Journals

From SimpleWiki
Jump to: navigation, search

In this page you can find journals and links to latest publications related to Network Management.

TNSM - IEEE Transactions on Network and Service Management

RSS Feed: http://ieeexplore.ieee.org/rss/TOC4275028.XML

Current issue:

Table of contents
Presents the table of contents for this issue of the publication.
Mobile-Edge Computing Versus Centralized Cloud Computing Over a Converged FiWi Access Network
The advent of Internet of Things and 5G applications renders the need for integration of both centralized cloud computing and emerging mobile-edge computing (MEC) with existing network infrastructu...
Capacitated Next Controller Placement in Software Defined Networks
Software defined networking shifts the control plane of forwarding devices to one or more external entities known as controllers. Determining the optimal location of controllers in the network and...
SDN-Based Traffic Aware Placement of NFV Middleboxes
Network function virtualization (NFV) enables flexible deployment of middleboxes as virtual machines running on general hardware. Since different middleboxes may change the volume of processed traf...
On Dynamic Service Function Chain Deployment and Readjustment
Network function virtualization (NFV) is a promising technology to decouple the network functions from dedicated hardware elements, leading to the significant cost reduction in network service prov...
A Reliability-Aware Network Service Chain Provisioning With Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks
Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed...
A Novel Reactive Survivable Virtual Network Embedding Scheme Based on Game Theory
In this paper, we tackle the virtual network (VN) embedding problem within Cloud’s backbone network by taking into consideration the impact of physical equipment outages. Our main focus...
T-NOVA: An Open-Source MANO Stack for NFV Infrastructures
One of the primary challenges associated with network functions virtualization (NFV) is the automated management of the service lifecycle. In this paper, we present a full software-based management...
Analytical Model for SDN Signaling Traffic and Flow Table Occupancy and Its Application for Various Types of Traffic
Software defined networking (SDN) has emerged as a promising networking paradigm overcoming various drawbacks of current communication networks.The control and data plane of switching devices is de...
SigMA: Signaling Framework for Decentralized Network Management Applications
The management of network infrastructures has become increasingly complex over time, which is mainly attributed to the introduction of new functionality to support emerging services and application...
Efficient Algorithms for Throughput Maximization in Software-Defined Networks With Consolidated Middleboxes
Today’s computer networks rely on a wide spectrum of specialized middleboxes to improve network security and performance. A promising emerging technique to implementing traditional middl...
Vertex Entropy As a Critical Node Measure in Network Monitoring
Understanding which node failures in a network have more impact is an important problem. Current understanding, motivated by the scale free models of network growth, places emphasis on the degree o...
PowerNetS: Coordinating Data Center Network With Servers and Cooling for Power Optimization
Recently, a lot of research efforts have been made to optimize the large amounts of energy consumed by different devices in data centers, including servers, cooling, and the data center network (DC...
Simultaneous Cost and QoS Optimization for Cloud Resource Allocation
Cloud computing is a new era of computing that offers resources and services for Web applications. Selection of optimal cloud resources is the main goal in cloud resource allocation. Sometimes, cus...
A Distributed Deployment Algorithm of Process Fragments With Uncertain Traffic Matrix
Modern Internet of Things (IoT)-aware business processes include various geographically dispersed sensor devices. Large amounts of raw data acquired from sensors need to be regularly transmitted to...


Back publications:

JNSM - Journal of Network and Systems Management

RSS Feed: http://link.springer.com/search.rss?facet-content-type=Article&facet-journal-id=10922&channel-name=Journal+of+Network+and+Systems+Management

Latest publications:

Network Selection Decisions for Multiple Calls Based on Consensus Level
Abstract Next generation multimode terminals have the capability to support different classes of calls simultaneously as well as the ability to connect to two or more radio access...
A Lightweight Fairness-Driven AQM for Regulating Bandwidth Utilization in Best-Effort Routers
Abstract The end-to-end congestion control mechanism of transmission control protocol (TCP) is critical to the robustness and fairness of the best-effort Internet. Since it is no l...
Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks
Abstract For the recent decade, cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed spec...
Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era
Abstract Traditionally Internet Service Providers (ISPs) have used a centralized traffic filtering architecture, wherein unwanted traffic heading towards a customer who subscribes...
Data Plane Programmability Beyond OpenFlow: Opportunities and Challenges for Network and Service Operations and Management
Abstract SDN and OpenFlow reshaped the way we configure forwarding devices and determine network behavior, by offering an open interface upon which apps like routing, monitoring, e...
Multi-objective Task Scheduling to Minimize Energy Consumption and Makespan of Cloud Computing Using NSGA-II
Abstract The utilization of cloud services has significantly increased due to the easiness in accessibility, better performance, and decrease in the high initial cost. In general,...
TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata
Abstract The mobility of the nodes and their limited energy supply in mobile ad hoc networks (MANETs) complicates network conditions. Having an efficient topology control mechanism...
Flow-Based Web Application Brute-Force Attack and Compromise Detection
Abstract In the early days of network and service management, researchers paid much attention to the design of management frameworks and protocols. Since then the focus of research...
Delay Management in Mesh-Based P2P Live Streaming Using a Three-Stage Peer Selection Strategy
Abstract Peer-to-peer (P2P) live streaming systems have gained popularity due to the self-scalability property of the P2P overlay networks. In P2P live streaming, peers retrieve s...
Server Selection, Configuration and Reconfiguration Technology for IaaS Cloud with Multiple Server Types
Abstract We propose a server selection, configuration, reconfiguration and automatic performance verification technology to meet user functional and performance requirements on var...
BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources
Abstract Cloud resource scheduling requires mapping of cloud resources to cloud workloads. Scheduling results can be optimized by considering Quality of Service (QoS) parameters as...
Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis
Abstract Virtual switches, like Open vSwitch, have emerged as an important part of today’s data centers. They connect interfaces of virtual machines and provide an uplink to the...
A Modular Traffic Sampling Architecture: Bringing Versatility and Efficiency to Massive Traffic Analysis
Abstract The massive traffic volumes and heterogeneity of services in today’s networks urge for flexible, yet simple measurement solutions to assist network management tasks, w...
On the Interplay of Network Structure and Routing Strategies on Network Design Methods for Mitigation of Intentional Attacks in Scale-Free Networks
Abstract Network robustness and network reliability are important issues in the design of Internet Service Provider’s topologies. In this paper, we examine the structural chara...
Survivable Network Capacity Allocation and Topology Design Using Multi-period Network Augmentation
Abstract This paper examines the effect of incorporating multi-period network augmentation into the survivable network design process. The framework presented can handle variable...


IJNM - International Journal of Network Management

RSS Feed: http://onlinelibrary.wiley.com/rss/journal/10.1002/%28ISSN%291099-1190

Latest publications:

Secure and efficient verification for data aggregation in wireless sensor networks
The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless s...
Omar Rafik Merad Boudia, Sidi Mohammed Senouci, Mohammed Feham
A service-agnostic method for predicting service metrics in real time
We predict performance metrics of cloud services using statistical learning, whereby the behaviour of a system is learned from observations. Specifically, we collect device and network statistics f...
Rerngvit Yanggratoke, Jawwad Ahmed, John Ardelius, Christofer Flinta, Andreas Johnsson, Daniel Gillblad, Rolf Stadler
Rendezvous-based access control for information-centric architectures
Information-centric networking (ICN) has been in the spotlight of many research efforts as it shifts the focus from (endpoint) locations to content items themselves. By leveraging content centrism...
Nikos Fotiou, Bander A. Alzahrani
NomadiKey: User authentication for smart devices based on nomadic keys
The growing importance of smart devices calls for effective user authentication mechanisms. We argue that state-of-the-art authentication mechanisms are either vulnerable to known attacks or do not...
Artur Souza, Ítalo Cunha, Leonardo B Oliveira
A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter
In this paper, a two-tier model has been developed that includes a Handler and a Bloom filter (HBF). In the first-tier, the handler detects both the flooding and fake signaling attacks. The Bloom f...
Vennila Ganesan, Manikandan msk
NFV-FD: Implementation of a failure detector using network virtualization technology
A failure detector (FD) is a classic distributed systems service that can be used to monitor processes of any network application. Failure detectors provide process state information: A process is...
Rogerio C. Turchetti, Elias P. Duarte Jr.
Design, implementation, and performance evaluation of identity-based cryptography in ONOS
Distributed Software-Defined Network introduces a new communication channel: the East/West-bound communication where the controllers synchronize the network information to achieve the logically cen...
JunHuy Lam, Sang-Gon Lee, Hoon-Jae Lee, Yustus Eko Oktian
Stochastic and exact methods for service mapping in virtualized network infrastructures
This paper presents a stochastic algorithm for virtual network service mapping in virtualized network infrastructures, based on reinforcement learning (RL). An exact mapping algorithm in line with...
Francesco Liberati, Alessandro Giuseppi, Antonio Pietrabissa, Vincenzo Suraci, Alessandro Di Giorgio, Marco Trubian, David Dietrich, Panagiotis Papadimitriou, Francesco Delli Priscoli
AirNet: An Edge-Fabric abstraction model to manage software-defined networks
Software-defined networking (SDN) is one of the most significant initiatives to make current networks easier to configure, test, debug, and evolve. Within an SDN ecosystem, the Northbound interface...
Messaoud Aouadj, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla
An adaptive approach for elephant flow detection with the rapidly changing traffic in data center network
Software-defined network, which separates control plane from the underlying physical devices, has the advantages of global visibility and high flexibility. Among the most typical applications in so...
Zehui Liu, Deyun Gao, Ying Liu, Hongke Zhang, Chuan Heng Foh
A software-defined networking approach to improve service provision in residential networks
Within the Internet service provider landscape, the residential gateway (RGW) plays a key role in service provision. The RGW should be an enabler for the provision of new and better services for re...
Ricardo Flores Moyano, David Fernández, Luis Bellido, Carlos González
Special Issue on management of SDN/NFV-based systems
Rémi Badonnel, Kazuhiko Kinoshita, Daphné Tuncer, Sejun Song
Issue Information
No abstract is available for this article.
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach
Software-defined networking is a promising networking paradigm for achieving programmability and centralized control in communication networks. These features simplify network management and enable...
Mohamad Khattar Awad, Mohammed El-Shafei, Tassos Dimitriou, Yousef Rafique, Mohammed Baidas, Ammar Alhusaini
CRAN, H-CRAN, and F-RAN for 5G systems: Key capabilities and recent advances
The world of telecommunication is witnessing a swift metamorphosis towards fifth generation cellular networks. Particularly, the rapid shift from a user centric to a device centric communication ha...
Zeineb Guizani, Noureddine Hamdi


CommMag - IEEE Communications Magazine

RSS Feed: http://ieeexplore.ieee.org/rss/TOC35.XML

Latest publications:

Front cover
Presents the front cover for this issue of the publication.
Cover 2
Advertisement, IEEE.
Table of Contents
Presents the table of contents for this issue of the publication.
Keysight
Advertisement.
The President's Page
Presents the President's message for this issue of the publication.
Understanding telecommunications business (valdar, a. and morfett, i.; 2016) [book review]
When an engineer thinks about the IT industry, a tendency to consider only the technical side of it is likely to appear. That is quite natural as successes in this area are obviously related to the...
Conference Calendar
Presents the ComSoc society upcoming conference calendar.
Global Communications Newsletter
Presents key events and topics in the global communications industry.
Fog Computing
Advertisement.
Internet of Things: Part 4
The Internet of Things (IoT) is seen as a set of vertical application domains that share a limited number of common basic functionalities. In this view, consumer-centric solutions, platforms, data...
Internet-of-Things-Based Smart Cities: Recent Advances and Challenges
The Internet of Things is a novel cutting edge technology that proffers to connect a plethora of digital devices endowed with several sensing, actuation, and computing capabilities with the Interne...
Comsoc Training
Advertisement, IEEE.
IoT in Agriculture: Designing a Europe-Wide Large-Scale Pilot
The technologies associated with the Internet of Things have great potential for application in the domain of food and agriculture, especially in view of the societal and environmental challenges f...
Understanding the Limits of LoRaWAN
Low-power wide area networking technology offers long-range communication, which enables new types of services. Several solutions exist; LoRaWAN is arguably the most adopted. It promises ubiquitous...
Self-Organized Connected Objects: Rethinking QoS Provisioning for IoT Services
The proliferation of connected objects has revolutionized the traditional Internet, giving rise to the emerging Internet of Things (IoT). The IoT ecosystem is very large, and it includes smart inte...


