Journals

From SimpleWiki
Jump to: navigation, search

In this page you can find journals and links to latest publications related to Network Management.

TNSM - IEEE Transactions on Network and Service Management

RSS Feed: http://ieeexplore.ieee.org/rss/TOC4275028.XML

Current issue:

Table of contents
Presents the table of contents for this issue of the publication.
2018 Editorial Board
Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
2017 Reviewers for
Presents the list of reviewers who contributed to this publication in 2017.
Guest Editorial: Special Section on Advances in Big Data Analytics for Management
Cloud and network analytics can harness the immense stream of operational data from clouds and networks, and can perform analytics processing to improve reliability, automated configuration, perfor...
AWESoME: Big Data for Automatic Web Service Management in SDN
Software defined network (SDN) has enabled consistent and programmable management in computer networks. However, the explosion of cloud services and content delivery networks (CDNs)-coupled with th...
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
In software-defined networks (SDNs), the abstracted control plane is its symbolic characteristic, whose core component is the software-based controller. The control plane is logically centralized,...
Spatial–Temporal Prediction Models for Active Ticket Managing in Data Centers
Performance ticket handling is an expensive operation in data centers, where physical boxes host multiple virtual machines (VMs). A large body of tickets arise from resource usage warnings, e.g., C...
Mining Causality of Network Events in Log Data
Network log messages (e.g., syslog) are expected to be valuable and useful information to detect unexpected or anomalous behavior in large scale networks. However, because of the huge amount of sys...
Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments
Cloud computing has gained an important role in providing high quality and cost-effective IT services by outsourcing part of their operations to dedicated cloud providers. If intrinsic security iss...
Anomaly Detection in Complex Real World Application Systems
The ability to understand application performance and pro-actively manage system state is becoming increasingly important as infrastructure services move toward commodisation models such as cloud c...
Social Plane for Recommenders in Network Performance Expectation Management
Multi-domain end-to-end network performance monitoring federations such as perfSONAR are increasingly being used in Big Data application management. They rely on trustworthy collaborative measureme...
Efficient Deep Neural Network Serving: Fast and Furious
The emergence of deep neural networks (DNNs) as a state-of-the-art machine learning technique has enabled a variety of artificial intelligence applications for image recognition, speech recognition...
Group Mobility Detection and User Connectivity Models for Evaluation of Mobile Network Functions
Group mobility in mobile networks is responsible for dynamic changes in user accesses to base stations, which eventually lead to degradation of network quality of service (QoS). In particular, the...
Automatic Generation of Workload Profiles Using Unsupervised Learning Pipelines
The complexity of resource usage and power consumption on cloud-based applications makes the understanding of application behavior through expert examination difficult. The difficulty increases whe...
Data-Driven Cell Zooming for Large-Scale Mobile Networks
In large-scale mobile networks, energy minimization problem pertaining to base station (BS) switching is known to require high computational complexity. In this paper, we propose a data-driven ener...


Back publications:

JNSM - Journal of Network and Systems Management

RSS Feed: http://link.springer.com/search.rss?facet-content-type=Article&facet-journal-id=10922&channel-name=Journal+of+Network+and+Systems+Management

Latest publications:

