Table of contents for issues of Journal of Network and Computer Applications

Last update: Wed Apr 10 11:14:59 MDT 2024                Valid HTML 3.2!

Volume 19, Number 1, January, 1996
Volume 19, Number 2, April, 1996
Volume 19, Number 3, July, 1996
Volume 19, Number 4, October, 1996
Volume 20, Number 1, January, 1997
Volume 20, Number 2, April, 1997
Volume 20, Number 3, July, 1997
Volume 20, Number 4, October, 1997
Volume 21, Number 1, January, 1998
Volume 21, Number 2, April, 1998
Volume 21, Number 3, July, 1998
Volume 21, Number 4, October, 1998
Volume 22, Number 1, January, 1999
Volume 22, Number 2, April, 1999
Volume 22, Number 3, July, 1999
Volume 22, Number 4, October, 1999
Volume 23, Number 1, January, 2000
Volume 23, Number 2, April, 2000
Volume 23, Number 3, July, 2000
Volume 23, Number 4, October, 2000
Volume 24, Number 1, January, 2001
Volume 24, Number 2, April, 2001
Volume 24, Number 3, July, 2001
Volume 24, Number 4, October, 2001
Volume 25, Number 1, January, 2002
Volume 25, Number 2, April, 2002
Volume 25, Number 3, July, 2002
Volume 25, Number 4, October, 2002
Volume 26, Number 1, January, 2003
Volume 26, Number 2, April 1, 2003
Volume 26, Number 3, 2003
Volume 26, Number 4, November, 2003
Volume 27, Number 1, January, 2004
Volume 27, Number 2, April, 2004
Volume 27, Number 3, August, 2004
Volume 27, Number 4, November, 2004
Volume 28, Number 1, January, 2005
Volume 28, Number 2, April, 2005
Volume 28, Number 3, August, 2005
Volume 28, Number 4, November, 2005
Volume 29, Number 1, January, 2006
Volume 29, Number 2--3, August / April, 2005/2006
Volume 29, Number 4, November, 2006
Volume 30, Number 1, January, 2007
Volume 30, Number 2, April, 2007
Volume 30, Number 3, August, 2007
Volume 30, Number 4, November, 2007
Volume 31, Number 1, January, 2008
Volume 31, Number 2, April, 2008
Volume 31, Number 3, August, 2008
Volume 31, Number 4, November, 2008
Volume 32, Number 1, January, 2009
Volume 32, Number 2, March, 2009
Volume 32, Number 3, May, 2009
Volume 32, Number 4, July, 2009
Volume 32, Number 5, September, 2009
Volume 32, Number 6, November, 2009
Volume 33, Number 1, January, 2010
Volume 33, Number 2, March, 2010
Volume 33, Number 3, May, 2010
Volume 33, Number 4, July, 2010
Volume 33, Number 5, September, 2010
Volume 33, Number 6, November, 2010
Volume 34, Number 1, January, 2011
Volume 34, Number 2, March, 2011
Volume 34, Number 3, May, 2011
Volume 34, Number 4, July, 2011
Volume 34, Number 5, September, 2011
Volume 34, Number 6, November, 2011
Volume 35, Number 1, January, 2012
Volume 35, Number 2, March, 2012
Volume 35, Number 3, May, 2012
Volume 35, Number 4, July, 2012
Volume 35, Number 5, September, 2012
Volume 35, Number 6, November, 2012
Volume 36, Number 1, January, 2013
Volume 36, Number 2, March, 2013
Volume 36, Number 3, May, 2013
Volume 36, Number 4, July, 2013
Volume 36, Number 5, September, 2013
Volume 36, Number 6, November, 2013
Volume 37, Number ??, January, 2014
Volume 38, Number ??, February, 2014
Volume 39, Number ??, March, 2014
Volume 40, Number ??, April, 2014
Volume 40, Number 0, April, 2014
Volume 40, Number ??, April, 2014
Volume 41, Number ??, May, 2014
Volume 42, Number ??, June, 2014
Volume 43, Number ??, August, 2014
Volume 44, Number ??, September, 2014
Volume 45, Number ??, October, 2014
Volume 46, Number ??, November, 2014
Volume 47, Number ??, January, 2015
Volume 48, Number ??, February, 2015
Volume 49, Number ??, March, 2015
Volume 50, Number ??, April, 2015
Volume 51, Number ??, May, 2015
Volume 52, Number ??, June, 2015
Volume 53, Number ??, July, 2015
Volume 54, Number ??, August, 2015
Volume 55, Number ??, September, 2015
Volume 56, Number ??, October, 2015
Volume 57, Number ??, November, 2015
Volume 58, Number ??, December, 2015
Volume 59, Number ??, January, 2016
Volume 60, Number ??, January, 2016
Volume 61, Number ??, February, 2016
Volume 62, Number ??, February, 2016
Volume 63, Number ??, March, 2016
Volume 64, Number ??, April, 2016
Volume 65, Number ??, April, 2016
Volume 66, Number ??, May, 2016
Volume 67, Number ??, May, 2016
Volume 68, Number ??, June, 2016
Volume 69, Number ??, July, 2016
Volume 70, Number ??, July, 2016
Volume 71, Number ??, August, 2016
Volume 72, Number ??, September, 2016
Volume 73, Number ??, September, 2016
Volume 74, Number ??, October, 2016
Volume 75, Number ??, November, 2016
Volume 76, Number ??, December, 2016
Volume 77, Number ??, January 1, 2017
Volume 78, Number ??, January 15, 2017
Volume 79, Number ??, February 1, 2017
Volume 80, Number ??, February 15, 2017
Volume 81, Number ??, March 1, 2017
Volume 82, Number ??, March 15, 2017
Volume 83, Number ??, April 1, 2017
Volume 84, Number ??, April 15, 2017
Volume 85, Number ??, May 1, 2017
Volume 86, Number ??, May 15, 2017
Volume 87, Number ??, June 1, 2017
Volume 88, Number ??, June 15, 2017
Volume 89, Number ??, July 1, 2017
Volume 90, Number ??, July 15, 2017
Volume 91, Number ??, August 1, 2017
Volume 92, Number ??, August 15, 2017
Volume 93, Number ??, September 1, 2017
Volume 94, Number ??, September 15, 2017
Volume 95, Number ??, October 1, 2017
Volume 96, Number ??, October 15, 2017
Volume 97, Number ??, November 1, 2017
Volume 98, Number ??, November 15, 2017
Volume 99, Number ??, December 1, 2017
Volume 100, Number ??, December 15, 2017
Volume 101, Number ??, January 1, 2018
Volume 102, Number ??, January 15, 2018
Volume 103, Number ??, February 1, 2018
Volume 104, Number ??, February 15, 2018
Volume 105, Number ??, March 1, 2018
Volume 106, Number ??, March 15, 2018
Volume 107, Number ??, April 1, 2018
Volume 108, Number ??, April 15, 2018
Volume 109, Number ??, May 1, 2018
Volume 110, Number ??, May 15, 2018
Volume 111, Number ??, June 1, 2018
Volume 112, Number ??, June 15, 2018
Volume 113, Number ??, July 1, 2018
Volume 114, Number ??, July 15, 2018
Volume 115, Number ??, August 1, 2018
Volume 116, Number ??, August 15, 2018
Volume 117, Number ??, September 1, 2018
Volume 118, Number ??, September 15, 2018
Volume 119, Number ??, October 1, 2018
Volume 120, Number ??, October 15, 2018
Volume 121, Number ??, November 1, 2018
Volume 122, Number ??, November 15, 2018
Volume 123, Number ??, December 1, 2018
Volume 124, Number ??, December 15, 2018
Volume 125, Number ??, January 1, 2019
Volume 126, Number ??, January 15, 2019
Volume 127, Number ??, February 1, 2019
Volume 128, Number ??, February 15, 2019
Volume 129, Number ??, March 1, 2019
Volume 130, Number ??, March 15, 2019
Volume 131, Number ??, April 1, 2019
Volume 132, Number ??, April 15, 2019
Volume 133, Number ??, May 1, 2019
Volume 134, Number ??, May 15, 2019
Volume 135, Number ??, June 1, 2019
Volume 136, Number ??, June 15, 2019
Volume 137, Number ??, July 1, 2019
Volume 138, Number ??, July 15, 2019
Volume 139, Number ??, August 1, 2019
Volume 140, Number ??, August 15, 2019
Volume 141, Number ??, September 1, 2019
Volume 142, Number ??, September 15, 2019
Volume 143, Number ??, October 1, 2019
Volume 144, Number ??, October 15, 2019
Volume 145, Number ??, 2019
Volume 146, Number ??, 2019
Volume 147, Number ??, December 1, 2019
Volume 148, Number ??, December 15, 2019
Volume 149, Number ??, January 1, 2020
Volume 150, Number ??, January 15, 2020
Volume 151, Number ??, February 1, 2020
Volume 152, Number ??, February 15, 2020
Volume 153, Number ??, March 1, 2020
Volume 154, Number ??, March 15, 2020
Volume 155, Number ??, April 1, 2020
Volume 156, Number ??, April 15, 2020
Volume 157, Number ??, May 1, 2020
Volume 158, Number ??, May 15, 2020
Volume 159, Number ??, June 1, 2020
Volume 160, Number ??, June 15, 2020
Volume 161, Number ??, July 1, 2020
Volume 162, Number ??, July 15, 2020
Volume 163, Number ??, August 1, 2020
Volume 164, Number ??, August 15, 2020
Volume 165, Number ??, September 1, 2020
Volume 166, Number ??, September 15, 2020
Volume 167, Number ??, October 1, 2020
Volume 168, Number ??, October 15, 2020
Volume 169, Number ??, November 1, 2020
Volume 170, Number ??, November 15, 2020
Volume 171, Number ??, December 1, 2020
Volume 172, Number ??, December 15, 2020
Volume 173, Number ??, January 1, 2021
Volume 174, Number ??, January 15, 2021
Volume 175, Number ??, February 1, 2021
Volume 176, Number ??, February 15, 2021
Volume 177, Number ??, March 1, 2021
Volume 178, Number ??, March 15, 2021
Volume 179, Number ??, April 1, 2021
Volume 180, Number ??, April 15, 2021
Volume 181, Number ??, May 1, 2021
Volume 182, Number ??, May 15, 2021
Volume 183--184, Number ??, June 1, 2021
Volume 185, Number ??, July 1, 2021
Volume 186, Number ??, July 15, 2021
Volume 187, Number ??, August 1, 2021
Volume 188, Number ??, August 15, 2021
Volume 189, Number ??, September 1, 2021
Volume 190, Number ??, September 15, 2021
Volume 191, Number ??, October 1, 2021
Volume 192, Number ??, October 15, 2021
Volume 193, Number ??, November 1, 2021
Volume 194, Number ??, November 15, 2021
Volume 195, Number ??, December 1, 2021
Volume 196, Number ??, December 15, 2021
Volume 197, Number ??, January, 2022
Volume 198, Number ??, February, 2022
Volume 199, Number ??, March, 2022
Volume 200, Number ??, April, 2022
Volume 201, Number ??, May, 2022
Volume 202, Number ??, June, 2022
Volume 203, Number ??, July, 2022
Volume 204, Number ??, August, 2022
Volume 205, Number ??, September, 2022
Volume 206, Number ??, October, 2022
Volume 207, Number ??, November, 2022
Volume 208, Number ??, December, 2022
Volume 209, Number ??, January, 2023
Volume 210, Number ??, January, 2023
Volume 211, Number ??, February, 2023
Volume 212, Number ??, March, 2023
Volume 213, Number ??, April, 2023
Volume 214, Number ??, May, 2023
Volume 215, Number ??, June, 2023
Volume 216, Number ??, July, 2023
Volume 217, Number ??, August, 2023
Volume 218, Number ??, September, 2023
Volume 219, Number ??, October, 2023
Volume 220, Number ??, November, 2023
Volume 221, Number ??, January, 2024
Volume 222, Number ??, February, 2024
Volume 223, Number ??, March, 2024
Volume 224, Number ??, April, 2024
Volume 225, Number ??, May, 2024


Journal of Network and Computer Applications
Volume 19, Number 1, January, 1996

                 Hermann Maurer   Editorial  . . . . . . . . . . . . . . . 1
                     L. C. Jain   Editorial  . . . . . . . . . . . . . . . 3
              Herbert Dawid and   
                    Kurt Hornik   The dynamics of genetic algorithms in
                                  interactive environments . . . . . . . . 5--19
                Charles L. Karr   Adaptive process control using
                                  biological paradigms . . . . . . . . . . 21--44
              Kaihei Kuwata and   
              Yuji Kajitani and   
          Masahide Watanabe and   
                   Ryu Katayama   Chaos simulator as a developing tool and
                                  a research environment for applications
                                  of chaos engineering . . . . . . . . . . 45--66
                Ranjit Bose and   
              Vijayan Sugumaran   Knowledge-based approach to domain
                                  modeling: organizational process
                                  modeling application . . . . . . . . . . 67--89
            Dinesh P. Mital and   
            Eam Khwang Teoh and   
                P. N. Suganthan   Learning parameters for object
                                  recognition by the self-organizing
                                  Hopfield network . . . . . . . . . . . . 91--108

Journal of Network and Computer Applications
Volume 19, Number 2, April, 1996

                     L. C. Jain   Guest Editorial: Intelligent systems:
                                  design and applications. Part 2  . . . . 109
     David V. Sánchez A.   On the design of a class of neural
                                  networks . . . . . . . . . . . . . . . . 111--118
  Ferda N. Civelek-Alpaslan and   
            Kathleen M. Swigger   A temporal neural network model for
                                  constructing connectionist expert system
                                  knowledge bases  . . . . . . . . . . . . 119--133
          Krishna Kottathra and   
             Yianni Attikiouzel   A novel multicriteria optimization
                                  algorithm for the structure
                                  determination of multilayer feedforward
                                  neural networks  . . . . . . . . . . . . 135--147
            Ibikunle Ashiru and   
            Chris Czarnecki and   
                     Tom Routen   Characteristics of a genetic based
                                  approach to path planning for mobile
                                  robots . . . . . . . . . . . . . . . . . 149--169
       Walter Cedeño and   
                  Rao V. Vemuri   Genetic algorithms in aquifer management 171--187
               John E. Hunt and   
                Denise E. Cooke   Learning using an artificial immune
                                  system . . . . . . . . . . . . . . . . . 189--212
               Larry R. Medsker   Microcomputer applications of hybrid
                                  intelligent systems  . . . . . . . . . . 213--234

Journal of Network and Computer Applications
Volume 19, Number 3, July, 1996

                     Yi Pan and   
                   Mounir Hamdi   Singular value decomposition on
                                  processor arrays with a pipelined bus
                                  system . . . . . . . . . . . . . . . . . 235--248
              J. M. Kuhlman and   
                    M. J. Lyell   Development of a user-friendly software
                                  planning tool to assess effects of
                                  biofilm activity on contaminant
                                  reduction in streams . . . . . . . . . . 249--264
                   Sun-Teck Tan   Architecture of a generic instructional
                                  planner  . . . . . . . . . . . . . . . . 265--274
               N. Bourbakis and   
                 N. Pereira and   
                   S. Mertoguno   Hardware design of a letter-driven OCR
                                  and document processing system . . . . . 275--294
              Jian Tao Wang and   
                Dinesh P. Mital   A microcomputer-based prototype for ECG
                                  paper record conversion  . . . . . . . . 295--307
              Gokul Rajaram and   
                   V. Rajaraman   A probabilistic method for calculating
                                  hit ratios in direct mapped caches . . . 309--319
             K. Padmanabhan and   
               D. Nedumaran and   
                     S. Ananthi   Bedside monitor for combined ECG and
                                  ultrasound Doppler-echo observations
                                  using a microprocessor . . . . . . . . . 321--334

Journal of Network and Computer Applications
Volume 19, Number 4, October, 1996

                      Anonymous   Index  . . . . . . . . . . . . . . . . . i--vi
           P. G. O'Donoghue and   
                   M. H. Murphy   Object modelling and formal
                                  specification during real-time system
                                  development  . . . . . . . . . . . . . . 335--352
              Roger Nkambou and   
                Gilles Gauthier   Integrating WWW resources in an
                                  Intelligent Tutoring System  . . . . . . 353--366
           Hueyching Janice Jih   The impact of learners' pathways on
                                  learning performance in multimedia
                                  Computer Aided Learning  . . . . . . . . 367--380
             Daniel J. Helm and   
         Raymond J. D'Amore and   
                   Puck-Fai Yan   MIDS: a framework for information
                                  organization and discovery . . . . . . . 381--394
                    K. Maly and   
                    C. Wild and   
           C. M. Overstreet and   
             H. Abdel-Wahab and   
                   A. Gupta and   
                 A. Youssef and   
                  E. Stoica and   
                   R. Talla and   
                      A. Prabhu   Interactive remote instruction: lessons
                                  learned  . . . . . . . . . . . . . . . . 395--404
               D. Radhakrishnan   A microcontroller based pacemaker tester 405--413
            Benjamin Singer and   
                    George Saon   An efficient algorithm for parallel
                                  integer multiplication . . . . . . . . . 415--418


Journal of Network and Computer Applications
Volume 20, Number 1, January, 1997

                      Anonymous   Guest Editorial: Special issue of JNCA
                                  on the digital libraries . . . . . . . . 1--2
                Ee-Peng Lim and   
                        Ying Lu   Integrated queries to existing
                                  bibliographic and structured databases   3--24
            Shigeo Sugimoto and   
                Akira Maeda and   
           Tetsuo Sakaguchi and   
              Koichi Tabata and   
                Takehisa Fujita   Experimental studies on software tools
                                  to enhance accessibility to information
                                  in digital libraries . . . . . . . . . . 25--44
  Alfredo J. Sánchez and   
                John J. Leggett   Agent services for users of digital
                                  libraries  . . . . . . . . . . . . . . . 45--58
          Klaus Tochtermann and   
              Thomas Alders and   
                Andreas Seifert   DogitaLS1: the Dortmund digital library
                                  system . . . . . . . . . . . . . . . . . 59--73
               Gene Alloway and   
                 Nathan Bos and   
             Kathleen Hamel and   
            Tracy Hammerman and   
            Elisabeth Klann and   
             Joseph Krajcik and   
                David Lyons and   
               Terry Madden and   
          Jon Margerum-Leys and   
                 James Reed and   
                Nancy Scala and   
             Elliot Soloway and   
              Ioanna Vekiri and   
                  Raven Wallace   Creating an inquiry-learning environment
                                  using the World Wide Web . . . . . . . . 75--85
            John L. Schnase and   
            Deborah L. Kama and   
           Kay L. Tomlinson and   
José Alfredo Sánchez and   
          Edward L. Cunnius and   
                 Nancy R. Morin   The Flora of North America digital
                                  library: a case study in biodiversity
                                  database publishing  . . . . . . . . . . 87--103

Journal of Network and Computer Applications
Volume 20, Number 2, April, 1997

                   Gerald Tripp   On the design of an ATM interface with
                                  facilities for traffic monitoring and
                                  generation . . . . . . . . . . . . . . . 105--121
              Paul Losleben and   
              Alice S. Tull and   
                    Erming Zhou   Help-Exchange: an arbitrated system for
                                  a help network . . . . . . . . . . . . . 123--134
          Richard H. Fowler and   
         Wendy A. L. Fowler and   
              Jorge L. Williams   $3$D visualization of WWW semantic
                                  content for browsing and query
                                  formulation  . . . . . . . . . . . . . . 135--149
       Daniel R. Bielenberg and   
            Ted Carpenter-Smith   Efficacy of story in multimedia training 151--159
                  B. S. Lee and   
              T. K. Y. Chan and   
                    P. C. Leong   A `pay-as-you-use' controller for
                                  networked laser printers . . . . . . . . 161--169
                  S. C. Hui and   
                 K. Y. Chan and   
                     G. Y. Qian   Distributed fax message processing
                                  system . . . . . . . . . . . . . . . . . 171--190
                 L. P. Khoo and   
                      M. Y. Teo   A prototype fuzzy-based classifier
                                  system for trajectory planning . . . . . 191--202
                   Hock C. Chan   Visual query languages for entity
                                  relationship model databases . . . . . . 203--221

Journal of Network and Computer Applications
Volume 20, Number 3, July, 1997

                    Sumit Ghosh   An asynchronous approach to efficient
                                  execution of programs on adaptive
                                  architectures utilizing FPGAs  . . . . . 223--252
         Ellen Yu Borkowski and   
                David Henry and   
             Lida L. Larsen and   
                 Deborah Mateik   Supporting teaching and learning via the
                                  Web: transforming hard-copy linear
                                  mindsets into Web-flexible creative
                                  thinking . . . . . . . . . . . . . . . . 253--265
              Jianying Zhou and   
                Dieter Gollmann   Evidence and non-repudiation . . . . . . 267--281
                  Renji Tao and   
                    Shihua Chen   A variant of the public key cryptosystem
                                  FAPKC3 . . . . . . . . . . . . . . . . . 283--303
           H. J. Schumacher and   
                    Sumit Ghosh   A fundamental framework for network
                                  security . . . . . . . . . . . . . . . . 305--322

Journal of Network and Computer Applications
Volume 20, Number 4, October, 1997

                      Anonymous   Index and Contents to Volume 20  . . . . i--x
                Holger Bock and   
       Wolfgang Mayerwieser and   
              Karl C. Posch and   
             Reinhard Posch and   
               Volker Schindler   An integrated co-processor architecture
                                  for a smartcard  . . . . . . . . . . . . 323--337
            Sandra L. Esler and   
              Michael L. Nelson   NASA indexing benchmarks: evaluating
                                  text search engines  . . . . . . . . . . 339--353
            Michal Iglewski and   
            Tomasz Müldner   Comparison of formal specification
                                  methods and object-oriented paradigms    355--377
              Don E. George and   
                      E. Salari   Real-time pitch extraction of voiced
                                  speech . . . . . . . . . . . . . . . . . 379--387
               Schubert Foo and   
                 Siu Cheung Hui   Delivery of video mail on the World Wide
                                  Web  . . . . . . . . . . . . . . . . . . 389--403
            Bernhard Leisch and   
               Peter Schuhmayer   An architecture for distributed
                                  visualization of technical processes . . 405--420


Journal of Network and Computer Applications
Volume 21, Number 1, January, 1998

                  Guojun Lu and   
                   Chester Kang   An efficient communication scheme for
                                  media on-demand services with hard QoS
                                  guarantees . . . . . . . . . . . . . . . 1--15
               P. Blenkhorn and   
                    D. G. Evans   Using speech and touch to enable blind
                                  people to access schematic diagrams  . . 17--29
             Nader Mir-Fakhraei   An efficient multicast approach in an
                                  ATM switching network for multimedia
                                  applications . . . . . . . . . . . . . . 31--39
               Ee-Luang Ang and   
                  Syin Chan and   
                    Bu-Sung Lee   Deployment of VCR services on a computer
                                  network  . . . . . . . . . . . . . . . . 41--52
             Mark Ratcliffe and   
                Tim Paul Davies   Using MBone technology to support a
                                  framework for a remote advisory service  53--68

Journal of Network and Computer Applications
Volume 21, Number 2, April, 1998

                 Imran Khan and   
                 Howard C. Card   Adaptive information agents using
                                  competitive learning . . . . . . . . . . 69--89
                  N. Vlajic and   
                     H. C. Card   Categorizing Web pages on the subject of
                                  neural networks  . . . . . . . . . . . . 91--105
           Sherali Zeadally and   
                     Weiyou Cui   Experiences with multimedia applications
                                  over native ATM  . . . . . . . . . . . . 107--123
                  E. C. Tan and   
                   A. Wahab and   
                     H. W. Yong   Interfacing reprogrammable universal
                                  remote controller with multimedia PC . . 125--134
             C. C. Charlton and   
                 P. H. Leng and   
                R. K. Lloyd and   
                    R. Turnbull   The use of macroprocessing for Web site
                                  standardization  . . . . . . . . . . . . 135--148
                Gerard Parr and   
                   Kevin Curran   Optimal multimedia transport on the
                                  Internet . . . . . . . . . . . . . . . . 149--161

Journal of Network and Computer Applications
Volume 21, Number 3, July, 1998

          Johnny S. K. Wong and   
                Rishi Nayar and   
                Armin R. Mikler   A framework for a World Wide Web-based
                                  Data Mining system . . . . . . . . . . . 163--185
               P. C. Saxena and   
                  Sangita Gupta   A performance comparison of token- and
                                  tree-based mutual exclusion algorithms
                                  on Chordal Rings . . . . . . . . . . . . 187--201
                 K. V. Chin and   
                  S. C. Hui and   
                         S. Foo   Enhancing the quality of Internet voice
                                  communication for Internet telephony
                                  systems  . . . . . . . . . . . . . . . . 203--218

Journal of Network and Computer Applications
Volume 21, Number 4, October, 1998

                      Anonymous   Contents and Index to Volume 21  . . . . i--viii
               Bor Prihavec and   
                   Franc Solina   User interface for video observation
                                  over the Internet  . . . . . . . . . . . 219--237
          Nikolas M. Mitrou and   
       Konstantine Kavidopoulos   Traffic engineering using a class of
                                  M/G/1 models . . . . . . . . . . . . . . 239--271
            Nasser-Eddine Rikli   An effective model for VBR video with
                                  application to an ATM multiplexer  . . . 273--285
                  L. Moreno and   
              R. M. Aguilar and   
               C. A. Martin and   
       J. D. Piñeiro and   
       J. I. Estévez and   
       J. L. Sánchez and   
                J. F. Sigut and   
           V. I. Jiménez   Patient-centered computer simulation in
                                  hospital management  . . . . . . . . . . 287--310


Journal of Network and Computer Applications
Volume 22, Number 1, January, 1999

              Wei-Chou Chen and   
             Tzung-Pei Hong and   
                      Rong Jeng   A framework of decision support systems
                                  for use on the World Wide Web  . . . . . 1--17
                Denis Helic and   
             Hermann Maurer and   
                Nick Scherbakov   Introducing hypermedia composites to WWW 19--32
              Hamesh Chawla and   
               Geoff Dillon and   
               Riccardo Bettati   HYDRANET: Network support for scaling of
                                  large-scale services . . . . . . . . . . 33--50
              Joachim Hasebrook   Web-based training, performance and
                                  controlling  . . . . . . . . . . . . . . 51--64
              Claude Ghaoui and   
                   M. J. Taylor   Special issue on: `Support for Open and
                                  Distance Learning on the WWW'  . . . . . 65--68

Journal of Network and Computer Applications
Volume 22, Number 2, April, 1999

              Harri Klapuri and   
               Jarmo Takala and   
                 Jukka Saarinen   Safety, liveness and real-time in
                                  embedded system design . . . . . . . . . 69--89
                   M. Kumar and   
               S. Venkatesh and   
                  K.-Y. Lim and   
                     H. Santoso   Information access and QoS issues in a
                                  mobile computing environment . . . . . . 91--118
                  K. Hanner and   
            R. Hörmanseder   Managing Windows NT$^\reg $ file system
                                  permissions --- a security tool to
                                  master the complexity of Microsoft
                                  Windows NT$^\reg $ file system
                                  permissions  . . . . . . . . . . . . . . 119--131
         Christine Steeples and   
                 Peter Goodyear   Enabling professional learning in
                                  distributed communities of practice:
                                  Descriptors for multimedia objects . . . 133--145
             Uffe Kock Wiil and   
        Kenneth M. Anderson and   
                 Michael Bieber   Call for Papers: Special Issue on:
                                  Hypermedia Extensibility Mechanisms and
                                  Scripting Languages  . . . . . . . . . . 147--148

Journal of Network and Computer Applications
Volume 22, Number 3, July, 1999

              J. E. Gilbert and   
                      C. Y. Han   Adapting instruction in search of `a
                                  significant difference'  . . . . . . . . 149--160
            Brian M. Slator and   
                 Paul Juell and   
          Philip E. McClean and   
    Bernhardt Saini-Eidukat and   
          Donald P. Schwert and   
              Alan R. White and   
                      Curt Hill   Virtual environments for education . . . 161--174
                      Guojun Lu   Design issues of multimedia information
                                  indexing and retrieval systems . . . . . 175--198
                Gail J. Ahn and   
                    Ravi Sandhu   Towards role-based administration in
                                  network information services . . . . . . 199--213

Journal of Network and Computer Applications
Volume 22, Number 4, October, 1999

                      Anonymous   Index and Contents to Volume 22  . . . . i--viii
                  Hongbo Du and   
                   Laurent Wery   Micro: a normalization tool for
                                  relational database designers  . . . . . 215--232
             David Mioduser and   
              Rafi Nachmias and   
               Avigail Oren and   
                     Orly Lahav   Web-based learning environments (WBLE):
                                  Current implementation and evolving
                                  trends . . . . . . . . . . . . . . . . . 233--247
    Rosa María Carro and   
            Estrella Pulido and   
         Pilar Rodríguez   Dynamic generation of adaptive
                                  Internet-based courses . . . . . . . . . 249--257
                    Luca Iocchi   The Web-OEM approach to Web information
                                  extraction . . . . . . . . . . . . . . . 259--269


Journal of Network and Computer Applications
Volume 23, Number 1, January, 2000

            Wolfgang Hürst   User interfaces for telepresentations
                                  --- Input devices, interaction concepts
                                  and design issues  . . . . . . . . . . . 1--15
                Wim de Boer and   
                   Betty Collis   Instructors' choices for a WWW-based
                                  course-support environment . . . . . . . 17--26
                 Chih-Hsiung Tu   On-line learning migration: from social
                                  learning theory to social presence
                                  theory in a CMC environment  . . . . . . 27--37
                 Chih-Hsiung Tu   Critical examination of factors
                                  affecting interaction on CMC . . . . . . 39--58

Journal of Network and Computer Applications
Volume 23, Number 2, April, 2000

             Chwei-King Mok and   
                   Nader F. Mir   An efficient interconnection network for
                                  large-scale computer communications
                                  applications . . . . . . . . . . . . . . 59--75
                Dave Berque and   
           Andrew Hutcheson and   
           David K. Johnson and   
            Larry Jovanovic and   
                 Kyle Moore and   
                Carl Singer and   
              Kevin M. Slattery   The design of an interface for student
                                  note annotation in a networked
                                  electronic classroom . . . . . . . . . . 77--91
                Colin Pattinson   A simulated network management
                                  information base . . . . . . . . . . . . 93--107
             Gerhard Eschelbeck   Active Security --- a proactive approach
                                  for computer security systems  . . . . . 109--130
                   Jon Dron and   
           Richard Mitchell and   
               Phil Siviter and   
                    Chris Boyne   CoFIND --- an experiment in
                                  $N$-dimensional collaborative filtering  131--142
                Bu-Sung Lee and   
             Chiew-Tong Lau and   
             Nicholas C. H. Vun   Power LAN MIB for management of
                                  intelligent telecommunication equipment  143--154

Journal of Network and Computer Applications
Volume 23, Number 3, July, 2000

                      Anonymous   Preface by the Editor in Chief . . . . . 155
            Bert J. Dempsey and   
                     Micah Beck   Preface to `Developing New Network-based
                                  Storage Services for Internet-supported
                                  Collaborative Communities' . . . . . . . 157--159
                     Ivan Tomek   Preface to `Virtual Environments'  . . . 161--162
        John Chung-I Chuang and   
                Marvin A. Sirbu   Distributed network storage service with
                                  quality-of-service guarantees  . . . . . 163--185
              Ann Chervenak and   
                 Ian Foster and   
             Carl Kesselman and   
          Charles Salisbury and   
                  Steven Tuecke   The data grid: Towards an architecture
                                  for the distributed management and
                                  analysis of large scientific datasets    187--200
                Bert J. Dempsey   Performance analysis of a scaleable
                                  design for replicating file collections
                                  in wide-area networks  . . . . . . . . . 201--218
            Laura Slaughter and   
           Gary Marchionini and   
                   Gary Geisler   Open video: a framework for a test
                                  collection . . . . . . . . . . . . . . . 219--245
                 Anna Cicognani   Language and design in text-based
                                  virtual worlds . . . . . . . . . . . . . 247--274
                     Ivan Tomek   The design and implementation of a MOO   275--289
         Alicia Díaz and   
     Alejandro Fernández   A pattern language for virtual
                                  environments . . . . . . . . . . . . . . 291--309
            Zi\`ed Choukair and   
              Damien Retailleau   A QoS model for collaboration through
                                  Distributed Virtual Environments . . . . 311--334

Journal of Network and Computer Applications
Volume 23, Number 4, October, 2000

                      Anonymous   Index and contents to volume 23  . . . . iii--viii
                      H. Maurer   Preface for the special issue `Support
                                  for flexible e-Learning on the WWW'  . . 335
              Claude Ghaoui and   
                   M. J. Taylor   Support for flexible e-Learning on the
                                  WWW: a special issue . . . . . . . . . . 337--338
                   O. Brand and   
                  L. Petrak and   
            D. Sturzebecher and   
                  M. Zitterbart   Supporting Tele-Teaching: visualization
                                  aspects  . . . . . . . . . . . . . . . . 339--355
               Weigang Wang and   
         Jörg M. Haake and   
             Jessica Rubart and   
               Daniel A. Tietze   Hypermedia-based support for cooperative
                                  learning of process knowledge  . . . . . 357--379
             Samuli Pekkola and   
              Mike Robinson and   
             Jonni Korhonen and   
                Saku Hujala and   
                  Tero Toivonen   Multimedia application to support
                                  distance learning and other social
                                  interactions in real-time  . . . . . . . 381--399
          Hans-Peter Dommel and   
       J. J. Garcia-Luna-Aceves   A coordination framework and
                                  architecture for Internet groupware  . . 401--427
       Stuart K. MacGlashan and   
              Malcolm J. Taylor   MUSiCAL: an object-oriented hypermedia
                                  data model for the reuse of museum
                                  information for computer-aided learning
                                  and the World-Wide Web . . . . . . . . . 429--453
                  Claude Ghaoui   Document icon bar for the support of
                                  authoring, learning and navigation on
                                  the Web: Usability issues  . . . . . . . 455--475


Journal of Network and Computer Applications
Volume 24, Number 1, January, 2001

             Uffe Kock Wiil and   
            Kenneth M. Anderson   Preface to `Hypermedia extensibility
                                  mechanisms and scripting languages'  . . 1--5
                 Uffe Kock Wiil   A framework for classifying
                                  extensibility mechanisms in hypermedia
                                  systems  . . . . . . . . . . . . . . . . 7--18
         Peter J. Nürnberg   Extensibility in component-based open
                                  hypermedia systems . . . . . . . . . . . 19--38
                  John Noll and   
                   Walt Scacchi   Specifying process-oriented hypertext
                                  for organizational computing . . . . . . 39--61
                  Serge Demeyer   Extensibility via a meta-level
                                  architecture . . . . . . . . . . . . . . 63--74
            Kenneth M. Anderson   The extensibility mechanisms of the
                                  Chimera open hypermedia system . . . . . 75--86

Journal of Network and Computer Applications
Volume 24, Number 2, April, 2001

              Gail-Joon Ahn and   
                    Kwangjo Kim   CONUGA: Constrained User-Group
                                  Assignment . . . . . . . . . . . . . . . 87--100
              Harri Klapuri and   
               Jarmo Takala and   
                 Jukka Saarinen   Implementing reactive closed-system
                                  specifications . . . . . . . . . . . . . 101--123
                   Guoyi Li and   
            Ian Li-Jin Thng and   
       Lawrence Wai Choong Wong   ABR services for overcoming misbehaving
                                  sources in a heterogeneous environment   125--149
          David Hua Min Tan and   
             Siu Cheung Hui and   
                 Chiew Tong Lau   Wireless messaging services for mobile
                                  users  . . . . . . . . . . . . . . . . . 151--166
              Igor Djurovic and   
           Srdjan Stankovic and   
                  Ioannis Pitas   Digital watermarking in the fractional
                                  Fourier transformation domain  . . . . . 167--173

Journal of Network and Computer Applications
Volume 24, Number 3, July, 2001

                  C. Bouras and   
             A. Philopoulos and   
                   Th. Tsiatsos   e-Learning through distributed virtual
                                  environments . . . . . . . . . . . . . . 175--199
               Duen-Ren Liu and   
               Yuh-Jaan Lin and   
             Chung-Min Chen and   
                   Ya-Wen Huang   Deployment of personalized e-catalogues:
                                  an agent-based framework integrated with
                                  XML metadata and user models . . . . . . 201--228
                 W. F. Poon and   
                       K. T. Lo   Design of a starvation-free storage
                                  system for a multicast video-on-demand
                                  system using a double-rate batching
                                  policy . . . . . . . . . . . . . . . . . 229--247
            Ming-Chung Tang and   
              Chun-Nun Chou and   
             Ching-Hui Tang and   
                  D. C. Pan and   
                  Wei-Kuan Shih   Exploiting GSM short message service for
                                  ubiquitous accessing . . . . . . . . . . 249--267
             Uffe Kock Wiil and   
             David L. Hicks and   
         Peter J. Nürnberg   Special Issue on `Structural Computing'  269--271

Journal of Network and Computer Applications
Volume 24, Number 4, October, 2001

                      Anonymous   Volume Contents  . . . . . . . . . . . . i--viii
               J. A. Lennon and   
                      H. Maurer   MUSLI: a hypermedia interface for
                                  dynamic, interactive, and symbolic
                                  communication  . . . . . . . . . . . . . 273--291
               J. A. Lennon and   
                      H. Maurer   Augmenting text and voice conversations
                                  with dynamic, interactive abstractions
                                  using P2P networking . . . . . . . . . . 293--306
                Nawel Sabri and   
                Chantal Taconet   A generic tool to federate WAN servers   307--331
          Rached N. Zantout and   
              Ahmed A. Guessoum   An automatic English--Arabic HTML page
                                  translation system . . . . . . . . . . . 333--357


Journal of Network and Computer Applications
Volume 25, Number 1, January, 2002

               P. C. Saxena and   
            D. R. Choudhury and   
                 G. Gabrani and   
                   S. Gupta and   
                M. Bhardwaj and   
                      M. Chopra   A heuristic approach to resource
                                  locations in broadband networks  . . . . 1--35
                 M. Kouadio and   
                       U. Pooch   Technology on social issues of
                                  videoconferencing on the Internet: a
                                  survey . . . . . . . . . . . . . . . . . 37--56
             Yoon-Jung Rhee and   
               Eun-Sil Hyun and   
                    Tai-Yun Kim   Connection management for QoS service on
                                  the Web  . . . . . . . . . . . . . . . . 57--68

Journal of Network and Computer Applications
Volume 25, Number 2, April, 2002

                Heejin Jang and   
                   Sangwook Kim   Intruder tracing through dynamic
                                  extension of a security domain . . . . . 69--91
                 Chun-I Fan and   
                 Chin-Laung Lei   An unlinkably divisible and intention
                                  attachable ticket scheme for runoff
                                  elections  . . . . . . . . . . . . . . . 93--107
            Waleed E. Farag and   
            Hussein Abdel-Wahab   A new paradigm for analysis of MPEG
                                  compressed videos  . . . . . . . . . . . 109--127
                  T. Morris and   
               P. Blenkhorn and   
                   Farhan Zaidi   Blink detection for real-time eye
                                  tracking . . . . . . . . . . . . . . . . 129--143
                Bu-Sung Lee and   
              Chai-Kiat Yeo and   
                      Ruijin Fu   Hybrid quality adaptation mechanism for
                                  layered multicast over the Internet  . . 145--159

Journal of Network and Computer Applications
Volume 25, Number 3, July, 2002

            Chih-Yung Chang and   
                   Shin-Chih Tu   Active route-maintenance protocol for
                                  signal-based communication path in ad
                                  hoc networks . . . . . . . . . . . . . . 161--177
         Nischal M. Piratla and   
            Anura P. Jayasumana   A neural network based real-time gaze
                                  tracker  . . . . . . . . . . . . . . . . 179--196
                Anita Behle and   
           Michael Kirchhof and   
               Manfred Nagl and   
                    Ralf Welter   Retrieval of software components using a
                                  distributed web system . . . . . . . . . 197--222
    Rudolf Hörmanseder and   
             Johann Murauer and   
   Jörg R. Mühlbacher   Managing data flow in a DAC supporting
                                  security system  . . . . . . . . . . . . 223--238

Journal of Network and Computer Applications
Volume 25, Number 4, October, 2002

                Fawzi Daoud and   
                Takahiko Nomura   Preface to `smart spaces'  . . . . . . . 239--242
            Daphne Economou and   
        William L. Mitchell and   
              Steve R. Pettifer   Problem driven CVE technology
                                  development  . . . . . . . . . . . . . . 243--262
                Takahiko Nomura   Design of `Ba' for successful Knowledge
                                  Management --- how enterprises should
                                  design the places of interaction to gain
                                  competitive advantage  . . . . . . . . . 263--278
           Masakatsu Kosuga and   
             Naoki Kirimoto and   
           Tatsuya Yamazaki and   
         Tomonori Nakanishi and   
          Masakazu Masuzaki and   
                  Kazuo Hasuike   A multimedia service composition scheme
                                  for ubiquitous networks  . . . . . . . . 279--293
          Christopher Maher and   
                Margaret Corbit   Creating genetic applications for
                                  informal science learning in multi-user
                                  virtual environments . . . . . . . . . . 295--308
               Tatsuya Yamazaki   QoS-based media retrieval for networked
                                  digital archives . . . . . . . . . . . . 309--317
  Stéphane Lo Presti and   
                Didier Bert and   
                   Andrzej Duda   TAO: Temporal Algebraic Operators for
                                  modeling multimedia presentations  . . . 319--342


Journal of Network and Computer Applications
Volume 26, Number 1, January, 2003

             Hilde van der Togt   Publisher's Note . . . . . . . . . . . . 1--2
               Uffe K. Wiil and   
     Peter J. Nürnberg and   
                 David L. Hicks   Structural computing: research
                                  directions, systems and issues . . . . . 3--9
     Peter J. Nürnberg and   
         Monica M. C. Schraefel   Relationships among structural computing
                                  and other fields . . . . . . . . . . . . 11--26
             David L. Hicks and   
                   Uffe K. Wiil   Searching for revolution in structural
                                  computing  . . . . . . . . . . . . . . . 27--45
        Kenneth M. Anderson and   
          Susanne A. Sherba and   
           William Van Lepthien   Structural templates and
                                  transformations: the Themis structural
                                  computing environment  . . . . . . . . . 47--71
                   Weigang Wang   Visualizing and interacting with
                                  hypermedia-based process-centric
                                  enterprise models  . . . . . . . . . . . 73--93
               David E. Millard   Discussions at the data border: from
                                  generalised hypertext to structural
                                  computing  . . . . . . . . . . . . . . . 95--114
               Uffe K. Wiil and   
                 Samir Tata and   
                 David L. Hicks   Cooperation services in the Construct
                                  structural computing environment . . . . 115--137
         Manolis Tzagarakis and   
         Dimitris Avramidis and   
        Maria Kyriakopoulou and   
     Monica M. C. Schraefel and   
            Michalis Vaitis and   
       Dimitris Christodoulakis   Structuring primitives in the
                                  Callimachus component-based open
                                  hypermedia system  . . . . . . . . . . . 139--162
                      Anonymous   Calendar . . . . . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 26, Number 2, April 1, 2003

             B. Prabhakaran and   
                 Yuguang Tu and   
                         Yin Wu   Experiences with an object-level
                                  scalable web framework . . . . . . . . . 163--196
                 K. Komathy and   
            V. Ramachandran and   
                P. Vivekanandan   Security for XML messaging services ---
                                  a component-based approach . . . . . . . 197--211
               Gareth Evans and   
                 Paul Blenkhorn   Architectures of assistive software
                                  applications for Windows-based computers 213--228

Journal of Network and Computer Applications
Volume 26, Number 3, 2003

                    M. Zaki and   
              M. G. Darwish and   
                       G. Osman   GBF: a grammar based filter for Internet
                                  applications . . . . . . . . . . . . . . 229--257
         Nikitas M. Sgouros and   
          Stelios Gerogiannakis   Robot teleoperation environments
                                  featuring WAP-based wireless devices . . 259--271
                  C. K. Yeo and   
                  B. S. Lee and   
                       M. H. Er   A framework for multicast video
                                  streaming over IP networks . . . . . . . 273--289

Journal of Network and Computer Applications
Volume 26, Number 4, November, 2003

                      Anonymous   Index to volume 26 . . . . . . . . . . . III--IV
           Ching-Lung Chang and   
                  Kuo-Sheng Hsu   Design and implementation of MP3-music
                                  on demand system using streaming
                                  technology . . . . . . . . . . . . . . . 291--321
                 Li Chunlin and   
                      Li Layuan   Apply agent to build grid service
                                  management . . . . . . . . . . . . . . . 323--340


Journal of Network and Computer Applications
Volume 27, Number 1, January, 2004

              Jasmine Banks and   
         Geoffery Ericksson and   
              Kevin Burrage and   
           Peter Yellowlees and   
               Sean Ivermee and   
                Jennifer Tichon   Constructing the hallucinations of
                                  psychosis in Virtual Reality . . . . . . 1--11
               Wassim Itani and   
                   Ayman Kayssi   J2ME application-layer end-to-end
                                  security for m-commerce  . . . . . . . . 13--32
               Duen-Ren Liu and   
                Tzyy-Feng Hwang   An agent-based approach to flexible
                                  commerce in intermediary-centric
                                  electronic markets . . . . . . . . . . . 33--48
               Asrar Sheikh and   
                    Tao Wan and   
                 Zaki Alakhdhar   A unified approach to analyze multiple
                                  access protocols for buffered finite
                                  users  . . . . . . . . . . . . . . . . . 49--76

Journal of Network and Computer Applications
Volume 27, Number 2, April, 2004

                  Heng Wang and   
                   Jie Fang and   
                   Hua Wang and   
                     Ya-Min Sun   TSDLMRA: an efficient multicast routing
                                  algorithm based on Tabu search . . . . . 77--90
                  C. Bouras and   
                   Th. Tsiatsos   Distributed virtual reality: building a
                                  multi-user layer for the EVE Platform    91--111
                G. A. Aderounmu   Performance comparison of remote
                                  procedure calling and mobile agent
                                  approach to control and data transfer in
                                  distributed computing environment  . . . 113--129

Journal of Network and Computer Applications
Volume 27, Number 3, August, 2004

            A. U. H. Sheikh and   
                     T. Wan and   
            S. Z. Alakhdhar and   
              I. Lambadaris and   
               M. Devetsikiotis   Performance analysis of buffered R-ALOHA
                                  systems using tagged user approach . . . 131--150
                   Wen-Lin Yang   A comparison of two optimal approaches
                                  for the MCOP problem . . . . . . . . . . 151--162
                Denis Helic and   
             Hermann Maurer and   
                 Nick Scerbakov   Knowledge transfer processes in a modern
                                  WBT system . . . . . . . . . . . . . . . 163--190

Journal of Network and Computer Applications
Volume 27, Number 4, November, 2004

                      Anonymous   Index  . . . . . . . . . . . . . . . . . III--IV
                Wei-Bin Lee and   
                Kuan-Chieh Liao   Constructing identity-based
                                  cryptosystems for discrete logarithm
                                  based cryptosystems  . . . . . . . . . . 191--199
                    M. Zaki and   
                  Tarek S. Sobh   A cooperative agent-based model for
                                  active security systems  . . . . . . . . 201--220
         Sergio A. Velastin and   
                   Benny Lo and   
                        Jie Sun   A flexible communications protocol for a
                                  distributed surveillance system  . . . . 221--253


Journal of Network and Computer Applications
Volume 28, Number 1, January, 2005

                     Tao Gu and   
             Hung Keng Pung and   
                  Da Qing Zhang   A service-oriented middleware for
                                  building context-aware services  . . . . 1--18
                   M. Khedr and   
                    A. Karmouch   ACAI: agent-based context-aware
                                  infrastructure for spontaneous
                                  applications . . . . . . . . . . . . . . 19--44
                  Ismail Erturk   A new method for transferring CAN
                                  messages using wireless ATM  . . . . . . 45--56
                Huamin Chen and   
              Prasant Mohapatra   Using service brokers for accessing
                                  backend servers for web applications . . 57--74

Journal of Network and Computer Applications
Volume 28, Number 2, April, 2005

                      Anonymous   Announcement . . . . . . . . . . . . . . I
                      Anonymous   Announcement . . . . . . . . . . . . . . II
                      Anonymous   Preface  . . . . . . . . . . . . . . . . 75--76
             Reginald L. Walker   Hierarchical task topology for
                                  retrieving information from within a
                                  simulated information ecosystem  . . . . 77--96
              A. Rungsawang and   
             N. Angkawattanawit   Learnable topic-specific web crawler . . 97--114
            Wataru Sunayama and   
               Masahiko Yachida   Panoramic View System for extracting key
                                  sentences based on viewpoints and
                                  application to a search engine . . . . . 115--127
              Mark P. Sinka and   
                 David W. Corne   The BankSearch web document dataset:
                                  investigating unsupervised clustering
                                  and category similarity  . . . . . . . . 129--146
               Xiaozhe Wang and   
              Ajith Abraham and   
                  Kate A. Smith   Intelligent web traffic mining and
                                  analysis . . . . . . . . . . . . . . . . 147--165
         Srinivas Mukkamala and   
             Andrew H. Sung and   
                  Ajith Abraham   Intrusion detection using an ensemble of
                                  intelligent paradigms  . . . . . . . . . 167--182

Journal of Network and Computer Applications
Volume 28, Number 3, August, 2005

           Elhadi Shakshuki and   
               Zhonghai Luo and   
                      Jing Gong   An agent-based approach to security
                                  service  . . . . . . . . . . . . . . . . 183--208
                 Ch. Bouras and   
                  A. Gkamas and   
                    I. Nave and   
                 D. Primpas and   
                   A. Shani and   
                  O. Sheory and   
                  K. Stamos and   
                      Y. Tzruya   Application on demand system over the
                                  Internet . . . . . . . . . . . . . . . . 209--232
                     Tao Gu and   
             Hung Keng Pung and   
                  Jian Kang Yao   Towards a flexible service discovery . . 233--248

Journal of Network and Computer Applications
Volume 28, Number 4, November, 2005

                      Anonymous   Index to Volume 28 . . . . . . . . . . . III--IV
                D. Di Sorte and   
                       G. Reali   Pricing and brokering services over
                                  interconnected IP networks . . . . . . . 249--283
            Christos Bouras and   
               Afrodite Sevasti   Service level agreements for
                                  DiffServ-based services' provisioning    285--302


Journal of Network and Computer Applications
Volume 29, Number 1, January, 2006

              Bing-Yi Zhang and   
                     Ya-Min Sun   Fractional alpha stable network traffic
                                  model and its application in QoS routing 1--10
      Elizabeth A. Thompson and   
              Eric Harmison and   
              Robert Carper and   
              Robert Martin and   
                     Jim Isaacs   Robot teleoperation featuring
                                  commercially available wireless network
                                  cards  . . . . . . . . . . . . . . . . . 11--24
   Leonardo Bidese de Pinho and   
         Claudio Luis de Amorim   Assessing the efficiency of stream reuse
                                  techniques in P2P video-on-demand
                                  systems  . . . . . . . . . . . . . . . . 25--45
                   N. Zhang and   
                     Q. Shi and   
                 M. Merabti and   
                     R. Askwith   Practical and efficient fair document
                                  exchange over networks . . . . . . . . . 46--61
                  T. Morris and   
                     V. Chauhan   Facial feature tracking for cursor
                                  control  . . . . . . . . . . . . . . . . 62--80
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 29, Number 2--3, August / April, 2005/2006

            Nikhil Ichalkaranje   Editorial  . . . . . . . . . . . . . . . 81--82
           Yukiko I. Nakano and   
         Toshihiro Murayama and   
            Masashi Okamoto and   
           Daisuke Kawahara and   
                    Qing Li and   
            Sadao Kurohashi and   
                Toyoaki Nishida   Cards-to-presentation on the web:
                                  generating multimedia contents featuring
                                  agent animations . . . . . . . . . . . . 83--104
             Pierre Urlings and   
           Christos Sioutis and   
              Jeff Tweedale and   
        Nikhil Ichalkaranje and   
                    Lakhmi Jain   A future framework for interfacing BDI
                                  agents in a real-time teaming
                                  environment  . . . . . . . . . . . . . . 105--123
        E. V. Krishnamurthy and   
                   V. K. Murthy   Distributed agent paradigm for soft and
                                  hard computation . . . . . . . . . . . . 124--146
                 Colin Fyfe and   
                    Lakhmi Jain   Teams of intelligent agents which learn
                                  using artificial immune systems  . . . . 147--159
                  J. Jarvis and   
          R. Rönnquist and   
               D. McFarlane and   
                        L. Jain   A team-based holonic approach to robotic
                                  assembly cell control  . . . . . . . . . 160--176
     Anders I. Mòrch and   
             Jan A. Dolonen and   
      Jan Eirik B. Nævdal   An evolutionary approach to prototyping
                                  pedagogical agents: from simulation to
                                  integrated system  . . . . . . . . . . . 177--199
                    Weiqin Chen   Supporting teachers' intervention in
                                  collaborative knowledge building . . . . 200--215
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 29, Number 4, November, 2006

             A. A. Akintola and   
            G. A. Aderounmu and   
                   M. O. Adigun   Performance analysis of double buffer
                                  technique (DBT) model for mobility
                                  support in wireless IP networks  . . . . 217--234
                Shih-Lin Wu and   
              Sui Fan-Jiang and   
                   Zi-Tsan Chou   An efficient quality-of-service MAC
                                  protocol for infrastructure WLANs  . . . 235--261
              Hea-Sook Park and   
                  Doo-Kwon Baik   A study for control of client value
                                  using cluster analysis . . . . . . . . . 262--276
                  Susanne Loidl   Towards pervasive learning:
                                  WeLearn.Mobile. A CPS package viewer for
                                  handhelds  . . . . . . . . . . . . . . . 277--293
                   Peng Liu and   
                   Hai Wang and   
                     Lunquan Li   Real-time data attack isolation for
                                  commercial database applications . . . . 294--320
           Crescencio Bravo and   
   Miguel Á. Redondo and   
              Manuel Ortega and   
              M. Felisa Verdejo   Collaborative distributed environments
                                  for learning design tasks by means of
                                  modelling and simulation . . . . . . . . 321--342
                M. Avvenuti and   
                     A. Vecchio   Application-level network emulation: the
                                  EmuSocket toolkit  . . . . . . . . . . . 343--360
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2


Journal of Network and Computer Applications
Volume 30, Number 1, January, 2007

              Ajith Abraham and   
                 Kate Smith and   
                  Ravi Jain and   
                    Lakhmi Jain   Network and information security: a
                                  computational intelligence approach:
                                  Special Issue of Journal of Network and
                                  Computer Applications  . . . . . . . . . 1--3
            Feng-Hsing Wang and   
             Lakhmi C. Jain and   
                Jeng-Shyang Pan   VQ-based watermarking scheme with
                                  genetic codebook partition . . . . . . . 4--23
                Tai-Wen Yue and   
                  Suchen Chiang   The semipublic encryption for visual
                                  cryptography using Q'tron neural
                                  networks . . . . . . . . . . . . . . . . 24--41
              Gail-Joon Ahn and   
            Badrinath Mohan and   
                 Seng-Phil Hong   Towards secure information sharing using
                                  role-based delegation  . . . . . . . . . 42--59
                 Yihua Liao and   
              V. Rao Vemuri and   
                Alejandro Pasos   Adaptive anomaly detection with evolving
                                  connectionist systems  . . . . . . . . . 60--80
              Ajith Abraham and   
                  Ravi Jain and   
             Johnson Thomas and   
                  Sang Yong Han   D-SCIDS: Distributed soft computing
                                  intrusion detection system . . . . . . . 81--98
          Tansel Özyer and   
                Reda Alhajj and   
                     Ken Barker   Intrusion detection by integrating
                                  boosting genetic fuzzy classifier and
                                  data mining criteria for rule
                                  pre-screening  . . . . . . . . . . . . . 99--113
     Sandhya Peddabachigari and   
              Ajith Abraham and   
               Crina Grosan and   
                 Johnson Thomas   Modeling intrusion detection system
                                  using hybrid intelligent systems . . . . 114--132
                  Ali El Kateeb   High-speed routers design using data
                                  stream distributor unit  . . . . . . . . 133--144
              Chen Hongsong and   
                Ji Zhenzhou and   
                Hu Mingzeng and   
              Fu Zhongchuan and   
                 Jiang Ruixiang   Design and performance evaluation of a
                                  multi-agent-based dynamic lifetime
                                  security scheme for AODV routing
                                  protocol . . . . . . . . . . . . . . . . 145--166
          Khong Neng Choong and   
                  B. M. Ali and   
                 V. Prakash and   
                  Yoke Chek Yee   The case for a dynamic proxy framework
                                  with voluntary/incentive-based client
                                  hosting scheme . . . . . . . . . . . . . 167--185
           Hojjat Jafarpour and   
             Nasser Yazdani and   
             Navid Bazzaz-zadeh   A scalable group communication mechanism
                                  for mobile agents  . . . . . . . . . . . 186--208
              V. Kalogeraki and   
       D. Zeinalipour-Yazti and   
               D. Gunopulos and   
                       A. Delis   Distributed middleware architectures for
                                  scalable media services  . . . . . . . . 209--243
                 Tainchi Lu and   
                   Chinghao Hsu   Mobile agents for information retrieval
                                  in hybrid simulation environment . . . . 244--264
                    Hui Guo and   
                Guobin Shen and   
              Zhiguang Wang and   
                     Shipeng Li   Optimized streaming media proxy and its
                                  applications . . . . . . . . . . . . . . 265--281
                    Lei Guo and   
                Hongfang Yu and   
                       Lemin Li   Dynamic survivable algorithm for meshed
                                  WDM optical networks . . . . . . . . . . 282--295
             Jenq-Shiou Leu and   
                Yuan-Po Chi and   
                  Wei-Kuan Shih   Design and implementation of Blog
                                  Rendering and Accessing INstantly system
                                  (BRAINS) . . . . . . . . . . . . . . . . 296--307
                 Lijun Qian and   
                  Ning Song and   
                   Xiangfang Li   Detection of wormhole attacks in
                                  multi-path routed wireless ad hoc
                                  networks: a statistical analysis
                                  approach . . . . . . . . . . . . . . . . 308--330
             Kwang Sik Shin and   
                Jin Ha Jung and   
            Jin Young Cheon and   
                 Sang Bang Choi   Real-time network monitoring scheme
                                  based on SNMP for dynamic information    331--353
                Xiaobo Zhou and   
                Jianbin Wei and   
                 Cheng-Zhong Xu   Quality-of-service differentiation on
                                  the Internet: a taxonomy . . . . . . . . 354--383
                 Suneuy Kim and   
                   Chita R. Das   An analytical model for interval caching
                                  in interactive video servers . . . . . . 384--413
           M. Saniee Abadeh and   
                  J. Habibi and   
                       C. Lucas   Intrusion detection using a fuzzy
                                  genetics-based learning algorithm  . . . 414--428
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 30, Number 2, April, 2007

                  Rongxi He and   
                    Bin Lin and   
                       Lemin Li   Dynamic service-level-agreement aware
                                  shared-path protection in WDM mesh
                                  networks . . . . . . . . . . . . . . . . 429--444
                 B. Stephen and   
               L. Petropoulakis   The design and implementation of an
                                  agent-based framework for acceptable
                                  usage policy monitoring and enforcement  445--465
                 Wang Liang and   
                Guo Yi-Ping and   
                      Fang Ming   Web search engine based on DNS . . . . . 466--478
                  M. Esteve and   
                C. E. Palau and   
 J. Martínez-Nohales and   
                      B. Molina   A video streaming application for urban
                                  traffic management . . . . . . . . . . . 479--498
            M. Can Filibeli and   
              Oznur Ozkasap and   
               M. Reha Civanlar   Embedded web server-based home appliance
                                  networks . . . . . . . . . . . . . . . . 499--514
                Xiaobo Zhou and   
                 Cheng-Zhong Xu   Efficient algorithms of video
                                  replication and placement on a cluster
                                  of streaming servers . . . . . . . . . . 515--540
              Kenneth J. Turner   Representing and analysing composed web
                                  services using \sc Cress . . . . . . . . 541--562
            Bouras Christos and   
           Kounenis Giorgos and   
              Misedakis Ioannis   A web content manipulation technique
                                  based on page Fragmentation  . . . . . . 563--585
          Siti Z. Z. Abidin and   
                   Min Chen and   
                  Phil W. Grant   Designing interaction protocols using
                                  noughts and crosses type games . . . . . 586--613
         Alejandro Quintero and   
                   Da Yu Li and   
                  Harold Castro   A location routing protocol based on
                                  smart antennas for ad hoc networks . . . 614--636
                     Y. Bai and   
                      M. R. Ito   A new technique for minimizing network
                                  loss from users' perspective . . . . . . 637--649
                    Lei Guo and   
                    Jin Cao and   
                Hongfang Yu and   
                       Lemin Li   A new shared-risk link groups
                                  (SRLG)-disjoint path provisioning with
                                  shared protection in WDM optical
                                  networks . . . . . . . . . . . . . . . . 650--661
            Chin-Chen Chang and   
              Chih-Yang Lin and   
                   Keng-Chu Lin   Simple efficient mutual anonymity
                                  protocols for peer-to-peer network based
                                  on primitive roots . . . . . . . . . . . 662--676
                    Jin Cao and   
                    Lei Guo and   
                Hongfang Yu and   
                       Lemin Li   A novel recursive shared segment
                                  protection algorithm in survivable WDM
                                  networks . . . . . . . . . . . . . . . . 677--694
               Rongping Lin and   
                 Sheng Wang and   
                       Lemin Li   Protections for multicast session in WDM
                                  optical networks under reliability
                                  constraints  . . . . . . . . . . . . . . 695--705
                Chan-Ho Min and   
                      Sehun Kim   On-demand utility-based power control
                                  routing for energy-aware optimization in
                                  mobile ad hoc networks . . . . . . . . . 706--727
                Gwo-Jong Yu and   
            Chih-Yung Chang and   
             Kuei-Ping Shih and   
                 Shih-Chieh Lee   Relay reduction and disjoint routes
                                  construction for scatternet over
                                  Bluetooth radio system . . . . . . . . . 728--749
             Kwang-Sik Shin and   
                Jin-Ha Jung and   
                Wan-Oh Yoon and   
                 Sang-Bang Choi   P2P transfer of partial stream in
                                  multimedia multicast . . . . . . . . . . 750--774
                   Yiqun Xu and   
             Luigi Logrippo and   
              Jacques Sincennes   Detecting feature interactions in CPL    775--799
Ibrahim Özçelik and   
              Hüseyin Ekiz   Building an interconnection between
                                  PROFIBUS and ATM networks  . . . . . . . 800--817
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 30, Number 3, August, 2007

                Xiaobo Zhou and   
                 Cheng-Zhong Xu   Distributed denial-of-service and
                                  intrusion detection  . . . . . . . . . . 819--822
               Shigang Chen and   
                  Yong Tang and   
                    Wenliang Du   Stateful DDoS attacks and targeted
                                  filtering  . . . . . . . . . . . . . . . 823--840
          Matthias Bossardt and   
    Thomas Dübendorfer and   
              Bernhard Plattner   Enhanced Internet security by a
                                  distributed traffic control service
                                  based on traffic ownership . . . . . . . 841--857
          Vasilios A. Siris and   
                Ilias Stavrakis   Provider-based deterministic packet
                                  marking against distributed DoS attacks  858--876
                   Tao Peng and   
         Christopher Leckie and   
         Kotagiri Ramamohanarao   Information sharing for distributed
                                  intrusion detection systems  . . . . . . 877--899
       Gabriel López and   
       Oscar Cánovas and   
    Antonio F. Gómez and   
Jesús D. Jiménez and   
            Rafael Marín   A network access control approach based
                                  on the AAA architecture and
                                  authorization attributes . . . . . . . . 900--919
                   Celia Li and   
               Cungang Yang and   
                 Richard Cheung   Key management for role hierarchy in
                                  distributed systems  . . . . . . . . . . 920--936
                    Bing Wu and   
                     Jie Wu and   
       Eduardo B. Fernandez and   
             Mohammad Ilyas and   
              Spyros Magliveras   Secure and efficient key management in
                                  mobile ad hoc networks . . . . . . . . . 937--954
         George D. Magoulas and   
                  George Ghinea   Intelligence-based adaptation for
                                  ubiquitous multimedia communications . . 955--957
            Dietmar Jannach and   
                  Klaus Leopold   Knowledge-based multimedia adaptation
                                  for ubiquitous multimedia consumption    958--982
             Nicola Cranley and   
               Philip Perry and   
                    Liam Murphy   Dynamic content-based adaptation of
                                  streamed multimedia  . . . . . . . . . . 983--1006
              M. J. O'Grady and   
            G. M. P. O'Hare and   
                    C. Donaghey   Delivering adaptivity through
                                  context-awareness  . . . . . . . . . . . 1007--1033
         Vincent Charvillat and   
               Romulus Grigoras   Reinforcement learning for dynamic
                                  multimedia adaptation  . . . . . . . . . 1034--1058
               Johan Bollen and   
          Michael L. Nelson and   
               Gary Geisler and   
                  Raquel Araujo   Usage derived recommendations for a
                                  video digital library  . . . . . . . . . 1059--1083
       Gloria Phillips-Wren and   
               Anders Morch and   
              Jeff Tweedale and   
            Nikhil Ichalkaranje   Innovations in agent collaboration,
                                  cooperation and Teaming, Part 2  . . . . 1085--1088
                J. Tweedale and   
            N. Ichalkaranje and   
                 C. Sioutis and   
                  B. Jarvis and   
                 A. Consoli and   
               G. Phillips-Wren   Innovations in multi-agent systems . . . 1089--1115
                Lin Padgham and   
                        Wei Liu   Internet collaboration and service
                                  composition as a loose form of teamwork  1116--1135
       Antonella Di Stefano and   
        Giuseppe Pappalardo and   
            Corrado Santoro and   
            Emiliano Tramontana   A framework for the design and automated
                                  implementation of communication aspects
                                  in multi-agent systems . . . . . . . . . 1136--1152
                     Wei Xu and   
               Jiannong Cao and   
                Beihong Jin and   
                    Jing Li and   
                    Liang Zhang   GCS-MA: a group communication system for
                                  mobile agents  . . . . . . . . . . . . . 1153--1172
                Tom Wanyama and   
           Behrouz Homayoun Far   A protocol for multi-agent negotiation
                                  in a group-choice decision making
                                  process  . . . . . . . . . . . . . . . . 1173--1195
         Gerhard Weiß and   
           Matthias Nickles and   
           Michael Rovatsos and   
                  Felix Fischer   Specifying the intertwining of
                                  cooperation and autonomy in agent-based
                                  systems  . . . . . . . . . . . . . . . . 1196--1215
                Justin Zhan and   
                Stan Matwin and   
                     LiWu Chang   Privacy-preserving collaborative
                                  association rule mining  . . . . . . . . 1216--1227
        Abdelhamid Ouardani and   
              Samuel Pierre and   
               Hanifa Boucheneb   A security protocol for mobile agents
                                  based upon the cooperation of sedentary
                                  agents . . . . . . . . . . . . . . . . . 1228--1243
         Ruth Aguilar-Ponce and   
                Ashok Kumar and   
J. Luis Tecpanecatl-Xihuitl and   
                  Magdy Bayoumi   A network of sensor-based framework for
                                  automated visual surveillance  . . . . . 1244--1271
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 30, Number 4, November, 2007

                   Xiangjian He   Editorial  . . . . . . . . . . . . . . . 1273--1274
            Shinichi Suzuki and   
             Yasushi Shinjo and   
             Toshio Hirotsu and   
                 Kozo Itano and   
                  Kazuhiko Kato   Capability-based egress network access
                                  control by using DNS server  . . . . . . 1275--1282
                   Yanni Wu and   
                  Kuo Zhang and   
                Xiaoge Wang and   
                    Jinlan Tian   Extending metadata with scenarios in
                                  adaptive distributed system  . . . . . . 1283--1294
            M. J. Callaghan and   
                  J. Harkin and   
                E. McColgan and   
            T. M. McGinnity and   
                  L. P. Maguire   Client-server architecture for
                                  collaborative remote experimentation . . 1295--1308
           Carolyn McGregor and   
               Bruce Kneale and   
                     Mark Tracy   On-demand Virtual Neonatal Intensive
                                  Care units supporting rural, remote and
                                  urban healthcare with Bush Babies
                                  Broadband  . . . . . . . . . . . . . . . 1309--1323
                Wenjing Jia and   
             Huaifeng Zhang and   
                   Xiangjian He   Region-based license plate detection . . 1324--1333
               Hatice Gunes and   
               Massimo Piccardi   Bi-modal emotion recognition from
                                  expressive face and body gestures  . . . 1334--1345
                 Junjun Xia and   
                     Lin Ni and   
                        Y. Miao   A new digital implementation of ridgelet
                                  transform for images of dyadic length    1346--1355
              Donn Morrison and   
           Liyanage C. De Silva   Voting ensembles for spoken affect
                                  classification . . . . . . . . . . . . . 1356--1365
              Ben-Nian Wang and   
                   Yang Gao and   
             Zhao-Qian Chen and   
               Jun-Yuan Xie and   
                    Shi-Fu Chen   A two-layered multi-agent reinforcement
                                  learning model and algorithm . . . . . . 1366--1376
               Jung-San Lee and   
                Chin-Chen Chang   Secure communications for cluster-based
                                  ad hoc networks using node identities    1377--1396
    Christopher J. Martinez and   
               Wei-Ming Lin and   
                  Parimal Patel   Optimal XOR hashing for non-uniformly
                                  distributed address lookup in computer
                                  networks . . . . . . . . . . . . . . . . 1397--1427
             Bart Duysburgh and   
            Thijs Lambrecht and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Design and analysis of a stable set-up
                                  protocol for transcoding multicast trees
                                  in active networks . . . . . . . . . . . 1428--1444
             S. A. Al-Talib and   
                  B. M. Ali and   
                  S. Khatun and   
                 S. Subramaniam   Improving the multicast state
                                  scalability in Internet routers by
                                  integrating hash algorithm with
                                  recursive unicast  . . . . . . . . . . . 1445--1454
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 31, Number 1, January, 2008

              Hsu-Yang Kung and   
              Hao-Hsiang Ku and   
                   Che-I Wu and   
                   Ching-Yu Lin   Intelligent and situation-aware
                                  pervasive system to support debris-flow
                                  disaster prediction and alerting in
                                  Taiwan . . . . . . . . . . . . . . . . . 1--18
               Mosaab Daoud and   
               Qusay H. Mahmoud   Monte Carlo simulation-based algorithms
                                  for estimating the reliability of mobile
                                  agent-based systems  . . . . . . . . . . 19--31
                       Xiao Qin   Performance comparisons of load
                                  balancing algorithms for I/O-intensive
                                  workloads on clusters  . . . . . . . . . 32--46
            Ming-Tsung Chen and   
               B. M. T. Lin and   
             Shian-Shyong Tseng   Multicast routing and wavelength
                                  assignment with delay constraints in WDM
                                  networks with heterogeneous capabilities 47--65
            Tushar M. Raste and   
                 D. B. Kulkarni   Design and implementation scheme for
                                  deploying IPv4 over IPv6 tunnel  . . . . 66--72
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Journal of Network and Computer Applications
Volume 31, Number 2, April, 2008

            Christos Makris and   
          Athanasios Tsakalidis   Trends in peer to peer and service
                                  oriented computing . . . . . . . . . . . 73--74
              Sinuhe Arroyo and   
       Miguel-Angel Sicilia and   
José-Manuel López-Cobo   Patterns of message interchange in
                                  decoupled hypermedia systems . . . . . . 75--92
                 Serena Pastore   The service discovery methods issue: a
                                  web services UDDI specification
                                  framework integrated in a grid
                                  environment  . . . . . . . . . . . . . . 93--107
    Vassiliki Diamadopoulou and   
            Christos Makris and   
             Yannis Panagis and   
          Evangelos Sakkopoulos   Techniques to support Web Service
                                  selection and consumption with QoS
                                  characteristics  . . . . . . . . . . . . 108--130
                   K. Votis and   
                C. Alexakos and   
             B. Vassiliadis and   
               S. Likothanassis   An ontologically principled
                                  service-oriented architecture for
                                  managing distributed e-government nodes  131--148
                 S. Sioutas and   
             E. Sakkopoulos and   
                 L. Drossos and   
                 S. Sirmakessis   Balanced distributed web service lookup
                                  system . . . . . . . . . . . . . . . . . 149--162
      Sampath N. Ranasinghe and   
         Vasilis Friderikos and   
                  Hamid Aghvami   Dynamic proxy assisted mobility support
                                  for third generation peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 163--178
  Dimitris N. Kanellopoulos and   
     Alkiviadis A. Panagopoulos   Exploiting tourism destinations'
                                  knowledge in an RDF-based P2P network    179--200
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 31, Number 3, August, 2008

                Gwo-Jong Yu and   
                Chih-Yung Chang   Congestion control of Bluetooth radio
                                  system by piconet restructuring  . . . . 201--223
                Dhouha Ayed and   
            Chantal Taconet and   
                Guy Bernard and   
                Yolande Berbers   CADeComp: Context-aware deployment of
                                  component-based applications . . . . . . 224--257
                 Li Chunlin and   
                      Li Layuan   Cross-layer optimization policy for QoS
                                  scheduling in computational grid . . . . 258--284
                   Lin Chen and   
             Changjun Jiang and   
                      Junjie Li   VGITS: ITS based on intervehicle
                                  communication networks and grid
                                  technology . . . . . . . . . . . . . . . 285--302
                 Luhua Liao and   
                   Lemin Li and   
                     Sheng Wang   Multicast protection scheme in
                                  survivable WDM optical networks  . . . . 303--316
               James Lembke and   
                 Byung Kyu Choi   Edge-limited scalable QoS flow set-up    317--337
             Ferhat Khendek and   
                     Tong Zheng   Modeling and analysis of value added
                                  services using message sequence charts   338--356
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 31, Number 4, November, 2008

              Javier Varona and   
       Cristina Manresa-Yee and   
           Francisco J. Perales   Hands-free vision-based interface for
                                  computer accessibility . . . . . . . . . 357--374
                Hongjun Liu and   
                   Ping Luo and   
                   Daoshun Wang   A scalable authentication model based on
                                  public keys  . . . . . . . . . . . . . . 375--386
               Wen-Hwa Liao and   
                Yucheng Kao and   
                 Chien-Ming Fan   Data aggregation in wireless sensor
                                  networks using ant colony algorithm  . . 387--401
       Vidhyacharan Bhaskar and   
              Patrick Lallement   Activity routing in a distributed supply
                                  chain: Performance evaluation with two
                                  inputs . . . . . . . . . . . . . . . . . 402--428
                 Bing Zheng and   
           Mohammed Atiquzzaman   A framework to determine bounds of
                                  maximum loss rate parameter of RED queue
                                  for next generation routers  . . . . . . 429--445
                 K. Komathy and   
                P. Narayanasamy   Trust-based evolutionary game model
                                  assisting AODV routing against
                                  selfishness  . . . . . . . . . . . . . . 446--471
                Hongjun Liu and   
                   Ping Luo and   
                   Daoshun Wang   A distributed expansible authentication
                                  model based on Kerberos  . . . . . . . . 472--486
           Carles Garrigues and   
               Sergi Robles and   
                   Joan Borrell   Securing dynamic itineraries for mobile
                                  agent applications . . . . . . . . . . . 487--508
                Haidar Safa and   
            Mohamad Chouman and   
              Hassan Artail and   
                   Marcel Karam   A collaborative defense mechanism
                                  against SYN flooding attacks in IP
                                  networks . . . . . . . . . . . . . . . . 509--534
         Prasan Kumar Sahoo and   
            Chih-Yung Chang and   
                Sheng-Wen Chang   Novel route maintenance protocols for
                                  the Bluetooth ad hoc network with
                                  mobility . . . . . . . . . . . . . . . . 535--558
                  Weili Han and   
               Xingdong Shi and   
                   Ronghua Chen   Process-context aware matchmaking for
                                  web service composition  . . . . . . . . 559--576
              G. Varaprasad and   
        R. S. D. Wahidabanu and   
                  P. Venkataram   An efficient resource allocation scheme
                                  for multimedia applications in MANET . . 577--584
                Eric Gamess and   
              Rina Surós   An upper bound model for TCP and UDP
                                  throughput in IPv4 and IPv6  . . . . . . 585--602
            Yiouli Kritikou and   
     Panagiotis Demestichas and   
        Evgenia Adamopoulou and   
   Konstantinos Demestichas and   
          Michael Theologou and   
                  Maria Paradia   User Profile Modeling in the context of
                                  web-based learning management systems    603--627
               Venet Osmani and   
 Sasitharan Balasubramaniam and   
                 Dmitri Botvich   Human activity recognition in pervasive
                                  health-care: Supporting efficient remote
                                  collaboration  . . . . . . . . . . . . . 628--655
                 P. Khadivi and   
                  S. Samavi and   
                     T. D. Todd   Multi-constraint QoS routing using a new
                                  single mixed metrics . . . . . . . . . . 656--676
             Beatriz Prieto and   
            Fernando Tricas and   
             Juan J. Merelo and   
               Antonio Mora and   
                 Alberto Prieto   Visualizing the evolution of a web-based
                                  social network . . . . . . . . . . . . . 677--698
      Mouhammd Al-Kasassbeh and   
                        Mo Adda   Analysis of mobile agents in network
                                  fault management . . . . . . . . . . . . 699--711
                 Janus S. Liang   The troubleshooting task implementation
                                  in automotive chassis using virtual
                                  interactive technique and
                                  knowledge-based approach . . . . . . . . 712--734
            Xiang-Yang Wang and   
                Pan-Pan Niu and   
                         Wei Qi   A new adaptive digital audio
                                  watermarking based on support vector
                                  machine  . . . . . . . . . . . . . . . . 735--749
        Hussein Abdel-Jaber and   
              Mike Woodward and   
               Fadi Thabtah and   
                   Amer Abu-Ali   Performance evaluation for DRED
                                  discrete-time queueing network
                                  analytical model . . . . . . . . . . . . 750--770
                  Y. C. Yee and   
               K. N. Choong and   
             Andy L. Y. Low and   
                      S. W. Tan   SIP-based proactive and adaptive
                                  mobility management framework for
                                  heterogeneous networks . . . . . . . . . 771--792
             Juan J. Samper and   
          Pedro A. Castillo and   
             Lourdes Araujo and   
               J. J. Merelo and   
 Óscar Cordón and   
                Fernando Tricas   NectaRSS, an intelligent RSS feed reader 793--806
               Wen-Hwa Liao and   
               Hsiao-Hsien Wang   An asynchronous MAC protocol for
                                  wireless sensor networks . . . . . . . . 807--820
              Jianjun Zhang and   
                   Ling Liu and   
        Lakshmish Ramaswamy and   
                      Calton Pu   PeerCast: Churn-resilient end system
                                  multicast on heterogeneous overlay
                                  networks . . . . . . . . . . . . . . . . 821--850
             Kazuya Odagiri and   
            Rihito Yaegashi and   
          Masaharu Tadauchi and   
                  Naohiro Ishii   Secure DACS Scheme . . . . . . . . . . . 851--861
              Javed I. Khan and   
                Sajid S. Shaikh   Computing in social networks with
                                  relationship algebra . . . . . . . . . . 862--878
                Ibrahim Ozcelik   Interconnection of CAN segments through
                                  IEEE 802.16 wireless MAN . . . . . . . . 879--890
           Bhuvan Urgaonkar and   
                Prashant Shenoy   Cataclysm: Scalable overload policing
                                  for Internet applications  . . . . . . . 891--920
                   K. Salah and   
                  P. Calyam and   
                   M. I. Buhari   Assessing readiness of IP networks to
                                  support desktop videoconferencing using
                                  OPNET  . . . . . . . . . . . . . . . . . 921--943
                 Haibin Cai and   
                    Fang Pu and   
               Runcai Huang and   
                     Qiying Cao   A novel ANN-based service selection
                                  model for ubiquitous computing
                                  environments . . . . . . . . . . . . . . 944--965
             Eleni Georgiou and   
        Marios D. Dikaiakos and   
            Athena Stassopoulou   On the properties of spam-advertised URL
                                  addresses  . . . . . . . . . . . . . . . 966--985
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 32, Number 1, January, 2009

