Journals

From SimpleWiki
Jump to: navigation, search

In this page you can find journals and links to latest publications related to Network Management.

TNSM - IEEE Transactions on Network and Service Management

RSS Feed: http://ieeexplore.ieee.org/rss/TOC4275028.XML

Current issue:

Table of contents
Presents the table of contents for this issue of the publication.
An Inter-Domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks
Distributed denial-of-service (DDoS) attacks continue to trouble network operators and service providers, and with increasing intensity. Effective response to DDoS can be slow (because of manual di...
BRAHMA<sup>&#x002B;</sup>: A Framework for Resource Scaling of Streaming and ASAP Time-Varying Workflows
Automatic scaling of complex software-as-a-service application workflows is one of the most important problems concerning resource management in clouds. In this paper, we study the automatic workfl...
Bidirectional LiFi Attocell Access Point Slicing Scheme
LiFi attocell access networks will be deployed everywhere to support diverse applications and service provisioning to various end-users. The LiFi infrastructure providers will need to offer LiFi ac...
Three-Tier Capacity and Traffic Allocation for Core, Edges, and Devices for Mobile Edge Computing
In order to satisfy the 5G requirements of ultra-low latency, mobile edge computing (MEC)-based architecture, composed of three-tier nodes, core, edges, and devices, is proposed. In MEC-based archi...
Principal Component-Based Approach for Profile Optimization Algorithms in DOCSIS 3.1
Data over cable service interface specification (DOCSIS) introduced the possibility of a variable bit-loading over the subcarriers within a channel in its release DOCSIS 3.1. This variable bit-load...
JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services
To adapt to continuously changing workloads in networks, components of the running network services may need to be replicated (scaling the network service) and allocated to physical resources (plac...
Flex5G: Flexible Functional Split in 5G Networks
5G networks are expected to support various applications with diverse requirements in terms of latency, data rates, and traffic volume. Cloud-RAN(C-RAN) and densely deployed small cells are two of...
Packet Fan-Out Extension for the <monospace>pcap</monospace> Library
The large availability of multi-gigabit network cards for commodity PCs requires network applications to potentially cope with high volumes of traffic. However, computation intensive operations may...
Capacity-Aware and Delay-Guaranteed Resilient Controller Placement for Software-Defined WANs
Currently, one of the main enablers for network evolution is software-defined networking (SDN), where the control plane is decoupled from the data plane. A controller, as a (logically) centralized...
Green NOMA With Multiple Interference Cancellation (MIC) Using Sector-Based Resource Allocation
This paper considers a novel non-orthogonal multiple access (NOMA) enabled device-to-device (D2D) communication fifth generation cellular network, practicing sectorization. Though successive interf...
Event Detection in Wireless Body Area Networks Using Kalman Filter and Power Divergence
The collected data by biomedical sensors must be analyzed for automatic detection of physiological changes. The early identification of an event in collected data is required to trigger an alarm up...
Unified Middlebox Model Design and Deployment With Dynamic Resources
Due to the expensive hardware and complex management of the traditional middlebox, a concerted effort toward the virtualized middlebox has been launched in both academia and industry. In this paper...
Traffic Classification Based on Zero-Length Packets
Network traffic classification is fundamental to network management and its performance. However, traditional approaches for traffic classification, which were designed to work on a dedicated hardw...
Lightweight Service Mashup Middleware With REST Style Architecture for IoT Applications
Internet of Things (IoT) can provide new value-added service by connecting the physical devices to virtual environments association with their context, and there is also a huge demand in ad hoc ser...