TDSC - IEEE Transactions on Dependable and Secure Computing

RSS Feed: http://ieeexplore.ieee.org/rss/TOC8858.XML

Latest publications:

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition proto...
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment
The emergence of cloud computing infrastructure and Semantic Web technologies has created unprecedented opportunities for composing large-scale business processes and workflow-based applications th...
Mandatory Content Access Control for Privacy Protection in Information Centric Networks
Several Information Centric Network (ICN) architectures have been proposed as candidates for the future Internet, aiming to solve several salient problems in the current IP-based Internet architect...
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information
Protecting users’ privacy when transmitting a large amount of data over the Internet is becoming increasingly important nowadays. In this paper, we focus on the streaming categorical inf...
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers
Traffic diversion through powerful cloud-based scrubbing centers provides a solution for protecting against various DDoS attacks. In one respect, such a solution enables sanitizing attack traffic c...
Still Beheading Hydras: Botnet Takedowns Then and Now
Devices infected with malicious software typically form botnet armies under the influence of one or more command and control (C&C) servers. The botnet problem reached such levels where federal...
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
In this paper, we conduct a large-scale study on the crackability, correlation, and security of <inline-formula> <tex-math notation="LaTeX">${\sim}145$</tex-math><alt...
Enabling Anonymous Authorization and Rewarding in the Smart Grid
The smart grid leverages infrastructural support to achieve fine-grained power consumption monitoring in an attempt to offer higher efficiency, reliability, and security. Such functionality, howeve...
Security Analysis of Password-Authenticated Key Retrieval
A PAKR (Password-Authenticated Key Retrieval) protocol and its multi-server system allow one party (say, client), who has a memorable password, to retrieve a long-term static key in an exchange of...


IEEE Communications Surveys & Tutorials

RSS Feed: http://ieeexplore.ieee.org/rss/TOC9739.XML

Latest publications:

Table of contents
Presents the table of contents for this issue of the publication.
Editorial: Third Quarter 2017 IEEE Communications Surveys and Tutorials
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2017. This issue includes 25 papers covering different aspects of communication networks. In particular, these a...
Radio Communication for Communications-Based Train Control (CBTC): A Tutorial and Survey
Over the last decade, railway industry has seen a huge transition from conventional railway signalling systems to modern, communication-based signalling systems. Communications-based train control...
Structural Health Monitoring Using Wireless Sensor Networks: A Comprehensive Survey
Structural health monitoring (SHM) using wireless sensor networks (WSNs) has gained research interest due to its ability to reduce the costs associated with the installation and maintenance of SHM...
A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks
The vision of wireless multimedia sensor networks (WMSNs) is to provide real-time multimedia applications using wireless sensors deployed for long-term usage. Quality of service assurances for both...
A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues
With the widespread adoption of the Internet of Things (IoT), the number of connected devices is growing at an exponential rate, which is contributing to ever-increasing, massive data volumes. Real...
Machine-to-Machine Communications in Ultra-Dense Networks&#x2014;A Survey
To achieve 1000-fold capacity increase in 5G wireless communications, ultradense network (UDN) is believed to be one of the key enabling technologies. Most of the previous research activities on UD...
Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges
This paper provides an overview of the Industrial Internet with the emphasis on the architecture, enabling technologies, applications, and existing challenges. The Industrial Internet is enabled by...
Compressed Sensing for Wireless Communications: Useful Tips and Tricks
As a paradigm to recover the sparse signal from a small set of linear measurements, compressed sensing (CS) has stimulated a great deal of interest in recent years. In order to apply the CS techniq...
The Life and Work of Marvin Kenneth Simon
It is a measure of the importance and profundity of Marvin Kenneth Simon's contributions to communication theory that a tribute article and tutorial about his life and work is of current resear...
SDN/NFV-Based Mobile Packet Core Network Architectures: A Survey
The emergence of two new technologies, namely, software defined networking (SDN) and network function virtualization (NFV), have radically changed the development of network functions and the evolu...
Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
Virtualization is a topic of great interest in the area of mobile and wireless communication systems. However, the term virtualization is used in an inexact manner which makes it difficult to compa...
Mobile Edge Computing: A Survey on Architecture and Computation Offloading
Technological evolution of mobile user equipment (TIEs), such as smartphones or laptops, goes hand-in-hand with evolution of new mobile applications. However, running computationally demanding appl...
On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration
Multi-access edge computing (MEC) is an emerging ecosystem, which aims at converging telecommunication and IT services, providing a cloud computing platform at the edge of the radio access network....
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID
Radio-frequency identification (RFID) is one of the driving technologies for Internet of Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their proliferation as wel...