              Tzu-Chi Huang and   
              Ce-Kuen Shieh and   
                    Yu-Ben Miao   Bottleneck Active Node Detouring for
                                  capsule-based active network . . . . . . 1--30
              Xiaohong Guan and   
                   Wei Wang and   
               Xiangliang Zhang   Fast intrusion detection based on a
                                  non-negative matrix factorization model  31--44
                      Di Wu and   
                    Ye Tian and   
                    Kam-Wing Ng   Resilient and efficient load balancing
                                  in distributed hash tables . . . . . . . 45--60
               JungYul Choi and   
                Jaebong Lee and   
               ShinJung Woo and   
                ByoungKwon Shim   An engineering approach to the design of
                                  a BcN control network  . . . . . . . . . 61--77
                Pete Davies and   
              Theodore Tryfonas   A lightweight web-based vulnerability
                                  scanner for small-scale computer network
                                  security assessment  . . . . . . . . . . 78--95
              Hassan Artail and   
               Manal Shihab and   
                    Haidar Safa   A distributed mobile database
                                  implementation on Pocket PC mobile
                                  devices communicating over Bluetooth . . 96--115
Konstantinos P. Demestichas and   
     Evgenia F. Adamopoulou and   
      John G. Markoulidakis and   
           Michael E. Theologou   Towards Anonymous Mobile Community
                                  services . . . . . . . . . . . . . . . . 116--134
          Giancarlo Fortino and   
          Carlo Mastroianni and   
                    Wilma Russo   A hierarchical control protocol for
                                  group-oriented playbacks supported by
                                  content distribution networks  . . . . . 135--157
                    Meng Yu and   
                   Peng Liu and   
                     Wanyu Zang   The implementation and evaluation of a
                                  recovery system for workflows  . . . . . 158--183
              Wade A. Fagen and   
    João W. Cangussu and   
                      Ram Dantu   A virtual environment for network
                                  testing  . . . . . . . . . . . . . . . . 184--214
      Chryssa A. Papagianni and   
       Nikolaos D. Tselikas and   
      Evangelos A. Kosmatos and   
     Stauros Papapanagiotou and   
            Iakovos S. Venieris   Performance evaluation study for
                                  QoS-aware triple play services over
                                  entry-level xDSL connections . . . . . . 215--225
            Chin-Chen Chang and   
                   Jung-San Lee   Robust $t$-out-of-$n$ oblivious transfer
                                  mechanism based on CRT . . . . . . . . . 226--235
        Muhammad N. Marsono and   
      M. Watheq El-Kharashi and   
                   Fayez Gebali   A spam rejection scheme during SMTP
                                  sessions based on layer-3 e-mail
                                  classification . . . . . . . . . . . . . 236--257
                   Hua Wang and   
                   Zhao Shi and   
                       Shuai Li   Multicast routing for delay variation
                                  bound using a modified ant colony
                                  algorithm  . . . . . . . . . . . . . . . 258--272
             Yuh-Shyan Chen and   
                Yun-Wei Lin and   
                Chih-Yung Chang   An overlapping communication protocol
                                  using improved time-slot leasing for
                                  Bluetooth WPANs  . . . . . . . . . . . . 273--292
          Francisco Almeida and   
             Vicente Blanco and   
             Carlos Delgado and   
         Francisco de Sande and   
           Adrián Santos   IDEWEP: Web service for astronomical
                                  parallel image deconvolution . . . . . . 293--313
                D. Di Sorte and   
              M. Femminella and   
                       G. Reali   QoS-enabled multicast for delivering
                                  live events in a Digital Cinema scenario 314--344
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 2, March, 2009

                Wanlei Zhou and   
                     Yang Xiang   Network and system security  . . . . . . 345--346
                  Chuan Yue and   
                   Haining Wang   Profit-aware overload protection in
                                  E-commerce Web sites . . . . . . . . . . 347--356
           Md Rafiqul Islam and   
                Wanlei Zhou and   
                  Minyi Guo and   
                     Yang Xiang   An innovative analyser for
                                  multi-classifier e-mail classification
                                  based on grey list analysis  . . . . . . 357--366
                Wei-Zhou Lu and   
                Wei-Xuan Gu and   
                  Shun-Zheng Yu   One-way queuing delay measurement and
                                  its application on detecting DDoS attack 367--376
                     Bai Li and   
                    Lynn Batten   Using mobile agents to recover from node
                                  and database compromise in path-based
                                  DoS attacks in wireless sensor networks  377--387
            Suriadi Suriadi and   
                 Ernest Foo and   
            Audun Jòsang   A user-centric federated single sign-on
                                  system . . . . . . . . . . . . . . . . . 388--401
                 Deqing Zou and   
                  Ligang He and   
                    Hai Jin and   
                  Xueguang Chen   CRBAC: Imposing multi-grained
                                  constraints on the RBAC model in the
                                  multi-application environment  . . . . . 402--411
                   Jian Cao and   
                Jinjun Chen and   
                Haiyan Zhao and   
                      Minglu Li   A policy-based authorization model for
                                  workflow-enabled dynamic process
                                  management . . . . . . . . . . . . . . . 412--422
                   Wenyu Qu and   
         Masaru Kitsuregawa and   
                  Hong Shen and   
                  Zhiguang Shan   A novel fault-tolerant execution model
                                  by using of mobile agents  . . . . . . . 423--432
            Muhammad Younas and   
                 Irfan Awan and   
               Laurence T. Yang   Special issue on service oriented
                                  computing and advanced network
                                  applications . . . . . . . . . . . . . . 433
     Agustinus Borgy Waluyo and   
               David Taniar and   
               Wenny Rahayu and   
                Bala Srinivasan   Mobile service oriented architectures
                                  for NN-queries . . . . . . . . . . . . . 434--447
              Arjan Durresi and   
            Vamsi Paruchuri and   
                Leonard Barolli   Fast autonomous system traceback . . . . 448--454
            D. R. W. Holton and   
                   I. Nafea and   
                  M. Younas and   
                        I. Awan   A class-based scheme for E-commerce web
                                  servers: Formal specification and
                                  performance evaluation . . . . . . . . . 455--460
                I. Al-Oqily and   
                    A. Karmouch   Towards automating overlay network
                                  management . . . . . . . . . . . . . . . 461--473
                  M. Lozano and   
                 P. Morillo and   
        J. M. Orduña and   
                  V. Cavero and   
                    G. Vigueras   A new system architecture for crowd
                                  simulation . . . . . . . . . . . . . . . 474--482
                  Yan Zhang and   
           Laurence T. Yang and   
                 Jianhua Ma and   
                      Jun Zheng   Quantitative analysis of location
                                  management and QoS in wireless networks  483--489
             Mieso K. Denko and   
           Elhadi Shakshuki and   
                   Haroon Malik   Enhanced cross-layer based middleware
                                  for mobile ad hoc networks . . . . . . . 490--499
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 3, May, 2009

            Mostafa Abd-El-Barr   Topological network design: a survey . . 501--509
             Byoung-Dai Lee and   
            Jon B. Weissman and   
                Young-Kwang Nam   Adaptive middleware supporting scalable
                                  performance for high-end network
                                  services . . . . . . . . . . . . . . . . 510--524
                 Chunlin Li and   
                      Layuan Li   Three-layer control policy for grid
                                  resource management  . . . . . . . . . . 525--537
             Yuh-Jzer Joung and   
                   Chu-Jui Yang   Email licensing  . . . . . . . . . . . . 538--549
               Selim Ciraci and   
    Ibrahim Körpeo\ugu and   
         Özgür Ulusoy   Reducing query overhead through route
                                  learning in unstructured peer-to-peer
                                  network  . . . . . . . . . . . . . . . . 550--567
                Songtao Guo and   
                  Gang Feng and   
              Xiaofeng Liao and   
                        Qun Liu   Novel delay-range-dependent stability
                                  analysis of the second-order congestion
                                  control algorithm with heterogeneous
                                  communication delays . . . . . . . . . . 568--577
            Eric Jui-Lin Lu and   
              Yung-Fa Huang and   
                    Shu-Chiu Lu   ML-Chord: a multi-layered P2P resource
                                  sharing model  . . . . . . . . . . . . . 578--588
                Shi-Jen Lin and   
                  Ding-Chyu Liu   An incentive-based electronic payment
                                  scheme for digital content transactions
                                  over the Internet  . . . . . . . . . . . 589--598
          Thomas E. Carroll and   
                   Daniel Grosu   A secure and anonymous voter-controlled
                                  election scheme  . . . . . . . . . . . . 599--606
                Y. Tachwali and   
               W. J. Barnes and   
                       H. Refai   Configurable symbol synchronizers for
                                  software-defined radio applications  . . 607--615
                I-Ching Hsu and   
                 Li-Pin Chi and   
                Sheau-Shong Bor   A platform for transcoding heterogeneous
                                  markup documents using ontology-based
                                  metadata . . . . . . . . . . . . . . . . 616--629
      Konstantinos Samdanis and   
         Vasilis Friderikos and   
               A. Hamid Aghvami   Autonomic hierarchical reconfiguration
                                  for wireless access networks . . . . . . 630--641
                      Li Ou and   
                   Xubin He and   
                    Jizhong Han   An efficient design for fast memory
                                  registration in RDMA . . . . . . . . . . 642--651
            Jenn-Hwan Tarng and   
            Bing-Wen Chuang and   
                   Pei-Chen Liu   A relay node deployment method for
                                  disconnected wireless sensor networks:
                                  Applied in indoor environments . . . . . 652--659
               Satish Chand and   
             Bijendra Kumar and   
                        Hari Om   Video Data Delivery using Slotted
                                  Patching . . . . . . . . . . . . . . . . 660--665
              Oznur Ozkasap and   
                Mine Caglar and   
                     Ali Alagoz   Principles and performance analysis of
                                  SeCond: a system for epidemic
                                  peer-to-peer content distribution  . . . 666--683
             Lambros Boukas and   
       Georgios Kambourakis and   
             Stefanos Gritzalis   Pandora: an SMS-oriented m-informational
                                  system for educational realms  . . . . . 684--702
              Babek Abbasov and   
               Serdar Korukoglu   Effective RED: an algorithm to improve
                                  RED's performance by reducing packet
                                  loss rate  . . . . . . . . . . . . . . . 703--709
              Zonghua Zhang and   
                     Pin-Han Ho   Janus: a dual-purpose analytical model
                                  for understanding, characterizing and
                                  countermining multi-stage collusive
                                  attacks in enterprise networks . . . . . 710--720
                    Li Feng and   
                   Wei Wang and   
                   Lina Zhu and   
                       Yi Zhang   Predicting intrusion goal using dynamic
                                  Bayesian network with transfer
                                  probability estimation . . . . . . . . . 721--732
      Mohammad Hamed Firooz and   
     Alireza Nasiri Avanaki and   
     Mohammad Reza Pakravan and   
                  Keivan Ronasi   A fast and reliable multi-sender
                                  algorithm for peer-to-peer networks  . . 733--740
              Tzu-Chi Huang and   
           Sherali Zeadally and   
         Naveen Chilamkurti and   
                  Ce-Kuen Shieh   Design, implementation, and evaluation
                                  of a Programmable Bandwidth Aggregation
                                  System for home networks . . . . . . . . 741--759
                 Li Chunlin and   
              Zhong Jin Xiu and   
                      Li Layuan   Resource scheduling with conflicting
                                  objectives in grid environments: Model
                                  and evaluation . . . . . . . . . . . . . 760--769
                  J. H. Abawajy   Adaptive hierarchical scheduling policy
                                  for enterprise grid computing systems    770--779
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 4, July, 2009

                    Li Feng and   
                    Zili Li and   
                       Yi Zhang   Security bootstrap model of key
                                  pre-sharing by polynomial group in
                                  mobile Ad Hoc Network  . . . . . . . . . 781--787
                 Jiankun Hu and   
                   Fengling Han   A pixel-based scrambling scheme for
                                  digital medical images protection  . . . 788--794
                  C. Bouras and   
                E. Giannaka and   
          Thrasyvoulos Tsiatsos   Identifying best practices for
                                  supporting broadband growth: Methodology
                                  and analysis . . . . . . . . . . . . . . 795--807
      Manuel Sánchez and   
       Gabriel López and   
Óscar Cánovas and   
Antonio F. Gómez-Skarmeta   Performance analysis of a cross-layer
                                  SSO mechanism for a roaming
                                  infrastructure . . . . . . . . . . . . . 808--823
      Mouhammd Al-Kasassbeh and   
                        Mo Adda   Network fault detection with Wiener
                                  filter-based agent . . . . . . . . . . . 824--833
             Chao-Tung Yang and   
             Ming-Feng Yang and   
               Wen-Chung Chiang   Enhancement of anticipative recursively
                                  adjusting mechanism for redundant
                                  parallel file transfer in data grids . . 834--845
              Sergio Ilarri and   
               Eduardo Mena and   
           Arantza Illarramendi   A system based on mobile agents to test
                                  mobile computing applications  . . . . . 846--865
             Kuei-Ping Shih and   
            Hung-Chang Chen and   
             Chien-Min Chou and   
                     Bo-Jun Liu   On target coverage in wireless
                                  heterogeneous sensor networks with
                                  multiple sensing units . . . . . . . . . 866--877
         Prasan Kumar Sahoo and   
             Jang-Ping Sheu and   
                  Yu-Chia Chang   Performance evaluation of wireless
                                  sensor network with hybrid channel
                                  access mechanism . . . . . . . . . . . . 878--888
                     Dan Wu and   
            Chi Hong Cheong and   
                   Man Hon Wong   Supporting asynchronous update for
                                  distributed data cubes . . . . . . . . . 889--900
                 Jiaming Li and   
                  Chai Kiat Yeo   Content and overlay-aware scheduling for
                                  peer-to-peer streaming in fluctuating
                                  networks . . . . . . . . . . . . . . . . 901--912
              Javed I. Khan and   
                Sajid S. Shaikh   A phenotype reputation estimation
                                  function and its study of resilience to
                                  social attacks . . . . . . . . . . . . . 913--924
       Robert L. R. Mattson and   
                  Somnath Ghosh   HTTP-MPLEX: an enhanced hypertext
                                  transfer protocol and its performance
                                  evaluation . . . . . . . . . . . . . . . 925--939
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 5, September, 2009

          Giancarlo Fortino and   
              Carlo Mastroianni   Next generation content networks . . . . 941--942
             Jayashree Ravi and   
                 Zhifeng Yu and   
                    Weisong Shi   A survey on dynamic Web content
                                  generation and delivery techniques . . . 943--960
               Gilles Fedak and   
                   Haiwu He and   
                Franck Cappello   BitDew: a data management and
                                  distribution service with multi-protocol
                                  file transfer and metadata abstraction   961--975
            Mukaddim Pathan and   
                 Rajkumar Buyya   Resource discovery and
                                  request-redirection for dynamic load
                                  sharing in multi-provider peering
                                  content delivery networks  . . . . . . . 976--990
               Jaime Lloret and   
              Miguel Garcia and   
                  Diana Bri and   
                   Juan R. Diaz   Study and performance of a group-based
                                  Content Delivery Network . . . . . . . . 991--999
            Benjamin Molina and   
       Salvatore F. Pileggi and   
              Manuel Esteve and   
                Carlos E. Palau   A negotiation framework for content
                                  distribution in mobile transient
                                  networks . . . . . . . . . . . . . . . . 1000--1011
              James Broberg and   
             Rajkumar Buyya and   
                     Zahir Tari   MetaCDN: Harnessing `Storage Clouds' for
                                  high performance content delivery  . . . 1012--1022
               Ying-Dar Lin and   
                Chun-Nan Lu and   
             Yuan-Cheng Lai and   
               Wei-Hao Peng and   
                   Po-Ching Lin   Application classification using packet
                                  size distribution and port association   1023--1030
                  Ling Wang and   
             Yahia Tachwali and   
              Pramode Verma and   
                    Anjan Ghosh   Impact of bounded delay on throughput in
                                  multi-hop networks . . . . . . . . . . . 1031--1038
                   K. Salah and   
                      M. Hamawi   Comparative packet-forwarding
                                  measurement of three popular operating
                                  systems  . . . . . . . . . . . . . . . . 1039--1048
            Behnoosh Hariri and   
      Shervin Shirmohammadi and   
     Mohammad Reza Pakravan and   
         Mohammad Hossein Alavi   An adaptive latency mitigation scheme
                                  for massively multiuser virtual
                                  environments . . . . . . . . . . . . . . 1049--1063
                     Yuhui Deng   Deconstructing Network Attached Storage
                                  systems  . . . . . . . . . . . . . . . . 1064--1072
                   Fang-Yie Leu   A novel network mobility handoff scheme
                                  using SIP and SCTP for multimedia
                                  applications . . . . . . . . . . . . . . 1073--1091
Iván Martínez-Ortiz and   
    José-Luis Sierra and   
Baltasar Fernández-Manjón and   
Alfredo Fernández-Valmayor   Language engineering techniques for the
                                  development of e-learning applications   1092--1105
      Chenfeng Vincent Zhou and   
         Christopher Leckie and   
           Shanika Karunasekera   Decentralized multi-dimensional alert
                                  correlation for collaborative intrusion
                                  detection  . . . . . . . . . . . . . . . 1106--1123
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 32, Number 6, November, 2009

           Mohammed Tarique and   
              Kemal E. Tepe and   
                Sasan Adibi and   
                 Shervin Erfani   Survey of multipath routing protocols
                                  for mobile ad hoc networks . . . . . . . 1125--1143
               Wen-Hwa Liao and   
                   Wen-Ming Yen   Power-saving scheduling with a QoS
                                  guarantee in a mobile WiMAX system . . . 1144--1152
            Neng-Chung Wang and   
                  Chao-Yang Lee   A reliable QoS aware routing protocol
                                  with slot assignment for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1153--1166
            R. Martí and   
                  S. Robles and   
  A. Martín-Campillo and   
                    J. Cucurull   Providing early resource allocation
                                  during emergencies: the mobile triage
                                  tag  . . . . . . . . . . . . . . . . . . 1167--1182
           Mohamed K. Watfa and   
                 Omar Mirza and   
                 Jad Kawtharani   BARC: a Battery Aware Reliable
                                  Clustering algorithm for sensor networks 1183--1193
Martín López-Nores and   
  Jorge García-Duque and   
 José J. Pazos-Arias and   
Yolanda Blanco-Fernández and   
        Manuel Ramos-Cabrer and   
          Alberto Gil-Solla and   
Rebeca P. Díaz-Redondo and   
     Ana Fernández-Vilas   KEPPAN: Knowledge exploitation for
                                  proactively-planned ad-hoc networks  . . 1194--1209
            Cuneyt Bayilmis and   
           Ersoy Kelebekler and   
              Ismail Erturk and   
                Celal Ceken and   
                Ibrahim Ozcelik   Integration of a speech activated
                                  control system and a wireless
                                  interworking unit for a CAN-based
                                  distributed application  . . . . . . . . 1210--1218
             Xuan Dau Hoang and   
                 Jiankun Hu and   
                   Peter Bertok   A program-based anomaly intrusion
                                  detection scheme using multiple
                                  detection engines and fuzzy inference    1219--1228
             Chien-Chih Lai and   
               Ren-Guey Lee and   
           Chun-Chieh Hsiao and   
             Hsin-Sheng Liu and   
                Chun-Chang Chen   A H-QoS-demand personalized home
                                  physiological monitoring system over a
                                  wireless multi-hop relay network for
                                  mobile home healthcare applications  . . 1229--1241
      Bruno Van Den Bossche and   
       Bart De Vleeschauwer and   
               Tom Verdickt and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Autonomic microcell assignment in
                                  massively distributed online virtual
                                  environments . . . . . . . . . . . . . . 1242--1256
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 33, Number 1, January, 2010

                 Chun-Ta Li and   
               Min-Shiang Hwang   An efficient biometrics-based remote
                                  user authentication scheme using smart
                                  cards  . . . . . . . . . . . . . . . . . 1--5
                   K. Salah and   
                     A. Kahtani   Performance evaluation comparison of
                                  Snort NIDS under Linux and Windows
                                  Server . . . . . . . . . . . . . . . . . 6--15
         Giorgos Karopoulos and   
       Georgios Kambourakis and   
         Stefanos Gritzalis and   
          Elisavet Konstantinou   A framework for identity privacy in SIP  16--28
             Jianhong Zhang and   
              Chenglian Liu and   
                    Yixian Yang   An efficient secure proxy verifiably
                                  encrypted signature scheme . . . . . . . 29--34
              Nader Mohamed and   
             Jameela Al-Jaroodi   Self-configured
                                  multiple-network-interface socket  . . . 35--42
              Ming-Wen Tong and   
              Zong-Kai Yang and   
                  Qing-Tang Liu   A novel model of adaptation
                                  decision-taking engine in multimedia
                                  adaptation . . . . . . . . . . . . . . . 43--49
               Youtao Zhang and   
                   Jun Yang and   
                  Weijia Li and   
              Linzhang Wang and   
                   Lingling Jin   An authentication scheme for locating
                                  compromised sensor nodes in WSNs . . . . 50--62
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 2, March, 2010

                Junqi Zhang and   
             Vijay Varadharajan   Wireless sensor network key management
                                  survey and taxonomy  . . . . . . . . . . 63--75
                  Weili Han and   
                     Min Xu and   
               Weidong Zhao and   
                       Guofu Li   A trusted decentralized access control
                                  framework for the client/server
                                  architecture . . . . . . . . . . . . . . 76--83
           Matthias Strobbe and   
          Olivier Van Laere and   
               Samuel Dauwe and   
                Bart Dhoedt and   
             Filip De Turck and   
             Piet Demeester and   
      Christof van Nimwegen and   
           Jeroen Vanattenhoven   Interest based selection of user
                                  generated content for rich communication
                                  services . . . . . . . . . . . . . . . . 84--97
              Cheng-Fu Chou and   
           William C. Cheng and   
                Leana Golubchik   Performance study of online batch-based
                                  digital signature schemes  . . . . . . . 98--114
                    Ming Xu and   
              Shuigeng Zhou and   
                Jihong Guan and   
                     Xiaohua Hu   A path-traceable query routing mechanism
                                  for search in unstructured peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 115--127
          Eduardo Moschetta and   
         Rodolfo S. Antunes and   
           Marinho P. Barcellos   Flexible and secure service discovery in
                                  ubiquitous computing . . . . . . . . . . 128--140
               Jenn-Wei Lin and   
                  Wei-Shou Wang   An efficient reconstruction approach for
                                  improving Bluetree scatternet formation
                                  in personal area networks  . . . . . . . 141--155
                   Ming-Yang Su   Discovery and prevention of attack
                                  episodes by frequent episodes mining and
                                  finite state machines  . . . . . . . . . 156--167
                Haidar Safa and   
              Hassan Artail and   
                   Mirna Nahhas   A cache invalidation strategy for mobile
                                  networks . . . . . . . . . . . . . . . . 168--182
             Yuh-Jzer Joung and   
                  Zhang-Wen Lin   On the self-organization of a hybrid
                                  peer-to-peer system  . . . . . . . . . . 183--202
                      Anonymous   Special Issue of Journal of Network and
                                  Computer Applications on ``Dependable
                                  Multimedia Communications: Systems,
                                  Services, and Applications'' . . . . . . 203
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 3, May, 2010

      Muhammad Khurram Khan and   
              Mohamed Kamel and   
                   Xudong Jiang   Special issue on: Recent advances and
                                  future directions in biometrics personal
                                  identification . . . . . . . . . . . . . 205--206
                    Peng Li and   
                   Xin Yang and   
                    Kai Cao and   
               Xunqiang Tao and   
               Ruifang Wang and   
                       Jie Tian   An alignment-free fingerprint
                                  cryptosystem based on fuzzy vault scheme 207--220
                  Eryun Liu and   
                Jimin Liang and   
               Liaojun Pang and   
                    Min Xie and   
                       Jie Tian   Minutiae and modified Biocode fusion for
                                  fingerprint-based key generation . . . . 221--235
                Chulhan Lee and   
                     Jaihie Kim   Cancelable fingerprint templates using
                                  minutiae-based bit-strings . . . . . . . 236--246
                    Miao Qi and   
                 Yinghua Lu and   
                    Ning Du and   
                Yinan Zhang and   
               Chengxi Wang and   
                       Jun Kong   A novel image hiding approach based on
                                  correlation analysis for secure
                                  multimodal biometrics  . . . . . . . . . 247--257
                    Kai Cao and   
                   Xin Yang and   
               Xunqiang Tao and   
                    Peng Li and   
                  Yali Zang and   
                       Jie Tian   Combining features for distorted
                                  fingerprint matching . . . . . . . . . . 258--267
            Neyire Deniz Sarier   Improving the accuracy and storage cost
                                  in biometric remote authentication
                                  schemes  . . . . . . . . . . . . . . . . 268--274
                    Zhi Liu and   
                 Yilong Yin and   
               Hongjun Wang and   
             Shangling Song and   
                      Qingli Li   Finger vein recognition with manifold
                                  learning . . . . . . . . . . . . . . . . 275--282
                Dong-Ju Kim and   
            Jeong-Hoon Shin and   
                Kwang-Seok Hong   Teeth recognition based on multiple
                                  attempts in mobile device  . . . . . . . 283--292
 David Delgado-Gómez and   
             Federico Sukno and   
               David Aguado and   
           Carlos Santacruz and   
 Antonio Artés-Rodriguez   Individual identification using
                                  personality traits . . . . . . . . . . . 293--299
             Hunny Mehrotra and   
           Banshidhar Majhi and   
                 Phalguni Gupta   Robust iris indexing scheme using
                                  geometric hashing of SIFT keypoints  . . 300--313
             Jian-Gang Wang and   
                  Eric Sung and   
                    Wei-Yun Yau   Incremental two-dimensional linear
                                  discriminant analysis with applications
                                  to face recognition  . . . . . . . . . . 314--322
             Jianzhong Wang and   
               Baoxue Zhang and   
                Shuyan Wang and   
                    Miao Qi and   
                       Jun Kong   An adaptively weighted sub-pattern
                                  locality preserving projection for face
                                  recognition  . . . . . . . . . . . . . . 323--332
              Kumiko Yasuda and   
            Daigo Muramatsu and   
            Satoshi Shirato and   
              Takashi Matsumoto   Visual-based online signature
                                  verification using features extracted
                                  from video . . . . . . . . . . . . . . . 333--341
            Siraj A. Shaikh and   
            Joseph R. Rabaiotti   Characteristic trade-offs in designing
                                  large-scale biometric-based identity
                                  management systems . . . . . . . . . . . 342--351
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 4, July, 2010

              Chung-Nan Lee and   
             Yung-Cheng Kao and   
                   Ming-Te Tsai   A vEB-tree-based architecture for
                                  interactive video on demand services in
                                  peer-to-peer networks  . . . . . . . . . 353--362
           Neelofer Tamboli and   
                 Mohamed Younis   Coverage-aware connectivity restoration
                                  in mobile sensor networks  . . . . . . . 363--374
            Leo Carro-Calvo and   
        Sancho Salcedo-Sanz and   
  Jose A. Portilla-Figueras and   
      E. G. Ortiz-García   A genetic algorithm with switch-device
                                  encoding for optimal partition of
                                  switched industrial Ethernet networks    375--382
                   Lei Wang and   
               Ruizhong Wei and   
                 Yaping Lin and   
                        Bo Wang   A clique base node scheduling method for
                                  wireless sensor networks . . . . . . . . 383--396
                 Feng Zhong and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Enabling inter-PMIPv6-domain handover
                                  with traffic distributors  . . . . . . . 397--409
            Christos Bouras and   
       Vassilis Poulopoulos and   
               Vassilis Tsogkas   Adaptation of RSS feeds based on the
                                  user profile and on the end device . . . 410--421
                Yuwang Yang and   
             Chunshan Zhong and   
                  Yamin Sun and   
                    Jingyu Yang   Network coding based reliable disjoint
                                  and braided multipath routing for sensor
                                  networks . . . . . . . . . . . . . . . . 422--432
             Arthur Callado and   
              Judith Kelner and   
               Djamel Sadok and   
   Carlos Alberto Kamienski and   
         Stênio Fernandes   Better network traffic identification
                                  through the independent combination of
                                  techniques . . . . . . . . . . . . . . . 433--446
  D. González-Ortega and   
   F. J. Díaz-Pernas and   
M. Martínez-Zarzuela and   
M. Antón-Rodríguez and   
  J. F. Díez-Higuera and   
                D. Boto-Giralda   Real-time hands, face and facial
                                  features detection and tracking:
                                  Application to cognitive rehabilitation
                                  tests monitoring . . . . . . . . . . . . 447--466
              Chih-Peng Lin and   
                Jenhui Chen and   
                Hsing-Lung Chen   An efficient bandwidth allocation
                                  algorithm for real-time VBR stream
                                  transmission under IEEE 802.16 wireless
                                  networks . . . . . . . . . . . . . . . . 467--476
    Javad Akbari Torkestani and   
          Mohammad Reza Meybodi   An efficient cluster-based CDMA/TDMA
                                  scheme for wireless mobile ad-hoc
                                  networks: a learning automata approach   477--490
        Abdun Naser Mahmood and   
                 Jiankun Hu and   
                 Zahir Tari and   
             Christopher Leckie   Critical infrastructure protection:
                                  Resource efficient sampling to improve
                                  detection of less frequent patterns in
                                  network traffic  . . . . . . . . . . . . 491--502
     Henrique S. L. Pequeno and   
         George A. M. Gomes and   
      Rossana M. C. Andrade and   
    José N. de Souza and   
            Miguel F. de Castro   FrameIDTV: a framework for developing
                                  interactive applications on digital
                                  television environments  . . . . . . . . 503--511
                  Hui Cheng and   
               Xingwei Wang and   
            Shengxiang Yang and   
                  Min Huang and   
                   Jiannong Cao   QoS multicast tree construction in
                                  IP/DWDM optical Internet by bio-inspired
                                  algorithms . . . . . . . . . . . . . . . 512--522
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 5, September, 2010

         Jameela Al-Jaroodi and   
                  Nader Mohamed   Middleware trends for network
                                  applications . . . . . . . . . . . . . . 523--524
                C. Boldrini and   
                   M. Conti and   
               F. Delmastro and   
                  A. Passarella   Context- and social-aware middleware for
                                  opportunistic networks . . . . . . . . . 525--541
           Praveen Madiraju and   
           Srilaxmi Malladi and   
         Janaka Balasooriya and   
            Arthi Hariharan and   
           Sushil K. Prasad and   
                  Anu Bourgeois   A methodology for engineering
                                  collaborative and ad-hoc mobile
                                  applications using SyD middleware  . . . 542--555
  Jordi Pujol-Ahulló and   
Pedro García-López   Enabling portability in advanced
                                  information-centric services over
                                  structured peer-to-peer systems  . . . . 556--568
          Bruno P. S. Rocha and   
         Daniel N. O. Costa and   
           Rande A. Moreira and   
       Cristiano G. Rezende and   
     Antonio A. F. Loureiro and   
             Azzedine Boukerche   Adaptive security protocol selection for
                                  mobile computing . . . . . . . . . . . . 569--587
Pedro García López and   
  Raúl Gracia Tinedo and   
   Josep M. Banús Alsina   Moving routing protocols to the user
                                  space in MANET middleware  . . . . . . . 588--602
Víctor Manuel Álvarez García and   
María del Puerto Paule Ruiz and   
Juan Ramón Pérez Pérez   Voice interactive classroom, a
                                  service-oriented software architecture
                                  for speech-enabled learning  . . . . . . 603--610
            Yasser Gadallah and   
       Mohamed Adel Serhani and   
                  Nader Mohamed   Middleware support for service discovery
                                  in special operations mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 611--619
                   Cheng Bo and   
                 Zhang Yang and   
                  Zhou Peng and   
                   Duan Hua and   
                Hu Xiaoxiao and   
                 Wang Zheng and   
                  Chen Junliang   Development of Web-Telecom based hybrid
                                  services orchestration and execution
                                  middleware over convergence networks . . 620--630
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 33, Number 6, November, 2010

              Jason J. Jung and   
              Chung-Ming Ou and   
          Ngoc Thanh Nguyen and   
                  Chong Gun Kim   Advances on agent-based network
                                  management . . . . . . . . . . . . . . . 631--632
                        Bo Chen   Agent-based artificial immune system
                                  approach for adaptive damage detection
                                  in monitoring networks . . . . . . . . . 633--645
                    Mary Wu and   
                   ChongGun Kim   A cost matrix agent for shortest path
                                  routing in ad hoc networks . . . . . . . 646--652
                Pradeep Ray and   
            N. Parameswaran and   
                    Lundy Lewis   Distributed autonomic management: an
                                  approach and experiment towards managing
                                  service-centric networks . . . . . . . . 653--660
              S. Venkatesan and   
              C. Chellappan and   
           T. Vengattaraman and   
            P. Dhavachelvan and   
                  Anurika Vaish   Advanced mobile agent security models
                                  for code integrity and malicious
                                  availability check . . . . . . . . . . . 661--671
                  Yao-Tien Wang   A dynamic resource management in mobile
                                  agent by artificial neural network . . . 672--681
             Yue-Shan Chang and   
                  Pei-Chun Shih   A resource-awareness information
                                  extraction architecture on mobile grid
                                  environment  . . . . . . . . . . . . . . 682--695
               Umar Manzoor and   
                    Samia Nefti   QUIET: a Methodology for Autonomous
                                  Software Deployment using Mobile Agents  696--706
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 34, Number 1, January, 2011

               S. Subashini and   
                     V. Kavitha   A survey on security issues in service
                                  delivery models of cloud computing . . . 1--11
                Dai-Rui Lin and   
                Chih-I Wang and   
                     D. J. Guan   Efficient vehicle ownership
                                  identification scheme based on
                                  triple-trapdoor chameleon hash function  12--19
           Sireesha Muppala and   
                    Xiaobo Zhou   Coordinated session-based admission
                                  control with statistical learning for
                                  multi-tier Internet applications . . . . 20--29
               Neeraj Kumar and   
                Manoj Kumar and   
                    R. B. Patel   Capacity and interference aware link
                                  scheduling with channel assignment in
                                  wireless mesh networks . . . . . . . . . 30--38
              Marcela Mejia and   
  Néstor Peña and   
       Jose L. Muñoz and   
              Oscar Esparza and   
                Marco A. Alzate   A game theoretic trust model for on-line
                                  distributed evolution of cooperation in
                                  MANETs . . . . . . . . . . . . . . . . . 39--51
         Sanaa Sharafeddine and   
                   Rakan Maddah   A lightweight adaptive compression
                                  scheme for energy-efficient
                                  mobile-to-mobile file sharing
                                  applications . . . . . . . . . . . . . . 52--61
             Sanaa Sharafeddine   Capacity assignment in multiservice
                                  packet networks with soft maximum
                                  waiting time guarantees  . . . . . . . . 62--72
                   Xiong Li and   
               Jian-Wei Niu and   
                    Jian Ma and   
              Wen-Dong Wang and   
                 Cheng-Lian Liu   Cryptanalysis and improvement of a
                                  biometrics-based remote user
                                  authentication scheme using smart cards  73--79
                Biming Tian and   
                   Song Han and   
                 Jiankun Hu and   
                  Tharam Dillon   A mutual-healing key distribution scheme
                                  in wireless sensor networks  . . . . . . 80--88
            Christos Bouras and   
               Eri Giannaka and   
          Thrasyvoulos Tsiatsos   A dynamic management scheme for DVEs . . 89--101
                  Hyuck Han and   
              Hyungsoo Jung and   
              Hyeonsang Eom and   
                     H. Y. Yeom   An efficient skyline framework for
                                  matchmaking applications . . . . . . . . 102--115
                  Song Wang and   
                  Jinli Cao and   
                     Jiankun Hu   A frequency domain subspace blind
                                  channel estimation method for trailing
                                  zero OFDM systems  . . . . . . . . . . . 116--120
                Chih-Lin Hu and   
                   Chien-An Cho   User-provided multimedia content
                                  distribution architecture in mobile and
                                  ubiquitous communication networks  . . . 121--136
          Istemi Ekin Akkus and   
    Öznur Özkasap and   
               M. Reha Civanlar   Peer-to-peer multipoint video
                                  conferencing with layered video  . . . . 137--150
    Joel J. P. C. Rodrigues and   
      Orlando R. E. Pereira and   
           Paulo A. C. S. Neves   Biofeedback data visualization for body
                                  sensor networks  . . . . . . . . . . . . 151--158
           Atif Bin Mansoor and   
              Hassan Masood and   
             Mustafa Mumtaz and   
                  Shoab A. Khan   A feature level multimodal approach for
                                  palmprint identification using
                                  directional subband energies . . . . . . 159--171
                 Mingyu Lim and   
              Bart Kevelham and   
               Niels Nijdam and   
        Nadia Magnenat-Thalmann   Rapid development of distributed
                                  applications using high-level
                                  communication support  . . . . . . . . . 172--182
             Xiaohong Huang and   
                       Maode Ma   A performance model for differentiated
                                  service over single-hop passive star
                                  coupled WDM optical networks . . . . . . 183--193
    Aristides Mpitziopoulos and   
Charalampos Konstantopoulos and   
           Damianos Gavalas and   
              Grammati Pantziou   A pervasive assistive environment for
                                  visually impaired people using wireless
                                  sensor network infrastructure  . . . . . 194--206
            Ameneh Daeinabi and   
  Akbar Ghaffar Pour Rahbar and   
              Ahmad Khademzadeh   VWCA: an efficient clustering algorithm
                                  in vehicular ad hoc networks . . . . . . 207--222
                Pejman Goudarzi   Improving rate allocation for ephemeral
                                  traffic using a second-order algorithm   223--231
                  Tzu-Chi Huang   Universal connection architecture for
                                  interactive applications to achieve
                                  distributed computing  . . . . . . . . . 232--251
                    Song Fu and   
             Cheng-Zhong Xu and   
                   Haiying Shen   Randomized load balancing strategies
                                  with churn resilience in peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 252--261
                   Bo Zhang and   
                  Fangguo Zhang   An efficient public key encryption with
                                  conjunctive-subset keywords search . . . 262--267
Jesús Ibáñez and   
            Carlos Delgado-Mata   Lessons from research on interaction
                                  with virtual environments  . . . . . . . 268--281
                 Fahim Sufi and   
                 Ibrahim Khalil   Faster person identification using
                                  compressed ECG in time critical wireless
                                  telecardiology applications  . . . . . . 282--293
Antonio Ruiz-Martínez and   
Juan Sánchez-Montesinos and   
Daniel Sánchez-Martínez   A mobile network operator-independent
                                  mobile signature service . . . . . . . . 294--311
                 Wenjia Niu and   
                    Gang Li and   
                Zhijun Zhao and   
                   Hui Tang and   
                   Zhongzhi Shi   Multi-granularity context model for
                                  dynamic Web service composition  . . . . 312--326
              Hadi Goudarzi and   
        Amir Hesam Salavati and   
         Mohammad Reza Pakravan   An ant-based rate allocation algorithm
                                  for media streaming in peer to peer
                                  networks: Extension to multiple sessions
                                  and dynamic networks . . . . . . . . . . 327--340
            Marc Liberatore and   
               Bikas Gurung and   
          Brian Neil Levine and   
                 Matthew Wright   Empirical tests of anonymous voice over
                                  IP . . . . . . . . . . . . . . . . . . . 341--350
             Patrik Moravek and   
                Dan Komosny and   
               Radim Burget and   
             Jaroslav Sveda and   
                Tomas Handl and   
                 Lucie Jarosova   Study and performance of localization
                                  methods in IP based networks: Vivaldi
                                  algorithm  . . . . . . . . . . . . . . . 351--367
        E. Costa-Montenegro and   
       J. C. Burguillo-Rial and   
   F. Gil-Castiñeira and   
F. J. González-Castaño   Implementation and analysis of the
                                  BitTorrent protocol with a multi-agent
                                  model  . . . . . . . . . . . . . . . . . 368--383
          Elisavet Konstantinou   Efficient cluster-based group key
                                  agreement protocols for wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 384--393
              Jung Yul Choi and   
              Shin Jung Woo and   
               Byoung Kwon Shim   Reliable service provisioning in
                                  converged multimedia network environment 394--401
          Prajakta Kulkarni and   
                   Yusuf Ozturk   mPHASiS: Mobile patient healthcare and
                                  sensor information system  . . . . . . . 402--417
        William R. Claycomb and   
                   Dongwan Shin   A novel node level security policy
                                  framework for wireless sensor networks   418--428
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 2, March, 2011

                   Jonathan Loo   Special issue on: Efficient and robust
                                  security and services of wireless mesh
                                  networks . . . . . . . . . . . . . . . . 429--431
           Frank A. Zdarsky and   
        Sebastian Robitzsch and   
                  Albert Banchs   Security analysis of wireless mesh
                                  backhauls for mobile networks  . . . . . 432--442
             Shanshan Jiang and   
                       Yuan Xue   Providing survivability against jamming
                                  attack for multi-radio multi-channel
                                  wireless mesh networks . . . . . . . . . 443--454
            Zorana Bankovic and   
                David Fraga and   
    José Manuel Moya and   
        Juan Carlos Vallejo and   
       Pedro Malagón and   
       Álvaro Araujo and   
  Juan-Mariano de Goyeneche and   
               Elena Romero and   
               Javier Blesa and   
          Daniel Villanueva and   
         Octavio Nieto-Taladriz   Improving security in WMNs with
                                  reputation systems and self-organizing
                                  maps . . . . . . . . . . . . . . . . . . 455--463
             Ching-Fang Hsu and   
                Guo-Hua Cui and   
                   Qi Cheng and   
                      Jing Chen   A novel linear multi-secret sharing
                                  scheme for group communication in
                                  wireless mesh networks . . . . . . . . . 464--468
                Yiliang Han and   
                Xiaolin Gui and   
                 Xuguang Wu and   
                  Xiaoyuan Yang   Proxy encryption based secure multicast
                                  in wireless mesh networks  . . . . . . . 469--477
      Okechukwu E. Muogilim and   
              Kok-Keong Loo and   
                 Richard Comley   Wireless mesh network security: a
                                  traffic engineering management approach  478--491
            Raquel Lacuesta and   
               Jaime Lloret and   
              Miguel Garcia and   
        Lourdes Peñalver   Two secure and energy-saving spontaneous
                                  ad-hoc protocol for wireless mesh client
                                  networks . . . . . . . . . . . . . . . . 492--505
         Rafael Lopes Gomes and   
      Waldir Moreira Junior and   
          Eduardo Cerqueira and   
Antônio Jorge Abelém   Using fuzzy link cost and dynamic choice
                                  of link quality metrics to achieve QoS
                                  and QoE in wireless mesh networks  . . . 506--516
                   Altaf Mukati   A survey of memory error correcting
                                  techniques for improved reliability  . . 517--522
         Lucas D. P. Mendes and   
        Joel J. P. C. Rodrigues   A survey on cross-layer solutions for
                                  wireless sensor networks . . . . . . . . 523--534
              Tingting Chen and   
               Ankur Bansal and   
                    Sheng Zhong   A reputation system for wireless mesh
                                  networks using network coding  . . . . . 535--541
       Pere Montolio-Aranda and   
      Joaquin Garcia-Alfaro and   
            David Megías   Improved flooding of broadcast messages
                                  using extended multipoint relaying . . . 542--550
       Duong Nguyen Binh Ta and   
               Suiping Zhou and   
                Wentong Cai and   
                Xueyan Tang and   
                   Rassul Ayani   Multi-objective zone mapping in
                                  large-scale distributed virtual
                                  environments . . . . . . . . . . . . . . 551--561
               Niels Sluijs and   
Frédéric Iterbeke and   
                Tim Wauters and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Cooperative caching versus proactive
                                  replication for location dependent
                                  request patterns . . . . . . . . . . . . 562--574
             Mohammad Bsoul and   
         Ahmad Al-Khasawneh and   
       Emad Eddien Abdallah and   
                  Yousef Kilani   Enhanced Fast Spread Replication
                                  strategy for Data Grid . . . . . . . . . 575--580
             Xiaohong Huang and   
                       Maode Ma   A heuristic adaptive QoS prediction
                                  scheme in single-hop passive star
                                  coupled WDM optical networks . . . . . . 581--588
           Cynthia Villalba and   
              Franco Zambonelli   Towards nature-inspired pervasive
                                  service ecosystems: Concepts and
                                  simulation experiences . . . . . . . . . 589--602
              Jianyong Chen and   
               Huawang Zeng and   
                 Cunying Hu and   
                        Zhen Ji   Optimization between security and delay
                                  of quality-of-service  . . . . . . . . . 603--608
            Sandeep K. Sood and   
              Anil K. Sarje and   
                   Kuldip Singh   A secure dynamic identity based
                                  authentication protocol for multi-server
                                  architecture . . . . . . . . . . . . . . 609--618
                   Hai Dong and   
    Farookh Khadeer Hussain and   
                Elizabeth Chang   A service concept recommendation system
                                  for enhancing the dependability of
                                  semantic service matchmakers in the
                                  service ecosystem environment  . . . . . 619--631
               Fang-Yie Leu and   
                  Ilsun You and   
                 Yao-Tien Huang   A coordinated multiple channel
                                  assignment scheme and AP deployment for
                                  channel reuse in metropolitan scale
                                  wireless networks  . . . . . . . . . . . 632--643
                   Mohamed Saad   Joint admission and power control for
                                  quality-of-service in the wireless
                                  downlink . . . . . . . . . . . . . . . . 644--652
                     Q. Shi and   
                   N. Zhang and   
                 M. Merabti and   
                     R. Askwith   Achieving autonomous fair exchange in
                                  ubiquitous network settings  . . . . . . 653--667
 Anabela Moreira Bernardino and   
Eugénia Moreira Bernardino and   
  Juan Manuel Sanchez-Perez and   
  Juan Antonio Gomez-Pulido and   
    Miguel Angel Vega-Rodriguez   Solving ring loading problems using
                                  bio-inspired algorithms  . . . . . . . . 668--685
            Zoran Milicevic and   
                 Zoran Bojkovic   H.264/AVC standard: a proposal for
                                  selective intra- and optimized
                                  inter-prediction . . . . . . . . . . . . 686--691
                 Yebin Chen and   
                    Ying Li and   
                   Jiankun Wang   On the wide diameter of directed
                                  double-loop networks . . . . . . . . . . 692--696
             Fatna Belqasmi and   
                Roch Glitho and   
                Rachida Dssouli   An overlay network for autonomous
                                  information discovery in the
                                  post-composition registries of ambient
                                  networks . . . . . . . . . . . . . . . . 697--707
                Huo Zhihong and   
                 Zheng Yuan and   
                       Xu Chang   A robust fault-tolerant control strategy
                                  for networked control systems  . . . . . 708--714
                 Yusuf Sani and   
                 Mohamed Othman   A provision-aware fair bandwidth
                                  distribution marker algorithm for
                                  DiffServ networks  . . . . . . . . . . . 715--721
                   Ming-Yang Su   Using clustering to improve the
                                  KNN-based classifiers for online anomaly
                                  network traffic identification . . . . . 722--730
         Naser Movahhedinia and   
  Behrouz Shahgholi Ghahfarokhi   Performance analysis of Bluetooth
                                  asynchronous connection-less service . . 731--738
                 Chunlin Li and   
                      Layuan Li   Two-level market solution for services
                                  composition optimization in mobile grid  739--749
                      Li Yu and   
                   Maode Ma and   
                 Weidong Hu and   
                   Zibo Shi and   
                     Yantai Shu   Design of parameter tunable robust
                                  controller for active queue management
                                  based on $ H_\infty $ control theory . . 750--764
                Jinchang Lu and   
                       Maode Ma   Cross-layer QoS support framework and
                                  holistic opportunistic scheduling for
                                  QoS in single carrier WiMAX system . . . 765--773
                 Li Chunlin and   
                      Li Layuan   Context aware service provisioning in
                                  mobile grid  . . . . . . . . . . . . . . 774--782
               Congduc Pham and   
           Abdallah Makhoul and   
                   Rachid Saadi   Risk-based adaptive scheduling in
                                  randomly deployed video sensor networks
                                  for critical surveillance applications   783--795
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 3, May, 2011

              Quan Z. Sheng and   
           Sherali Zeadally and   
      Aikaterini Mitrokotsa and   
                 Zakaria Maamar   RFID technology, systems, and
                                  applications . . . . . . . . . . . . . . 797--798
                    Wen Yao and   
             Chao-Hsien Chu and   
                        Zang Li   Leveraging complex event processing for
                                  smart hospitals using RFID . . . . . . . 799--810
                  Yi-Wei Ma and   
             Han-Chieh Chao and   
           Jiann-Liang Chen and   
                   Cheng-Yen Wu   Load-balancing mechanism for the RFID
                                  middleware applications over grid
                                  networking . . . . . . . . . . . . . . . 811--820
            Filippo Gandino and   
             Renato Ferrero and   
     Bartolomeo Montrucchio and   
            Maurizio Rebaudengo   Probabilistic DCS: an RFID
                                  reader-to-reader anti-collision protocol 821--832
          Pedro Peris-Lopez and   
             Agustin Orfila and   
  Julio C. Hernandez-Castro and   
        Jan C. A. van der Lubbe   Flaws on RFID grouping-proofs.
                                  Guidelines for future sound protocols    833--845
            Francesco Rizzo and   
           Marcello Barboni and   
            Lorenzo Faggion and   
           Graziano Azzalin and   
                   Marco Sironi   Improved security for commercial
                                  container transports using an innovative
                                  active RFID system . . . . . . . . . . . 846--852
          Roberto Di Pietro and   
                    Refik Molva   An optimal probabilistic solution for
                                  information confinement, privacy, and
                                  security in RFID systems . . . . . . . . 853--863
        M. V. Bueno-Delgado and   
                J. Vales-Alonso   On the optimal frame-length
                                  configuration on real passive RFID
                                  systems  . . . . . . . . . . . . . . . . 864--876
                   G. P. Hancke   Design of a secure distance-bounding
                                  channel for RFID . . . . . . . . . . . . 877--887
               Hanning Chen and   
                Yunlong Zhu and   
                 Kunyuan Hu and   
                         Tao Ku   RFID network planning using a
                                  multi-swarm optimizer  . . . . . . . . . 888--901
     Apostolia Papapostolou and   
                Hakima Chaouchi   RFID-assisted indoor localization and
                                  the impact of interference on its
                                  performance  . . . . . . . . . . . . . . 902--913
               Wei-Shinn Ku and   
               Kazuya Sakai and   
                     Min-Te Sun   The optimal $k$-covering tag deployment
                                  for RFID-based localization  . . . . . . 914--924
     Pilar Manzanares-Lopez and   
Juan Pedro Muñoz-Gea and   
 Josemaria Malgosa-Sanahuja and   
  Juan Carlos Sanchez-Aarnoutse   An efficient distributed discovery
                                  service for EPCglobal network in nested
                                  package scenarios  . . . . . . . . . . . 925--937
               Huanjia Yang and   
                  Lili Yang and   
                Shuang-Hua Yang   Hybrid ZigBee RFID sensor network for
                                  humanitarian logistics centre management 938--948
          Worapot Jakkhupan and   
            Somjit Arch-int and   
                     Yuefeng Li   Business process analysis and simulation
                                  for the RFID and EPCglobal Network
                                  enabled supply chain: a proof-of-concept
                                  approach . . . . . . . . . . . . . . . . 949--957
                 Taewoo Nam and   
                  Keunhyuk Yeom   Business-aware framework for supporting
                                  RFID-enabled applications in EPC Network 958--971
         Leonardo A. Amaral and   
          Fabiano P. Hessel and   
         Eduardo A. Bezerra and   
Jerônimo C. Corrêa and   
           Oliver B. Longhi and   
              Thiago F. O. Dias   eCloudRFID --- a mobile software
                                  framework architecture for pervasive
                                  RFID-based applications  . . . . . . . . 972--979
               Pablo Najera and   
               Javier Lopez and   
                  Rodrigo Roman   Real-time location and inpatient care
                                  systems based on passive RFID  . . . . . 980--989
               Chuong C. Vo and   
         Naveen Chilamkurti and   
               Seng W. Loke and   
                   Torab Torabi   Radio-Mama: an RFID based business
                                  process framework for asset management   990--997
             Maria Chaudhry and   
           Ali Hammad Akbar and   
               Qanita Ahmad and   
                   Imran Sarwar   SOARware$^1$: Treading through the
                                  crossroads of RFID middleware and SOA
                                  paradigm . . . . . . . . . . . . . . . . 998--1014
       Damith C. Ranasinghe and   
              Mark Harrison and   
         Kary Främling and   
               Duncan McFarlane   Enabling through life product-instance
                                  management: Solutions and challenges . . 1015--1031
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 4, July, 2011

                   Keqiu Li and   
           Laurence T. Yang and   
                     Xuemin Lin   Advanced topics in cloud computing . . . 1033--1034
                  Gang Chen and   
                 Yongwei Wu and   
                    Jia Liu and   
              Guangwen Yang and   
                   Weimin Zheng   Optimization of sub-query processing in
                                  distributed data integration systems . . 1035--1042
                    Z. Zhou and   
                 L. T. Yang and   
                   S. Bhiri and   
                     L. Shu and   
                   N. Xiong and   
                   M. Hauswirth   Verifying mediated service interactions
                                  considering expected behaviours  . . . . 1043--1053
                 Yuqing Zhu and   
               Jianmin Wang and   
                   Chaokun Wang   Ripple: a publish/subscribe service for
                                  multidata item updates propagation in
                                  the cloud  . . . . . . . . . . . . . . . 1054--1067
             Xiangzhen Kong and   
                 Chuang Lin and   
                Yixin Jiang and   
                    Wei Yan and   
                    Xiaowen Chu   Efficient dynamic task scheduling in
                                  virtualized data centers with fuzzy
                                  prediction . . . . . . . . . . . . . . . 1068--1077
                Weidong Shi and   
                    Yang Lu and   
                     Zhu Li and   
              Jonathan Engelsma   SHARC: a scalable $3$D graphics virtual
                                  appliance delivery framework in cloud    1078--1087
                    Hai Jin and   
                    Wei Gao and   
                    Song Wu and   
                Xuanhua Shi and   
                 Xiaoxin Wu and   
                       Fan Zhou   Optimizing the live migration of virtual
                                  machine by CPU scheduling  . . . . . . . 1088--1096
              Ashley Chonka and   
                 Yang Xiang and   
                Wanlei Zhou and   
                  Alessio Bonti   Cloud security defence to protect cloud
                                  computing against HTTP-DoS and XML-DoS
                                  attacks  . . . . . . . . . . . . . . . . 1097--1107
               Yanming Shen and   
                   Keqiu Li and   
                 Junfeng Xu and   
                          Lu Li   Layered video multicast with a P2P
                                  cooperation approach . . . . . . . . . . 1108--1112
            Flavio Lombardi and   
              Roberto Di Pietro   Secure virtualization for cloud
                                  computing  . . . . . . . . . . . . . . . 1113--1122
           Fouzi Semchedine and   
Louiza Bouallouche-Medjkoune and   
              Djamil A\"\issani   Task assignment policies in distributed
                                  server systems: a survey . . . . . . . . 1123--1130
               Tien-Ho Chen and   
              Yen-Chiu Chen and   
              Wei-Kuan Shih and   
                   Hsin-Wen Wei   An efficient anonymous authentication
                                  protocol for mobile pay-TV . . . . . . . 1131--1137
                  Jian Wang and   
                Yanheng Liu and   
                        Yu Jiao   Building a trusted route in a mobile ad
                                  hoc network considering communication
                                  reliability and path length  . . . . . . 1138--1149
                      J. Hu and   
                  I. Khalil and   
                     S. Han and   
                     A. Mahmood   Seamless integration of dependability
                                  and security concepts in SOA: a feedback
                                  control system based framework and
                                  taxonomy . . . . . . . . . . . . . . . . 1150--1159
                  Hyun Sung Kim   Location-based authentication protocol
                                  for first cognitive radio networking
                                  standard . . . . . . . . . . . . . . . . 1160--1167
            David G. Rosado and   
Eduardo Fernández-Medina and   
        Javier López and   
                 Mario Piattini   Systematic design of secure Mobile Grid
                                  systems  . . . . . . . . . . . . . . . . 1168--1183
              Fatemeh Amiri and   
MohammadMahdi Rezaei Yousefi and   
                 Caro Lucas and   
             Azadeh Shakery and   
                 Nasser Yazdani   Mutual information-based feature
                                  selection for intrusion detection
                                  systems  . . . . . . . . . . . . . . . . 1184--1199
               Rafael Duque and   
           Crescencio Bravo and   
                  Manuel Ortega   A model-based framework to automate the
                                  analysis of users' activity in
                                  collaborative systems  . . . . . . . . . 1200--1209
                Meirong Liu and   
               Timo Koskela and   
               Zhonghong Ou and   
                Jiehan Zhou and   
               Jukka Riekki and   
                Mika Ylianttila   Super-peer-based coordinated service
                                  provision  . . . . . . . . . . . . . . . 1210--1224
                 Jaime Chen and   
         Manuel Díaz and   
                Luis Llopis and   
     Bartolomé Rubio and   
           José M. Troya   A survey on quality of service support
                                  in wireless sensor and actor networks:
                                  Requirements and challenges in the
                                  context of critical infrastructure
                                  protection . . . . . . . . . . . . . . . 1225--1239
                  Mahmut Tenruh   Message scheduling with reduced matrix
                                  cycle and evenly distributed sparse
                                  allocation for time-triggered CAN  . . . 1240--1251
        Sheikh Tahir Bakhsh and   
           Halabi Hasbullah and   
                   Sabeen Tahir   Dynamic Congestion Control through
                                  backup relay in Bluetooth scatternet . . 1252--1262
                Xingwei Liu and   
                Xuming Fang and   
                    Xu Chen and   
                   Xuesong Peng   A bidding model and cooperative
                                  game-based vertical handoff decision
                                  algorithm  . . . . . . . . . . . . . . . 1263--1271
                      Qi Lu and   
                       Maode Ma   Group mobility support in mobile WiMAX
                                  networks . . . . . . . . . . . . . . . . 1272--1282
Jesús Ibáñez   Minimalist approach to show emotions via
                                  a flock of smileys . . . . . . . . . . . 1283--1291
            Chun-Ying Huang and   
               Shang-Pin Ma and   
                   Kuan-Ta Chen   Using one-time passwords to prevent
                                  password phishing attacks  . . . . . . . 1292--1301
                   Miao Xie and   
                   Song Han and   
                Biming Tian and   
                   Sazia Parvin   Anomaly detection in wireless sensor
                                  networks: a survey . . . . . . . . . . . 1302--1325
                Sinan Senol and   
        Kemal Leblebicioglu and   
                 Ece G. Schmidt   INtERCEDE: an algorithmic approach to
                                  networked control system design  . . . . 1326--1341
       Rafael Teigão and   
             Carlos Maziero and   
                  Altair Santin   Applying a usage control model in an
                                  operating system kernel  . . . . . . . . 1342--1352
                Songtao Guo and   
             Chuangyin Dang and   
                  Xiaofeng Liao   Joint opportunistic power and rate
                                  allocation for wireless ad hoc networks:
                                  an adaptive particle swarm optimization
                                  approach . . . . . . . . . . . . . . . . 1353--1365
                Justin Dean and   
            Andrew Harrison and   
             Robert N. Lass and   
                 Joe Macker and   
               David Millar and   
                     Ian Taylor   Client/server messaging protocols in
                                  serverless environments  . . . . . . . . 1366--1379
                 Y. Challal and   
               A. Ouadjaout and   
                   N. Lasla and   
                   M. Bagaa and   
                     A. Hadjidj   Secure and efficient disjoint multipath
                                  construction for fault tolerant routing
                                  in wireless sensor networks  . . . . . . 1380--1397
                 Wenfeng Li and   
                   Weiming Shen   Swarm behavior control of mobile
                                  multi-robots with wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1398--1407
                    R. O. Ocaya   A framework for collaborative remote
                                  experimentation for a physical
                                  laboratory using a low cost embedded web
                                  server . . . . . . . . . . . . . . . . . 1408--1415
                  Wenjun Xu and   
                  Zude Zhou and   
                 D. T. Pham and   
                      C. Ji and   
                    M. Yang and   
                       Quan Liu   Hybrid congestion control for high-speed
                                  networks . . . . . . . . . . . . . . . . 1416--1428
    Javad Akbari Torkestani and   
          Mohammad Reza Meybodi   A link stability-based multicast routing
                                  protocol for wireless mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1429--1440
André Vicente Calvinho and   
             Rui Gustavo Crespo   Email FI identification and resolution
                                  with model checking  . . . . . . . . . . 1441--1446
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 5, September, 2011

             Han-Chieh Chao and   
        Jean-Pierre Seifert and   
                Shiguo Lian and   
                     Liang Zhou   Dependable multimedia communications:
                                  Systems, services, and applications  . . 1447--1448
                     Rongbo Zhu   Intelligent rate control for supporting
                                  real-time traffic in WLAN mesh networks  1449--1458
                 Po-Yi Shih and   
               Po-Chuan Lin and   
              Jhing-Fa Wang and   
                  Yuan-Ning Lin   Robust several-speaker speech
                                  recognition with highly dependable
                                  online speaker adaptation and
                                  identification . . . . . . . . . . . . . 1459--1467
                 Der-Jiunn Deng   PSSB: Priority enforced slow-start
                                  backoff algorithm for multimedia
                                  transmission in wireless ad-hoc networks 1468--1473
              Philip Leroux and   
        Steven Latré and   
           Nicolas Staelens and   
             Piet Demeester and   
                 Filip De Turck   Mobile TV services through IP Datacast
                                  over DVB-H: Dependability of the quality
                                  of experience on the IP-based
                                  distribution network quality of service  1474--1488
                     Wen Ji and   
                   Min Chen and   
                  Xiaohu Ge and   
                    Peng Li and   
                   Yiqiang Chen   A perceptual macroblock layer power
                                  control for energy scalable video
                                  encoder based on just noticeable
                                  distortion principle . . . . . . . . . . 1489--1497
       Sanjay K. Dhurandher and   
                Sudip Misra and   
              Puneet Pruthi and   
            Shubham Singhal and   
           Saurabh Aggarwal and   
                 Isaac Woungang   Using bee algorithm for peer-to-peer
                                  file searching in mobile ad hoc networks 1498--1508
                 I.-Ju Liao and   
                  Tin-Yu Wu and   
               Jen-Wen Ding and   
                  Wei-Tsong Lee   A novel $3$D streaming protocol
                                  supported multi-mode display . . . . . . 1509--1517
             Rashid Mehmood and   
               Raad Alturki and   
               Sherali Zeadally   Multimedia applications over
                                  metropolitan area networks (MANs)  . . . 1518--1529
                Sudip Misra and   
                     Ankur Jain   Policy controlled self-configuration in
                                  unattended wireless sensor networks  . . 1530--1544
              Chia-Hui Wang and   
                    Yu-Shun Liu   A dependable privacy protection for
                                  end-to-end VoIP via Elliptic-Curve
                                  Diffie--Hellman and dynamic key changes  1545--1556
               Guangjie Liu and   
                Junwen Wang and   
                Shiguo Lian and   
                   Zhiquan Wang   A passive image authentication scheme
                                  for detecting region-duplication forgery
                                  with rotation  . . . . . . . . . . . . . 1557--1565
           Yeong-Sheng Chen and   
               Yuan-Wei Lee and   
                 Jong Hyuk Park   Enhanced HCCA mechanism for multimedia
                                  traffics with QoS support in IEEE
                                  802.11e networks . . . . . . . . . . . . 1566--1571
                Kevin J. Ma and   
               Radim Bartos and   
                 Swapnil Bhatia   A survey of schemes for Internet-based
                                  video delivery . . . . . . . . . . . . . 1572--1586
             Neyre Tekbiyik and   
           Elif Uysal-Biyikoglu   Energy efficient wireless unicast
                                  routing alternatives for
                                  machine-to-machine networks  . . . . . . 1587--1614
              Ching-Hao Mao and   
              Hahn-Ming Lee and   
                     Che-Fu Yeh   Adaptive e-mails intention finding
                                  system based on words social networks    1615--1622
                   Jun Yang and   
                    Bin Dai and   
             Benxiong Huang and   
                        Shui Yu   Orthogonal feedback scheme for network
                                  coding . . . . . . . . . . . . . . . . . 1623--1633
Jordán Pascual Espada and   
Oscar Sanjuán Martínez and   
  Juan Manuel Cueva Lovelle and   
B. Cristina Pelayo G-Bustelo and   
Manuel Álvarez Álvarez and   
Alejandro González García   Modeling architecture for collaborative
                                  virtual objects based on services  . . . 1634--1647
                  Ting Chen and   
            Xiao-song Zhang and   
                     Hua Li and   
                Xiong-da Li and   
                         Yue Wu   Fast quarantining of proactive worms in
                                  unstructured P2P networks  . . . . . . . 1648--1659
     Anindya Tahsin Prodhan and   
               Rajkumar Das and   
              Humayun Kabir and   
             Gholamali C. Shoja   TTL based routing in opportunistic
                                  networks . . . . . . . . . . . . . . . . 1660--1670
                Imad Jawhar and   
              Nader Mohamed and   
              Dharma P. Agrawal   Linear wireless sensor networks:
                                  Classification and applications  . . . . 1671--1682
           Stenio Fernandes and   
              Judith Kelner and   
                   Djamel Sadok   An adaptive-predictive architecture for
                                  video streaming servers  . . . . . . . . 1683--1694
              Liqiang Zhang and   
               Yu-Jen Cheng and   
                    Xiaobo Zhou   Enhanced statistics-based rate
                                  adaptation for 802.11 wireless networks  1695--1706
         Martin Kuehnhausen and   
                Victor S. Frost   Application of the Java Message Service
                                  in mobile monitoring environments  . . . 1707--1716
                  Zac Sadan and   
              David G. Schwartz   Social network analysis of web links to
                                  eliminate false positives in
                                  collaborative anti-spam systems  . . . . 1717--1723
             Chien-Lung Hsu and   
                     Han-Yu Lin   New identity-based key-insulated
                                  convertible multi-authenticated
                                  encryption scheme  . . . . . . . . . . . 1724--1731
                    Tao Qin and   
              Xiaohong Guan and   
                     Wei Li and   
               Pinghui Wang and   
                  Qiuzhen Huang   Monitoring abnormal network traffic
                                  based on blind source separation
                                  approach . . . . . . . . . . . . . . . . 1732--1742
                Hwa-Chun Ma and   
         Prasan Kumar Sahoo and   
                   Yen-Wen Chen   Computational geometry based distributed
                                  coverage hole detection protocol for the
                                  wireless sensor networks . . . . . . . . 1743--1756
                 Wenjia Niu and   
                    Gang Li and   
                   Hui Tang and   
                    Xu Zhou and   
                   Zhongzhi Shi   CARSA: a context-aware reasoning-based
                                  service agent model for AI planning of
                                  web service composition  . . . . . . . . 1757--1770
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 34, Number 6, November, 2011

                Jiming Chen and   
                David K. Y. Yau   Control and optimization over wireless
                                  networks . . . . . . . . . . . . . . . . 1771--1772
                  Ning Weng and   
                  I-Hung Li and   
                    Lucas Vespa   Information quality model and
                                  optimization for 802.15.4-based wireless
                                  sensor networks  . . . . . . . . . . . . 1773--1783
                Rabun Kosar and   
              Ilir Bojaxhiu and   
                 Ertan Onur and   
                      Cem Ersoy   Lifetime extension for surveillance
                                  wireless sensor networks with
                                  intelligent redeployment . . . . . . . . 1784--1793
              Wahabou Abdou and   
             Adrien Henriet and   
           Christelle Bloch and   
         Dominique Dhoutaut and   
             Damien Charlet and   
          François Spies   Using an evolutionary algorithm to
                                  optimize the broadcasting methods in
                                  mobile ad hoc networks . . . . . . . . . 1794--1804
             Dang Tu Nguyen and   
                  Wook Choi and   
              Minh Thiep Ha and   
                 Hyunseung Choo   Design and analysis of a multi-candidate
                                  selection scheme for greedy routing in
                                  wireless sensor networks . . . . . . . . 1805--1817
                 Wenjia Liu and   
                        Bo Chen   Optimal control of mobile monitoring
                                  agents in immune-inspired wireless
                                  monitoring networks  . . . . . . . . . . 1818--1826
                  Qing Chen and   
       Zubair Md. Fadlullah and   
               Xiaodong Lin and   
                       Nei Kato   A clique-based secure admission control
                                  scheme for mobile ad hoc networks
                                  (MANETs) . . . . . . . . . . . . . . . . 1827--1835
          Bader Al-Manthari and   
               Nidal Nasser and   
              Najah Abu Ali and   
               Hossam Hassanein   Congestion prevention in broadband
                                  wireless access systems: an economic
                                  approach . . . . . . . . . . . . . . . . 1836--1847
                Jihoon Ryoo and   
                   Hwangnam Kim   Multi-sector multi-range control for
                                  self-organizing wireless networks  . . . 1848--1860
                Zhaoming Lu and   
                   Yan Yang and   
              Xiangming Wen and   
                    Ying Ju and   
                      Wei Zheng   A cross-layer resource allocation scheme
                                  for ICIC in LTE-Advanced . . . . . . . . 1861--1868
              M. Jahanshahi and   
                 M. Dehghan and   
                  M. R. Meybodi   A mathematical formulation for joint
                                  channel assignment and multicast routing
                                  in multi-channel multi-radio wireless
                                  mesh networks  . . . . . . . . . . . . . 1869--1882
Juan Rodríguez-Covili and   
            Sergio F. Ochoa and   
        José A. Pino and   
              Roc Messeguer and   
              Esunly Medina and   
                    Dolors Royo   A communication infrastructure to ease
                                  the development of mobile collaborative
                                  applications . . . . . . . . . . . . . . 1883--1893
                     Bin Li and   
                 Zheng Zhou and   
                  Dejian Li and   
                     Weixia Zou   A novel Parzen probabilistic neural
                                  network based noncoherent detection
                                  algorithm for distributed ultra-wideband
                                  sensors  . . . . . . . . . . . . . . . . 1894--1902
                 Kyusuk Han and   
              Youngjoon Seo and   
              Sungjune Yoon and   
  James J. (Jong Hyuk) Park and   
                   Taeshik Shon   Providing security vertical handoff in
                                  SARAH for heterogeneous networks . . . . 1903--1907
              Muhammad Ayaz and   
                 Imran Baig and   
            Azween Abdullah and   
                  Ibrahima Faye   A survey on routing techniques in
                                  underwater wireless sensor networks  . . 1908--1927
       Sarogini Grace Pease and   
                   Lin Guan and   
              Iain Phillips and   
                     Alan Grigg   Cross-layer signalling and middleware: a
                                  survey for inelastic soft real-time
                                  applications in MANETs . . . . . . . . . 1928--1941
       David Antolino Rivas and   
José M. Barceló-Ordinas and   
      Manel Guerrero Zapata and   
  Julián D. Morillo-Pozo   Security on VANETs: Privacy, misbehaving
                                  nodes, false information and secure data
                                  aggregation  . . . . . . . . . . . . . . 1942--1955
       Muhammad Azhar Iqbal and   
                    Bin Dai and   
             Benxiong Huang and   
                  A. Hassan and   
                        Shui Yu   Survey of network coding-aware routing
                                  protocols in wireless networks . . . . . 1956--1970
                M. Bakhouya and   
                   J. Gaber and   
                      P. Lorenz   An adaptive approach for information
                                  dissemination in Vehicular Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 1971--1978
                    Lu Leng and   
                   Jiashu Zhang   Dual-key-binding cancelable palmprint
                                  cryptosystem for palmprint protection
                                  and information security . . . . . . . . 1979--1989
           Jeremiah D. Deng and   
               Martin K. Purvis   Multi-core application performance
                                  optimization using a constrained tandem
                                  queueing model . . . . . . . . . . . . . 1990--1996
          Pedro M. Wightman and   
             Miguel A. Labrador   A family of simple distributed minimum
                                  connected dominating set-based topology
                                  construction algorithms  . . . . . . . . 1997--2010
       Sanjay Kumar Biswash and   
               Chiranjeev Kumar   An efficient metric-based (EM-B)
                                  location management scheme for wireless
                                  cellular networks  . . . . . . . . . . . 2011--2026
              Tzu-Chi Huang and   
                   Kuo-Chih Chu   Networking without Dynamic Host
                                  Configuration Protocol server in
                                  Ethernet and Wireless Local Area Network 2027--2041
      Maziar Ahmad Sharbafi and   
     Mohammad Javad Yazdanpanah   IDFC: a new approach to control
                                  bifurcation in TCP/RED . . . . . . . . . 2042--2050
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 35, Number 1, January, 2012

