoP: Heuristic switch‐controller placement scheme for distributed SDN controllers in data center networks

- Woojoong Kim, Jian Li, James Won‐Ki Hong and Young‐Joo Suh
- The research on a novel structure of two‐layer distributed controllers in software‐defined networking

- Ligang Dong, Dandan Yang, Kaiqiang Guo, Shuocheng Fei, Ying Li and Weiming Wang
- Analysis of monitoring and multipath support on top of OpenFlow specification

- Pedro H. A. Rezende, Paulo R. S. L. Coelho, Luis F. Faina, Lasaro J. Camargos and Rafael Pasquini
- A survey and classification of controller placement problem in SDN

- Ashutosh Kumar Singh and Shashank Srivastava
- Spectrum mobility management in cognitive two‐tier networks

- Kaouthar Sethom and Guy Pujolle
Volume 28, issue 2, 2018
- A service‐agnostic method for predicting service metrics in real time

- Rerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad and Rolf Stadler
- A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter

- Vennila Ganesan and Manikandan Msk
- Automatic data aggregation for recursively modeled NFV services

- Xuejun Cai, Wolfgang John and Catalin Meirosu
- Effective behavior signature extraction method using sequence pattern algorithm for traffic identification

- Kyu‐Seok Shim, Sung‐Ho Yoon, Baraka D. Sija, Jun‐Sang Park, Kyunghee Cho and Myung‐Sup Kim
- ONVisor: Towards a scalable and flexible SDN‐based network virtualization platform on ONOS

- Yoonseon Han, Thomas Vachuska, Ali Al‐Shabibi, Jian Li, Huibai Huang, William Snow and James Won‐Ki Hong
- Distributed dynamic load balancing with applications in radio access networks

- Per Kreuger, Rebecca Steinert, Olof Görnerup and Daniel Gillblad
Volume 28, issue 1, 2018
- Design, implementation, and performance evaluation of identity‐based cryptography in ONOS

- JunHuy Lam, Sang‐Gon Lee, Hoon‐Jae Lee and Yustus Eko Oktian
- A holistic approach to mitigating DoS attacks in SDN networks

- Lobna Dridi and Mohamed Faten Zhani
- Fast and efficient probing of heterogeneous IoT networks

- Lionel Metongnon and Ramin Sadre
- NomadiKey: User authentication for smart devices based on nomadic keys

- Artur Souza, Ítalo Cunha and Leonardo B Oliveira
- Trust management in cognitive radio networks: A survey

- Jihen Bennaceur, Hanen Idoudi and Leila Azouz Saidane
- Secure and efficient verification for data aggregation in wireless sensor networks

- Omar Rafik Merad Boudia, Sidi Mohammed Senouci and Mohammed Feham
- Rendezvous‐based access control for information‐centric architectures

- Nikos Fotiou and Bander A. Alzahrani
- Booter list generation: The basis for investigating DDoS‐for‐hire websites

- José Jair Santanna, Joey de Vries, Ricardo de O. Schmidt, Daphne Tuncer, Lisandro Z. Granville and Aiko Pras
- Special issue on security for emerging open networking technologies

- Carol Fung, Mohamed Faten Zhani, Weverton Cordeiro and Jérôme François
Volume 27, issue 6, 2017
- Special Issue on management of SDN/NFV‐based systems

- Rémi Badonnel, Kazuhiko Kinoshita, Daphné Tuncer and Sejun Song
- AirNet: An Edge‐Fabric abstraction model to manage software‐defined networks

- Messaoud Aouadj, Emmanuel Lavinal, Thierry Desprats and Michelle Sibilla
- A software‐defined networking approach to improve service provision in residential networks

- Ricardo Flores Moyano, David Fernández, Luis Bellido and Carlos González
- Stochastic and exact methods for service mapping in virtualized network infrastructures

- Francesco Liberati, Alessandro Giuseppi, Antonio Pietrabissa, Vincenzo Suraci, Alessandro Di Giorgio, Marco Trubian, David Dietrich, Panagiotis Papadimitriou and Francesco Delli Priscoli
- New Era in shared cellular networks: Moving into open and virtualized platform

- Omer Narmanlioglu and Engin Zeydan
- An adaptive approach for elephant flow detection with the rapidly changing traffic in data center network

- Zehui Liu, Deyun Gao, Ying Liu, Hongke Zhang and Chuan Heng Foh
- NFV‐FD: Implementation of a failure detector using network virtualization technology

- Rogerio C. Turchetti and Elias P. Duarte
Volume 27, issue 5, 2017
- Power‐efficient routing for SDN with discrete link rates and size‐limited flow tables: A tree‐based particle swarm optimization approach

- Mohamad Khattar Awad, Mohammed El‐Shafei, Tassos Dimitriou, Yousef Rafique, Mohammed Baidas and Ammar Alhusaini
- CRAN, H‐CRAN, and F‐RAN for 5G systems: Key capabilities and recent advances

- Zeineb Guizani and Noureddine Hamdi
- Application traffic classification using payload size sequence signature

- Kyu‐Seok Shim, Jae‐Hyun Ham, Baraka D. Sija and Myung‐Sup Kim
- A system for providing load‐aware virtual network service in a software‐defined data center network

