Journals

From SimpleWiki
Jump to: navigation, search

In this page you can find journals and links to latest publications related to Network Management.

TNSM - IEEE Transactions on Network and Service Management

RSS Feed: http://ieeexplore.ieee.org/rss/TOC4275028.XML

Current issue:

Table of contents
Presents the table of contents for this issue of the publication.
Knowledge Guided Hierarchical Multi-Label Classification Over Ticket Data
Maximal automation of routine IT maintenance procedures is an ultimate goal of IT service management. System monitoring, an effective and reliable means for IT problem detection, generates monitori...
Generalized Recovery From Node Failure in Virtual Network Embedding
Network virtualization has evolved as a key enabling technology for offering the next generation network services. Recently, it is being rolled out in data center networks as a means to provide ban...
Optimally Selecting Standby Virtual Routers for Node Failures in a Virtual Network Environment
In a virtual network environment, a substrate network provider allocates computing and networking resources for service providers who request virtual networks to be created for particular services,...
Cost Efficient Design of Fault Tolerant Geo-Distributed Data Centers
Many critical e-commerce and financial services are deployed on geo-distributed data centers for scalability and availability. Recent market surveys show that failure of a data center is inevitable...
Control Path Management Framework for Enhancing Software-Defined Network (SDN) Reliability
Software-defined networking (SDN) is a softwarization technology of networks that can optimize processes and operation costs and bring new values to infrastructures. The issue of reliability, howev...
Semantically Enhanced Mapping Algorithm for Affinity-Constrained Service Function Chain Requests
Network function virtualization (NFV) and software defined networking (SDN) have been proposed to increase the cost-efficiency, flexibility, and innovation in network service provisioning. This is...
A New QoS-Aware Web Service Recommendation System Based on Contextual Feature Recognition at Server-Side
Quality of service (QoS) has been playing an increasingly important role in today's Web service environment. Many techniques have been proposed to recommend personalized Web services to custome...
Optimizing Resource Allocation for Virtualized Network Functions in a Cloud Center Using Genetic Algorithms
With the introduction of network function virtualization technology, migrating entire enterprise data centers into the cloud has become a possibility. However, for a cloud service provider (CSP) to...
An Efficient Survivable Design With Bandwidth Guarantees for Multi-Tenant Cloud Networks
In cloud data centers (DCs), where hosted applications share the underlying network resources, network bandwidth guarantees have shown to improve predictability of application performance and cost....
Loop-Free Convergence With Unordered Updates
This paper studies the feasibility of minimizing convergence delay and forwarding disruption without carrying any additional bits in the IP header, to provide high availability despite link failure...
Practical Network Coding for the Update Problem in Cloud Storage Systems
Cloud storage systems are emerging as the primary solution for online storage and information sharing. As the demand for such a service is increasing at a phenomenal rate, the cost for maintaining...
Centrally Controlled Mass Data Offloading Using Vehicular Traffic
With over 300 billion vehicle trips made in the United States and 64 billion in France per year, network operators have the opportunity to utilize the existing road and highway network as an altern...
An Opportunistic Push Scheme for Online Social Networking Services in Heterogeneous Wireless Networks
Article synchronization is one of the most fundamental issues in online social networking services (SNSs). In particular, when deploying multiple access networks with different transmission costs,...
User Association and Resource Allocation Optimization in LTE Cellular Networks
As the demand for higher data rates is growing exponentially, homogeneous cellular networks have been facing limitations when handling data traffic. These limitations are related to the available s...


Back publications:

JNSM - Journal of Network and Systems Management

RSS Feed: http://link.springer.com/search.rss?facet-content-type=Article&facet-journal-id=10922&channel-name=Journal+of+Network+and+Systems+Management

Latest publications:

Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis
Abstract Virtual switches, like Open vSwitch, have emerged as an important part of today’s data centers. They connect interfaces of virtual machines and provide an uplink to the...
A Modular Traffic Sampling Architecture: Bringing Versatility and Efficiency to Massive Traffic Analysis
Abstract The massive traffic volumes and heterogeneity of services in today’s networks urge for flexible, yet simple measurement solutions to assist network management tasks, w...
On the Interplay of Network Structure and Routing Strategies on Network Design Methods for Mitigation of Intentional Attacks in Scale-Free Networks
Abstract Network robustness and network reliability are important issues in the design of Internet Service Provider’s topologies. In this paper, we examine the structural chara...
Survivable Network Capacity Allocation and Topology Design Using Multi-period Network Augmentation
Abstract This paper examines the effect of incorporating multi-period network augmentation into the survivable network design process. The framework presented can handle variable...
Decreasing the Management Burden in Multi-tier Systems Through Partial Correlation-Based Monitoring
Abstract Modern web applications often consist of hundreds of services distributed in different servers or tiers. On one hand, this architecture may provide easy abstraction and...
CRVR: Connectivity Repairing in Wireless Sensor Networks with Void Regions
Abstract In some applications, wireless sensor networks (WSNs) operate in very harsh environments. Sometimes, a WSN suffers from simultaneous failures of multiple sensors and get...
Model-Based Probabilistic Reasoning for Self-Diagnosis of Telecommunication Networks: Application to a GPON-FTTH Access Network
Abstract Carrying out self-diagnosis of telecommunication networks requires an understanding of the phenomenon of fault propagation on these networks. This understanding makes it...
Automatic Hidden Bypasses in Software-Defined Networks
Abstract As global internet traffic continues to increase, network operators face challenges on how to efficiently manage transmission in their networks. Even though attemp...
A Taxonomy of Faults for Wireless Sensor Networks
Abstract Over the last decade, Wireless Sensor Networks (WSN) went from being a promising technology to the main enabler of countless Internet of Things applications in all types...
Lightweight Boolean Network Tomography Based on Partition of Managed Networks
Abstract Boolean network tomography is a promising technique to achieve fault management in networks where the existing IP-based troubleshooting mechanism cannot be used. Aiming to...
Optimized Hexagon-Based Deployment for Large-Scale Ubiquitous Sensor Networks
Abstract Ubiquitous Sensor Network describes an application platform comprised of intelligently networked sensors deployed over a large area, supporting multiple application scenar...
Seamless Configuration of Virtual Network Functions in Data Center Provider Networks
Abstract Network function virtualization has enabled data center providers to offer new service provisioning models. Through the use of data center management software (cloud manag...
A Survey on the Use of P2P Technology for Network Management
Abstract Network management has steadily evolved over recent years. Along with the growing need for advanced features in network management solutions, several distribution models w...
Optimizing the Spare Parts Management Process in a Communication Network
Abstract In this paper we describe how to improve the spare parts management process in a telecommunications’ operator. Several techniques such as: neural networks, analytic hier...
OAuthkeeper: An Authorization Framework for Software Defined Network
Abstract Implementing REST API for SDN is quite challenging compared to conventional web services. First, the state transfers in SDN are more complex among network devices, control...


IJNM - International Journal of Network Management

RSS Feed: http://onlinelibrary.wiley.com/rss/journal/10.1002/%28ISSN%291099-1190

Latest publications:

An adaptive approach for elephant flow detection with the rapidly changing traffic in data center network
Software-defined network, which separates control plane from the underlying physical devices, has the advantages of global visibility and high flexibility. Among the most typical applications in so...
Zehui Liu, Deyun Gao, Ying Liu, Hongke Zhang, Chuan Heng Foh
A system for providing load-aware virtual network service in a software-defined data center network
Virtual networks may be used in a cloud data center to provide personalized networking services for the applications running in the cloud. As the virtual networks come to the data center and leave...
Habib Allah Khosravi, Mohammad Reza Khayyambashi
A software-defined networking approach to improve service provision in residential networks
Within the Internet service provider landscape, the residential gateway (RGW) plays a key role in service provision. The RGW should be an enabler for the provision of new and better services for re...
Ricardo Flores Moyano, David Fernández, Luis Bellido, Carlos González
Special Issue on management of SDN/NFV-based systems
Rémi Badonnel, Kazuhiko Kinoshita, Daphné Tuncer, Sejun Song
Application traffic classification using payload size sequence signature
Recently, network traffic has become more complex and diverse because of the emergence of new applications and services. Therefore, the importance of application-level traffic classification is inc...
Kyu-Seok Shim, Jae-Hyun Ham, Baraka D. Sija, Myung-Sup Kim
CRAN, H-CRAN, and F-RAN for 5G systems: Key capabilities and recent advances
The world of telecommunication is witnessing a swift metamorphosis towards fifth generation cellular networks. Particularly, the rapid shift from a user centric to a device centric communication ha...
Zeineb Guizani, Noureddine Hamdi
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach
Software-defined networking is a promising networking paradigm for achieving programmability and centralized control in communication networks. These features simplify network management and enable...
Mohamad Khattar Awad, Mohammed El-Shafei, Tassos Dimitriou, Yousef Rafique, Mohammed Baidas, Ammar Alhusaini
Issue Information
No abstract is available for this article.
Big data analytics for network and service management
Yixin Diao, A. Nur Zincir-Heywood
Data transformation as a means towards dynamic data storage and polyglot persistence
Legacy applications have been built around the concept of storing their data in one relational data store. However, with the current differentiation in data store technologies as a consequence of t...
Thomas Vanhove, Merlijn Sebrechts, Gregory Van Seghbroeck, Tim Wauters, Bruno Volckaert, Filip De Turck
Dynamic resource allocation for big data streams based on data characteristics (5Vs)
Various Internet-based applications such as social media, business transactions, mobile applications, cyber-physical systems, and Internet of Things have led to the generation of big data streams i...
Navroop Kaur, Sandeep K. Sood
Learning ensemble strategy for static and dynamic localization in wireless sensor networks
Indoor localization in wireless sensor networks is a challenging task. Static localization and moving target monitoring are addressed using ensemble learning method and received signal strength ind...
Hanen Ahmadi, Federico Viani, Alessandro Polo, Ridha Bouallegue
ALACA: A platform for dynamic alarm collection and alert notification in network management systems
Mobile network operators run Operations Support Systems that produce vast amounts of alarm events. These events can have different significance levels and domains and also can trigger other ones. N...
Selçuk Emre Solmaz, Buğra Gedik, Hakan Ferhatosmanoğlu, Selçuk Sözüer, Engin Zeydan, Çağrı Özgenç Etemoğlu
Security in IoT network based on stochastic game net model
The growing prevalence of Internet of Things (IoT) ushers itself with various security concerns. Being complex in nature, traditional security countermeasures cannot be applied directly to IoT netw...
Rajbir Kaur, Navroop Kaur, Sandeep K. Sood
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
Botnets, as one of the most aggressive threats, has used different techniques, topologies, and communication protocols in different stages of their lifecycle since 2003. Hence, identifying botnets...
Fariba Haddadi, A. Nur Zincir-Heywood


CommMag - IEEE Communications Magazine

RSS Feed: http://ieeexplore.ieee.org/rss/TOC35.XML

Latest publications:

Front cover
Presents the front cover for this issue of the publication.
Cover 2
Advertisement, IEEE.
Table of Contents
Presents the table of contents for this issue of the publication.
Spectrum Enterprise
Advertisement.
The President's Page
Presents the President's message for this issue of the publication.
Interconnections for computer communications and packet networks (rojas-cessa, r.) [book review]
An interconnection network is a major, yet often underestimated, part of telecommunication and computer network nodes. The scope of applications of this type of network is very wide. They can be us...
Global Communications Newsletter
Presents key events and topics in the global communications industry.
Conference Calendar
Presents the ComSoc calendar of upcoming events and meetings.
Traffic Measurements for Cyber Security
The articles in this special section focus on telecommunication traffic measurements for protecting network security. Computers and open communication networks have become increasingly interwoven w...
Demystifying DDoS as a Service
In recent years, we have observed a resurgence of DDoS attacks. These attacks often exploit vulnerable servers (e.g., DNS and NTP) to produce large amounts of traffic with little effort. However, w...
Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels
Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets are managed on a large scale and harness the power of compromised machines, which are controlled through c...
Traffic-Aware Patching for Cyber Security in Mobile IoT
The various types of communication technologies and mobility features in IoT on one hand enable fruitful and attractive applications, but on the other hand facilitate malware propagation, thereby r...
Characterizing the HTTPS Trust Landscape: A Passive View from the Edge
Our society increasingly relies on web-based services like online banking, shopping, and socializing. Many of these services heavily depend on secure end-to-end transactions to transfer personal, f...
Scalable Traffic Sampling Using Centrality Measure on Software-Defined Networks
With regard to cyber security, pervasive traffic visibility is one of the most essential functionalities for complex network systems. A traditional network system has limited access to core and edg...
Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?
Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although...