                      Anonymous   Contents list continued  . . . . . . . . II
               Weiming Shen and   
                Yinsheng Li and   
                     Anne James   Collaborative computing and applications 1--2
               Hugo Paredes and   
               F. Mario Martins   Social interaction regulation in virtual
                                  web environments using the Social
                                  Theatres model . . . . . . . . . . . . . 3--19
              Weizhan Zhang and   
              Qinghua Zheng and   
                  Haifei Li and   
                      Feng Tian   An overlay multicast protocol for live
                                  streaming and delay-guaranteed
                                  interactive media  . . . . . . . . . . . 20--28
                    Min Liu and   
                  Shijun Xu and   
                       Siyi Sun   An agent-assisted QoS-based routing
                                  algorithm for wireless sensor networks   29--36
       Tossaporn Srisooksai and   
          Kamol Keamarungsi and   
         Poonlap Lamsrichan and   
                Kiyomichi Araki   Practical data compression in wireless
                                  sensor networks: a survey  . . . . . . . 37--59
                Junzhou Luo and   
              Xiaogang Wang and   
                      Ming Yang   An interval centroid based spread
                                  spectrum watermarking scheme for
                                  multi-flow traceback . . . . . . . . . . 60--71
               Kyuyong Shin and   
              Douglas S. Reeves   Winnowing: Protecting P2P systems
                                  against pollution through cooperative
                                  index filtering  . . . . . . . . . . . . 72--84
               Guoqiang Gao and   
                 Ruixuan Li and   
                 Kunmei Wen and   
                        Xiwu Gu   Proactive replication for rare objects
                                  in unstructured peer-to-peer networks    85--96
                  Kwanghoon Kim   A model-driven workflow fragmentation
                                  framework for collaborative workflow
                                  architectures and systems  . . . . . . . 97--110
                 Junpeng Du and   
                Shikai Jing and   
                     Jihong Liu   Creating shared design thinking process
                                  for collaborative design . . . . . . . . 111--120
                Yunjiao Xue and   
         Hamada H. Ghenniwa and   
                   Weiming Shen   Frame-based ontological view for
                                  semantic integration . . . . . . . . . . 121--131
                 Hongbo Sun and   
                 Wenhui Fan and   
               Weiming Shen and   
                  Tianyuan Xiao   Ontology-based interoperation model of
                                  collaborative product development  . . . 132--144
Juan Rodríguez-Covili and   
            Sergio F. Ochoa and   
            José A. Pino   High level MANET protocol: Enhancing the
                                  communication support for mobile
                                  collaborative work . . . . . . . . . . . 145--155
                 Yuqing Sun and   
         Dickson K. W. Chiu and   
                   Bin Gong and   
               Xiangxu Meng and   
                     Peng Zhang   Scheduling mobile collaborating
                                  workforce for multiple urgent events . . 156--163
  Fabrício Enembreck and   
Jean-Paul André Barth\`es   Distributed constraint optimization with
                                  MULBS: a case study on collaborative
                                  meeting scheduling . . . . . . . . . . . 164--175
Mar Pérez-Sanagustín and   
   Gustavo Ramirez-Gonzalez and   
Davinia Hernández-Leo and   
Mario Muñoz-Organero and   
            Patricia Santos and   
                 Josep Blat and   
           Carlos Delgado Kloos   Discovering the campus together: a
                                  mobile and computer-based learning
                                  experience . . . . . . . . . . . . . . . 176--188
        Adriana S. Vivacqua and   
            Marcos R. S. Borges   Taking advantage of collective knowledge
                                  in emergency response systems  . . . . . 189--198
          Amir Talaei-Khoei and   
                Pradeep Ray and   
       Nandan Parameshwaran and   
                    Lundy Lewis   A framework for awareness maintenance    199--210
         Jameela Al-Jaroodi and   
                  Nader Mohamed   Service-oriented middleware: a survey    211--220
     Rajashekhar C. Biradar and   
            Sunilkumar S. Manvi   Review of multicast routing mechanisms
                                  in mobile ad hoc networks  . . . . . . . 221--239
                Xianhui Che and   
                       Barry Ip   Packet-level traffic analysis of online
                                  games from the genre characteristics
                                  perspective  . . . . . . . . . . . . . . 240--252
          Kok-Lim Alvin Yau and   
          Peter Komisarczuk and   
                   Paul D. Teal   Reinforcement learning for context
                                  awareness and intelligence in wireless
                                  networks: Review, new features and open
                                  issues . . . . . . . . . . . . . . . . . 253--267
               Mawloud Omar and   
             Yacine Challal and   
        Abdelmadjid Bouabdallah   Certification-based trust models in
                                  mobile ad hoc networks: a survey and
                                  taxonomy . . . . . . . . . . . . . . . . 268--286
       Eleftherios Stergiou and   
               John Garofalakis   Performance estimation of banyan semi
                                  layer networks with drop resolution
                                  mechanism  . . . . . . . . . . . . . . . 287--294
           Ibrahim Al-Surmi and   
             Mohamed Othman and   
           Borhanuddin Mohd Ali   Mobility management for IP-based next
                                  generation mobile networks: Review,
                                  challenge and perspective  . . . . . . . 295--315
                 Feng Zhong and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Adaptive load balancing algorithm for
                                  multiple homing mobile nodes . . . . . . 316--327
       Marinho P. Barcellos and   
         Rodolfo S. Antunes and   
         Hisham H. Muhammad and   
          Ruthiano S. Munaretti   Beyond network simulators: Fostering
                                  novel distributed applications and
                                  protocols through extendible design  . . 328--339
                   Fagen Li and   
      Muhammad Khurram Khan and   
          Khaled Alghathbar and   
                Tsuyoshi Takagi   Identity-based online/offline
                                  signcryption for low power devices . . . 340--347
                 Walid Saad and   
                 Zaher Dawy and   
             Sanaa Sharafeddine   A utility-based algorithm for joint
                                  uplink/downlink scheduling in wireless
                                  cellular networks  . . . . . . . . . . . 348--356
                       Jing Nie   IPv6 based relay gateway protocol in
                                  hybrid networks  . . . . . . . . . . . . 357--364
          Dhiah Al-Shammary and   
                 Ibrahim Khalil   Redundancy-aware SOAP messages
                                  compression and aggregation for enhanced
                                  performance  . . . . . . . . . . . . . . 365--381
      Eduardo Cañete and   
                 Jaime Chen and   
            R. Marcos Luque and   
         Bartolomé Rubio   NeuralSens: a neural network based
                                  framework to allow dynamic adaptation in
                                  wireless sensor and actor networks . . . 382--393
     Mohammad Javad Rostami and   
Azadeh Alsadat Emrani Zarandi and   
     Seyed Mohamad Hoseininasab   MSDP with ACO: a maximal SRLG disjoint
                                  routing algorithm based on ant colony
                                  optimization . . . . . . . . . . . . . . 394--402
            Ronald Beaubrun and   
      Jhon-Fredy Llano-Ruiz and   
             Benoit Poirier and   
             Alejandro Quintero   A middleware architecture for
                                  disseminating delay-constrained
                                  information in wireless sensor networks  403--411
    Jasma Balasangameshwara and   
             Nedunchezhian Raju   A hybrid policy for fault tolerant load
                                  balancing in grid computing environments 412--422
                  Tzu-Chi Huang   Program Ultra-Dispatcher for launching
                                  applications in a customization manner
                                  on cloud computing . . . . . . . . . . . 423--446
                Chao-Tsun Chang   Hash caching mechanism in source-based
                                  routing for wireless ad hoc networks . . 447--458
                Sajjad Zare and   
       Akbar Ghaffarpour Rahbar   An FEC scheme combined with weighted
                                  scheduling to reduce multicast packet
                                  loss in IPTV over PON  . . . . . . . . . 459--468
                  Jun Huang and   
             Xiaohong Huang and   
                         Yan Ma   Routing with multiple
                                  quality-of-services constraints: an
                                  approximation perspective  . . . . . . . 469--479
             Serif Bahtiyar and   
    Mehmet Ufuk Çaglayan   Extracting trust information from
                                  security system of a service . . . . . . 480--490
               Jorge Blasco and   
Julio Cesar Hernandez-Castro and   
José María de Fuentes and   
          Benjamín Ramos   A framework for avoiding steganography
                                  usage over HTTP  . . . . . . . . . . . . 491--501
                    Bing Hu and   
              Kwan L. Yeung and   
                 Zhaoyang Zhang   Load-balanced three-stage switch . . . . 502--509
           Ioannis Krikidis and   
               John S. Thompson   MIMO two-way relay channel with
                                  superposition coding and imperfect
                                  channel estimation . . . . . . . . . . . 510--516
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 2, March, 2012

           Mesut Günes and   
                      Yan Zhang   In memory of Mieso Denko . . . . . . . . 517
              Ming-Tuo Zhou and   
                 Hiroshi Harada   Cognitive maritime wireless mesh/ad hoc
                                  networks . . . . . . . . . . . . . . . . 518--526
       Theofanis P. Lambrou and   
         Christos G. Panayiotou   A testbed for coverage control using
                                  mixed wireless sensor networks . . . . . 527--537
            Joachim Fischer and   
         Jens-Peter Redlich and   
              Jochen Zschau and   
            Claus Milkereit and   
             Matteo Picozzi and   
              Kevin Fleming and   
            Mihal Brumbulli and   
       Björn Lichtblau and   
                Ingmar Eveslage   A wireless mesh sensing network for
                                  early warning  . . . . . . . . . . . . . 538--547
      Evangelos Theodoridis and   
    Ioannis Chatzigiannakis and   
                  Stefan Dulman   Post-processing in wireless sensor
                                  networks: Benchmarking sensor trace
                                  files for in-network data aggregation    548--561
       Iván Corredor and   
José F. Martínez and   
         Miguel S. Familiar and   
           Lourdes López   Knowledge-Aware and Service-Oriented
                                  Middleware for deploying pervasive
                                  services . . . . . . . . . . . . . . . . 562--576
                    Bo Yang and   
             Manohar Mareboyana   Similarity search in sensor networks
                                  using semantic-based caching . . . . . . 577--583
            Mari Carmen Domingo   An overview of the Internet of Things
                                  for people with disabilities . . . . . . 584--596
               Sajjad Rizvi and   
     Hassaan Khaliq Qureshi and   
            Syed Ali Khayam and   
          Veselin Rakocevic and   
        Muttukrishnan Rajarajan   A1: an energy efficient topology control
                                  algorithm for connected area coverage in
                                  wireless sensor networks . . . . . . . . 597--605
          Malabika Sengupta and   
        Swapan Kumar Mondal and   
                  Debashis Saha   A comparison of wavelength reservation
                                  protocols for WDM optical networks . . . 606--618
                  Chuan Zhu and   
              Chunlin Zheng and   
                    Lei Shu and   
                   Guangjie Han   A survey on coverage and connectivity
                                  issues in wireless sensor networks . . . 619--632
                Jingyu Wang and   
               Jianxin Liao and   
                    Tonghong Li   OSIA: Out-of-order Scheduling for
                                  In-order Arriving in concurrent
                                  multi-path transfer  . . . . . . . . . . 633--643
         Sanaa Sharafeddine and   
          Ibrahim Al-Kassem and   
                     Zaher Dawy   A scatternet formation algorithm for
                                  Bluetooth networks with a non-uniform
                                  distribution of devices  . . . . . . . . 644--656
               Wenjie Zhang and   
                  Chai Kiat Yeo   Throughput and delay scaling laws for
                                  mobile overlaid wireless networks  . . . 657--667
                Hoda Hassan and   
             Mohamed Eltoweissy   CORM: a reference model for future
                                  computer networks  . . . . . . . . . . . 668--680
           Nicola Cordeschi and   
          Tatiana Patriarca and   
                Enzo Baccarelli   Stochastic traffic engineering for
                                  real-time applications over wireless
                                  networks . . . . . . . . . . . . . . . . 681--694
           Francisco Jurado and   
          Miguel A. Redondo and   
                  Manuel Ortega   Using fuzzy logic applied to software
                                  metrics and test cases to assess
                                  programming assignments and give advice  695--712
              Golnaz Vakili and   
              Siavash Khorsandi   Coordination of cooperation policies in
                                  a peer-to-peer system using swarm-based
                                  RL . . . . . . . . . . . . . . . . . . . 713--722
               Radim Burget and   
                Dan Komosny and   
           Kathiravelu Ganeshan   Topology aware feedback transmission for
                                  real-time control protocol . . . . . . . 723--730
       Mahboobeh Sedighizad and   
                Babak Seyfe and   
                  Keivan Navaie   MR-BART: Multi-Rate Available Bandwidth
                                  Estimation in Real-Time  . . . . . . . . 731--742
                 Yi-hua Zhu and   
                     Hui Xu and   
                Kai-kai Chi and   
                         Hua Hu   Accumulating error-free frame blocks to
                                  improve throughput for IEEE 802.11-based
                                  WLAN . . . . . . . . . . . . . . . . . . 743--752
         Carlos T. Calafate and   
          Giancarlo Fortino and   
             Sascha Fritsch and   
             Janio Monteiro and   
           Juan-Carlos Cano and   
                 Pietro Manzoni   An efficient and robust content delivery
                                  solution for IEEE 802.11p vehicular
                                  environments . . . . . . . . . . . . . . 753--762
                   Xiong Li and   
             Yongping Xiong and   
                    Jian Ma and   
                   Wendong Wang   An efficient and security dynamic
                                  identity based authentication protocol
                                  for multi-server architecture using
                                  smart cards  . . . . . . . . . . . . . . 763--769
              Min-Feng Wang and   
             Meng-Feng Tsai and   
             Sie-Long Jheng and   
               Cheng-Hsien Tang   Social feature-based enterprise email
                                  classification without examining email
                                  contents . . . . . . . . . . . . . . . . 770--777
              Waltenegus Dargie   A medium access control protocol that
                                  supports a seamless handover in wireless
                                  sensor networks  . . . . . . . . . . . . 778--786
        Rajesh Karunamurthy and   
             Ferhat Khendek and   
                 Roch H. Glitho   A novel architecture for Web service
                                  composition  . . . . . . . . . . . . . . 787--802
       Georgios Kastaniotis and   
              Elias Maragos and   
        Christos Douligeris and   
           Dimitris K. Despotis   Using data envelopment analysis to
                                  evaluate the efficiency of web caching
                                  object replacement strategies  . . . . . 803--817
               Wen-Hwa Liao and   
                 Hung-Chun Yang   A power-saving data storage scheme for
                                  wireless sensor networks . . . . . . . . 818--825
              Gildas Avoine and   
             Xavier Carpent and   
                Benjamin Martin   Privacy-friendly synchronized
                                  ultralightweight authentication
                                  protocols in the storm . . . . . . . . . 826--843
             Muhammad Imran and   
             Mohamed Younis and   
               Abas Md Said and   
               Halabi Hasbullah   Localized motion-based connectivity
                                  restoration algorithms for wireless
                                  sensor and actor networks  . . . . . . . 844--856
         Mohit P. Tahiliani and   
                 K. C. Shet and   
               T. G. Basavaraju   CARED: Cautious Adaptive RED gateways
                                  for TCP/IP networks  . . . . . . . . . . 857--864
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 3, May, 2012

           Laurence T. Yang and   
                    Guojun Wang   Special issue on trusted computing and
                                  communications . . . . . . . . . . . . . 865--866
                   Yanli Yu and   
                   Keqiu Li and   
                Wanlei Zhou and   
                        Ping Li   Trust mechanisms in wireless sensor
                                  networks: Attack analysis and
                                  countermeasures  . . . . . . . . . . . . 867--880
                  Lei Jiang and   
                 Lixin Ding and   
                Jianxun Liu and   
                    Jinjun Chen   Reputation rating modeling for open
                                  environment lack of communication by
                                  using online social cognition  . . . . . 881--891
             Weizhong Qiang and   
     Aleksandr Konstantinov and   
                 Deqing Zou and   
               Laurence T. Yang   A standards-based interoperable single
                                  sign-on framework in ARC Grid middleware 892--904
              Zhongtian Jia and   
               Xiaodong Lin and   
               Seng-Hua Tan and   
                 Lixiang Li and   
                    Yixian Yang   Public key distribution scheme for delay
                                  tolerant networks based on two-channel
                                  cryptography . . . . . . . . . . . . . . 905--913
                   Fei Wang and   
                Furong Wang and   
             Benxiong Huang and   
               Laurence T. Yang   SONR: a reliable reputation system of
                                  self-organized network . . . . . . . . . 914--926
                    Qin Liu and   
                Guojun Wang and   
                         Jie Wu   Secure and privacy preserving keyword
                                  searching for cloud storage services . . 927--933
Félix Gómez Mármol and   
Gregorio Martínez Pérez   TRIP, a trust and reputation
                                  infrastructure-based proposal for
                                  vehicular ad hoc networks  . . . . . . . 934--941
      Mohammad-Amin Kharraz and   
         Hamid Sarbazi-Azad and   
               Albert Y. Zomaya   On-demand multicast routing protocol
                                  with efficient route discovery . . . . . 942--950
                Huanyu Zhao and   
                   Xin Yang and   
                     Xiaolin Li   An incentive mechanism to reinforce
                                  truthful reports in reputation systems   951--961
               Laiping Zhao and   
                  Yizhi Ren and   
                 Mingchu Li and   
                Kouichi Sakurai   Flexible service selection with
                                  user-specific QoS support in
                                  service-oriented architecture  . . . . . 962--973
                   Liang Gu and   
              Guangdong Bai and   
                    Yao Guo and   
              Xiangqun Chen and   
                       Hong Mei   Security model oriented attestation on
                                  dynamically reconfigurable
                                  component-based systems  . . . . . . . . 974--981
                   Min Choi and   
             Jong Hyuk Park and   
                Seungho Lim and   
                Young-Sik Jeong   Achieving reliable system performance by
                                  fast recovery of branch miss prediction  982--991
                    Yu Wang and   
                 Yang Xiang and   
                Wanlei Zhou and   
                   Shunzheng Yu   Generating regular expression signatures
                                  for network traffic classification in
                                  trusted network management . . . . . . . 992--1000
                Jin-Hee Cho and   
            Ananthram Swami and   
                   Ing-Ray Chen   Modeling and analysis of trust
                                  management with trust chain optimization
                                  in mobile ad hoc networks  . . . . . . . 1001--1012
             Ousmane Diallo and   
    Joel J. P. C. Rodrigues and   
                     Mbaye Sene   Real-time data management on wireless
                                  sensor networks: a survey  . . . . . . . 1013--1021
                Wen Tao Zhu and   
              Jianying Zhou and   
             Robert H. Deng and   
                       Feng Bao   Detecting node replication attacks in
                                  wireless sensor networks: a survey . . . 1022--1034
                  Jihao Yin and   
                 Yifei Wang and   
                     Jiankun Hu   Free Search with Adaptive Differential
                                  Evolution Exploitation and
                                  Quantum-Inspired Exploration . . . . . . 1035--1051
                  Panho Lee and   
        Anura P. Jayasumana and   
     H. M. N. Dilum Bandara and   
                Sanghun Lim and   
                V. Chandrasekar   A peer-to-peer collaboration framework
                                  for multi-sensor data fusion . . . . . . 1052--1066
              Chao-Yang Lee and   
               Shou-Jen Lin and   
               Chen-Wei Lee and   
                  Chu-Sing Yang   An efficient continuous tracking system
                                  in real-time surveillance application    1067--1073
     Rajashekhar C. Biradar and   
            Sunilkumar S. Manvi   Neighbor supported reliable multipath
                                  multicast routing in MANETs  . . . . . . 1074--1085
      Jesús Gallardo and   
           Crescencio Bravo and   
              Miguel A. Redondo   A model-driven development method for
                                  collaborative modeling tools . . . . . . 1086--1105
             S. Suraprasert and   
              J. Fakcharoenphol   Comparison of recovery schemes to
                                  maximize restorable throughput in
                                  multicast networks . . . . . . . . . . . 1106--1115
Bettahally N. Keshavamurthy and   
            Durga Toshniwal and   
              Bhavani K. Eshwar   Hiding co-occurring prioritized
                                  sensitive patterns over distributed
                                  progressive sequential data streams  . . 1116--1129
      Abderrahmane Baadache and   
                   Ali Belmehdi   Fighting against packet dropping
                                  misbehavior in multi-hop wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1130--1139
           M. C. Batistatos and   
              G. V. Tsoulos and   
             G. E. Athanasiadou   Mobile telemedicine for moving vehicle
                                  scenarios: Wireless technology options
                                  and challenges . . . . . . . . . . . . . 1140--1150
                 Zubair A. Baig   Multi-agent systems for protecting
                                  critical infrastructures: a survey . . . 1151--1161
             Abhik Banerjee and   
             Chuan Heng Foh and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   Performance improvements for
                                  network-wide broadcast with
                                  instantaneous network information  . . . 1162--1174
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 4, July, 2012

              Alfredo Cuzzocrea   Intelligent algorithms for data-centric
                                  sensor networks  . . . . . . . . . . . . 1175--1176
          Aris Papadopoulos and   
            Alfredo Navarra and   
            Julie A. McCann and   
            Cristina M. Pinotti   VIBE: an energy efficient routing
                                  protocol for dense and mobile sensor
                                  networks . . . . . . . . . . . . . . . . 1177--1190
              Mark Roantree and   
                    Jie Shi and   
           Paolo Cappellari and   
         Martin F. O'Connor and   
             Michael Whelan and   
                    Niall Moyna   Data transformation and query management
                                  in personal health sensor networks . . . 1191--1202
           Paolo Bellavista and   
           Giuseppe Cardone and   
            Antonio Corradi and   
                  Luca Foschini   The Future Internet convergence of IMS
                                  and ubiquitous smart environments: an
                                  IMS-based solution for energy efficiency 1203--1209
          Alfredo Cuzzocrea and   
       Alexis Papadimitriou and   
         Dimitrios Katsaros and   
            Yannis Manolopoulos   Edge betweenness centrality: a novel
                                  algorithm for QoS-based topology control
                                  over wireless sensor networks  . . . . . 1210--1217
              Gianluca Moro and   
                 Gabriele Monti   W-Grid: a scalable and efficient
                                  self-organizing infrastructure for
                                  multi-dimensional data management,
                                  querying and routing in wireless
                                  data-centric sensor networks . . . . . . 1218--1234
             R. Madhusudhan and   
                   R. C. Mittal   Dynamic ID-based remote user password
                                  authentication schemes using smart
                                  cards: a review  . . . . . . . . . . . . 1235--1248
             Jan von Mulert and   
                  Ian Welch and   
             Winston K. G. Seah   Security threats and solutions in
                                  MANETs: a case study using AODV and
                                  SAODV  . . . . . . . . . . . . . . . . . 1249--1259
             Chien-Fu Cheng and   
                  Kuo-Tang Tsai   Eventual strong consensus with fault
                                  detection in the presence of dual
                                  failure mode on processors under dynamic
                                  networks . . . . . . . . . . . . . . . . 1260--1276
               Dong Kun Noh and   
                    Junbeom Hur   Using a dynamic backbone for efficient
                                  data delivery in solar-powered WSNs  . . 1277--1284
              Longxiang Gao and   
                    Ming Li and   
              Alessio Bonti and   
                Wanlei Zhou and   
                        Shui Yu   $M$-Dimension: Multi-characteristics
                                  based routing protocol in human
                                  associated delay-tolerant networks with
                                  improved performance over one
                                  dimensional classic models . . . . . . . 1285--1296
             Najme Mansouri and   
   Gholam Hosein Dastghaibyfard   A dynamic replica management strategy in
                                  data grid  . . . . . . . . . . . . . . . 1297--1303
          Kenneth J. Turner and   
            Koon Leai Larry Tan   Rigorous development of composite grid
                                  services . . . . . . . . . . . . . . . . 1304--1316
      Mustapha Reda Senouci and   
         Abdelhamid Mellouk and   
               Hadj Senouci and   
                   Amar Aissani   Performance evaluation of network
                                  lifetime spatial-temporal distribution
                                  for WSN routing protocols  . . . . . . . 1317--1328
         Hassen A. Mogaibel and   
             Mohamed Othman and   
        Shamala Subramaniam and   
    Nor Asilah Wati Abdul Hamid   On-demand channel reservation scheme for
                                  common traffic in wireless mesh networks 1329--1351
      Elizabeth A. Thompson and   
                Nathan Clem and   
            Isaac Renninger and   
                   Timothy Loos   Software-defined GPS receiver on
                                  USRP-platform  . . . . . . . . . . . . . 1352--1360
       Ameen M. Alkharasani and   
                 Mohamed Othman   M$^2$I$^2$ tswTCM: a new efficient
                                  optimization marker algorithm to improve
                                  fairness bandwidth in DiffServ networks  1361--1366
                  Miao Zhou and   
                      Yi Mu and   
               Willy Susilo and   
                    Jun Yan and   
                      Liju Dong   Privacy enhanced data outsourcing in the
                                  cloud  . . . . . . . . . . . . . . . . . 1367--1373
Bettahally N. Keshavamurthy and   
            Durga Toshniwal and   
              Bhavani K. Eshwar   Corrigendum to ``Hiding co-occurring
                                  prioritized sensitive patterns over
                                  distributed progressive sequential data
                                  streams'' [J. Network Comput. Appl. \bf
                                  35 (3) (2012) 1116--1129]  . . . . . . . 1374
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 5, September, 2012

           Paolo Bellavista and   
              Chi-Ming Chen and   
               Hossam Hassanein   Special issue on service delivery
                                  management in broadband networks . . . . 1375--1376
      Djamal-Eddine Meddour and   
         Alaeddine Abdallah and   
               Toufik Ahmed and   
                  Raouf Boutaba   A cross layer architecture for multicast
                                  and unicast video transmission in mobile
                                  broadband networks . . . . . . . . . . . 1377--1391
      Cristiano Bonato Both and   
Clarissa Cassales Marquezan and   
               Rafael Kunst and   
Lisandro Zambenedetti Granville and   
                 Juergen Rochol   A self-adapting connection admission
                                  control solution for mobile WiMAX:
                                  Enabling dynamic switching of admission
                                  control algorithms based on predominant
                                  network usage profiles . . . . . . . . . 1392--1401
             Giuseppe Aceto and   
              Alessio Botta and   
     Antonio Pescapé and   
             Maurizio D'Arienzo   Unified architecture for network
                                  measurement: the case of available
                                  bandwidth  . . . . . . . . . . . . . . . 1402--1414
                Werner Sandmann   Delays in a series of queues with
                                  correlated service times . . . . . . . . 1415--1423
          Kaouther Abrougui and   
         Azzedine Boukerche and   
                 Hussam Ramadan   Performance evaluation of an efficient
                                  fault tolerant service discovery
                                  protocol for vehicular networks  . . . . 1424--1435
              Nassima Hadid and   
          Alexandre Guitton and   
                  Michel Misson   Exploiting a meeting channel to
                                  interconnect mobile robots . . . . . . . 1436--1445
            Christos Bouras and   
           Vassilis Poulopoulos   Enhancing meta-portals using dynamic
                                  user context personalization techniques  1446--1453
              Ahmed A. Mosa and   
           Aisha H. Abdalla and   
                Rashid A. Saeed   Evaluation of MANEMO route optimization
                                  schemes  . . . . . . . . . . . . . . . . 1454--1472
        A. Ruiz-Martínez   A survey on solutions and main free
                                  tools for privacy enhancing Web
                                  communications . . . . . . . . . . . . . 1473--1492
           Mohammad Masdari and   
           Mehdi Maleknasab and   
                  Moazam Bidaki   A survey and taxonomy of name systems in
                                  mobile ad hoc networks . . . . . . . . . 1493--1507
      Adamu Murtala Zungeru and   
                Li-Minn Ang and   
                 Kah Phooi Seng   Classical and swarm intelligence based
                                  routing protocols for wireless sensor
                                  networks: a survey and comparison  . . . 1508--1536
                  Liang Liu and   
               Xiao-Lin Qin and   
                 Gui-Neng Zheng   Reliable spatial window aggregation
                                  query processing algorithm in wireless
                                  sensor networks  . . . . . . . . . . . . 1537--1547
     Kranthi K. Mamidisetty and   
         Michael J. Ferrara and   
              Shivakumar Sastry   Systematic selection of cluster heads
                                  for data collection  . . . . . . . . . . 1548--1558
                   Rosen Ivanov   Real-time GPS track simplification
                                  algorithm for outdoor navigation of
                                  visually impaired  . . . . . . . . . . . 1559--1567
                     Yun He and   
            Zhongyang Xiong and   
               Yufang Zhang and   
                Xiaolin Tan and   
                     Zhixing Li   Modeling and analysis of multi-channel
                                  P2P VoD systems  . . . . . . . . . . . . 1568--1578
        Patrick Battistello and   
      Joaquin Garcia-Alfaro and   
    Cyril Delétré   Transaction-based authentication and key
                                  agreement protocol for inter-domain VoIP 1579--1597
               Samia A. Ali and   
          Khaled M. Shaaban and   
             Islam M. Alkabbany   Distributed patching for mobile wireless
                                  sensor networks  . . . . . . . . . . . . 1598--1605
                Jipeng Zhou and   
                Liyang Peng and   
                 Yuhui Deng and   
                     Jianzhu Lu   An on-demand routing protocol for
                                  improving channel use efficiency in
                                  multichannel ad hoc networks . . . . . . 1606--1614
                 Seiven Leu and   
              Ruay-Shiung Chang   A weight-value algorithm for finding
                                  connected dominating sets in a MANET . . 1615--1619
         Bert Vankeirsbilck and   
            Dieter Verslype and   
           Nicolas Staelens and   
             Pieter Simoens and   
             Chris Develder and   
                Bart Dhoedt and   
             Filip De Turck and   
                 Piet Demeester   Automatic fine-grained area detection
                                  for thin client systems  . . . . . . . . 1620--1632
        Javad Akbari Torkestani   Mobility prediction in mobile wireless
                                  networks . . . . . . . . . . . . . . . . 1633--1645
            Ashok Kumar Das and   
              Pranay Sharma and   
         Santanu Chatterjee and   
              Jamuna Kanta Sing   A dynamic password-based user
                                  authentication scheme for hierarchical
                                  wireless sensor networks . . . . . . . . 1646--1656
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 35, Number 6, November, 2012

            Peer Azmat Shah and   
            Muhammad Yousaf and   
                Amir Qayyum and   
            Halabi B. Hasbullah   Performance comparison of end-to-end
                                  mobility management protocols for TCP    1657--1673
          Allen L. Ramaboli and   
          Olabisi E. Falowo and   
                Anthony H. Chan   Bandwidth aggregation in heterogeneous
                                  wireless networks: a survey of current
                                  approaches and issues  . . . . . . . . . 1674--1690
               Sazia Parvin and   
    Farookh Khadeer Hussain and   
       Omar Khadeer Hussain and   
                   Song Han and   
                Biming Tian and   
                Elizabeth Chang   Cognitive radio network security: a
                                  survey . . . . . . . . . . . . . . . . . 1691--1708
              Shajulin Benedict   Energy-aware performance analysis
                                  methodologies for HPC architectures ---
                                  an exploratory study . . . . . . . . . . 1709--1719
              Tarek Moulahi and   
                Salem Nasri and   
          Hervé Guyennet   Broadcasting based on dominated
                                  connecting sets with MPR in a realistic
                                  environment for WSNs & ad hoc . . . . . . 1720--1727
               JungYul Choi and   
                Min-Gon Kim and   
              Hongkyu Jeong and   
                 Hong-Shik Park   Power-saving mechanisms for energy
                                  efficient IEEE 802.16e/m . . . . . . . . 1728--1739
                  Jihao Yin and   
               Chongyang Fu and   
                     Jiankun Hu   Using incremental subspace and contour
                                  template for object tracking . . . . . . 1740--1748
           Hamid Shokrzadeh and   
          Siavash Khorsandi and   
     Abolfazl Toroghi Haghighat   Optimized query-driven appointment
                                  routing based on
                                  Expectation-Maximization in wireless
                                  sensor networks  . . . . . . . . . . . . 1749--1761
            Kwangcheol Shin and   
               Kyungjun Kim and   
                    Soontae Kim   Traffic management strategy for
                                  delay-tolerant networks  . . . . . . . . 1762--1770
          M. S. Kakkasageri and   
                    S. S. Manvi   Multiagent driven dynamic clustering of
                                  vehicles in VANETs . . . . . . . . . . . 1771--1780
    Alexandre Aguiar Amaral and   
Bruno Bogaz Zarpelão and   
   Leonardo de Souza Mendes and   
Joel José Puga Coelho Rodrigues and   
Mario Lemes Proença Junior   Inference of network anomaly propagation
                                  using spatio-temporal correlation  . . . 1781--1792
                     Q. Shi and   
                   N. Zhang and   
             D. Llewellyn-Jones   Efficient autonomous signature exchange
                                  on ubiquitous networks . . . . . . . . . 1793--1806
        Victoria Ying Zhang and   
            Albert Kai-sun Wong   Kernel-based particle filtering for
                                  indoor tracking in WLANs . . . . . . . . 1807--1817
                Mourad Amad and   
              Ahmed Meddahi and   
          Djamil A\"\issani and   
                  Zonghua Zhang   HPM: a novel hierarchical Peer-to-Peer
                                  model for lookup acceleration with
                                  provision of physical proximity  . . . . 1818--1830
                Sandeep K. Sood   A combined approach to ensure data
                                  security in cloud computing  . . . . . . 1831--1838
                     Zuowen Tan   A lightweight conditional
                                  privacy-preserving authentication and
                                  access control scheme for pervasive
                                  computing environments . . . . . . . . . 1839--1846
                    Bo Dong and   
              Qinghua Zheng and   
                  Feng Tian and   
              Kuo-Ming Chao and   
                     Rui Ma and   
                   Rachid Anane   An optimized approach for storing and
                                  accessing small files on cloud storage   1847--1862
           Rafael Antonello and   
           Stenio Fernandes and   
           Carlos Kamienski and   
               Djamel Sadok and   
              Judith Kelner and   
 István Gódor and   
   Géza Szabó and   
                  Tord Westholm   Deep packet inspection tools and
                                  techniques in commodity platforms:
                                  Challenges and trends  . . . . . . . . . 1863--1878
            Mari Carmen Domingo   An overview of the Internet of
                                  underwater things  . . . . . . . . . . . 1879--1890
          Javier Barrachina and   
             Piedad Garrido and   
               Manuel Fogue and   
      Francisco J. Martinez and   
           Juan-Carlos Cano and   
         Carlos T. Calafate and   
                 Pietro Manzoni   VEACON: a Vehicular Accident Ontology
                                  designed to improve safety on the roads  1891--1900
      Adamu Murtala Zungeru and   
                Li-Minn Ang and   
                 Kah Phooi Seng   Termite-hill: Performance optimized
                                  swarm intelligence based routing
                                  algorithm for wireless sensor networks   1901--1917
           Mohamed Bakillah and   
     Mir Abolfazl Mostafavi and   
          Steve H. L. Liang and   
                 Alexander Zipf   Real time query propagation strategies
                                  with Lightweight Coordination Calculus
                                  (LCC) for ad hoc networks of geospatial
                                  databases  . . . . . . . . . . . . . . . 1918--1933
                 G. Fortino and   
               A. Guerrieri and   
            G. M. P. O'Hare and   
                    A. Ruzzelli   A flexible building management framework
                                  based on wireless sensor and actuator
                                  networks . . . . . . . . . . . . . . . . 1934--1952
                Linfeng Liu and   
               Ruchuan Wang and   
                        Fu Xiao   Topology control algorithm for
                                  underwater wireless sensor networks
                                  using GPS-free mobile sensor nodes . . . 1953--1963
             Gurpreet Singh and   
               Neeraj Kumar and   
               Anil Kumar Verma   Ant colony algorithms in MANETs: a
                                  review . . . . . . . . . . . . . . . . . 1964--1972
                   S. Sudha and   
              N. Ammasaigounden   An aggregate marker for bandwidth
                                  fairness in DiffServ . . . . . . . . . . 1973--1978
                      Li Li and   
              Qing-Shan Jia and   
               Hengtao Wang and   
                 Ruixi Yuan and   
                  Xiaohong Guan   A systematic method for network topology
                                  reconfiguration with limited link
                                  additions  . . . . . . . . . . . . . . . 1979--1989
                Chih-Lin Hu and   
                    Tzu-Han Kuo   A hierarchical overlay with
                                  cluster-based reputation tree for
                                  dynamic peer-to-peer systems . . . . . . 1990--2002
  Miguel Franklin de Castro and   
         Levi Bayde Ribeiro and   
   Camila Helena Souza Oliveira   An autonomic bio-inspired algorithm for
                                  wireless sensor network
                                  self-organization and efficient routing  2003--2015
    Mohammad H. Hajiesmaili and   
             Ahmad Khonsari and   
                 Ali Sehati and   
         Mohammad Sadegh Talebi   Content-aware rate allocation for
                                  efficient video streaming via dynamic
                                  network utility maximization . . . . . . 2016--2027
        Javad Akbari Torkestani   A distributed resource discovery
                                  algorithm for P2P grids  . . . . . . . . 2028--2036
                  D. Gregor and   
                S. L. Toral and   
                   T. Ariza and   
                     F. Barrero   An ontology-based semantic service for
                                  cooperative urban equipments . . . . . . 2037--2050
              Qingyang Song and   
              Zhaolong Ning and   
              Shiqiang Wang and   
               Abbas Jamalipour   Link stability estimation based on link
                                  connectivity changes in mobile ad-hoc
                                  networks . . . . . . . . . . . . . . . . 2051--2058
       Süleyman Kardas and   
        Serkan Çelik and   
            Muhammet Yildiz and   
                    Albert Levi   PUF-enhanced offline RFID security and
                                  privacy  . . . . . . . . . . . . . . . . 2059--2067
          Khalid A. Darabkh and   
          Shereen S. Ismail and   
        Mohammad Al-Shurman and   
              Iyad F. Jafar and   
              Eman Alkhader and   
         Mamoun F. Al-Mistarihi   Performance evaluation of selective and
                                  adaptive heads clustering algorithms
                                  over wireless sensor networks  . . . . . 2068--2080
                     Yi Xie and   
                      J. Hu and   
                    S. Tang and   
                       X. Huang   A structural approach for modelling the
                                  hierarchical dynamic process of Web
                                  workload in a large-scale campus network 2081--2091
             Yuan-Cheng Lai and   
                  Yen-Hung Chen   A best block exploring algorithm for
                                  two-dimensional downlink burst
                                  construction in IEEE 802.16 networks . . 2092--2104
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 36, Number 1, January, 2013

          Abdelkrim Hadjidj and   
               Marion Souil and   
    Abdelmadjid Bouabdallah and   
             Yacine Challal and   
                     Henry Owen   Wireless sensor networks for
                                  rehabilitation applications: Challenges
                                  and opportunities  . . . . . . . . . . . 1--15
              Hung-Jen Liao and   
      Chun-Hung Richard Lin and   
              Ying-Chih Lin and   
                Kuang-Yuan Tung   Intrusion detection system: a
                                  comprehensive review . . . . . . . . . . 16--24
                Ahmed Patel and   
               Mona Taghavi and   
           Kaveh Bakhtiyari and   
Joaquim Celestino Júnior   An intrusion detection and prevention
                                  system in cloud computing: a systematic
                                  review . . . . . . . . . . . . . . . . . 25--41
                Chirag Modi and   
               Dhiren Patel and   
         Bhavesh Borisaniya and   
                Hiren Patel and   
                  Avi Patel and   
        Muttukrishnan Rajarajan   A survey of intrusion detection
                                  techniques in Cloud  . . . . . . . . . . 42--57
               Fadoua Mhiri and   
            Kaouthar Sethom and   
               Ridha Bouallegue   A survey on interference management
                                  techniques in femtocell self-organizing
                                  networks . . . . . . . . . . . . . . . . 58--65
          Md. Mahedi Hassan and   
                 Poo Kuan Hoong   Seamless handover integrated solution
                                  for video transmission over proxy mobile
                                  IPv6 in a micro mobility domain  . . . . 66--76
    Rodrigo Palucci Pantoni and   
          Dennis Brandão   A gradient based routing scheme for
                                  street lighting wireless sensor networks 77--90
            D. Satish Kumar and   
                   N. Nagarajan   Relay technologies and technical issues
                                  in IEEE 802.16j Mobile Multi-hop Relay
                                  (MMR) networks . . . . . . . . . . . . . 91--102
     Christos Emmanouilidis and   
   Remous-Aris Koutsiamanis and   
                Aimilia Tasidou   Mobile guides: Taxonomy of
                                  architectures, context awareness,
                                  technologies and applications  . . . . . 103--125
           Saleem-ullah Lar and   
                  Xiaofeng Liao   An initiative for a classified
                                  bibliography on TCP/IP congestion
                                  control  . . . . . . . . . . . . . . . . 126--133
   A. J. Dinusha Rathnayaka and   
           Vidyasagar M. Potdar   Wireless Sensor Network transport
                                  protocol: a critical review  . . . . . . 134--146
                Slimane Bah and   
                Roch Glitho and   
                Rachida Dssouli   A SIP servlets-based framework for
                                  service provisioning in stand-alone
                                  MANETs . . . . . . . . . . . . . . . . . 147--155
              Seung-Wan Han and   
              In-Seon Jeong and   
                  Seung-Ho Kang   Low latency and energy efficient routing
                                  tree for wireless sensor networks with
                                  multiple mobile sinks  . . . . . . . . . 156--166
               Junjie Xiong and   
               Yangfan Zhou and   
             Michael R. Lyu and   
               Evan F. Y. Young   MDiag: Mobility-assisted diagnosis for
                                  wireless sensor networks . . . . . . . . 167--177
                    Wen Tao Zhu   Towards secure and
                                  communication-efficient broadcast
                                  encryption systems . . . . . . . . . . . 178--186
                    Bing Hu and   
              Kwan L. Yeung and   
                 Zhaoyang Zhang   An efficient single-iteration single-bit
                                  request scheduling algorithm for
                                  input-queued switches  . . . . . . . . . 187--194
               Kemal Akkaya and   
           Izzet F. Senturk and   
            Shanthi Vemulapalli   Handling large-scale node failures in
                                  mobile sensor/robot networks . . . . . . 195--210
             Zhan-feng Wang and   
                  Ming Chen and   
             Chang-you Xing and   
                  Jing Feng and   
              Xiang-lin Wei and   
                     Hua-li Bai   Multi-manifold model of the Internet
                                  delay space  . . . . . . . . . . . . . . 211--218
              Jeroen Famaey and   
Frédéric Iterbeke and   
                Tim Wauters and   
                 Filip De Turck   Towards a predictive cache replacement
                                  strategy for multimedia content  . . . . 219--227
                   Huan Dai and   
               Zhao-min Zhu and   
                   Xiao-Feng Gu   Multi-target indoor localization and
                                  tracking on video monitoring system in a
                                  wireless sensor network  . . . . . . . . 228--234
               Adeela Waqar and   
                  Asad Raza and   
               Haider Abbas and   
          Muhammad Khurram Khan   A framework for preservation of cloud
                                  users' data privacy using dynamic
                                  reconstruction of metadata . . . . . . . 235--248
        Pekka Jäppinen and   
            Renata Guarneri and   
                Luis M. Correia   An applications perspective into the
                                  Future Internet  . . . . . . . . . . . . 249--254
Isabel de la Torre-Díez and   
Saúl Álvaro-Muñoz and   
Miguel López-Coronado and   
                 Joel Rodrigues   Development and performance evaluation
                                  of a new RSS tool for a Web-based
                                  system: RSS\_PROYECT . . . . . . . . . . 255--261
             Marjan Naderan and   
              Mehdi Dehghan and   
                 Hossein Pedram   Sensing task assignment via sensor
                                  selection for maximum target coverage in
                                  WSNs . . . . . . . . . . . . . . . . . . 262--273
          Reinaldo B. Braga and   
             Igor A. Chaves and   
      Carina T. de Oliveira and   
      Rossana M. C. Andrade and   
José Neuman de Souza and   
        Hervé Martin and   
                  Bruno Schulze   RETENTION: a reactive trust-based
                                  mechanism to detect and punish malicious
                                  nodes in ad hoc grid environments  . . . 274--283
                 Lo-Yao Yeh and   
            Chun-Chuan Yang and   
             Jee-Gong Chang and   
                   Yi-Lang Tsai   A secure and efficient batch binding
                                  update scheme for route optimization of
                                  nested NEtwork MObility (NEMO) in VANETs 284--292
                 Minwoo Kim and   
                 Karam Park and   
                      Won W. Ro   Benefits of using parallelized
                                  non-progressive network coding . . . . . 293--305
                  Ting Yang and   
                 Yugeng Sun and   
               Javid Taheri and   
               Albert Y. Zomaya   DLS: a dynamic local stitching mechanism
                                  to rectify transmitting path fragments
                                  in wireless sensor networks  . . . . . . 306--315
                Kaiping Xue and   
                Changsha Ma and   
                Peilin Hong and   
                      Rong Ding   A temporal-credential-based mutual
                                  authentication and key agreement scheme
                                  for wireless sensor networks . . . . . . 316--323
              Rafiqul Islam and   
                  Jemal Abawajy   A multi-tier phishing detection and
                                  filtering approach . . . . . . . . . . . 324--335
       Vishnu Monn Baskaran and   
          Yoong Choon Chang and   
               Jonathan Loo and   
                  KokSheik Wong   Software-based serverless endpoint video
                                  combiner architecture for
                                  high-definition multiparty video
                                  conferencing . . . . . . . . . . . . . . 336--352
                  Mingfu Li and   
                Yueh-Lin Wu and   
                Chia-Rong Chang   Available bandwidth estimation for the
                                  network paths with multiple tight links
                                  and bursty traffic . . . . . . . . . . . 353--367
         Fadi M. Al-Turjman and   
        Hossam S. Hassanein and   
               Mohamad Ibnkahla   Quantifying connectivity in wireless
                                  sensor networks with grid-based
                                  deployments  . . . . . . . . . . . . . . 368--377
                     Xun Yi and   
                   Eiji Okamoto   Practical Internet voting system . . . . 378--387
                Yuehua Wang and   
                 Zhong Zhou and   
                   Ling Liu and   
                         Wei Wu   Replica-aided load balancing in overlay
                                  networks . . . . . . . . . . . . . . . . 388--401
                  D. Rosaci and   
          G. M. L. Sarné   Cloning mechanisms to improve agent
                                  performances . . . . . . . . . . . . . . 402--408
               M. Hooshmand and   
       S. M. R. Soroushmehr and   
                 P. Khadivi and   
                  S. Samavi and   
                     S. Shirani   Visual sensor network lifetime
                                  maximization by prioritized scheduling
                                  of nodes . . . . . . . . . . . . . . . . 409--419
                Weigang Hou and   
                    Lei Guo and   
                   Xiaoxue Gong   Survivable power efficiency oriented
                                  integrated grooming in green networks    420--428
     Jesús L. Alvaro and   
                 Beatriz Barros   A new cloud computing architecture for
                                  music composition  . . . . . . . . . . . 429--443
               I-Hsuan Peng and   
                   Yen-Wen Chen   Energy consumption bounds analysis and
                                  its applications for grid based wireless
                                  sensor networks  . . . . . . . . . . . . 444--451
                   K. Salah and   
                      M. Hamawi   Performance of IP-forwarding of Linux
                                  hosts with multiple network interfaces   452--465
                 Imran Baig and   
              Muhammad Ayaz and   
                    Varun Jeoti   On the peak-to-average power ratio
                                  reduction in mobile WiMAX: a discrete
                                  cosine transform matrix precoding based
                                  random-interleaved orthogonal frequency
                                  division multiple access uplink system   466--475
                Mary Looney and   
                   Oliver Gough   A provision aware proportional fair
                                  sharing three colour marker  . . . . . . 476--483
    Maria-Victoria Belmonte and   
         Manuel Díaz and   
Jose-Luis Pérez-de-la-Cruz and   
                      Ana Reyna   COINS: COalitions and INcentiveS for
                                  effective Peer-to-Peer downloads . . . . 484--497
                    Chao Lv and   
                   Maode Ma and   
                     Hui Li and   
                Jianfeng Ma and   
                    Yaoyu Zhang   An novel three-party authenticated key
                                  exchange protocol using one-time key . . 498--503
Eugénia Moreira Bernardino and   
 Anabela Moreira Bernardino and   
Juan Manuel Sánchez-Pérez and   
Juan Antonio Gómez Pulido and   
Miguel A. Vega Rodríguez   Swarm optimisation algorithms applied to
                                  large balanced communication networks    504--522
       Haythem Bany Salameh and   
             Osamah S. Badarneh   Opportunistic medium access control for
                                  maximizing packet delivery rate in
                                  dynamic access networks  . . . . . . . . 523--532
              Ting-Yi Chang and   
                      Yan-Ru Ke   A personalized e-course composition
                                  based on a genetic algorithm with
                                  forcing legality in an adaptive learning
                                  system . . . . . . . . . . . . . . . . . 533--542
              Sepideh Adabi and   
               Ali Movaghar and   
        Amir Masoud Rahmani and   
                    Hamid Beigy   Market-based grid resource allocation
                                  using new negotiation model  . . . . . . 543--565
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 2, March, 2013

                Bingdong Li and   
              Jeff Springer and   
               George Bebis and   
              Mehmet Hadi Gunes   A survey of network flow applications    567--581
                 Shams Qazi and   
                  Raad Raad and   
                      Yi Mu and   
                   Willy Susilo   Securing DSR against wormhole attacks in
                                  multirate ad hoc networks  . . . . . . . 582--592
      Ahmed Hassan Mohammed and   
                    Bin Dai and   
             Benxiong Huang and   
             Muhammad Azhar and   
                    Guan Xu and   
                   Peng Qin and   
                        Shui Yu   A survey and tutorial of wireless relay
                                  network protocols based on network
                                  coding . . . . . . . . . . . . . . . . . 593--610
                Xiaobing He and   
        Michael Niedermeier and   
                Hermann de Meer   Dynamic key management in wireless
                                  sensor networks: a survey  . . . . . . . 611--622
            Sudhanshu Tyagi and   
                   Neeraj Kumar   A systematic review on clustering and
                                  routing techniques based upon LEACH
                                  protocol for wireless sensor networks    623--645
              Rafiqul Islam and   
               Ronghua Tian and   
             Lynn M. Batten and   
                 Steve Versteeg   Classification of malware based on
                                  integrated static and dynamic features   646--656
                  Kun Huang and   
                Gaogang Xie and   
                     Rui Li and   
                    Shuai Xiong   Fast and deterministic hash table lookup
                                  using discriminative Bloom filters . . . 657--666
                   Chiapin Wang   Dynamic ARF for throughput improvement
                                  in 802.11 WLAN via a machine-learning
                                  approach . . . . . . . . . . . . . . . . 667--676
        Eyüp S. Canlar and   
                Mauro Conti and   
               Bruno Crispo and   
              Roberto Di Pietro   Windows Mobile LiveSD Forensics  . . . . 677--684
      Sardar Muhammad Bilal and   
     Carlos Jesus Bernardos and   
                Carmen Guerrero   Position-based routing in vehicular
                                  networks: a survey . . . . . . . . . . . 685--697
              M. Kretschmer and   
                 P. Batroff and   
                      G. Ghinea   Topology forming and optimization
                                  framework for heterogeneous wireless
                                  back-haul networks supporting
                                  unidirectional technologies  . . . . . . 698--710
             Najme Mansouri and   
Gholam Hosein Dastghaibyfard and   
                 Ehsan Mansouri   Combination of data replication and
                                  scheduling algorithm for improving data
                                  availability in Data Grids . . . . . . . 711--722
           D. C. Vasiliadis and   
                G. E. Rizos and   
                  C. Vassilakis   Modelling and performance study of
                                  finite-buffered blocking multistage
                                  interconnection networks supporting
                                  natively $2$-class priority routing
                                  traffic  . . . . . . . . . . . . . . . . 723--737
               Shiliang Luo and   
                      Xu Lu and   
                 Lianglun Cheng   TSOIA: an efficient node selection
                                  algorithm facing the uncertain process
                                  for Internet of Things . . . . . . . . . 738--743
              Gimer Cervera and   
             Michel Barbeau and   
      Joaquin Garcia-Alfaro and   
             Evangelos Kranakis   A multipath routing strategy to prevent
                                  flooding disruption attacks in link
                                  state routing protocols for MANETs . . . 744--755
             Kuang-Yow Lian and   
            Sung-Jung Hsiao and   
                  Wen-Tsai Sung   Intelligent multi-sensor control system
                                  based on innovative technology
                                  integration via ZigBee and Wi-Fi
                                  networks . . . . . . . . . . . . . . . . 756--767
               Po-Ching Lin and   
                    Jia-Hau Lee   Re-examining the performance bottleneck
                                  in a NIDS with detailed profiling  . . . 768--780
                   Yan Yang and   
               Yulong Zhang and   
              Alex Hai Wang and   
                    Meng Yu and   
                 Wanyu Zang and   
                   Peng Liu and   
                 Sushil Jajodia   Quantitative survivability evaluation of
                                  three virtual machine-based server
                                  architectures  . . . . . . . . . . . . . 781--790
                      C. Xu and   
                      C. Du and   
                 G. F. Zhao and   
                          S. Yu   A novel model for user clicks
                                  identification based on hidden
                                  semi-Markov  . . . . . . . . . . . . . . 791--798
                    Jian An and   
                Xiaolin Gui and   
              Wendong Zhang and   
               Jinhua Jiang and   
                   Jianwei Yang   Research on social relations cognitive
                                  model of mobile nodes in Internet of
                                  Things . . . . . . . . . . . . . . . . . 799--810
                Yanheng Liu and   
              Longxiang Suo and   
                 Dayang Sun and   
                     Aimin Wang   A virtual square grid-based coverage
                                  algorithm of redundant node for wireless
                                  sensor network . . . . . . . . . . . . . 811--817
                  Peng Xiao and   
                 Zhigang Hu and   
                 Dongbo Liu and   
                Guofeng Yan and   
                      Xilong Qu   Virtual machine power measuring
                                  technique with bounded error in cloud
                                  environments . . . . . . . . . . . . . . 818--828
              Gaik-Yee Chan and   
             Chien-Sing Lee and   
                 Swee-Huay Heng   Discovering fuzzy association rule
                                  patterns and increasing sensitivity
                                  analysis of XML-related attacks  . . . . 829--842
                Yuhuai Peng and   
                     Yao Yu and   
                    Lei Guo and   
               Dingde Jiang and   
                     Qiming Gai   An efficient joint channel assignment
                                  and QoS routing protocol for IEEE 802.11
                                  multi-radio multi-channel wireless mesh
                                  networks . . . . . . . . . . . . . . . . 843--857
             Shahram Jamali and   
Seyyed Nasser Seyyed Hashemi and   
 Amir Masoud Eftekhari Moghadam   On the use of a full information
                                  feedback to stabilize RED  . . . . . . . 858--869
Abraham Martín-Campillo and   
              Jon Crowcroft and   
                Eiko Yoneki and   
             Ramon Martí   Evaluating opportunistic networks in
                                  disaster scenarios . . . . . . . . . . . 870--880
               Mahesh Kumar and   
                  Shishir Kumar   AGRIB-BHF: a sustainable and fault
                                  tolerant aggregation . . . . . . . . . . 881--886
         Mahmoud Al-shugran and   
              Osman Ghazali and   
             Suhaidi Hassan and   
               Kashif Nisar and   
                A. Suki M. Arif   A qualitative comparison evaluation of
                                  the greedy forwarding strategies in
                                  Mobile Ad Hoc Network  . . . . . . . . . 887--897
                 Laisen Nie and   
               Dingde Jiang and   
                        Lei Guo   A power laws-based reconstruction
                                  approach to end-to-end network traffic   898--907
                 Enver Ever and   
          Orhan Gemikonakli and   
             Altan Kocyigit and   
               Eser Gemikonakli   A hybrid approach to minimize state
                                  space explosion problem for the solution
                                  of two stage tandem queues . . . . . . . 908--926
                   Hu Xiong and   
                 Zhong Chen and   
                       Fagen Li   New identity-based three-party
                                  authenticated key agreement protocol
                                  with provable security . . . . . . . . . 927--932
               Kashif Nisar and   
            Angela Amphawan and   
             Suhaidi Hassan and   
                Nurul I. Sarkar   A comprehensive survey on scheduler for
                                  VoIP over WLAN . . . . . . . . . . . . . 933--948
           Mohamed K. Watfa and   
       Haitham Al-Hassanieh and   
                   Samir Salmen   A novel solution to the energy hole
                                  problem in sensor networks . . . . . . . 949--958
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 3, May, 2013

    Joel J. P. C. Rodrigues and   
               Russel Hsing and   
                   Min Chen and   
                Bingli Jiao and   
                   Binod Vaidya   Guest Editorial on Vehicular Networking
                                  Protocols  . . . . . . . . . . . . . . . 959--960
     António Fonseca and   
            Teresa Vazão   Applicability of position-based routing
                                  for VANET in highways and urban
                                  environment  . . . . . . . . . . . . . . 961--973
             Rajashree Nair and   
                    Ben Soh and   
         Naveen Chilamkurti and   
      James J. (Jong Hyuk) Park   Structure-free message aggregation and
                                  routing in traffic information system
                                  (SMART)  . . . . . . . . . . . . . . . . 974--980
                Salim Bitam and   
             Abdelhamid Mellouk   Bee life-based multi constraints
                                  multicast routing optimization for
                                  vehicular ad hoc networks  . . . . . . . 981--991
              Zhenxia Zhang and   
         Azzedine Boukerche and   
                 Hussam Ramadan   Design and evaluation of a fast MAC
                                  layer handoff management scheme for
                                  WiFi-based multichannel Vehicular Mesh
                                  Networks . . . . . . . . . . . . . . . . 992--1000
       Angelos Antonopoulos and   
         Charalabos Skianis and   
            Christos Verikoukis   Network coding-based cooperative ARQ
                                  scheme for VANETs  . . . . . . . . . . . 1001--1007
              Navid Tadayon and   
             Sasan Khoshroo and   
              Elaheh Askari and   
              Honggang Wang and   
                  Howard Michel   Power management in SMAC-based
                                  energy-harvesting wireless sensor
                                  networks using queuing analysis  . . . . 1008--1017
              Youxiang Wang and   
              Jianquan Wang and   
                Lu Zhaobiao and   
                    Xingang Liu   Performance improvement of QO-STBC over
                                  time-selective channel for wireless
                                  network  . . . . . . . . . . . . . . . . 1018--1026
               Jaime Lloret and   
          Alejandro Canovas and   
        Angel Catalá and   
                  Miguel Garcia   Group-based protocol and mobility model
                                  for VANETs to offer Internet access  . . 1027--1038
          Md. Humayun Kabir and   
    Mohammad Mukhtaruzzaman and   
           Mohammed Atiquzzaman   Efficient route optimization scheme for
                                  nested-NEMO  . . . . . . . . . . . . . . 1039--1049
                Liren Zhang and   
         Abderrahmane Lakas and   
            Hesham El-Sayed and   
                   Ezedin Barka   Mobility analysis in vehicular ad hoc
                                  network (VANET)  . . . . . . . . . . . . 1050--1056
                  Yejun Liu and   
              Qingyang Song and   
                     Rui Ma and   
                    Bing Li and   
                        Bo Gong   Protection based on backup radios and
                                  backup fibers for survivable
                                  Fiber-Wireless (FiWi) access network . . 1057--1069
              Jian-Zhen Luo and   
                  Shun-Zheng Yu   Position-based automatic reverse
                                  engineering of network protocols . . . . 1070--1077
         Masoud Zarifneshat and   
                 Pejman Khadivi   Using mobile node speed changes for
                                  movement direction change prediction in
                                  a realistic category of mobility models  1078--1090
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 4, July, 2013

          Ebrahim Mahdipour and   
        Amir Masoud Rahmani and   
                Saeed Setayeshi   Importance sampling for Jackson networks
                                  with customer impatience until the end
                                  of service . . . . . . . . . . . . . . . 1091--1101
                   C. Dumez and   
                M. Bakhouya and   
                   J. Gaber and   
                    M. Wack and   
                      P. Lorenz   Model-driven approach supporting formal
                                  verification for web service composition
                                  protocols  . . . . . . . . . . . . . . . 1102--1115
              Nader Mohamed and   
         Jameela Al-Jaroodi and   
                    Abdulla Eid   A dual-direction technique for fast file
                                  downloads with dynamic load balancing in
                                  the Cloud  . . . . . . . . . . . . . . . 1116--1130
               Ammar Haider and   
               Iqbal Gondal and   
            Joarder Kamruzzaman   Social-connectivity-aware vertical
                                  handover for heterogeneous wireless
                                  networks . . . . . . . . . . . . . . . . 1131--1139
           A. Cagatay Talay and   
              D. Turgay Altilar   Self adaptive routing for dynamic
                                  spectrum access in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1140--1151
             Jasone Astorga and   
              Marina Aguado and   
               Nerea Toledo and   
                 Marivi Higuero   A high performance link layer mobility
                                  management strategy for professional
                                  private broadband networks . . . . . . . 1152--1163
           Chien-Chao Tseng and   
             Chia-Liang Lin and   
               Li-Hsing Yen and   
               Jyun-Yan Liu and   
                  Cheng-Yuan Ho   Can: a context-aware NAT traversal
                                  scheme . . . . . . . . . . . . . . . . . 1164--1173
                D. D. Geeta and   
                  N. Nalini and   
         Rajashekhar C. Biradar   Fault tolerance in wireless sensor
                                  network using hand-off and dynamic power
                                  adjustment approach  . . . . . . . . . . 1174--1185
              Chao-Yang Lee and   
           Liang-Cheng Shiu and   
                Fu-Tian Lin and   
                  Chu-Sing Yang   Distributed topology control algorithm
                                  on broadcasting in wireless sensor
                                  network  . . . . . . . . . . . . . . . . 1186--1195
        El-Sayed M. El-Alfy and   
            Syed N. Mujahid and   
                Shokri Z. Selim   A Pareto-based hybrid multiobjective
                                  evolutionary approach for constrained
                                  multipath traffic engineering
                                  optimization in MPLS/GMPLS networks  . . 1196--1207
               Ying-Dar Lin and   
              Cheng-Yuan Ho and   
             Yuan-Cheng Lai and   
              Tzu-Hsiung Du and   
                 Shun-Lee Chang   Booting, browsing and streaming time
                                  profiling, and bottleneck analysis on
                                  Android-based systems  . . . . . . . . . 1208--1218
                 Anwar Saif and   
                 Mohamed Othman   SRA-MSDU: Enhanced A-MSDU frame
                                  aggregation with selective
                                  retransmission in 802.11n wireless
                                  networks . . . . . . . . . . . . . . . . 1219--1229
      Muhammad Hamad Alizai and   
                Hanno Wirtz and   
           Bernhard Kirchen and   
                   Klaus Wehrle   Portable wireless-networking protocol
                                  evaluation . . . . . . . . . . . . . . . 1230--1242
           Mohammad Masdari and   
Sadegh Mohammadzadeh Bazarchi and   
                  Moazam Bidaki   Analysis of Secure LEACH-Based
                                  Clustering Protocols in Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 1243--1260
           Aishwarya Bakshi and   
          Amir Talaei-Khoei and   
                    Pradeep Ray   Adaptive policy framework: a systematic
                                  review . . . . . . . . . . . . . . . . . 1261--1271
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 5, September, 2013

    Joel J. P. C. Rodrigues and   
               Russel Hsing and   
                   Min Chen and   
                Bingli Jiao and   
                   Binod Vaidya   Guest editorial on vehicular
                                  communications and applications  . . . . 1273--1274
                 C. Campolo and   
             H. A. Cozzetti and   
                A. Molinaro and   
                    R. Scopigno   Augmenting Vehicle-to-Roadside
                                  connectivity in multi-channel vehicular
                                  Ad Hoc Networks  . . . . . . . . . . . . 1275--1286
                  Yazhi Liu and   
                Jianwei Niu and   
                    Jian Ma and   
                    Lei Shu and   
              Takahiro Hara and   
                   Wendong Wang   The insights of message delivery delay
                                  in VANETs with a bidirectional traffic
                                  model  . . . . . . . . . . . . . . . . . 1287--1294
                   R. Bauza and   
                    J. Gozalvez   Traffic congestion detection in
                                  large-scale scenarios using
                                  vehicle-to-vehicle communications  . . . 1295--1307
             Nitin Maslekar and   
              Joseph Mouzna and   
          Mounir Boussedjra and   
                   Houda Labiod   CATS: an adaptive traffic signal system
                                  based on car-to-car communication  . . . 1308--1315
                        Kai Lin   Research on adaptive target tracking in
                                  vehicle sensor networks  . . . . . . . . 1316--1323
               Nerea Toledo and   
          Jean Marie Bonnin and   
                 Marivi Higuero   Performance evaluation of user
                                  applications in the ITS scenario: an
                                  analytical assessment of the NeMHIP  . . 1324--1336
 Carlos Gañán and   
       Jose L. Muñoz and   
              Oscar Esparza and   
     Jorge Mata-Díaz and   
Juan Hernández-Serrano and   
                   Juanjo Alins   COACH: COllaborative certificate stAtus
                                  CHecking mechanism for VANETs  . . . . . 1337--1351
                  Bidi Ying and   
         Dimitrios Makrakis and   
             Hussein T. Mouftah   Privacy preserving broadcast message
                                  authentication protocol for VANETs . . . 1352--1364
                   Xiong Li and   
                Jianwei Niu and   
      Muhammad Khurram Khan and   
                    Junguo Liao   An enhanced smart card based remote user
                                  password authentication scheme . . . . . 1365--1371
                Hai Van Luu and   
                    Xueyan Tang   Constructing rings overlay for robust
                                  data collection in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1372--1386
                  Ting Chen and   
            Xiao-song Zhang and   
               Hong-yuan Li and   
                  Dong Wang and   
                         Yue Wu   Propagation modeling of active P2P worms
                                  based on ternary matrix  . . . . . . . . 1387--1394
               Sulma Rashid and   
       Abdul Hanan Abdullah and   
                Qaisar Ayub and   
           M. Soperi Mohd Zahid   Dynamic Prediction based Multi Queue
                                  (DPMQ) drop policy for probabilistic
                                  routing protocols of delay tolerant
                                  network  . . . . . . . . . . . . . . . . 1395--1402
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc

Journal of Network and Computer Applications
Volume 36, Number 6, November, 2013

               Weiming Shen and   
                     Weidong Li   Collaboration technologies and
                                  applications . . . . . . . . . . . . . . 1403--1404
        Steven Latré and   
              Jeroen Famaey and   
             John Strassner and   
                 Filip De Turck   Automated context dissemination for
                                  autonomic collaborative networks through
                                  semantic subscription filter generation  1405--1417
                 Yuanhao Xu and   
                  Guofu Yin and   
                   Yong Nie and   
                Zhengwei He and   
                    Xiaolin Dai   Research on an active knowledge push
                                  service based on collaborative intent
                                  capture  . . . . . . . . . . . . . . . . 1418--1430
                     Tao Wu and   
               Xiaobing Pei and   
               Yongzhong Lu and   
             Changqing Chen and   
                      Liang Gao   A distributed collaborative product
                                  design environment based on semantic
                                  norm model and role-based access control 1431--1440
          Amy J. C. Trappey and   
         Charles V. Trappey and   
                 Chun-Yi Wu and   
              Chin Yuan Fan and   
                   Yi-Liang Lin   Intelligent patent recommendation system
                                  for innovative design collaboration  . . 1441--1450
      Diego Carvalho Soares and   
Flávia Maria Santoro and   
   Fernanda Araujo Baião   Discovering collaborative
                                  knowledge-intensive processes through
                                  e-mail mining  . . . . . . . . . . . . . 1451--1465
              Pedro Antunes and   
        David Simões and   
        Luis Carriço and   
            José A. Pino   An end-user approach to business process
                                  modeling . . . . . . . . . . . . . . . . 1466--1479
                Rahat Iqbal and   
               Nazaraf Shah and   
                 Anne James and   
               Tomasz Cichowicz   Integration, optimization and usability
                                  of enterprise applications . . . . . . . 1480--1488
                  Leijie Fu and   
               Pingyu Jiang and   
                        Wei Cao   Modeling and performance analysis of
                                  product development process network  . . 1489--1502
                 Ta-Ping Lu and   
          Amy J. C. Trappey and   
              Yi-Kuang Chen and   
                    Yu-Da Chang   Collaborative design and analysis of
                                  supply chain network management key
                                  processes model  . . . . . . . . . . . . 1503--1511
                 Yuan Cheng and   
                   Fazhi He and   
                Xiantao Cai and   
                    Dejun Zhang   A group Undo/Redo method in $3$D
                                  collaborative modeling systems with
                                  performance evaluation . . . . . . . . . 1512--1522
              Jiancheng Shi and   
                Jianhua Liu and   
                 Ruxin Ning and   
                     Weiwei Hou   A collisions evaluation method in
                                  virtual environment for collaborative
                                  assembly . . . . . . . . . . . . . . . . 1523--1530
                    Bin Guo and   
               Daqing Zhang and   
                   Zhu Wang and   
                  Zhiwen Yu and   
                   Xingshe Zhou   Opportunistic IoT: Exploring the
                                  harmonious interaction between human and
                                  the Internet of Things . . . . . . . . . 1531--1539
                  Yang Yang and   
                   Xinyu Li and   
                  Liang Gao and   
                     Xinyu Shao   A new approach for predicting and
                                  collaborative evaluating the cutting
                                  force in face milling based on gene
                                  expression programming . . . . . . . . . 1540--1550
      Jesús Gallardo and   
              Ana I. Molina and   
           Crescencio Bravo and   
              Miguel A. Redondo   A model-driven and task-oriented method
                                  for the development of collaborative
                                  systems  . . . . . . . . . . . . . . . . 1551--1565
María Blanca Ibáñez and   
José J. García Rueda and   
               David Maroto and   
           Carlos Delgado Kloos   Collaborative learning in multi-user
                                  virtual environments . . . . . . . . . . 1566--1576
               Weiming Shen and   
                     Weidong Li   Collaboration computing technologies and
                                  applications . . . . . . . . . . . . . . 1577--1578
                  Dujuan Gu and   
                Xiaohan Liu and   
                   Gang Qin and   
             Shuangjian Yan and   
                     Ze luo and   
                    Baoping Yan   VNET6: IPv6 virtual network for the
                                  collaboration between applications and
                                  networks . . . . . . . . . . . . . . . . 1579--1588
          Anbazhagan Rajesh and   
           Rangaswamy Nakkeeran   Investigation on uplink collaborative
                                  contention-based bandwidth request for
                                  WiMAX three hop relay networks . . . . . 1589--1598
               Yuanyuan Pan and   
                    Jianqing Li   Cooperative pseudonym change scheme
                                  based on the number of neighbors in
                                  VANETs . . . . . . . . . . . . . . . . . 1599--1609
         Dami\`a Castell\`a and   
       Francesc Giné and   
           Francesc Solsona and   
      Josep Lluis Lérida   Analyzing locality over a P2P computing
                                  architecture . . . . . . . . . . . . . . 1610--1619
                 Josep Rius and   
             Fernando Cores and   
               Francesc Solsona   Cooperative scheduling mechanism for
                                  large-scale peer-to-peer computing
                                  systems  . . . . . . . . . . . . . . . . 1620--1631
            Sheng-Cheng Yeh and   
               Ming-Yang Su and   
               Hui-Hui Chen and   
                  Chun-Yuen Lin   An efficient and secure approach for a
                                  cloud collaborative editing  . . . . . . 1632--1641
                Hongchen Wu and   
                Xinjun Wang and   
               Zhaohui Peng and   
                   Qingzhong Li   Div-clustering: Exploring active users
                                  for social collaborative recommendation  1642--1650
                Ho Leung Li and   
               Vincent T. Y. Ng   Discovering associations between news
                                  and contents in social network sites
                                  with the D-Miner service framework . . . 1651--1659
              Xiaogang Wang and   
                  Ming Yang and   
                    Junzhou Luo   A novel sequential watermark detection
                                  model for efficient traceback of secret
                                  network attack flows . . . . . . . . . . 1660--1670
                 Jian Jiang and   
                     Wei Li and   
                Junzhou Luo and   
                       Jing Tan   A network accountability based
                                  verification mechanism for detecting
                                  inter-domain routing path inconsistency  1671--1683
               JunPing Wang and   
                Qiliang Zhu and   
                         Yan Ma   An agent-based hybrid service delivery
                                  for coordinating Internet of Things and
                                  3rd party service providers  . . . . . . 1684--1695
                 Wenfeng Li and   
                   Ye Zhong and   
                   Xun Wang and   
                     Yulian Cao   Resource virtualization and service
                                  selection in cloud logistics . . . . . . 1696--1704
       Mojtaba Seyedzadegan and   
             Mohamed Othman and   
       Borhanuddin Mohd Ali and   
            Shamala Subramaniam   Zero-Degree algorithm for Internet
                                  GateWay placement in backbone wireless
                                  mesh networks  . . . . . . . . . . . . . 1705--1723
               Wu-Hsiao Hsu and   
                 Yuh-Pyng Shieh   Virtual network mapping algorithm in the
                                  cloud infrastructure . . . . . . . . . . 1724--1734
         Juan Felipe Botero and   
              Miguel Molina and   
    Xavier Hesselbach-Serra and   
   José Roberto Amazonas   A novel paths algebra-based strategy to
                                  flexibly solve the link mapping stage of
                                  VNE problems . . . . . . . . . . . . . . 1735--1752
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 37, Number ??, January, 2014

                   Hyuk Lim and   
          James Chang Wu Yu and   
                   Binod Vaidya   Advances in multimedia services over
                                  emerging wireless networks . . . . . . . 1
                Pradipta De and   
          Nilanjan Banerjee and   
                      Swades De   Exploiting multiple description coding
                                  for intermediate recovery in wireless
                                  mesh networks  . . . . . . . . . . . . . 2--11
             Paulo A. Neves and   
    Joel J. P. C. Rodrigues and   
                   Min Chen and   
        Athanasios V. Vasilakos   A multi-channel architecture for
                                  IPv6-enabled wireless sensor and
                                  actuator networks featuring PnP support  12--24
               Soocheol Lee and   
               Seungmin Rho and   
                 Jong Hyuk Park   Multimedia contents adaptation by
                                  modality conversion with user preference
                                  in wireless network  . . . . . . . . . . 25--32
               Hayoung Yoon and   
                JongWon Kim and   
                   Robert Hsieh   Peer-assisted video on-demand streaming
                                  system in practical WiFi-based mobile
                                  opportunistic networks . . . . . . . . . 33--44
               Maria Ganzha and   
               Marcin Paprzycki   Agent-oriented computing for distributed
                                  systems and networks . . . . . . . . . . 45--46
                Dongsoo Kim and   
                  Eric Noel and   
                  K. Wendy Tang   Expanded Borel Cayley Graphs (Ex-BCGs):
                                  a novel communication topology for
                                  multi-agent systems  . . . . . . . . . . 47--61
        Shashank Srivastava and   
                    G. C. Nandi   Self-reliant mobile code: a new
                                  direction of agent security  . . . . . . 62--75
     Antonín Komenda and   
         Peter Novák and   
               Michal Pechoucek   Domain-independent multi-agent plan
                                  repair . . . . . . . . . . . . . . . . . 76--88
              Sepideh Adabi and   
               Ali Movaghar and   
        Amir Masoud Rahmani and   
                Hamid Beigy and   
    Hengameh Dastmalchy-Tabrizi   A new fuzzy negotiation protocol for
                                  grid resource allocation . . . . . . . . 89--126
          Giancarlo Fortino and   
                Wilma Russo and   
                 Marino Vaccaro   An agent-based approach for the design
                                  and analysis of content delivery
                                  networks . . . . . . . . . . . . . . . . 127--145
      Álvaro Carrera and   
         Carlos A. Iglesias and   
Javier García-Algarra and   
           Dusan Kolarík   A real-life application of multi-agent
                                  systems for fault diagnosis in the
                                  provision of an Internet business
                                  service  . . . . . . . . . . . . . . . . 146--154
                 Wenjia Niu and   
                    Gang Li and   
                Endong Tong and   
               Xinghua Yang and   
                Liang Chang and   
               Zhongzhi Shi and   
                        Song Ci   Interaction relationships of caches in
                                  agent-based HD video surveillance:
                                  Discovery and utilization  . . . . . . . 155--169
Jaime Galán-Jiménez and   
           Alfonso Gazo-Cervero   Using bio-inspired algorithms for energy
                                  levels assessment in energy efficient
                                  wired communication networks . . . . . . 171--185
                   Jiguo Yu and   
               Qingbo Zhang and   
                Dongxiao Yu and   
              Congcong Chen and   
                  Guanghui Wang   Domatic partition in homogeneous
                                  wireless sensor networks . . . . . . . . 186--193
          Demetris Hoplaros and   
                 Zahir Tari and   
                 Ibrahim Khalil   Data summarization for network traffic
                                  monitoring . . . . . . . . . . . . . . . 194--205
             Chi-Tao Chiang and   
            Hung-Chang Chen and   
               Wen-Hwa Liao and   
                 Kuei-Ping Shih   A decentralized minislot scheduling
                                  protocol (DMSP) in TDMA-based wireless
                                  mesh networks  . . . . . . . . . . . . . 206--215
           Abbas Ali Rezaee and   
  Mohammad Hossein Yaghmaee and   
        Amir Masoud Rahmani and   
      Amir Hossein Mohajerzadeh   HOCA: Healthcare Aware Optimized
                                  Congestion Avoidance and control
                                  protocol for wireless sensor networks    216--228
              Chih-Min Chao and   
                 Tzu-Ying Hsiao   Design of structure-free and
                                  energy-balanced data aggregation in
                                  wireless sensor networks . . . . . . . . 229--239
                Sajjad Zare and   
       Akbar Ghaffarpour Rahbar   Congestion control in IPTV over PON
                                  using Digital Fountain forward error
                                  correction . . . . . . . . . . . . . . . 240--252
                    Feng Li and   
                    Li Wang and   
                     Weidang Lu   Potential bargaining for resource
                                  allocation in cognitive relay
                                  transmission . . . . . . . . . . . . . . 253--258
                Yuhuai Peng and   
              Qingyang Song and   
                     Yao Yu and   
                       Fei Wang   Fault-tolerant routing mechanism based
                                  on network coding in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 259--272
                  Yuemei Xu and   
                    Yang Li and   
                    Tao Lin and   
                 Zihou Wang and   
                 Wenjia Niu and   
                   Hui Tang and   
                        Song Ci   A novel cache size optimization scheme
                                  based on manifold learning in Content
                                  Centric Networking . . . . . . . . . . . 273--281
            Jacques M. Bahi and   
                Xiaole Fang and   
          Christophe Guyeux and   
                   Qianxue Wang   Suitability of chaotic iterations
                                  schemes using XORshift for security
                                  applications . . . . . . . . . . . . . . 282--292
              Conor Cameron and   
             Ibrahim Khalil and   
                     Zahir Tari   An ID-based approach to the caching and
                                  distribution of peer-to-peer,
                                  proxy-based video content  . . . . . . . 293--314
                  Wei Zheng and   
                     Tao Su and   
               Haijun Zhang and   
                     Wei Li and   
                 Xiaoli Chu and   
                  Xiangming Wen   Distributed power optimization for
                                  spectrum-sharing femtocell networks: a
                                  fictitious game approach . . . . . . . . 315--322
                  Guilin Li and   
              Longjiang Guo and   
                   Xing Gao and   
                  Minghong Liao   Bloom filter based processing algorithms
                                  for the multi-dimensional event query in
                                  wireless sensor networks . . . . . . . . 323--333
                Jianwei Niu and   
               Wenfang Song and   
           Mohammed Atiquzzaman   Bandwidth-adaptive partitioning for
                                  distributed execution optimization of
                                  mobile applications  . . . . . . . . . . 334--347
             Binh Viet Phan and   
                   Eric Pardede   Active XML (AXML) research: Survey on
                                  the representation, system architecture,
                                  data exchange mechanism and query
                                  evaluation . . . . . . . . . . . . . . . 348--364
           Harjit Pal Singh and   
            Sarabjeet Singh and   
                   J. Singh and   
                     S. A. Khan   VoIP: State of art for global
                                  connectivity --- a critical review . . . 365--379
             Saif Al-Sultan and   
          Moath M. Al-Doori and   
          Ali H. Al-Bayatti and   
                  Hussien Zedan   A comprehensive survey on vehicular Ad
                                  Hoc network  . . . . . . . . . . . . . . 380--392
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 38, Number ??, February, 2014

