International Journal of Network Management
2015 - 2025
From John Wiley & Sons Bibliographic data for series maintained by Wiley Content Delivery (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 26, issue 6, 2016
- An adaptive Paris Metro Pricing scheme for mobile data networks pp. 422-434

- Huai‐Sheng Huang, Shu‐Chiung Hu, Po‐Han Lee and Yu‐Chee Tseng
- Seamless integration of cloud and fog networks pp. 435-460

- Igor Duarte Cardoso, João P. Barraca, Carlos Gonçalves and Rui L. Aguiar
- Effective network management via dynamic network anomaly visualization pp. 461-491

- Qi Liao and Ting Li
- Simple, efficient location‐based routing for data center network using IP address hierarchy pp. 492-514

- A. R. Ashok Kumar, S. V. Rao and Diganta Goswami
- PAVM: a framework for policy‐aware virtual machine management pp. 515-536

- Muhammad Nouman Durrani, Feroz Zahid and Jawwad A. Shamsi
- OpenCAPWAP v2.0: the new open‐source implementation of the CAPWAP protocol pp. 537-552

- Elena Agostini, Massimo Bernaschi, Massimo Vellucci and Luca Vollero
- Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server pp. 553-578

- Kamel Karoui
Volume 26, issue 5, 2016
- Software‐defined operations pp. 334-335

- Catalin Meirosu, Kostas Pentikousis, Mario Kind and Alberto Gonzalez Prieto
- Prediction‐based survivable virtual network mapping against disaster failures pp. 336-354

- Ying Wang, Xiao Liu, Xuesong Qiu and Wenjing Li
- ReversePTP: A clock synchronization scheme for software‐defined networks pp. 355-372

- Tal Mizrahi and Yoram Moses
- FlowVisor‐based cost‐aware VN embedding in OpenFlow networks pp. 373-395

- Xuxia Zhong, Ying Wang, Xuesong Qiu and Wenjing Li
- A flexible information service for management of virtualized software‐defined infrastructures pp. 396-418

- Lefteris Mamatas, Stuart Clayman and Alex Galis
Volume 26, issue 4, 2016
- Software‐defined network‐based prioritization to avoid video freezes in HTTP adaptive streaming pp. 248-268

- Stefano Petrangeli, Tim Wauters, Rafael Huysegems, Tom Bostoen and Filip De Turck
- Online traffic prediction in the cloud pp. 269-285

- Bruno L. Dalmazo, João P. Vilela and Marilia Curado
- H‐LCFST: a hash lowest cost first search tree for flexible packet classification pp. 286-307

- Xiaohong Huang, Qiong Sun, Maode Ma and Yan Ma
- Characterizing network traffic behaviour using granule‐based association rule mining pp. 308-329

- Yongna Bian, Bin Liu, Yuefeng Li and Jianmin Gao
Volume 26, issue 3, 2016
- Novel intrusion prediction mechanism based on honeypot log similarity pp. 156-175

- Ci‐Bin Jiang, I‐Hsien Liu, Yao‐Nien Chung and Jung‐Shian Li
- Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics pp. 176-198

- Selcuk Cevher, Mustafa Ulutas and Ibrahim Hokelek
- Performance evaluation of legacy QCN for multicast and multiple unicast traffic transmission pp. 199-223

- Hela Mliki, Lamia Chaari, Lotfi Kamoun and Bernard Cousin
- ROUTE: run‐time robust reducer workload estimation for MapReduce pp. 224-244

- Zhihong Liu, Qi Zhang, Raouf Boutaba, Yaping Liu and Zhenghu Gong
Volume 26, issue 2, 2016
- Digital signature to help network management using flow analysis pp. 76-94

- Mario Lemes Proença, Gilberto Fernandes, Luiz F. Carvalho, Marcos V. O. de Assis and Joel J. P. C. Rodrigues
- Optimal layer division for low latency in DHT‐based hierarchical P2P network pp. 95-110

- Jun Li, Cuilian Li, Zhaoxi Fang, Haoyun Wang and Yaohui Wu
- Dynamic control plane management for software‐defined networks pp. 111-130

- Jian Li, Jae‐Hyoung Yoo and James Won‐Ki Hong
- ProTru: a provenance‐based trust architecture for wireless sensor networks pp. 131-151

- Gulustan Dogan
Volume 26, issue 1, 2016
- Special issue on Software‐Defined Networking and Network Functions Virtualization for flexible network management pp. 4-5

- Oliver Hohlfeld, Thomas Zinner, Theophilus Benson and David Hausheer
- On network operating system security pp. 6-24

- Christian Röpke and Thorsten Holz
- Inter‐function anomaly analysis for correct SDN/NFV deployment pp. 25-43

- Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider and Fulvio Valenza
- Cost efficiency of mobile in‐network caching pp. 44-55

- Nan Zhang, Maël Kimmerlin, Jose Costa‐Requena and Heikki Hämmäinen
- How can a mobile service provider reduce costs with software‐defined networking? pp. 56-72

- Bram Naudts, Mario Kind, Sofie Verbrugge, Didier Colle and Mario Pickavet
Volume 25, issue 6, 2015
- An economic mechanism for request routing and resource allocation in hybrid CDN–P2P networks pp. 375-393