Back publications:

JNSM - Journal of Network and Systems Management

RSS Feed: http://link.springer.com/search.rss?facet-content-type=Article&facet-journal-id=10922&channel-name=Journal+of+Network+and+Systems+Management

Latest publications:

Security Aware Multipath Routing Protocol for WMSNs for Minimizing Effect of Compromising Attacks
Abstract In Multimedia Sensor Networks (WMSNs) the devices are interconnected in the wireless manner that is able to ubiquitously retrieve multimedia content such as video and audi...
OpenFlow Compatible Key-Based Routing Protocol: Adapting SDN Networks to Content/Service-Centric Paradigm
Abstract The host-to-host/content/service communication instead of the host-to-host communication offered by traditional Internet Protocol (IP) routing solutions has been demanded...
Dynamic Link Anomaly Analysis for Network Security Management
Abstract Network management is challenging due to ever increasing complexity and dynamics of network interactions. While many changes in networks are normal, some changes are not....
SD-CSR: Semantic-Based Distributed Cloud Service Registry in Unstructured P2P Networks for Augmenting Cloud Service Discovery
Abstract The cloud service providers, their services, its users, and the requests for these services are increasing exponentially day by day. Consequently, it has turned out to be...
OrchFlow: An Architecture for Orchestration of Multiple Controllers in OpenFlow Networks
Abstract Since the emergence of software defined networking (SDN) and from the development of the OpenFlow protocol, it is possible to observe that this new paradigm of networks is...
Report on the 10th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2016)
Abstract This article is a report of the IFIP AIMS 2016, which was held at Universität der Bundeswehr München, Germany from June 20 to June 23, 2016. AIMS 2016 focused on the t...
Generating Demand Functions for Data Plans from Mobile Network Operators Based on Users’ Profiles
Abstract The evaluation of pricing approaches for mobile data services proposed in the literature can rarely be done in practice. Evaluation by simulation is the most common prac...
Source Routing Over Protocol-Oblivious Forwarding for Named Data Networking
Abstract Named data networking (NDN) has promising advantages, however, it is hard to deploy because of the lack of special hardware to support it. Besides, the lack of specific...
A Survey on Spot Pricing in Cloud Computing
Abstract Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee...
Resource Allocation for Reliable Communication Between Controllers and Switches in SDN
Abstract In software-defined networking (SDN), the communication between controllers and switches is very important, for switch can only work by relying on flow tables received f...
CCN Energy-Delay Aware Cache Management Using Quantized Hopfield
Abstract Internet infrastructure is going to be re-designed as a core network layer, shifting from hosts to contents. To this end, content centric networking (CCN) as one of the...
A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems
Abstract A quantitative security evaluation in the domain of cyber-physical systems (CPS), which operate under intentional disturbances, is an important open problem. In this pap...
Determining Server Locations in Server Migration Service to Minimize Monetary Penalty of Dynamic Server Migration
Abstract In this paper, we propose a new class of service called server migration service (SMS) to augment the existing IaaS (Infrastructure as a Service). SMS allows servers (se...
Mobile Network Operator and Mobile User Cooperation for Customized D2D Data Services
Abstract The explosive growth of smart devices has led to the evolution of multimedia data (mainly video) services in mobile networks. It attracted many mobile network operators...
Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review
Abstract Cloud computing has increasingly attracted a large number of entrepreneurs to deploy innovative web services to expand the horizon of their businesses. The selection of tr...


IJNM - International Journal of Network Management

RSS Feed: https://onlinelibrary.wiley.com/rss/journal/10.1002/%28ISSN%291099-1190

Latest publications:

[ ]
Franco Callegati, Walter Cerroni
[ ]
Takashi Miyamura, Akira Misawa, Jun‐ichi Kani
[ ]
Bruno Silva, Rubens Matos, Eduardo Tavares, Paulo Maciel, Armin Zimmermann
[ ]
Misbah Uddin, Rolf Stadler, Alexander Clemm
[ ]
Carlos Vega Moreno, Eduardo Miravalls Sierra, Guillermo Julián Moreno, Jorge E. López de Vergara, Eduardo Magaña, Javier Aracil
[ ]
Jeroen Hooft, Niels Bouten, Danny De Vleeschauwer, Werner Van Leekwijck, Tim Wauters, Steven Latré, Filip De Turck
[ ]
Merlijn Sebrechts, Gregory Van Seghbroeck, Tim Wauters, Bruno Volckaert, Filip De Turck
[ ]
Mohamed El Hedi Boussada, Jean Marie Garcia, Mounir Frikha
[ ]
Abdurrahman Pektaş, Tankut Acarman
[ ]
Dongwoo Kwon, Hyeonwoo Kim, Hongtaek Ju
[ ]
[ ]
Abdurrahman Pektaş, Tankut Acarman
[ ]
Tien D. Phan, Nur Zincir‐Heywood
[ ]
Gianluca Davoli, Walter Cerroni, Slavica Tomovic, Chiara Buratti, Chiara Contoli, Franco Callegati
[ ]
Mahesh Kumar Prasath, Balasubramani Perumal