                  Ilsun You and   
            Marek R. Ogiela and   
                A. Min Tjoa and   
                   Dongwan Shin   Advanced technologies for homeland
                                  defense and security . . . . . . . . . . 1--2
           Leszek T. Lilien and   
          Lotfi ben Othmane and   
                Pelin Angin and   
             Andrew DeCarlo and   
              Raed M. Salih and   
                Bharat Bhargava   A simulation study of ad hoc networking
                                  of UAVs with opportunistic resource
                                  utilization networks . . . . . . . . . . 3--15
               Dongjin Choi and   
               Byeongkyu Ko and   
                 Heesun Kim and   
                     Pankoo Kim   Text analysis for detecting
                                  terrorism-related articles on the web    16--21
        Aniello Castiglione and   
          Roberto De Prisco and   
          Alfredo De Santis and   
                  Ugo Fiore and   
             Francesco Palmieri   A botnet-based command and control
                                  approach relying on swarm intelligence   22--33
               Lidia Ogiela and   
                Marek R. Ogiela   Cognitive systems and bio-inspired
                                  computing in homeland security . . . . . 34--42
             Seung-Hyun Seo and   
                Aditi Gupta and   
       Asmaa Mohamed Sallam and   
              Elisa Bertino and   
                    Kangbin Yim   Detecting mobile malware threats to
                                  homeland security through static
                                  analysis . . . . . . . . . . . . . . . . 43--53
                Kerem Irgan and   
           Cem Ünsalan and   
                 Sebnem Baydere   Low-cost prioritization of image blocks
                                  in wireless sensor networks for border
                                  surveillance . . . . . . . . . . . . . . 54--64
             Luigi Catuogno and   
             Hans Löhr and   
             Marcel Winandy and   
             Ahmad-Reza Sadeghi   A trusted versioning file system for
                                  passive mobile storage devices . . . . . 65--75
                    Zang Li and   
             Chao-Hsien Chu and   
                        Wen Yao   A semantic authorization model for
                                  pervasive healthcare . . . . . . . . . . 76--87
               Hsing-Chung Chen   A multi-issued tag key agreement with
                                  time constraint for homeland defense
                                  sub-department in NFC environment  . . . 88--98
             Jong-Yeon Park and   
               Dong-Guk Han and   
                  Okyeon Yi and   
                  JeongNyeo Kim   An improved side channel attack using
                                  event information of subtraction . . . . 99--105
               Subir Halder and   
                  Sipra Das Bit   Enhancement of wireless sensor network
                                  lifetime by deploying heterogeneous
                                  nodes  . . . . . . . . . . . . . . . . . 106--124
                  Sheng Gao and   
                Jianfeng Ma and   
                   Cong Sun and   
                     Xinghua Li   Balancing trajectory privacy and data
                                  utility using a personalized
                                  anonymization model  . . . . . . . . . . 125--134
         Gaya K. Jayasinghe and   
         J. Shane Culpepper and   
                   Peter Bertok   Efficient and effective realtime
                                  prediction of drive-by download attacks  135--149
                Hai Van Luu and   
                    Xueyan Tang   An efficient algorithm for scheduling
                                  sensor data collection through
                                  multi-path routing structures  . . . . . 150--162
      Mohammad Doraghinejad and   
    Hossein Nezamabadi-pour and   
                     Ali Mahani   Channel assignment in multi-radio
                                  wireless mesh networks using an improved
                                  gravitational search algorithm . . . . . 163--171
            Messaoud Doudou and   
            Djamel Djenouri and   
             Nadjib Badache and   
        Abdelmadjid Bouabdallah   Synchronous contention-based MAC
                                  protocols for delay-sensitive wireless
                                  sensor networks: a review and taxonomy   172--184
                Wenjing Guo and   
                      Wei Zhang   A survey on intelligent routing
                                  protocols in wireless sensor networks    185--201
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 39, Number ??, March, 2014

Hélder Pereira Borges and   
José Neuman de Souza and   
              Bruno Schulze and   
           Antonio Roberto Mury   Automatic services instantiation based
                                  on a process specification . . . . . . . 1--16
       Ali Mohammed Alsahag and   
       Borhanuddin Mohd Ali and   
       Nor Kamariah Noordin and   
                Hafizal Mohamad   Fair uplink bandwidth allocation and
                                  latency guarantee for mobile WiMAX using
                                  fuzzy adaptive deficit round robin . . . 17--25
             Ding-Jie Huang and   
                 Wei-Chung Teng   A defense against clock skew replication
                                  attacks in wireless sensor networks  . . 26--37
                Endong Tong and   
                 Wenjia Niu and   
                    Gang Li and   
                  Ding Tang and   
                Liang Chang and   
               Zhongzhi Shi and   
                        Song Ci   Bloom filter-based workflow management
                                  to enable QoS guarantee in wireless
                                  sensor networks  . . . . . . . . . . . . 38--51
             Feng-Ming Yang and   
               Wei-Mei Chen and   
                Jean-Lien C. Wu   A dynamic strategy for packet scheduling
                                  and bandwidth allocation based on
                                  channel quality in IEEE 802.16e OFDMA
                                  system . . . . . . . . . . . . . . . . . 52--60
              Zhaolong Ning and   
              Qingyang Song and   
                 Yang Huang and   
                        Lei Guo   A channel estimation based opportunistic
                                  scheduling scheme in wireless
                                  bidirectional networks . . . . . . . . . 61--69
                Haidar Safa and   
             Wassim El-Hajj and   
                  Hanan Zoubian   A robust topology control solution for
                                  the sink placement problem in WSNs . . . 70--82
                 Yuxin Meng and   
                   Lam-For Kwok   Adaptive blacklist-based packet filter
                                  with a statistic-based approach in
                                  network intrusion detection  . . . . . . 83--92
         Smitha Shivshankar and   
               Abbas Jamalipour   Spatio-temporal multicast grouping for
                                  content-based routing in vehicular
                                  networks: a distributed approach . . . . 93--103
              Huailiang Tan and   
              Lianjun Huang and   
                 Zaihong He and   
                  Youyou Lu and   
                       Xubin He   DMVL: an I/O bandwidth dynamic
                                  allocation method for virtual networks   104--116
              Ali Moussaoui and   
           Fouzi Semchedine and   
             Abdallah Boukerram   A link-state QoS routing protocol based
                                  on link stability for Mobile Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 117--125
      Abderrahim Benslimane and   
             Abderrezak Rachedi   Rate adaptation scheme for IEEE
                                  802.11-based MANETs  . . . . . . . . . . 126--139
               V. R. Budyal and   
                    S. S. Manvi   ANFIS and agent based bandwidth and
                                  delay aware anycast routing in mobile ad
                                  hoc networks . . . . . . . . . . . . . . 140--151
                Wiem Tounsi and   
      Nora Cuppens-Boulahia and   
      Joaquin Garcia-Alfaro and   
          Yannick Chevalier and   
 Frédéric Cuppens   KEDGEN2: a key establishment and
                                  derivation protocol for EPC Gen2 RFID
                                  systems  . . . . . . . . . . . . . . . . 152--166
           Aukrit Chadagorn and   
             Ibrahim Khalil and   
              Conor Cameron and   
                     Zahir Tari   PileCast: Multiple bit rate live video
                                  streaming over BitTorrent  . . . . . . . 167--178
        Osama Al-Haj Hassan and   
           Thamer Al-Rousan and   
             Anas Abu Taleb and   
                     Adi Maaita   An efficient and scalable ranking
                                  technique for mashups involving RSS data
                                  sources  . . . . . . . . . . . . . . . . 179--190
             Ousmane Diallo and   
    Joel J. P. C. Rodrigues and   
                 Mbaye Sene and   
                   Jaime Lloret   Simulation framework for real-time
                                  database on WSNs . . . . . . . . . . . . 191--201
              Tien-Wen Sung and   
                  Chu-Sing Yang   Voronoi-based coverage improvement
                                  approach for wireless directional sensor
                                  networks . . . . . . . . . . . . . . . . 202--213
          Carlo Mastroianni and   
               Giuseppe Papuzzo   A self-organizing P2P framework for
                                  collective service discovery . . . . . . 214--222
              Younghyun Kim and   
                  Haneul Ko and   
              Sangheon Pack and   
             Jong-Hyouk Lee and   
               Seok-Joo Koh and   
                  Heeyoung Jung   Performance analysis of distributed
                                  mapping system in ID/locator separation
                                  architectures  . . . . . . . . . . . . . 223--232
              J. R. Gisbert and   
                   C. Palau and   
                 M. Uriarte and   
                  G. Prieto and   
       J. A. Palazón and   
                  M. Esteve and   
            O. López and   
                 J. Correas and   
   M. C. Lucas-Estañ and   
          P. Giménez and   
                  A. Moyano and   
               L. Collantes and   
         J. Gozálvez and   
                  B. Molina and   
           O. Lázaro and   
             A. González   Integrated system for control and
                                  monitoring industrial wireless networks
                                  for labor risk prevention  . . . . . . . 233--252
       Alper Rifat Ulucinar and   
          Ibrahim Korpeoglu and   
                  Ezhan Karasan   Effects of physical channel separation
                                  on application flows in a multi-radio
                                  multi-hop wireless mesh network: an
                                  experimental study on BilMesh testbed    253--265
         Mahantesh N. Birje and   
        Sunilkumar S. Manvi and   
                   Sajal K. Das   Reliable resources brokering scheme in
                                  wireless grids based on non-cooperative
                                  bargaining game  . . . . . . . . . . . . 266--279
                  Shilei Lu and   
                   Shunzheng Yu   A fuzzy $k$-coverage approach for RFID
                                  network planning using plant growth
                                  simulation algorithm . . . . . . . . . . 280--291
                      Jenn Tang   Designing an Anti-swindle Mahjong
                                  Leisure Prototype System using RFID and
                                  ontology theory  . . . . . . . . . . . . 292--301
                Qaisar Ayub and   
               Sulma Rashid and   
       M. Soperi Mohd Zahid and   
           Abdul Hanan Abdullah   Contact quality based forwarding
                                  strategy for delay tolerant network  . . 302--309
                  Xuxun Liu and   
                        Desi He   Ant colony optimization with greedy
                                  migration mechanism for node deployment
                                  in wireless sensor networks  . . . . . . 310--318
           Damianos Gavalas and   
Charalampos Konstantopoulos and   
      Konstantinos Mastakas and   
              Grammati Pantziou   Mobile recommender systems in tourism    319--333
          M. S. Kakkasageri and   
                    S. S. Manvi   Information management in vehicular ad
                                  hoc networks: a review . . . . . . . . . 334--350
               Hero Modares and   
Amirhossein Moravejosharieh and   
               Jaime Lloret and   
                   Rosli Salleh   A survey of secure protocols in Mobile
                                  IPv6 . . . . . . . . . . . . . . . . . . 351--368
    Muhammad Nouman Durrani and   
               Jawwad A. Shamsi   Volunteer computing: requirements,
                                  challenges, and solutions  . . . . . . . 369--380
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 40, Number ??, April, 2014

                  Jine Tang and   
             ZhangBing Zhou and   
                Jianwei Niu and   
                       Qun Wang   An energy efficient hierarchical
                                  clustering index tree for facilitating
                                  time-correlated region queries in the
                                  Internet of Things . . . . . . . . . . . 1--11
           Francisco Fraile and   
             Juan Carlos Guerri   Simple models of the content duration
                                  and the popularity of television content 12--20
                 Haiyang Hu and   
                  Yizhi Ren and   
                      Xu Xu and   
                Liguo Huang and   
                         Hua Hu   Reducing view inconsistency by
                                  predicting avatars' motion in
                                  multi-server distributed virtual
                                  environments . . . . . . . . . . . . . . 21--30
         Vijay Varadharajan and   
                 Udaya Tupakula   Counteracting security attacks in
                                  virtual machines in the cloud using
                                  property based attestation . . . . . . . 31--45
           Leili Farzinvash and   
                  Mehdi Dehghan   Multi-rate multicast routing in
                                  multi-gateway multi-channel multi-radio
                                  wireless mesh networks . . . . . . . . . 46--60
              Peng-Yeng Yin and   
               Ray-I. Chang and   
           Chih-Chiang Chao and   
                   Yen-Ting Chu   Niched ant colony optimization with
                                  colony guides for QoS multicast routing  61--72
                Mohsen Arab and   
               Mohsen Afsharchi   Community detection in social networks
                                  using hybrid merging of sub-communities  73--84
       Mohamed Ahmed Elfaki and   
            Hamidah Ibrahim and   
                  Ali Mamat and   
             Mohamed Othman and   
                    Haidar Safa   Collaborative caching priority for
                                  processing requests in MANETs  . . . . . 85--96
               Jianwei Wang and   
                 Chen Jiang and   
                   Jianfei Qian   Robustness of Internet under targeted
                                  attack: a cascading failure perspective  97--104
                Sehoon Park and   
                Qichen Chen and   
                  Hyuck Han and   
                   Heon Y. Yeom   Design and evaluation of mobile
                                  offloading system for web-centric
                                  devices  . . . . . . . . . . . . . . . . 105--115
                  Peng Zhao and   
                 Xinyu Yang and   
                     Wei Yu and   
               Chiyong Dong and   
                Shusen Yang and   
               Sulabh Bhattarai   Toward efficient estimation of available
                                  bandwidth for IEEE 802.11-based wireless
                                  networks . . . . . . . . . . . . . . . . 116--125
                   Yang Xia and   
                  Chai Kiat Yeo   Mobile Internet access over intermittent
                                  network connectivity . . . . . . . . . . 126--138
                 Zhen-Yu Wu and   
                Ju-Chuan Wu and   
            Sung-Chiang Lin and   
                 Charlotte Wang   An electronic voting mechanism for
                                  fighting bribery and coercion  . . . . . 139--150
            Samar Abdelaziz and   
               Mustafa ElNainay   Metric-based taxonomy of routing
                                  protocols for cognitive radio ad hoc
                                  networks . . . . . . . . . . . . . . . . 151--163
                Onur Yilmaz and   
           Orhan Dagdeviren and   
                 Kayhan Erciyes   Localization-free and energy-efficient
                                  hole bypassing techniques for
                                  fault-tolerant sensor networks . . . . . 164--178
               Darren Quick and   
         Kim-Kwang Raymond Choo   Google Drive: Forensic analysis of data
                                  remnants . . . . . . . . . . . . . . . . 179--193

Journal of Network and Computer Applications
Volume 40, Number 0, April, 2014

              Laleh Arshadi and   
          Amir Hossein Jahangir   Benford's law behavior of Internet
                                  traffic  . . . . . . . . . . . . . . . . 194--205

Journal of Network and Computer Applications
Volume 40, Number ??, April, 2014

              Lingfang Zeng and   
                      Yang Wang   Optimization on content service with
                                  local search in cloud of clouds  . . . . 206--215
                      Ke Li and   
                 Sheng Wang and   
                Shizhong Xu and   
                 Xiong Wang and   
               Haojun Huang and   
                    Jin Ren and   
                        Bo Zhai   Evaluating the benefit of the core-edge
                                  separation on intradomain traffic
                                  engineering under uncertain traffic
                                  demand . . . . . . . . . . . . . . . . . 216--226
               Hyun-Ho Choi and   
                  Ki-Ho Lee and   
                  Jung-Ryun Lee   Energy-delay tradeoff analysis of user
                                  state transition mechanism for mobile
                                  web services . . . . . . . . . . . . . . 227--233
                Xinjie Guan and   
                Baek-Young Choi   Push or pull? Toward optimal content
                                  delivery using cloud storage . . . . . . 234--243
      Francisco Macia-Perez and   
       Iren Lorenzo-Fonseca and   
    Jose Vicente Berna-Martinez   A formal framework for modelling complex
                                  network management systems . . . . . . . 255--269
               Carlos Abreu and   
             Manuel Ricardo and   
                   P. M. Mendes   Energy-aware routing for biomedical
                                  wireless sensor networks . . . . . . . . 270--278
              R. I. Ciobanu and   
                D. G. Reina and   
                   C. Dobre and   
                S. L. Toral and   
                     P. Johnson   JDER: a history-based forwarding scheme
                                  for delay tolerant networks using
                                  Jaccard distance and encountered ration  279--291
               Dingde Jiang and   
              Zhengzheng Xu and   
                 Peng Zhang and   
                       Ting Zhu   A transform domain-based anomaly
                                  detection approach to network-wide
                                  traffic  . . . . . . . . . . . . . . . . 292--306
                   N. Hoque and   
          Monowar H. Bhuyan and   
              R. C. Baishya and   
        D. K. Bhattacharyya and   
                   J. K. Kalita   Network attacks: Taxonomy, tools and
                                  systems  . . . . . . . . . . . . . . . . 307--324
            Md Whaiduzzaman and   
              Mehdi Sookhak and   
              Abdullah Gani and   
                 Rajkumar Buyya   A survey on vehicular cloud computing    325--344
            Saeid Abolfazli and   
              Zohreh Sanaei and   
              Abdullah Gani and   
                   Feng Xia and   
               Laurence T. Yang   Rich Mobile Applications: Genesis,
                                  taxonomy, and open issues  . . . . . . . 345--362
            Baraa T. Sharef and   
           Raed A. Alsaqour and   
                 Mahamod Ismail   Vehicular communication ad hoc routing
                                  protocols: a survey  . . . . . . . . . . 363--396
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 41, Number ??, May, 2014

          Dhiah Al-Shammary and   
             Ibrahim Khalil and   
                     Zahir Tari   A distributed aggregation and fast
                                  fractal clustering approach for SOAP
                                  traffic  . . . . . . . . . . . . . . . . 1--14
                    Tao Qin and   
              Xiaohong Guan and   
                     Wei Li and   
               Pinghui Wang and   
                        Min Zhu   A new connection degree calculation and
                                  measurement method for large scale
                                  network monitoring . . . . . . . . . . . 15--26
                Gurkan Tuna and   
                Bilel Nefzi and   
                Gianpaolo Conte   Unmanned aerial vehicle-aided
                                  communications system for disaster
                                  recovery . . . . . . . . . . . . . . . . 27--36
                  Lijun Gao and   
                   Maode Ma and   
                 Yantai Shu and   
                      Yuhua Wei   An ultralightweight RFID authentication
                                  protocol with CRC and permutation  . . . 37--46
                  Tin-Yu Wu and   
              Wei-Tsong Lee and   
              Nadra Guizani and   
                  Tzu-Ming Wang   Incentive mechanism for P2P file sharing
                                  based on social network and game theory  47--55
           Ricardo Anacleto and   
            Lino Figueiredo and   
                Ana Almeida and   
                   Paulo Novais   Mobile application to provide
                                  personalized sightseeing tours . . . . . 56--64
         J. J. Castro-Schez and   
              M. A. Redondo and   
                  F. Jurado and   
                     J. Albusac   Experience applying language processing
                                  techniques to develop educational
                                  software that allow active learning
                                  methodologies by advising students . . . 65--79
       Ahmed Mohammed Abbas and   
        Azuraliza Abu Bakar and   
              Mohd Zakree Ahmad   Fast dynamic clustering SOAP messages
                                  based compression and aggregation model
                                  for enhanced performance of Web services 80--88
             Bhaskar Sardar and   
              Debashis Saha and   
                  Mahbub Hassan   A novel enhancement of TCP for on-board
                                  IP networks with wireless cellular
                                  connectivity . . . . . . . . . . . . . . 89--100
                    Wei Liu and   
                     Wei Du and   
                  Jing Chen and   
                   Wei Wang and   
                    GuoSun Zeng   Adaptive energy-efficient scheduling
                                  algorithm for parallel tasks on
                                  homogeneous clusters . . . . . . . . . . 101--113
                Jinzhu Wang and   
               Jianxin Liao and   
                Tonghong Li and   
                  Jing Wang and   
                Jingyu Wang and   
                          Qi Qi   Probe-based end-to-end overload control
                                  for networks of SIP servers  . . . . . . 114--125
     Giannis Haralabopoulos and   
        Ioannis Anagnostopoulos   Real time enhanced random sampling of
                                  online social networks . . . . . . . . . 126--134
             Saleh Alghamdi and   
           Ron van Schyndel and   
                 Ibrahim Khalil   Accurate positioning using long range
                                  active RFID technology to assist
                                  visually impaired people . . . . . . . . 135--147
                Yacine Atif and   
                    Liren Zhang   Network resource management in support
                                  of QoS in ubiquitous learning  . . . . . 148--156
                Xiaoyuan Li and   
               Dexiang Wang and   
              Janise McNair and   
                   Jianmin Chen   Dynamic spectrum access with packet size
                                  adaptation and residual energy balancing
                                  for energy-constrained cognitive radio
                                  sensor networks  . . . . . . . . . . . . 157--166
      Muhammad Hamad Alizai and   
                   Klaus Wehrle   Probabilistic location-free addressing
                                  in wireless networks . . . . . . . . . . 167--181
            Sergio Pastrana and   
             Agustin Orfila and   
           Juan E. Tapiador and   
              Pedro Peris-Lopez   Randomized Anagram revisited . . . . . . 182--196
                Tahir Ahmad and   
                   Usman Younis   Randomness testing of non-cryptographic
                                  hash functions for real-time hash table
                                  based storage and look-up of URLs  . . . 197--205
               Tim Verbelen and   
             Pieter Simoens and   
             Filip De Turck and   
                    Bart Dhoedt   Adaptive deployment and configuration
                                  for mobile augmented reality in the
                                  cloudlet . . . . . . . . . . . . . . . . 206--216
          M. A. Raayatpanah and   
        H. Salehi Fathabadi and   
               B. H. Khalaj and   
              S. Khodayifar and   
                 P. M. Pardalos   Bounds on end-to-end statistical delay
                                  and jitter in multiple multicast coded
                                  packet networks  . . . . . . . . . . . . 217--227
         Bert Vankeirsbilck and   
             Pieter Simoens and   
             Filip De Turck and   
             Piet Demeester and   
                    Bart Dhoedt   Network latency hiding in thin client
                                  systems through server-centric
                                  speculative display updating . . . . . . 228--239
          Radu-Ioan Ciobanu and   
              Ciprian Dobre and   
              Mihai Dascalu and   
        Stefan Trausan-Matu and   
               Valentin Cristea   SENSE: a collaborative selfish node
                                  detection and incentive mechanism for
                                  opportunistic networks . . . . . . . . . 240--249
                 Thang Tran and   
              Maike Kuhnert and   
             Christian Wietfeld   Cloud voice service as over-the-top
                                  solution for seamless voice call
                                  continuity in a heterogeneous network
                                  environment  . . . . . . . . . . . . . . 250--262
                   Yusen Li and   
                    Wentong Cai   Update schedules for improving
                                  consistency in multi-server distributed
                                  virtual environments . . . . . . . . . . 263--273
                     Fan Li and   
               Jinsheng Sun and   
             Moshe Zukerman and   
               Zhengfei Liu and   
                     Qin Xu and   
                 Sammy Chan and   
              Guanrong Chen and   
                    King-Tim Ko   A comparative simulation study of
                                  TCP/AQM systems for evaluating the
                                  potential of neuron-based AQM schemes    274--299
            Govind P. Gupta and   
                Manoj Misra and   
                    Kumkum Garg   Energy and trust aware mobile agent
                                  migration protocol for data aggregation
                                  in wireless sensor networks  . . . . . . 300--311
              Mehrnaz Moudi and   
                 Mohamed Othman   A GreedyZero algorithm to minimise the
                                  conflicts in an Optical Multistage
                                  Interconnection Network  . . . . . . . . 312--318
  Álvaro Rubio-Largo and   
Miguel A. Vega-Rodríguez and   
David L. González-Álvarez   Performance assessment of multiobjective
                                  approaches in optical Traffic Grooming   319--350
                      Li Yi and   
               Huachun Zhou and   
              Daochao Huang and   
                   Hongke Zhang   An analytical study of distributed
                                  mobility management schemes with a flow
                                  duration based model . . . . . . . . . . 351--357
              Lingfang Zeng and   
       Bharadwaj Veeravalli and   
                   Qingsong Wei   Space4time: Optimization
                                  latency-sensitive content service in
                                  cloud  . . . . . . . . . . . . . . . . . 358--368
             Satoshi Utsumi and   
Salahuddin Muhammad Salim Zabir   A new high-performance TCP friendly
                                  congestion control over wireless
                                  networks . . . . . . . . . . . . . . . . 369--378
              Qingyang Song and   
              Zhaolong Ning and   
                 Yang Huang and   
                    Lei Guo and   
                    Xiaobing Lu   Joint power control and spectrum access
                                  in cognitive radio networks  . . . . . . 379--388
     Nima Jafari Navimipour and   
        Amir Masoud Rahmani and   
      Ahmad Habibizad Navin and   
             Mehdi Hosseinzadeh   Resource discovery mechanisms in grid
                                  systems: a survey  . . . . . . . . . . . 389--410
                    Ying Li and   
                   Radim Bartos   A survey of protocols for Intermittently
                                  Connected Delay-Tolerant Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 411--423
        Sunilkumar S. Manvi and   
            Gopal Krishna Shyam   Resource management for Infrastructure
                                  as a Service (IaaS) in cloud computing:
                                  a survey . . . . . . . . . . . . . . . . 424--440
               Ssu-Hsuan Lu and   
              Kuan-Ching Li and   
              Kuan-Chou Lai and   
                Yeh-Ching Chung   Effectiveness of a replica mechanism to
                                  improve availability with Arrangement
                                  Graph-Based Overlay  . . . . . . . . . . 441--450
         Abderrazak Abdaoui and   
              Tarek M. El-Fouly   TOSSIM and distributed binary consensus
                                  algorithm in wireless sensor networks    451--458
              R. Q. Shaddad and   
             A. B. Mohammad and   
           S. A. Al-Gailani and   
             A. M. Al-hetar and   
                M. A. Elmagzoub   A survey on access technologies for
                                  broadband optical and wireless networks  459--472
        Ayesha Binte Ashfaq and   
               Sajjad Rizvi and   
                Mobin Javed and   
            Syed Ali Khayam and   
         Muhammad Qasim Ali and   
                  Ehab Al-Shaer   Information theoretic feature space
                                  slicing for statistical anomaly
                                  detection  . . . . . . . . . . . . . . . 473--487
              Ratnadip Adhikari   A meticulous study of various medium
                                  access control protocols for wireless
                                  sensor networks  . . . . . . . . . . . . 488--504
      Jesús Friginal and   
           Juan-Carlos Ruiz and   
     David de Andrés and   
                 Antonio Bustos   Ambient noise in wireless mesh networks:
                                  Evaluation and proposal of an adaptive
                                  algorithm to mitigate link removal . . . 505--516
             Shazana Md Zin and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
           Al-Sakib Khan Pathan   Routing protocol design for secure WSN:
                                  Review and open research issues  . . . . 517--530
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 42, Number ??, June, 2014

                Jinyuan Jia and   
                   Wei Wang and   
                    Xiaojun Hei   An efficient caching algorithm for
                                  peer-to-peer $3$D streaming in
                                  distributed virtual environments . . . . 1--11
                     Qin Xu and   
                   Jinsheng Sun   A simple active queue management based
                                  on the prediction of the packet arrival
                                  rate . . . . . . . . . . . . . . . . . . 12--20
        Mehdi Naderi Soorki and   
                  Habib Rostami   Label switched protocol routing with
                                  guaranteed bandwidth and end to end path
                                  delay in MPLS networks . . . . . . . . . 21--38
        Víctor Mateu and   
       Francesc Sebé and   
                    Magda Valls   Constructing credential-based E-voting
                                  systems from offline E-coin protocols    39--44
            Poria Pirozmand and   
                  Guowei Wu and   
             Behrouz Jedari and   
                       Feng Xia   Human mobility in opportunistic
                                  networks: Characteristics, models and
                                  prediction methods . . . . . . . . . . . 45--58
           Abbas Mehdizadeh and   
       Fazirulhisyam Hashim and   
                 Mohamed Othman   Lightweight decentralized
                                  multicast-unicast key management method
                                  in wireless IPv6 networks  . . . . . . . 59--69
               Guangjie Han and   
                   Jia Chao and   
               Chenyu Zhang and   
                    Lei Shu and   
                      Qingwu Li   The impacts of mobility models on DV-hop
                                  based localization in Mobile Wireless
                                  Sensor Networks  . . . . . . . . . . . . 70--79
             Hadi Shakibian and   
    Nasrollah Moghadam Charkari   In-cluster vector evaluated particle
                                  swarm optimization for distributed
                                  regression in WSNs . . . . . . . . . . . 80--91
              Nadine Akkari and   
           Ghadah Aldabbagh and   
               Michel Nahas and   
                    John Cioffi   Dynamic Clustering Protocol for
                                  coordinated tethering over cellular
                                  networks . . . . . . . . . . . . . . . . 92--101
   Shahaboddin Shamshirband and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
            Vala Ali Rohani and   
         Dalibor Petkovi\'c and   
               Sanjay Misra and   
               Abdul Nasir Khan   Co-FAIS: Cooperative fuzzy artificial
                                  immune system for detecting intrusion in
                                  wireless sensor networks . . . . . . . . 102--117
Jordán Pascual Espada and   
            Ronald R. Yager and   
                        Bin Guo   Internet of Things: Smart things network
                                  and communication  . . . . . . . . . . . 118--119
                  Zheng Yan and   
                 Peng Zhang and   
        Athanasios V. Vasilakos   A survey on trust management for
                                  Internet of Things . . . . . . . . . . . 120--134
                    Wei Xie and   
                    Lei Xie and   
                 Chen Zhang and   
                 Qiang Wang and   
                    Jian Xu and   
                 Quan Zhang and   
                  Chaojing Tang   RFID seeking: Finding a lost tag rather
                                  than only detecting its missing  . . . . 135--142
                  Lianbo Ma and   
                 Kunyuan Hu and   
                Yunlong Zhu and   
                   Hanning Chen   Cooperative artificial bee colony
                                  algorithm for multi-objective RFID
                                  network planning . . . . . . . . . . . . 143--162
             Hicham Lakhlef and   
                Hakim Mabed and   
               Julien Bourgeois   Optimization of the logical topology for
                                  mobile MEMS networks . . . . . . . . . . 163--177
  Guillermo Cueva-Fernandez and   
Jordán Pascual Espada and   
Vicente García-Díaz and   
Cristian González García and   
        Nestor Garcia-Fernandez   Vitruvius: an expert system for vehicle
                                  sensor tracking and managing application
                                  generation . . . . . . . . . . . . . . . 178--188
                 Jiajun Sun and   
                     Huadong Ma   Heterogeneous-belief based incentive
                                  schemes for crowd sensing in mobile
                                  social networks  . . . . . . . . . . . . 189--196
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 43, Number ??, August, 2014

               Yasir Saleem and   
        Mubashir Husain Rehmani   Primary radio user activity models for
                                  cognitive radio networks: a survey . . . 1--16
                    Dong Ma and   
                       Maode Ma   Network selection and resource
                                  allocation for multicast in HetNets  . . 17--26
                 Gongqi Lin and   
                Sieteng Soh and   
               Kwan-Wu Chin and   
                Mihai Lazarescu   Energy Aware Two Disjoint Paths Routing  27--41
                   Zheng Xu and   
                Yunhuai Liu and   
                    Lin Mei and   
               Chuanping Hu and   
                       Lan Chen   Generating temporal semantic context of
                                  concepts using web search engines  . . . 42--55
                  JuiHsi Fu and   
                PoChing Lin and   
                   SingLing Lee   Detecting spamming activities in a
                                  campus network using incremental
                                  learning . . . . . . . . . . . . . . . . 56--65
         Mohamed A. Alrshah and   
             Mohamed Othman and   
            Borhanuddin Ali and   
             Zurina Mohd Hanapi   Comparative study of high-speed Linux
                                  TCP variants over high-BDP networks  . . 66--75
                Xiaoping Wu and   
               GuoYing Wang and   
                    Dan Dai and   
                   Mengjun Tong   Accurate acoustic energy-based
                                  localization with beacon position
                                  uncertainty in wireless sensor networks  76--83
              Abdullah Gani and   
      Golam Mokatder Nayeem and   
            Muhammad Shiraz and   
              Mehdi Sookhak and   
            Md Whaiduzzaman and   
                   Suleman Khan   A review on interworking and mobility
                                  techniques for seamless connectivity in
                                  mobile cloud computing . . . . . . . . . 84--102
           Eduardo da Silva and   
          Luiz Carlos P. Albini   Middleware proposals for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 103--120
              Mehdi Sookhak and   
             Hamid Talebian and   
                 Ejaz Ahmed and   
              Abdullah Gani and   
          Muhammad Khurram Khan   A review on remote data auditing in
                                  single cloud server: Taxonomy and open
                                  issues . . . . . . . . . . . . . . . . . 121--141
             Hui-Shyong Yeo and   
            Xiao-Shen Phang and   
               Hoon-Jae Lee and   
                    Hyotaek Lim   Leveraging client-side storage
                                  techniques for enhanced use of multiple
                                  consumer cloud storage services on
                                  resource-constrained mobile devices  . . 142--156
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 44, Number ??, September, 2014

   Mohammad Reza Jabbarpour and   
            Rafidah Md Noor and   
      Rashid Hafeez Khokhar and   
                   Chih-Heng Ke   Cross-layer congestion control model for
                                  urban vehicular environments . . . . . . 1--16
                   Jiyan Wu and   
                   Bo Cheng and   
               Yanlei Shang and   
                  Jun Huang and   
                  Junliang Chen   A novel scheduling approach to
                                  concurrent multipath transmission of
                                  high definition video in overlay
                                  networks . . . . . . . . . . . . . . . . 17--29
               Amr El Mougy and   
               Aymen Kamoun and   
           Mohamed Ibnkahla and   
               Sa\"\id Tazi and   
                   Khalil Drira   A context and application-aware
                                  framework for resource management in
                                  dynamic collaborative wireless M2M
                                  networks . . . . . . . . . . . . . . . . 30--45
              Anindya Iqbal and   
                 Manzur Murshed   On demand-driven movement strategy for
                                  moving beacons in sensor localization    46--62
              Guo-Song Tian and   
                Yu-Chu Tian and   
                    Colin Fidge   Precise relative clock synchronization
                                  for distributed control using TSC
                                  registers  . . . . . . . . . . . . . . . 63--71
Víctor Fernández and   
  Juan Manuel Orduña and   
                  Pedro Morillo   Server implementations for improving the
                                  performance of CAR systems based on
                                  mobile phones  . . . . . . . . . . . . . 72--82
        Khairul Azami Sidek and   
                     Vu Mai and   
                 Ibrahim Khalil   Data mining in mobile ECG based
                                  biometric identification . . . . . . . . 83--91
              Guoxing Jiang and   
                   Jun Chen and   
                   Yanqing Shen   Delivery ratio- and buffered
                                  time-constrained: Multicasting for Delay
                                  Tolerant Networks  . . . . . . . . . . . 92--105
               Ying-Dar Lin and   
            Ekarat Rattagan and   
             Yuan-Cheng Lai and   
               Li-Pin Chang and   
               Yun-Chien Yo and   
              Cheng-Yuan Ho and   
                 Shun-Lee Chang   Calibrating parameters and formulas for
                                  process-level energy consumption
                                  profiling in smartphones . . . . . . . . 106--119
                 Wenjia Niu and   
                    Gang Li and   
                Endong Tong and   
              Quan Z. Sheng and   
                    Qian Li and   
                     Yue Hu and   
    Athanasios V. Vasilakos and   
                         Li Guo   A block-aware hybrid data dissemination
                                  with hotspot elimination in wireless
                                  sensor network . . . . . . . . . . . . . 120--133
              Hassina Nacer and   
                 Djamil Aissani   Semantic web services: Standards,
                                  applications, challenges and solutions   134--151
                Weiwei Fang and   
                  Zhulin An and   
                    Lei Shu and   
                 Qingyu Liu and   
                 Yongjun Xu and   
                        Yuan An   Achieving optimal admission control with
                                  dynamic scheduling in energy constrained
                                  network systems  . . . . . . . . . . . . 152--160
                   Jiyan Wu and   
               Yanlei Shang and   
                  Chau Yuen and   
                   Bo Cheng and   
                  Junliang Chen   TRADER: a reliable transmission scheme
                                  to video conferencing applications over
                                  the Internet . . . . . . . . . . . . . . 161--171
               Changqing Ji and   
                 Zhiyang Li and   
                   Wenyu Qu and   
                   Yujie Xu and   
                    Yuanyuan Li   Scalable nearest neighbor query
                                  processing based on Inverted Grid Index  172--182
             Shaahin Madani and   
                 Ibrahim Khalil   Garbled Routing (GR): a generic
                                  framework towards unification of
                                  anonymous communication systems  . . . . 183--195
            Pooia Lalbakhsh and   
               Bahram Zaeri and   
            Yi-Ping Phoebe Chen   Using Dead Ants to improve the
                                  robustness and adaptability of AntNet
                                  routing algorithm  . . . . . . . . . . . 196--211
                Sudip Misra and   
         P. Venkata Krishna and   
                 V. Saritha and   
            Harshit Agarwal and   
                   Aditya Ahuja   Learning automata-based
                                  multi-constrained fault-tolerance
                                  approach for effective energy management
                                  in smart grid communication network  . . 212--219
          Israat Tanzeena Haque   A sensor based indoor localization
                                  through fingerprinting . . . . . . . . . 220--229
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 45, Number ??, October, 2014

               Abbas Bradai and   
               Toufik Ahmed and   
              Raouf Boutaba and   
                     Reaz Ahmed   Efficient content delivery scheme for
                                  layered video streaming in large-scale
                                  networks . . . . . . . . . . . . . . . . 1--14
                Jenhui Chen and   
                Zhuxiu Yuan and   
                       Lei Wang   An apropos signal report and adaptive
                                  period (ASAP) scheme for fast handover
                                  in the fourth-generation wireless
                                  networks . . . . . . . . . . . . . . . . 15--26
                   An Huang and   
                        Bing Hu   The optimal joint sequence design in the
                                  feedback-based two-stage switch  . . . . 27--34
                  Jun Huang and   
                Guoquan Liu and   
                     Qiang Duan   On modeling and optimization for
                                  composite network-Cloud service
                                  provisioning . . . . . . . . . . . . . . 35--43
               Junaid Qadir and   
                 Adeel Baig and   
                   Asad Ali and   
               Quratulain Shafi   Multicasting in cognitive radio
                                  networks: Algorithms, techniques and
                                  protocols  . . . . . . . . . . . . . . . 44--61
           Vandana Kushwaha and   
               Ratneshwer Gupta   Congestion control for high-speed wired
                                  network: a systematic literature review  62--78
          Kok-Lim Alvin Yau and   
               Nordin Ramli and   
             Wahidah Hashim and   
                Hafizal Mohamad   Clustering algorithms for Cognitive
                                  Radio networks: a survey . . . . . . . . 79--95
   Mohammad Iftekhar Husain and   
               Steven Y. Ko and   
              Steve Uurtamo and   
                 Atri Rudra and   
             Ramalingam Sridhar   Bidirectional data verification for
                                  cloud storage  . . . . . . . . . . . . . 96--107
         Saurabh Kumar Garg and   
        Adel Nadjaran Toosi and   
 Srinivasa K. Gopalaiyengar and   
                 Rajkumar Buyya   SLA-based virtual machine management for
                                  heterogeneous workloads in a cloud
                                  datacenter . . . . . . . . . . . . . . . 108--120
                    Yan Zhu and   
                      Di Ma and   
                Changjun Hu and   
              Gail-Joon Ahn and   
                     Hongxin Hu   Secure and efficient random functions
                                  with variable-length output  . . . . . . 121--133
                     Le Sun and   
                   Hai Dong and   
    Farookh Khadeer Hussain and   
       Omar Khadeer Hussain and   
                Elizabeth Chang   Cloud service selection:
                                  State-of-the-art and future research
                                  directions . . . . . . . . . . . . . . . 134--150
             Gurpreet Singh and   
               Neeraj Kumar and   
               Anil Kumar Verma   ANTALG: an Innovative ACO based Routing
                                  Algorithm for MANETs . . . . . . . . . . 151--167
     Fatima Zohra Benhamida and   
             Yacine Challal and   
                 Mouloud Koudil   Adaptive failure detection in low power
                                  lossy wireless sensor networks . . . . . 168--180
                Julio Dondo and   
           Felix Villanueva and   
               David Garcia and   
              David Vallejo and   
       Carlos Glez-Morcillo and   
              Juan Carlos Lopez   Distributed FPGA-based architecture to
                                  support indoor localisation and
                                  orientation services . . . . . . . . . . 181--190
                 Rawya Rizk and   
                Walaa Saber and   
                      Hany Harb   Conditional clustered matrix
                                  factorization based network coordinate
                                  system . . . . . . . . . . . . . . . . . 191--202
         Masoume Jabbarifar and   
                Michel Dagenais   LIANA: Live incremental time
                                  synchronization of traces for
                                  distributed systems analysis . . . . . . 203--214
            Yosra Ben Saied and   
           Alexis Olivereau and   
           Djamal Zeghlache and   
               Maryline Laurent   A survey of collaborative services and
                                  security-related issues in modern
                                  wireless Ad-Hoc communications . . . . . 215--227
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 46, Number ??, November, 2014

           Ivanilton Polato and   
        Reginaldo Ré and   
            Alfredo Goldman and   
                      Fabio Kon   A comprehensive view of Hadoop research
                                  --- a systematic literature review . . . 1--25
            Hosein Mohamadi and   
         Shaharuddin Salleh and   
        Mohd Norsyarizad Razali   Heuristic methods to maximize network
                                  lifetime in directional sensor networks
                                  with adjustable sensing ranges . . . . . 26--35
      Farzaneh R. Armaghani and   
               Iqbal Gondal and   
        Joarder Kamruzzaman and   
                 David G. Green   Sensor selection for tracking multiple
                                  groups of targets  . . . . . . . . . . . 36--47
                   Congduc Pham   Communication performances of IEEE
                                  802.15.4 wireless sensor motes for
                                  data-intensive applications: a
                                  comparison of WaspMote, Arduino MEGA,
                                  TelosB, MicaZ and iMote2 for image
                                  surveillance . . . . . . . . . . . . . . 48--59
                Haidar Safa and   
               Marcel Karam and   
                  Bassam Moussa   PHAODV: Power aware heterogeneous
                                  routing protocol for MANETs  . . . . . . 60--71
                   Ning Liu and   
                Xiaoping Li and   
                   Weiming Shen   Multi-granularity resource
                                  virtualization and sharing strategies in
                                  cloud manufacturing  . . . . . . . . . . 72--82
              Tarek Khalifa and   
              Atef Abdrabou and   
       Khaled Bashir Shaban and   
            Maazen Alsabaan and   
               Kshirasagar Naik   Transport layer performance analysis and
                                  optimization for smart metering
                                  infrastructure . . . . . . . . . . . . . 83--93
                   Jing Qin and   
               Hongwei Duan and   
                Huawei Zhao and   
                     Jiankun Hu   A new Lagrange solution to the
                                  privacy-preserving general geometric
                                  intersection problem . . . . . . . . . . 94--99
             Omessaad Hamdi and   
      Mohamed Aymen Chalouf and   
           Dramane Ouattara and   
                 Francine Krief   eHealth: Survey on research projects,
                                  comparative study of telemonitoring
                                  architectures and main issues  . . . . . 100--112
               Vesal Hakami and   
                  Mehdi Dehghan   Efficient broadcasting in slow fading
                                  wireless ad-hoc networks . . . . . . . . 113--123
             Ing-Chau Chang and   
            Eric Jui-Lin Lu and   
           Shiuan-Yin Huang and   
                    Yi-Hui Chen   An RDF-based P2P overlay network
                                  supporting range and wildcard queries    124--138
           Kh Mahmudul Alam and   
        Joarder Kamruzzaman and   
              Gour Karmakar and   
                 Manzur Murshed   Dynamic adjustment of sensing range for
                                  event coverage in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 139--153
          Seytkamal Medetov and   
           Mohamed Bakhouya and   
               Jaafar Gaber and   
            Khalid Zinedine and   
                Maxime Wack and   
                  Pascal Lorenz   A decentralized approach for information
                                  dissemination in Vehicular Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 154--165
    Muhammad Zubair Farooqi and   
       Salma Malik Tabassum and   
    Mubashir Husain Rehmani and   
                   Yasir Saleem   A survey on network coding: From
                                  traditional wireless networks to
                                  emerging cognitive radio networks  . . . 166--181
          Cüneyt Sevgi and   
          Altan Koçyigit   Optimal deployment in randomly deployed
                                  heterogeneous WSNs: a connected coverage
                                  approach . . . . . . . . . . . . . . . . 182--197
             M. Mehdi Afsar and   
         Mohammad-H. Tayarani-N   Clustering in sensor networks: a
                                  literature survey  . . . . . . . . . . . 198--226
      Panayiotis G. Andreou and   
Demetrios Zeinalipour-Yazti and   
          George S. Samaras and   
           Panos K. Chrysanthis   A network-aware framework for
                                  energy-efficient data acquisition in
                                  wireless sensor networks . . . . . . . . 227--240
           David H. S. Lima and   
         Andre L. L. Aquino and   
            Heitor S. Ramos and   
          Eliana S. Almeida and   
        Joel J. P. C. Rodrigues   OASys: an opportunistic and agile system
                                  to detect free on-street parking using
                                  intelligent boards embedded in
                                  surveillance cameras . . . . . . . . . . 241--249
      Abderrahim Benslimane and   
                 Jiankun Hu and   
          Xuemin (Sherman) Shen   Special issue on ``Quality of service in
                                  wireless and mobile networking'' . . . . 250--251
            Meng-Shiuan Pan and   
                   Ping-Lin Liu   Low latency scheduling for convergecast
                                  in ZigBee tree-based wireless sensor
                                  networks . . . . . . . . . . . . . . . . 252--263
               Neeraj Kumar and   
            Sudhanshu Tyagi and   
                 Der-Jiunn Deng   LA-EEHSC: Learning automata-based energy
                                  efficient heterogeneous selective
                                  clustering for wireless sensor networks  264--279
               Adnan Shahid and   
               Saleem Aslam and   
             Hyung Seok Kim and   
                 Kyung-Geun Lee   Distributed joint resource and power
                                  allocation in self-organized femtocell
                                  networks: a potential game approach  . . 280--292
               Miloud Bagaa and   
             Mohamed Younis and   
             Adlen Ksentini and   
                 Nadjib Badache   Reliable multi-channel scheduling for
                                  timely dissemination of aggregated data
                                  in wireless sensor networks  . . . . . . 293--304
                 Peijian Ju and   
                   Wei Song and   
                 A-Long Jin and   
                     Dizhi Zhou   Performance analysis and enhancement for
                                  a cooperative wireless diversity network
                                  with spatially random mobile helpers . . 305--314
               Ruichun Tang and   
               Yuanzhen Yue and   
             Xiangqian Ding and   
                        Yue Qiu   Credibility-based cloud media resource
                                  allocation algorithm . . . . . . . . . . 315--321
               Li Jun Zhang and   
                  Samuel Pierre   An enhanced fast handover with seamless
                                  mobility support for next-generation
                                  wireless networks  . . . . . . . . . . . 322--335
                  K. Ivesic and   
            L. Skorin-Kapov and   
                 M. Matijasevic   Cross-layer QoE-driven admission control
                                  and resource allocation for adaptive
                                  multimedia services in LTE . . . . . . . 336--351
            Sonia Ben Rejeb and   
               Nidal Nasser and   
                   Sami Tabbane   A novel resource allocation scheme for
                                  LTE network in the presence of mobility  352--361
         Nourch\`ene Bradai and   
       Lamia Chaari Fourati and   
                   Lotfi Kamoun   Investigation and performance analysis
                                  of MAC protocols for WBAN networks . . . 362--373
            Jacques M. Bahi and   
          Christophe Guyeux and   
               Mourad Hakem and   
               Abdallah Makhoul   Epidemiological approach for data
                                  survivability in unattended wireless
                                  sensor networks  . . . . . . . . . . . . 374--383
                    Zhi Liu and   
               Jingyun Feng and   
                 Yusheng Ji and   
                 Yongbing Zhang   EAF: Energy-aware adaptive free
                                  viewpoint video wireless transmission    384--394
         Abderrezak Rachedi and   
                Hakim Badis and   
          Abderrahim Benslimane   How MIMO cross-layer design enables QoS
                                  while detecting non-cooperative nodes in
                                  wireless multi-hop networks  . . . . . . 395--406
                  Tao Huang and   
                  Baoliu Ye and   
                   Song Guo and   
                      Sanglu Lu   Delay minimization by exploring
                                  full-duplex capacity and relay-based
                                  cooperative scheduling in WLANs  . . . . 407--417
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 47, Number ??, January, 2015

              Ali Moussaoui and   
             Abdallah Boukeream   A survey of routing protocols based on
                                  link-stability in mobile ad hoc networks 1--10
          T. Daniel Wallace and   
        Khalim Amjad Meerja and   
                 Abdallah Shami   On-demand scheduling for concurrent
                                  multipath transfer using the stream
                                  control transmission protocol  . . . . . 11--22
              G. Campobello and   
                O. Giordano and   
                 A. Segreto and   
                     S. Serrano   Comparison of local lossless compression
                                  algorithms for Wireless Sensor Networks  23--31
              Raed Alsaqour and   
              Maha Abdelhaq and   
               Rashid Saeed and   
                Mueen Uddin and   
               Ola Alsukour and   
       Mohammed Al-Hubaishi and   
                  Tariq Alahdal   Dynamic packet beaconing for GPSR mobile
                                  ad hoc position-based routing protocol
                                  using fuzzy logic  . . . . . . . . . . . 32--46
            Muhammad Shiraz and   
              Mehdi Sookhak and   
              Abdullah Gani and   
            Syed Adeel Ali Shah   A Study on the Critical Analysis of
                                  Computational Offloading Frameworks for
                                  Mobile Cloud Computing . . . . . . . . . 47--60
           Anna Maria Vegni and   
               Enrico Natalizio   Forwarder smart selection protocol for
                                  limitation of broadcast storm problem    61--71
                  Xiaobo Ma and   
               Junjie Zhang and   
                 Zhenhua Li and   
                Jianfeng Li and   
                   Jing Tao and   
              Xiaohong Guan and   
             John C. S. Lui and   
                    Don Towsley   Accurate DNS query characteristics
                                  estimation via active probing  . . . . . 72--84
       Jaime Garcia-Reinoso and   
  Norberto Fernández and   
                 Ivan Vidal and   
     Jesús Arias Fisteus   Scalable data replication in
                                  content-centric networking based on
                                  alias names  . . . . . . . . . . . . . . 85--98
    Rafael Weingärtner and   
Gabriel Beims Bräscher and   
        Carlos Becker Westphall   Cloud resource management: a survey on
                                  forecasting and profiling models . . . . 99--106
                 Hela Mliki and   
               Lamia Chaari and   
                   Lotfi Kamoun   A comprehensive survey on Carrier
                                  Ethernet Congestion Management mechanism 107--130
    Angela Sara Cacciapuoti and   
           Marcello Caleffi and   
                Luigi Paura and   
             Md Arafatur Rahman   Channel availability for mobile
                                  cognitive radio networks . . . . . . . . 131--136
               Lutful Karim and   
                  N. Nasser and   
              Q. H. Mahmoud and   
           Alagan Anpalagan and   
                    T. E. Salti   Range-free localization approach for M2M
                                  communication system using mobile anchor
                                  nodes  . . . . . . . . . . . . . . . . . 137--146
               Subir Halder and   
                  Sipra Das Bit   Design of an Archimedes' spiral based
                                  node deployment scheme targeting
                                  enhancement of network lifetime in
                                  wireless sensor networks . . . . . . . . 147--167
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 48, Number ??, February, 2015

            Massimo Vecchio and   
  Roberto López-Valcarce   Improving area coverage of wireless
                                  sensor networks via controllable mobile
                                  nodes: a greedy approach . . . . . . . . 1--13
                 Ruiying Li and   
                Jingfu Wang and   
                Haitao Liao and   
                     Ning Huang   A new method for reliability allocation
                                  of avionics connected via an airborne
                                  network  . . . . . . . . . . . . . . . . 14--21
      Alejandro Ruiz-Rivera and   
               Kwan-Wu Chin and   
                    Sieteng Soh   A novel framework to mitigate the
                                  negative impacts of green techniques on
                                  BGP  . . . . . . . . . . . . . . . . . . 22--34
                     Wei Li and   
                      Wei Zhang   Coverage hole and boundary nodes
                                  detection in wireless sensor networks    35--43
            Adnan Akhunzada and   
              Mehdi Sookhak and   
           Nor Badrul Anuar and   
              Abdullah Gani and   
                 Ejaz Ahmed and   
            Muhammad Shiraz and   
             Steven Furnell and   
                 Amir Hayat and   
          Muhammad Khurram Khan   Man-At-The-End attacks: Analysis,
                                  taxonomy, human aspects, motivation and
                                  future directions  . . . . . . . . . . . 44--57
       Muhammad Ashad Kabir and   
                    Jun Han and   
                   Bonghee Hong   Reader level filtering for efficient
                                  query processing in RFID middleware  . . 58--70
                   Bin Liao and   
                   Jiong Yu and   
                  Tao Zhang and   
                Guo Binglei and   
                    Sun Hua and   
                 Changtian Ying   Energy-efficient algorithms for
                                  distributed storage system based on
                                  block storage structure reconfiguration  71--86
             Chien-Fu Cheng and   
                  Kuo-Tang Tsai   A recursive Byzantine-resilient protocol 87--98
                 Jieyao Liu and   
                 Ejaz Ahmed and   
            Muhammad Shiraz and   
              Abdullah Gani and   
             Rajkumar Buyya and   
                  Ahsan Qureshi   Application partitioning algorithms in
                                  mobile cloud computing: Taxonomy, review
                                  and future directions  . . . . . . . . . 99--117
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 49, Number ??, March, 2015

                Xianfu Meng and   
                 Yanli Wang and   
                       Yue Gong   Perspective of space and time based
                                  replica population organizing strategy
                                  in unstructured peer-to-peer networks    1--14
               Jia Hao Kong and   
                Li-Minn Ang and   
                 Kah Phooi Seng   A comprehensive survey of modern
                                  symmetric cryptographic solutions for
                                  resource constrained environments  . . . 15--50
                Peiyan Yuan and   
                       Ping Liu   Data fusion prolongs the lifetime of
                                  mobile sensing networks  . . . . . . . . 51--59
                Faiza Nawaz and   
                    Varun Jeoti   NFRA-C, neighbor friendly reader to
                                  reader anti-collision protocol with
                                  counters for dense reader environments   60--67
               Xiaonan Wang and   
                 Deguang Le and   
                 Yufeng Yao and   
                    Conghua Xie   Location-based mobility support for
                                  6LoWPAN wireless sensor networks . . . . 68--77
                 Ying Zhang and   
              Houkuan Huang and   
                     Hui He and   
                  Jing Teng and   
                   Zhuxiao Wang   Efficient distributed semantic based
                                  data and service unified discovery with
                                  one-dimensional semantic space . . . . . 78--87
        Amir Masoud Rahmani and   
              Zeinab Fadaie and   
        Anthony T. Chronopoulos   Data placement using Dewey Encoding in a
                                  hierarchical data grid . . . . . . . . . 88--98
              Hendrik Moens and   
                 Filip De Turck   Shared resource network-aware impact
                                  determination algorithms for service
                                  workflow deployment with partial cloud
                                  offloading . . . . . . . . . . . . . . . 99--111
         Qazi Mamoon Ashraf and   
           Mohamed Hadi Habaebi   Autonomic schemes for threat mitigation
                                  in Internet of Things  . . . . . . . . . 112--127
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 50, Number ??, April, 2015

             Babak Daghighi and   
        Miss Laiha Mat Kiah and   
   Shahaboddin Shamshirband and   
       Muhammad Habib Ur Rehman   Toward secure group communication in
                                  wireless mobile environments: Issues,
                                  solutions, and challenges  . . . . . . . 1--14
               Yasir Saleem and   
    Mubashir Husain Rehmani and   
               Sherali Zeadally   Integration of Cognitive Radio
                                  Technology with unmanned aerial
                                  vehicles: Issues, opportunities, and
                                  future research challenges . . . . . . . 15--31
                 Laisen Nie and   
               Dingde Jiang and   
                        Lei Guo   A convex optimization-based traffic
                                  matrix estimation approach in
                                  IP-over-WDM backbone networks  . . . . . 32--38
              Lingfang Zeng and   
       Bharadwaj Veeravalli and   
               Albert Y. Zomaya   An integrated task computation and data
                                  management scheduling strategy for
                                  workflow applications in cloud
                                  environments . . . . . . . . . . . . . . 39--48
Lorena González-Manzano and   
                 Agustin Orfila   An efficient confidentiality-preserving
                                  Proof of Ownership for deduplication . . 49--59
               Jonathan Loo and   
                    Mahdi Aiash   Special issue on information-centric
                                  network architecture, protocols,
                                  algorithms and applications  . . . . . . 60--63
               Jonathan Loo and   
                    Mahdi Aiash   Challenges and solutions for secure
                                  information centric networks: a case
                                  study of the NetInf architecture . . . . 64--72
                Mahdi Aiash and   
                   Jonathan Loo   An integrated authentication and
                                  authorization approach for the network
                                  of information architecture  . . . . . . 73--79
                 Mingwei Xu and   
             Zhongxing Ming and   
                Chunmei Xia and   
                     Jia Ji and   
                     Dan Li and   
                       Dan Wang   SIONA: a Service and Information
                                  Oriented Network Architecture  . . . . . 80--91
            Charilaos Stais and   
           George Xylomenos and   
            Alexios Voulimeneas   A reliable multicast transport protocol
                                  for information-centric networks . . . . 92--100
                  Dabin Kim and   
               Sung-Won Lee and   
               Young-Bae Ko and   
                   Jae-Hoon Kim   Cache capacity-aware content centric
                                  networking under flash crowds  . . . . . 101--113
                   Paulo Mendes   Combining data naming and context
                                  awareness for pervasive networks . . . . 114--125
        Bander A. Alzahrani and   
             Martin J. Reed and   
      Janne Riihijärvi and   
        Vassilios G. Vassilakis   Scalability of information centric
                                  networking using mediated topology
                                  management . . . . . . . . . . . . . . . 126--133
               Xiuquan Qiao and   
                Guoshun Nan and   
                   Yue Peng and   
                    Lei Guo and   
               Jingwen Chen and   
                 Yunlei Sun and   
                  Junliang Chen   NDNBrowser: an extended web browser for
                                  named data networking  . . . . . . . . . 134--147
              Marica Amadeo and   
            Claudia Campolo and   
             Antonella Molinaro   Forwarding strategies in named data
                                  wireless ad hoc networks: Design and
                                  evaluation . . . . . . . . . . . . . . . 148--158
                     S. Eum and   
                   Y. Shoji and   
                  M. Murata and   
                   N. Nishinaga   Design and implementation of ICN-enabled
                                  IEEE 802.11 access points as nano data
                                  centers  . . . . . . . . . . . . . . . . 159--167
              Lingwei Zhang and   
                 Yuhui Deng and   
                Weiheng Zhu and   
                Jipeng Zhou and   
                     Frank Wang   Skewly replicating hot data to construct
                                  a power-efficient storage cluster  . . . 168--179
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 51, Number ??, May, 2015

 Jack Fernando Bravo-Torres and   
Martín López-Nores and   
Yolanda Blanco-Fernández and   
José Juan Pazos-Arias and   
        Manuel Ramos-Cabrer and   
              Alberto Gil-Solla   An improved virtualization layer to
                                  support distribution of multimedia
                                  contents in pervasive social
                                  applications . . . . . . . . . . . . . . 1--17
Víctor Berrocal-Plaza and   
Miguel A. Vega-Rodríguez and   
Juan M. Sánchez-Pérez   Optimizing the mobility management task
                                  in networks of four world capital cities 18--28
           M. Sajid Mushtaq and   
               Scott Fowler and   
         Abdelhamid Mellouk and   
                 Brice Augustin   QoE/QoS-aware LTE downlink scheduler for
                                  VoIP with power saving . . . . . . . . . 29--46
                  Kun Huang and   
                Gaogang Xie and   
                 Yanbiao Li and   
                   Dafang Zhang   Memory-efficient IP lookup using trie
                                  merging for scalable virtual routers . . 47--58
                     Yu Liu and   
                    Bin Guo and   
                   Chi Zhou and   
                       Yu Cheng   Network-coded cooperative information
                                  recovery in cellular/802.11 mobile
                                  Networks . . . . . . . . . . . . . . . . 59--67
                Linfeng Liu and   
             Ningshen Zhang and   
                         Ye Liu   Topology control models and solutions
                                  for signal irregularity in mobile
                                  underwater wireless sensor networks  . . 68--90
          Rajesh Anbazhagan and   
           Nakkeeran Rangaswamy   Investigations on enhanced power saving
                                  mechanism for IEEE 802.16m network with
                                  heterogeneous traffic  . . . . . . . . . 91--101
            Behnam Dezfouli and   
                Marjan Radi and   
           Shukor Abd Razak and   
              Tan Hwee-Pink and   
        Kamalrulnizam Abu Bakar   Modeling low-power wireless
                                  communications . . . . . . . . . . . . . 102--126
           Mohammed Atiquzzaman   Editorial  . . . . . . . . . . . . . . . 127--129
          Cüneyt Sevgi and   
          Altan Koçyigit   Corrigendum to ``Optimal deployment in
                                  randomly deployed heterogeneous WSNs: a
                                  connected coverage approach'' [J. Netw.
                                  Comput. Appl. \bf 46, (2014), 182--197]  130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 52, Number ??, June, 2015

    Athanasios V. Vasilakos and   
                     Zhe Li and   
              Gwendal Simon and   
                        Wei You   Information centric network: Research
                                  challenges and opportunities . . . . . . 1--10
           Raja Wasim Ahmad and   
              Abdullah Gani and   
     Siti Hafizah Ab. Hamid and   
            Muhammad Shiraz and   
         Abdullah Yousafzai and   
                       Feng Xia   A survey on virtual machine migration
                                  and server consolidation frameworks for
                                  cloud data centers . . . . . . . . . . . 11--25
               Ying-Dar Lin and   
             Minh-Tuan Thai and   
           Chih-Chiang Wang and   
                 Yuan-Cheng Lai   Two-tier project and job scheduling for
                                  SaaS cloud service providers . . . . . . 26--36
      Elizabeth A. Thompson and   
           Charles McIntosh and   
               James Isaacs and   
              Eric Harmison and   
                    Ross Sneary   Robot communication link using 802.11n
                                  or 900 MHz OFDM  . . . . . . . . . . . . 37--51
                 Ejaz Ahmed and   
              Abdullah Gani and   
              Mehdi Sookhak and   
      Siti Hafizah Ab Hamid and   
                       Feng Xia   Application optimization in mobile cloud
                                  computing: Motivation, taxonomies, and
                                  open challenges  . . . . . . . . . . . . 52--68
                Guodong Sun and   
                   Lin Zhao and   
                 Zhibo Chen and   
                     Guofu Qiao   Effective link interference model in
                                  topology control of wireless ad hoc and
                                  sensor networks  . . . . . . . . . . . . 69--78
                     Hao Ji and   
                    Lei Xie and   
                 Chuyu Wang and   
                 Yafeng Yin and   
                      Sanglu Lu   CrowdSensing: a crowd-sourcing based
                                  indoor navigation using RFID-based delay
                                  tolerant network . . . . . . . . . . . . 79--89
                   Ming Tao and   
             Shuqiang Huang and   
                    Yang Li and   
                    Min Yan and   
                      Yuyu Zhou   SA-PSO based optimizing reader
                                  deployment in large-scale RFID Systems   90--100
                   Ali Ghaffari   Congestion control mechanisms in
                                  wireless sensor networks: a survey . . . 101--115
       Riham S. Y. Elhabyan and   
          Mustapha C. E. Yagoub   Two-tier particle swarm optimization
                                  protocol for clustering and routing in
                                  wireless sensor network  . . . . . . . . 116--128
                Tien Van Do and   
                  Nam H. Do and   
Ádám Horváth and   
                   Jinting Wang   Modelling opportunistic spectrum renting
                                  in mobile cellular networks  . . . . . . 129--138
                  Wei Jiang and   
                     Yue Ma and   
                  Xia Zhang and   
                Xupeng Wang and   
                      Zili Shao   Adaptive security management of
                                  real-time storage applications over NAND
                                  based storage systems  . . . . . . . . . 139--153
                 Ejaz Ahmed and   
              Abdullah Gani and   
      Muhammad Khurram Khan and   
             Rajkumar Buyya and   
                  Samee U. Khan   Seamless application execution in mobile
                                  cloud computing: Motivation, taxonomy,
                                  and open challenges  . . . . . . . . . . 154--172
             Athar Ali Khan and   
    Mubashir Husain Rehmani and   
                   Yasir Saleem   Neighbor discovery in traditional
                                  wireless networks and cognitive radio
                                  networks: Basics, taxonomy, challenges
                                  and future research directions . . . . . 173--190
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 53, Number ??, July, 2015

          Amin Ebrahimzadeh and   
   Akbar Ghaffarpour Rahbar and   
               Behrooz Alizadeh   QoS aware green routing and wavelength
                                  assignment in core WDM networks  . . . . 1--13
               Engin Arslan and   
               Murat Yuksel and   
              Mehmet Hadi Gunes   Training network administrators in a
                                  game-like environment  . . . . . . . . . 14--23
   Sérgio Figueiredo and   
                  Seil Jeon and   
                Diogo Gomes and   
                  Rui L. Aguiar   D3M: Multicast listener mobility support
                                  mechanisms over distributed mobility
                                  anchoring architectures  . . . . . . . . 24--38
              Sudeep Tanwar and   
               Neeraj Kumar and   
        Joel J. P. C. Rodrigues   A systematic review on heterogeneous
                                  routing protocols for wireless sensor
                                  network  . . . . . . . . . . . . . . . . 39--56
                  Yong Wang and   
                    Yun Xia and   
                    Jie Hou and   
               Shi-meng Gao and   
                   Xiao Nie and   
                        Qi Wang   A fast privacy-preserving framework for
                                  continuous location-based queries in
                                  road networks  . . . . . . . . . . . . . 57--73
               S. Arunkumar and   
                M. Srivatsa and   
                   M. Rajarajan   A review paper on preserving privacy in
                                  mobile environments  . . . . . . . . . . 74--90
          Abdelali Boushaba and   
              Adil Benabbou and   
            Rachid Benabbou and   
              Azeddine Zahi and   
                Mohammed Oumsis   Multi-point relay selection strategies
                                  to reduce topology control traffic for
                                  OLSR protocol in MANETs  . . . . . . . . 91--102
              Jingyuan Wang and   
               Jiangtao Wen and   
                    Chao Li and   
                Zhang Xiong and   
                     Yuxing Han   DC-Vegas: a delay-based TCP congestion
                                  control algorithm for datacenter
                                  applications . . . . . . . . . . . . . . 103--114
           Valentina Caputi and   
                Antonio Garrido   Student-oriented planning of e-learning
                                  contents for Moodle  . . . . . . . . . . 115--127
             Chao-Liang Liu and   
            Cheng-Jung Tsai and   
              Ting-Yi Chang and   
              Wang-Jui Tsai and   
                   Po-Kai Zhong   Implementing multiple biometric features
                                  for a recall-based graphical keystroke
                                  dynamics authentication system on a
                                  smart phone  . . . . . . . . . . . . . . 128--139
             Zhongbao Zhang and   
                     Sen Su and   
                  Yikai Lin and   
                Xiang Cheng and   
                 Kai Shuang and   
                        Peng Xu   Adaptive multi-objective artificial
                                  immune system based virtual network
                                  embedding  . . . . . . . . . . . . . . . 140--155
                Zhiting Lin and   
                     XiuLong Wu   Analyzing and modeling mobility for
                                  infrastructure-less communication  . . . 156--163
       Sara Modarres Razavi and   
                    Di Yuan and   
         Fredrik Gunnarsson and   
                      Johan Moe   On dynamic signaling congestion
                                  mitigation by overlapping tracking area
                                  lists  . . . . . . . . . . . . . . . . . 164--172
                Xiumin Wang and   
                  Chau Yuen and   
              Xiaoming Chen and   
           Naveed Ul Hassan and   
                  Yiming Ouyang   Cost-aware demand scheduling for delay
                                  tolerant applications  . . . . . . . . . 173--182
                 Mario Collotta   FLBA: a fuzzy algorithm for load
                                  balancing in IEEE 802.11 networks  . . . 183--192
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 54, Number ??, August, 2015

           Imad Abdeljaouad and   
                 Ahmed Karmouch   Monitoring IPTV quality of experience in
                                  overlay networks using utility functions 1--10
                  Yujie Liu and   
                    Yong Li and   
                   Yue Wang and   
                      Jian Yuan   Optimal scheduling for multi-flow update
                                  in Software-Defined Networks . . . . . . 11--19
        Saman Homayounnejad and   
                Alireza Bagheri   An efficient distributed max-flow
                                  algorithm for Wireless Sensor Networks   20--32
              Tarek AlSkaif and   
      Manel Guerrero Zapata and   
                 Boris Bellalta   Game theory for energy efficiency in
                                  Wireless Sensor Networks: Latest trends  33--61
Leovigildo Sánchez-Casado and   
Gabriel Maciá-Fernández and   
Pedro García-Teodoro and   
               Nils Aschenbruck   Identification of contamination zones
                                  for sinkhole detection in MANETs . . . . 62--77
              Maleeha Najam and   
               Usman Younis and   
               Raihan ur Rasool   Speculative parallel pattern matching
                                  using stride-$k$ DFA for deep packet
                                  inspection . . . . . . . . . . . . . . . 78--87
            Normalia Samian and   
    Zuriati Ahmad Zukarnain and   
         Winston K. G. Seah and   
            Azizol Abdullah and   
             Zurina Mohd Hanapi   Cooperation stimulation mechanisms for
                                  wireless multihop networks: a survey . . 88--106
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 55, Number ??, September, 2015

             Apostolos Malatras   State-of-the-art survey on P2P overlay
                                  networks in pervasive computing
                                  environments . . . . . . . . . . . . . . 1--23
                 Aqsa Malik and   
               Junaid Qadir and   
             Basharat Ahmad and   
          Kok-Lim Alvin Yau and   
                    Ubaid Ullah   QoS in IEEE 802.11-based wireless
                                  networks: a contemporary review  . . . . 24--46
                Yaguang Lin and   
              Xiaoming Wang and   
               Lichen Zhang and   
                    Peng Li and   
                  Dan Zhang and   
                        Sen Liu   The impact of node velocity diversity on
                                  mobile opportunistic network performance 47--58
               Yingjie Wang and   
               Guisheng Yin and   
                Zhipeng Cai and   
                 Yuxin Dong and   
                   Hongbin Dong   A trust-based probabilistic
                                  recommendation model for social networks 59--67
    Diego F. Ramírez and   
         Sandra Céspedes   Routing in Neighborhood Area Networks: a
                                  survey in the context of AMI
                                  communications . . . . . . . . . . . . . 68--80
                    S. Liao and   
                     J. Sun and   
                    Y. Chen and   
                    Y. Wang and   
                       P. Zhang   Distributed power control for wireless
                                  networks via the alternating direction
                                  method of multipliers  . . . . . . . . . 81--88
      Alireza Shameli-Sendi and   
                Michel Dagenais   ORCEF: Online response cost evaluation
                                  framework for intrusion response system  89--107
              Zia-ur Rehman and   
       Omar Khadeer Hussain and   
        Farookh Khadeer Hussain   User-side cloud service management:
                                  State-of-the-art and future directions   108--122
             Shazana Md Zin and   
           Nor Badrul Anuar and   
        Miss Laiha Mat Kiah and   
                  Ismail Ahmedy   Survey of secure multipath routing
                                  protocols for WSNs . . . . . . . . . . . 123--153
                   Kai Wang and   
                         Jun Li   FREME: a pattern partition based engine
                                  for fast and scalable regular expression
                                  matching in practice . . . . . . . . . . 154--169
                Dingqi Yang and   
               Daqing Zhang and   
              Longbiao Chen and   
                    Bingqing Qu   NationTelescope: Monitoring and
                                  visualizing large-scale collective
                                  behavior in LBSNs  . . . . . . . . . . . 170--180
         Mohamed A. Alrshah and   
             Mohamed Othman and   
            Borhanuddin Ali and   
             Zurina Mohd Hanapi   Agile-SD: a Linux-based TCP congestion
                                  control algorithm for supporting
                                  high-speed and short-distance networks   181--190
             Katja Cetinski and   
                Matjaz B. Juric   AME-WPC: Advanced model for efficient
                                  workload prediction in the cloud . . . . 191--201
                Sudip Misra and   
              Samaresh Bera and   
              Tamoghna Ojha and   
                     Liang Zhou   ENTICE: Agent-based energy trading with
                                  incomplete information in the smart grid 202--212
          Vlasios Kasapakis and   
               Damianos Gavalas   Pervasive gaming: Status, trends and
                                  design principles  . . . . . . . . . . . 213--236
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 56, Number ??, October, 2015

                    Amin Karami   ACCPndn: Adaptive Congestion Control
                                  Protocol in Named Data Networking by
                                  learning capacities using optimized
                                  Time-Lagged Feedforward Neural Network   1--18
              Zhaolong Ning and   
              Qingyang Song and   
                    Lei Guo and   
                  Xiangjie Kong   A novel adaptive spectrum allocation
                                  scheme for multi-channel multi-radio
                                  wireless mesh networks . . . . . . . . . 19--27
              Minhaj Ahmad Khan   A survey of computation offloading
                                  strategies for performance improvement
                                  of applications running on mobile
                                  devices  . . . . . . . . . . . . . . . . 28--40
           Sergio Ricciardi and   
         Francesco Palmieri and   
        Aniello Castiglione and   
                Davide Careglio   Energy efficiency of elastic frequency
                                  grids in multilayer
                                  IP/MPLS-over-flexgrid networks . . . . . 41--47
          Ibrahim Abdullahi and   
                  Suki Arif and   
                 Suhaidi Hassan   Survey on caching approaches in
                                  Information Centric Networking . . . . . 48--59
                T. Hamrouni and   
                 C. Hamdeni and   
                F. Ben Charrada   Impact of the distribution quality of
                                  file replicas on replication strategies  60--76
              M. S. S. Khan and   
                 Anup Kumar and   
                    Bin Xie and   
              Prasanna K. Sahoo   Network tomography application in mobile
                                  ad-hoc network using stitching algorithm 77--87
     Giannis Haralabopoulos and   
    Ioannis Anagnostopoulos and   
               Sherali Zeadally   Lifespan and propagation of information
                                  in On-line Social Networks: a case study
                                  based on Reddit  . . . . . . . . . . . . 88--100
                   Esa Kerttula   A novel federated strong mobile
                                  signature service --- the Finnish case   101--114
     Maria Carla Calzarossa and   
                Daniele Tessera   Modeling and predicting temporal
                                  patterns of web content changes  . . . . 115--123
          Michael Till Beck and   
            Andreas Fischer and   
         Juan Felipe Botero and   
    Claudia Linnhoff-Popien and   
                Hermann de Meer   Distributed and scalable embedding of
                                  virtual networks . . . . . . . . . . . . 124--136
   Mohd Izuan Hafez Ninggal and   
               Jemal H. Abawajy   Utility-aware social network graph
                                  anonymization  . . . . . . . . . . . . . 137--148
            Sheng-Shih Wang and   
               Chun-Chih Li and   
              Hsieh-Wei Lin and   
                 Kuei-Ping Shih   A passive self-configuration MAC
                                  protocol for supporting network
                                  management in IEEE 802.11-based
                                  multi-hop mobile ad hoc networks . . . . 149--157
                   Chi Chen and   
                Xiaojie Zhu and   
               Peisong Shen and   
                    Jing Yu and   
                   Hong Zou and   
                     Jiankun Hu   SOLS: a scheme for outsourced location
                                  based service  . . . . . . . . . . . . . 158--165
         Keyvan RahimiZadeh and   
            Morteza AnaLoui and   
              Peyman Kabiri and   
                  Bahman Javadi   Performance modeling and analysis of
                                  virtualized multi-tier applications
                                  under dynamic workloads  . . . . . . . . 166--187
 Veerabhadra R. Chandakanna and   
             Valli K. Vatsavayi   A sliding window based Self-Learning and
                                  Adaptive Load Balancer . . . . . . . . . 188--205
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 57, Number ??, November, 2015