Specialized CSIRT for Incident Response Management in Smart Grids
Abstract Power grids are undergoing a major modernization process, which is transforming them into Smart Grids. In such cyber-physical systems, a security incident may cause catast...
TMM: Trust Management Middleware for Cloud Service Selection by Prioritization
Abstract Cloud computing is a prominently distributed paradigm that offers a wide variety of infrastructure, platform, and software services over the internet on demand. However, t...
Anomaly Detection and Modeling in 802.11 Wireless Networks
Abstract IEEE 802.11 Wireless Networks are getting more and more popular at university campuses, enterprises, shopping centers, airports and in so many other public places, providi...
Dynamic Bandwidth Allocation for Video Traffic Using FARIMA-Based Forecasting Models
Abstract In this work time series forecasting models and techniques are implemented to video traffic as part of three dynamic bandwidth allocation schemes. Traffic produced by vide...
Multi-objective Task Scheduling to Minimize Energy Consumption and Makespan of Cloud Computing Using NSGA-II
Abstract The utilization of cloud services has significantly increased due to the easiness in accessibility, better performance, and decrease in the high initial cost. In general...
Server Selection, Configuration and Reconfiguration Technology for IaaS Cloud with Multiple Server Types
Abstract We propose a server selection, configuration, reconfiguration and automatic performance verification technology to meet user functional and performance requirements on v...
Delay Management in Mesh-Based P2P Live Streaming Using a Three-Stage Peer Selection Strategy
Abstract Peer-to-peer (P2P) live streaming systems have gained popularity due to the self-scalability property of the P2P overlay networks. In P2P live streaming, peers retrieve...
Lightweight Boolean Network Tomography Based on Partition of Managed Networks
Abstract Boolean network tomography is a promising technique to achieve fault management in networks where the existing IP-based troubleshooting mechanism cannot be used. Aiming...
Adaptive Auction Framework for Spectrum Market in Cognitive Radio Networks
Abstract For the recent decade, cognitive radio networks have received much attention as an alternative to the traditional static spectrum allocation policy since the licensed sp...
BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources
Abstract Cloud resource scheduling requires mapping of cloud resources to cloud workloads. Scheduling results can be optimized by considering Quality of Service (QoS) parameters...
Throughput and Latency of Virtual Switching with Open vSwitch: A Quantitative Analysis
Abstract Virtual switches, like Open vSwitch, have emerged as an important part of today’s data centers. They connect interfaces of virtual machines and provide an uplink to th...
Optimized Hexagon-Based Deployment for Large-Scale Ubiquitous Sensor Networks
Abstract Ubiquitous Sensor Network describes an application platform comprised of intelligently networked sensors deployed over a large area, supporting multiple application scen...
TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata
Abstract The mobility of the nodes and their limited energy supply in mobile ad hoc networks (MANETs) complicates network conditions. Having an efficient topology control mechani...
A Lightweight Fairness-Driven AQM for Regulating Bandwidth Utilization in Best-Effort Routers
Abstract The end-to-end congestion control mechanism of transmission control protocol (TCP) is critical to the robustness and fairness of the best-effort Internet. Since it is no...
CCN Energy-Delay Aware Cache Management Using Quantized Hopfield
Abstract Internet infrastructure is going to be re-designed as a core network layer, shifting from hosts to contents. To this end, content centric networking (CCN) as one of the mo...


IJNM - International Journal of Network Management

RSS Feed: https://onlinelibrary.wiley.com/rss/journal/10.1002/%28ISSN%291099-1190

Latest publications:

[ ]
XuejunCai, WolfgangJohn, CatalinMeirosu
[ ]
VennilaGanesan, Manikandanmsk
[ ]
Kyu‐SeokShim, Sung‐HoYoon, Baraka D.Sija, Jun‐SangPark, KyungheeCho, Myung‐SupKim
[ ]
YoonseonHan, ThomasVachuska, AliAl‐Shabibi, JianLi, HuibaiHuang, WilliamSnow, James Won‐KiHong
[ ]
PerKreuger, RebeccaSteinert, OlofGörnerup, DanielGillblad
[ ]
RerngvitYanggratoke, JawwadAhmed, JohnArdelius, ChristoferFlinta, AndreasJohnsson, DanielGillblad, RolfStadler
[ ]
[ ]
WoojoongKim, JianLi, James Won‐KiHong, Young‐JooSuh
[ ]
LigangDong, DandanYang, KaiqiangGuo, ShuochengFei, YingLi, WeimingWang
[ ]
Pedro H. A.Rezende, Paulo R. S. L.Coelho, Luis F.Faina, Lasaro J.Camargos, RafaelPasquini
[ ]
KaoutharSethom, GuyPujolle
[ ]
Ashutosh KumarSingh, ShashankSrivastava
[ ]
MaximClaeys, NielsBouten, DannyDe Vleeschauwer, KoenDe Schepper, WernerVan Leekwijck, StevenLatré, FilipDe Turck