CommMag - IEEE Communications Magazine

RSS Feed: http://ieeexplore.ieee.org/rss/TOC35.XML

Latest publications:

Front cover
Presents the front cover for this issue of the publication.
Cover 2
Advertisement, IEEE.
Table of Contents
Presents the table of contents for this issue of the publication.
Comsoc Membership
Advertisement, IEEE.
The President's Page
Presents the President&#8217;s message for this issue of the publication.
Conference Report/WCNC '17 Wins iCon Ann ual Awa rd as Most Inn ovative IEEE Conferenc e
We We are proud to announce that the 2017 IEEE Wireless Communications and Networking Conference (WCNC&#8217;17) is the recipient of the 2018 iCon Award.
Newly Approved Amendments to the IEEE ComSoc Bylaws
Presents information on the ComSoc Society bylaws.
In Memory of Larry Greenstein, Promi nent Wireless Researcher and ComSoc Volunteer
Recounts the career and contributions of Larry Greenstein.
In Memory of Charles Kao Kuen, the Father of Optical Fiber
Recounts the career and contributions of Charles Kao Kuen.
Global Communications Newsletter
Presents key events and topics in the global communications industry.
Conference Calendar
Presents the ComCos calendar of upcoming events and meetings.
Emerging Technologies for Connected and Smart Vehicles
The ten articles in this special section focus on new and emerging technologies for connected and smart vehicles. Due to the rapid growth of connected vehicles, many research constraints need to be...
Spatial Intelligence toward Trustworthy Vehicular IoT
Spatial challenges for the vehicular Internet of Things come from mobility, high density, sparse connectivity, and heterogeneity. In this article, we propose two techniques, namely decentralized mo...
Key Technologies, Modeling Approaches, and Challenges for Millimeter-Wave Vehicular Communications
Millimeter-wave communications have been recently proposed as a promising candidate to fulfill the connectivity requisites imposed over autonomous driving. The need for transmission capabilities of...
Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges
Research efforts in vehicular communication networks have been driven by the need to achieve high data rates for value-added services and safety applications. The proliferation of billions of conne...


TDSC - IEEE Transactions on Dependable and Secure Computing

RSS Feed: http://ieeexplore.ieee.org/rss/TOC8858.XML

Latest publications:

Guest Editors&#x2019; Introduction: Special Issue on Data-Driven Dependability and Security
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters
Availability of the interconnection network in high-performance computing (HPC) systems is fundamental to sustaining the continuous execution of applications at scale. When failures occur, intercon...
Towards Automated Log Parsing for Large-Scale Log Data Analysis
Logs are widely used in system management for dependability assurance because they are often the only data available that record detailed system runtime behaviors in production. Because the size of...
How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code
In many modern operating systems (OSs), there exists no isolation between different kernel components, i.e., the failure of one component can affect the whole kernel. While microkernel OSs introduc...
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks
The distributed denial of service (DDoS) attacks in cloud computing requires quick absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling the cloud resources s...
A System Architecture for the Detection of Insider Attacks in Big Data Systems
In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. In such a system information security is considered as a major challenge. From a customer...
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks
Phishing attacks continue to pose a major threat for computer system defenders, often forming the first step in a multi-stage attack. There have been great strides made in phishing detection; howev...
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for assessing software vulnerabilities. However, it has been criticized for lack of validity and practitioner relevance...
Malware Propagations in Wireless Ad Hoc Networks
Accurate malware propagation modeling in wireless ad hoc networks (WANETs) represents a fundamental and open research issue which shows distinguished challenges due to complicated access competitio...
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
With recent studies in Searchable Symmetric Encryption (SSE), a client can efficiently perform keyword queries over its outsourced data on a remote but untrusted server (e.g., a public cloud), and...
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things
The capability to securely (re)program embedded devices over-the-air is a fundamental functionality for the emerging Internet of Things (IoT). Current approaches work efficiently by exploiting the...
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams
While most techniques of reversible data hiding in encrypted images (RDH-EI) are developed for uncompressed images, this paper provides a separable reversible data hiding protocol for encrypted JPE...
The Rise of Social Botnets: Attacks and Countermeasures
Online social networks (OSNs) are increasingly threatened by <italic>social bot</italic>s which are software-controlled OSN accounts that mimic human users with malicious intentions. A...
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
Although cloud computing offers elastic computation and storage resources, it poses challenges on verifiability of computations and data privacy. In this work we investigate verifiability for priva...