               Abbas Bradai and   
      Abderrahim Benslimane and   
                 Kamal D. Singh   Dynamic anchor points selection for
                                  mobility management in Software Defined
                                  Networks . . . . . . . . . . . . . . . . 1--11
                 Erdun Zhao and   
                  Liansheng Tan   A PCA based optimization approach for IP
                                  traffic matrix estimation  . . . . . . . 12--20
              Younghoon Kim and   
                 Ikjun Yeom and   
                     Jun Bi and   
                     Yusung Kim   Scalable and efficient file sharing in
                                  information-centric networking . . . . . 21--32
           Gürkan Gür   Energy-aware cache management at the
                                  wireless network edge for
                                  information-centric operation  . . . . . 33--42
                     Qin Xu and   
                     Fan Li and   
               Jinsheng Sun and   
                 Moshe Zukerman   A new TCP/AQM system analysis  . . . . . 43--60
              Shin-Jer Yang and   
                     Yi-Ru Chen   Design adaptive task allocation
                                  scheduler to improve MapReduce
                                  performance in heterogeneous clouds  . . 61--70
             Rup Kumar Deka and   
     Kausthav Pratim Kalita and   
         D. K. Bhattacharya and   
                Jugal K. Kalita   Network defense: Approach's, methods and
                                  techniques . . . . . . . . . . . . . . . 71--84
      Suchetana Chakraborty and   
         Sandip Chakraborty and   
              Sukumar Nandi and   
              Sushanta Karmakar   Fault resilience in sensor networks:
                                  Distributed node-disjoint multi-path
                                  multi-sink forwarding  . . . . . . . . . 85--101
           Maristella Ribas and   
              C. G. Furtado and   
José Neuman de Souza and   
  Giovanni Cordeiro Barroso and   
         Antão Moura and   
            Alberto S. Lima and   
      Flávio R. C. Sousa   A Petri net-based decision-making
                                  framework for assessing cloud services
                                  adoption: the use of spot instances for
                                  cost reduction . . . . . . . . . . . . . 102--118
                     Wei Li and   
             Jorge Portilla and   
        Félix Moreno and   
              Guixuan Liang and   
                  Teresa Riesgo   Multiple feature points representation
                                  in target localization of wireless
                                  visual sensor networks . . . . . . . . . 119--128
               Jiaoyan Chen and   
                  Bang Wang and   
                      Wenyu Liu   Constructing perimeter barrier coverage
                                  with bistatic radar sensors  . . . . . . 129--141
  Amir Hossein Mohajerzadeh and   
  Mohammad Hossein Yaghmaee and   
              Afsane Zahmatkesh   Efficient data collecting and target
                                  parameter estimation in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 142--155
                  Yuhwa Suh and   
                Kiyoung Kim and   
                   Aran Kim and   
                   Yongtae Shin   A study on impact of wired access
                                  networks for green Internet  . . . . . . 156--168
          Mohammad Khanjary and   
              Masoud Sabaei and   
          Mohammad Reza Meybodi   Critical density for coverage and
                                  connectivity in two-dimensional
                                  fixed-orientation directional sensor
                                  networks using continuum percolation . . 169--181
               Dingde Jiang and   
              Zhengzheng Xu and   
                Wenqin Wang and   
              Yuanting Wang and   
                       Yang Han   A collaborative multi-hop routing
                                  algorithm for maximum achievable rate    182--191
           Haythem Bany Salameh   Spread spectrum-based coordination
                                  design for spectrum-agile wireless ad
                                  hoc networks . . . . . . . . . . . . . . 192--201
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 58, Number ??, December, 2015

                    Zhe Guo and   
                      Zheng Yan   A Weighted Semi-Distributed Routing
                                  Algorithm for LEO satellite networks . . 1--11
          Francesco Carrabs and   
           Raffaele Cerulli and   
         Ciriaco D'Ambrosio and   
                 Andrea Raiconi   A hybrid exact approach for maximizing
                                  lifetime in sensor networks with
                                  complete and partial coverage
                                  constraints  . . . . . . . . . . . . . . 12--22
    Osama M. Hussain Rehman and   
            Hadj Bourdoucen and   
            Mohamed Ould-Khaoua   Forward link quality estimation in
                                  VANETs for sender-oriented alert
                                  messages broadcast . . . . . . . . . . . 23--41
           Raja Wasim Ahmad and   
              Abdullah Gani and   
     Siti Hafizah Ab. Hamid and   
                   Feng Xia and   
                Muhammad Shiraz   A Review on mobile application energy
                                  profiling: Taxonomy, state-of-the-art,
                                  and open research issues . . . . . . . . 42--59
            B. Coll-Perales and   
                J. Gozalvez and   
                    M. Sepulcre   Empirical models of the communications
                                  performance of Multi-hop Cellular
                                  Networks using D2D . . . . . . . . . . . 60--72
             Bassam J. Mohd and   
            Thaier Hayajneh and   
        Athanasios V. Vasilakos   A survey on lightweight block ciphers
                                  for low-resource devices: Comparative
                                  study and open issues  . . . . . . . . . 73--93
                Jianwei Niu and   
               Danning Wang and   
           Mohammed Atiquzzaman   Copy limited flooding over opportunistic
                                  networks . . . . . . . . . . . . . . . . 94--107
         Fatima Lamia Haddi and   
           Mahfoud Bencha\"\iba   A survey of incentive mechanisms in
                                  static and mobile P2P systems  . . . . . 108--118
            Ihab Ahmed Najm and   
             Mahamod Ismail and   
               Jaime Lloret and   
        Kayhan Zrar Ghafoor and   
               B. B. Zaidan and   
       Abd Al-razak Tareq Rahem   Improvement of SCTP congestion control
                                  in the LTE-A network . . . . . . . . . . 119--129
               Amjad Hajjar and   
              Jawad Khalife and   
Jesús Díaz-Verdejo   Network traffic application
                                  identification based on message size
                                  analysis . . . . . . . . . . . . . . . . 130--143
         Sheharbano Khattak and   
               Zaafar Ahmed and   
              Affan A. Syed and   
                Syed Ali Khayam   BotFlex: a community-driven tool for
                                  botnet detection . . . . . . . . . . . . 144--154
               Guijuan Wang and   
                   Jiguo Yu and   
                Dongxiao Yu and   
                  Haitao Yu and   
                    Li Feng and   
                        Pan liu   DS--MAC: an energy efficient demand
                                  sleep MAC protocol with low latency for
                                  wireless sensor networks . . . . . . . . 155--164
      Alireza Shameli-Sendi and   
            Makan Pourzandi and   
        Mohamed Fekih-Ahmed and   
                Mohamed Cheriet   Taxonomy of Distributed Denial of
                                  Service mitigation approaches for cloud
                                  computing  . . . . . . . . . . . . . . . 165--179
               Fang-Yie Leu and   
                Chin-Yu Liu and   
              Jung-Chun Liu and   
            Fuu-Cheng Jiang and   
                   Heru Susanto   S-PMIPv6: an intra-LMA model for IPv6
                                  mobility . . . . . . . . . . . . . . . . 180--191
               Jaime Lloret and   
        Kayhan Zrar Ghafoor and   
             Danda B. Rawat and   
                 Youssef Nasser   Green network protocols and algorithms   192--193
                 Ruiqi Ding and   
      Cristina Hava Muntean and   
           Gabriel-Miro Muntean   Energy-efficient device-differentiated
                                  cooperative adaptive multimedia delivery
                                  solution in wireless networks  . . . . . 194--207
                  Zuhal Can and   
                 Murat Demirbas   Smartphone-based data collection from
                                  wireless sensor networks in an urban
                                  environment  . . . . . . . . . . . . . . 208--216
Miguel Rodríguez-Pérez and   
Sergio Herrería-Alonso and   
Manuel Fernández-Veiga and   
Cándido López-García   An ant colonization routing algorithm to
                                  minimize network power consumption . . . 217--226
               Mahmoud Sami and   
       Nor Kamariah Noordin and   
       Fazirulhysiam Hashim and   
        Shamala Subramaniam and   
     Ayyoub Akbari-Moghanjoughi   An Energy-Aware Cross-Layer Cooperative
                                  MAC Protocol for Wireless Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 227--240
               Chengming Li and   
                Wenjing Liu and   
                   Lei Wang and   
                 Mingchu Li and   
                   Koji Okamura   Energy-efficient quality of service
                                  aware forwarding scheme for
                                  Content-Centric Networking . . . . . . . 241--254
       Seyed Iman PourEmami and   
                Bahador Bakhshi   On the trade-off between
                                  power-efficiency and blocking
                                  probability in fault-tolerant WDM
                                  networks . . . . . . . . . . . . . . . . 255--266
            Anas Daghistani and   
    Abderrahman Ben Khalifa and   
              Ahmad Showail and   
                  Basem Shihada   Green partial packet recovery in
                                  wireless sensor networks . . . . . . . . 267--279
               Chih-Heng Ke and   
              Chong-Yi Yang and   
           Jiann-Liang Chen and   
        Kayhan Zrar Ghafoor and   
                   Jaime Lloret   Frame-based mapping mechanism for
                                  energy-efficient MPEG-4 video
                                  transmission over IEEE 802.11e networks
                                  with better quality of delivery  . . . . 280--286
                M. Bakhouya and   
                   J. Gaber and   
                      P. Lorenz   Energy evaluation of AID protocol in
                                  Mobile Ad Hoc Networks . . . . . . . . . 287--293
   Mohammad Reza Jabbarpour and   
            Rafidah Md Noor and   
          Rashid Hafeez Khokhar   Green vehicle traffic routing system
                                  using ant-based algorithm  . . . . . . . 294--308
            Muhammad Faheem and   
       Muhammad Zahid Abbas and   
                Gurkan Tuna and   
             Vehbi Cagri Gungor   EDHRP: Energy efficient event driven
                                  hybrid routing protocol for densely
                                  deployed wireless sensor networks  . . . 309--326
               Gangyong Jia and   
               Guangjie Han and   
              Jinfang Jiang and   
        Joel J. P. C. Rodrigues   PARS: a scheduling of periodically
                                  active rank to optimize power efficiency
                                  for main memory  . . . . . . . . . . . . 327--336
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 59, Number ??, January, 2016

            Zhang Bing Zhou and   
               Wendong Xiao and   
               Jucheng Yang and   
                    Faming Gong   Special issue on green networking,
                                  computing, and software systems  . . . . 1--3
              Jinfang Jiang and   
               Guangjie Han and   
                    Hui Guo and   
                    Lei Shu and   
        Joel J. P. C. Rodrigues   Geographic multipath routing based on
                                  geospatial division in duty-cycled
                                  underwater wireless sensor networks  . . 4--13
                  Qing Zhao and   
             Congcong Xiong and   
                      Ce Yu and   
             Chuanlei Zhang and   
                        Xi Zhao   A new energy-aware task scheduling
                                  method for data-intensive applications
                                  in the cloud . . . . . . . . . . . . . . 14--27
                   Xiao Xue and   
               Shufang Wang and   
                      Baoyun Lu   Manufacturing service composition method
                                  based on networked collaboration mode    28--38
                Yanwen Wang and   
                Hainan Chen and   
                Xiaoling Wu and   
                        Lei Shu   An energy-efficient SDN based sleep
                                  scheduling algorithm for WSNs  . . . . . 39--45
                   Keke Gai and   
                Meikang Qiu and   
                   Hui Zhao and   
                  Lixin Tao and   
                   Ziliang Zong   Dynamic energy-aware cloudlet-based
                                  mobile cloud computing model for green
                                  computing  . . . . . . . . . . . . . . . 46--54
                  Chao Tong and   
                    Yu Lian and   
                Jianwei Niu and   
                Zhongyu Xie and   
                     Yang Zhang   A novel green algorithm for sampling
                                  complex networks . . . . . . . . . . . . 55--62
              Yonghua Xiong and   
                Shaoyun Wan and   
                 Jinhua She and   
                     Min Wu and   
                    Yong He and   
                   Keyuan Jiang   An energy-optimization-based method of
                                  task scheduling for a cloud video
                                  surveillance center  . . . . . . . . . . 63--73
            Ana C. Riekstin and   
Guilherme C. Januário and   
         Bruno B. Rodrigues and   
      Viviane T. Nascimento and   
   Tereza C. M. B. Carvalho and   
                Catalin Meirosu   Orchestration of energy efficiency
                                  capabilities in networks . . . . . . . . 74--87
               Weidong Fang and   
             Chuanlei Zhang and   
                Zhidong Shi and   
                  Qing Zhao and   
                   Lianhai Shan   BTRES: Beta-based Trust and Reputation
                                  Evaluation System for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 88--94
       Martina Marjanovi\'c and   
           Lea Skorin-Kapov and   
        Kresimir Pripuzi\'c and   
       Aleksandar Antoni\'c and   
             Ivana Podnar Zarko   Energy-aware and quality-driven sensor
                                  management for green mobile crowd
                                  sensing  . . . . . . . . . . . . . . . . 95--108
                  Teng Long and   
                   Wenhui Zhang   Termination analysis with recursive
                                  calling graphs . . . . . . . . . . . . . 109--116
                  Chen Xiao and   
                Lifeng Wang and   
               Mengjiao Zhu and   
                   Wendong Wang   A resource-efficient multimedia
                                  encryption scheme for embedded video
                                  sensing system based on unmanned
                                  aircraft . . . . . . . . . . . . . . . . 117--125
               Liping Zhang and   
                Shanyu Tang and   
                    Shaohui Zhu   An energy efficient authenticated key
                                  agreement protocol for SIP-based green
                                  VoIP networks  . . . . . . . . . . . . . 126--133
               Piotr Cholda and   
                  Piotr Jaglarz   Optimization/simulation-based risk
                                  mitigation in resilient green
                                  communication networks . . . . . . . . . 134--157
                  Mingfu Li and   
                Jingping Bi and   
                  Zhongcheng Li   Improving consolidation of virtual
                                  machine based on virtual switching
                                  overhead estimation  . . . . . . . . . . 158--167
           Karn Yongsiriwit and   
                  Nour Assy and   
                  Walid Gaaloul   A semantic framework for configurable
                                  business process as a service in the
                                  cloud  . . . . . . . . . . . . . . . . . 168--184
               Debdeep Paul and   
               Wen-De Zhong and   
                 Sanjay K. Bose   Energy efficiency aware load
                                  distribution and electricity cost
                                  volatility control for cloud service
                                  providers  . . . . . . . . . . . . . . . 185--197
                  Zheli Liu and   
              Xiaofeng Chen and   
                   Jun Yang and   
                 Chunfu Jia and   
                      Ilsun You   New order preserving encryption model
                                  for outsourced databases in cloud
                                  environments . . . . . . . . . . . . . . 198--207
            Antonio Celesti and   
                Maria Fazio and   
            Massimo Villari and   
              Antonio Puliafito   Adding long-term availability,
                                  obfuscation, and encryption to
                                  multi-cloud storage systems  . . . . . . 208--218
               Yunchuan Sun and   
                   Cheng Lu and   
               Rongfang Bie and   
                 Junsheng Zhang   Semantic relation computing theory and
                                  its application  . . . . . . . . . . . . 219--229
              Miguel Castro and   
            Antonio J. Jara and   
            Antonio F. Skarmeta   Enabling end-to-end CoAP-based
                                  communications for the Web of Things . . 230--236
Juan López-de-Armentia and   
      Diego Casado-Mansilla and   
Diego López-de-Ipiña   Making social networks a means to save
                                  energy . . . . . . . . . . . . . . . . . 237--246
                    Ming Yu and   
                  Nirwan Ansari   Smart grid communications: Modeling and
                                  validation . . . . . . . . . . . . . . . 247--249
             D. A. Sbordone and   
               L. Martirano and   
                M. C. Falvo and   
              L. Chiavaroli and   
               B. Di Pietra and   
                 I. Bertini and   
                    A. Genovese   Reactive power control for an energy
                                  storage system: a real implementation in
                                  a Micro-Grid . . . . . . . . . . . . . . 250--263
                 Ziyuan Cai and   
                    Ming Yu and   
            Michael Steurer and   
                     Hui Li and   
                    Yizhou Dong   A network model for the real-time
                                  communications of a smart grid prototype 264--273
             Dhananjay Bhor and   
 Kavinkadhirselvan Angappan and   
          Krishna M. Sivalingam   Network and power-grid co-simulation
                                  framework for Smart Grid wide-area
                                  monitoring networks  . . . . . . . . . . 274--284
       Martin Wolkerstorfer and   
      Bernhard Schweighofer and   
           Hannes Wegleiter and   
            Driton Statovci and   
          Herbert Schwaiger and   
                 Walter Lackner   Measurement and simulation framework for
                                  throughput evaluation of narrowband
                                  power line communication links in
                                  low-voltage grids  . . . . . . . . . . . 285--300
           Cristina Alcaraz and   
               Javier Lopez and   
              Stephen Wolthusen   Policy enforcement system for secure
                                  interoperable control in distributed
                                  Smart Grid systems . . . . . . . . . . . 301--314
                 Yuan Zhang and   
          Navid Rahbari-Asr and   
                   Mo-Yuen Chow   A robust distributed system incremental
                                  cost estimation algorithm for smart grid
                                  economic dispatch with communications
                                  information losses . . . . . . . . . . . 315--324
                    Ping Yi and   
                   Ting Zhu and   
             Qingquan Zhang and   
                     Yue Wu and   
                         Li Pan   Puppet attack: a denial of service
                                  attack in advanced metering
                                  infrastructure network . . . . . . . . . 325--332
                 Mungyu Bae and   
                 Kangho Kim and   
                   Hwangnam Kim   Preserving privacy and efficiency in
                                  data communication and aggregation for
                                  AMI network  . . . . . . . . . . . . . . 333--344
              Raphael Amoah and   
              Seyit Camtepe and   
                     Ernest Foo   Formal modelling and analysis of DNP3
                                  secure authentication  . . . . . . . . . 345--360
           Jemal H. Abawajy and   
           Albert Y. Zomaya and   
               Ivan Stojmenovic   Network computing and applications for
                                  Big Data analytics . . . . . . . . . . . 361
                     Wei Xu and   
               Jianshan Sun and   
                    Jian Ma and   
                         Wei Du   A personalized information
                                  recommendation system for R&D project
                                  opportunity finding in big data contexts 362--369
               Amineh Amini and   
               Hadi Saboohi and   
              Tutut Herawan and   
                   Teh Ying Wah   MuDi-Stream: a multi density clustering
                                  algorithm for evolving data stream . . . 370--385
       R. S. Villaça and   
                R. Pasquini and   
             L. B. de Paula and   
         M. F. Magalhães   HCube: Routing and similarity search in
                                  Data Centers . . . . . . . . . . . . . . 386--398
            Khaleel Mershad and   
              Hassan Artail and   
               Mazen Saghir and   
                 Hazem Hajj and   
                  Mariette Awad   A mathematical model to analyze the
                                  utilization of a cloud datacenter
                                  middleware . . . . . . . . . . . . . . . 399--415
       Maumita Bhattacharya and   
              Rafiqul Islam and   
                  Jemal Abawajy   Evolutionary optimization: a big data
                                  perspective  . . . . . . . . . . . . . . 416--426
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 60, Number ??, January, 2016

          Barbara Carminati and   
              Elena Ferrari and   
                 Ngoc Hong Tran   Trustworthy and effective
                                  person-to-person payments over multi-hop
                                  MANETs . . . . . . . . . . . . . . . . . 1--18
            Mohiuddin Ahmed and   
        Abdun Naser Mahmood and   
                     Jiankun Hu   A survey of network anomaly detection
                                  techniques . . . . . . . . . . . . . . . 19--31
             Martin Garriga and   
            Cristian Mateos and   
              Andres Flores and   
          Alejandra Cechich and   
               Alejandro Zunino   RESTful service composition at a glance:
                                  a survey . . . . . . . . . . . . . . . . 32--53
                  Mina Nabi and   
               Maria Toeroe and   
                 Ferhat Khendek   Availability in the cloud: State of the
                                  art  . . . . . . . . . . . . . . . . . . 54--67
               Hazim Jarrah and   
            Nurul I. Sarkar and   
                Jairo Gutierrez   Comparison-based system-level fault
                                  diagnosis protocols for mobile ad-hoc
                                  networks: a survey . . . . . . . . . . . 68--81
               Subir Halder and   
                  Amrita Ghosal   A survey on mobility-assisted
                                  localization techniques in wireless
                                  sensor networks  . . . . . . . . . . . . 82--94
         Victor Prokhorenko and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   Web application protection techniques: a
                                  taxonomy . . . . . . . . . . . . . . . . 95--112
                 Jose Moura and   
                David Hutchison   Review and analysis of networking
                                  challenges in cloud computing  . . . . . 113--129


Journal of Network and Computer Applications
Volume 61, Number ??, February, 2016

   Pritish Vijayanand Ghate and   
             Hemanta Kumar Pati   Collaborative distributed communication
                                  in heterogeneous environments: a
                                  comprehensive survey . . . . . . . . . . 1--20
        Alekha Kumar Mishra and   
              Ashok Kumar Turuk   A comparative analysis of node replica
                                  detection schemes in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 21--32
               Xiaonan Wang and   
               Hongbin Chen and   
                     Deguang Le   A novel IPv6 address configuration for a
                                  6LoWPAN-based WBAN . . . . . . . . . . . 33--45
            Petro P. Ernest and   
          Olabisi E. Falowo and   
                H. Anthony Chan   Design and performance evaluation of
                                  distributed mobility management schemes
                                  for network mobility . . . . . . . . . . 46--58
           Mojtaba Alizadeh and   
            Saeid Abolfazli and   
              Mazdak Zamani and   
           Sabariah Baharun and   
                Kouichi Sakurai   Authentication in mobile cloud
                                  computing: a survey  . . . . . . . . . . 59--80
    Mehdi Nazari Cheraghlou and   
         Ahmad Khadem-Zadeh and   
               Majid Haghparast   A survey of fault tolerance architecture
                                  in cloud computing . . . . . . . . . . . 81--92
                   Yu Xiang and   
             Zhaoguang Xuan and   
                  Meng Tang and   
                  Jun Zhang and   
                       Ming Sun   $3$D space detection and coverage of
                                  wireless sensor network based on spatial
                                  correlation  . . . . . . . . . . . . . . 93--101
                  Cuicui Lv and   
                 Qiang Wang and   
                 Wenjie Yan and   
                        Yi Shen   Energy-balanced compressive data
                                  gathering in Wireless Sensor Networks    102--114
              Omar Cheikhrouhou   Secure Group Communication in Wireless
                                  Sensor Networks: a survey  . . . . . . . 115--132
                Shruti Lall and   
           B. T. J. Maharaj and   
        P. A. Jansen van Vuuren   Null-frequency jamming of a proactive
                                  routing protocol in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 133--141
          Atslands R. Rocha and   
  Flávia C. Delicato and   
                Luci Pirmez and   
           Danielo G. Gomes and   
    José Neuman de Souza   A fully-decentralized semantic mechanism
                                  for autonomous wireless sensor nodes . . 142--160
              Krishan Kumar and   
               Arun Prakash and   
                Rajeev Tripathi   Spectrum handoff in cognitive radio
                                  networks: a classification and
                                  comprehensive survey . . . . . . . . . . 161--188
             Shun-Neng Yang and   
                 Shu-Wei Ho and   
                Yi-Bing Lin and   
                  Chai-Hien Gan   A multi-RAT bandwidth aggregation
                                  mechanism with software-defined
                                  networking . . . . . . . . . . . . . . . 189--198
            Adnan Akhunzada and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
            Ahmed Abdelaziz and   
      Muhammad Khurram Khan and   
                 Amir Hayat and   
                  Samee U. Khan   Secure and dependable software defined
                                  networks . . . . . . . . . . . . . . . . 199--221
                  Tao Zhang and   
              Jianxing Wang and   
               Jiawei Huang and   
                   Yi Huang and   
                Jianer Chen and   
                         Yi Pan   Adaptive marking threshold method for
                                  delay-sensitive TCP in data center
                                  network  . . . . . . . . . . . . . . . . 222--234
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 62, Number ??, February, 2016

              Prosanta Gope and   
                 Tzonelih Hwang   An efficient mutual authentication and
                                  key agreement scheme preserving strong
                                  anonymity of the mobile user in global
                                  mobility networks  . . . . . . . . . . . 1--8
                Soo-Yeon Ji and   
            Bong-Keun Jeong and   
                Seonho Choi and   
                Dong Hyun Jeong   A multi-level intrusion detection method
                                  for abnormal network behaviors . . . . . 9--17
              Usman Shaukat and   
                 Ejaz Ahmed and   
                Zahid Anwar and   
                       Feng Xia   Cloudlet deployment in local wireless
                                  networks: Motivation, architectures,
                                  applications, and open challenges  . . . 18--40
               Athul Prasad and   
             Andreas Maeder and   
      Konstantinos Samdanis and   
               Andreas Kunz and   
                   Genadi Velev   Enabling group communication for public
                                  safety in LTE-Advanced networks  . . . . 41--52
              Zakira Inayat and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
      Muhammad Khurram Khan and   
                   Shahid Anwar   Intrusion response systems: Foundations,
                                  design, and challenges . . . . . . . . . 53--74
              Heena Rathore and   
      Venkataramana Badarla and   
                   George K. J.   Sociopsychological trust model for
                                  Wireless Sensor Networks . . . . . . . . 75--87
                  Feng Tian and   
              Kuo-Ming Chao and   
                 Zuren Feng and   
                  Keyi Xing and   
                   Nazaraf Shah   Using a wireless visual sensor network
                                  to harmonically navigate multiple
                                  low-cost wheelchairs in an indoor
                                  environment  . . . . . . . . . . . . . . 88--99
                Peiyan Yuan and   
                   Ping Liu and   
                   Shaojie Tang   RIM: Relative-importance based data
                                  forwarding in people-centric networks    100--111
                    Hui Xia and   
                     Jia Yu and   
           Cheng-liang Tian and   
              Zhen-kuan Pan and   
                      Edwin Sha   Light-weight trust-enhanced on-demand
                                  multi-path routing in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 112--127
               Chengwen Luo and   
                 Hande Hong and   
                 Long Cheng and   
             Mun Choon Chan and   
               Jianqiang Li and   
                     Zhong Ming   Accuracy-aware wireless indoor
                                  localization: Feasibility and
                                  applications . . . . . . . . . . . . . . 128--136
            Sultan Alneyadi and   
     Elankayer Sithirasenan and   
    Vallipuram Muthukkumarasamy   A survey on data leakage prevention
                                  systems  . . . . . . . . . . . . . . . . 137--152
               Mawloud Omar and   
           Hamida Boufaghes and   
              Lydia Mammeri and   
                Amel Taalba and   
                Abdelkamel Tari   Secure and reliable certificate chains
                                  recovery protocol for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 153--162
                Peiyan Yuan and   
                  Lilin Fan and   
                   Ping Liu and   
                   Shaojie Tang   Recent progress in routing protocols of
                                  mobile opportunistic networks: a clear
                                  taxonomy, analysis and evaluation  . . . 163--170
       Seyed Yahya Vaezpour and   
                  Rui Zhang and   
                     Kui Wu and   
              Jianping Wang and   
             Gholamali C. Shoja   A new approach to mitigating security
                                  risks of phone clone co-location over
                                  mobile clouds  . . . . . . . . . . . . . 171--184
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 63, Number ??, March, 2016

               Divya Saxena and   
            Vaskar Raychoudhury   Radient: Scalable, memory efficient name
                                  lookup algorithm for named data
                                  networking . . . . . . . . . . . . . . . 1--13
             Daniel-Ioan Curiac   Towards wireless sensor, actuator and
                                  robot networks: Conceptual framework,
                                  challenges and perspectives  . . . . . . 14--23
                Mengmeng Ge and   
     Kim-Kwang Raymond Choo and   
                    Huai Wu and   
                        Yong Yu   Survey on key revocation mechanisms in
                                  wireless sensor networks . . . . . . . . 24--38
                   Meng Han and   
               Mingyuan Yan and   
                Zhipeng Cai and   
                     Yingshu Li   An exploration of broader influence
                                  maximization in timeliness networks with
                                  opportunistic selection  . . . . . . . . 39--49
               Wen-Hwa Liao and   
               Ssu-Chi Kuai and   
                       Chen Liu   Efficient scheduling algorithm for
                                  multiple mobile subscriber stations with
                                  unsolicited grant service in an IEEE
                                  802.16e network  . . . . . . . . . . . . 50--55
           Hasan Abdulwahid and   
                    Bin Dai and   
             Benxiong Huang and   
                    Zijing Chen   Scheduled-links multicast routing
                                  protocol in MANETs . . . . . . . . . . . 56--67
            Wazir Zada Khan and   
        Md. Shohrab Hossain and   
       Mohammed Y. Aalsalem and   
                 N. M. Saad and   
           Mohammed Atiquzzaman   A cost analysis framework for claimer
                                  reporter witness based clone detection
                                  schemes in WSNs  . . . . . . . . . . . . 68--85
              Amrita Ghosal and   
                   Subir Halder   Lifespan prolonging location-wise
                                  predetermined deployment strategy for
                                  visual sensor networks . . . . . . . . . 86--97
                S. Avallone and   
                    G. Di Stasi   Design and implementation of WiMesh: a
                                  tool for the performance evaluation of
                                  multi-radio wireless mesh networks . . . 98--109
                    Hao Zhu and   
               Xiangke Liao and   
               Cees de Laat and   
                   Paola Grosso   Joint flow routing-scheduling for energy
                                  efficient software defined data center
                                  networks: a prototype of energy-aware
                                  network management platform  . . . . . . 110--124
                  Debao Wei and   
                 Libao Deng and   
                 Peng Zhang and   
                 Liyan Qiao and   
                    Xiyuan Peng   A page-granularity wear-leveling (PGWL)
                                  strategy for NAND flash memory-based
                                  sink nodes in wireless sensor networks   125--139
Álvaro López García and   
Enol Fernández del Castillo   Efficient image deployment in cloud
                                  environments . . . . . . . . . . . . . . 140--149
 Osamah Ibrahiem Abdullaziz and   
                Vik Tor Goh and   
             Huo-Chong Ling and   
                  KokSheik Wong   AIPISteg: an active IP identification
                                  based steganographic method  . . . . . . 150--158
        Emanuel F. Coutinho and   
           Paulo A. L. Rego and   
           Danielo G. Gomes and   
        José N. de Souza   Physics and microeconomics-based metrics
                                  for evaluating cloud computing
                                  elasticity . . . . . . . . . . . . . . . 159--172
               Diego Kreutz and   
     Oleksandr Malichevskyy and   
            Eduardo Feitosa and   
                 Hugo Cunha and   
      Rodrigo da Rosa Righi and   
        Douglas D. J. de Macedo   A cyber-resilient architecture for
                                  critical security services . . . . . . . 173--189
              Javier Suarez and   
               Jose Quevedo and   
                 Ivan Vidal and   
              Daniel Corujo and   
       Jaime Garcia-Reinoso and   
                  Rui L. Aguiar   A secure IoT management architecture
                                  based on Information-Centric Networking  190--204
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 64, Number ??, April, 2016

    Gilberto Fernandes, Jr. and   
           Luiz F. Carvalho and   
    Joel J. P. C. Rodrigues and   
Mario Lemes Proença, Jr.   Network anomaly detection using IP flows
                                  with Principal Component Analysis and
                                  Ant Colony Optimization  . . . . . . . . 1--11
      Syam Kumar Pasupuleti and   
     Subramanian Ramalingam and   
                 Rajkumar Buyya   An efficient and secure
                                  privacy-preserving approach for
                                  outsourced data of resource constrained
                                  mobile devices in cloud computing  . . . 12--22
             Jiangtao Zhang and   
               Hejiao Huang and   
                      Xuan Wang   Resource provision algorithms in cloud
                                  computing: a survey  . . . . . . . . . . 23--42
      Elias Chavarria-Reyes and   
               Etimad Fadel and   
           Suleiman Almasri and   
              M. G. Abbas Malik   Reducing the energy consumption at the
                                  user equipment through multi-stream
                                  cross-carrier-aware discontinuous
                                  reception (DRX) in LTE-advanced systems  43--61
             Enrico Gregori and   
         Alessandro Improta and   
            Luciano Lenzini and   
             Valerio Luconi and   
                Nilo Redini and   
                Alessio Vecchio   Smartphone-based crowdsourcing for
                                  estimating the bottleneck capacity in
                                  wireless networks  . . . . . . . . . . . 62--75
                 Waqar Asif and   
     Hassaan Khaliq Qureshi and   
    Muttukrishnan Rajarajan and   
                  Marios Lestas   Combined Banzhaf & Diversity Index (CBDI)
                                  for critical node detection  . . . . . . 76--88
                   Lien-Wu Chen   Cooperative energy-efficient
                                  localization with node lifetime
                                  extension in mobile long-thin networks   89--97
               Debdeep Paul and   
               Wen-De Zhong and   
                 Sanjay K. Bose   Energy efficient cloud service pricing:
                                  a two-timescale optimization approach    98--112
             Michel Barbeau and   
              Gimer Cervera and   
      Joaquin Garcia-Alfaro and   
             Evangelos Kranakis   Channel selection using a multiple radio
                                  model  . . . . . . . . . . . . . . . . . 113--123
         Márcio Melo and   
            Susana Sargento and   
                Jorge Carapinha   Optimal virtual network migration: a
                                  step closer for seamless resource
                                  mobility . . . . . . . . . . . . . . . . 124--136
                Yongrui Qin and   
              Quan Z. Sheng and   
     Nickolas J. G. Falkner and   
           Schahram Dustdar and   
                   Hua Wang and   
        Athanasios V. Vasilakos   When things matter: a survey on
                                  data-centric Internet of Things  . . . . 137--153
      Mustapha Reda Senouci and   
         Abdelhamid Mellouk and   
            Nadjib Aitsaadi and   
               Latifa Oukhellou   Fusion-based surveillance WSN deployment
                                  using Dempster--Shafer theory  . . . . . 154--166
                    Yan Liu and   
                  Shun-Zheng Yu   Network coding-based multisource content
                                  delivery in Content Centric Networking   167--175
             Atiq Ur Rahman and   
        Abdulrahman Alharby and   
           Halabi Hasbullah and   
               Khalid Almuzaini   Corona based deployment strategies in
                                  wireless sensor network: a survey  . . . 176--193
                 Cheng Zhan and   
                    Fuyuan Xiao   Coding based wireless broadcast
                                  scheduling in real time applications . . 194--203
                 Lingzhi Li and   
                   Zhe Yang and   
                   Jin Wang and   
               Shukui Zhang and   
                     Yanqin Zhu   Network coding with crowdsourcing-based
                                  trajectory estimation for vehicular
                                  networks . . . . . . . . . . . . . . . . 204--215
       Fabio Rafael Segundo and   
    Eraldo Silveira e Silva and   
             Jean-Marie Farines   A DTN routing strategy based on neural
                                  networks for urban bus transportation
                                  system . . . . . . . . . . . . . . . . . 216--228
       Bahareh Alami Milani and   
         Nima Jafari Navimipour   A comprehensive review of the data
                                  replication techniques in the cloud
                                  environments: Major trends and future
                                  directions . . . . . . . . . . . . . . . 229--238
           Hashim A. Hashim and   
               B. O. Ayinde and   
                    M. A. Abido   Optimal placement of relay nodes in
                                  wireless sensor network using artificial
                                  bee colony algorithm . . . . . . . . . . 239--248
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 65, Number ??, April, 2016

                Haitao Zhao and   
                   Jibo Wei and   
            Nurul I. Sarkar and   
                Shengchun Huang   E-MAC: an evolutionary solution for
                                  collision avoidance in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1--11
                 Mahir Kaya and   
      Altan Koçyigit and   
                  P. Erhan Eren   An adaptive mobile cloud computing
                                  framework using a call graph based model 12--35
                Jungwon Lee and   
                 Miran Shim and   
                    Hyesook Lim   Name prefix matching using bloom filter
                                  pre-searching for content centric
                                  network  . . . . . . . . . . . . . . . . 36--47
            Rahma Chaabouni and   
Marc Sánchez-Artigas and   
Pedro García-López and   
 Lluís P\`amies-Ju\`arez   The power of swarming in personal clouds
                                  under bandwidth budget . . . . . . . . . 48--71
                  Jihun Seo and   
                Keuchul Cho and   
               Wooseong Cho and   
                  Gisu Park and   
                      Kijun Han   A discovery scheme based on carrier
                                  sensing in self-organizing Bluetooth Low
                                  Energy networks  . . . . . . . . . . . . 72--83
              Wilson M. Tan and   
              Stephen A. Jarvis   Heuristic solutions to the target
                                  identifiability problem in directional
                                  sensor networks  . . . . . . . . . . . . 84--102
         Deepak Kumar Patel and   
         Devashree Tripathy and   
                 C. R. Tripathy   Survey of load balancing techniques for
                                  Grid . . . . . . . . . . . . . . . . . . 103--119
                    Ying Qu and   
                   Bryan Ng and   
                   Winston Seah   A survey of routing and channel
                                  assignment in multi-channel multi-radio
                                  WMNs . . . . . . . . . . . . . . . . . . 120--130
               Fida Gillani and   
              Ehab Al-Shaer and   
                 Basil AsSadhan   Economic metric to improve spam
                                  detectors  . . . . . . . . . . . . . . . 131--143
        Gopal Kirshna Shyam and   
            Sunilkumar S. Manvi   Virtual resource prediction in cloud
                                  environment: a Bayesian approach . . . . 144--154
          Mahmoud Khasawneh and   
              Saed Alrabaee and   
             Anjali Agarwal and   
               Nishith Goel and   
                   Marzia Zaman   Power trading in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 155--166
                 Chenhao Qu and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   A reliable and cost-efficient
                                  auto-scaling system for web applications
                                  using heterogeneous spot instances . . . 167--180
           Mohammed Atiquzzaman   Editorial: 2015 Best Paper Awards  . . . A1--A3
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 66, Number ??, May, 2016

           Gianluigi Folino and   
                Pietro Sabatino   Ensemble based collaborative and
                                  distributed intrusion detection systems:
                                  a survey . . . . . . . . . . . . . . . . 1--16
                 Neenu Garg and   
                     Seema Bawa   Comparative analysis of cloud data
                                  integrity auditing protocols . . . . . . 17--32
 Abayomi Moradeyo Otebolaku and   
           Maria Teresa Andrade   User context recognition using
                                  smartphone sensors and classification
                                  models . . . . . . . . . . . . . . . . . 33--51
                   Shiyi Li and   
                  Qiang Cao and   
              Shenggang Wan and   
                    Lu Qian and   
                 Changsheng Xie   HRSPC: a hybrid redundancy scheme via
                                  exploring computational locality to
                                  support fast recovery and high
                                  reliability in distributed storage
                                  systems  . . . . . . . . . . . . . . . . 52--63
           Mohammad Masdari and   
            Sima ValiKardan and   
                Zahra Shahi and   
               Sonay Imani Azar   Towards workflow scheduling in cloud
                                  computing: a comprehensive analysis  . . 64--82
          Pawan Kumar Verma and   
               Rajesh Verma and   
               Arun Prakash and   
             Ashish Agrawal and   
           Kshirasagar Naik and   
            Rajeev Tripathi and   
            Maazen Alsabaan and   
              Tarek Khalifa and   
           Tamer Abdelkader and   
           Abdulhakim Abogharaf   Machine-to-Machine (M2M) communications:
                                  a survey . . . . . . . . . . . . . . . . 83--105
           Mohammad Masdari and   
       Sayyid Shahab Nabavi and   
                    Vafa Ahmadi   An overview of virtual machine placement
                                  schemes in cloud computing . . . . . . . 106--127
            Fuu-Cheng Jiang and   
                  Ilsun You and   
                    Fang-Yi Leu   Approaching green sensor field using
                                  queue-based optimization technique . . . 128--136
        Jurairat Phuttharak and   
                   Seng W. Loke   Mobile crowdsourcing in peer-to-peer
                                  opportunistic networks: Energy usage and
                                  response analysis  . . . . . . . . . . . 137--150
            Yatish K. Joshi and   
                 Mohamed Younis   Restoring connectivity in a resource
                                  constrained WSN  . . . . . . . . . . . . 151--165
               Justin Grana and   
              David Wolpert and   
                Joshua Neil and   
               Dongping Xie and   
        Tanmoy Bhattacharya and   
                   Russell Bent   A likelihood ratio anomaly detector for
                                  identifying within-perimeter computer
                                  network attacks  . . . . . . . . . . . . 166--179
               Amna Qureshi and   
        David Megías and   
             Helena Rif\`a-Pous   PSUM: Peer-to-peer multimedia content
                                  distribution using collusion-resistant
                                  fingerprinting . . . . . . . . . . . . . 180--197
            David Airehrour and   
            Jairo Gutierrez and   
                Sayan Kumar Ray   Secure routing for Internet of Things: a
                                  survey . . . . . . . . . . . . . . . . . 198--213
               Suleman Khan and   
              Abdullah Gani and   
 Ainuddin Wahid Abdul Wahab and   
            Muhammad Shiraz and   
                 Iftikhar Ahmad   Network forensics: Review, taxonomy, and
                                  open challenges  . . . . . . . . . . . . 214--235
    Suvendu Kumar Mohapatra and   
         Prasan Kumar Sahoo and   
                    Shih-Lin Wu   Big data analytic architecture for
                                  intruder detection in heterogeneous
                                  wireless sensor networks . . . . . . . . 236--249
                 Li Chunlin and   
                    Yan Xin and   
                      Li LaYuan   Flexible service provisioning based on
                                  context constraint for enhancing user
                                  experience in service oriented mobile
                                  cloud  . . . . . . . . . . . . . . . . . 250--261
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 67, Number ??, May, 2016

              Rahim Masoudi and   
                   Ali Ghaffari   Software defined networks: a survey  . . 1--25
      Suchetana Chakraborty and   
         Sandip Chakraborty and   
              Sukumar Nandi and   
              Sushanta Karmakar   Impact of redundant sensor deployment
                                  over data gathering performance: a model
                                  based approach . . . . . . . . . . . . . 26--42
                      Xuxun Liu   A novel transmission range adjustment
                                  strategy for energy hole avoiding in
                                  wireless sensor networks . . . . . . . . 43--52
           Huda Saleh Abbas and   
                Mark A. Gregory   The next generation of passive optical
                                  networks: a review . . . . . . . . . . . 53--74
              Mathias Pelka and   
           Horst Hellbrück   Survey of challenges and towards a
                                  unified architecture for location
                                  systems  . . . . . . . . . . . . . . . . 75--85
             Peter Bartalos and   
                     Yi Wei and   
             M. Brian Blake and   
          Haluk Damgacioglu and   
                 Iman Saleh and   
                   Nurcin Celik   Modeling energy-aware web services and
                                  application  . . . . . . . . . . . . . . 86--98
         Manuel Díaz and   
     Cristian Martín and   
         Bartolomé Rubio   State-of-the-art, challenges, and open
                                  issues in the integration of Internet of
                                  Things and cloud computing . . . . . . . 99--117
              Eisa Zarepour and   
       Abdul Alim Abd Karim and   
                Ajay Sharma and   
              Mahbub Hassan and   
              Aruna Seneviratne   Characterizing power saving for
                                  device-to-device browser cache
                                  cooperation  . . . . . . . . . . . . . . 118--127
                   Sobin CC and   
        Vaskar Raychoudhury and   
             Gustavo Marfia and   
                  Ankita Singla   A survey of routing and data
                                  dissemination in Delay Tolerant Networks 128--146
           Opeyemi Osanaiye and   
     Kim-Kwang Raymond Choo and   
                  Mqhele Dlodlo   Distributed denial of service (DDoS)
                                  resilience in cloud: Review and
                                  conceptual cloud DDoS mitigation
                                  framework  . . . . . . . . . . . . . . . 147--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 68, Number ??, June, 2016

                Nauman Ahad and   
               Junaid Qadir and   
                    Nasir Ahsan   Neural networks in wireless networks:
                                  Techniques, applications and guidelines  1--27
               Maxim Claeys and   
       Daphné Tuncer and   
              Jeroen Famaey and   
      Marinos Charalambides and   
        Steven Latré and   
              George Pavlou and   
                 Filip De Turck   Hybrid multi-tenant cache management for
                                  virtualized ISP networks . . . . . . . . 28--41
                   Anum Ali and   
             Ghalib A. Shah and   
                  Junaid Arshad   Energy efficient techniques for M2M
                                  communication: a survey  . . . . . . . . 42--55
               Zhiming Wang and   
              Xiaoping Zeng and   
                    Xue Liu and   
                     Man Xu and   
                     Ya Wen and   
                        Li Chen   TCP congestion control algorithm for
                                  heterogeneous Internet . . . . . . . . . 56--64
                  Yunhe Cui and   
               Lianshan Yan and   
                  Saifei Li and   
               Huanlai Xing and   
                    Wei Pan and   
                   Jian Zhu and   
                 Xiaoyang Zheng   SD-Anti-DDoS: Fast and efficient DDoS
                                  defense in software-defined networks . . 65--79
             Han-Peng Jiang and   
                David Chuck and   
                   Wei-Mei Chen   Energy-aware data center networks  . . . 80--89
             Aisha Abdallah and   
        Mohd Aizaini Maarof and   
                 Anazida Zainal   Fraud detection system: a survey . . . . 90--113
               Tran The Son and   
                Hoa Le-Minh and   
                   Nauman Aslam   MSAR: a metric self-adaptive routing
                                  model for Mobile Ad Hoc Networks . . . . 114--125
                 Wenjuan Li and   
                Weizhi Meng and   
                   Lam For Kwok   A survey on OpenFlow-based Software
                                  Defined Networks: Security challenges
                                  and countermeasures  . . . . . . . . . . 126--139
                   Yang Qin and   
               Weihong Yang and   
                   Yibin Ye and   
                        Yao Shi   Analysis for TCP in data center
                                  networks: Outcast and Incast . . . . . . 140--150
                  Wenbin Hu and   
                 Zhenyu Qiu and   
                  Huan Wang and   
                     Liping Yan   A Real-time scheduling algorithm for
                                  on-demand wireless XML data broadcasting 151--163
     Bijoy Chand Chatterjee and   
                Waya Fadini and   
                       Eiji Oki   A spectrum allocation scheme based on
                                  first-last-exact fit policy for elastic
                                  optical networks . . . . . . . . . . . . 164--172
   Syed Hamid Hussain Madni and   
 Muhammad Shafie Abd Latiff and   
           Yahaya Coulibaly and   
    Shafi'i Muhammad Abdulhamid   Resource scheduling for infrastructure
                                  as a service (IaaS) in cloud computing:
                                  Challenges and opportunities . . . . . . 173--200
                Weizhi Meng and   
               Wang Hao Lee and   
               S. R. Murali and   
              S. P. T. Krishnan   JuiceCaster: Towards automatic juice
                                  filming attacks on smartphones . . . . . 201--212
                P. V. Bindu and   
             P. Santhi Thilagam   Mining social networks for anomalies:
                                  Methods and challenges . . . . . . . . . 213--229
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 69, Number ??, July, 2016

         Alex F. R. Trajano and   
           Marcial P. Fernandez   Two-phase load balancing of In-Memory
                                  Key-Value Storages using Network
                                  Functions Virtualization (NFV) . . . . . 1--13
          Xavier Hesselbach and   
    Jos\`e Roberto Amazonas and   
           Santi Villanueva and   
             Juan Felipe Botero   Coordinated node and link mapping VNE
                                  using a new paths algebra strategy . . . 14--26
               T. Panigrahi and   
            Meenakshi Panda and   
                       G. Panda   Fault tolerant distributed estimation in
                                  wireless sensor networks . . . . . . . . 27--39
               Cezar Plesca and   
         Vincent Charvillat and   
                  Wei Tsang Ooi   Multimedia prefetching with optimal
                                  Markovian policies . . . . . . . . . . . 40--53
        Sally E. El Khawaga and   
             Ahmed I. Saleh and   
                  Hesham A. Ali   An Administrative Cluster-based
                                  Cooperative Caching (ACCC) strategy for
                                  Mobile Ad Hoc Networks . . . . . . . . . 54--76
        Ado Adamou Abba Ari and   
          Blaise Omer Yenke and   
            Nabila Labraoui and   
            Irepran Damakoa and   
               Abdelhak Gueroui   A power efficient cluster-based routing
                                  algorithm for wireless sensor networks:
                                  Honeybees swarm intelligence based
                                  approach . . . . . . . . . . . . . . . . 77--97
            Rafael L. Gomes and   
        Luiz F. Bittencourt and   
      Edmundo R. M. Madeira and   
          Eduardo Cerqueira and   
                    Mario Gerla   A combined energy-bandwidth approach to
                                  allocate resilient virtual software
                                  defined networks . . . . . . . . . . . . 98--106
                Du Yuanfeng and   
               Yang Dongkai and   
                Yang Huilin and   
                     Xiu Chundi   Flexible indoor localization and
                                  tracking system based on mobile phone    107--116
            V. K. Mohan Raj and   
                     R. Shriram   Power management in virtualized
                                  datacenter --- a survey  . . . . . . . . 117--133
           Francisco Moyano and   
      Carmen Fernandez-Gago and   
                   Javier Lopez   A model-driven approach for engineering
                                  trust and reputation into software
                                  services . . . . . . . . . . . . . . . . 134--151
                Cuong T. Do and   
             Nguyen H. Tran and   
                Eui-Nam Huh and   
           Choong Seon Hong and   
               Dusit Niyato and   
                        Zhu Han   Dynamics of service selection and
                                  provider pricing game in heterogeneous
                                  cloud market . . . . . . . . . . . . . . 152--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 70, Number ??, July, 2016

  Marcelo Caggiani Luizelli and   
      Leonardo Richter Bays and   
      Luciana Salete Buriol and   
    Marinho Pilla Barcellos and   
       Luciano Paschoal Gaspary   How physical network topologies affect
                                  virtual network embedding quality: a
                                  characterization study based on ISP and
                                  datacenter networks  . . . . . . . . . . 1--16
       Ali Mohammad Saghiri and   
          Mohammad Reza Meybodi   An approach for designing cognitive
                                  engines in cognitive peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 17--40
                Jianwei Niu and   
                   Lei Wang and   
                 Xiting Liu and   
                        Shui Yu   FUIR: Fusing user and item information
                                  to deal with data sparsity by using side
                                  information in recommendation systems    41--50
           Tekenate E. Amah and   
               Maznah Kamat and   
             Waldir Moreira and   
    Kamalrulnizam Abu Bakar and   
             Satria Mandala and   
              Marcos A. Batista   Towards next-generation routing
                                  protocols for pocket switched networks   51--88
               Xiaoming Liu and   
                Yadong Zhou and   
               Chengchen Hu and   
                  Xiaohong Guan   MIRACLE: a multiple independent random
                                  walks community parallel detection
                                  algorithm for big graphs . . . . . . . . 89--101
       Carlos Barba-Jimenez and   
       Raul Ramirez-Velarde and   
           Andrei Tchernykh and   
Ramón Rodríguez-Dagnino and   
        Juan Nolazco-Flores and   
             Raul Perez-Cazares   Cloud based Video-on-Demand service
                                  model ensuring quality of service and
                                  scalability  . . . . . . . . . . . . . . 102--113
                Fatih Senel and   
                 Mohamed Younis   Novel relay node placement algorithms
                                  for establishing connected topologies    114--130
           Juan Antonio Cordero   Multi-path TCP performance evaluation in
                                  dual-homed (wired/wireless) devices  . . 131--139
              Muhammad Anan and   
              Ala Al-Fuqaha and   
               Nidal Nasser and   
                 Ting-Yu Mu and   
                 Husnain Bustam   Empowering networking research and
                                  experimentation through Software-Defined
                                  Networking . . . . . . . . . . . . . . . 140--155
                 Fuliang Li and   
                Jiahai Yang and   
               Xingwei Wang and   
                   Tian Pan and   
               Changqing An and   
                    Jianping Wu   Characteristics analysis at prefix
                                  granularity: a case study in an IPv6
                                  network  . . . . . . . . . . . . . . . . 156--170
                  Jian Peng and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   Bit-level $n$-gram based forensic
                                  authorship analysis on social media:
                                  Identifying individuals from linguistic
                                  profiles . . . . . . . . . . . . . . . . 171--182
                    Lin Xue and   
                Suman Kumar and   
                  Cheng Cui and   
    Praveenkumar Kondikoppa and   
              Chui-Hui Chiu and   
                Seung-Jong Park   Towards fair and low latency next
                                  generation high speed networks: AFCD
                                  queuing  . . . . . . . . . . . . . . . . 183--193
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 71, Number ??, August, 2016

   Mahdi Nasrullah Al-Ameen and   
                 Matthew Wright   iPersea: Towards improving the
                                  Sybil-resilience of social DHT . . . . . 1--10
              Minhaj Ahmad Khan   A survey of security issues for cloud
                                  computing  . . . . . . . . . . . . . . . 11--29
                  Hang Shen and   
                   Guangwei Bai   Routing in wireless multimedia sensor
                                  networks: a survey and challenges ahead  30--49
               Melike Yigit and   
            V. Cagri Gungor and   
               Etimad Fadel and   
               Laila Nassef and   
              Nadine Akkari and   
                Ian F. Akyildiz   Channel-aware routing and priority-aware
                                  multi-channel scheduling for WSN-based
                                  smart grid applications  . . . . . . . . 50--58
 L. González-Manzano and   
  José M. de Fuentes and   
            Sergio Pastrana and   
          Pedro Peris-Lopez and   
  Luis Hernández-Encinas   PAgIoT --- Privacy-preserving
                                  Aggregation protocol for Internet of
                                  Things . . . . . . . . . . . . . . . . . 59--71
         Nusrat Zerin Zenia and   
            Mohammed Aseeri and   
          Muhammad R. Ahmed and   
       Zamshed I. Chowdhury and   
               M. Shamim Kaiser   Energy-efficiency and reliability in MAC
                                  and routing protocols for underwater
                                  wireless sensor network: a survey  . . . 72--85
     Alireza Sadeghi Milani and   
         Nima Jafari Navimipour   Load balancing mechanisms and techniques
                                  in the cloud environments: Systematic
                                  literature review and future trends  . . 86--98
             Pimmy Gandotra and   
               Rakesh Kumar Jha   Device-to-Device Communication in
                                  Cellular Networks: a Survey  . . . . . . 99--117
            Rodrigo R. Esch and   
        Fábio Protti and   
              Valmir C. Barbosa   Adaptive event sensing in networks of
                                  autonomous mobile agents . . . . . . . . 118--129
                Mahda Noura and   
               Rosdiadee Nordin   A survey on interference management for
                                  Device-to-Device (D2D) communication and
                                  its challenges in 5G networks  . . . . . 130--150
              Aisha Siddiqa and   
Ibrahim Abaker Targio Hashem and   
               Ibrar Yaqoob and   
             Mohsen Marjani and   
   Shahabuddin Shamshirband and   
              Abdullah Gani and   
              Fariza Nasaruddin   A survey of big data management:
                                  Taxonomy and state-of-the-art  . . . . . 151--166
              Jingyuan Wang and   
               Jiangtao Wen and   
                  Jun Zhang and   
                Zhang Xiong and   
                     Yuxing Han   TCP-FIT: an improved TCP algorithm for
                                  heterogeneous networks . . . . . . . . . 167--180
              Manel Seddiki and   
           Mahfoud Bencha\"\iba   2P-Lookup: Popularity and Proximity
                                  based P2P Lookup mechanism over MANETs   181--193
         João Santos and   
    Joel J. P. C. Rodrigues and   
          Bruno M. C. Silva and   
          João Casal and   
              Kashif Saleem and   
                 Victor Denisov   An IoT-based mobile gateway for
                                  intelligent personal assistants on
                                  mobile health environments . . . . . . . 194--204
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 72, Number ??, September, 2016

              Mohamed Attia and   
          Hichem Sedjelmaci and   
      Sidi Mohammed Senouci and   
              El-Hassane Aglzim   Game model to optimally combine electric
                                  vehicles with green and non-green
                                  sources into an end-to-end smart grid
                                  architecture . . . . . . . . . . . . . . 1--13
                  Jian Peng and   
     Kim-Kwang Raymond Choo and   
                   Helen Ashman   User profiling in intrusion detection: a
                                  review . . . . . . . . . . . . . . . . . 14--27
               Kishor Singh and   
                    Sangman Moh   Routing protocols in cognitive radio ad
                                  hoc networks: a comprehensive review . . 28--37
                 Rana Azzam and   
              Rabeb Mizouni and   
                 Hadi Otrok and   
                 Anis Ouali and   
                   Shakti Singh   GRS: a Group-Based Recruitment System
                                  for Mobile Crowd Sensing . . . . . . . . 38--50
             M. R. M. Assis and   
              L. F. Bittencourt   A survey on cloud federation
                                  architectures: Identifying functional
                                  and non-functional properties  . . . . . 51--71
        Sakib Md. Bin Malek and   
         Md. Muntakim Sadik and   
                 Ashikur Rahman   On balanced $k$-coverage in visual
                                  sensor networks  . . . . . . . . . . . . 72--86
Shilpa Shashikant Chaudhari and   
         Rajashekhar C. Biradar   Traffic and mobility aware resource
                                  prediction using cognitive agent in
                                  mobile ad hoc networks . . . . . . . . . 87--103
                    Tie Qiu and   
                    Yuan Lv and   
                   Feng Xia and   
                  Ning Chen and   
                  Jiafu Wan and   
                      Amr Tolba   ERGID: an efficient routing protocol for
                                  emergency response Internet of Things    104--112
         Hassen A. Mogaibel and   
             Mohamed Othman and   
        Shamala Subramaniam and   
    Nor Asilah Wati Abdul Hamid   Review of channel assignment approaches
                                  in multi-radio multi-channel wireless
                                  mesh network . . . . . . . . . . . . . . 113--139
                Jingyu Feng and   
                Guangyue Lu and   
              Honggang Wang and   
                  Xuanhong Wang   Supporting secure spectrum sensing data
                                  transmission against SSDH attack in
                                  cognitive radio ad hoc networks  . . . . 140--149
                 C. Hamdeni and   
                T. Hamrouni and   
                F. Ben Charrada   Data popularity measurements in
                                  distributed systems: Survey and design
                                  directions . . . . . . . . . . . . . . . 150--161
               Xiaochen Hao and   
                Weijing Liu and   
                   Ning Yao and   
                 Dehua Geng and   
                        Xida Li   Distributed topology construction
                                  algorithm to improve link quality and
                                  energy efficiency for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 162--170
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 73, Number ??, September, 2016

                    Xian Li and   
               Qiuling Tang and   
                   Changyin Sun   The impact of node position on outage
                                  performance of RF energy powered
                                  wireless sensor communication links in
                                  overlaid deployment scenario . . . . . . 1--11
           Ubaid Ullah Khan and   
            Naqqash Dilshad and   
    Mubashir Husain Rehmani and   
                     Tariq Umer   Fairness in Cognitive Radio Networks:
                                  Models, measurement methods,
                                  applications, and future research
                                  directions . . . . . . . . . . . . . . . 12--26
              Mehrnaz Moudi and   
             Mohamed Othman and   
              Kweh Yeah Lun and   
      Amir Rizaan Abdul Rahiman   $x$-Folded TM: an efficient topology for
                                  interconnection networks . . . . . . . . 27--34
               M. Kaliappan and   
            Susan Augustine and   
                 B. Paramasivan   Enhancing energy efficiency and load
                                  balancing in mobile ad hoc network using
                                  dynamic genetic algorithms . . . . . . . 35--43
                   Song Han and   
                  Xinbin Li and   
                 Zhixin Liu and   
                   Xinping Guan   Hierarchical-game-based algorithm for
                                  downlink joint subchannel and power
                                  allocation in OFDMA femtocell networks   44--56
             Aimad Karkouch and   
            Hajar Mousannif and   
       Hassan Al Moatassime and   
                    Thomas Noel   Data quality in Internet of Things: a
                                  state-of-the-art survey  . . . . . . . . 57--81
                 Guidan Yao and   
                Zhigang Jin and   
                      Yishan Su   An environment-friendly spectrum
                                  decision strategy for underwater
                                  acoustic networks  . . . . . . . . . . . 82--93
                  K. Ivesic and   
            L. Skorin-Kapov and   
                 M. Matijasevic   Corrigendum to: ``Cross-layer QoE-driven
                                  admission control and resource
                                  allocation for adaptive multimedia
                                  services in LTE'' [J. Netw. Comput.
                                  Appl. \bf 46 (2014) 336--351]  . . . . . 94--97
                Tien Van Do and   
                  Nam H. Do and   
Ádám Horváth and   
                   Jinting Wang   Corrigendum to ``Modelling opportunistic
                                  spectrum renting in mobile cellular
                                  networks'' [J. Netw. Comput. Appl. 52
                                  (2015) 129--138] . . . . . . . . . . . . 98
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 74, Number ??, October, 2016

                   Feng Lin and   
                  Gang Wang and   
                Junhai Zhou and   
               Shiwen Zhang and   
                        Xin Yao   High-performance IPv6 address lookup in
                                  GPU-accelerated software routers . . . . 1--10
               Yanchao Zhao and   
                Wenzhong Li and   
                      Sanglu Lu   Navigation-driven handoff minimization
                                  in wireless networks . . . . . . . . . . 11--20
                   Lin Tang and   
                    Hui Cao and   
                   Li Zheng and   
                 Ningjian Huang   Uncertainty-aware RFID network planning
                                  for target detection and target location 21--30
               Kirill Kogan and   
Alejandro López-Ortiz and   
        Sergey I. Nikolenko and   
           Gabriel Scalosub and   
                  Michael Segal   Large profits or fast gains: a dilemma
                                  in maximizing throughput with
                                  applications to network processors . . . 31--43
                   Chen Lyu and   
               Shi-Feng Sun and   
             Yuanyuan Zhang and   
                 Amit Pande and   
                 Haining Lu and   
                        Dawu Gu   Privacy-preserving data sharing scheme
                                  over cloud for social applications . . . 44--55
               Manas Khatua and   
                    Sudip Misra   Exploiting anomalous slots for multiple
                                  channel access in IEEE 802.11 networks   56--65
              Yogesh Sharma and   
              Bahman Javadi and   
                Weisheng Si and   
                     Daniel Sun   Reliability and energy efficiency in
                                  cloud computing systems: Survey and
                                  taxonomy . . . . . . . . . . . . . . . . 66--85
  Daniel Ricardo dos Santos and   
            Roberto Marinho and   
    Gustavo Roecker Schmitt and   
     Carla Merkle Westphall and   
        Carlos Becker Westphall   A framework and risk assessment
                                  approaches for risk-based access control
                                  in the cloud . . . . . . . . . . . . . . 86--97
               Salman Iqbal and   
        Miss Laiha Mat Kiah and   
            Babak Dhaghighi and   
           Muzammil Hussain and   
               Suleman Khan and   
      Muhammad Khurram Khan and   
         Kim-Kwang Raymond Choo   On cloud security attacks: a taxonomy
                                  and intrusion detection and prevention
                                  as a service . . . . . . . . . . . . . . 98--120
            Miguel Sepulcre and   
            Javier Gozalvez and   
         Baldomero Coll-Perales   Multipath QoS-driven routing protocol
                                  for industrial wireless networks . . . . 121--132
           Michael Emmanuel and   
                  Ramesh Rayudu   Communication technologies for smart
                                  grid applications: a survey  . . . . . . 133--148
             Chun-Cheng Lin and   
             Teng-Huei Chen and   
                  Hui-Hsin Chin   Adaptive router node placement with
                                  gateway positions and QoS constraints in
                                  dynamic wireless mesh networks . . . . . 149--164
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 75, Number ??, November, 2016

               Hafsa Zannat and   
              Taslima Akter and   
            Mashrura Tasnim and   
                 Ashikur Rahman   The coverage problem in visual sensor
                                  networks: a target oriented approach . . 1--15
           Dimitrios Zorbas and   
   Luigi Di Puglia Pugliese and   
     Tahiry Razafindralambo and   
            Francesca Guerriero   Optimal drone placement and
                                  cost-efficient target coverage . . . . . 16--31
             Yousri Daldoul and   
      Djamal-Eddine Meddour and   
               Toufik Ahmed and   
                  Raouf Boutaba   Block Negative Acknowledgement protocol
                                  for reliable multicast in IEEE 802.11    32--46
          Ranesh Kumar Naha and   
                 Mohamed Othman   Cost-aware service brokering and
                                  performance sentient load balancing
                                  algorithms in the cloud  . . . . . . . . 47--57
       Mohd Faizal Ab Razak and   
           Nor Badrul Anuar and   
               Rosli Salleh and   
                  Ahmad Firdaus   The rise of ``malware'': Bibliometric
                                  analysis of malware study  . . . . . . . 58--76
          Pawan Kumar Verma and   
               Rajesh Verma and   
               Arun Prakash and   
            Rajeev Tripathi and   
               Kshirasagar Naik   A novel hybrid medium access control
                                  protocol for inter-M2M communications    77--88
              Qiaoyun Zhang and   
                Guilin Chen and   
                 Liang Zhao and   
                Chih-Yung Chang   Piconet construction and restructuring
                                  mechanisms for interference avoiding in
                                  Bluetooth PANs . . . . . . . . . . . . . 89--100
        Ricardo Marco Alaez and   
     Jose M. Alcaraz Calero and   
             Fatna Belqasmi and   
             May El-Barachi and   
              Mohamad Badra and   
                   Omar Alfandi   Towards an open source architecture for
                                  multi-operator LTE core networks . . . . 101--109
               M. D'Arienzo and   
                   S. P. Romano   GOSPF: an energy efficient
                                  implementation of the OSPF routing
                                  protocol . . . . . . . . . . . . . . . . 110--127
                 Ozgur Ates and   
              Selcuk Keskin and   
                   Taskin Kocak   High throughput graphics processing unit
                                  based Fano decoder . . . . . . . . . . . 128--137
              Deval Bhamare and   
                   Raj Jain and   
            Mohammed Samaka and   
                    Aiman Erbad   A survey on service function chaining    138--155
                Jin B. Hong and   
                 Dong Seong Kim   Towards scalable security analysis using
                                  multi-layered security models  . . . . . 156--168
             Satoshi Utsumi and   
Salahuddin Muhammad Salim Zabir and   
                Sumet Prabhavat   A new explicit congestion notification
                                  scheme for satellite IP networks . . . . 169--180
Charalampos Konstantopoulos and   
          Grammati Pantziou and   
         Ioannis E. Venetis and   
               Damianos Gavalas   Efficient event handling in Wireless
                                  Sensor and Actor Networks: an on-line
                                  computation approach . . . . . . . . . . 181--199
              Saurabh Singh and   
            Young-Sik Jeong and   
                 Jong Hyuk Park   A survey on cloud computing security:
                                  Issues, threats, and solutions . . . . . 200--222
             Yaser Mansouri and   
                 Rajkumar Buyya   To move or not to move: Cost
                                  optimization in a dual cloud-based
                                  storage architecture . . . . . . . . . . 223--235
                 Sana Habib and   
               Junaid Qadir and   
                 Anwaar Ali and   
              Durdana Habib and   
                    Ming Li and   
            Arjuna Sathiaseelan   The past, present, and future of
                                  transport-layer multipath  . . . . . . . 236--258
       Nor Bakiah Abd Warif and   
 Ainuddin Wahid Abdul Wahab and   
     Mohd Yamani Idna Idris and   
              Roziana Ramli and   
               Rosli Salleh and   
   Shahaboddin Shamshirband and   
         Kim-Kwang Raymond Choo   Copy--move forgery detection: Survey,
                                  challenges and future directions . . . . 259--278
                 Waqar Asif and   
              Marios Lestas and   
     Hassaan Khaliq Qureshi and   
        Muttukrishnan Rajarajan   Optimization based spectral partitioning
                                  for node criticality assessment  . . . . 279--292
           Paulo Bartolomeu and   
              Muhammad Alam and   
           Joaquim Ferreira and   
            José Fonseca   Survey on low power real-time wireless
                                  MAC protocols  . . . . . . . . . . . . . 293--316
                  Abid Khan and   
             Farhana Jabeen and   
                  Farah Naz and   
               Sabah Suhail and   
              Mansoor Ahmed and   
                  Sarfraz Nawaz   Buyer seller watermarking protocols
                                  issues and challenges --- a survey . . . 317--334
               Junaid Shuja and   
              Abdullah Gani and   
   Muhammad Habib ur Rehman and   
                 Ejaz Ahmed and   
           Sajjad A. Madani and   
      Muhammad Khurram Khan and   
                    Kwangman Ko   Towards native code offloading based MCC
                                  frameworks for multimedia applications:
                                  a survey . . . . . . . . . . . . . . . . 335--354
                Minjae Park and   
                   Hyun Ahn and   
              Kwanghoon Pio Kim   Workflow-supported social networks:
                                  Discovery, analyses, and system  . . . . 355--373
                   Xun Shao and   
            Masahiro Jibiki and   
          Yuuichi Teranishi and   
               Nozomu Nishinaga   A virtual replica node-based flash
                                  crowds alleviation method for sensor
                                  overlay networks . . . . . . . . . . . . 374--384
            Nusrat Nowsheen and   
              Gour Karmakar and   
            Joarder Kamruzzaman   PRADD: a path reliability-aware data
                                  delivery protocol for underwater
                                  acoustic sensor networks . . . . . . . . 385--397
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 76, Number ??, December, 2016

             Dilara Acarali and   
    Muttukrishnan Rajarajan and   
             Nikos Komninos and   
                    Ian Herwono   Survey of approaches and features for
                                  the identification of HTTP-based botnet
                                  traffic  . . . . . . . . . . . . . . . . 1--15
                 Laisen Nie and   
               Dingde Jiang and   
                    Lei Guo and   
                        Shui Yu   Traffic matrix prediction and estimation
                                  based on deep learning in large-scale IP
                                  backbone networks  . . . . . . . . . . . 16--22
             Nazmus S. Nafi and   
            Khandakar Ahmed and   
            Mark A. Gregory and   
                    Manoj Datta   A survey of smart grid architectures,
                                  applications, benefits and
                                  standardization  . . . . . . . . . . . . 23--36
                   Qi Jiang and   
                Jianfeng Ma and   
                 Fushan Wei and   
              Youliang Tian and   
                  Jian Shen and   
                  Yuanyuan Yang   An untraceable temporal-credential-based
                                  two-factor authentication scheme using
                                  ECC for wireless sensor networks . . . . 37--48
            Parisa Goudarzi and   
     Hadi Tabatabaee Malazi and   
                 Mahmood Ahmadi   Khorramshahr: a scalable peer to peer
                                  architecture for port warehouse
                                  management system  . . . . . . . . . . . 49--59
                Chun-Nan Lu and   
            Chun-Ying Huang and   
               Ying-Dar Lin and   
                 Yuan-Cheng Lai   High performance traffic classification
                                  based on message size sequence and
                                  distribution . . . . . . . . . . . . . . 60--74
                Ehsan Ahvar and   
Nafiseh Daneshgar-Moghaddam and   
           Antonio M. Ortiz and   
             Gyu Myoung Lee and   
                    Noel Crespi   On analyzing user location discovery
                                  methods in smart homes: a taxonomy and
                                  survey . . . . . . . . . . . . . . . . . 75--86
             Ren-Hung Hwang and   
              Yu-Ling Hsueh and   
               Jang-Jiin Wu and   
                   Fu-Hui Huang   SocialHide: a generic distributed
                                  framework for location privacy
                                  protection . . . . . . . . . . . . . . . 87--100
               Divya Saxena and   
            Vaskar Raychoudhury   N-FIB: Scalable, memory efficient
                                  name-based forwarding  . . . . . . . . . 101--109
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 77, Number ??, January 1, 2017

           Dimitris Tsolkas and   
              Eirini Liotou and   
               Nikos Passas and   
                Lazaros Merakos   A survey on parametric QoE estimation
                                  for popular services . . . . . . . . . . 1--17
              Preeti Mishra and   
          Emmanuel S. Pilli and   
         Vijay Varadharajan and   
                 Udaya Tupakula   Intrusion detection techniques in cloud
                                  environment: a survey  . . . . . . . . . 18--47
        Gyanappa A. Walikar and   
          Rajashekar C. Biradar   A survey on hybrid routing mechanisms in
                                  mobile ad hoc networks . . . . . . . . . 48--63
               Baogui Huang and   
                   Jiguo Yu and   
              Xiuzhen Cheng and   
              Honglong Chen and   
                       Hang Liu   SINR based shortest link scheduling with
                                  oblivious power control in wireless
                                  networks . . . . . . . . . . . . . . . . 64--72
              Fariba Aznoli and   
         Nima Jafari Navimipour   Cloud services recommendation: Reviewing
                                  the recent advances and suggesting the
                                  future research directions . . . . . . . 73--86
              Misbah Liaqat and   
               Victor Chang and   
              Abdullah Gani and   
      Siti Hafizah Ab Hamid and   
            Muhammad Toseef and   
                Umar Shoaib and   
                Rana Liaqat Ali   Federated cloud resource management:
                                  Review and discussion  . . . . . . . . . 87--105
            Fahimeh Dabaghi and   
            Zeinab Movahedi and   
                    Rami Langar   A survey on green routing protocols
                                  using sleep-scheduling in wired networks 106--122
                 Long Cheng and   
                Jianwei Niu and   
                Linghe Kong and   
               Chengwen Luo and   
                      Yu Gu and   
                   Wenbo He and   
                   Sajal K. Das   Compressive sensing based data quality
                                  improvement for crowd-sensing
                                  applications . . . . . . . . . . . . . . 123--134
                 Wenjuan Li and   
                Weizhi Meng and   
               Lam-For Kwok and   
                Horace H. S. Ip   Enhancing collaborative intrusion
                                  detection networks against insider
                                  attacks using supervised intrusion
                                  sensitivity-based trust management model 135--145
                   Chen Lin and   
               Zhidong Shen and   
                  Qian Chen and   
           Frederick T. Sheldon   A data integrity verification scheme in
                                  mobile cloud computing . . . . . . . . . 146--151
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 78, Number ??, January 15, 2017

            Tshiamo Sigwele and   
                Atm S. Alam and   
            Prashant Pillai and   
                      Yim F. Hu   Energy-efficient cloud radio access
                                  networks by cloud based workload
                                  consolidation for 5G . . . . . . . . . . 1--8
             Pimmy Gandotra and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A survey on device-to-device (D2D)
                                  communication: Architecture and security
                                  issues . . . . . . . . . . . . . . . . . 9--29
        Giuseppina Garofalo and   
            Andrea Giordano and   
              Patrizia Piro and   
      Giandomenico Spezzano and   
                   Andrea Vinci   A distributed real-time approach for
                                  mitigating CSO and flooding in urban
                                  drainage systems . . . . . . . . . . . . 30--42
             Ehsan Arianyan and   
              Hassan Taheri and   
                 Vahid Khoshdel   Novel fuzzy multi objective DVFS-aware
                                  consolidation heuristics for energy and
                                  SLA efficient resource management in
                                  cloud data centers . . . . . . . . . . . 43--61
                Xiumin Wang and   
              Xiaoming Chen and   
                  Chau Yuen and   
                  Weiwei Wu and   
                 Meng Zhang and   
                     Cheng Zhan   Delay-cost tradeoff for virtual machine
                                  migration in cloud data centers  . . . . 62--72
              Gulshan Kumar and   
            Mritunjay Kumar Rai   An energy efficient and optimized load
                                  balanced localization method using CDS
                                  with one-hop neighbourhood and genetic
                                  algorithm in WSNs  . . . . . . . . . . . 73--82
      Fábio D. Rossi and   
           Miguel G. Xavier and   
 César A. F. De Rose and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   E-eco: Performance-aware
                                  energy-efficient cloud data center
                                  orchestration  . . . . . . . . . . . . . 83--96
         Arani Bhattacharya and   
                    Pradipta De   A survey of adaptation techniques in
                                  computation offloading . . . . . . . . . 97--115
                 Cuiyu Kong and   
                  I.-Hsuan Peng   Tradeoff design of radio resource
                                  scheduling for power and spectrum
                                  utilizations in LTE uplink systems . . . 116--124
               Ying-Dar Lin and   
             Yuan-Cheng Lai and   
               Hung-Yi Teng and   
            Chun-Chieh Liao and   
                    Yi-Chih Kao   Scalable multicasting with multiple
                                  shared trees in software defined
                                  networking . . . . . . . . . . . . . . . 125--133
     Abdulbaghi Ghaderzadeh and   
              Mehdi Kargahi and   
                  Midia Reshadi   InFreD: Intelligent Free Rider Detection
                                  in collaborative distributed systems . . 134--145
Miguel López-Benítez and   
        Timothy D. Drysdale and   
             Simon Hadfield and   
        Mohamed Ismaeel Maricar   Prototype for multidisciplinary research
                                  in the context of the Internet of Things 146--161
                Weizhi Meng and   
                 Wenjuan Li and   
                 Yang Xiang and   
         Kim-Kwang Raymond Choo   A Bayesian inference-based detection
                                  mechanism to defend medical smartphone
                                  networks against insider attacks . . . . 162--169
           Md Akbar Hossain and   
            Nurul I. Sarkar and   
            Jairo Gutierrez and   
                    William Liu   Performance study of block ACK and
                                  reverse direction in IEEE 802.11n using
                                  a Markov chain model . . . . . . . . . . 170--179
                Sara Ayoubi and   
                 Chadi Assi and   
                Yiheng Chen and   
              Tarek Khalifa and   
           Khaled Bashir Shaban   Restoration methods for cloud multicast
                                  virtual networks . . . . . . . . . . . . 180--190
                Waqar Ahmed and   
                Osman Hasan and   
               Usman Pervez and   
                   Junaid Qadir   Reliability modeling and analysis of
                                  communication networks . . . . . . . . . 191--215
              Amrita Ghosal and   
               Subir Halder and   
                 Stefano Chessa   Secure key design approaches using
                                  entropy harvesting in wireless sensor
                                  network: a survey  . . . . . . . . . . . 216--230
           Mina Mirhosseini and   
             Fatemeh Barani and   
        Hossein Nezamabadi-pour   QQIGSA: a quadrivalent quantum-inspired
                                  GSA and its application in optimal
                                  adaptive design of wireless sensor
                                  networks . . . . . . . . . . . . . . . . 231--241
             Mukhtiar Ahmed and   
            Mazleena Salleh and   
              M. Ibrahim Channa   Routing protocols based on node mobility
                                  for Underwater Wireless Sensor Network
                                  (UWSN): a survey . . . . . . . . . . . . 242--252
                    Qing Li and   
                 Yong Jiang and   
               Pengfei Duan and   
                 Mingwei Xu and   
                        Xi Xiao   Quokka: Latency-Aware Middlebox
                                  Scheduling with dynamic resource
                                  allocation . . . . . . . . . . . . . . . 253--266
             Thaha Muhammed and   
              Riaz Ahmed Shaikh   An analysis of fault detection
                                  strategies in wireless sensor networks   267--287
                  Sheng Wen and   
             Jiaojiao Jiang and   
                     Bo Liu and   
                 Yang Xiang and   
                    Wanlei Zhou   Using epidemic betweenness to measure
                                  the influence of users in complex
                                  networks . . . . . . . . . . . . . . . . 288--299
             Chien-Fu Cheng and   
                    Lung-Hao Li   Data gathering problem with the data
                                  importance consideration in Underwater
                                  Wireless Sensor Networks . . . . . . . . 300--312
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 79, Number ??, February 1, 2017