CommMag - IEEE Communications Magazine

RSS Feed: http://ieeexplore.ieee.org/rss/TOC35.XML

Latest publications:

Front cover
Presents the front cover for this issue of the publication.
Cover 2
Advertisement, IEEE.
Table of Contents
Presents the table of contents for this issue of the publication.
ComSoc's Technical and Educational Activities
Presents the President's message for this issue of the publication.
Conference Calendar
Presents the ComSoc conference calendar of upcoming meetings and events.
Network as a Service for Next Generation Internet (Duan, Q. and Wang, S.; 2017) [Book Review]
he concept of delivering Network as a Service (NaaS) is enabled mainly by three approaches, which combined are attracting more and more attention: Service Oriented Architecture (SOA), Network Funct...
Society Members Named to IEEE Fellow Grade
Presents a listing of ComSoc members who were elevated to the status of IEEE Fellow.
Global Communications Newsletter
Presents key events and topics in the global communications industry.
Advances in Next-Generation Networking Technologies for Smart Healthcare
The seven articles in this special section examine how 5G mobile communications will impact the smart healthcare industry. With the advancement of 5G communications, smart or "connected"...
5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds
Recent advances in wireless networking and big data technologies, such as 5G networks, medical big data analytics, and the Internet of Things, along with recent developments in wearable computing a...
LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment
With the evolution of the Internet of Things, mutual sharing of information becomes easy among various smart devices across the globe. In such an environment, smart healthcare also needs to be expe...
Medical Image Forgery Detection for Smart Healthcare
With the invention of new communication technologies, new features and facilities are provided in a smart healthcare framework. The features and facilities aim to provide a seamless, easy-to-use, a...
Privacy in the Internet of Things for Smart Healthcare
With the rapid development of wearable biosensors and wireless communication technologies, various smart healthcare systems are proposed to monitor the health of patients in real time. However, man...
ComSoc Membership
Advertisement, IEEE.
Large-Scale Mobile Fitness App Usage Analysis for Smart Health
Understanding essential factors that influence urban citizens' workout activities, both aerobic and training, is important for public policy development and city planning. Mobile fitness app us...


TDSC - IEEE Transactions on Dependable and Secure Computing

RSS Feed: http://ieeexplore.ieee.org/rss/TOC8858.XML

Latest publications:

A Shoulder Surfing Resistant Graphical Authentication System
Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way...
Attribute-based Access Control for ICN Naming Scheme
Information Centric Networking (ICN) is a new network architecture that aims to overcome the weakness of existing IPbased networking architecture. Instead of establishing a connection between the c...
Conditional Diagnosability of $(n,k)$ -Star Graphs Under the PMC Model
Fault diagnosis has played a major role in measuring the reliability of multiprocessor systems. The diagnosability of many well-known multiprocessor systems has been widely investigated. Conditiona...
Efficient Anonymous Message Submission
In online surveys, many people are reluctant to provide true answers due to privacy concerns. Thus, anonymity is important for online message collection. Existing solutions let each member blindly...
Empirical Study of Face Authentication Systems Under OSNFD Attacks
Face authentication has been widely available on smartphones, tablets, and laptops. As numerous personal images are published in online social networks (OSNs), OSN-based facial disclosure (OSNFD) c...
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants
Consensus is a fundamental building block to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being widely studied in the context of...
PDA: Semantically Secure Time-Series Data Analytics with Dynamic User Groups
Third-party analysis on private records is becoming increasingly important due to the widespread data collection for various analysis purposes. However, the data in its original form often contains...
Physical Attestation in the Smart Grid for Distributed State Verification
A malicious process in a distributed system can fabricate its internal state in its communications with its peers. These state fabrications can cause other processes in the distributed system to ma...
Randomness Tests in Hostile Environments
An acceptable way to assess the quality of an RNG (PRNG) is to apply a standard battery of statistical randomness tests to a sampled output. Such tests compare some observed properties of the sampl...
Risk Assessment in Social Networks Based on User Anomalous Behaviors
Although the dramatic increase in Online Social Network (OSN) usage, there are still a lot of security and privacy concerns. In such a scenario, it would be very beneficial to have a mechanism able...
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis
With the proliferation of websites, the security level of password-protected accounts is no longer purely determined by individual ones. Users may register multiple accounts on the same site or acr...
Towards Transparent Debugging
Traditional malware analysis relies on virtualization or emulation technology to run samples in a confined environment, and to analyze malicious activities by instrumenting code execution. However,...
Understanding Practical Tradeoffs in HPC Checkpoint-Scheduling Policies
As the scale of High-Performance Computing (HPC) clusters continues to grow, their increasing failure rates and energy consumption levels are emerging as serious design concerns. Efficiently runnin...
Conditional $(t,k)$ -Diagnosis in Regular and Irregular Graphs Under the Comparison Diagnosis Model
Assume that there are at most t faulty vertices. A system is conditionally (t, k)-diagnosable if at least k faulty vertices (or all faulty vertices if fewer than k faulty vertices remain) can be id...
On the Efficiency of FHE-Based Private Queries
Private query processing is a very attractive problem in the fields of both cryptography and databases. In this work, we restrict our attention to the efficiency aspect of the problem, particularly...