- Habib Allah Khosravi and Mohammad Reza Khayyambashi
- Adaptive traffic sampling for P2P botnet detection

- Jie He, Yuexiang Yang, Xiaolei Wang and Zhiguo Tan
- Enabling autonomicity in wireless mesh networks with the ETSI AFI GANA reference model

- Szymon Szott, Janusz Gozdecki, Katarzyna Kosek‐Szott, Krzysztof Loziak, Marek Natkaniec, Michal Wagrowski and Ranganai Chaparadza
- Universal privacy‐preserving platform for SecaaS services

- Tytus Kurek, Marcin Niemiec, Artur Lason and Andrzej R. Pach
Volume 27, issue 4, 2017
- Big data analytics for network and service management

- Yixin Diao and A. Nur Zincir‐Heywood
- Security in IoT network based on stochastic game net model

- Rajbir Kaur, Navroop Kaur and Sandeep K. Sood
- Data transformation as a means towards dynamic data storage and polyglot persistence

- Thomas Vanhove, Merlijn Sebrechts, Gregory Van Seghbroeck, Tim Wauters, Bruno Volckaert and Filip De Turck
- Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?

- Fariba Haddadi and A. Nur Zincir‐Heywood
- Dynamic resource allocation for big data streams based on data characteristics (5Vs)

- Navroop Kaur and Sandeep K. Sood
- Learning ensemble strategy for static and dynamic localization in wireless sensor networks

- Hanen Ahmadi, Federico Viani, Alessandro Polo and Ridha Bouallegue
- ALACA: A platform for dynamic alarm collection and alert notification in network management systems

- Selçuk Emre Solmaz, Buğra Gedik, Hakan Ferhatosmanoğlu, Selçuk Sözüer, Engin Zeydan and Çağrı Özgenç Etemoğlu
Volume 27, issue 3, 2017
- Internet traffic classification based on flows' statistical properties with machine learning

- Alina Vlăduţu, Dragoş Comăneci and Ciprian Dobre
- Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey

- Christos Stergiou and Kostas E. Psannis
- On efficient data storage service for IoT

- Konrad Karolewicz, Andrzej Beben, Jordi Mongay Batalla, George Mastorakis and Constandinos X. Mavromoustakis
- A topology‐based scaling mechanism for Apache Storm

- Ce‐Kuen Shieh, Sheng‐Wei Huang, Li‐Da Sun, Ming‐Fong Tsai and Naveen Chilamkurti
- Design and implementation of application programming interface for Internet of things cloud

- Lu Hou, Shaohang Zhao, Xing Li, Periklis Chatzimisios and Kan Zheng
- A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks

- Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He and Naveen Chilamkurti
- Overload management with regard to fairness in session initiation protocol networks by holonic multiagent systems

- Mehdi Khazaei and Nasser Mozayani
- Deploying WLAN service with OpenFlow technology

- Huai‐Wen Hsu, Kuei‐Li Huang, Yi‐Chih Kao, Shi‐Chun Tsai and Yi‐Bing Lin
- Special issue on management of the Internet of things and big data

- Jordi Mongay Batalla, George Mastorakis and Constandinos X. Mavromoustakis
Volume 27, issue 2, 2017
- Fast failure detection and recovery in SDN with stateful data plane

- Carmelo Cascone, Davide Sanvito, Luca Pollini, Antonio Capone and Brunilde Sansò
- A dynamic pricing algorithm for a network of virtual resources

- Bram Naudts, Mario Flores, Rashid Mijumbi, Sofie Verbrugge, Joan Serrat and Didier Colle
- A hash‐based distributed mapping control scheme in mobile locator‐identifier separation protocol networks

- Moneeb Gohar, Faisal Bashir, Jin‐Ghoo Choi, Seok‐Joo Koh and Waleed Ahmad
- Specification, composition, and placement of network services with flexible structures

- Sevil Dräxler and Holger Karl
- Self‐modeling based diagnosis of network services over programmable networks

- José Manuel Sánchez Vílchez, Imen Grida Ben Yahia, Chidung Lac and Noel Crespi
- CATENAE: A scalable service function chaining system for legacy mobile networks

- Roberto Bifulco, Anton Matsiuk and Alessio Silvestro
- Towards performance prediction of multicore software routers

- Kalika Suksomboon, Nobutaka Matsumoto, Masaki Fukushima, Shuichi Okamoto and Michiaki Hayashi
- Softwarization of networks, clouds, and internet of things

- Filip De Turck, Joon‐Myung Kang, Hyunseung Choo, Myung‐Sup Kim, Baek‐Young Choi, Remi Badonnel and James Won‐Ki Hong
- A novel blind traffic analysis technique for detection of WhatsApp VoIP calls

- Antonio Cuadra‐Sanchez and Javier Aracil
Volume 27, issue 1, 2017
- A tree‐based algorithm for virtual infrastructure allocation with joint virtual machine and network requirements

- Ramon de Oliveira and Guilherme Piegas Koslovski
- Header signature maintenance for Internet traffic identification

- Sung‐Ho Yoon, Jun‐Sang Park, Baraka D. Sija, Mi‐Jung Choi and Myung‐Sup Kim
- An accurate traffic classification model based on support vector machines

- Jie Cao, Zhiyi Fang, Guannan Qu, Hongyu Sun and Dan Zhang
| |