   Muhammad Habib ur Rehman and   
              Chee Sun Liew and   
               Teh Ying Wah and   
          Muhammad Khurram Khan   Towards next-generation heterogeneous
                                  mobile data stream mining applications:
                                  Opportunities, challenges, and future
                                  research directions  . . . . . . . . . . 1--24
            Shahriar kaisar and   
        Joarder Kamruzzaman and   
              Gour Karmakar and   
                   Iqbal Gondal   Decentralized content sharing among
                                  tourists in visiting hotspots  . . . . . 25--40
   Kayode Sakariyah Adewole and   
           Nor Badrul Anuar and   
           Amirrudin Kamsin and   
      Kasturi Dewi Varathan and   
               Syed Abdul Razak   Malicious accounts: Dark of the social
                                  networks . . . . . . . . . . . . . . . . 41--67
         Annie Ibrahim Rana and   
               Brendan Jennings   Semantic aware processing of user
                                  defined inference rules to manage home
                                  networks . . . . . . . . . . . . . . . . 68--87
               Ashish Singh and   
              Kakali Chatterjee   Cloud security issues and challenges: a
                                  survey . . . . . . . . . . . . . . . . . 88--115
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 80, Number ??, February 15, 2017

                    Ting Lu and   
                 Guohua Liu and   
                     Wei Li and   
                 Shan Chang and   
                    Wenjing Guo   Distributed sampling rate allocation for
                                  data quality maximization in
                                  rechargeable sensor networks . . . . . . 1--9
         Prasan Kumar Sahoo and   
                 Jang-Ping Sheu   Design and analysis of collision free
                                  MAC for wireless sensor networks with or
                                  without data retransmission  . . . . . . 10--21
                 L. Manunza and   
               S. Marseglia and   
                   S. P. Romano   Kerberos: a real-time fraud detection
                                  system for IMS-enabled VoIP networks . . 22--34
               Chunhong Liu and   
             Chuanchang Liu and   
               Yanlei Shang and   
               Shiping Chen and   
                   Bo Cheng and   
                  Junliang Chen   An adaptive prediction approach based on
                                  workload pattern discrimination in the
                                  cloud  . . . . . . . . . . . . . . . . . 35--44
                   Fan Deng and   
                  Li-Yong Zhang   Elimination of policy conflict to
                                  improve the PDP evaluation performance   45--57
                   N. Busom and   
                 R. Petrlic and   
             F. Sebé and   
                   C. Sorge and   
                       M. Valls   A privacy-preserving reputation system
                                  with user rewards  . . . . . . . . . . . 58--66
            Habib Mostafaei and   
           Antonio Montieri and   
            Valerio Persico and   
         Antonio Pescapé   A sleep scheduling approach based on
                                  learning automata for WSN partial
                                  coverage . . . . . . . . . . . . . . . . 67--78
               Mohammad Masdari   Markov chain-based evaluation of the
                                  certificate status validations in hybrid
                                  MANETs . . . . . . . . . . . . . . . . . 79--89
                Jihong Wang and   
                    Wenxiao Shi   Joint multicast routing and channel
                                  assignment for multi-radio multi-channel
                                  wireless mesh networks with hybrid
                                  traffic  . . . . . . . . . . . . . . . . 90--108
             Maryam Barshan and   
              Hendrik Moens and   
            Bruno Volckaert and   
                 Filip De Turck   Design and evaluation of a dual dynamic
                                  adaptive reservation approach in media
                                  production networks  . . . . . . . . . . 109--122
          Maicon Melo Alves and   
                Luci Pirmez and   
           Silvana Rossetto and   
         Flavia C. Delicato and   
       Claudio M. de Farias and   
             Paulo F. Pires and   
         Igor L. dos Santos and   
               Albert Y. Zomaya   Damage prediction for wind turbines
                                  using wireless sensor and actuator
                                  networks . . . . . . . . . . . . . . . . 123--140
               Chengwen Luo and   
                 Long Cheng and   
                 Hande Hong and   
            Kartik Sankaran and   
             Mun Choon Chan and   
               Jianqiang Li and   
                     Zhong Ming   From mapping to indoor semantic queries:
                                  Enabling zero-effort indoor
                                  environmental sensing  . . . . . . . . . 141--151
              Ahmed AlEroud and   
                  Izzat Alsmadi   Identifying cyber-attacks on software
                                  defined networks: an inference-based
                                  intrusion detection approach . . . . . . 152--164
             Chao-Tung Yang and   
              Jung-Chun Liu and   
            Shuo-Tsung Chen and   
                Kuan-Lung Huang   Virtual machine management system based
                                  on the power saving algorithm in cloud   165--180
          Saritha Arunkumar and   
           Berker Soyluoglu and   
               Murat Sensoy and   
          Mudhakar Srivatsa and   
        Muttukrishnan Rajarajan   Location attestation and access control
                                  for mobile devices using GeoXACML  . . . 181--188
            Mehdi Boulaiche and   
   Louiza Bouallouche-Medjkoune   HSecGR: Highly Secure Geographic Routing 189--199
              Murat Karakus and   
                  Arjan Durresi   Quality of Service (QoS) in Software
                                  Defined Networking (SDN): a survey . . . 200--218
          Mohammad Goudarzi and   
              Mehran Zamani and   
     Abolfazl Toroghi Haghighat   A fast hybrid multi-site computation
                                  offloading for mobile cloud computing    219--231
         Alessandro Morelli and   
            Mauro Tortonesi and   
          Cesare Stefanelli and   
                  Niranjan Suri   Information-Centric Networking in
                                  next-generation communications scenarios 232--250
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 81, Number ??, March 1, 2017

               Marco Cogoni and   
          Giovanni Busonera and   
               Paolo Anedda and   
              Gianluigi Zanetti   Transition to congestion in
                                  communication/computation networks for
                                  near-optimal and sub-optimal resource
                                  management via Monte Carlo simulations   1--11
               Swati Sharma and   
            Alefiya Hussain and   
                    Huzur Saran   Towards repeatability & verifiability in
                                  networking experiments: a stochastic
                                  framework  . . . . . . . . . . . . . . . 12--23
               Asrin Vakili and   
         Nima Jafari Navimipour   Comprehensive and systematic review of
                                  the service composition mechanisms in
                                  the cloud environments . . . . . . . . . 24--36
                     Yu Xin and   
              Zhi-Qiang Xie and   
                      Jing Yang   A load balance oriented cost efficient
                                  scheduling method for parallel tasks . . 37--46
                   Shantanu Pal   Evaluating the impact of network loads
                                  and message size on mobile opportunistic
                                  networks in challenged environments  . . 47--58
          Giancarlo Fortino and   
          Giuseppe Di Fatta and   
            Sergio F. Ochoa and   
                Carlos E. Palau   Engineering future interoperable and
                                  open IoT systems . . . . . . . . . . . . 59--61
        Georgios Exarchakos and   
             Ilker Oztelcan and   
        Dimitris Sarakiotis and   
                 Antonio Liotta   plexi: Adaptive re-scheduling
                                  web-service of time synchronized
                                  low-power wireless networks  . . . . . . 62--73
                    G. Aloi and   
               G. Caliciuri and   
                 G. Fortino and   
                 R. Gravina and   
                    P. Pace and   
                   W. Russo and   
                    C. Savaglio   Enabling IoT interoperability through
                                  opportunistic smartphone-based mobile
                                  gateways . . . . . . . . . . . . . . . . 74--84
                  Pal Varga and   
          Fredrik Blomstedt and   
         Luis Lino Ferreira and   
              Jens Eliasson and   
             Mats Johansson and   
             Jerker Delsing and   
  Iker Martínez de Soria   Making system of systems interoperable
                                  --- The core components of the arrowhead
                                  framework  . . . . . . . . . . . . . . . 85--95
        Michael P. Andersen and   
                Gabe Fierro and   
                David E. Culler   Enabling synergy in IoT: Platform to
                                  service and beyond . . . . . . . . . . . 96--110
               Maria Ganzha and   
           Marcin Paprzycki and   
          Wieslaw Pawlowski and   
               Pawel Szmeja and   
          Katarzyna Wasielewska   Semantic interoperability in the
                                  Internet of Things: an overview from the
                                  INTER-IoT perspective  . . . . . . . . . 111--124
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 82, Number ??, March 15, 2017

          R. Asorey-Cacheda and   
       A.-J. Garcia-Sanchez and   
          F. Garcia-Sanchez and   
                 J. Garcia-Haro   A survey on non-linear optimization
                                  problems in wireless sensor networks . . 1--20
         Gianluca Franchino and   
               Giorgio Buttazzo   A power-aware MAC layer protocol for
                                  real-time communication in wireless
                                  embedded systems . . . . . . . . . . . . 21--34
                  Liang Zhu and   
               Changqiao Xu and   
              Jianfeng Guan and   
                   Hongke Zhang   SEM--PPA: a semantical pattern and
                                  preference-aware service mining method
                                  for personalized point of interest
                                  recommendation . . . . . . . . . . . . . 35--46
Juan J. Pérez-Solano and   
        Santiago Felici-Castell   Improving time synchronization in
                                  Wireless Sensor Networks using Bayesian
                                  Inference  . . . . . . . . . . . . . . . 47--55
               Wenting Shen and   
                     Jia Yu and   
                    Hui Xia and   
               Hanlin Zhang and   
                 Xiuqing Lu and   
                       Rong Hao   Light-weight and privacy-preserving
                                  secure cloud auditing scheme for group
                                  users via the third party medium . . . . 56--64
                  Alaa Awad and   
                Amr Mohamed and   
  Carla-Fabiana Chiasserini and   
                  Tarek Elfouly   Distributed in-network processing and
                                  resource optimization over mobile-health
                                  systems  . . . . . . . . . . . . . . . . 65--76
                Hyunbum Kim and   
                 Heekuck Oh and   
           Paolo Bellavista and   
               Jalel Ben-Othman   Constructing event-driven partial
                                  barriers with resilience in wireless
                                  mobile sensor networks . . . . . . . . . 77--92
               Maryam Amiri and   
          Leyli Mohammad-Khanli   Survey on prediction models of
                                  applications for resources provisioning
                                  in cloud . . . . . . . . . . . . . . . . 93--113
                 Furui Zhan and   
                Nianmin Yao and   
                Zhenguo Gao and   
                    Guozhen Tan   A novel key generation method for
                                  wireless sensor networks based on system
                                  of equations . . . . . . . . . . . . . . 114--127
                  Hang Shen and   
               Guangwei Bai and   
                   Mei Yang and   
                  Zhonghui Wang   Protecting trajectory privacy: a
                                  user-centric analysis  . . . . . . . . . 128--139
             Sanjib K. Deka and   
               Nityananda Sarma   Opportunity prediction at MAC-layer
                                  sensing for ad-hoc cognitive radio
                                  networks . . . . . . . . . . . . . . . . 140--151
          Hamid Reza Arkian and   
           Abolfazl Diyanat and   
              Atefe Pourkhalili   MIST: Fog-based data analytics scheme
                                  with cost-efficient resource
                                  provisioning for IoT crowdsensing
                                  applications . . . . . . . . . . . . . . 152--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 83, Number ??, April 1, 2017

   Amir Rahimzadeh Ilkhechi and   
          Ibrahim Korpeoglu and   
    Ugur Güdükbay and   
         Özgür Ulusoy   PETAL: a fully distributed location
                                  service for wireless ad hoc networks . . 1--11
                Mengmeng Ge and   
                Jin B. Hong and   
            Walter Guttmann and   
                 Dong Seong Kim   A framework for automating security
                                  analysis of the Internet of Things . . . 12--27
           Mariluz Congosto and   
          Pablo Basanta-Val and   
         Luis Sanchez-Fernandez   T-Hoarder: a framework to process
                                  Twitter data streams . . . . . . . . . . 28--39
       Palvinder Singh Mann and   
                   Satvir Singh   Energy efficient clustering protocol
                                  based on improved metaheuristic in
                                  wireless sensor networks . . . . . . . . 40--52
                 Chang Ruan and   
               Jianxin Wang and   
              Wanchun Jiang and   
               Jiawei Huang and   
                 Geyong Min and   
                         Yi Pan   FSQCN: Fast and simple quantized
                                  congestion notification in data center
                                  Ethernet . . . . . . . . . . . . . . . . 53--62
                    Yue Qiu and   
                   Maode Ma and   
                     Xilei Wang   A proxy signature-based handover
                                  authentication scheme for LTE wireless
                                  networks . . . . . . . . . . . . . . . . 63--71
               Nadine Abbas and   
                 Hazem Hajj and   
                 Zaher Dawy and   
                Karim Jahed and   
             Sanaa Sharafeddine   An optimized approach to video traffic
                                  splitting in heterogeneous wireless
                                  networks with energy and QoE
                                  considerations . . . . . . . . . . . . . 72--88
                  Jun Huang and   
                  Liqian Xu and   
                 Qiang Duan and   
             Cong-cong Xing and   
               Jiangtao Luo and   
                        Shui Yu   Modeling and performance analysis for
                                  multimedia data flows scheduling in
                                  software defined networks  . . . . . . . 89--100
              Jonghoon Park and   
              Cheoleun Moon and   
                 Ikjun Yeom and   
                     Yusung Kim   Cardinality estimation using collective
                                  interference for large-scale RFID
                                  systems  . . . . . . . . . . . . . . . . 101--110
            Samira Chouikhi and   
            In\`es El Korbi and   
      Yacine Ghamri-Doudane and   
            Leila Azouz Saidane   Centralized connectivity restoration in
                                  multichannel wireless sensor networks    111--123
                   Anum Ali and   
             Ghalib A. Shah and   
       Muhammad Omer Farooq and   
                    Usman Ghani   Technologies and challenges in
                                  developing machine-to-machine
                                  applications: a survey . . . . . . . . . 124--139
                   Ada Gogu and   
                Dritan Nace and   
           Enrico Natalizio and   
                 Yacine Challal   Using dynamic programming to solve the
                                  Wireless Sensor Network Configuration
                                  Problem  . . . . . . . . . . . . . . . . 140--154
        Adel Nadjaran Toosi and   
                 Chenhao Qu and   
Marcos Dias de Assunção and   
                 Rajkumar Buyya   Renewable-aware geographical load
                                  balancing of web applications for
                                  sustainable data centers . . . . . . . . 155--168
             Zina Chkirbene and   
               Sebti Foufou and   
               Ridha Hamila and   
                 Zahir Tari and   
               Albert Y. Zomaya   LaCoDa: Layered connected topology for
                                  massive data centers . . . . . . . . . . 169--180
         Abderrazak Abdaoui and   
          Tarek M. El Fouly and   
               Mohamed H. Ahmed   Impact of time synchronization error on
                                  the mode-shape identification and damage
                                  detection/localization in WSNs for
                                  structural health monitoring . . . . . . 181--189
       Israel Leyva-Mayorga and   
                 Vicent Pla and   
      Jorge Martinez-Bauset and   
        Mario E. Rivero-Angeles   A hybrid method for the QoS analysis and
                                  parameter optimization in time-critical
                                  random access wireless sensor networks   190--203
               Yunchuan Sun and   
                  Xinpei Yu and   
               Rongfang Bie and   
                   Houbing Song   Discovering time-dependent shortest path
                                  on traffic graph for drivers towards
                                  green driving  . . . . . . . . . . . . . 204--212
                     Yu Liu and   
             Changjie Zhang and   
                      Bo Li and   
                    Jianwei Niu   DeMS: a hybrid scheme of task scheduling
                                  and load balancing in computing clusters 213--220
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 84, Number ??, April 15, 2017

                 Neenu Garg and   
                     Seema Bawa   RITS--MHT: Relative indexed and time
                                  stamped Merkle hash tree based data
                                  auditing protocol for cloud computing    1--13
               Ingrid Nunes and   
        Frederico Schardong and   
        Alberto Schaeffer-Filho   BDI2DoS: an application using
                                  collaborating BDI agents to combat DDoS
                                  attacks  . . . . . . . . . . . . . . . . 14--24
Bruno Bogaz Zarpelão and   
      Rodrigo Sanches Miani and   
Cláudio Toshio Kawakani and   
     Sean Carlisto de Alvarenga   A survey of intrusion detection in
                                  Internet of Things . . . . . . . . . . . 25--37
      Muhammad Baqer Mollah and   
        Md. Abul Kalam Azad and   
           Athanasios Vasilakos   Security and privacy challenges in
                                  mobile cloud computing: Survey and way
                                  ahead  . . . . . . . . . . . . . . . . . 38--54
         Gürkan Solmaz and   
                   Damla Turgut   Tracking pedestrians and emergent events
                                  in disaster areas  . . . . . . . . . . . 55--67
            Mahfuzur Rahman and   
                   Peter Graham   Compatibility-based static VM placement
                                  minimizing interference  . . . . . . . . 68--81
       Babak Pourpeighambar and   
              Mehdi Dehghan and   
                  Masoud Sabaei   Multi-agent learning based routing for
                                  delay minimization in Cognitive Radio
                                  Networks . . . . . . . . . . . . . . . . 82--92
                Imad Jawhar and   
              Nader Mohamed and   
         Jameela Al-Jaroodi and   
          Dharma P. Agrawal and   
                    Sheng Zhang   Communication and networking of
                                  UAV-based systems: Classification and
                                  associated architectures . . . . . . . . 93--108
       Mohammed I. Alghamdi and   
               Xunfei Jiang and   
                   Ji Zhang and   
                 Jifu Zhang and   
              Minghua Jiang and   
                       Xiao Qin   Towards two-phase scheduling of
                                  real-time applications in distributed
                                  systems  . . . . . . . . . . . . . . . . 109--117
                Binglei Guo and   
                   Jiong Yu and   
                   Bin Liao and   
                Dexian Yang and   
                       Liang Lu   A green framework for DBMS based on
                                  energy-aware query optimization and
                                  energy-efficient query processing  . . . 118--130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 85, Number ??, May 1, 2017

              Chun-Wei Tsai and   
             Priyanka Rawat and   
               Ming-Chao Chiang   Intelligent systems for heterogeneous
                                  networks . . . . . . . . . . . . . . . . 1--3
                 Heejun Roh and   
            Cheoulhoon Jung and   
               Kyunghwi Kim and   
              Sangheon Pack and   
                     Wonjun Lee   Joint flow and virtual machine placement
                                  in hybrid cloud data centers . . . . . . 4--13
             Bart Spinnewyn and   
               Ruben Mennes and   
         Juan Felipe Botero and   
            Steven Latré   Resilient application placement for
                                  geo-distributed cloud networks . . . . . 14--31
                S. Kirthica and   
              Rajeswari Sridhar   CIT: a Cloud Inter-operation Toolkit to
                                  enhance elasticity and tolerate shut
                                  down of external clouds  . . . . . . . . 32--46
                  Aiqin Hou and   
                Chase Q. Wu and   
                Dingyi Fang and   
             Yongqiang Wang and   
                      Meng Wang   Bandwidth scheduling for big data
                                  transfer using multiple fixed
                                  node-disjoint paths  . . . . . . . . . . 47--55
              Jianfeng Guan and   
                 Zhiwei Yan and   
                     Su Yao and   
               Changqiao Xu and   
                   Hongke Zhang   GBC-based caching function group
                                  selection algorithm for SINET  . . . . . 56--63
               Guangjie Han and   
               Chenyu Zhang and   
              Jinfang Jiang and   
                  Xuan Yang and   
                 Mohsen Guizani   Mobile anchor nodes path planning
                                  algorithms using network-density-based
                                  clustering in wireless sensor networks   64--75
               Junfeng Wang and   
                Yiming Miao and   
                  Ping Zhou and   
          M. Shamim Hossain and   
           Sk Md Mizanur Rahman   A software defined network routing in
                                  wireless multihop network  . . . . . . . 76--83
           Samir S. Soliman and   
                  Bongyong Song   Fifth generation (5G) cellular and the
                                  network for tomorrow: cognitive and
                                  cooperative approach for energy savings  84--93
              Vishal Sharma and   
      Kathiravan Srinivasan and   
             Han-Chieh Chao and   
               Kai-Lung Hua and   
                Wen-Huang Cheng   Intelligent deployment of UAVs in 5G
                                  heterogeneous communication environment
                                  for improved coverage  . . . . . . . . . 94--105
           Chih-Cheng Tseng and   
          Hwang--Cheng Wang and   
             Kuo-Chang Ting and   
            Chih-Chieh Wang and   
                 Fang-Chang Kuo   Fast game-based handoff mechanism with
                                  load balancing for LTE/LTE-A
                                  heterogeneous networks . . . . . . . . . 106--115
                  Chen Chen and   
                    Tie Qiu and   
                   Jinna Hu and   
                Zhiyuan Ren and   
                  Yang Zhou and   
            Arun Kumar Sangaiah   A congestion avoidance game for
                                  information exchange on intersections in
                                  heterogeneous vehicular networks . . . . 116--126
                  Haneul Ko and   
              Sangheon Pack and   
             Jong-Hyouk Lee and   
             Alexandru Petrescu   DLM: Delayed Location Management in
                                  network mobility (NEMO)-based public
                                  transportation systems . . . . . . . . . 127--133
               Hyun-Ho Choi and   
                  Jung-Ryun Lee   A flocking-inspired algorithm for fair
                                  resource allocation in vehicle-mounted
                                  mobile relays  . . . . . . . . . . . . . 134--142
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 86, Number ??, May 15, 2017

                  Zheng Yan and   
                    Jun Liu and   
               Laurence T. Yang   Special issue on pervasive social
                                  networking . . . . . . . . . . . . . . . 1--2
                  Chang Liu and   
               Liehuang Zhu and   
                    Jinjun Chen   Efficient searchable symmetric
                                  encryption for storing multiple source
                                  dynamic social data on cloud . . . . . . 3--14
                    Feng Lu and   
              Weikang Zhang and   
                 Liwen Shao and   
               Xunfei Jiang and   
                    Peng Xu and   
                        Hai Jin   Scalable influence maximization under
                                  independent cascade model  . . . . . . . 15--23
               Darren Quick and   
         Kim-Kwang Raymond Choo   Pervasive social networking forensics:
                                  Intelligence and evidence from mobile
                                  device extracts  . . . . . . . . . . . . 24--33
                   Gang Sun and   
                  Yuxia Xie and   
                   Dan Liao and   
                Hongfang Yu and   
                   Victor Chang   User-defined privacy location-sharing
                                  system in mobile online social networks  34--45
                  Zheng Yan and   
                   Wangyang Shi   CloudFile: a cloud data access control
                                  system based on mobile social trust  . . 46--58
                Wenyin Yang and   
                Guojun Wang and   
    Md Zakirul Alam Bhuiyan and   
         Kim-Kwang Raymond Choo   Hypergraph partitioning for social
                                  networks based on information entropy
                                  modularity . . . . . . . . . . . . . . . 59--71
                  Yue Zhang and   
                   Bin Song and   
                     Peng Zhang   Social behavior study under pervasive
                                  social networking based on decentralized
                                  deep reinforcement learning  . . . . . . 72--81
                Zufan Zhang and   
                 Lisha Wang and   
                    Dan Liu and   
                       Yu Zhang   Peer discovery for D2D communications
                                  based on social attribute and service
                                  attribute  . . . . . . . . . . . . . . . 82--91
                Yadong Zhou and   
               Beibei Zhang and   
               Xiaoxiao Sun and   
              Qinghua Zheng and   
                       Ting Liu   Analyzing and modeling dynamics of
                                  information diffusion in microblogging
                                  social network . . . . . . . . . . . . . 92--102
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 87, Number ??, June 1, 2017

           Mohammad Masdari and   
            Safiyyeh Ahmadzadeh   A survey and taxonomy of the
                                  authentication schemes in Telecare
                                  Medicine Information Systems . . . . . . 1--19
                 Bing Xiong and   
                   Kun Yang and   
               Jinyuan Zhao and   
                       Keqin Li   Robust dynamic network traffic
                                  partitioning against malicious attacks   20--31
    Franciscus X. A. Wibowo and   
            Mark A. Gregory and   
            Khandakar Ahmed and   
                Karina M. Gomez   Multi-domain Software Defined
                                  Networking: Research status and
                                  challenges . . . . . . . . . . . . . . . 32--45
                  Ping Song and   
                     Yi Liu and   
                    Chi Liu and   
                     Depei Qian   ParaFlow: Fine-grained parallel SDN
                                  controller for large-scale networks  . . 46--59
                 Sisi Xiong and   
                 Yanjun Yao and   
              Michael Berry and   
                 Hairong Qi and   
                       Qing Cao   Frequent traffic flow identification
                                  through probabilistic Bloom filter and
                                  its GPU-based acceleration . . . . . . . 60--72
         Rodolfo S. Antunes and   
         Matheus B. Lehmann and   
        Rodrigo B. Mansilha and   
         Luciano P. Gaspary and   
           Marinho P. Barcellos   NDNrel: a mechanism based on relations
                                  among objects to improve the performance
                                  of NDN . . . . . . . . . . . . . . . . . 73--86
             B. Ducourthial and   
                S. Mottelet and   
                      A. Busson   Improving fairness between close Wi-Fi
                                  access points  . . . . . . . . . . . . . 87--99
                 Chunlin Li and   
                 Jing Zhang and   
                    Youlong Luo   Real-time scheduling based on optimized
                                  topology and communication traffic in
                                  distributed real-time computation
                                  platform of storm  . . . . . . . . . . . 100--115
      Muhammad Faran Majeed and   
          Matthew N. Dailey and   
                  Riaz Khan and   
                  Apinun Tunpan   Pre-caching: a proactive scheme for
                                  caching video traffic in named data mesh
                                  networks . . . . . . . . . . . . . . . . 116--130
     Reza Farrahi Moghaddam and   
              Vahid Asghari and   
Fereydoun Farrahi Moghaddam and   
               Yves Lemieux and   
                Mohamed Cheriet   A Monte-Carlo approach to lifespan
                                  failure performance analysis of the
                                  network fabric in modular data centers   131--146
               Saeed Kargar and   
          Leyli Mohammad-Khanli   Fractal: an advanced multidimensional
                                  range query lookup protocol on nested
                                  rings for distributed systems  . . . . . 147--168
                Animesh Roy and   
                Soumit Bose and   
           Tamaghna Acharya and   
                   Sipra DasBit   Social-based energy-aware multicasting
                                  in delay tolerant networks . . . . . . . 169--184
                  W. Haider and   
                      J. Hu and   
                    J. Slay and   
             B. P. Turnbull and   
                         Y. Xie   Generating realistic intrusion detection
                                  system dataset based on fuzzy
                                  qualitative modeling . . . . . . . . . . 185--192
         David Nuñez and   
                Isaac Agudo and   
                   Javier Lopez   Proxy Re-Encryption: Analysis of
                                  constructions and its application to
                                  secure access delegation . . . . . . . . 193--209
                   Peng Liu and   
                    Biao Xu and   
                 Guojun Dai and   
                 Zhen Jiang and   
                         Jie Wu   MDP: Minimum delay hot-spot parking  . . 210--222
                 I. B. Arun and   
                T. G. Venkatesh   Design and performance analysis of a MAC
                                  protocol for wireless LANs supporting
                                  multipacket reception  . . . . . . . . . 223--236
           Mohammed Atiquzzaman   Editorial: New Editors 2017  . . . . . . A1--A5
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 88, Number ??, June 15, 2017

               De-gan Zhang and   
                     Si Liu and   
                 Ting Zhang and   
                     Zhao Liang   Novel unequal clustering routing
                                  protocol considering energy balancing
                                  based on network partition & distance for
                                  mobile education . . . . . . . . . . . . 1--9
      Fadele Ayotunde Alaba and   
             Mazliza Othman and   
Ibrahim Abaker Targio Hashem and   
                  Faiz Alotaibi   Internet of Things security: a survey    10--28
         Melchizedek Alipio and   
      Nestor Michael Tiglao and   
              Antonio Grilo and   
              Fawaz Bokhari and   
             Umair Chaudhry and   
                 Shavez Qureshi   Cache-based transport protocols in
                                  wireless sensor networks: a survey and
                                  future directions  . . . . . . . . . . . 29--49
  Einollah Jafarnejad Ghomi and   
        Amir Masoud Rahmani and   
         Nooruldeen Nasih Qader   Load-balancing algorithms in cloud
                                  computing: a survey  . . . . . . . . . . 50--71
             Ahmed I. Saleh and   
        Khaled M. Abo-Al-Ez and   
              Ahmed A. Abdullah   A Multi-Aware Query Driven (MAQD)
                                  routing protocol for mobile wireless
                                  sensor networks based on neuro-fuzzy
                                  inference  . . . . . . . . . . . . . . . 72--98
                Sumair Khan and   
                Babar Nazir and   
        Iftikhar Ahmed Khan and   
   Shahaboddin Shamshirband and   
        Anthony T. Chronopoulos   Load balancing in grid computing:
                                  Taxonomy, trends and opportunities . . . 99--111
                 Eunsam Kim and   
             Jonathan C. L. Liu   An integrated prefetching/caching scheme
                                  in multimedia servers  . . . . . . . . . 112--123
                 Ruiying Li and   
                  Meinan Li and   
                Haitao Liao and   
                     Ning Huang   An efficient method for evaluating the
                                  end-to-end transmission time reliability
                                  of a switched Ethernet . . . . . . . . . 124--133
               Carlos Abreu and   
          Francisco Miranda and   
                   P. M. Mendes   Smart context-aware QoS-based admission
                                  control for biomedical wireless sensor
                                  networks . . . . . . . . . . . . . . . . 134--145
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 89, Number ??, July 1, 2017

               Victor Chang and   
             Verena Kantere and   
             Muthu Ramanchadran   Emerging services for Internet of Things 1--2
                   Gang Sun and   
               Victor Chang and   
         Muthu Ramachandran and   
                  Zhili Sun and   
                 Gangmin Li and   
                Hongfang Yu and   
                       Dan Liao   Efficient location privacy algorithm for
                                  Internet of Things (IoT) services and
                                  applications . . . . . . . . . . . . . . 3--13
      Faisal Fayyaz Qureshi and   
                Rahat Iqbal and   
         Muhammad Nabeel Asghar   Energy efficient wireless communication
                                  technique based on Cognitive Radio for
                                  Internet of Things . . . . . . . . . . . 14--25
                  Yang Yang and   
             Xianghan Zheng and   
                  Chunming Tang   Lightweight distributed secure data
                                  management system for health Internet of
                                  Things . . . . . . . . . . . . . . . . . 26--37
        Muneer Bani Yassein and   
           Shadi Aljawarneh and   
                Esra'a Masa'deh   A new elastic trickle timer algorithm
                                  for Internet of Things . . . . . . . . . 38--47
                  Chen Chen and   
               Honghui Zhao and   
                    Tie Qiu and   
               Mingcheng Hu and   
                    Hui Han and   
                    Zhiyuan Ren   An efficient power saving polling scheme
                                  in the Internet of Energy  . . . . . . . 48--61
              Pradeep Kumar and   
             Rajkumar Saini and   
          Partha Pratim Roy and   
              Debi Prosad Dogra   A bio-signal based framework to secure
                                  mobile devices . . . . . . . . . . . . . 62--71
                     Fan Wu and   
                    Lili Xu and   
                Saru Kumari and   
                   Xiong Li and   
                  Jian Shen and   
     Kim-Kwang Raymond Choo and   
             Mohammad Wazid and   
                Ashok Kumar Das   An efficient authentication and key
                                  agreement scheme for multi-gateway
                                  wireless sensor networks in IoT
                                  deployment . . . . . . . . . . . . . . . 72--85
                 Cong Zhang and   
              Chin-Feng Lai and   
              Ying-Hsun Lai and   
                Zhen-Wei Wu and   
                 Han-Chieh Chao   An inferential real-time falling posture
                                  reconstruction for Internet of
                                  Healthcare Things  . . . . . . . . . . . 86--95
                 Thar Baker and   
              Muhammad Asim and   
              Hissam Tawfik and   
           Bandar Aldawsari and   
                 Rajkumar Buyya   An energy-aware service composition
                                  algorithm for multiple cloud-based IoT
                                  applications . . . . . . . . . . . . . . 96--108
             Md Fasiul Alam and   
          Serafeim Katsikas and   
           Olga Beltramello and   
       Stathes Hadjiefthymiades   Augmented and virtual reality based
                                  monitoring and safety system: a
                                  prototype IoT platform . . . . . . . . . 109--119
          Xuan Thang Nguyen and   
               Huu Tam Tran and   
               Harun Baraki and   
                     Kurt Geihs   Optimization of non-functional
                                  properties in Internet of Things
                                  applications . . . . . . . . . . . . . . 120--129
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 90, Number ??, July 15, 2017

    Cristian Cleder Machado and   
   Juliano Araujo Wickboldt and   
Lisandro Zambenedetti Granville and   
        Alberto Schaeffer-Filho   ARKHAM: an Advanced Refinement toolkit
                                  for Handling Service Level Agreements in
                                  Software-Defined Networking  . . . . . . 1--16
            Ahmad H. Dehwah and   
      Shahrazed Elmetennani and   
              Christian Claudel   UD-WCMA: an energy estimation and
                                  forecast scheme for solar powered
                                  wireless sensor networks . . . . . . . . 17--25
        Thiago P. B. Vieira and   
   Danilo F. Tenório and   
João Paulo C. L. da Costa and   
       Edison P. de Freitas and   
         Giovanni Del Galdo and   
Rafael T. de Sousa Júnior   Model order selection and eigen
                                  similarity based framework for detection
                                  and identification of network attacks    26--41
               Javad Zarrin and   
              Rui L. Aguiar and   
      João Paulo Barraca   HARD: Hybrid Adaptive Resource Discovery
                                  for Jungle Computing . . . . . . . . . . 42--73
              Ju Hyoung Mun and   
                    Hyesook Lim   Cache sharing using bloom filters in
                                  named data networking  . . . . . . . . . 74--82
                  Tin-Yu Wu and   
              Nadra Guizani and   
               Jhih-Siang Huang   Live migration improvements by related
                                  dirty memory prediction in cloud
                                  computing  . . . . . . . . . . . . . . . 83--89
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 91, Number ??, August 1, 2017

                  Erwin Adi and   
                Zubair Baig and   
                Philip Hingston   Stealthy Denial of Service (DoS) attack
                                  modelling and detection for HTTP/2
                                  services . . . . . . . . . . . . . . . . 1--13
              Trung V. Phan and   
            Nguyen Khac Bao and   
                     Minho Park   Distributed-SOM: a novel performance
                                  bottleneck handler for large-sized
                                  software-defined networks under flooding
                                  attacks  . . . . . . . . . . . . . . . . 14--25
                Shigen Shen and   
                 Haiping Ma and   
                     En Fan and   
                    Keli Hu and   
                    Shui Yu and   
                Jianhua Liu and   
                     Qiying Cao   A non-cooperative non-zero-sum
                                  game-based dependability assessment of
                                  heterogeneous WSNs with malware
                                  diffusion  . . . . . . . . . . . . . . . 26--35
           Mohammad Masdari and   
        Safiyyeh Ahmadzadeh and   
                  Moazam Bidaki   Key management in wireless Body Area
                                  Network: Challenges and issues . . . . . 36--51
            Vireshwar Kumar and   
      Jung-Min (Jerry) Park and   
                    Kaigui Bian   Transmitter authentication using
                                  hierarchical modulation in dynamic
                                  spectrum sharing . . . . . . . . . . . . 52--60
            Souad Ghazouani and   
                  Yahya Slimani   A survey on cloud service description    61--74
                 Jing Zhang and   
                      Li Xu and   
               Shuming Zhou and   
                 Geyong Min and   
                 Yang Xiang and   
                         Jia Hu   Crossed Cube Ring: a $k$-connected
                                  virtual backbone for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 75--88
      Malik Muhammad Qirtas and   
               Yasir Faheem and   
        Mubashir Husain Rehmani   Throwboxes in delay tolerant networks: a
                                  survey of placement strategies,
                                  buffering capacity, and mobility models  89--103
           Angelos Michalas and   
             Aggeliki Sgora and   
          Dimitrios D. Vergados   An integrated MIH-FPMIPv6 mobility
                                  management approach for evolved-packet
                                  system architectures . . . . . . . . . . 104--119
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 92, Number ??, August 15, 2017

             Sabu M. Thampi and   
         Jaime Lloret Mauri and   
                     Robin Doss   Special issue on Underwater Acoustic
                                  Sensor Networks: Emerging trends and
                                  current perspectives . . . . . . . . . . 1--2
          Sarang C. Dhongdi and   
              Pritish Nahar and   
        Rishabh Sethunathan and   
             Lucy J. Gudino and   
                  K. R. Anupama   Cross-layer protocol stack development
                                  for three-dimensional underwater
                                  Acoustic Sensor Network  . . . . . . . . 3--19
               Priyatosh Mandal   Performance comparison of TDMA variants
                                  for underwater acoustic sensor networks  20--30
              Nadeem Javaid and   
             Sheraz Hussain and   
               Ashfaq Ahmad and   
             Muhammad Imran and   
                  Abid Khan and   
                 Mohsen Guizani   Region based cooperative routing in
                                  underwater wireless sensor networks  . . 31--41
                Shalli Rani and   
          Syed Hassan Ahmed and   
          Jyoteesh Malhotra and   
                Rajneesh Talwar   Energy efficient chain based routing
                                  protocol for underwater wireless sensor
                                  networks . . . . . . . . . . . . . . . . 42--50
               Guangjie Han and   
                     Li Liu and   
                     Na Bao and   
              Jinfang Jiang and   
                Wenbo Zhang and   
        Joel J. P. C. Rodrigues   AREP: an asymmetric link-based reverse
                                  routing protocol for underwater acoustic
                                  sensor networks  . . . . . . . . . . . . 51--58
              Jingjing Wang and   
                    Wei Shi and   
                 Lingwei Xu and   
                  Liya Zhou and   
                  Qiuna Niu and   
                         Ju liu   Design of optical-acoustic hybrid
                                  underwater wireless sensor network . . . 59--67
                Weifeng Sun and   
                   Chi Zhou and   
                    Tie Qiu and   
                     Yuqing Liu   An efficient communication scheme for
                                  solving merge conflicts in maritime
                                  transportation . . . . . . . . . . . . . 68--76
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 93, Number ??, September 1, 2017

          Mustapha Boushaba and   
           Abdelhakim Hafid and   
                Michel Gendreau   Node stability-based routing in Wireless
                                  Mesh Networks  . . . . . . . . . . . . . 1--12
               Albert Sunny and   
         Sumankumar Panchal and   
             Nikhil Vidhani and   
     Subhashini Krishnasamy and   
             S. V. R. Anand and   
               Malati Hegde and   
                   Joy Kuri and   
                   Anurag Kumar   A generic controller for managing TCP
                                  transfers in IEEE 802.11 infrastructure
                                  WLANs  . . . . . . . . . . . . . . . . . 13--26
            Chi-Sheng Huang and   
             Meng-Feng Tsai and   
             Po-Hsuan Huang and   
                 Li-Ding Su and   
                 Kuei-Sheng Lee   Distributed asteroid discovery system
                                  for large astronomical data  . . . . . . 27--37
                Farid Lalem and   
          Ahc\`ene Bounceur and   
              Madani Bezoui and   
          Massinissa Saoudi and   
            Reinhardt Euler and   
              Tahar Kechadi and   
                    Marc Sevaux   LPCN: Least polar-angle connected node
                                  algorithm to find a polygon hull in a
                                  connected Euclidean graph  . . . . . . . 38--50
                   M. Ahmad and   
                    M. Azam and   
                   M. Naeem and   
                   M. Iqbal and   
               A. Anpalagan and   
                      M. Haneef   Resource management in D2D
                                  communication: an optimization
                                  perspective  . . . . . . . . . . . . . . 51--75
                 Chaofan Ma and   
                  Wei Liang and   
                     Meng Zheng   Delay constrained relay node placement
                                  in two-tiered wireless sensor networks:
                                  a set-covering-based algorithm . . . . . 76--90
               Jeyasekar A. and   
          Kasmir Raja S. V. and   
                 Annie Uthra R.   Congestion avoidance algorithm using
                                  ARIMA(2,1,1) model-based RTT estimation
                                  and RSS in heterogeneous wired-wireless
                                  networks . . . . . . . . . . . . . . . . 91--109
              Chengming Luo and   
                     Wei Li and   
                 Xinnan Fan and   
                   Hai Yang and   
                 Jianjun Ni and   
                Xuewu Zhang and   
                Gaifang Xin and   
                    Pengfei Shi   Positioning technology of mobile vehicle
                                  using self-repairing heterogeneous
                                  sensor networks  . . . . . . . . . . . . 110--122
                    Chao Bu and   
               Xingwei Wang and   
                  Hui Cheng and   
                  Min Huang and   
                   Keqin Li and   
                   Sajal K. Das   Enabling Adaptive Routing Service
                                  Customization via the integration of SDN
                                  and NFV  . . . . . . . . . . . . . . . . 123--136
                   Sugi Lee and   
              Younghoon Kim and   
                 Ikjun Yeom and   
                     Yusung Kim   Active request management in stateful
                                  forwarding networks  . . . . . . . . . . 137--149
            Mohammad Sharif and   
     Abolghasem Sadeghi-Niaraki   Ubiquitous sensor network simulation and
                                  emulation environments: a survey . . . . 150--181
        Pieter-Jan Maenhaut and   
              Hendrik Moens and   
            Bruno Volckaert and   
             Veerle Ongenae and   
                 Filip De Turck   A dynamic Tenant-Defined Storage system
                                  for efficient resource management in
                                  cloud applications . . . . . . . . . . . 182--196
                      Bo Yi and   
               Xingwei Wang and   
                      Min Huang   Design and evaluation of schemes for
                                  provisioning service function chain with
                                  function scalability . . . . . . . . . . 197--214
              Yao-Chung Fan and   
                  Huan Chen and   
               Fang-Yie Leu and   
                      Ilsun You   Enabling in-network aggregation by
                                  diffusion units for urban scale M2M
                                  networks . . . . . . . . . . . . . . . . 215--227
             Akiya Kamimura and   
                   Kohji Tomita   A self-organizing network coordination
                                  framework enabling collision-free and
                                  congestion-less wireless sensor networks 228--244
         Muhammad Asif Khan and   
                Wael Cherif and   
               Fethi Filali and   
                   Ridha Hamila   Wi-Fi Direct Research --- Current Status
                                  and Future Perspectives  . . . . . . . . 245--258
               Shahid Anwar and   
              Zakira Inayat and   
     Mohamad Fadli Zolkipli and   
         Jasni Mohamad Zain and   
              Abdullah Gani and   
           Nor Badrul Anuar and   
      Muhammad Khurram Khan and   
                   Victor Chang   Cross-VM cache-based side channel
                                  attacks and proposed prevention
                                  mechanisms: a survey . . . . . . . . . . 259--279
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 94, Number ??, September 15, 2017

               Reza Ghebleh and   
                   Ali Ghaffari   Retracted: A Comprehensive survey on 5G:
                                  the prospect of future communications    1--32
                    Bin Dai and   
                    Guan Xu and   
            Bengxiong Huang and   
                   Peng Qin and   
                        Yang Xu   Enabling network innovation in data
                                  center networks with software defined
                                  networking: a survey . . . . . . . . . . 33--49
               Faheem Zafar and   
                  Abid Khan and   
                Saba Suhail and   
               Idrees Ahmed and   
              Khizar Hameed and   
        Hayat Mohammad Khan and   
             Farhana Jabeen and   
                    Adeel Anjum   Trustworthy data: a survey, taxonomy and
                                  future trends of secure provenance
                                  schemes  . . . . . . . . . . . . . . . . 50--68
                Arijit Nath and   
               Nityananda Sarma   A distributed solution for cooperative
                                  spectrum sensing scheduling in
                                  multi-band cognitive radio networks  . . 69--77
         Stefano Petrangeli and   
                 Tingyao Wu and   
                Tim Wauters and   
           Rafael Huysegems and   
                Tom Bostoen and   
                 Filip De Turck   A machine learning-based framework for
                                  preventing video freezes in HTTP
                                  adaptive streaming . . . . . . . . . . . 78--92
              Warley Junior and   
      Adriano França and   
                Kelvin Dias and   
        José N. de Souza   Supporting mobility-aware computational
                                  offloading in mobile cloud environment   93--108
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 95, Number ??, October 1, 2017

                Waqas Rehan and   
             Stefan Fischer and   
                 Maaz Rehan and   
        Mubashir Husain Rehmani   A comprehensive survey on multichannel
                                  routing in wireless sensor networks  . . 1--25
  Mohammad Sadegh Aslanpour and   
      Mostafa Ghobaei-Arani and   
            Adel Nadjaran Toosi   Auto-scaling web applications in clouds:
                                  a cost-aware approach  . . . . . . . . . 26--41
            Antonio Marotta and   
                Enrica Zola and   
     Fabio D'Andreagiovanni and   
                Andreas Kassler   A fast robust optimization-based
                                  heuristic for the deployment of green
                                  virtual network functions  . . . . . . . 42--53
              Garima Chopra and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A survey on ultra-dense network and
                                  emerging technologies: Security
                                  challenges and possible solutions  . . . 54--78
             Leonard Heilig and   
             Rajkumar Buyya and   
               Stefan Voß   Location-aware brokering for consumers
                                  in multi-cloud computing environments    79--93
            Daniel Yokoyama and   
              Bruno Schulze and   
              Henrique Kloh and   
            Matheus Bandini and   
                  Vinod Rebello   Affinity aware scheduling model of
                                  cluster nodes in private clouds  . . . . 94--104
                Tingwei Zhu and   
                   Dan Feng and   
                  Fang Wang and   
                     Yu Hua and   
                 Qingyu Shi and   
                 Yanwen Xie and   
                       Yong Wan   A congestion-aware and robust multicast
                                  protocol in SDN-based data center
                                  networks . . . . . . . . . . . . . . . . 105--117
           Mohammed Atiquzzaman   Editorial: 2016 Best Paper Awards  . . . A1--A4
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 96, Number ??, October 15, 2017

              Chih-Min Chao and   
              Yun-Ting Ling and   
               Cheng-Hong Jiang   Number of channels adjustment for
                                  cognitive radio networks . . . . . . . . 1--13
            M. De Benedetti and   
                  F. D'Urso and   
                 G. Fortino and   
                 F. Messina and   
              G. Pappalardo and   
                     C. Santoro   A fault-tolerant self-organizing
                                  flocking approach for UAV aerial survey  14--30
Amir Khorsandi Koohanestani and   
       Amin Ghalami Osgouei and   
              Hossein Saidi and   
                     Ali Fanian   An analytical model for delay bound of
                                  OpenFlow based SDN using network
                                  calculus . . . . . . . . . . . . . . . . 31--38
             Pimmy Gandotra and   
               Rakesh Kumar Jha   A survey on green communication and
                                  security challenges in 5G wireless
                                  communication networks . . . . . . . . . 39--61
           Abolfazl Diyanat and   
             Ahmad Khonsari and   
                 Hosein Shafiei   Preservation of temporal privacy in body
                                  sensor networks  . . . . . . . . . . . . 62--71
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 97, Number ??, November 1, 2017

              Abdusy Syarif and   
       Abdelhafid Abouaissa and   
                  Pascal Lorenz   Operator calculus approach for route
                                  optimizing and enhancing wireless sensor
                                  network  . . . . . . . . . . . . . . . . 1--10
        Jorge Maestre Vidal and   
 Ana Lucila Sandoval Orozco and   
Luis Javier García Villalba   Alert correlation framework for malware
                                  detection by anomaly-based packet
                                  payload analysis . . . . . . . . . . . . 11--22
        Behrouz Pourghebleh and   
         Nima Jafari Navimipour   Data aggregation mechanisms in the
                                  Internet of things: a systematic review
                                  of the literature and recommendations
                                  for future research  . . . . . . . . . . 23--34
           Rekha Nachiappan and   
              Bahman Javadi and   
       Rodrigo N. Calheiros and   
               Kenan M. Matawie   Cloud storage reliability for Big Data
                                  applications: a state of the art survey  35--47
                Mussab Alaa and   
               A. A. Zaidan and   
               B. B. Zaidan and   
             Mohammed Talal and   
                  M. L. M. Kiah   A review of smart home applications
                                  based on Internet of Things  . . . . . . 48--65
               Suleman Khan and   
            Muhammad Shiraz and   
            Laleh Boroumand and   
              Abdullah Gani and   
          Muhammad Khurram Khan   Towards port-knocking authentication
                                  methods for mobile cloud computing . . . 66--78
              Vishal Sharma and   
                   Fei Song and   
                  Ilsun You and   
           Mohammed Atiquzzaman   Energy efficient device discovery for
                                  reliable communication in 5G-based IoT
                                  and BSNs using unmanned aerial vehicles  79--95
           Diego V. Queiroz and   
         Marcelo S. Alencar and   
              Ruan D. Gomes and   
        Iguatemi E. Fonseca and   
          Cesar Benavente-Peces   Survey and systematic mapping of
                                  industrial Wireless Sensor Networks  . . 96--125
               Satish Kumar and   
               Arnab Sarkar and   
                     Arijit Sur   A resource allocation framework for
                                  adaptive video streaming over LTE  . . . 126--139
         Stephen S. Oyewobi and   
              Gerhard P. Hancke   A survey of cognitive radio handoff
                                  schemes, challenges and issues for
                                  industrial wireless sensor networks
                                  (CR-IWSN)  . . . . . . . . . . . . . . . 140--156
           Shaufikah Shukri and   
      Latifah Munirah Kamarudin   Device free localization technology for
                                  human detection and counting with RF
                                  sensor networks: a review  . . . . . . . 157--174
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 98, Number ??, November 15, 2017

                Chaoyue Niu and   
               Minping Zhou and   
              Zhenzhe Zheng and   
                     Fan Wu and   
                    Guihai Chen   ERA: Towards privacy preservation and
                                  verifiability for online ad exchanges    1--10
          Hassan Jamil Syed and   
              Abdullah Gani and   
           Raja Wasim Ahmad and   
      Muhammad Khurram Khan and   
Abdelmuttlib Ibrahim Abdalla Ahmed   Cloud monitoring: a review, taxonomy,
                                  and open research issues . . . . . . . . 11--26
                 Pengfei Hu and   
            Sahraoui Dhelim and   
             Huansheng Ning and   
                        Tie Qiu   Survey on fog computing: architecture,
                                  key technologies, applications and open
                                  issues . . . . . . . . . . . . . . . . . 27--42
              Avnish Thakur and   
             Major Singh Goraya   A taxonomic survey on load balancing in
                                  cloud  . . . . . . . . . . . . . . . . . 43--57
             Hussein Khayou and   
                   Bakr Sarakbi   A validation model for non-lexical
                                  routing protocols  . . . . . . . . . . . 58--64
         Md Hasanul Ferdaus and   
             Manzur Murshed and   
       Rodrigo N. Calheiros and   
                 Rajkumar Buyya   An algorithm for network and data-aware
                                  placement of multi-tier applications in
                                  cloud data centers . . . . . . . . . . . 65--83
              Zakaria Gheid and   
             Yacine Challal and   
                     Xun Yi and   
             Abdelouahid Derhab   Efficient and privacy-aware multi-party
                                  classification protocol for human
                                  activity recognition . . . . . . . . . . 84--96
          Tarun Kulshrestha and   
               Divya Saxena and   
             Rajdeep Niyogi and   
        Vaskar Raychoudhury and   
                    Manoj Misra   SmartITS: Smartphone-based
                                  identification and tracking using
                                  seamless indoor-outdoor localization . . 97--113
              Surajit Basak and   
               Tamaghna Acharya   Cross layer optimization for outage
                                  minimizing routing in cognitive radio ad
                                  hoc networks with primary users' outage
                                  protection . . . . . . . . . . . . . . . 114--124
                Peiyan Yuan and   
              Mingyang Song and   
                   Xiaoyan Zhao   Effective and efficient collection of
                                  control messages for opportunistic
                                  routing algorithms . . . . . . . . . . . 125--130
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 99, Number ??, December 1, 2017

                YiPeng Wang and   
               Xiaochun Yun and   
            Yongzheng Zhang and   
                 Liwei Chen and   
                    Guangjun Wu   A nonparametric approach to the
                                  automated protocol fingerprint inference 1--9
              Gulshan Kumar and   
        Mritunjay Kumar Rai and   
                     Rahul Saha   Securing range free localization against
                                  wormhole attack using distance
                                  estimation and maximum likelihood
                                  estimation in Wireless Sensor Networks   10--16
         Luis Miguel Torres and   
      Eduardo Magaña and   
       Daniel Morató and   
    Santiago Garcia-Jimenez and   
                     Mikel Izal   TBDClust: Time-based density clustering
                                  to enable free browsing of sites in
                                  pay-per-use mobile Internet providers    17--27
                    Ying Qu and   
                   Bryan Ng and   
                  Michael Homer   A goodput distribution model for
                                  planning IEEE 802.11 WBNs in built
                                  environments . . . . . . . . . . . . . . 28--46
             Seokseong Jeon and   
              Jae-Pil Jeong and   
              Young-Joo Suh and   
                  Chansu Yu and   
                    Dongsoo Han   Selective AP probing for indoor
                                  positioning in a large and AP-dense
                                  environment  . . . . . . . . . . . . . . 47--57
Adrián Sánchez-Carmona and   
             Carlos Borrego and   
               Sergi Robles and   
 Gerard Garcia-Vandellós   Two birds, one stone: Using mobility
                                  behavioral profiles both as destinations
                                  and as a routing tool  . . . . . . . . . 58--72
           Fatima Tul Zuhra and   
    Kamalrulnizam Abu Bakar and   
                Adnan Ahmed and   
               Mohsin Ali Tunio   Routing protocols in wireless body
                                  sensor networks: a comprehensive survey  73--97
       Sarogini Grace Pease and   
             Paul P. Conway and   
                 Andrew A. West   Hybrid ToF and RSSI real-time semantic
                                  tracking with an adaptive industrial
                                  Internet of Things architecture  . . . . 98--109
                     Yu Xin and   
                 Ya-Di Wang and   
              Zhi-Qiang Xie and   
                      Jing Yang   A cooperative scheduling method based on
                                  the device load feedback for multiple
                                  tasks scheduling . . . . . . . . . . . . 110--119
   M. C. Lucas-Estañ and   
                    J. Gozalvez   Distributed radio resource allocation
                                  for device-to-device communications
                                  underlaying cellular networks  . . . . . 120--130
                    Indu I. and   
         Rubesh Anand P. M. and   
           Vidhyacharan Bhaskar   Encrypted token based authentication
                                  with adapted SAML technology for cloud
                                  web services . . . . . . . . . . . . . . 131--145
            Giulio Aliberti and   
          Roberto Di Pietro and   
                Stefano Guarino   Epidemic data survivability in
                                  Unattended Wireless Sensor Networks: New
                                  models and results . . . . . . . . . . . 146--165
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 100, Number ??, December 15, 2017

           Mohammed Atiquzzaman   100 Volumes of JNCA  . . . . . . . . . . iii--iv
                  Cong Wang and   
                   Maode Ma and   
                   Zenghua Zhao   Design of a novel dynamic trust model
                                  for spectrum management in WRANs of TV
                                  white space  . . . . . . . . . . . . . . 1--10
     A. B. M. Alim Al Islam and   
         Tusher Chakraborty and   
         Taslim Arefin Khan and   
              Mahabub Zoraf and   
         Chowdhury Sayeed Hyder   Towards defending eavesdropping on NFC   11--23
           Tassos Dimitriou and   
              Ioannis Krontiris   Privacy-respecting auctions and
                                  rewarding mechanisms in mobile
                                  crowd-sensing applications . . . . . . . 24--34
                    Sandhya and   
                 Yash Sinha and   
                    K. Haribabu   A survey: Hybrid SDN . . . . . . . . . . 35--55
  Iria Estévez-Ayres and   
 Jesús Arias Fisteus and   
           Carlos Delgado-Kloos   Lostrego: a distributed stream-based
                                  infrastructure for the real-time
                                  gathering and analysis of heterogeneous
                                  educational data . . . . . . . . . . . . 56--68
            Mohammed Hashem and   
          Shrief I. Barakat and   
            Mahmoud A. AttaAlla   Enhanced tree routing protocols for
                                  multi-hop and multi-channel cognitive
                                  radio network (EMM--TRP) . . . . . . . . 69--79
                Sidra Aslam and   
              Saif ul Islam and   
                  Abid Khan and   
              Mansoor Ahmed and   
           Adnan Akhundzada and   
          Muhammad Khurram Khan   Information collection centric
                                  techniques for cloud resource
                                  management: Taxonomy, analysis and
                                  challenges . . . . . . . . . . . . . . . 80--94
                      Anonymous   Editorial board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 101, Number ??, January 1, 2018

                      Anonymous   Thank You Reviewers  . . . . . . . . . . iii--ix
  Nanda Kumar Thanigaivelan and   
          Ethiopia Nigussie and   
              Antti Hakkala and   
             Seppo Virtanen and   
                   Jouni Isoaho   CoDRA: Context-based dynamically
                                  reconfigurable access control system for
                                  Android  . . . . . . . . . . . . . . . . 1--17
               Faheem Ullah and   
            Matthew Edwards and   
             Rajiv Ramdhany and   
          Ruzanna Chitchyan and   
               M. Ali Babar and   
                   Awais Rashid   Data exfiltration: a review of external
                                  attack vectors and countermeasures . . . 18--54
       Mohamed Amine Ferrag and   
          Leandros Maglaras and   
          Antonios Argyriou and   
         Dimitrios Kosmanos and   
                  Helge Janicke   Security for 4G and 5G cellular
                                  networks: a survey of existing
                                  authentication and privacy-preserving
                                  schemes  . . . . . . . . . . . . . . . . 55--82
                   Yao Shen and   
                   Wei Yang and   
                 Liusheng Huang   Concealed in web surfing: Behavior-based
                                  covert channels in HTTP  . . . . . . . . 83--95
              Philip Parsch and   
               Alejandro Masrur   On reliable communication in
                                  transmit-only networks for home
                                  automation . . . . . . . . . . . . . . . 96--110
                   Lei Wang and   
                Jianwei Niu and   
               Houbing Song and   
           Mohammed Atiquzzaman   SentiRelated: a cross-domain sentiment
                                  classification algorithm for short texts
                                  through sentiment related index  . . . . 111--119
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Journal of Network and Computer Applications
Volume 102, Number ??, January 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                    Jin Cao and   
                   Maode Ma and   
                     Hui Li and   
                  Yulong Fu and   
                    Xuefeng Liu   EGHR: Efficient group-based handover
                                  authentication protocols for mMTC in 5G
                                  wireless networks  . . . . . . . . . . . 1--16
                 Kumar Ravi and   
          Yogesh Khandelwal and   
        Boora Shiva Krishna and   
                 Vadlamani Ravi   Analytics in/for cloud --- an
                                  interdependence: a review  . . . . . . . 17--37
              Vishal Sharma and   
                  Ilsun You and   
               Fang-Yie Leu and   
           Mohammed Atiquzzaman   Secure and efficient protocol for fast
                                  handover in 5G mobile Xhaul networks . . 38--57
             Naina Emmanuel and   
                  Abid Khan and   
                Masoom Alam and   
               Tanveer Khan and   
          Muhammad Khurram Khan   Structures and data preserving
                                  homomorphic signatures . . . . . . . . . 58--70
                  Usama Mir and   
           Zeeshan Ahmed Bhatti   Time triggered handoff schemes in
                                  cognitive radio networks: a survey . . . 71--85


Journal of Network and Computer Applications
Volume 103, Number ??, February 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . i--i
Marcos Dias de Assunção and   
   Alexandre da Silva Veith and   
                 Rajkumar Buyya   Distributed data stream processing and
                                  edge computing: a survey on resource
                                  elasticity and future directions . . . . 1--17
                 Furui Zhan and   
                Nianmin Yao and   
                Zhenguo Gao and   
                      Haitao Yu   Efficient key generation leveraging
                                  wireless channel reciprocity for MANETs  18--28
                Haneet Kour and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   A comprehensive survey on spectrum
                                  sharing: Architecture, energy efficiency
                                  and security issues  . . . . . . . . . . 29--57
                Sadip Midya and   
                 Asmita Roy and   
           Koushik Majumder and   
               Santanu Phadikar   Multi-objective optimization technique
                                  for resource allocation and task
                                  scheduling in vehicular cloud
                                  architecture: a hybrid adaptive nature
                                  inspired approach  . . . . . . . . . . . 58--84
    Veerabhadra Rao Chandakanna   REHDFS: a random read/write enhanced
                                  HDFS . . . . . . . . . . . . . . . . . . 85--100
                 Yuan Zhang and   
                    Lin Cui and   
                   Wei Wang and   
                  Yuxiang Zhang   A survey on software defined networking
                                  with multiple controllers  . . . . . . . 101--118
               Laizhong Cui and   
               Huaixiong Hu and   
                    Shui Yu and   
                   Qiao Yan and   
                 Zhong Ming and   
                Zhenkun Wen and   
                         Nan Lu   DDSE: a novel evolutionary algorithm
                                  based on degree-descending search
                                  strategy for influence maximization in
                                  social networks  . . . . . . . . . . . . 119--130
             Giuseppe Aceto and   
           Domenico Ciuonzo and   
           Antonio Montieri and   
         Antonio Pescapé   Multi-classification approaches for
                                  classifying mobile app traffic . . . . . 131--145
                  Yan Huang and   
                Zhipeng Cai and   
               Anu G. Bourgeois   Search locations safely and accurately:
                                  a location privacy protection algorithm
                                  with accurate service  . . . . . . . . . 146--156
              Sameh Zakhary and   
          Abderrahim Benslimane   On location-privacy in opportunistic
                                  mobile networks, a survey  . . . . . . . 157--170
                Jungang Lou and   
             Yunliang Jiang and   
                  Qing Shen and   
                    Ruiqin Wang   Failure prediction by relevance vector
                                  regression with improved
                                  quantum-inspired gravitational search    171--177
                    Lu Zhou and   
              Quanlong Wang and   
                    Xin Sun and   
              Piotr Kulicki and   
          Arcangelo Castiglione   Quantum technique for access control in
                                  cloud computing II: Encryption and key
                                  distribution . . . . . . . . . . . . . . 178--184
             Changsong Yang and   
              Xiaofeng Chen and   
                     Yang Xiang   Blockchain-based publicly verifiable
                                  data deletion scheme for cloud storage   185--193
                   Xiong Li and   
                Jianwei Niu and   
                Saru Kumari and   
                     Fan Wu and   
        Arun Kumar Sangaiah and   
         Kim-Kwang Raymond Choo   A three-factor anonymous authentication
                                  scheme for wireless sensor networks in
                                  Internet of Things environments  . . . . 194--204
               Guangjie Han and   
                 Wenhui Que and   
               Gangyong Jia and   
                    Wenbo Zhang   Resource-utilization-aware energy
                                  efficient server consolidation algorithm
                                  for green computing in IIOT  . . . . . . 205--214
                Qinying Lin and   
               Houbing Song and   
                Xiaolin Gui and   
              Xiaoping Wang and   
                       Saiyu Su   A shortest path routing algorithm for
                                  unmanned aerial systems based on grid
                                  position . . . . . . . . . . . . . . . . 215--224
                    Bin Cao and   
               Jianwei Zhao and   
                  Zhihan Lv and   
                    Xin Liu and   
               Xinyuan Kang and   
                      Shan Yang   Deployment optimization for $3$D
                                  industrial wireless sensor networks
                                  based on particle swarm optimizers with
                                  distributed parallelism  . . . . . . . . 225--238
              Weishan Zhang and   
                Gaowa Wulan and   
                   Jia Zhai and   
                   Liang Xu and   
                 Dehai Zhao and   
                    Xin Liu and   
                    Su Yang and   
                    Jiehan Zhou   An intelligent power distribution
                                  service architecture using cloud
                                  computing and deep learning techniques   239--248
              Muzzamil Noor and   
               Haider Abbas and   
              Waleed Bin Shahid   Countering cyber threats for industrial
                                  applications: an automated approach for
                                  malware evasion detection and analysis   249--261
                   Keke Gai and   
                Meikang Qiu and   
                   Xiaotong Sun   A survey on FinTech  . . . . . . . . . . 262--273
                  Deze Zeng and   
               Shiyan Zhang and   
                     Lin Gu and   
                    Shui Yu and   
                    Zhangjie Fu   Quality-of-sensing aware budget
                                  constrained contaminant detection sensor
                                  deployment in water distribution system  274--279


Journal of Network and Computer Applications
Volume 104, Number ??, February 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Amrita Bose Paul and   
             Santosh Biswas and   
              Sukumar Nandi and   
             Sandip Chakraborty   MATEM: A unified framework based on
                                  trust and MCDM for assuring security,
                                  reliability and QoS in DTN routing . . . 1--20
               Mahdi Zareei and   
   A. K. M. Muzahidul Islam and   
       Cesar Vargas-Rosales and   
             Nafees Mansoor and   
          Shidrokh Goudarzi and   
        Mubashir Husain Rehmani   Mobility-aware medium access control
                                  protocols for wireless sensor networks:
                                  A survey . . . . . . . . . . . . . . . . 21--37
                    Shuo Yu and   
                Jiaying Liu and   
                  Zhuo Yang and   
                  Zhen Chen and   
              Huizhen Jiang and   
                  Amr Tolba and   
                       Feng Xia   PAVE: Personalized Academic Venue
                                  recommendation Exploiting co-publication
                                  networks . . . . . . . . . . . . . . . . 38--47
        Jai Sukh Paul Singh and   
            Mritunjay Kumar Rai   CROP: Cognitive radio ROuting Protocol
                                  for link quality channel diverse
                                  cognitive networks . . . . . . . . . . . 48--60
             Zainab AlSaeed and   
               Imtiaz Ahmad and   
               Iftekhar Hussain   Multicasting in software defined
                                  networks: A comprehensive survey . . . . 61--77
                Wenjie Ruan and   
              Quan Z. Sheng and   
                   Lina Yao and   
                     Xue Li and   
     Nickolas J. G. Falkner and   
                       Lei Yang   Device-free human localization and
                                  tracking with UHF passive RFID tags: A
                                  data-driven approach . . . . . . . . . . 78--96
                   Anmin Fu and   
                   Yuhan Li and   
                    Shui Yu and   
                     Yan Yu and   
                 Gongxuan Zhang   DIPOR: An IDA-based dynamic proof of
                                  retrievability scheme for cloud storage
                                  systems  . . . . . . . . . . . . . . . . 97--106
   Alejandro Cánovas and   
                 Miran Taha and   
               Jaime Lloret and   
      Jesús Tomás   Smart resource allocation for improving
                                  QoE in IP Multimedia Subsystems  . . . . 107--116
           Zeinab Rezaeifar and   
                  Jian Wang and   
                     Heekuck Oh   A trust-based method for mitigating
                                  cache poisoning in Name Data Networking  117--132
                 Ruhul Amin and   
        S. K. Hafizul Islam and   
               Neeraj Kumar and   
         Kim-Kwang Raymond Choo   An untraceable and anonymous password
                                  authentication protocol for
                                  heterogeneous wireless sensor networks   133--144


Journal of Network and Computer Applications
Volume 105, Number ??, March 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Mahmoud Bahnasy and   
             Halima Elbiaze and   
               Bochra Boughzala   Zero-queue Ethernet congestion control
                                  protocol based on available bandwidth
                                  estimation . . . . . . . . . . . . . . . 1--20
               Maryam Amiri and   
      Leyli Mohammad-Khanli and   
             Raffaela Mirandola   A sequential pattern mining model for
                                  application workload prediction in cloud
                                  environment  . . . . . . . . . . . . . . 21--62
                 Ivan Vidal and   
       Jaime Garcia-Reinoso and   
               Ignacio Soto and   
           Francisco Valera and   
                    Diego Lopez   SCoT: A secure content-oriented
                                  transport  . . . . . . . . . . . . . . . 63--78
  Naresh Kumar Reddy Beechu and   
Vasantha Moodabettu Harishchandra and   
Nithin Kumar Yernad Balachandra   An energy-efficient fault-aware core
                                  mapping in mesh-based network on chip
                                  systems  . . . . . . . . . . . . . . . . 79--87
               Jorge Blasco and   
             Thomas M. Chen and   
                Igor Muttik and   
              Markus Roggenbach   Detection of app collusion potential
                                  using logic programming  . . . . . . . . 88--104
                    Gao Liu and   
                  Zheng Yan and   
                 Witold Pedrycz   Data collection for attack detection and
                                  security measurement in Mobile Ad Hoc
                                  Networks: A survey . . . . . . . . . . . 105--122
           André Naz and   
          Beno\^\it Piranda and   
           Julien Bourgeois and   
           Seth Copen Goldstein   A time synchronization protocol for
                                  large-scale distributed embedded systems
                                  with low-precision clocks and
                                  neighbor-to-neighbor communications  . . 123--142


Journal of Network and Computer Applications
Volume 106, Number ??, March 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 G. Nardini and   
                    G. Stea and   
                  A. Virdis and   
               A. Frangioni and   
                   L. Galli and   
                 D. Sabella and   
                G. M. Dell'Aera   Practical feasibility, scalability and
                                  effectiveness of coordinated scheduling
                                  algorithms in cellular networks towards
                                  5G . . . . . . . . . . . . . . . . . . . 1--16
              Sancheng Peng and   
               Yongmei Zhou and   
                 Lihong Cao and   
                    Shui Yu and   
                Jianwei Niu and   
                     Weijia Jia   Influence analysis in social networks: A
                                  survey . . . . . . . . . . . . . . . . . 17--32
      Shahid Md. Asif Iqbal and   
                    Asaduzzaman   Adaptive forwarding strategies to reduce
                                  redundant Interests and Data in named
                                  data networks  . . . . . . . . . . . . . 33--47
           Lalatendu Muduli and   
         Devi Prasad Mishra and   
               Prasanta K. Jana   Application of wireless sensor network
                                  for environmental monitoring in
                                  underground coal mines: A systematic
                                  review . . . . . . . . . . . . . . . . . 48--67
              Koushik A. M. and   
          Elizabeth Bentley and   
                     Fei Hu and   
                    Sunil Kumar   A hardware testbed for learning-based
                                  spectrum handoff in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 68--77
                Flora Amato and   
            Nicola Mazzocca and   
              Francesco Moscato   Model driven design and evaluation of
                                  security level in orchestrated cloud
                                  services . . . . . . . . . . . . . . . . 78--89
                    Li Yang and   
                   Ziyi Han and   
              Zhengan Huang and   
                    Jianfeng Ma   A remotely keyed file encryption scheme
                                  under mobile cloud computing . . . . . . 90--99
                    Tong Li and   
              Zhengan Huang and   
                    Ping Li and   
                  Zheli Liu and   
                     Chunfu Jia   Outsourced privacy-preserving
                                  classification service over encrypted
                                  data . . . . . . . . . . . . . . . . . . 100--110
                Xiaohui Jin and   
               Baojiang Cui and   
                    Dong Li and   
              Zishuai Cheng and   
                   Congxian Yin   An improved payload-based anomaly
                                  detector for web applications  . . . . . 111--116
                  Jian Shen and   
                 Ziyuan Gui and   
                     Sai Ji and   
                   Jun Shen and   
                 Haowen Tan and   
                        Yi Tang   Cloud-aided lightweight certificateless
                                  authentication protocol with anonymity
                                  for wireless body area networks  . . . . 117--123


Journal of Network and Computer Applications
Volume 107, Number ??, April 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Nourhene Ellouze and   
                Slim Rekhis and   
        Noureddine Boudriga and   
               Mohamed Allouche   Powerless Security for Cardiac
                                  Implantable Medical Devices: Use of
                                  Wireless Identification and Sensing
                                  Platform . . . . . . . . . . . . . . . . 1--21
        Jaume Segura-Garcia and   
    Santiago Felici-Castell and   
           Miguel Garcia-Pineda   Performance evaluation of different
                                  techniques to estimate subjective
                                  quality in live video streaming
                                  applications over LTE-Advance mobile
                                  networks . . . . . . . . . . . . . . . . 22--37
      Shima Pakdaman Tirani and   
                     Avid Avokh   On the performance of sink placement in
                                  WSNs considering energy-balanced
                                  compressive sensing-based data
                                  aggregation  . . . . . . . . . . . . . . 38--55
   José V. V. Sobral and   
    Joel J. P. C. Rodrigues and   
       Ricardo A. L. Rabelo and   
  José C. Lima Filho and   
             Natanael Sousa and   
         Harilton S. Araujo and   
           Raimir Holanda Filho   A framework for enhancing the
                                  performance of Internet of Things
                                  applications based on RFID and WSNs  . . 56--68
                  Yu-an Tan and   
                   Yuan Xue and   
                 Chen Liang and   
                  Jun Zheng and   
              Quanxin Zhang and   
               Jiamin Zheng and   
                   Yuanzhang Li   A root privilege management scheme with
                                  revocable authorization for Android
                                  devices  . . . . . . . . . . . . . . . . 69--82
               Guangquan Xu and   
                    Jia Liu and   
                 Yanrong Lu and   
              Xianjiao Zeng and   
                  Yao Zhang and   
                    Xiaoming Li   A novel efficient MAKA protocol with
                                  desynchronization for anonymous roaming
                                  service in Global Mobility Networks  . . 83--92
        Mukesh Kumar Giluka and   
     Thomas Valerrian Pasca and   
       Tathagat Priyadarshi and   
        Bheemarjuna Reddy Tamma   Enhanced class based dynamic priority
                                  scheduling to support uplink IoT traffic
                                  in LTE-A networks  . . . . . . . . . . . 93--112
                    Jian Xu and   
                 Laiwen Wei and   
                   Yu Zhang and   
                  Andi Wang and   
                 Fucai Zhou and   
                  Chong-zhi Gao   Dynamic Fully Homomorphic
                                  encryption-based Merkle Tree for
                                  lightweight streaming authenticated data
                                  structures . . . . . . . . . . . . . . . 113--124
             Giuseppe Aceto and   
            Valerio Persico and   
         Antonio Pescapé   The role of Information and
                                  Communication Technologies in
                                  healthcare: taxonomies, perspectives,
                                  and challenges . . . . . . . . . . . . . 125--154


Journal of Network and Computer Applications
Volume 108, Number ??, April 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
               Ahsan Saleem and   
                  Abid Khan and   
              Furqan Shahid and   
             M. Masoom Alam and   
          Muhammad Khurram Khan   Recent advancements in garbled
                                  computing: How far have we come towards
                                  achieving secure, efficient and reusable
                                  garbled circuits . . . . . . . . . . . . 1--19
              Pingping Dong and   
                Wenjun Yang and   
              Wensheng Tang and   
               Jiawei Huang and   
               Haodong Wang and   
                     Yi Pan and   
                   Jianxin Wang   Reducing transport latency for short
                                  flows with multipath TCP . . . . . . . . 20--36
            Praveen Kumar P and   
               Syam Kumar P and   
              Alphonse P. J. A.   Attribute based encryption in cloud
                                  computing: A survey, gap analysis, and
                                  future directions  . . . . . . . . . . . 37--52
           Wassila Lalouani and   
             Mohamed Younis and   
                 Nadjib Badache   Interconnecting isolated network
                                  segments through intermittent links  . . 53--63
                 Jiuxin Cao and   
                   Shuai Xu and   
                 Xuelin Zhu and   
                  Renjun Lv and   
                         Bo Liu   Effective fine-grained location
                                  prediction based on user check-in
                                  pattern in LBSNs . . . . . . . . . . . . 64--75
José Francisco Colom and   
                  David Gil and   
               Higinio Mora and   
            Bruno Volckaert and   
          Antonio Manuel Jimeno   Scheduling framework for distributed
                                  intrusion detection systems over
                                  heterogeneous network architectures  . . 76--86
        Muhammad Aqib Javed and   
    Muhammad Shahzad Younis and   
             Siddique Latif and   
               Junaid Qadir and   
                     Adeel Baig   Community detection in networks: A
                                  multidisciplinary review . . . . . . . . 87--111
                 Zechao Liu and   
               Zoe L. Jiang and   
                  Xuan Wang and   
                      S. M. Yiu   Practical attribute-based encryption:
                                  Outsourcing decryption, attribute
                                  revocation and policy updating . . . . . 112--123
             Christian Esposito   Interoperable, dynamic and
                                  privacy-preserving access control for
                                  cloud data storage when integrating
                                  heterogeneous organizations  . . . . . . 124--136


Journal of Network and Computer Applications
Volume 109, Number ??, May 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Minh-Tuan Thai and   
               Ying-Dar Lin and   
               Po-Ching Lin and   
                 Yuan-Cheng Lai   Towards load-balanced service chaining
                                  by Hash-based Traffic Steering on
                                  Softswitches . . . . . . . . . . . . . . 1--10
                Souvik Basu and   
             Ayanesh Biswas and   
                  Siuli Roy and   
                   Sipra DasBit   Wise-PRoPHET: A Watchdog supervised
                                  PRoPHET for reliable dissemination of
                                  post disaster situational information
                                  over smartphone based DTN  . . . . . . . 11--23
  Muhammad Ehatisham-ul-Haq and   
        Muhammad Awais Azam and   
                Usman Naeem and   
                 Yasar Amin and   
                   Jonathan Loo   Continuous authentication of smartphone
                                  users based on activity pattern
                                  recognition using passive mobile sensing 24--35
                   Yuan Rao and   
                 Cheng Deng and   
                  Gang Zhao and   
                   Yan Qiao and   
                Lei-yang Fu and   
                  Xing Shao and   
                  Ru-chuan Wang   Self-adaptive implicit contention window
                                  adjustment mechanism for QoS
                                  optimization in wireless sensor networks 36--52
        Mauro A. A. da Cruz and   
    Joel J. P. C. Rodrigues and   
        Arun Kumar Sangaiah and   
           Jalal Al-Muhtadi and   
                Valery Korotaev   Performance evaluation of IoT middleware 53--65
         Ester López and   
                Leandro Navarro   Coordinated detection of forwarding
                                  faults in Wireless Community Networks    66--77
                 Xuangou Wu and   
               Panlong Yang and   
               Shaojie Tang and   
                 Xiao Zheng and   
                   Xiaolin Wang   Privacy-aware data publishing against
                                  sparse estimation attack . . . . . . . . 78--88
                   G. Deepa and   
         P. Santhi Thilagam and   
               Amit Praseed and   
                  Alwyn R. Pais   DetLogic: A black-box approach for
                                  detecting logic vulnerabilities in web
                                  applications . . . . . . . . . . . . . . 89--109