TDSC - IEEE Transactions on Dependable and Secure Computing

RSS Feed: http://ieeexplore.ieee.org/rss/TOC8858.XML

Latest publications:

A Secure, Usable, and Transparent Middleware for Permission Managers on Android
Android&#x2019;s permission system offers an all-or-nothing choice when installing an app. To make it more flexible and fine-grained, users may choose a popular app tool, called <italic>p...
Dependable Structural Health Monitoring Using Wireless Sensor Networks
As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural health monitoring (SHM) due to relativ...
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching
A key component of a smart grid is its ability to collect useful information from a power grid for enabling control centers to estimate the current states of the power grid. Such information can be...
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs), especially for critical applications, as it provides high energy efficiency, guaranteed bandwidth, bounded and...
Location Based Handshake and Private Proximity Test with Location Tags
A location proximity test service allows mobile users to determine whether they are in close proximity to each other, and has found numerous applications in mobile social networks. Unfortunately, e...
Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters
Given the scalability of the advanced metering infrastructure (AMI) networks, maintenance and access of certificate revocation lists (CRLs) pose new challenges. It is inefficient to create one larg...
SPE: Security and Privacy Enhancement Framework for Mobile Devices
In this paper, we present a security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and...
Towards Detecting Compromised Accounts on Social Networks
Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicio...
Comments on &#8220;Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing&#8221;
Recently in IEEE Transactions on Dependable and Secure Computing (TDSC) (doi: 10.1109/TDSC.2015.2499755), Ma et&#x00A0;al. proposed a new construction of attribute-based encryption (ABE) which...


IEEE Communications Surveys & Tutorials

RSS Feed: http://ieeexplore.ieee.org/rss/TOC9739.XML

Latest publications:

Table of contents
Presents the table of contents for this issue of the publication.
Editorial: Second Quarter 2017 IEEE Communications Surveys and Tutorials
I WELCOME you to the second issue of the IEEE Communications Surveys and Tutorials in 2017. This issue includes 25 papers covering different aspects of communication networks. In particular, these...
5G: Adaptable Networks Enabled by Versatile Radio Access Technologies
The requirements and key areas for 5G are gradually becoming more apparent, and it is becoming clear that 5G will need to be able to deal with increased levels of diversity in both the requirements...
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for performance enhancement in next-generation cellular communications. Compared to orthogonal frequency divisi...
Coordinated Multi-Point Clustering Schemes: A Survey
Mobile data traffic grew by 74% in 2015 and it is expected to grow eight-fold by 2020. Future wireless networks will need to deploy massive number of small cells to cope with this increasing demand...
Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey
Various security threats and corresponding countermeasures has been a major concern of the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is accompanied with background ad...
Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges
From the view of routing protocols in underwater sensor networks (UWSNs), the presence of communication void, where the packet cannot be forwarded further using the greedy mode, is perhaps the most...
A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks
Emerging technologies, such as the Internet of Things, smart applications, smart grids, and machine-to-machine networks stimulate the deployment of autonomous, self-configuring, large-scale wireles...
Low Power Wide Area Networks: An Overview
Low power wide area (LPWA) networks are attracting a lot of attention primarily because of their ability to offer affordable connectivity to the low-power devices distributed over very large geogra...
An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards
This paper presents an updated survey on research related to ultra wideband (UWB) communications, particularly that of impulse radio (IR) technology. In addition to the research, we survey UWB phys...
A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges
Recently, several large-scale software defined networking (SDN) testbeds have been designed and developed. These SDN testbeds have spurred numerous network researchers to run their prototypes and e...
A Survey on the Contributions of Software-Defined Networking to Traffic Engineering
Since the appearance of OpenFlow back in 2008, software-defined networking (SDN) has gained momentum. Although there are some discrepancies between the standards developing organizations working wi...
Resource Management in Cloud Networking Using Economic Analysis and Pricing Models: A Survey
This paper presents a comprehensive literature review on applications of economic and pricing models for resource management in cloud networking. To achieve sustainable profit advantage, cost reduc...
A Survey on Replica Server Placement Algorithms for Content Delivery Networks
Content delivery networks (CDNs) have gained immense popularity over the years. Replica server placement is a key design issue in CDNs. It entails placing replica servers at meticulous locations, s...
A Survey on Multiple-Antenna Techniques for Physical Layer Security
As a complement to high-layer encryption techniques, physical layer security has been widely recognized as a promising way to enhance wireless security by exploiting the characteristics of wireless...