IEEE Communications Surveys & Tutorials

RSS Feed: http://ieeexplore.ieee.org/rss/TOC9739.XML

Latest publications:

Table of contents
Presents the table of contents for this issue of the publication.
Editorial: Third Quarter 2018 IEEE Communications Surveys and Tutorials
I welcome you to the third issue of the IEEE Communications Surveys and Tutorials in 2018. This issue includes 35 papers covering different aspects of communication networks. In particular, these a...
Millimeter Wave Communication: A Comprehensive Survey
Millimeter wave (mmWave) communication has raised increasing attentions from both academia and industry due to its exceptional advantages. Compared with existing wireless communication techniques,...
IEEE 802.11ay-Based mmWave WLANs: Design Challenges and Solutions
Millimeter-wave (mmWave) with large spectrum available is considered as the most promising frequency band for future wireless communications. The IEEE 802.11ad and IEEE 802.11ay operating on 60 GHz...
Self-Healing in Emerging Cellular Networks: Review, Challenges, and Research Directions
Mobile cellular network operators spend nearly a quarter of their revenue on network management and maintenance. Incidentally, a significant proportion of that budget is spent on resolving outages...
A Survey of Caching Techniques in Cellular Networks: Research Issues and Challenges in Content Placement and Delivery Strategies
Mobile data traffic is currently growing exponentially and these rapid increases have caused the backhaul data rate requirements to become the major bottleneck to reducing costs and raising revenue...
Symbol-Level and Multicast Precoding for Multiuser Multiantenna Downlink: A State-of-the-Art, Classification, and Challenges
Precoding has been conventionally considered as an effective means of mitigating or exploiting the interference in the multiantenna downlink channel, where multiple users are simultaneously served...
A Survey of Round Trip Time Prediction Systems
The performance of many networked applications improves when Round Trip Time (RTT) is reduced. With lower RTTs, human-to-human interactions become more realistic, query-response activities (such as...
Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research
As the 2.4 GHz spectrum band has become significantly congested, there is growing interest from the Wi-Fi proponents, cellular operators, and other stakeholders to use the spectrum in the 5 GHz ban...
A Tutorial on Performance Evaluation and Validation Methodology for Low-Power and Lossy Networks
Envisioned communication densities in Internet of Things applications are increasing continuously. Because these wireless devices are often battery powered, we need specific energy efficient (low-p...
Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges
Fog computing is an emerging paradigm that extends computation, communication, and storage facilities toward the edge of a network. Compared to traditional cloud computing, fog computing can suppor...
V2X Access Technologies: Regulation, Research, and Remaining Challenges
As we edge closer to the broad implementation of intelligent transportation systems, the need to extend the perceptual bounds of sensor-equipped vehicles beyond the individual vehicle is more press...
Optimization of Visible-Light Optical Wireless Systems: Network-Centric Versus User-Centric Designs
In order to counteract the explosive escalation of wireless tele-traffic, the communication spectrum has been gradually expanded from the conventional radio frequency (RF) band to the optical wirel...
50 Years of Permutation, Spatial and Index Modulation: From Classic RF to Visible Light Communications and Data Storage
In this treatise, we provide an interdisciplinary survey on spatial modulation (SM), where multiple-input multipleoutput microwave and visible light, as well as single and multicarrier communicatio...
Optical Wireless Communication Channel Measurements and Models
Optical wireless communications (OWCs) refer to wireless communication technologies which utilize optical carriers in infrared, visible light, or ultraviolet bands of electromagnetic spectrum. For...