Journal of Network and Computer Applications
Volume 110, Number ??, May 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
              Mostafa Noshy and   
        Abdelhameed Ibrahim and   
              Hesham Arafat Ali   Optimization of live virtual machine
                                  migration in cloud computing: A survey
                                  and future directions  . . . . . . . . . 1--10
               Umber Sheikh and   
                  Abid Khan and   
                Bilal Ahmed and   
               Abdul Waheed and   
                   Abdul Hameed   Provenance Inference Techniques:
                                  Taxonomy, comparative analysis and
                                  design challenges  . . . . . . . . . . . 11--26
            Arsany Guirguis and   
          Mohammed Karmoose and   
                Karim Habak and   
          Mustafa El-Nainay and   
               Moustafa Youssef   Cooperation-based multi-hop routing
                                  protocol for cognitive radio networks    27--42
                 Qiang Yang and   
                     Wei Li and   
       Jose Neuman de Souza and   
               Albert Y. Zomaya   Resilient virtual communication networks
                                  using multi-commodity flow based local
                                  optimal mapping  . . . . . . . . . . . . 43--51
         Vahideh Hayyolalam and   
      Ali Asghar Pourhaji Kazem   A systematic literature review on
                                  QoS-aware service composition and
                                  selection in cloud environment . . . . . 52--74
             Choon Beng Tan and   
   Mohd Hanafi Ahmad Hijazi and   
                   Yuto Lim and   
                  Abdullah Gani   A survey on Proof of Retrievability for
                                  cloud data integrity and availability:
                                  Cloud storage state-of-the-art, issues,
                                  solutions and future trends  . . . . . . 75--86
          Fahri Wisnu Murti and   
      Rahmat Faddli Siregar and   
                 Soo Young Shin   SU-MIMO based uplink non-orthogonal
                                  multiple access for 5G . . . . . . . . . 87--96
                     Jin Li and   
        Aniello Castiglione and   
                   Changyu Dong   Special issue on security in cloud
                                  computing  . . . . . . . . . . . . . . . 97--98
   Agnieszka Jakóbik and   
         Francesco Palmieri and   
               Joanna Kolodziej   Stackelberg games for modeling defense
                                  scenarios against cloud security threats 99--107
                   Dan Liao and   
                     Hui Li and   
                   Gang Sun and   
                 Ming Zhang and   
                   Victor Chang   Location and trajectory privacy
                                  preservation in 5G-Enabled vehicle
                                  social network services  . . . . . . . . 108--118


Journal of Network and Computer Applications
Volume 111, Number ??, June 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
        Suman Bhattacharjee and   
                  Siuli Roy and   
                   Sipra DasBit   DPDRM: A decentralized post-disaster
                                  resource management scheme using energy
                                  efficient smart phone based DTN  . . . . 1--16
              Hongtao Zhang and   
                  Ying Chen and   
                     Zihua Yang   Hierarchical cache-aided transmission
                                  cooperation in 5G user-centric network:
                                  Performance analysis and design insights 17--27
                   Aohan Li and   
                   Guangjie Han   A fairness-based MAC protocol for 5G
                                  Cognitive Radio Ad Hoc Networks  . . . . 28--34
José Luis García-Dorado and   
               Javier Ramos and   
    Miguel Rodríguez and   
                  Javier Aracil   DNS weighted footprints for web browsing
                                  analytics  . . . . . . . . . . . . . . . 35--48
                Sunny Behal and   
              Krishan Kumar and   
                Monika Sachdeva   D-FACE: An anomaly based distributed
                                  approach for early detection of DDoS
                                  attacks and flash events . . . . . . . . 49--63
           Chih-Cheng Tseng and   
                  Jyun-Yao Shih   Two-stage coalition formation and radio
                                  resource allocation with Nash bargaining
                                  solution for inband underlaid D2D
                                  communications in 5G networks  . . . . . 64--76
           Farkhana Muchtar and   
       Abdul Hanan Abdullah and   
             Suhaidi Hassan and   
                   Farhan Masud   Energy conservation strategies in Host
                                  Centric Networking based MANET: A review 77--98
              Raaid Alubady and   
             Suhaidi Hassan and   
                    Adib Habbal   Pending interest table control
                                  management in Named Data Network . . . . 99--116
              Guangliang Xu and   
                   Wei Yang and   
                 Liusheng Huang   Hybrid covert channel in LTE-A: Modeling
                                  and analysis . . . . . . . . . . . . . . 117--126


Journal of Network and Computer Applications
Volume 112, Number ??, June 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Faran Ahmed and   
             Muhammad Naeem and   
                Waleed Ejaz and   
             Muhammad Iqbal and   
               Alagan Anpalagan   Resource management in cellular base
                                  stations powered by renewable energy
                                  sources  . . . . . . . . . . . . . . . . 1--17
          Rung-Shiang Cheng and   
           Chung-Ming Huang and   
                 Sheng-Yuan Pan   WiFi offloading using the
                                  device-to-device (D2D) communication
                                  paradigm based on the Software Defined
                                  Network (SDN) architecture . . . . . . . 18--28
                  Ziwen Sun and   
                  Yuhui Liu and   
                         Li Tao   Attack localization task allocation in
                                  wireless sensor networks based on
                                  multi-objective binary particle swarm
                                  optimization . . . . . . . . . . . . . . 29--40
             Ali Benzerbadj and   
         Bouabdellah Kechar and   
          Ahc\`ene Bounceur and   
             Mohammad Hammoudeh   Surveillance of sensitive fenced areas
                                  using duty-cycled wireless sensor
                                  networks with asymmetrical links . . . . 41--52
               Ravneet Kaur and   
             Sarbjeet Singh and   
                   Harish Kumar   Rise of spam and compromised accounts in
                                  online social networks: A
                                  state-of-the-art review of different
                                  combating approaches . . . . . . . . . . 53--88
                     Jin Li and   
              Xiaofeng Chen and   
         Sherman S. M. Chow and   
                Qiong Huang and   
             Duncan S. Wong and   
                      Zheli Liu   Multi-authority fine-grained access
                                  control with accountability and its
                                  application in cloud . . . . . . . . . . 89--96
           Karanpreet Singh and   
             Paramvir Singh and   
                  Krishan Kumar   User behavior analytics-based
                                  classification of application layer
                                  HTTP-GET flood attacks . . . . . . . . . 97--114
                   Mao Yang and   
                      Bo Li and   
               Zhicheng Bai and   
                 Zhongjiang Yan   SGMA: Semi-granted multiple access for
                                  non-orthogonal multiple access (NOMA) in
                                  5G networking  . . . . . . . . . . . . . 115--125
       Ch. Md. Rakin Haider and   
              Anindya Iqbal and   
          Atif Hasan Rahman and   
                M. Sohel Rahman   An ensemble learning based approach for
                                  impression fraud detection in mobile
                                  advertising  . . . . . . . . . . . . . . 126--141


Journal of Network and Computer Applications
Volume 113, Number ??, July 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 Xiong Wang and   
                 Qian Zhang and   
                   Jing Ren and   
                Shizhong Xu and   
                 Sheng Wang and   
                        Shui Yu   Toward efficient parallel routing
                                  optimization for large-scale SDN
                                  networks using GPGPU . . . . . . . . . . 1--13
                  Wei Jiang and   
              Wanchun Jiang and   
               Weiping Wang and   
               Haodong Wang and   
                     Yi Pan and   
                   Jianxin Wang   A fine-grained rule partition algorithm
                                  in cloud data centers  . . . . . . . . . 14--25
        Md. Arafatur Rahman and   
          A. Taufiq Asyhari and   
    Md Zakirul Alam Bhuiyan and   
         Qusay Medhat Salih and   
        Kamal Zuhairi Bin Zamli   L-CAQ: Joint link-oriented
                                  channel-availability and channel-quality
                                  based channel selection for mobile
                                  cognitive radio networks . . . . . . . . 26--35
             Giuseppe Aceto and   
              Alessio Botta and   
           Pietro Marchetta and   
            Valerio Persico and   
         Antonio Pescapé   A comprehensive survey on Internet
                                  outages  . . . . . . . . . . . . . . . . 36--63
               Wenhong Tian and   
                   Majun He and   
                 Wenxia Guo and   
             Wenqiang Huang and   
                 Xiaoyu Shi and   
            Mingsheng Shang and   
        Adel Nadjaran Toosi and   
                 Rajkumar Buyya   On minimizing total energy consumption
                                  in the scheduling of virtual machine
                                  reservations . . . . . . . . . . . . . . 64--74
             Xiaohong Huang and   
              Tingting Yuan and   
                      Yan Zhang   Utility-optimized bandwidth and power
                                  allocation for non-orthogonal multiple
                                  access in software defined 5G networks   75--86
       Mohammed Y. Aalsalem and   
            Wazir Zada Khan and   
              Wajeb Gharibi and   
      Muhammad Khurram Khan and   
              Quratulain Arshad   Wireless Sensor Networks in oil and gas
                                  industry: Recent advances, taxonomy,
                                  requirements, and open challenges  . . . 87--97
              Chih-Min Chao and   
                 Hsiang-Yuan Fu   Supporting fast and fair rendezvous for
                                  cognitive radio networks . . . . . . . . 98--108
                   Yang Qin and   
               Weihong Yang and   
                    Xiao Ai and   
                  Lingjian Chen   Fault tolerant storage and data access
                                  optimization in data center networks . . 109--118
               Ahmed Fahmin and   
             Yuan-Cheng Lai and   
        Md. Shohrab Hossain and   
                   Ying-Dar Lin   Performance modeling and comparison of
                                  NFV integrated with SDN: Under or aside? 119--129


Journal of Network and Computer Applications
Volume 114, Number ??, July 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 Saad Saleh and   
               Junaid Qadir and   
              Muhammad U. Ilyas   Shedding Light on the Dark Corners of
                                  the Internet: A Survey of Tor Research   1--28
Alejandro Santoyo-González and   
Cristina Cervelló-Pastor   Latency-aware cost optimization of the
                                  service infrastructure placement in 5G
                                  networks . . . . . . . . . . . . . . . . 29--37
            Hsueh-Wen Tseng and   
             Ting-Ting Yang and   
              Wan-Chi Chang and   
                   Yu-Xiang Lan   An efficient error prevention and
                                  recovery scheme for multicast traffic in
                                  data center networks . . . . . . . . . . 38--47
              Jianfeng Guan and   
                 Zhijun Wei and   
                      Ilsun You   GRBC-based Network Security Functions
                                  placement scheme in SDS for 5G security  48--56
             Riham Elhabyan and   
                    Wei Shi and   
                Marc St-Hilaire   A Pareto optimization-based approach to
                                  clustering and routing in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 57--69
           Michael Robinson and   
                Kevin Jones and   
              Helge Janicke and   
              Leandros Maglaras   An introduction to cyber peacekeeping    70--87
              Wei-Che Chien and   
              Chin-Feng Lai and   
              Hsin-Hung Cho and   
                 Han-Chieh Chao   A SDN-SFC-based service-oriented load
                                  balancing for the IoT applications . . . 88--97
                   Ya-Ju Yu and   
               Ai-Chun Pang and   
                    Ming-Yu Yeh   Video encoding adaptation for QoE
                                  maximization over 5G cellular networks   98--107
                 Haiyang Hu and   
                Zhongjin Li and   
                     Hua Hu and   
                   Jie Chen and   
                  Jidong Ge and   
                 Chuanyi Li and   
                   Victor Chang   Multi-objective scheduling for
                                  scientific workflow in multicloud
                                  environment  . . . . . . . . . . . . . . 108--122
                Amar Kaswan and   
              Abhinav Tomar and   
               Prasanta K. Jana   An efficient scheduling scheme for
                                  mobile charger in on-demand wireless
                                  rechargeable sensor networks . . . . . . 123--134


Journal of Network and Computer Applications
Volume 115, Number ??, August 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Mohammad Etemad and   
Alptekin Küpçü   Verifiable database outsourcing
                                  supporting join  . . . . . . . . . . . . 1--19
                Badiul Alam and   
                    Zhe Jin and   
                Wun-She Yap and   
                    Bok-Min Goi   An alignment-free cancelable fingerprint
                                  template for bio-cryptosystems . . . . . 20--32
            Walaa N. Ismail and   
     Mohammad Mehedi Hassan and   
        Hessah A. Alsalamah and   
              Giancarlo Fortino   Mining productive-periodic frequent
                                  patterns in tele-health systems  . . . . 33--47
            Salvatore Cuomo and   
            Raffaele Farina and   
            Francesco Piccialli   An inverse Bayesian scheme for the
                                  denoising of ECG signals . . . . . . . . 48--58
              Shaymaa Akraa and   
          Anh Pham Tran Tam and   
               Haifeng Shen and   
               Youhong Tang and   
             Ben Zhong Tang and   
                   Jimmy Li and   
                   Sandy Walker   A smartphone-based point-of-care
                                  quantitative urinalysis device for
                                  chronic kidney disease patients  . . . . 59--69
              Talal H. Noor and   
           Sherali Zeadally and   
            Abdullah Alfazi and   
                  Quan Z. Sheng   Mobile cloud computing: Challenges and
                                  future research directions . . . . . . . 70--85
            Majdi Rawashdeh and   
      Mohammed Gh. Al Zamil and   
          M. Shamim Hossain and   
              Samer Samarah and   
             Syed Umar Amin and   
                Ghulam Muhammad   Reliable service delivery in Tele-health
                                  care systems . . . . . . . . . . . . . . 86--93
            Han-Chuan Hsieh and   
           Jiann-Liang Chen and   
          Abderrahim Benslimane   5G Virtualized Multi-access Edge
                                  Computing Platform for IoT Applications  94--102


Journal of Network and Computer Applications
Volume 116, Number ??, August 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
              Otkrist Gupta and   
                  Ramesh Raskar   Distributed learning of deep neural
                                  network over multiple agents . . . . . . 1--8
               Donghao Zhou and   
                  Zheng Yan and   
                  Yulong Fu and   
                       Zhen Yao   A survey on network data collection  . . 9--23
       Sanjay Kumar Biswash and   
    Dushantha Nalin K. Jayakody   Performance based user-centric dynamic
                                  mode switching and mobility management
                                  scheme for $5$G networks . . . . . . . . 24--34
             Chun-Cheng Lin and   
              Hui-Hsin Chin and   
                    Wei-Bo Chen   Balancing latency and cost in
                                  software-defined vehicular networks
                                  using genetic algorithm  . . . . . . . . 35--41
                   Chao Lin and   
                  Debiao He and   
                Xinyi Huang and   
     Kim-Kwang Raymond Choo and   
        Athanasios V. Vasilakos   BSeIn: a blockchain-based secure mutual
                                  authentication with fine-grained access
                                  control system for industry 4.0  . . . . 42--52
             Jia-Ming Liang and   
               Po-Yen Chang and   
               Jen-Jee Chen and   
           Chien-Feng Huang and   
                  Yu-Chee Tseng   Energy-efficient DRX scheduling for D2D
                                  communication in $5$G networks . . . . . 53--64
          Mariacarla Staffa and   
            Luigi Sgaglione and   
            Giovanni Mazzeo and   
            Luigi Coppolino and   
        Salvatore D'Antonio and   
               Luigi Romano and   
               Erol Gelenbe and   
                  Oana Stan and   
              Sergiu Carpov and   
           Evangelos Grivas and   
           Paolo Campegiani and   
             Luigi Castaldo and   
         Konstantinos Votis and   
          Vassilis Koutkias and   
                Ioannis Komnios   An OpenNCP-based Solution for Secure
                                  eHealth Data Exchange  . . . . . . . . . 65--85
Sergio Herrería-Alonso and   
Miguel Rodríguez-Pérez and   
Manuel Fernández-Veiga and   
Cándido López-García   An optimal dynamic sleeping control
                                  policy for single base stations in green
                                  cellular networks  . . . . . . . . . . . 86--94


Journal of Network and Computer Applications
Volume 117, Number ??, September 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Weizhi Meng and   
                    Yu Wang and   
             Duncan S. Wong and   
                  Sheng Wen and   
                     Yang Xiang   TouchWB: Touch behavioral user
                                  authentication based on web browsing on
                                  smartphones  . . . . . . . . . . . . . . 1--9
                  Yin Zhang and   
           Raffaele Gravina and   
                  Huimin Lu and   
            Massimo Villari and   
              Giancarlo Fortino   PEA: Parallel electrocardiogram-based
                                  authentication for smart healthcare
                                  systems  . . . . . . . . . . . . . . . . 10--16
        Domenico Calcaterra and   
         Giuseppe Di Modica and   
           Orazio Tomarchio and   
                  Placido Romeo   A clinical decision support system to
                                  increase appropriateness of diagnostic
                                  imaging prescriptions  . . . . . . . . . 17--29
          Jamal Abdul Nasir and   
             Shahid Hussain and   
                 Chuangyin Dang   An Integrated Planning Approach Towards
                                  Home Health Care, Telehealth and
                                  Patients Group Based Care  . . . . . . . 30--41
             Hanane Lamaazi and   
                  Nabil Benamar   OF--EC: a novel energy consumption aware
                                  objective function for RPL based on
                                  fuzzy logic. . . . . . . . . . . . . . . 42--58
           Rodrigo S. Couto and   
                 Hugo Sadok and   
                 Pedro Cruz and   
         Felipe F. da Silva and   
       Tatiana Sciammarella and   
   Miguel Elias M. Campista and   
Lu\'ìs Henrique M. K. Costa and   
           Pedro B. Velloso and   
          Marcelo G. Rubinstein   Building an IaaS cloud with droplets: a
                                  collaborative experience with OpenStack  59--71
                  Yang Yang and   
                Songtao Guo and   
                 Guiyan Liu and   
                  Yuanyuan Yang   Two-layer compressive sensing based
                                  video encoding and decoding framework
                                  for WMSN . . . . . . . . . . . . . . . . 72--85
                     Yan Li and   
                Shifang Dai and   
                      Weiwei Wu   Cooperative video caching scheme over
                                  software defined passive optical network 86--100


Journal of Network and Computer Applications
Volume 118, Number ??, September 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
         Ishfaq Bashir Sofi and   
                    Akhil Gupta   A survey on energy efficient $5$G green
                                  network with a planned multi-tier
                                  architecture . . . . . . . . . . . . . . 1--28
                 Musab Isah and   
             Steven Simpson and   
                  Chris Edwards   An Improved LISP Mobile Node
                                  Architecture . . . . . . . . . . . . . . 29--43
           Nicholas Capurso and   
                     Bo Mei and   
                Tianyi Song and   
              Xiuzhen Cheng and   
                       Jiguo Yu   A survey on key fields of context
                                  awareness for mobile devices . . . . . . 44--60
            Nicolas Tsiftes and   
                   Thiemo Voigt   Velox VM: a safe execution environment
                                  for resource-constrained IoT
                                  applications . . . . . . . . . . . . . . 61--73
            Jenny I. Glitza and   
Frerk Müller-von Aschwege and   
           Marco Eichelberg and   
                 Nils Reiss and   
             Thomas Schmidt and   
         Christina Feldmann and   
               Regina Wendl and   
            Jan D. Schmitto and   
                   Andreas Hein   Advanced telemonitoring of Left
                                  Ventricular Assist Device patients for
                                  the early detection of thrombosis  . . . 74--82
     Karunanithy Kalaivanan and   
            Velusamy Bhanumathi   Reliable location aware and Cluster-Tap
                                  Root based data collection protocol for
                                  large scale wireless sensor networks . . 83--101
                   Anmin Fu and   
                   Shuai Li and   
                    Shui Yu and   
               Yuqing Zhang and   
                     Yinxia Sun   Privacy-preserving composite modular
                                  exponentiation outsourcing with optimal
                                  checkability in single untrusted cloud
                                  server . . . . . . . . . . . . . . . . . 102--112
             Upasana Sarmah and   
        D. K. Bhattacharyya and   
                   J. K. Kalita   A survey of detection methods for XSS
                                  attacks  . . . . . . . . . . . . . . . . 113--143
                 Chen Liang and   
                  Yu-an Tan and   
             Xiaosong Zhang and   
               Xianmin Wang and   
                  Jun Zheng and   
                  Quanxin Zhang   Building packet length covert channel
                                  over mobile VoIP traffics  . . . . . . . 144--153


Journal of Network and Computer Applications
Volume 119, Number ??, October 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Ivanoe De Falco and   
       Antonio Della Cioppa and   
               Tomas Koutny and   
               Michal Krcma and   
            Umberto Scafuri and   
              Ernesto Tarantino   Genetic Programming-based induction of a
                                  glucose-dynamics model for telemedicine  1--13
Armando Céspedes-Mota and   
Gerardo Castañón and   
Alberto F. Martínez-Herrera and   
Leopoldo Eduardo Cárdenas-Barrón and   
     Ana María Sarmiento   Differential evolution algorithm applied
                                  to wireless sensor distribution on
                                  different geometric shapes with area and
                                  energy optimization  . . . . . . . . . . 14--23
              Samet Tonyali and   
                Ruben Munoz and   
               Kemal Akkaya and   
                     Utku Ozgur   A realistic performance evaluation of
                                  privacy-preserving protocols for smart
                                  grid AMI networks  . . . . . . . . . . . 24--41
            Habib Mostafaei and   
                  Michael Menth   Software-defined wireless sensor
                                  networks: a survey . . . . . . . . . . . 42--56
                 Jianhui Lv and   
               Xingwei Wang and   
               Qingyi Zhang and   
                      Min Huang   LAPGN: Accomplishing information
                                  consistency under OSPF in General
                                  Networks (an extension)  . . . . . . . . 57--69
              S. A. R. Shah and   
                   Wenji Wu and   
                  Qiming Lu and   
                Liang Zhang and   
          Sajith Sasidharan and   
                 Phil DeMar and   
                  Chin Guok and   
              John Macauley and   
               Eric Pouyoul and   
                    Jin Kim and   
                  Seo-Young Noh   AmoebaNet: an SDN-enabled network
                                  service for big data science . . . . . . 70--82
                     Fei Gu and   
                Jianwei Niu and   
                 Zhiping Qi and   
           Mohammed Atiquzzaman   Partitioning and offloading in smart
                                  mobile devices for mobile cloud
                                  computing: State of the art and future
                                  directions . . . . . . . . . . . . . . . 83--96
                   Xili Wan and   
                Xinjie Guan and   
              Tianjing Wang and   
               Guangwei Bai and   
                 Baek-Yong Choi   Application deployment using
                                  Microservice and Docker containers:
                                  Framework and optimization . . . . . . . 97--109
              Yongnan Zhang and   
                   Yonghua Zhou   Distributed coordination control of
                                  traffic network flow using adaptive
                                  genetic algorithm based on cloud
                                  computing  . . . . . . . . . . . . . . . 110--120


Journal of Network and Computer Applications
Volume 120, Number ??, October 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
               Abhinav Jain and   
                  Sandeep Kumar   FriendShare: a secure and reliable
                                  framework for file sharing on network    1--16
                  A. Bagula and   
                 M. Mandava and   
                      H. Bagula   A framework for healthcare support in
                                  the rural and low income areas of the
                                  developing world . . . . . . . . . . . . 17--29
         Nima Moradianzadeh and   
       Pooya Moradian Zadeh and   
                 Ziad Kobti and   
               Sarah Hansen and   
                  Kathryn Pfaff   Using social network analysis to model
                                  palliative care  . . . . . . . . . . . . 30--41
           Abishi Chowdhury and   
                 Shital A. Raut   A survey study on Internet of Things
                                  resource management  . . . . . . . . . . 42--60
           Parvaneh Asghari and   
        Amir Masoud Rahmani and   
        Hamid Haj Seyyed Javadi   Service composition approaches in IoT: a
                                  systematic review  . . . . . . . . . . . 61--77
              Amol Vasudeva and   
                      Manu Sood   Survey on sybil attack defense
                                  mechanisms in wireless ad hoc networks   78--118
             Han-Peng Jiang and   
                   Wei-Mei Chen   Self-adaptive resource allocation for
                                  energy-aware virtual machine placement
                                  in dynamic computing cloud . . . . . . . 119--129
                   K. Bilal and   
                   A. Erbad and   
                     M. Hefeeda   QoE-aware distributed cloud-based live
                                  streaming of multisourced multiview
                                  videos . . . . . . . . . . . . . . . . . 130--144


Journal of Network and Computer Applications
Volume 121, Number ??, November 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Maha Saadeh and   
                Azzam Sleit and   
          Khair Eddin Sabri and   
              Wesam Almobaideen   Hierarchical architecture and protocol
                                  for mobile object authentication in the
                                  context of IoT smart cities  . . . . . . 1--19
                  Dapeng Qu and   
               Xingwei Wang and   
                  Min Huang and   
                   Keqin Li and   
               Sajal K. Das and   
                       Sijin Wu   A cache-aware social-based QoS routing
                                  scheme in Information Centric Networks   20--32
       Dyson Pereira Junior and   
      Emilio Carlos Gomes Wille   FB-APSP: a new efficient algorithm for
                                  computing all-pairs shortest-paths . . . 33--43
             Ahmed H. Anwar and   
                George Atia and   
                  Mina Guirguis   Adaptive topologies against jamming
                                  attacks in wireless networks: a
                                  game-theoretic approach  . . . . . . . . 44--58
              Longbiao Chen and   
                Dingqi Yang and   
               Daqing Zhang and   
                 Cheng Wang and   
                Jonathan Li and   
           Thi-Mai-Trang Nguyen   Deep mobile traffic forecast and
                                  complementary base station clustering
                                  for C-RAN optimization . . . . . . . . . 59--69
          Ranida Hamidouche and   
            Zibouda Aliouat and   
    Abdelhak Mourad Gueroui and   
        Ado Adamou Abba Ari and   
                   Lemia Louail   Classical and bio-inspired mobility in
                                  sensor networks for IoT applications . . 70--88
                Waqas Rehan and   
             Stefan Fischer and   
                     Maaz Rehan   Anatomizing the robustness of
                                  multichannel MAC protocols for WSNs: an
                                  evaluation under MAC oriented design
                                  issues impacting QoS . . . . . . . . . . 89--118
              M. Amarlingam and   
       Pradeep Kumar Mishra and   
             P. Rajalakshmi and   
   Sumohana S. Channappayya and   
                   C. S. Sastry   Novel Light Weight Compressed Data
                                  Aggregation using sparse measurements
                                  for IoT networks . . . . . . . . . . . . 119--134
            Behnam Dezfouli and   
        Immanuel Amirtharaj and   
          Chia-Chi (Chelsey) Li   EMPIOT: an energy measurement platform
                                  for wireless IoT devices . . . . . . . . 135--148
           Teodora Sanislav and   
           Sherali Zeadally and   
            George Dan Mois and   
          Silviu Corneliu Folea   Wireless energy harvesting: Empirical
                                  results and practical considerations for
                                  Internet of Things . . . . . . . . . . . 149--158


Journal of Network and Computer Applications
Volume 122, Number ??, November 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                   Lei Zhou and   
                   Anmin Fu and   
                    Shui Yu and   
                    Mang Su and   
                     Boyu Kuang   Data integrity verification of the
                                  outsourced big data in the cloud
                                  environment: a survey  . . . . . . . . . 1--15
                      Xu Lu and   
                    Jun Liu and   
                     Wei Qi and   
                    Qingyun Dai   Multiple-target tracking based on
                                  compressed sensing in the Internet of
                                  Things . . . . . . . . . . . . . . . . . 16--23
               Deepak Singh and   
                   Bryan Ng and   
             Yuan-Cheng Lai and   
               Ying-Dar Lin and   
             Winston K. G. Seah   Modelling Software-Defined Networking:
                                  Software and hardware switches . . . . . 24--36
               De-gan Zhang and   
                 Ting Zhang and   
                   Yue Dong and   
              Xiao-huan Liu and   
                  Yu-ya Cui and   
                    De-xin Zhao   Novel optimized link state routing
                                  protocol based on quantum genetic
                                  strategy for mobile learning . . . . . . 37--49
              Yinghui Zhang and   
                     Jin Li and   
                 Dong Zheng and   
                    Ping Li and   
                 Yangguang Tian   Privacy-preserving communication and
                                  power injection over vehicle networks
                                  and $5$G smart grid slice  . . . . . . . 50--60
               Youcef Imine and   
               Ahmed Lounis and   
        Abdelmadjid Bouabdallah   Revocable attribute-based access control
                                  in multi-authority systems . . . . . . . 61--76
Diogo Menezes Ferrazani Mattos and   
Otto Carlos Muniz Bandeira Duarte and   
                    Guy Pujolle   A lightweight protocol for consistent
                                  policy update on software-defined
                                  networking with multiple controllers . . 77--87
                   Chuan Xu and   
               Wenqiang Jin and   
               Xinheng Wang and   
               Guofeng Zhao and   
                        Shui Yu   MC-VAP: a multi-connection virtual
                                  access point for high performance
                                  software-defined wireless networks . . . 88--98
 Vinícius F. S. Mota and   
            Thiago H. Silva and   
           Daniel F. Macedo and   
      Yacine Ghamri-Doudane and   
     José M. S. Nogueira   Towards scalable mobile crowdsensing
                                  through device-to-device communication   99--106
                Debasis Das and   
                    Rajiv Misra   Improvised dynamic network connectivity
                                  model for Vehicular Ad-Hoc Networks
                                  (VANETs) . . . . . . . . . . . . . . . . 107--114
           Franco Cicirelli and   
        Agostino Forestiero and   
            Andrea Giordano and   
              Carlo Mastroianni   Parallelization of space-aware
                                  applications: Modeling and performance
                                  analysis . . . . . . . . . . . . . . . . 115--127
             Mahmood Javadi and   
            Habib Mostafaei and   
      Morshed U. Chowdhurry and   
               Jemal H. Abawajy   Learning automaton based topology
                                  control protocol for extending wireless
                                  sensor networks lifetime . . . . . . . . 128--136
               Reza Ghebleh and   
                   Ali Ghaffari   Retraction notice to ``A comprehensive
                                  survey on $5$G: the prospect of future
                                  communications'' [J. Netw. Comput. Appl.
                                  94 (2017) 1--32] . . . . . . . . . . . . 137--137


Journal of Network and Computer Applications
Volume 123, Number ??, December 1, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Qikun Zhang and   
                   Yong Gan and   
                     Lu Liu and   
               Xianmin Wang and   
              Xiangyang Luo and   
                   Yuanzhang Li   An authenticated asymmetric group key
                                  agreement based on attribute encryption  1--10
            Md. Ahsan Habib and   
                Sajeeb Saha and   
         Md. Abdur Razzaque and   
        Md. Mamun-or-Rashid and   
          Giancarlo Fortino and   
         Mohammad Mehedi Hassan   Starfish routing for sensor networks
                                  with mobile sink . . . . . . . . . . . . 11--22
             Chenglong Shao and   
                 Heejun Roh and   
                     Wonjun Lee   Next-generation RF-powered networks for
                                  Internet of Things: Architecture and
                                  research perspectives  . . . . . . . . . 23--31
          Antesar M. Shabut and   
           M. Shamim Kaiser and   
            Keshav P. Dahal and   
                   Wenbing Chen   A multidimensional trust evaluation
                                  model for MANETs . . . . . . . . . . . . 32--41
               Farah Khedim and   
            Nabila Labraoui and   
            Ado Adamou Abba Ari   A cognitive chronometry strategy
                                  associated with a revised cloud model to
                                  deal with the dishonest recommendations
                                  attacks in wireless sensor networks  . . 42--56
          Roberto Di Pietro and   
               Gabriele Oligeri   GopJam: Key-less jamming mitigation via
                                  gossiping  . . . . . . . . . . . . . . . 57--68
        Dimitrios Sikeridis and   
   Eirini Eleni Tsiropoulou and   
      Michael Devetsikiotis and   
           Symeon Papavassiliou   Wireless powered Public Safety IoT: a
                                  UAV-assisted adaptive-learning approach
                                  towards energy efficiency  . . . . . . . 69--79
                Sara Kassan and   
               Jaafar Gaber and   
                  Pascal Lorenz   Game theory based distributed clustering
                                  approach to maximize wireless sensors
                                  network lifetime . . . . . . . . . . . . 80--88
              Yinghui Zhang and   
             Robert H. Deng and   
                   Gang Han and   
                     Dong Zheng   Secure smart health with privacy-aware
                                  aggregate authentication and access
                                  control in Internet of Things  . . . . . 89--100
               Jiangang Shu and   
                 Ximeng Liu and   
              Yinghui Zhang and   
                Xiaohua Jia and   
                 Robert H. Deng   Dual-side privacy-preserving task
                                  matching for spatial crowdsourcing . . . 101--111
             Mohammad Wazid and   
            Ashok Kumar Das and   
        Athanasios V. Vasilakos   Authenticated key management protocol
                                  for cloud-assisted body area sensor
                                  networks . . . . . . . . . . . . . . . . 112--126


Journal of Network and Computer Applications
Volume 124, Number ??, December 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Imen Mahjri and   
              Amine Dhraief and   
       Abdelfettah Belghith and   
            Sofien Gannouni and   
             Issam Mabrouki and   
                  Maram AlAjlan   Collision risk assessment in Flying Ad
                                  Hoc aerial wireless networks . . . . . . 1--13
              Daniel Morato and   
           Eduardo Berrueta and   
      Eduardo Magaña and   
                     Mikel Izal   Ransomware early detection by the
                                  analysis of file sharing traffic . . . . 14--32
               Dina Shehada and   
             Chan Yeob Yeun and   
           M. Jamal Zemerly and   
         Mahmoud Al-Qutayri and   
          Yousof Al-Hammadi and   
                     Jiankun Hu   A new adaptive trust and reputation
                                  model for Mobile Agent Systems . . . . . 33--43
         Abdullah Al Zishan and   
               Imtiaz Karim and   
        Sudipta Saha Shubha and   
                 Ashikur Rahman   Maximizing heterogeneous coverage in
                                  over and under provisioned visual sensor
                                  networks . . . . . . . . . . . . . . . . 44--62
                    Qi Liao and   
                    Ting Li and   
            Benjamin A. Blakely   Anomaly analysis and visualization for
                                  dynamic networks through spatiotemporal
                                  graph segmentations  . . . . . . . . . . 63--79
       Ruben Ricart-Sanchez and   
              Pedro Malagon and   
         Pablo Salva-Garcia and   
   Enrique Chirivella Perez and   
                    Qi Wang and   
         Jose M. Alcaraz Calero   Towards an FPGA-Accelerated programmable
                                  data path for edge-to-core
                                  communications in $5$G networks  . . . . 80--93
               Waheed Iqbal and   
          Abdelkarim Erradi and   
                   Arif Mahmood   Dynamic workload patterns prediction for
                                  proactive auto-scaling of web
                                  applications . . . . . . . . . . . . . . 94--107
              Jianwei Zhang and   
             Xinchang Zhang and   
                   Meng Sun and   
                  Chunling Yang   Maximizing streaming efficiency of
                                  multiple streams in peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 108--120
               Khaled Hejja and   
              Xavier Hesselbach   Online power aware coordinated virtual
                                  network embedding with $5$G delay
                                  constraint . . . . . . . . . . . . . . . 121--136
             Satoshi Utsumi and   
Salahuddin Muhammad Salim Zabir and   
                 Yuto Usuki and   
              Seisho Takeda and   
            Norio Shiratori and   
               Yasushi Kato and   
                     Jeyeon Kim   A new analytical model of TCP Hybla for
                                  satellite IP networks  . . . . . . . . . 137--147
                Xiaolong Xu and   
                  Shucun Fu and   
                Lianyong Qi and   
                Xuyun Zhang and   
              Qingxiang Liu and   
                   Qiang He and   
                    Shancang Li   An IoT-Oriented data placement method
                                  with privacy preservation in cloud
                                  environment  . . . . . . . . . . . . . . 148--157
                Shuyue Chen and   
                   Chin-Tau Lea   Constraint-based scheduling algorithm
                                  with the non-adjacency requirement for
                                  multi-flow AWG switches  . . . . . . . . 158--168
              Aparna Kumari and   
              Sudeep Tanwar and   
            Sudhanshu Tyagi and   
               Neeraj Kumar and   
           Michele Maasberg and   
         Kim-Kwang Raymond Choo   Multimedia big data computing and
                                  Internet of Things applications: a
                                  taxonomy and process model . . . . . . . 169--195


Journal of Network and Computer Applications
Volume 125, Number ??, January 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                      Anonymous   Thank You Reviewers  . . . . . . . . . . iii--xii
                     I. Val and   
                  A. Etxabe and   
                 R. Torrego and   
            P. M. Rodriguez and   
                  C. Cruces and   
                    V. Diez and   
               M. Mendicute and   
                     A. Arriola   Design, analysis and implementation of a
                                  time-bounded spectrum handoff algorithm
                                  for real-time industrial wireless sensor
                                  and actuator networks  . . . . . . . . . 1--16
                Seema Kharb and   
                Anita Singhrova   Fuzzy based priority aware scheduling
                                  technique for dense industrial IoT
                                  networks . . . . . . . . . . . . . . . . 17--27
                    V. Indu and   
                 Sabu M. Thampi   A nature --- inspired approach based on
                                  Forest Fire model for modeling rumor
                                  propagation in social networks . . . . . 28--41
         Srikant Manas Kala and   
              Vanlin Sathya and   
       M. Pavan Kumar Reddy and   
                 Betty Lala and   
        Bheemarjuna Reddy Tamma   A socio-inspired CALM approach to
                                  channel assignment performance
                                  prediction and WMN capacity estimation   42--66
              Vishal Sharma and   
              Jianfeng Guan and   
                 Jiyoon Kim and   
              Soonhyun Kwon and   
                  Ilsun You and   
         Francesco Palmieri and   
                 Mario Collotta   MIH-SPFP: MIH-base secure cross-layer
                                  handover protocol for Fast Proxy Mobile
                                  IPv6-IoT networks  . . . . . . . . . . . 67--81
                Zhitao Guan and   
                  Yue Zhang and   
                 Longfei Wu and   
                     Jun Wu and   
                    Jing Li and   
                Yinglong Ma and   
                    Jingjing Hu   APPA: an anonymous and privacy
                                  preserving data aggregation scheme for
                                  fog-enhanced IoT . . . . . . . . . . . . 82--92
              Jinfang Jiang and   
               Guangjie Han and   
                   Hao Wang and   
                 Mohsen Guizani   A survey on location privacy protection
                                  in Wireless Sensor Networks  . . . . . . 93--114
      Anil Kumar Rangisetti and   
        Bheemarjuna Reddy Tamma   Interference and QoS aware cell
                                  switch-off strategy for software defined
                                  LTE HetNets  . . . . . . . . . . . . . . 115--129
                    Chao Bu and   
               Xingwei Wang and   
                  Hui Cheng and   
                  Min Huang and   
                       Keqin Li   Routing as a service (RaaS): an open
                                  framework for customizing routing
                                  services . . . . . . . . . . . . . . . . 130--145
            Alper Bereketli and   
Muharrem Tümçakir and   
                     Burcu Yeni   P-AUV: Position aware routing and medium
                                  access for ad hoc AUV networks . . . . . 146--154
             Kostas Kolomvatsos   Time-optimized management of mobile IoT
                                  nodes for pervasive applications . . . . 155--167
                Zhuhua Liao and   
                Zengde Teng and   
                 Jian Zhang and   
                  Yizhi Liu and   
                   Hao Xiao and   
                      Aiping Yi   A Semantic Concast service for data
                                  discovery, aggregation and processing on
                                  NDN  . . . . . . . . . . . . . . . . . . 168--178
              Garima Chopra and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   RBA: Region Based Algorithm for secure
                                  harvesting in Ultra Dense Network  . . . 179--189
                   Zhen Liu and   
                 Ruoyu Wang and   
         Nathalie Japkowicz and   
               Yongming Cai and   
                  Deyu Tang and   
                     Xianfa Cai   Mobile app traffic flow feature
                                  extraction and selection for improving
                                  classification robustness  . . . . . . . 190--208
                Shuhua Deng and   
                   Xing Gao and   
                   Zebin Lu and   
                 Zhengfa Li and   
                    Xieping Gao   DoS vulnerabilities and mitigation
                                  strategies in software-defined networks  209--219
               Xiuquan Qiao and   
                    Pei Ren and   
              Junliang Chen and   
                    Wei Tan and   
             M. Brian Blake and   
                      Wangli Xu   Session persistence for dynamic web
                                  applications in Named Data Networking    220--235
                 Weijie Han and   
               Jingfeng Xue and   
                  Yong Wang and   
                Zhenyan Liu and   
                    Zixiao Kong   MalInsight: a systematic profiling based
                                  malware detection framework  . . . . . . 236--250
             Imran Makhdoom and   
           Mehran Abolhasan and   
               Haider Abbas and   
                         Wei Ni   Blockchain's adoption in IoT: the
                                  challenges, and a way forward  . . . . . 251--279


Journal of Network and Computer Applications
Volume 126, Number ??, January 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                   Ming Tao and   
                Wenhong Wei and   
                 Shuqiang Huang   Location-based trustworthy services
                                  recommendation in
                                  cooperative-communication-enabled
                                  Internet of Vehicles . . . . . . . . . . 1--11
                 Ahmed Aziz and   
                Karan Singh and   
                Walid Osamy and   
                 Ahmed M. Khedr   Effective algorithm for optimizing
                                  compressive sensing in IoT and periodic
                                  monitoring applications  . . . . . . . . 12--28
             Xiaosong Zhang and   
               Liehuang Zhu and   
               Xianmin Wang and   
             Changyou Zhang and   
                Hongfei Zhu and   
                      Yu-an Tan   A packet-reordering covert channel over
                                  VoLTE voice and video traffics . . . . . 29--38
                    Tong Li and   
               Chongzhi Gao and   
            Liaoliang Jiang and   
             Witold Pedrycz and   
                      Jian Shen   Publicly verifiable privacy-preserving
                                  aggregation and its application in IoT   39--44
                    Qi Feng and   
                  Debiao He and   
           Sherali Zeadally and   
      Muhammad Khurram Khan and   
                   Neeraj Kumar   A survey on privacy protection in
                                  blockchain system  . . . . . . . . . . . 45--58
                Seema Kharb and   
                Anita Singhrova   A survey on network formation and
                                  scheduling algorithms for time slotted
                                  channel hopping in industrial networks   59--87
                Huaqing Lin and   
                  Zheng Yan and   
                      Yulong Fu   Adaptive security-related data
                                  collection with context awareness  . . . 88--103
        EmadelDin A. Mazied and   
        Mustafa Y. ElNainay and   
   Mohammad J. Abdel-Rahman and   
           Scott F. Midkiff and   
         Mohamed R. M. Rizk and   
            Hesham A. Rakha and   
             Allen B. MacKenzie   The wireless control plane: an overview
                                  and directions for future research . . . 104--122
               Karim Akilal and   
             Hachem Slimani and   
                   Mawloud Omar   A robust trust inference algorithm in
                                  weighted signed social networks based on
                                  collaborative filtering and agreement as
                                  a similarity metric  . . . . . . . . . . 123--132
        Cleverton Vicentini and   
              Altair Santin and   
             Eduardo Viegas and   
                   Vilmar Abreu   SDN-based and multitenant-aware resource
                                  provisioning mechanism for cloud-based
                                  big data streaming . . . . . . . . . . . 133--149
             Abderazek Seba and   
   Nadia Nouali-Taboudjemat and   
             Nadjib Badache and   
                    Hamida Seba   A review on security challenges of
                                  wireless communications in disaster
                                  emergency response and crisis management
                                  situations . . . . . . . . . . . . . . . 150--161
         Fatemeh Shabestari and   
        Amir Masoud Rahmani and   
     Nima Jafari Navimipour and   
                 Sam Jabbehdari   A taxonomy of software-based and
                                  hardware-based approaches for energy
                                  efficiency management in the Hadoop  . . 162--177


Journal of Network and Computer Applications
Volume 127, Number ??, February 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
      Rahmat Faddli Siregar and   
          Fahri Wisnu Murti and   
                 Soo Young Shin   Bit allocation approach of spatial
                                  modulation for multi-user scenario . . . 1--8
       Sanaa Kawther Ghalem and   
         Bouabdellah Kechar and   
          Ahc\`ene Bounceur and   
                Reinhardt Euler   A probabilistic multivariate
                                  copula-based technique for faulty node
                                  diagnosis in wireless sensor networks    9--25
          Francesc Wilhelmi and   
Sergio Barrachina-Muñoz and   
             Boris Bellalta and   
              Cristina Cano and   
             Anders Jonsson and   
                    Gergely Neu   Potential and pitfalls of Multi-Armed
                                  Bandits for decentralized Spatial Reuse
                                  in WLANs . . . . . . . . . . . . . . . . 26--42
               Licheng Wang and   
              Xiaoying Shen and   
                    Jing Li and   
                   Jun Shao and   
                    Yixian Yang   Cryptographic primitives in blockchains  43--58
                   Hui Tian and   
                  Fulin Nan and   
            Chin-Chen Chang and   
             Yongfeng Huang and   
                    Jing Lu and   
                    Yongqian Du   Privacy-preserving public auditing for
                                  secure data storage in fog-to-cloud
                                  computing  . . . . . . . . . . . . . . . 59--69
           Orhan Dagdeviren and   
     Vahid Khalilpour Akram and   
                     Ali Farzan   A Distributed Evolutionary algorithm for
                                  detecting minimum vertex cuts for
                                  wireless ad hoc and sensor networks  . . 70--81
                Kiran Ahuja and   
                    Arun Khosla   Network selection criterion for
                                  ubiquitous communication provisioning in
                                  smart cities for smart energy system . . 82--91
                    Li Yang and   
                 Yifang Zhi and   
                   Teng Wei and   
                    Shui Yu and   
                    Jianfeng Ma   Inference attack in Android activity
                                  based on program fingerprint . . . . . . 92--106
        Mehmet Fatih Tuysuz and   
                 Murat Ucan and   
                Ramona Trestian   A real-time power monitoring and
                                  energy-efficient network/interface
                                  selection tool for Android smartphones   107--121
                 Xiuwen Sun and   
                     Hao Li and   
                   Dan Zhao and   
                Xingxing Lu and   
                  Kaiyu Hou and   
                   Chengchen Hu   COIN: a fast packet inspection method
                                  over compressed traffic  . . . . . . . . 122--134


Journal of Network and Computer Applications
Volume 128, Number ??, February 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
     Salah-Eddine Belouanas and   
              Kim-Loan Thai and   
Prométhée Spathis and   
         Marcelo Dias de Amorim   Mobility-assisted offloading in
                                  centrally-coordinated cellular networks  1--10
                Lingling Xu and   
                     Jin Li and   
              Xiaofeng Chen and   
                  Wanhua Li and   
               Shaohua Tang and   
                    Hao-Tian Wu   Tc-PEDCKS: Towards time controlled
                                  public key encryption with delegatable
                                  conjunctive keyword search for Internet
                                  of Things  . . . . . . . . . . . . . . . 11--20
               Haomiao Yang and   
               Xiaofen Wang and   
                  Chun Yang and   
                   Xin Cong and   
                      You Zhang   Securing content-centric networks with
                                  content-based encryption . . . . . . . . 21--32
              Nour Moustafa and   
                 Jiankun Hu and   
                      Jill Slay   A holistic review of Network Anomaly
                                  Detection Systems: a comprehensive
                                  survey . . . . . . . . . . . . . . . . . 33--55
                 Wenjuan Li and   
                Weizhi Meng and   
                Zhiyuan Tan and   
                     Yang Xiang   Design of multi-view based email
                                  classification for IoT systems via
                                  semi-supervised learning . . . . . . . . 56--63
            Mainak Adhikari and   
            Sudarshan Nandy and   
               Tarachand Amgoth   Meta heuristic-based task deployment
                                  mechanism for load balancing in IaaS
                                  cloud  . . . . . . . . . . . . . . . . . 64--77
   Helder M. N. S. Oliveira and   
        Nelson L. S. da Fonseca   Routing, spectrum and core assignment
                                  algorithms for protection of space
                                  division multiplexing elastic optical
                                  networks . . . . . . . . . . . . . . . . 78--89
              Aparna Kumari and   
              Sudeep Tanwar and   
            Sudhanshu Tyagi and   
               Neeraj Kumar and   
             Reza M. Parizi and   
         Kim-Kwang Raymond Choo   Fog data analytics: a taxonomy and
                                  process model  . . . . . . . . . . . . . 90--104
                 Hanan Elazhary   Internet of Things (IoT), mobile cloud,
                                  cloudlet, mobile IoT, IoT cloud, fog,
                                  mobile edge, and edge emerging computing
                                  paradigms: Disambiguation and research
                                  directions . . . . . . . . . . . . . . . 105--140


Journal of Network and Computer Applications
Volume 129, Number ??, March 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Qingchen Zhang and   
             Changchuan Bai and   
                Zhikui Chen and   
                    Peng Li and   
                  Shuo Wang and   
                         He Gao   Smart Chinese medicine for hypertension
                                  treatment with a deep learning model . . 1--8
            Shahriar Kaisar and   
        Joarder Kamruzzaman and   
                  Gour Karmakar   A dynamic content distribution scheme
                                  for decentralized sharing in tourist
                                  hotspots . . . . . . . . . . . . . . . . 9--24
   Voundi Koe Arthur Sandor and   
                 Yaping Lin and   
                  Xiehua Li and   
                   Feng Lin and   
                   Shiwen Zhang   Efficient decentralized multi-authority
                                  attribute based encryption for mobile
                                  cloud data storage . . . . . . . . . . . 25--36
               Siguang Chen and   
               Shujun Zhang and   
              Xiaoyao Zheng and   
                    Xiukai Ruan   Layered adaptive compression design for
                                  efficient data collection in industrial
                                  wireless sensor networks . . . . . . . . 37--45
               Yanling Shao and   
                 Chunlin Li and   
                    Zhao Fu and   
                  Leyue Jia and   
                    Youlong Luo   Cost-effective replication management
                                  and scheduling in edge computing . . . . 46--61
               Haichun Zhao and   
                Xuanxia Yao and   
              Xuefeng Zheng and   
                    Tie Qiu and   
                 Huansheng Ning   User stateless privacy-preserving TPA
                                  auditing scheme for cloud storage  . . . 62--70
        Mittal K. Pedhadiya and   
           Rakesh Kumar Jha and   
                 Hetal G. Bhatt   Device to device communication: a survey 71--89


Journal of Network and Computer Applications
Volume 130, Number ??, March 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                   Gang Liu and   
                   Wei Quan and   
                  Nan Cheng and   
               Hongke Zhang and   
                        Shui Yu   Efficient DDoS attacks mitigation for
                                  stateful forwarding in Internet of
                                  Things . . . . . . . . . . . . . . . . . 1--13
             Firas D. Ahmed and   
            Mazlina Abdul Majid   Towards agent-based Petri net decision
                                  making modelling for cloud service
                                  composition: a literature survey . . . . 14--38
            Hamza Ben-Ammar and   
       Yassine Hadjadj-Aoul and   
             Gerardo Rubino and   
          Soraya Ait-Chellouche   On the performance analysis of
                                  distributed caching systems using a
                                  customizable Markov chain model  . . . . 39--51
          Menatalla Abououf and   
              Rabeb Mizouni and   
               Shakti Singh and   
                 Hadi Otrok and   
                     Anis Ouali   Multi-worker multi-task selection
                                  framework in mobile crowd sourcing . . . 52--62
          Pasquale Imputato and   
               Stefano Avallone   Enhancing the fidelity of network
                                  emulation through direct access to
                                  device buffers . . . . . . . . . . . . . 63--75
             Yuan-Cheng Lai and   
                  Ahsan Ali and   
        Md. Shohrab Hossain and   
                   Ying-Dar Lin   Performance modeling and analysis of TCP
                                  and UDP flows over software defined
                                  networks . . . . . . . . . . . . . . . . 76--88
          Rahul Kumar Verma and   
            K. K. Pattanaik and   
             Sourabh Bharti and   
                   Divya Saxena   In-network context inference in IoT
                                  sensory environment for efficient
                                  network resource utilization . . . . . . 89--103
            Antonio Celesti and   
             Antoine Bagula and   
            Ivanoe De Falco and   
       Pedro Brandão and   
               Giovanna Sannino   Emerging Networked Computer Applications
                                  for Telemedicine . . . . . . . . . . . . 104--106


Journal of Network and Computer Applications
Volume 131, Number ??, April 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 Chunlin Li and   
              Jianhang Tang and   
                    Youlong Luo   Dynamic multi-user computation
                                  offloading for wireless powered mobile
                                  edge computing . . . . . . . . . . . . . 1--15
                  Yuxin Liu and   
                 Anfeng Liu and   
                 Ning Zhang and   
                   Xiao Liu and   
                    Ming Ma and   
                     Yanling Hu   DDC: Dynamic duty cycle for improving
                                  delay and energy efficiency in wireless
                                  sensor networks  . . . . . . . . . . . . 16--27
             Wander Queiroz and   
       Miriam A. M. Capretz and   
                   Mario Dantas   An approach for SDN traffic monitoring
                                  based on big data techniques . . . . . . 28--39
         Tusher Chakraborty and   
               Novia Nurain and   
             Suraiya Tairin and   
         Taslim Arefin Khan and   
              Jannatun Noor and   
         Md. Rezwanul Islam and   
         A. B. M. Alim Al Islam   A new network paradigm for low-cost and
                                  lightweight real-time communication
                                  between train and rail track to detect
                                  missing and faulty rail blocks . . . . . 40--54
               Minghao Zhao and   
                 Chengyu Hu and   
               Xiangfu Song and   
                     Chuan Zhao   Towards dependable and trustworthy
                                  outsourced computing: a comprehensive
                                  survey and tutorial  . . . . . . . . . . 55--65
                  Bidi Ying and   
                    Amiya Nayak   Lightweight remote user authentication
                                  protocol for multi-server $5$G networks
                                  using self-certified public key
                                  cryptography . . . . . . . . . . . . . . 66--74
               Jiawei Huang and   
                 Shuping Li and   
                    Rui Han and   
                   Jianxin Wang   Receiver-driven fair congestion control
                                  for TCP outcast in data center networks  75--88
            Rishikesh Sahay and   
                Weizhi Meng and   
            Christian D. Jensen   The application of Software Defined
                                  Networking on securing computer
                                  networks: a survey . . . . . . . . . . . 89--108
           Muchtar Farkhana and   
       Abdullah Abdul Hanan and   
             Hassan Suhaidi and   
      Khader Ahamad Tajudin and   
            Zamli Kamal Zuhairi   Energy conservation of content routing
                                  through wireless broadcast control in
                                  NDN based MANET: a review  . . . . . . . 109--132


Journal of Network and Computer Applications
Volume 132, Number ??, April 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
               Jinyoung Han and   
                Daejin Choi and   
             Taejoong Chung and   
             Chen-Nee Chuah and   
              Hyun-chul Kim and   
             Ted Taekyoung Kwon   Predicting content consumption from
                                  content-to-content relationships . . . . 1--9
            P. Thulasiraman and   
               T. Haakensen and   
                    A. Callanan   Countering passive cyber attacks against
                                  sink nodes in tactical sensor networks
                                  using reactive route obfuscation . . . . 10--21
              Ruan D. Gomes and   
      Cesar Benavente-Peces and   
        Iguatemi E. Fonseca and   
             Marcelo S. Alencar   Adaptive and Beacon-based multi-channel
                                  protocol for Industrial Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 22--39
                Wenyuan Han and   
               Weijiang Liu and   
                Kaiye Zhang and   
                 Zhiyang Li and   
                    Zhaobin Liu   A protocol for detecting missing target
                                  tags in RFID systems . . . . . . . . . . 40--48
         Sharleen Joy Y. Go and   
    Cedric Angelo M. Festin and   
                  Wilson M. Tan   An SDN-based framework for improving the
                                  performance of underprovisioned IP Video
                                  Surveillance networks  . . . . . . . . . 49--74
                   Shi Dong and   
                       Raj Jain   Flow online identification method for
                                  the encrypted Skype  . . . . . . . . . . 75--85
              Xiangjie Kong and   
                  Yajie Shi and   
                    Shuo Yu and   
                Jiaying Liu and   
                       Feng Xia   Academic social networks: Modeling
                                  analysis, mining and applications  . . . 86--103
              Nouman Ashraf and   
            Muhammad Faizan and   
                 Waqar Asif and   
     Hassaan Khaliq Qureshi and   
                Adnan Iqbal and   
                  Marios Lestas   Energy management in harvesting enabled
                                  sensing nodes: Prediction and control    104--117
             Abhishek Gupta and   
           Alagan Anpalagan and   
     Glaucio H. S. Carvalho and   
            Ahmed S. Khwaja and   
                  Ling Guan and   
                 Isaac Woungang   RETRACTED: Prevailing and emerging cyber
                                  threats and security practices in
                                  IoT-Enabled smart grids: a survey  . . . 118--148


Journal of Network and Computer Applications
Volume 133, Number ??, May 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
         Masoume Jabbarifar and   
      Alireza Shameli-Sendi and   
                  Bettina Kemme   A scalable network-aware framework for
                                  cloud monitoring orchestration . . . . . 1--14
              Shanshan Wang and   
             Zhenxiang Chen and   
                  Qiben Yan and   
                    Bo Yang and   
                 Lizhi Peng and   
                  Zhongtian Jia   A mobile malware detection method using
                                  behavior features in network traffic . . 15--25
           Md. Tareq Mahmud and   
         Md. Obaidur Rahman and   
     Mohammad Mehedi Hassan and   
             Ahmad Almogren and   
                   Mengchu Zhou   An Efficient Cooperative Medium Access
                                  Control Protocol for Wireless IoT
                                  networks in Smart World System . . . . . 26--38
      Muluneh Mekonnen Tulu and   
                Ronghui Hou and   
                   Talha Younas   Vital nodes extracting method based on
                                  user's behavior in $5$G mobile social
                                  networks . . . . . . . . . . . . . . . . 39--50
                  Kehua Guo and   
                    Rui Cao and   
                Xiaoyan Kui and   
                 Jianhua Ma and   
                  Jian Kang and   
                        Tao Chi   LCC: Towards efficient label completion
                                  and correction for supervised medical
                                  image learning in smart diagnosis  . . . 51--59
         Mohammed Abdullahi and   
              Md Asri Ngadi and   
         Salihu Idi Dishing and   
Shafi'i Muhammad Abdulhamid and   
         Barroon Isma'eel Ahmad   An efficient symbiotic organisms search
                                  algorithm with chaotic optimization
                                  strategy for multi-objective task
                                  scheduling problems in cloud computing
                                  environment  . . . . . . . . . . . . . . 60--74
                Xiaolong Xu and   
               Yuancheng Li and   
                  Tao Huang and   
                   Yuan Xue and   
                   Kai Peng and   
                Lianyong Qi and   
                    Wanchun Dou   An energy-aware computation offloading
                                  method for smart edge computing in
                                  wireless metropolitan area networks  . . 75--85
       Alexandre B. Barreto and   
              Paulo C. G. Costa   Cyber-ARGUS --- a mission assurance
                                  framework  . . . . . . . . . . . . . . . 86--108
                  Jiawei Li and   
                Hongbin Luo and   
                 Shan Zhang and   
                  Hongyi Li and   
                        Fei Yan   Design and implementation of efficient
                                  control for incoming inter-domain
                                  traffic with Information-Centric
                                  Networking . . . . . . . . . . . . . . . 109--125


Journal of Network and Computer Applications
Volume 134, Number ??, May 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  Tong Wang and   
                  Leszek Lilien   Opportunistic topology control for ad
                                  hoc wireless network survivability
                                  enhancement based on LIMOS model . . . . 1--12
                 Lichuan Ma and   
                 Qingqi Pei and   
                 Yong Xiang and   
                   Lina Yao and   
                        Shui Yu   A reliable reputation computation
                                  framework for online items in E-commerce 13--25
                Huiying Hou and   
                     Jia Yu and   
                       Rong Hao   Cloud storage auditing with
                                  deduplication supporting different
                                  security levels according to data
                                  popularity . . . . . . . . . . . . . . . 26--39
                    Kai Guo and   
              Mingcong Yang and   
             Yongbing Zhang and   
                    Xiaohua Jia   Efficient resource assignment in mobile
                                  edge computing: a dynamic
                                  congestion-aware offloading approach . . 40--51
                 JiLiang Li and   
               WeiGuo Zhang and   
                Vivek Dabra and   
     Kim-Kwang Raymond Choo and   
                Saru Kumari and   
                 Dieter Hogrefe   AEP-PPA: an anonymous, efficient and
                                  provably-secure privacy-preserving
                                  authentication protocol for mobile
                                  services in smart cities . . . . . . . . 52--61
                Yongxin Liu and   
               Jianqiang Li and   
                 Zhong Ming and   
               Houbing Song and   
             Xiaoxiong Weng and   
                      Jian Wang   Domain-specific data mining for
                                  residents' transit pattern retrieval
                                  from incomplete information  . . . . . . 62--71
                    Su Peng and   
                 Fucai Zhou and   
                     Jin Li and   
                 Qiang Wang and   
                      Zifeng Xu   Efficient, dynamic and identity-based
                                  Remote Data Integrity Checking for
                                  multiple replicas  . . . . . . . . . . . 72--88
                   Gang Sun and   
                   Siyu Sun and   
                   Jian Sun and   
                Hongfang Yu and   
               Xiaojiang Du and   
                 Mohsen Guizani   Security and privacy preservation in
                                  fog-based crowd sensing on the Internet
                                  of Vehicles  . . . . . . . . . . . . . . 89--99
           Azadeh Zamanifar and   
                   Eslam Nazemi   RETRACTED: An approach for predicting
                                  health status in IoT health care . . . . 100--113


Journal of Network and Computer Applications
Volume 135, Number ??, June 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Xuxin Zhang and   
              Honglong Chen and   
                    Kai Lin and   
                 Zhibo Wang and   
                   Jiguo Yu and   
                       Leyi Shi   RMTS: a robust clock synchronization
                                  scheme for wireless sensor networks  . . 1--10
                  Tian Wang and   
                Yuzhu Liang and   
                 Weijia Jia and   
              Muhammad Arif and   
                 Anfeng Liu and   
                      Mande Xie   Coupling resource management based on
                                  fog computing in smart city systems  . . 11--19
   Muhammad Toaha Raza Khan and   
          Syed Hassan Ahmed and   
       Yalew Zelalem Jembre and   
                   Dongkyun Kim   An energy-efficient data collection
                                  protocol with AUV path planning in the
                                  Internet of Underwater Things  . . . . . 20--31
  Gonzalo De La Torre Parra and   
                   Paul Rad and   
         Kim-Kwang Raymond Choo   Implementation of deep packet inspection
                                  in smart grids and industrial Internet
                                  of Things: Challenge's and opportunities 32--46
                 Yingya Guo and   
              Zhiliang Wang and   
                  Han Zhang and   
                    Xia Yin and   
                Xingang Shi and   
                    Jianping Wu   Joint optimization of tasks placement
                                  and routing to minimize Coflow
                                  Completion Time  . . . . . . . . . . . . 47--61
              Thomas McGhin and   
     Kim-Kwang Raymond Choo and   
        Charles Zhechao Liu and   
                      Debiao He   Blockchain in healthcare applications:
                                  Research challenges and opportunities    62--75
             Asmaa Elsaeidy and   
       Kumudu S. Munasinghe and   
          Dharmendra Sharma and   
               Abbas Jamalipour   Intrusion detection in smart cities
                                  using Restricted Boltzmann Machines  . . 76--83
         Rúben Vales and   
          José Moura and   
                 Rui Marinheiro   Energy-aware and adaptive fog storage
                                  mechanism with data replication ruled by
                                  spatio-temporal content popularity . . . 84--96
                Adib Habbal and   
     Swetha Indudhar Goudar and   
                 Suhaidi Hassan   A Context-aware Radio Access Technology
                                  selection mechanism in $5$G mobile
                                  network for smart city applications  . . 97--107
               Giovanni Pau and   
           Alessandro Bazzi and   
   Miguel Elias M. Campista and   
                    Ali Balador   Towards $5$G and beyond for the Internet
                                  of UAVs, vehicles, smartphones, Sensors
                                  and Smart Objects  . . . . . . . . . . . 108--109


Journal of Network and Computer Applications
Volume 136, Number ??, June 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                    Xin Jin and   
                     Fei Gu and   
                Jianwei Niu and   
                    Shui Yu and   
                Zhenchao Ouyang   HRCal: an effective calibration system
                                  for heart rate detection during
                                  exercising . . . . . . . . . . . . . . . 1--10
                  Feng Wang and   
               Wenjun Jiang and   
                Guojun Wang and   
                       Song Guo   Influence maximization by leveraging the
                                  crowdsensing data in information
                                  diffusion network  . . . . . . . . . . . 11--21
               Deepak Singh and   
                   Bryan Ng and   
             Yuan-Cheng Lai and   
               Ying-Dar Lin and   
             Winston K. G. Seah   Analytical Modelling of Software and
                                  Hardware Switches with Internal Buffer
                                  in Software-Defined Networks . . . . . . 22--37
    Carlos Guimarães and   
        José Quevedo and   
               Rui Ferreira and   
              Daniel Corujo and   
                  Rui L. Aguiar   Exploring interoperability assessment
                                  for Future Internet Architecture's roll
                                  out  . . . . . . . . . . . . . . . . . . 38--56
                Xiaoping Wu and   
                 Xuefen Zhu and   
              Shenghui Wang and   
                      Lufeng Mo   Cooperative motion parameter estimation
                                  using RSS measurements in robotic sensor
                                  networks . . . . . . . . . . . . . . . . 57--70
           Celyn Birkinshaw and   
               Elpida Rouka and   
        Vassilios G. Vassilakis   Implementing an intrusion detection and
                                  prevention system using software-defined
                                  networking: Defending against
                                  port-scanning and denial-of-service
                                  attacks  . . . . . . . . . . . . . . . . 71--85
               Kashif Bilal and   
               Emna Baccour and   
                Aiman Erbad and   
                Amr Mohamed and   
                 Mohsen Guizani   Collaborative joint caching and
                                  transcoding in mobile edge networks  . . 86--99
              Ripon Patgiri and   
             Sabuzima Nayak and   
          Samir Kumar Borgohain   rDBF: a $r$-Dimensional Bloom Filter for
                                  massive scale membership query . . . . . 100--113
 Marco Antonio Sotelo Monge and   
Andrés Herranz González and   
Borja Lorenzo Fernández and   
        Diego Maestre Vidal and   
Guillermo Rius Garc\'ìa and   
            Jorge Maestre Vidal   Traffic-flow analysis for source-side
                                  DDoS recognition on $5$G environments    114--131
              Murat Karakus and   
                  Arjan Durresi   An economic framework for analysis of
                                  network architectures: SDN and MPLS
                                  cases  . . . . . . . . . . . . . . . . . 132--146


Journal of Network and Computer Applications
Volume 137, Number ??, July 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Mian Ahmad Jan and   
              Wenjing Zhang and   
             Muhammad Usman and   
                Zhiyuan Tan and   
             Fazlullah Khan and   
                      Entao Luo   SmartEdge: an end-to-end encryption
                                  framework for an edge-enabled smart city
                                  application  . . . . . . . . . . . . . . 1--10
                  Xiuwen Fu and   
                Haiqing Yao and   
        Octavian Postolache and   
                 Yongsheng Yang   Message forwarding for WSN-Assisted
                                  Opportunistic Network in disaster
                                  scenarios  . . . . . . . . . . . . . . . 11--24
          A. I. C. Mohideen and   
               M. Rajiullah and   
                  R. Secchi and   
               G. Fairhurst and   
               A. Brunstrom and   
                    F. Weinrank   Evaluating the impact of transport
                                  mechanisms on web performance for
                                  effective web access . . . . . . . . . . 25--34
            Mainak Adhikari and   
        Satish Narayana Srirama   Multi-objective accelerated particle
                                  swarm optimization with a
                                  container-based scheduling for
                                  Internet-of-Things in cloud environment  35--61
      Muhammad Usman Younus and   
              Saif ul Islam and   
                  Ihsan Ali and   
               Suleman Khan and   
          Muhammad Khurram Khan   A survey on software defined networking
                                  enabled smart buildings: Architecture
                                  challenges and use cases . . . . . . . . 62--77
       Rudraksh Shrivastava and   
      Konstantinos Samdanis and   
         Vincenzo Sciancalepore   Towards service-oriented soft spectrum
                                  slicing for $5$G TDD networks  . . . . . 78--90
                     Jin Li and   
         Francesco Palmieri and   
                      Qiben Yan   Special issue on advances in security
                                  and privacy in IoT . . . . . . . . . . . 91--92
               Ayesha Altaf and   
               Haider Abbas and   
                Faiza Iqbal and   
             Abdelouahid Derhab   Trust models of Internet of Smart
                                  Things: a survey, open issues, and
                                  future directions  . . . . . . . . . . . 93--111
                 Guolin Sun and   
       Daniel Ayepah-Mensah and   
                      Li Lu and   
                  Wei Jiang and   
                    Guisong Liu   Delay-aware content distribution via
                                  cell clustering and content placement
                                  for multiple tenants . . . . . . . . . . 112--126
     Beakal Gizachew Assefa and   
        Öznur Özkasap   A survey of energy efficiency in SDN:
                                  Software-base methods and optimization
                                  models . . . . . . . . . . . . . . . . . 127--143


Journal of Network and Computer Applications
Volume 138, Number ??, July 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Esraa M. Ghourab and   
               Mohamed Azab and   
                  Ahmed Mansour   Spatiotemporal diversification by
                                  moving-target defense through benign
                                  employment of false-data injection for
                                  dynamic, secure cognitive radio network  1--14
              Jun Young Kim and   
                     Wen Hu and   
               Dilip Sarkar and   
                     Sanjay Jha   Long-term secure management of large
                                  scale Internet of Things applications    15--26
              Sourav Mondal and   
                 Goutam Das and   
                    Elaine Wong   Cost-optimal cloudlet placement
                                  frameworks over fiber-wireless access
                                  networks for low-latency applications    27--38
           Abdullah Aydeger and   
               Nico Saputro and   
               Kemal Akkaya and   
                 Selcuk Uluagac   SDN-enabled recovery for Smart Grid
                                  teleprotection applications in
                                  post-disaster scenarios  . . . . . . . . 39--50
           Abishi Chowdhury and   
             Shital A. Raut and   
                Husnu S. Narman   DA-DRLS: Drift adaptive deep
                                  reinforcement learning based scheduling
                                  for IoT resource management  . . . . . . 51--65
             Abhishek Gupta and   
           Alagan Anpalagan and   
     Glaucio H. S. Carvalho and   
            Ahmed S. Khwaja and   
                  Ling Guan and   
                 Isaac Woungang   Retraction notice to Prevailing and
                                  emerging cyber threats and security
                                  practices in IoT-Enabled smart grids: a
                                  survey [J. Netw. Comput. Appl. \bf 132
                                  (2019) 118--148] . . . . . . . . . . . . 66--66


Journal of Network and Computer Applications
Volume 139, Number ??, August 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Mohammed Atiquzzaman   Editorial: New editors 2019  . . . . . . iii--v
             Vladimir Rocha and   
Anarosa Alves Franco Brandão   A scalable multiagent architecture for
                                  monitoring IoT devices . . . . . . . . . 1--14
                 Xiaowu Liu and   
                   Jiguo Yu and   
                 Weifeng Lv and   
                Dongxiao Yu and   
              Yinglong Wang and   
                          Yu Wu   Network security situation: From
                                  awareness to awareness-control . . . . . 15--30
         Md. Farhad Hossain and   
          Ayman Uddin Mahin and   
            Topojit Debnath and   
    Farjana Binte Mosharrof and   
          Khondoker Ziaul Islam   Recent research in cloud radio access
                                  network (C-RAN) for $5$G cellular
                                  systems --- a survey . . . . . . . . . . 31--48
       Reyhaneh Rabaninejad and   
    Mahmoud Ahmadian Attari and   
    Maryam Rajabzadeh Asaar and   
             Mohammad Reza Aref   Comments on a lightweight cloud auditing
                                  scheme: Security analysis and
                                  improvement  . . . . . . . . . . . . . . 49--56
               Shantanu Pal and   
           Michael Hitchens and   
         Vijay Varadharajan and   
                Tahiry Rabehaja   Policy-based access control for
                                  constrained healthcare resources in the
                                  context of the Internet of Things  . . . 57--74


Journal of Network and Computer Applications
Volume 140, Number ??, August 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
          Partha Pratim Ray and   
                Dinesh Dash and   
                    Debashis De   Edge computing for Internet of Things: a
                                  survey, e-healthcare case study and
                                  future direction . . . . . . . . . . . . 1--22
                     Yue Li and   
              Yongmin Zhang and   
                        Lin Cai   Optimal location of supplementary node
                                  in UAV surveillance system . . . . . . . 23--39
                   Jirui Li and   
                Xiaoyong Li and   
            Xianglong Cheng and   
                   Jie Yuan and   
                      Rui Zhang   A trustworthiness-enhanced reliable
                                  forwarding scheme in mobile Internet of
                                  Things . . . . . . . . . . . . . . . . . 40--53
                  Yali Zeng and   
                      Li Xu and   
                    Xu Yang and   
                     Xun Yi and   
                 Ibrahim Khalil   Privacy-preserving aggregation for
                                  cooperative spectrum sensing . . . . . . 54--64
          Prasanta Majumdar and   
                      Tanmay De   An alternative minimum cost route setup
                                  algorithm in a large EON for long-haul
                                  traffic under dynamic traffic grooming   65--86


Journal of Network and Computer Applications
Volume 141, Number ??, September 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Asad Arfeen and   
      Krzysztof Pawlikowski and   
               Don McNickle and   
                 Andreas Willig   The role of the Weibull distribution in
                                  modelling traffic in Internet access and
                                  backbone core networks . . . . . . . . . 1--22
            Surbhi Saraswat and   
             Vishal Agarwal and   
         Hari Prabhat Gupta and   
               Rahul Mishra and   
               Ashish Gupta and   
                   Tanima Dutta   Challenges and solutions in Software
                                  Defined Networking: a survey . . . . . . 23--58
              Md Osman Gani and   
           Taskina Fayezeen and   
       Richard J. Povinelli and   
             Roger O. Smith and   
              Muhammad Arif and   
            Ahmed J. Kattan and   
            Sheikh Iqbal Ahamed   A light weight smartphone based human
                                  activity recognition system with high
                                  accuracy . . . . . . . . . . . . . . . . 59--72
                Yanbing Liu and   
                Xiaowei Qin and   
                   Ting Zhu and   
               Xiaohui Chen and   
                        Guo Wei   Improve MPTCP with SDN: From the
                                  perspective of resource pooling  . . . . 73--85
                   Long Luo and   
                Hongfang Yu and   
                 Shouxi Luo and   
                  Zilong Ye and   
               Xiaojiang Du and   
                 Mohsen Guizani   Scalable explicit path control in
                                  software-defined networks  . . . . . . . 86--103
                 Shouxi Luo and   
                Hongfang Yu and   
                   Long Luo and   
                       Lemin Li   Customizable network update planning in
                                  SDN  . . . . . . . . . . . . . . . . . . 104--115


Journal of Network and Computer Applications
Volume 142, Number ??, September 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Mohammed Atiquzzaman   Editorial: 2018 best paper awards  . . . iii--iii
               Ankita Atrey and   
     Gregory Van Seghbroeck and   
               Higinio Mora and   
             Filip De Turck and   
                Bruno Volckaert   SpeCH: a scalable framework for data
                                  placement of data-intensive services in
                                  geo-distributed clouds . . . . . . . . . 1--14
                Xuyang Jing and   
              Jingjing Zhao and   
              Qinghua Zheng and   
                  Zheng Yan and   
                 Witold Pedrycz   A reversible sketch-based method for
                                  detecting and mitigating amplification
                                  attacks  . . . . . . . . . . . . . . . . 15--24
      Erfan Mozaffari Ahrar and   
           Mohammad Nassiri and   
              Fabrice Theoleyre   Multipath aware scheduling for high
                                  reliability and fault tolerance in low
                                  power industrial networks  . . . . . . . 25--36
           Omar Abdel Wahab and   
                Nadjia Kara and   
              Claes Edstrom and   
                   Yves Lemieux   MAPLE: a Machine Learning Approach for
                                  Efficient Placement and Adjustment of
                                  Virtual Network Functions  . . . . . . . 37--50
               Xincheng Tan and   
                     Yi Xie and   
                 Haishou Ma and   
               Shunzheng Yu and   
                     Jiankun Hu   Recognizing the content types of network
                                  traffic based on a hybrid DNN-HMM model  51--62
  Soroush Karimian-Aliabadi and   
             Danilo Ardagna and   
       Reza Entezari-Maleki and   
           Eugenio Gianniti and   
                   Ali Movaghar   Analytical composite performance models
                                  for Big Data applications  . . . . . . . 63--75
      Mostafa Ghobaei-Arani and   
          Reihaneh Khorsand and   
       Mohammadreza Ramezanpour   An autonomous resource provisioning
                                  framework for massively multiplayer
                                  online games in cloud environment  . . . 76--97
             Shie-Yuan Wang and   
               Chia-Ming Wu and   
                Yi-Bing Lin and   
               Ching-Chun Huang   High-speed data-plane packet aggregation
                                  and disaggregation by P4 switches  . . . 98--110
         Fakhrosadat Fanian and   
      Marjan Kuchaki Rafsanjani   Cluster-based routing protocols in
                                  wireless sensor networks: a survey based
                                  on methodology . . . . . . . . . . . . . 111--142


Journal of Network and Computer Applications
Volume 143, Number ??, October 1, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Mohit Kumar and   
               S. C. Sharma and   
               Anubhav Goel and   
                    S. P. Singh   A comprehensive survey for scheduling
                                  techniques in cloud computing  . . . . . 1--33
           Mahadev A. Gawas and   
               Sweta S. Govekar   A novel selective cross layer based
                                  routing scheme using ACO method for
                                  vehicular networks . . . . . . . . . . . 34--46
         Mani Shekhar Gupta and   
                  Krishan Kumar   Progression on spectrum sensing for
                                  cognitive radio networks: a survey,
                                  classification, challenges and future
                                  research issues  . . . . . . . . . . . . 47--76
               Meiguang Liu and   
                  Lei Zhang and   
               Panlong Yang and   
                 Liangfu Lu and   
                   Liangyi Gong   Wi-Run: Device-free step estimation
                                  system with commodity Wi-Fi  . . . . . . 77--88
                 Alexis Huf and   
                 Frank Siqueira   Composition of heterogeneous web
                                  services: a systematic review  . . . . . 89--110
             Abhishek Singh and   
               Ashish Payal and   
                 Sourabh Bharti   A walkthrough of the emerging IoT
                                  paradigm: Visualizing inside
                                  functionalities, key features, and open
                                  issues . . . . . . . . . . . . . . . . . 111--151
                 Chunlin Li and   
                YaPing Wang and   
                    Yi Chen and   
                    Youlong Luo   Energy-efficient fault-tolerant replica
                                  management policy with deadline and
                                  budget constraints in edge-cloud
                                  environment  . . . . . . . . . . . . . . 152--166
         Shailendra Rathore and   
            Byung Wook Kwon and   
                 Jong Hyuk Park   BlockSecIoTNet: Blockchain-based
                                  decentralized security architecture for
                                  IoT network  . . . . . . . . . . . . . . 167--177
               Khalid Hasan and   
          Kamanashis Biswas and   
            Khandakar Ahmed and   
             Nazmus S. Nafi and   
                Md Saiful Islam   A comprehensive review of wireless body
                                  area network . . . . . . . . . . . . . . 178--198


Journal of Network and Computer Applications
Volume 144, Number ??, October 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Jiun Terng Liew and   
       Fazirulhisyam Hashim and   
               Aduwati Sali and   
       Mohd Fadlee A. Rasid and   
               Abbas Jamalipour   Probability-based opportunity dynamic
                                  adaptation (PODA) of contention window
                                  for home M2M networks  . . . . . . . . . 1--12
          Shubhani Aggarwal and   
            Rajat Chaudhary and   
      Gagangeet Singh Aujla and   
               Neeraj Kumar and   
     Kim-Kwang Raymond Choo and   
               Albert Y. Zomaya   Blockchain for smart communities:
                                  Applications challenges and
                                  opportunities  . . . . . . . . . . . . . 13--48
              Hailong Huang and   
           Andrey V. Savkin and   
                  Ming Ding and   
             Mohamed Ali Kaafar   Optimized deployment of drone base
                                  station to improve user experience in
                                  cellular networks  . . . . . . . . . . . 49--58
        Deepsubhra Guha Roy and   
                   Puja Das and   
                Debashis De and   
                 Rajkumar Buyya   QoS-aware secure transaction framework
                                  for Internet of Things using blockchain
                                  mechanism  . . . . . . . . . . . . . . . 59--78
             Sowmya Ravidas and   
            Alexios Lekidis and   
              Federica Paci and   
                 Nicola Zannone   Access control in Internet-of-Things: a
                                  survey . . . . . . . . . . . . . . . . . 79--101
            Ching-Hao Chang and   
               Ying-Dar Lin and   
                Yu-Kuen Lai and   
                 Yuan-Cheng Lai   A scalable and accurate distributed
                                  traffic generator with Fourier
                                  transformed distribution over multiple
                                  commodity platforms  . . . . . . . . . . 102--117
               Sonam Maurya and   
           Vinod Kumar Jain and   
         Debanjan Roy Chowdhury   Delay aware energy efficient reliable
                                  routing for data transmission in
                                  heterogeneous mobile sink wireless
                                  sensor network . . . . . . . . . . . . . 118--137
            Ayoub Benayache and   
            Azeddine Bilami and   
                Sami Barkat and   
              Pascal Lorenz and   
                 Hafnaoui Taleb   MsM: a microservice middleware for smart
                                  WSN-based IoT application  . . . . . . . 138--154
               Naveen Kumar and   
                Abdul Aleem and   
       Ashutosh Kumar Singh and   
            Shashank Srivastava   NBP: Namespace-based privacy to counter
                                  timing-based attack in named data
                                  networking . . . . . . . . . . . . . . . 155--170
              Harkiran Kaur and   
                Sandeep K. Sood   Fog-assisted IoT-enabled scalable
                                  network infrastructure for wildfire
                                  surveillance . . . . . . . . . . . . . . 171--183


Journal of Network and Computer Applications
Volume 145, Number ??, 2019

             M. Mehdi Afsar and   
                 Mohamed Younis   A load-balanced cross-layer design for
                                  energy-harvesting sensor networks  . . . 
                Ashar Ahmad and   
              Muhammad Saad and   
                  Aziz Mohaisen   Secure and transparent audit logs with
                                  BlockAudit . . . . . . . . . . . . . . . 
Abdelmuttlib Ibrahim Abdalla Ahmed and   
      Siti Hafizah Ab Hamid and   
              Abdullah Gani and   
               Suleman Khan and   
          Muhammad Khurram Khan   Trust and reputation for Internet of
                                  Things: Fundamentals, taxonomy, and open
                                  research challenges  . . . . . . . . . . 
         Melchizedek Alipio and   
      Nestor Michael Tiglao and   
              Fawaz Bokhari and   
                  Salman Khalid   TCP incast solutions in data center
                                  networks: a classification and survey    
                      Anonymous   Editorial Board  . . . . . . . . . . . . 