IEEE Communications Surveys & Tutorials

RSS Feed: http://ieeexplore.ieee.org/rss/TOC9739.XML

Latest publications:

Table of contents
Presents the table of contents for this issue of this publication.
Editorial: First Quarter 2018 IEEE Communications Surveys and Tutorials
I welcome you to the first issue of the IEEE Communications Surveys and Tutorials in 2018. This issue includes 25 papers covering different aspects of communication networks. In particular, these a...
Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges
Since the recently emerging mobile applications have posed significant demands not only on high data rate but also on high caching and computing capabilities, the growth in communication capability...
A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks
In recent years, industrial wireless sensor networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, proc...
State-of-the-Art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model
Similar to radio-frequency-based wireless networks (RWNs) used in terrestrial environments, the medium access control (MAC) protocol is a key element for underwater acoustic networks (UWANs). Howev...
Waveforming: An Overview With Beamforming
By leveraging the natural multipath propagation of electromagnetic waves, waveforming is proposed as a promising paradigm that treats each multipath component in a wireless channel as a virtual ant...
Spectrum Inference in Cognitive Radio Networks: Algorithms and Applications
Spectrum inference, also known as spectrum prediction in the literature, is a promising technique of inferring the occupied/free state of radio spectrum from already known/measured spectrum occupan...
Fragmentation Problems and Management Approaches in Elastic Optical Networks: A Survey
Bandwidth fragmentation, a serious issue in elastic optical networks (EONs), can be suppressed by proper management in order to enhance the accommodated traffic demands. In this context, we need an...
A Survey of Optical Carrier Generation Techniques for Terabit Capacity Elastic Optical Networks
Elastic optical networks (EON) have been proposed to meet the network apacity and dynamicity challenges. Hardware and software resource optimization and reconfigurability are key enablers for EONs....
Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges
Initial efforts on wireless power transfer (WPT) have concentrated toward long-distance transmission and high power applications. Nonetheless, the lower achievable transmission efficiency and poten...
Towards Energy-Efficient Wireless Networking in the Big Data Era: A Survey
With the proliferation of wireless devices, wireless networks in various forms have become global information infrastructure and an important part of our daily life, which, at the same time, incur...
Distributed SDN Control: Survey, Taxonomy, and Challenges
As opposed to the decentralized control logic underpinning the devising of the Internet as a complex bundle of box-centric protocols and vertically integrated solutions, the software-defined networ...
A Survey on Multicasting in Software-Defined Networking
Existing surveys of research into software-defined networking (SDN) make only minimal mention of multicasting. We present a survey of existing multicast routing protocols in Internet Protocol (IP)...
Unicast QoS Routing Algorithms for SDN: A Comprehensive Survey and Performance Evaluation
A variety of communication networks, such as industrial communication systems, have to provide strict delay guarantees to the carried flows. Fast and close to optimal quality of service (QoS) routi...
A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges
Cloud computing with its three key facets (i.e., Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service) and its inherent advantages (e.g., elasticity and scalability) still...