- Mehran Garmehi, Morteza Analoui, Mukaddim Pathan and Rajkumar Buyya
- Energy‐aware traffic allocation to optical lightpaths in multilayer core networks pp. 394-417

- Vassilis Foteinos, Kostas Tsagkaris, Pierre Peloso, Laurent Ciavaglia and Panagiotis Demestichas
- Energy‐efficient management using a traffic‐oriented routing scheme for cognitive radio networks pp. 418-434

- Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena and Evangelos Pallis
- A management architecture for client‐defined cloud storage services pp. 435-453

- Jae Yoon Chung, Sangtae Ha and James Won‐Ki Hong
- Cache‐at‐relay: energy‐efficient content placement for next‐generation wireless relays pp. 454-470

- Melike Erol‐Kantarci
- Incorporating known malware signatures to classify new malware variants in network traffic pp. 471-489

- Ismahani Ismail, Muhammad Nadzir Marsono, Ban Mohammed Khammas and Sulaiman Mohd Nor
- Cost‐based placement of vDPI functions in NFV infrastructures pp. 490-506

- Mathieu Bouet, Jérémie Leguay, Théo Combe and Vania Conan
- LISP controller: a centralized LISP management system for ISP networks pp. 507-525

- Taeyeol Jeong, Jian Li, Jonghwan Hyun, Jae‐Hyoung Yoo and James Won‐Ki Hong
Volume 25, issue 5, 2015
- Special issue on measure, detect and mitigate–challenges and trends in network security pp. 261-262

- A. Sperotto, R. Hofstede, A. Dainotti, C. Schmitt and G. Dreo Rodosek
- IFS: Intelligent flow sampling for network security–an adaptive approach pp. 263-282

- Karel Bartos and Martin Rehak
- Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection pp. 283-305

- Johan Mazel, Pedro Casas, Romain Fontugne, Kensuke Fukuda and Philippe Owezarski
- Detecting malicious activities with user‐agent‐based profiles pp. 306-319

- Yang Zhang, Hesham Mekky, Zhi‐Li Zhang, Ruben Torres, Sung‐Ju Lee, Alok Tongaonkar and Marco Mellia
- Mitigation of topological inconsistency attacks in RPL‐based low‐power lossy networks pp. 320-339

- Anthéa Mayzaud, Anuj Sehgal, Rémi Badonnel, Isabelle Chrisment and Jürgen Schönwälder
- Iterative selection of countermeasures for intelligent threat agents pp. 340-354

- Fabrizio Baiardi, Federico Tonelli and Alessandro Bertolini
- A survey of methods for encrypted traffic classification and analysis pp. 355-374

- Petr Velan, Milan Čermák, Pavel Čeleda and Martin Drašar
Volume 25, issue 4, 2015
- Advances in management of multimedia services pp. 203-204

- Marinos Charalambides, Thomas Zinner, Hiroshi Saito, Prasad Calyam and Steven Latré
- A QoS enabled multimedia WiFi access point pp. 205-222

- Padraig O Flaithearta, Hugh Melvin and Michael Schukat
- Modelling and performance analysis of application‐aware resource management pp. 223-241

- Florian Wamser, Andreas Blenk, Michael Seufert, Thomas Zinner, Wolfgang Kellerer and Phuoc Tran‐Gia
- User‐centric versus network‐centric load balancing: How to provide good QoE for gold users pp. 242-259

- Olli Mämmelä and Petteri Mannersalo
Volume 25, issue 3, 2015
- An IPv6‐based mobility framework for urban vehicular networks pp. 141-158

- Xiaonan Wang, Deguang Le, Hongbin Cheng and Yi Mu
- A control‐theoretic approach towards joint admission control and resource allocation of cloud computing services pp. 159-180

- Dimitrios Dechouniotis, Nikolaos Leontiou, Nikolaos Athanasopoulos, Athanasios Christakidis and Spyros Denazis
- New video discarding policies for improving UDP performance over wired/wireless networks pp. 181-202

- Khalid A. Darabkh, Abeer M. Awad and Ala' F. Khalifeh
Volume 25, issue 2, 2015
- Design of energy‐efficient cloud systems via network and resource virtualization pp. 75-94

- Burak Kantarci, Luca Foschini, Antonio Corradi and Hussein T. Mouftah
- Federated trouble ticket system for service management support in loosely coupled multi‐domain environments pp. 95-112

- Pavle V. Vuletić, Jovana J. Vuleta‐Radoičić and Dimitrios Kalogeras
- Business‐driven policy optimization for service management pp. 113-140

- Javier Rubio‐Loyola, Gregorio Toscano‐Pulido, Marinos Charalambides, Marisol Magaña‐Aguilar, Joan Serrat‐Fernández, George Pavlou and Hiram Galeana‐Zapién
Volume 25, issue 1, 2015
- An overview of network virtualization and cloud network as a service pp. 1-30

- Hamada Alshaer
- Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’ pp. 31-51

- Mohammad Sabzinejad Farash
- Towards centralized and semi‐automatic VLAN management pp. 52-73

- Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu and Xingwei Wang
| |