Journal of Network and Computer Applications
Volume 146, Number ??, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . 
                      Anonymous   Publisher's note . . . . . . . . . . . . 
     Narmeen Zakaria Bawany and   
               Jawwad A. Shamsi   SEAL: SDN based secure and agile
                                  framework for protecting smart city
                                  applications from DDoS attacks . . . . . 
                 Sheng Feng and   
                Shigen Shen and   
              Longjun Huang and   
           Adam C. Champion and   
                    Shui Yu and   
               Chengdong Wu and   
                  Yunzhou Zhang   Three-dimensional robot localization
                                  using cameras in wireless multimedia
                                  sensor networks  . . . . . . . . . . . . 
          Anatoliy Gorbenko and   
       Alexander Romanovsky and   
                  Olga Tarasyuk   Fault tolerant Internet computing:
                                  Benchmarking and modelling trade-offs
                                  between availability, latency and
                                  consistency  . . . . . . . . . . . . . . 
          Mohammad Goudarzi and   
      Marimuthu Palaniswami and   
                 Rajkumar Buyya   A fog-driven dynamic resource allocation
                                  technique in ultra dense femtocell
                                  networks . . . . . . . . . . . . . . . . 
             Mordechai Guri and   
                 Rami Puzis and   
     Kim-Kwang Raymond Choo and   
         Sergey Rubinshtein and   
                 Gabi Kedma and   
                  Yuval Elovici   Using malware for the greater good:
                                  Mitigating data leakage  . . . . . . . . 
        Ana Serrano Mamolar and   
Pablo Salvá-Garc\'ìa and   
   Enrique Chirivella-Perez and   
             Zeeshan Pervez and   
     Jose M. Alcaraz Calero and   
                        Qi Wang   Autonomic protection of multi-tenant
                                  $5$G mobile networks against UDP
                                  flooding DDoS attacks  . . . . . . . . . 
         Ivan Marsa-Maestre and   
 Jose Manuel Gimenez-Guzman and   
                David Orden and   
          Enrique de la Hoz and   
                     Mark Klein   REACT: reactive resilience for critical
                                  infrastructures using graph-coloring
                                  techniques . . . . . . . . . . . . . . . 
               Cem Mergenci and   
              Ibrahim Korpeoglu   Generic resource allocation metrics and
                                  methods for heterogeneous cloud
                                  infrastructures  . . . . . . . . . . . . 
        Partha Sarathi Paul and   
      Bishakh Chandra Ghosh and   
        Hridoy Sankar Dutta and   
                Kingshuk De and   
            Arka Prava Basu and   
        Prithviraj Pramanik and   
                 Sujoy Saha and   
         Sandip Chakraborty and   
              Niloy Ganguly and   
                  Subrata Nandi   CRIMP: Here crisis mapping goes offline  
      Mustapha Reda Senouci and   
             Abdelhamid Mellouk   A robust uncertainty-aware cluster-based
                                  deployment approach for WSNs: Coverage,
                                  connectivity, and lifespan . . . . . . . 
                Shigen Shen and   
               Haiping Zhou and   
                 Sheng Feng and   
              Longjun Huang and   
                Jianhua Liu and   
                    Shui Yu and   
                     Qiying Cao   HSIRD: a model for characterizing
                                  dynamics of malware diffusion in
                                  heterogeneous WSNs . . . . . . . . . . . 
               Xincheng Tan and   
                     Yi Xie and   
                 Haishou Ma and   
               Shunzheng Yu and   
                     Jiankun Hu   Corrigendum to ``Recognizing the content
                                  types of network traffic based on a
                                  hybrid DNN-HMM model'' [J. Netw. Comput.
                                  Appl. \bf 142 (2019) 51--62] . . . . . . 
             Fulvio Valenza and   
             Serena Spinoso and   
                 Riccardo Sisto   Formally specifying and checking
                                  policies and anomalies in service
                                  function chaining  . . . . . . . . . . . 
                 Yanjun Yan and   
               Guangjie Han and   
                      Huihui Xu   A survey on secure routing protocols for
                                  satellite network  . . . . . . . . . . . 
                    Bo Yang and   
                      Bo Li and   
             Zhongjiang Yan and   
             Der-Jiunn Deng and   
                       Mao Yang   Performance analysis of multi-channel
                                  MAC with single transceiver for the next
                                  generation WLAN  . . . . . . . . . . . . 
           Azadeh Zamanifar and   
                   Eslam Nazemi   Retraction notice to ``An approach for
                                  predicting health status in IoT health
                                  care'' [YJNCA \bf 134 (2019) 100--113]   
              Chuanji Zhang and   
      Harshvardhan P. Joshi and   
            George F. Riley and   
               Steven A. Wright   Towards a virtual network function
                                  research agenda: a systematic literature
                                  review of VNF design considerations  . . 


Journal of Network and Computer Applications
Volume 147, Number ??, December 1, 2019

                      Anonymous   1 December 2019  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Masoud Asghari and   
              Saleh Yousefi and   
                   Dusit Niyato   Pricing strategies of IoT wide area
                                  network service providers with
                                  complementary services included  . . . . ??
               Jamila Manan and   
                 Atiq Ahmed and   
                Ihsan Ullah and   
  Le\"\ila Merghem-Boulahia and   
             Dominique Ga\"\iti   Distributed intrusion detection scheme
                                  for next generation networks . . . . . . ??
               Maryam Imani and   
            Gholam Ali Montazer   A survey of emotion recognition methods
                                  with emphasis on E-Learning environments ??
              Sedef Demirci and   
                Seref Sagiroglu   Optimal placement of virtual network
                                  functions in software defined networks:
                                  a survey . . . . . . . . . . . . . . . . ??
         Hamed Alimohammadi and   
                 Mahmood Ahmadi   Clustering-based many-field packet
                                  classification in Software-Defined
                                  Networking . . . . . . . . . . . . . . . ??
               Shubhra Jain and   
            K. K. Pattanaik and   
                  Anupam Shukla   QWRP: Query-driven virtual wheel based
                                  routing protocol for wireless sensor
                                  networks with mobile sink  . . . . . . . ??
                   Yinbo Yu and   
              Jianfeng Yang and   
             Chengcheng Guo and   
                 Hong Zheng and   
                   Jiancheng He   Joint optimization of service request
                                  routing and instance placement in the
                                  microservice system  . . . . . . . . . . ??
              Phi Le Nguyen and   
                Kien Nguyen and   
                     Huy Vu and   
                     Yusheng Ji   TELPAC: a time and energy efficient
                                  protocol for locating and patching
                                  coverage holes in WSNs . . . . . . . . . ??
                    Hua Dai and   
                Xuelong Dai and   
                     Xun Yi and   
                  Geng Yang and   
                  Haiping Huang   Semantic-aware multi-keyword ranked
                                  search scheme over encrypted cloud data  ??
                 Gauhar Ali and   
               Naveed Ahmad and   
                    Yue Cao and   
              Qazi Ejaz Ali and   
                 Fazal Azim and   
            Haitham Cruickshank   BCON: Blockchain based access CONtrol
                                  across multiple conflict of interest
                                  domains  . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 148, Number ??, December 15, 2019

                      Anonymous   15 December 2019 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Amar Abane and   
             Mehammed Daoui and   
           Samia Bouzefrane and   
               Paul Muhlethaler   A Lightweight Forwarding Strategy for
                                  Named Data Networking in Low-end IoT . . ??
          Simon Yusuf Enoch and   
                Jin B. Hong and   
                 Dong Seong Kim   Security modelling and assessment of
                                  modern networks using time independent
                                  Graphical Security Models  . . . . . . . ??
              Lahlou Laaziz and   
                Nadjia Kara and   
              Rafi Rabipour and   
              Claes Edstrom and   
                   Yves Lemieux   FASTSCALE: a fast and scalable
                                  evolutionary algorithm for the joint
                                  placement and chaining of virtualized
                                  services . . . . . . . . . . . . . . . . ??
       Souhila Benmakrelouf and   
                Nadjia Kara and   
                Hanine Tout and   
              Rafi Rabipour and   
                  Claes Edstrom   Resource needs prediction in virtualized
                                  systems: Generic proactive and
                                  self-adaptive solution . . . . . . . . . ??
             Francesco Palmieri   Network anomaly detection based on
                                  logistic regression of nonlinear chaotic
                                  invariants . . . . . . . . . . . . . . . ??
   Christos Anagnostopoulos and   
             Kostas Kolomvatsos   An intelligent, time-optimized
                                  monitoring scheme for edge nodes . . . . ??
        Anandarup Mukherjee and   
                Sudip Misra and   
     Narendra Singh Raghuwanshi   A survey of unmanned aerial sensing
                                  solutions in precision agriculture . . . ??
  El Arbi Abdellaoui Alaoui and   
             Hanane Zekkori and   
                   Said Agoujil   Hybrid delay tolerant network routing
                                  protocol for heterogeneous networks  . . ??
                 Shaonan Li and   
                   Wenyu Qu and   
               Chunfeng Liu and   
                    Tie Qiu and   
                      Zhao Zhao   Survey on high reliability wireless
                                  communication for underwater sensor
                                  networks . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 149, Number ??, January 1, 2020

                      Anonymous   1 January 2020 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   Thank You Reviewers  . . . . . . . . . . ??
                  Dapeng Wu and   
                 Bingxu Liu and   
                  Qing Yang and   
                     Ruyan Wang   Social-aware cooperative caching
                                  mechanism in mobile social networks  . . ??
                     Fei Gu and   
                Jianwei Niu and   
                Landu Jiang and   
                    Xue Liu and   
           Mohammed Atiquzzaman   Survey of the low power wide area
                                  network technologies . . . . . . . . . . ??
             David A. Monge and   
               Elina Pacini and   
            Cristian Mateos and   
               Enrique Alba and   
    Carlos García Garino   CMI: an online multi-objective genetic
                                  autoscaler for scientific and
                                  engineering workflows in cloud
                                  infrastructures with unreliable virtual
                                  machines . . . . . . . . . . . . . . . . ??
                 Qiuyun Lyu and   
                  Yizhen Qi and   
             Xiaochen Zhang and   
                Huaping Liu and   
                Qiuhua Wang and   
                     Ning Zheng   SBAC: a secure blockchain-based access
                                  control framework for
                                  information-centric networking . . . . . ??
             Amritraj Singh and   
                Kelly Click and   
             Reza M. Parizi and   
                   Qi Zhang and   
           Ali Dehghantanha and   
         Kim-Kwang Raymond Choo   Sidechain technologies in blockchain
                                  networks: an examination and
                                  state-of-the-art review  . . . . . . . . ??
              Mayssa Ghribi and   
                    Aref Meddeb   Survey and taxonomy of MAC, routing and
                                  cross layer protocols using wake-up
                                  radio  . . . . . . . . . . . . . . . . . ??
           Jaiprakash Nagar and   
           S. K. Chaturvedi and   
                    Sieteng Soh   An analytical model to estimate the
                                  performance metrics of a finite multihop
                                  network deployed in a rectangular region ??
           Nusrat J. Shoumy and   
                Li-Minn Ang and   
             Kah Phooi Seng and   
       D. M. Motiur Rahaman and   
                    Tanveer Zia   Multimodal big data affective analytics:
                                  a comprehensive survey using text,
                                  audio, visual and physiological signals  ??
                 Hong Zhong and   
                 Zhanfei Li and   
                    Jie Cui and   
                    Yue Sun and   
                         Lu Liu   Efficient dynamic multi-keyword fuzzy
                                  search over encrypted cloud data . . . . ??
          Jayasree Sengupta and   
               Sushmita Ruj and   
                  Sipra Das Bit   A Comprehensive Survey on Attacks,
                                  Security Issues and Blockchain Solutions
                                  for IoT and IIoT . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 150, Number ??, January 15, 2020

                      Anonymous   15 January 2020  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Xiong Wang and   
                 Yukun Yang and   
                  Hanyu Liu and   
                   Jing Ren and   
                Shizhong Xu and   
                 Sheng Wang and   
                        Shui Yu   Efficient measurement of round-trip link
                                  delays in software-defined networks  . . ??
         Mohammad Alauthman and   
               Nauman Aslam and   
      Mouhammd Al-Kasassbeh and   
               Suleman Khan and   
             Ahmad Al-Qerem and   
         Kim-Kwang Raymond Choo   An efficient reinforcement
                                  learning-based Botnet detection approach ??
               Ahmed S. Ali and   
          Korany R. Mahmoud and   
               Khaled M. Naguib   Optimal caching policy for wireless
                                  content delivery in D2D networks . . . . ??
          Alejandro Canovas and   
                Albert Rego and   
               Oscar Romero and   
                   Jaime Lloret   A robust multimedia traffic SDN-Based
                                  management system using patterns and
                                  models of QoE estimation with BRNN . . . ??
              Ayaz Ali Khan and   
           Muhammad Zakarya and   
                 Rahim Khan and   
             Izaz Ur Rahman and   
               Mukhtaj Khan and   
            Atta ur Rehman Khan   An energy, performance efficient
                                  resource consolidation scheme for
                                  heterogeneous cloud datacenters  . . . . ??
          Mohamed Ali Kandi and   
             Hicham Lakhlef and   
    Abdelmadjid Bouabdallah and   
                 Yacine Challal   A versatile Key Management protocol for
                                  secure Group and Device-to-Device
                                  Communication in the Internet of Things  ??
         Muhammad Asif Khan and   
               Ridha Hamila and   
      Nasser Ahmed Al-Emadi and   
            Serkan Kiranyaz and   
                 Moncef Gabbouj   Real-time throughput prediction for
                                  cognitive Wi-Fi networks . . . . . . . . ??
             Mohammad Wazid and   
            Ashok Kumar Das and   
        Vivekananda Bhat K. and   
        Athanasios V. Vasilakos   LAM-CIoT: Lightweight authentication
                                  mechanism in cloud-based IoT environment ??
                   Yan Chen and   
                Yanjing Sun and   
                  Nannan Lu and   
                       Bin Wang   Channel-reserved medium access control
                                  for edge computing based IoT . . . . . . ??


Journal of Network and Computer Applications
Volume 151, Number ??, February 1, 2020

                      Anonymous   1 February 2020  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Stela Kucek and   
                  Maria Leitner   An Empirical Survey of Functions and
                                  Configurations of Open-Source Capture
                                  the Flag (CTF) Environments  . . . . . . ??
                Haijun Geng and   
                  Han Zhang and   
                Xingang Shi and   
              Zhiliang Wang and   
                        Xia Yin   Efficient computation of loop-free
                                  alternates . . . . . . . . . . . . . . . ??
               Jingjing Guo and   
                 Chunlin Li and   
                    Yi Chen and   
                    Youlong Luo   On-demand resource provision based on
                                  load estimation and service expenditure
                                  in edge cloud environment  . . . . . . . ??
              Mahdi Rabbani and   
               Yong Li Wang and   
          Reza Khoshkangini and   
              Hamed Jelodar and   
                 Ruxin Zhao and   
                        Peng Hu   A hybrid machine learning approach for
                                  malicious behaviour detection and
                                  recognition in cloud computing . . . . . ??
               Guangjie Han and   
                Haofei Guan and   
                 Zeren Zhou and   
                  Zhifan Li and   
                 Sammy Chan and   
                    Wenbo Zhang   CTRA: a complex terrain region-avoidance
                                  charging algorithm in Smart World  . . . ??


Journal of Network and Computer Applications
Volume 152, Number ??, February 15, 2020

                      Anonymous   15 February 2020 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Akbar Majidi and   
         Nazila Jahanbakhsh and   
               Xiaofeng Gao and   
                Jiaqi Zheng and   
                    Guihai Chen   ECN$^+$: a marking-aware optimization
                                  for ECN threshold via per-port in Data
                                  Center Networks  . . . . . . . . . . . . ??
           Farkhana Muchtar and   
       Abdul Hanan Abdullah and   
         Mosleh Al-Adhaileh and   
            Kamal Zuhairi Zamli   Energy conservation strategies in Named
                                  Data Networking based MANET using
                                  congestion control: a review . . . . . . ??
                 Chunlin Li and   
              Jianhang Tang and   
                     Tao Ma and   
                 Xihao Yang and   
                    Youlong Luo   Load balance based workflow job
                                  scheduling algorithm in distributed
                                  cloud  . . . . . . . . . . . . . . . . . ??
              Mehdi Nobakht and   
                  Yulei Sui and   
          Aruna Seneviratne and   
                         Wen Hu   PGFit: Static permission analysis of
                                  health and fitness apps in IoT
                                  programming frameworks . . . . . . . . . ??
                    Ru Wang and   
             Muhammad Imran and   
                  Kashif Saleem   A microservice recommendation mechanism
                                  based on mobile architecture . . . . . . ??


Journal of Network and Computer Applications
Volume 153, Number ??, March 1, 2020

                      Anonymous   1 March 2020 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
      Leonardo Richter Bays and   
       Luciano Paschoal Gaspary   Reality shock in virtual network
                                  embedding: Flexibilizing demands for
                                  dealing with multiple operational
                                  requirements in SDNs . . . . . . . . . . ??
              Daniel Gibert and   
               Carles Mateu and   
                   Jordi Planes   The rise of machine learning for
                                  detection and classification of malware:
                                  Research developments, trends and
                                  challenges . . . . . . . . . . . . . . . ??
                 Weihong Wu and   
                  Jiang Liu and   
                      Tao Huang   The source-multicast: a sender-initiated
                                  multicast member management mechanism in
                                  SRv6 networks  . . . . . . . . . . . . . ??
             Morteza Rahimi and   
        Maryam Songhorabadi and   
          Mostafa Haghi Kashani   Fog-based smart homes: a systematic
                                  review . . . . . . . . . . . . . . . . . ??
                 Liang Yang and   
                   Bryan Ng and   
         Winston K. G. Seah and   
                   Deepak Singh   Performance evaluation of equivalent
                                  forwarding sets in software defined
                                  networking . . . . . . . . . . . . . . . ??
                 Xiuwen Sun and   
                     Hao Li and   
                   Dan Zhao and   
                Xingxing Lu and   
                  Kaiyu Hou and   
                   Chengchen Hu   Corrigendum to ``COIN: a fast packet
                                  inspection method over compressed
                                  traffic'' [J. Netw. Comput. Appl. \bf
                                  127 (2019) 122--134] . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 154, Number ??, March 15, 2020

                      Anonymous   15 March 2020  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Ye Wang and   
                 Qingbao Li and   
               Zhifeng Chen and   
                 Ping Zhang and   
                   Guimin Zhang   A Survey of Exploitation Techniques and
                                  Defenses for Program Data Attacks  . . . ??
                  Zeli Wang and   
                  Weiqi Dai and   
     Kim-Kwang Raymond Choo and   
                    Hai Jin and   
                     Deqing Zou   FSFC: an input filter-based secure
                                  framework for smart contract . . . . . . ??
                  Lang Fang and   
             Xiaoning Zhang and   
                Keshav Sood and   
               Yunqing Wang and   
                        Shui Yu   Reliability-aware virtual network
                                  function placement in carrier networks   ??
        Muhammad Fahad Khan and   
          Kok-Lim Alvin Yau and   
           Rafidah MD. Noor and   
             Muhammad Ali Imran   Survey and taxonomy of clustering
                                  algorithms in 5G . . . . . . . . . . . . ??
            Ali Mohsenzadeh and   
        Amir Jalaly Bidgoly and   
                Yaghoub Farjami   A novel reward and penalty trust
                                  evaluation model based on confidence
                                  interval using Petri Net . . . . . . . . ??
               Hamid Tahaei and   
              Firdaus Afifi and   
               Adeleh Asemi and   
                  Faiz Zaki and   
               Nor Badrul Anuar   The rise of traffic classification in
                                  IoT networks: a survey . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 155, Number ??, April 1, 2020

                      Anonymous   1 April 2020 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
        Abdulaziz Al-Darrab and   
          Ibrahim Al-Darrab and   
                     Ali Rushdi   Software-Defined Networking load
                                  distribution technique for an Internet
                                  service provider . . . . . . . . . . . . ??
          Bodhi Chakraborty and   
              Shekhar Verma and   
           Krishna Pratap Singh   Temporal Differential Privacy in
                                  Wireless Sensor Networks . . . . . . . . ??
                      Bo Yi and   
               Xingwei Wang and   
                  Min Huang and   
                      Yong Zhao   Novel resource allocation mechanism for
                                  SDN-based data center networks . . . . . ??
                  Yulong Fu and   
                 Hanlu Chen and   
              Qinghua Zheng and   
                  Zheng Yan and   
              Raimo Kantola and   
                Xuyang Jing and   
                    Jin Cao and   
                         Hui Li   An Adaptive Security Data Collection and
                                  Composition Recognition method for
                                  security measurement over LTE/LTE-A
                                  networks . . . . . . . . . . . . . . . . ??
                 Luning Liu and   
                Zhaoming Lu and   
                 Luhan Wang and   
                   Xin Chen and   
                  Xiangming Wen   Large-volume data dissemination for
                                  cellular-assisted automated driving with
                                  edge intelligence  . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 156, Number ??, April 15, 2020

                      Anonymous   15 April 2020  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Zhenchun Wei and   
               Chengkai Xia and   
               Xiaohui Yuan and   
                 Renhao Sun and   
                Zengwei Lyu and   
                    Lei Shi and   
                     Jianjun Ji   The path planning scheme for joint
                                  charging and data collection in WRSNs: a
                                  multi-objective optimization method  . . ??
               Zohaib Latif and   
              Kashif Sharif and   
                     Fan Li and   
          Md Monjurul Karim and   
               Sujit Biswas and   
                        Yu Wang   A comprehensive survey of interface
                                  protocols for software defined networks  ??
                  Yang Xiao and   
                 Qingqi Pei and   
                   Lina Yao and   
                    Shui Yu and   
                    Lei Bai and   
                   Xianzhi Wang   An enhanced probabilistic fairness-aware
                                  group recommendation by incorporating
                                  social activeness  . . . . . . . . . . . ??
           Abbas Yazdinejad and   
             Reza M. Parizi and   
               Ali Bohlooli and   
           Ali Dehghantanha and   
         Kim-Kwang Raymond Choo   A high-performance framework for a
                                  network programmable packet processor
                                  using P4 and FPGA  . . . . . . . . . . . ??
                Waqas Rehan and   
             Stefan Fischer and   
                 Maaz Rehan and   
               Yasser Mawad and   
                 Shahzad Saleem   QCM2R: a QoS-aware cross-layered
                                  multichannel multisink routing protocol
                                  for stream based wireless sensor
                                  networks . . . . . . . . . . . . . . . . ??
    Md Zakirul Alam Bhuiyan and   
                Guojun Wang and   
                      Zhong Fan   Smart world systems, applications, and
                                  technologies . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 157, Number ??, May 1, 2020

                      Anonymous   1 May 2020 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Guolin Sun and   
                  Kun Xiong and   
       Gordon Owusu Boateng and   
                Guisong Liu and   
                      Wei Jiang   Resource slicing and customization in
                                  RAN with dueling deep Q-Network  . . . . ??
            Stefano Rovetta and   
           Grazyna Suchacka and   
              Francesco Masulli   Bot recognition in a Web store: an
                                  approach based on unsupervised learning  ??
               Haroon Elahi and   
                Guojun Wang and   
                    Jianer Chen   Pleasure or pain? An evaluation of the
                                  costs and utilities of bloatware
                                  applications in Android smartphones  . . ??
                  Rentao Gu and   
                Zeyuan Yang and   
                     Yuefeng Ji   Machine learning for intelligent optical
                                  networks: a comprehensive survey . . . . ??
                    Mu Wang and   
               Changqiao Xu and   
               Xingyan Chen and   
                Lujie Zhong and   
           Gabriel-Miro Muntean   Decentralized asynchronous optimization
                                  for dynamic adaptive multimedia
                                  streaming over information centric
                                  networking . . . . . . . . . . . . . . . ??
            Sahar Aldhaheri and   
         Daniyal Alghazzawi and   
                   Li Cheng and   
              Ahmed Barnawi and   
            Bandar A. Alzahrani   Artificial Immune Systems approaches to
                                  secure the Internet of Things: a
                                  systematic review of the literature and
                                  recommendations for future research  . . ??


Journal of Network and Computer Applications
Volume 158, Number ??, May 15, 2020

                      Anonymous   15 May 2020  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
       Marufa Yeasmin Mukta and   
         Md Arafatur Rahman and   
          A. Taufiq Asyhari and   
        Md Zakirul Alam Bhuiyan   IoT for energy efficient green highway
                                  lighting systems: Challenges and issues  ??
            Mingchuan Zhang and   
                  Bowei Hao and   
                   Fei Song and   
                 Meiyi Yang and   
                Junlong Zhu and   
                     Qingtao Wu   Smart collaborative video caching for
                                  energy efficiency in cognitive Content
                                  Centric Networks . . . . . . . . . . . . ??
                   Pan Zhou and   
                  Xinshu He and   
                 Shouxi Luo and   
                Hongfang Yu and   
                       Gang Sun   JPAS: Job-progress-aware flow scheduling
                                  for deep learning clusters . . . . . . . ??
                  Ivo Sousa and   
         Maria Paula Queluz and   
       António Rodrigues   A survey on QoE-oriented wireless
                                  resources scheduling . . . . . . . . . . ??
                 Mazen Juma and   
           Azza Abdel Monem and   
                 Khaled Shaalan   Hybrid End-to-End VPN Security Approach
                                  for Smart IoT Objects  . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 159, Number ??, June 1, 2020

                      Anonymous   1 June 2020  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
            Judy C. Guevara and   
       Ricardo da S. Torres and   
        Nelson L. S. da Fonseca   On the classification of fog computing
                                  applications: a machine learning
                                  perspective  . . . . . . . . . . . . . . ??
             Brieuc Berruet and   
               Oumaya Baala and   
         Alexandre Caminada and   
                 Valery Guillet   An evaluation method of channel state
                                  information fingerprinting for single
                                  gateway indoor localization  . . . . . . ??
           Imane El Mensoum and   
           Omar Abdul Wahab and   
                Nadjia Kara and   
                  Claes Edstrom   MuSC: a multi-stage service chains
                                  embedding approach . . . . . . . . . . . ??
   Juan Camilo Correa Chica and   
   Jenny Cuatindioy Imbachi and   
        Juan Felipe Botero Vega   Security in SDN: a comprehensive survey  ??
         Tiago C. S. Xavier and   
             Igor L. Santos and   
         Flavia C. Delicato and   
             Paulo F. Pires and   
           Marcelo P. Alves and   
            Tiago S. Calmon and   
            Ana C. Oliveira and   
              Claudio L. Amorim   Collaborative resource allocation for
                                  Cloud of Things systems  . . . . . . . . ??


Journal of Network and Computer Applications
Volume 160, Number ??, June 15, 2020

                      Anonymous   15 June 2020 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Misbah Shafi and   
           Rakesh Kumar Jha and   
                  Manish Sabraj   A survey on security issues of 5G NR:
                                  Perspective of artificial dust and
                                  artificial rain  . . . . . . . . . . . . ??
                Waleed Ejaz and   
            Shree K. Sharma and   
              Salman Saadat and   
             Muhammad Naeem and   
           Alagan Anpalagan and   
                 N. A. Chughtai   A comprehensive survey on resource
                                  allocation for CRAN in 5G and beyond
                                  networks . . . . . . . . . . . . . . . . ??
    Satish Narayana Srirama and   
            Mainak Adhikari and   
                    Souvik Paul   Application deployment using containers
                                  with auto-scaling for microservices in
                                  cloud environment  . . . . . . . . . . . ??
                     PanJun Sun   Security and privacy protection in cloud
                                  computing: Discussions and challenges    ??
                    Kai Lin and   
              Honglong Chen and   
                     Xin Ai and   
           Vladimir Shakhov and   
                    Lina Ni and   
                   Jiguo Yu and   
                      Yanjun Li   EUMD: Efficient slot utilization based
                                  missing tag detection with unknown tags  ??
                Khaled Riad and   
                 Teng Huang and   
                      Lishan Ke   A dynamic and hierarchical access
                                  control for IoT in multi-authority cloud
                                  storage  . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 161, Number ??, July 1, 2020

                      Anonymous   1 July 2020  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Yajie Wang and   
                  Yu-an Tan and   
              Wenjiao Zhang and   
                Yuhang Zhao and   
                  Xiaohui Kuang   An adversarial attack on DNN-based
                                  black-box object detectors . . . . . . . ??
                    Di Xiao and   
                     Min Li and   
                Mengdi Wang and   
                  Jia Liang and   
                        Ran Liu   Low-cost and high-efficiency
                                  privacy-protection scheme for
                                  distributed compressive video sensing in
                                  wireless multimedia sensor networks  . . ??
                Inam ul Haq and   
                  Jian Wang and   
                     Youwen Zhu   Secure two-factor lightweight
                                  authentication protocol using
                                  self-certified public key cryptography
                                  for multi-server 5G networks . . . . . . ??
     Noé Torres-Cruz and   
    Mario E. Rivero-Angeles and   
             Gerardo Rubino and   
    Ricardo Menchaca-Mendez and   
    Rolando Menchaca-Mendez and   
                  David Ramirez   A comprehensive analytical framework for
                                  VoD services in hybrid CDN-P2P systems   ??
                   Shi Dong and   
                       Raj Jain   Retraction notice to ``Flow online
                                  identification method for the encrypted
                                  Skype'' [YJNCA (2019) 75--85]  . . . . . ??
       Syeda Manjia Tahsien and   
           Hadis Karimipour and   
                 Petros Spachos   Machine learning based solutions for
                                  security of Internet of Things (IoT): a
                                  survey . . . . . . . . . . . . . . . . . ??
                 Wenjuan Li and   
                Weizhi Meng and   
                      Man Ho Au   Enhancing collaborative intrusion
                                  detection via disagreement-based
                                  semi-supervised learning in IoT
                                  environments . . . . . . . . . . . . . . ??
                 Yilei Wang and   
                 Guoyu Yang and   
                     Tao Li and   
                 Fengyin Li and   
              Youliang Tian and   
                     Xiaomei Yu   Belief and fairness: a secure two-party
                                  protocol toward the view of entropy for
                                  IoT devices  . . . . . . . . . . . . . . ??
              Xiongwen Pang and   
              Yanqiang Zhou and   
               Pengcheng Li and   
                 Weiwei Lin and   
                  Wentai Wu and   
                  James Z. Wang   A novel syntax-aware automatic graphics
                                  code generation with attention-based
                                  deep neural network  . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 162, Number ??, July 15, 2020

                      Anonymous   15 July 2020 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
 Fernando Zanferrari Morais and   
Cristiano André da Costa and   
     Antonio Marcos Alberti and   
      Cristiano Bonato Both and   
          Rodrigo da Rosa Righi   When SDN meets C-RAN: a survey exploring
                                  multi-point coordination, interference,
                                  and performance  . . . . . . . . . . . . ??
           Dipanwita Thakur and   
                   Manas Khatua   Multi-domain virtual network embedding
                                  with dynamic flow migration in
                                  software-defined networks  . . . . . . . ??
                  Cheng Guo and   
                Xueru Jiang and   
     Kim-Kwang Raymond Choo and   
                     Yingmo Jie   R-Dedup: Secure client-side
                                  deduplication for encrypted data without
                                  involving a third-party entity . . . . . ??
                  Yali Zeng and   
                      Li Xu and   
                    Xu Yang and   
                     Xun Yi and   
                 Ibrahim Khalil   Lightweight privacy preservation for
                                  secondary users in cognitive radio
                                  networks . . . . . . . . . . . . . . . . ??
       Nazanin Zahed Benisi and   
              Mehdi Aminian and   
                  Bahman Javadi   Blockchain-based decentralized storage
                                  networks: a survey . . . . . . . . . . . ??
                 Teng Huang and   
              Qixiang Zhang and   
                 Jiabao Liu and   
                 Ruitao Hou and   
               Xianmin Wang and   
                          Ya Li   Adversarial attacks on
                                  deep-learning-based SAR image target
                                  recognition  . . . . . . . . . . . . . . ??
                  Yize Yang and   
              Hongyong Yang and   
                        Fei Liu   Group motion of autonomous vehicles with
                                  anti-disturbance protection  . . . . . . ??
                 Xiao Zhang and   
                  Lijia Xie and   
                       Wang Yao   Spatio-temporal heterogeneous bandwidth
                                  allocation mechanism against DDoS attack ??
                Xueshuo Xie and   
               Zongming Jin and   
                Jiming Wang and   
                   Lei Yang and   
                      Ye Lu and   
                         Tao Li   Confidence guided anomaly detection
                                  model for anti-concept drift in dynamic
                                  logs . . . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 163, Number ??, August 1, 2020

                      Anonymous   1 August 2020  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
  Gonzalo De La Torre Parra and   
                   Paul Rad and   
     Kim-Kwang Raymond Choo and   
                   Nicole Beebe   Detecting Internet of Things attacks
                                  using distributed deep learning  . . . . ??
        Rosario G. Garroppo and   
    Maria Grazia Scutell\`a and   
         Fabio D'Andreagiovanni   Robust green Wireless Local Area
                                  Networks: a matheuristic approach  . . . ??
                   Ali Raza and   
                   Sanghwan Lee   A priority based greedy path assignment
                                  mechanism in OpenFlow based datacenter
                                  networks . . . . . . . . . . . . . . . . ??
              Wafa'a Kassab and   
              Khalid A. Darabkh   A--Z survey of Internet of Things:
                                  Architectures, protocols, applications,
                                  recent advances, future directions and
                                  recommendations  . . . . . . . . . . . . ??
                    Jun Cai and   
             Zhongwei Huang and   
               Jianzhen Luo and   
                    Yan Liu and   
                Huimin Zhao and   
                    Liping Liao   Composing and deploying parallelized
                                  service function chains  . . . . . . . . ??
           Tariq Benmansour and   
               Toufik Ahmed and   
           Samira Moussaoui and   
                  Zouina Doukha   Performance analyses of the IEEE
                                  802.15.6 Wireless Body Area Network with
                                  heterogeneous traffic  . . . . . . . . . ??
              Arunima Ghosh and   
             Shashank Gupta and   
                   Amit Dua and   
                   Neeraj Kumar   Security of Cryptocurrencies in
                                  blockchain technology: State-of-art,
                                  challenges and future prospects  . . . . ??


Journal of Network and Computer Applications
Volume 164, Number ??, August 15, 2020

                      Anonymous   15 August 2020 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Mauro Conti and   
            Pallavi Kaliyar and   
                    Chhagan Lal   A robust multicast communication
                                  protocol for Low power and Lossy
                                  networks . . . . . . . . . . . . . . . . ??
                  Ming Chen and   
             Shunkang Zhang and   
                   Hai Deng and   
                  Bing Chen and   
              Changyou Xing and   
                          Bo Xu   Automatic deployment and control of
                                  network services in NFV environments . . ??
                    Yu Tian and   
                Baoqi Huang and   
                   Bing Jia and   
                      Long Zhao   Optimizing AP and Beacon Placement in
                                  WiFi and BLE hybrid localization . . . . ??
             Abd Ullah Khan and   
               Ghulam Abbas and   
            Ziaul Haq Abbas and   
             Muhammad Waqas and   
             Ahmad Kamal Hassan   Spectrum utilization efficiency in the
                                  cognitive radio enabled 5G-based IoT . . ??
               Shreya Ghosh and   
            Soumya K. Ghosh and   
                 Rajkumar Buyya   MARIO: a spatio-temporal data mining
                                  framework on Google Cloud to explore
                                  mobility dynamics from taxi trajectories ??
       Christos Anagnostopoulos   Edge-centric inferential modeling and
                                  analytics  . . . . . . . . . . . . . . . ??
                  Lixia Xie and   
                  Ying Ding and   
                Hongyu Yang and   
                          Ze Hu   Mitigating LFA through segment rerouting
                                  in IoT environment with traceroute flow
                                  abnormality detection  . . . . . . . . . ??
                Zhendong Wu and   
              Jingjing Wang and   
                   Liqin Hu and   
                Zhang Zhang and   
                         Han Wu   A network intrusion detection method
                                  based on semantic re-encoding and deep
                                  learning . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 165, Number ??, September 1, 2020

                      Anonymous   1 September 2020 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
 Eder Leão Fernandes and   
                Elisa Rojas and   
    Joaquin Alvarez-Horcajo and   
         Zolt\`an Lajos Kis and   
             Davide Sanvito and   
             Nicola Bonelli and   
            Carmelo Cascone and   
    Christian Esteve Rothenberg   The road to BOFUSS: the basic OpenFlow
                                  userspace software switch  . . . . . . . ??
             Faizan Murtaza and   
            Adnan Akhunzada and   
              Saif ul Islam and   
            Jalil Boudjadar and   
                 Rajkumar Buyya   QoS-aware service provisioning in fog
                                  computing  . . . . . . . . . . . . . . . ??
             Shie-Yuan Wang and   
                  Jun-Yi Li and   
                    Yi-Bing Lin   Aggregating and disaggregating packets
                                  with various sizes of payload in P4
                                  switches at 100 Gbps line rate . . . . . ??
                 J. E. Giti and   
                  A. Sakzad and   
              B. Srinivasan and   
             J. Kamruzzaman and   
                       R. Gaire   Secrecy capacity against adaptive
                                  eavesdroppers in a random wireless
                                  network using friendly jammers and
                                  protected zone . . . . . . . . . . . . . ??
        Steven M. Hernandez and   
                  Eyuphan Bulut   Using perceived direction information
                                  for anchorless relative indoor
                                  localization . . . . . . . . . . . . . . ??
             Gustavo Zurita and   
             Amit K. Shukla and   
        José A. Pino and   
José M. Merigó and   
Valeria Lobos-Ossandón and   
               Pranab K. Muhuri   A bibliometric overview of the
                                  \booktitleJournal of Network and
                                  Computer Applications between 1997 and
                                  2019 . . . . . . . . . . . . . . . . . . ??
                 Chunlin Li and   
              Mingyang Song and   
                Shaofeng Du and   
               Xiaohai Wang and   
                  Min Zhang and   
                    Youlong Luo   Adaptive priority-based cache
                                  replacement and prediction-based cache
                                  prefetching in edge computing
                                  environment  . . . . . . . . . . . . . . ??
                 Wenjuan Li and   
                   Jiao Tan and   
                Weizhi Meng and   
                        Yu Wang   A swipe-based unlocking mechanism with
                                  supervised learning on smartphones:
                                  Design and evaluation  . . . . . . . . . ??
              Shunzhi Jiang and   
                 Dengpan Ye and   
              Jiaqing Huang and   
               Yueyun Shang and   
                 Zhuoyuan Zheng   SmartSteganogaphy: Light-weight
                                  generative audio steganography model for
                                  smart embedding application  . . . . . . ??


Journal of Network and Computer Applications
Volume 166, Number ??, September 15, 2020

                      Anonymous   15 September 2020  . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Dinh C. Nguyen and   
        Pubudu N. Pathirana and   
                  Ming Ding and   
              Aruna Seneviratne   Blockchain for 5G and beyond networks: a
                                  state of the art survey  . . . . . . . . ??
            Nur Nasuha Daud and   
      Siti Hafizah Ab Hamid and   
          Muntadher Saadoon and   
             Firdaus Sahran and   
               Nor Badrul Anuar   Applications of link prediction in
                                  social networks: a review  . . . . . . . ??
           Bander Alzahrani and   
          Omar Sami Oubbati and   
              Ahmed Barnawi and   
       Mohammed Atiquzzaman and   
             Daniyal Alghazzawi   UAV assistance paradigm:
                                  State-of-the-art in applications and
                                  challenges . . . . . . . . . . . . . . . ??
            Mokhtar Sellami and   
              Haithem Mezni and   
              Mohand Said Hacid   On the use of big data frameworks for
                                  big service composition  . . . . . . . . ??
Miguel Rodríguez-Pérez and   
Sergio Herrería-Alonso and   
Raúl F. Rodríguez-Rubio and   
José Carlos López-Ardao   Leveraging energy saving capabilities of
                                  current EEE interfaces via
                                  pre-coalescing . . . . . . . . . . . . . ??
Marcio Roberto Miranda Assis and   
      Luiz Fernando Bittencourt   MultiCloud Tournament: a cloud
                                  federation approach to prevent
                                  Free-Riders by encouraging resource
                                  sharing  . . . . . . . . . . . . . . . . ??
                   Yang Liu and   
                  Debiao He and   
        Mohammad S. Obaidat and   
               Neeraj Kumar and   
      Muhammad Khurram Khan and   
         Kim-Kwang Raymond Choo   Blockchain-based identity management
                                  systems: a review  . . . . . . . . . . . ??
                 Xiaoguo Li and   
                  Tao Xiang and   
                      Peng Wang   Achieving forward unforgeability in
                                  keyword-field-free conjunctive search    ??
             Zhongjiang Yao and   
                 Jingguo Ge and   
                   Yulei Wu and   
              Xiaosheng Lin and   
                 Runkang He and   
                     Yuxiang Ma   Encrypted traffic classification based
                                  on Gaussian mixture models and Hidden
                                  Markov Models  . . . . . . . . . . . . . ??
                  Kehua Guo and   
                  Haifu Guo and   
                  Sheng Ren and   
                 Jian Zhang and   
                          Xi Li   Towards efficient motion-blurred public
                                  security video super-resolution based on
                                  back-projection networks . . . . . . . . ??


Journal of Network and Computer Applications
Volume 167, Number ??, October 1, 2020

                      Anonymous   1 October 2020 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                   Huan Fei and   
                    Fu Xiao and   
              Haiping Huang and   
                     Lijuan Sun   Indoor static localization based on
                                  Fresnel zones model using COTS Wi-Fi . . ??
                      Sapna and   
            K. K. Pattanaik and   
                 Aditya Trivedi   A dynamic distributed boundary node
                                  detection algorithm for management zone
                                  delineation in Precision Agriculture . . ??
              Jiancheng Chi and   
                      Yu Li and   
                 Jing Huang and   
                   Jing Liu and   
                Yingwei Jin and   
                  Chen Chen and   
                        Tie Qiu   A secure and efficient data sharing
                                  scheme based on blockchain in industrial
                                  Internet of Things . . . . . . . . . . . ??
              Ahmad Shabani and   
                 Bijan Alizadeh   PODEM: a low-cost property-based design
                                  modification for detecting Hardware
                                  Trojans in resource-constraint IoT
                                  devices  . . . . . . . . . . . . . . . . ??
              Zawar Hussain and   
              Quan Z. Sheng and   
                 Wei Emma Zhang   A review and categorization of
                                  techniques on device-free human activity
                                  recognition  . . . . . . . . . . . . . . ??
                      Ke Ma and   
                  Geng Yang and   
                     Yang Xiang   RCBAC: a risk-aware content-based access
                                  control model for large-scale text data  ??
             Yaser Mansouri and   
         Victor Prokhorenko and   
                   M. Ali Babar   An automated implementation of hybrid
                                  cloud for performance evaluation of
                                  distributed databases  . . . . . . . . . ??
       Mohammad Alkhalaileh and   
       Rodrigo N. Calheiros and   
          Quang Vinh Nguyen and   
                  Bahman Javadi   Data-intensive application scheduling on
                                  Mobile Edge Cloud Computing  . . . . . . ??
                     Li Jin and   
               Dong Changyu and   
            Palmieric Francesco   Special issue on advanced techniques for
                                  security and privacy of
                                  Internet-of-Things with machine learning ??
                      Xu Ma and   
                  Cunmei Ji and   
               Xiaoyu Zhang and   
              Jianfeng Wang and   
                     Jin Li and   
              Kuan-Ching Li and   
                  Xiaofeng Chen   Secure multiparty learning from the
                                  aggregation of locally trained models    ??
         Yahye Abukar Ahmed and   
         Baris Koçer and   
               Shamsul Huda and   
   Bander Ali Saleh Al-rimy and   
         Mohammad Mehedi Hassan   A system call refinement-based enhanced
                                  Minimum Redundancy Maximum Relevance
                                  method for ransomware early detection    ??


Journal of Network and Computer Applications
Volume 168, Number ??, October 15, 2020

                      Anonymous   15 October 2020  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Si Chen and   
                   Anmin Fu and   
                  Jian Shen and   
                    Shui Yu and   
                Huaqun Wang and   
                  Huaijiang Sun   RNN-DP: a new differential privacy
                                  scheme base on Recurrent Neural Network
                                  for Dynamic trajectory privacy
                                  protection . . . . . . . . . . . . . . . ??
             Shashwat Kumar and   
        Sai Vineeth Doddala and   
         A. Antony Franklin and   
                      Jiong Jin   RAN-aware adaptive video caching in
                                  multi-access edge computing networks . . ??
Salva Daneshgadeh Çakmakçi and   
           Thomas Kemmerich and   
                Tarem Ahmed and   
                  Nazife Baykal   Online DDoS attack detection using
                                  Mahalanobis distance and Kernel-based
                                  learning algorithm . . . . . . . . . . . ??
               Mobasshir Mahbub   Progressive researches on IoT security:
                                  an exhaustive analysis from the
                                  perspective of protocols,
                                  vulnerabilities, and preemptive
                                  architectonics . . . . . . . . . . . . . ??
        Akanksha Srivastava and   
         Mani Shekhar Gupta and   
                    Gurjit Kaur   Energy efficient transmission trends
                                  towards future green cognitive radio
                                  networks (5G): Progress, taxonomy and
                                  open challenges  . . . . . . . . . . . . ??
            Iqbal H. Sarker and   
                 A. S. M. Kayes   ABC-RuleMiner: User behavioral
                                  rule-based machine learning method for
                                  context-aware intelligent services . . . ??
                 Wai-Xi Liu and   
                    Jun Cai and   
                    Yu Wang and   
             Qing Chun Chen and   
                    Jia-Qi Zeng   Fine-grained flow classification using
                                  deep learning for software defined data
                                  center networks  . . . . . . . . . . . . ??
                 Atis Elsts and   
               Niall Twomey and   
            Ryan McConville and   
                   Ian Craddock   Energy-efficient activity recognition
                                  framework using wearable accelerometers  ??
            Abhishek Sharma and   
           Pankhuri Vanjani and   
             Nikhil Paliwal and   
Chathuranga M. Wijerathna Basnayaka and   
Dushantha Nalin K. Jayakody and   
           Hwang-Cheng Wang and   
       P. Muthuchidambaranathan   Communication and networking
                                  technologies for UAVs: a survey  . . . . ??
              Peppino Fazio and   
              Miralem Mehic and   
                Miroslav Voznak   A deep stochastical and predictive
                                  analysis of users mobility based on
                                  Auto-Regressive processes and pairing
                                  functions  . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 169, Number ??, November 1, 2020

                      Anonymous   1 November 2020  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
        Rafael Fayos-Jordan and   
    Santiago Felici-Castell and   
        Jaume Segura-Garcia and   
      Jesus Lopez-Ballester and   
                   Maximo Cobos   Performance comparison of container
                                  orchestration platforms with low cost
                                  devices in the fog, assisting Internet
                                  of Things applications . . . . . . . . . ??
      Muluneh Mekonnen Tulu and   
    Mbazingwa E. Mkiramweni and   
                Ronghui Hou and   
              Sultan Feisso and   
                   Talha Younas   Influential nodes selection to enhance
                                  data dissemination in mobile social
                                  networks: a survey . . . . . . . . . . . ??
                 Jose Moura and   
                David Hutchison   Fog computing systems: State of the art,
                                  research issues and future trends, with
                                  a focus on resilience  . . . . . . . . . ??
             Daniel Merling and   
            Steffen Lindner and   
                  Michael Menth   P4-based implementation of BIER and
                                  BIER-FRR for scalable and resilient
                                  multicast  . . . . . . . . . . . . . . . ??
                 Guolin Sun and   
       Daniel Ayepah-Mensah and   
                    Rong Xu and   
       Gordon Owusu Boateng and   
                    Guisong Liu   End-to-end CNN-based dueling deep
                                  Q-Network for autonomous cell activation
                                  in Cloud-RANs  . . . . . . . . . . . . . ??
                    Hai Lin and   
           Sherali Zeadally and   
               Zhihong Chen and   
               Houda Labiod and   
                   Lusheng Wang   A survey on computation offloading
                                  modeling for edge computing  . . . . . . ??
                  Song Yang and   
                     Fan Li and   
         Stojan Trajanovski and   
                    Xiaoming Fu   Traffic routing in stochastic network
                                  function virtualization networks . . . . ??
               Wen-Kang Jia and   
                    Xufang Wang   Flow aggregation for large-scale SDNs
                                  with scattered address space allocation  ??
                   R. Yugha and   
                     S. Chithra   A survey on technologies and security
                                  protocols: Reference for future
                                  generation IoT . . . . . . . . . . . . . ??
             Sunanda Gamage and   
             Jagath Samarabandu   Deep learning methods in network
                                  intrusion detection: a survey and an
                                  objective comparison . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 170, Number ??, November 15, 2020

                      Anonymous   15 November 2020 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
          Ahmed S. Almasoud and   
    Farookh Khadeer Hussain and   
                Omar K. Hussain   Smart contracts for blockchain-based
                                  reputation systems: a systematic
                                  literature review  . . . . . . . . . . . ??
                    Lei Cui and   
                 Youyang Qu and   
              Longxiang Gao and   
                   Gang Xie and   
                        Shui Yu   Detecting false data attacks using
                                  machine learning techniques in smart
                                  grid: a survey . . . . . . . . . . . . . ??
          Kübra Uludag and   
    Sinan Emre Tasçi and   
             Omer Korçak   Sequential bargaining based incentive
                                  mechanism for collaborative Internet
                                  access . . . . . . . . . . . . . . . . . ??
               Ahmed Alagha and   
               Shakti Singh and   
                 Hadi Otrok and   
                  Rabeb Mizouni   RFLS --- Resilient Fault-proof
                                  Localization System in IoT and
                                  Crowd-based Sensing Applications . . . . ??
            Somayeh Rahmani and   
           Vahid Khajehvand and   
                Mohsen Torabian   Kullback--Leibler distance criterion
                                  consolidation in cloud . . . . . . . . . ??
                    F. Orts and   
                  G. Ortega and   
             E. F. Combarro and   
            E. M. Garzón   A review on reversible quantum adders    ??
      Baris Yamansavascilar and   
         Ahmet Cihat Baktir and   
               Atay Ozgovde and   
                      Cem Ersoy   Fault tolerance in SDN data plane
                                  considering network and application
                                  based metrics  . . . . . . . . . . . . . ??
            Dilli P. Sharma and   
          Simon Yusuf Enoch and   
                Jin-Hee Cho and   
          Terrence J. Moore and   
        Frederica F. Nelson and   
                   Hyuk Lim and   
                 Dong Seong Kim   Dynamic Security Metrics for
                                  Software-Defined Network-based Moving
                                  Target Defense . . . . . . . . . . . . . ??
      Balázs Sonkoly and   
          Dávid Haja and   
Balázs Németh and   
         Márk Szalay and   
       János Czentye and   
 Róbert Szabó and   
               Rehmat Ullah and   
              Byung-Seo Kim and   
      László Toka   Scalable edge cloud platforms for IoT
                                  services . . . . . . . . . . . . . . . . ??
                Guangli Zhu and   
           Zhuangzhuang Pan and   
               Qiaoyun Wang and   
            Shunxiang Zhang and   
                  Kuan-Ching Li   Building multi-subtopic Bi-level network
                                  for micro-blog hot topic based on
                                  feature Co-Occurrence and semantic
                                  community division . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 171, Number ??, December 1, 2020

                      Anonymous   1 December 2020  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Yan Pan and   
                 Shining Li and   
                   Yu Zhang and   
                       Ting Zhu   CDA: Coordinating data dissemination and
                                  aggregation in heterogeneous IoT
                                  networks using CTC . . . . . . . . . . . ??
          Mostafa Abdollahi and   
             Farshad Eshghi and   
    Manoochehr Kelarestaghi and   
          Mozafar Bag-Mohammadi   Opportunistic routing metrics: a timely
                                  one-stop tutorial survey . . . . . . . . ??
           Md Akbar Hossain and   
            Sayan Kumar Ray and   
                 Jaswinder Lota   SmartDR: a device-to-device
                                  communication for post-disaster recovery ??
           Nesrine Kaaniche and   
           Maryline Laurent and   
                  Sana Belguith   Privacy enhancing technologies for
                                  solving the privacy-personalization
                                  paradox: Taxonomy and survey . . . . . . ??
        Narges Yousefnezhad and   
               Avleen Malhi and   
             Kary Främling   Security in product lifecycle of IoT
                                  devices: a survey  . . . . . . . . . . . ??
                   Shu Yang and   
                     Lu Bai and   
               Laizhong Cui and   
             Zhongxing Ming and   
                   Yulei Wu and   
                    Shui Yu and   
               Hongfei Shen and   
                         Yi Pan   An efficient pipeline processing scheme
                                  for programming Protocol-independent
                                  Packet Processors  . . . . . . . . . . . ??
Juan Gutiérrez-Aguado and   
Raúl Peña-Ortiz and   
Miguel García-Pineda and   
                 Jose M. Claver   Cloud-based elastic architecture for
                                  distributed video encoding: Evaluating
                                  H.265, VP9, and AV1  . . . . . . . . . . ??
               Ying-Dar Lin and   
                Yu-Kuen Lai and   
              Quan Tien Bui and   
                 Yuan-Cheng Lai   ReFSM: Reverse engineering from protocol
                                  packet traces to test generation by
                                  extended finite state machines . . . . . ??
                N. Mansouri and   
Behnam Mohammad Hasani Zade and   
         Mohammad Masoud Javidi   A multi-objective optimized replication
                                  using fuzzy based self-defense algorithm
                                  for cloud computing  . . . . . . . . . . ??
                Khizra Asaf and   
           Rana Asif Rehman and   
                  Byung-Seo Kim   Blockchain technology in Named Data
                                  Networks: a detailed survey  . . . . . . ??
                Yongkai Fan and   
               Jianrong Bai and   
                    Xia Lei and   
               Yuqing Zhang and   
                  Bin Zhang and   
              Kuan-Ching Li and   
                       Gang Tan   Privacy preserving based logistic
                                  regression on big data . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 172, Number ??, December 15, 2020

                      Anonymous   15 December 2020 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Shaoyong Guo and   
              Fengning Wang and   
                 Neng Zhang and   
                    Feng Qi and   
                    Xuesong Qiu   Master-slave chain based trusted
                                  cross-domain authentication mechanism in
                                  IoT  . . . . . . . . . . . . . . . . . . ??
           Raihan ur Rasool and   
                   Hua Wang and   
               Usman Ashraf and   
            Khandakar Ahmed and   
                Zahid Anwar and   
                  Wajid Rafique   A survey of link flooding attacks in
                                  software defined network ecosystems  . . ??
                   Fei Chen and   
                   Zhe Xiao and   
               Laizhong Cui and   
                Qiuzhen Lin and   
               Jianqiang Li and   
                        Shui Yu   Blockchain for Internet of Things
                                  applications: a review and open issues   ??
             Md Jalil Piran and   
             Quoc-Viet Pham and   
         S. M. Riazul Islam and   
                 Sukhee Cho and   
               Byungjun Bae and   
             Doug Young Suh and   
                        Zhu Han   Multimedia communication over cognitive
                                  radio networks from QoS/QoE perspective:
                                  a comprehensive survey . . . . . . . . . ??
                    Ying Li and   
                  Jianbo Li and   
                  Manzoor Ahmed   A three-stage incentive formation for
                                  optimally pricing social data offloading ??
                Yun-Wei Lin and   
             Tai-Hsiang Yen and   
             Cheng-Han Chou and   
                Yi-Bing Lin and   
                    Wen-Shu Lai   Investigating Asian Parti-colored bats
                                  using the BatTalk Internet of Things
                                  approach . . . . . . . . . . . . . . . . ??
            Suyel Namasudra and   
               Suraj Sharma and   
        Ganesh Chandra Deka and   
                  Pascal Lorenz   DNA computing and table based data
                                  accessing in the cloud environment . . . ??
               Emna Baccour and   
                Aiman Erbad and   
                Amr Mohamed and   
             Mohsen Guizani and   
                   Mounir Hamdi   Collaborative hierarchical caching and
                                  transcoding in edge network with CE-D2D
                                  communication  . . . . . . . . . . . . . ??
          Khalid A. Darabkh and   
               Oswa M. Amro and   
            Raed T. Al-Zubi and   
       Haythem Bany Salameh and   
                   Ramzi Saifan   JavaSim-IBFD-CRNs: Novel Java simulator
                                  for in-band full-duplex cognitive radio
                                  networks over Internet of Things
                                  environment  . . . . . . . . . . . . . . ??
                  Zheng Yan and   
               Willy Susilo and   
              Elisa Bertino and   
                  Jun Zhang and   
               Laurence T. Yang   AI-driven data security and privacy  . . ??


Journal of Network and Computer Applications
Volume 173, Number ??, January 1, 2021

                      Anonymous   1 January 2021 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   Thank You Reviewers  . . . . . . . . . . ??
           Nguyen Khoi Tran and   
               M. Ali Babar and   
                  Jonathan Boan   Integrating blockchain and Internet of
                                  Things systems: a systematic review on
                                  objectives and designs . . . . . . . . . ??
                  Dana Yang and   
                 Seohee Yoo and   
                 Inshil Doh and   
                    Kijoon Chae   Selective blockchain system for secure
                                  and efficient D2D communication  . . . . ??
          Khalid A. Darabkh and   
               Oswa M. Amro and   
            Raed T. Al-Zubi and   
           Haythem Bany Salameh   Yet efficient routing protocols for
                                  half- and full-duplex cognitive radio
                                  Ad-Hoc Networks over IoT environment . . ??
                Zhishu Shen and   
               Tiehua Zhang and   
             Atsushi Tagami and   
                      Jiong Jin   When RSSI encounters deep learning: an
                                  area localization scheme for pervasive
                                  sensing systems  . . . . . . . . . . . . ??
                 Bentian Li and   
                 Dechang Pi and   
                 Yunxia Lin and   
                        Lin Cui   DNC: a Deep Neural Network-based
                                  Clustering-oriented Network Embedding
                                  Algorithm  . . . . . . . . . . . . . . . ??
              Arvin Ghotbou and   
              Mohammad Khansari   VE-CoAP: a constrained application layer
                                  protocol for IoT video transmission  . . ??
               Sakshi Popli and   
           Rakesh Kumar Jha and   
                   Sanjeev Jain   Adaptive Small Cell position algorithm
                                  (ASPA) for green farming using NB-IoT    ??
                     PanJun Sun   A Trust Game Model of Service
                                  Cooperation in Cloud Computing . . . . . ??
                Wenbo Zhang and   
                   Xin Wang and   
               Guangjie Han and   
                   Yan Peng and   
             Mohsen Guizani and   
                     Jingyi Sun   A load-adaptive fair access protocol for
                                  MAC in underwater acoustic sensor
                                  networks . . . . . . . . . . . . . . . . ??
                Xingrui Fei and   
                     Yi Xie and   
             Shensheng Tang and   
                     Jiankun Hu   Identifying click-requests for the
                                  network-side through traffic behavior    ??
              A. S. Albahri and   
              Jwan K. Alwan and   
             Zahraa K. Taha and   
             Sura F. Ismail and   
              Rula A. Hamid and   
               A. A. Zaidan and   
              O. S. Albahri and   
               B. B. Zaidan and   
             A. H. Alamoodi and   
                  M. A. Alsalem   IoT-based telemedicine for disease
                                  prevention and health promotion:
                                  State-of-the-Art . . . . . . . . . . . . ??
                 Ying Zhang and   
              Cui-Hua Zhang and   
                    Xuyang Shao   User preference-aware navigation for
                                  mobile robot in domestic via defined
                                  virtual area . . . . . . . . . . . . . . ??
              Ayaz Ali Khan and   
           Muhammad Zakarya and   
             Izaz Ur Rahman and   
                 Rahim Khan and   
                 Rajkumar Buyya   HeporCloud: an energy and performance
                                  efficient resource orchestrator for
                                  hybrid heterogeneous cloud computing
                                  environments . . . . . . . . . . . . . . ??
            Gianni D'Angelo and   
             Francesco Palmieri   Network traffic classification using
                                  deep convolutional recurrent autoencoder
                                  neural networks for spatial-temporal
                                  features extraction  . . . . . . . . . . ??
            Norberto Garcia and   
              Tomas Alcaniz and   
Aurora González-Vidal and   
       Jorge Bernal Bernabe and   
               Diego Rivera and   
               Antonio Skarmeta   Distributed real-time SlowDoS attacks
                                  detection over encrypted traffic using
                                  Artificial Intelligence  . . . . . . . . ??
              Yang-Wai Chow and   
               Willy Susilo and   
              Jianfeng Wang and   
           Richard Buckland and   
              Joonsang Baek and   
                Jongkil Kim and   
                         Nan Li   Utilizing QR codes to verify the visual
                                  fidelity of image datasets for machine
                                  learning . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 174, Number ??, January 15, 2021

                      Anonymous   15 January 2021  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Ruijie Zhu and   
              Aretor Samuel and   
                Peisen Wang and   
                  Shihua Li and   
           Bounsou Kham Oun and   
                    Lulu Li and   
                     Pei Lv and   
               Mingliang Xu and   
                        Shui Yu   Protected Resource Allocation in Space
                                  Division Multiplexing-Elastic Optical
                                  Networks with Fluctuating Traffic  . . . ??
            Ali Akbar Sadri and   
        Amir Masoud Rahmani and   
  Morteza Saberikamarposhti and   
             Mehdi Hosseinzadeh   Fog data management: a vision,
                                  challenges, and future directions  . . . ??
               Mosab Hamdan and   
             Entisar Hassan and   
            Ahmed Abdelaziz and   
          Abdallah Elhigazi and   
            Bushra Mohammed and   
               Suleman Khan and   
    Athanasios V. Vasilakos and   
                  M. N. Marsono   A comprehensive survey of load balancing
                                  techniques in software-defined network   ??
João Paulo A. Maranhão and   
João Paulo C. L. da Costa and   
               Elnaz Javidi and   
César A. Borges de Andrade and   
             Rafael T. de Sousa   Tensor based framework for Distributed
                                  Denial of Service attack detection . . . ??
             Juan A. Fraire and   
      Olivier De Jonck\`ere and   
              Scott C. Burleigh   Routing in the Space Internet: a contact
                                  graph routing tutorial . . . . . . . . . ??
             Pietro Colombo and   
              Elena Ferrari and   
         Engin Deniz Tümer   Regulating data sharing across MQTT
                                  environments . . . . . . . . . . . . . . ??
                  Saira Beg and   
                Adeel Anjum and   
              Mansoor Ahmad and   
             Shahid Hussain and   
              Ghufran Ahmad and   
               Suleman Khan and   
         Kim-Kwang Raymond Choo   A privacy-preserving protocol for
                                  continuous and dynamic data collection
                                  in IoT enabled mobile app recommendation
                                  system (MARS)  . . . . . . . . . . . . . ??
              Azade Fotouhi and   
                  Ming Ding and   
                  Mahbub Hassan   DroneCells: Improving spectral
                                  efficiency using drone-mounted flying
                                  base stations  . . . . . . . . . . . . . ??
            Xiaoshuai Zhang and   
                   Chao Liu and   
             Kok Keong Chai and   
                  Stefan Poslad   A privacy-preserving consensus mechanism
                                  for an electric vehicle charging scheme  ??
                 Zhongyu Ma and   
                    Jie Cao and   
                    Qun Guo and   
                Xiangwei Li and   
                    Hongfeng Ma   QoS-oriented joint optimization of
                                  concurrent scheduling and power control
                                  in millimeter wave mesh backhaul network ??
                   Yifei Lu and   
                      Xu Ma and   
                    Zhengzhi Xu   FAMD: a Flow-Aware Marking and
                                  Delay-based TCP algorithm for datacenter
                                  networks . . . . . . . . . . . . . . . . ??
   Carlo K. da S. Rodrigues and   
                 Vladimir Rocha   Enhancing BitTorrent for efficient
                                  interactive video-on-demand streaming
                                  over MANETs  . . . . . . . . . . . . . . ??
    Azana Hafizah Mohd Aman and   
         Wan Haslina Hassan and   
              Shilan Sameen and   
    Zainab Senan Attarbashi and   
           Mojtaba Alizadeh and   
              Liza Abdul Latiff   IoMT amid COVID-19 pandemic:
                                  Application, architecture, technology,
                                  and security . . . . . . . . . . . . . . ??
        Savio Sciancalepore and   
              Saeif Alhazbi and   
              Roberto Di Pietro   Receivers location privacy in avionic
                                  crowdsourced networks: Issues and
                                  countermeasures  . . . . . . . . . . . . ??
                    Pan Jun Sun   Corrigendum to ``A trust game model of
                                  service cooperation in cloud computing''
                                  [J. Netw. Comput. Appl. \bf 173 (20)
                                  2020 102864] . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 175, Number ??, February 1, 2021

                      Anonymous   1 February 2021  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
            Muhammad Khalid and   
                 Kezhi Wang and   
               Nauman Aslam and   
                    Yue Cao and   
               Naveed Ahmad and   
          Muhammad Khurram Khan   From smart parking towards autonomous
                                  valet parking: a survey, challenges and
                                  future works . . . . . . . . . . . . . . ??
         José Santos and   
                Tim Wauters and   
            Bruno Volckaert and   
                 Filip De Turck   Towards end-to-end resource provisioning
                                  in Fog Computing over Low Power Wide
                                  Area Networks  . . . . . . . . . . . . . ??
                 Adil Israr and   
                 Qiang Yang and   
                     Wei Li and   
               Albert Y. Zomaya   Renewable energy powered sustainable 5G
                                  network infrastructure: Opportunities,
                                  challenges and perspectives  . . . . . . ??
                  Yang Yang and   
                Songtao Guo and   
                 Guiyan Liu and   
                         Lin Yi   Fine granularity resource allocation of
                                  virtual data center with consideration
                                  of virtual switches  . . . . . . . . . . ??
               Piotr Borylo and   
            Gianluca Davoli and   
              Michal Rzepka and   
                Artur Lason and   
                 Walter Cerroni   Unified and standalone monitoring module
                                  for NFV/SDN infrastructures  . . . . . . ??
           Fernando Boronat and   
             Mario Montagud and   
               Pau Salvador and   
                  Javier Pastor   Wersync: a web platform for synchronized
                                  social viewing enabling interaction and
                                  collaboration  . . . . . . . . . . . . . ??
                   Will Serrano   The Blockchain Random Neural Network for
                                  cybersecure IoT and 5G infrastructure in
                                  Smart Cities . . . . . . . . . . . . . . ??
             Mian Ahmad Jan and   
                 Jinjin Cai and   
            Xiang-Chuan Gao and   
             Fazlullah Khan and   
        Spyridon Mastorakis and   
             Muhammad Usman and   
              Mamoun Alazab and   
                   Paul Watters   Security and blockchain convergence with
                                  Internet of Multimedia Things: Current
                                  trends, research challenges and future
                                  directions . . . . . . . . . . . . . . . ??
             Wilson S. Melo and   
         Luiz V. G. Tarelho and   
         Bruno A. Rodrigues and   
         Alysson N. Bessani and   
            Luiz F. R. C. Carmo   Field surveillance of fuel dispensers
                                  using IoT-based metering and blockchains ??


Journal of Network and Computer Applications
Volume 176, Number ??, February 15, 2021

                      Anonymous   15 February 2021 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
Tomas Hernandez-Quintanilla and   
      Eduardo Magaña and   
       Daniel Morató and   
                     Mikel Izal   On the reduction of authoritative DNS
                                  cache timeouts: Detection and
                                  implications for user privacy  . . . . . ??
                Neda Maleki and   
        Amir Masoud Rahmani and   
                    Mauro Conti   SPO: a Secure and Performance-aware
                                  Optimization for MapReduce Scheduling    ??
                   Cheng Xu and   
                Xinxin Wang and   
               Shihong Duan and   
                    Jiawang Wan   Spatial-temporal constrained particle
                                  filter for cooperative target tracking   ??
                 Liang Yang and   
                   Bryan Ng and   
         Winston K. G. Seah and   
             Lindsay Groves and   
                   Deepak Singh   A survey on network forwarding in
                                  Software-Defined Networking  . . . . . . ??
             Kostas Kolomvatsos   Proactive tasks management for Pervasive
                                  Computing Applications . . . . . . . . . ??
                     Jie Xu and   
                Jingyu Wang and   
                      Qi Qi and   
               Jianxin Liao and   
                Haifeng Sun and   
                    Zhu Han and   
                    Tonghong Li   Network-aware task selection to reduce
                                  multi-application makespan in cloud  . . ??
               Yuexin Xiang and   
                    Wei Ren and   
                Tiantian Li and   
             Xianghan Zheng and   
               Tianqing Zhu and   
         Kim-Kwang Raymond Choo   A multi-type and decentralized data
                                  transaction scheme based on smart
                                  contracts and digital watermarks . . . . ??
              Leandro Loffi and   
     Carla Merkle Westphall and   
 Lukas Derner Grüdtner and   
        Carlos Becker Westphall   Mutual authentication with multi-factor
                                  in IoT--Fog--Cloud environment . . . . . ??
              Ahsan Manzoor and   
                 An Braeken and   
           Salil S. Kanhere and   
            Mika Ylianttila and   
             Madhsanka Liyanage   Proxy re-encryption enabled secure and
                                  anonymous IoT data sharing platform
                                  based on blockchain  . . . . . . . . . . ??
                  Lijun Sun and   
                  Qian Yang and   
                  Xiao Chen and   
                 Zhenxiang Chen   RC-chain: Reputation-based crowdsourcing
                                  blockchain for vehicular networks  . . . ??


Journal of Network and Computer Applications
Volume 177, Number ??, March 1, 2021

                      Anonymous   1 March 2021 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
Víctor Berrocal-Plaza and   
Miguel A. Vega-Rodríguez   Analysis and comparison of mobility
                                  management strategies in public land
                                  mobile networks from a multiobjective
                                  perspective  . . . . . . . . . . . . . . ??
            Pranav Nerurkar and   
               Dhiren Patel and   
                Yann Busnel and   
           Romaric Ludinard and   
                Saru Kumari and   
          Muhammad Khurram Khan   Dissecting bitcoin blockchain: Empirical
                                  analysis of bitcoin network (2009--2020) ??
               Tharaka Hewa and   
            Mika Ylianttila and   
            Madhusanka Liyanage   Survey on blockchain based smart
                                  contracts: Applications, opportunities
                                  and challenges . . . . . . . . . . . . . ??
                 Wai-xi Liu and   
                    Jun Cai and   
             Qing Chun Chen and   
                        Yu Wang   DRL-R: Deep reinforcement learning
                                  approach for intelligent routing in
                                  software-defined data-center networks    ??
               Ahmed Alagha and   
              Rabeb Mizouni and   
               Shakti Singh and   
                 Hadi Otrok and   
                     Anis Ouali   SDRS: a stable data-based recruitment
                                  system in IoT crowdsensing for
                                  localization tasks . . . . . . . . . . . ??
         Marcos V. O. Assis and   
           Luiz F. Carvalho and   
               Jaime Lloret and   
        Mario L. Proença   A GRU deep learning system against
                                  attacks in software defined networks . . ??
                      Bo Yi and   
               Xingwei Wang and   
                      Min Huang   Content delivery enhancement in
                                  Vehicular Social Network with better
                                  routing and caching mechanism  . . . . . ??
                  Yang Xiao and   
                 Qingqi Pei and   
              Tingting Xiao and   
                   Lina Yao and   
                       Huan Liu   MutualRec: Joint friend and item
                                  recommendations with mutualistic
                                  attentional graph neural networks  . . . ??
                 Chunlin Li and   
                    Lei Zhu and   
                 Weigang Li and   
                    Youlong Luo   Joint edge caching and dynamic service
                                  migration in SDN based mobile edge
                                  computing  . . . . . . . . . . . . . . . ??
             Bahar Farahani and   
            Farshad Firouzi and   
                Markus Luecking   The convergence of IoT and distributed
                                  ledger technologies (DLT):
                                  Opportunities, challenges, and solutions ??


Journal of Network and Computer Applications
Volume 178, Number ??, March 15, 2021

                      Anonymous   15 March 2021  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Yihong Chen and   
              Quanyuan Feng and   
                Xiaolin Jia and   
                    Huayue Chen   Modeling and analyzing RFID Generation-2
                                  under unreliable channels  . . . . . . . ??
                 Liqing Qiu and   
               Xiangbo Tian and   
               Jianyi Zhang and   
                 Chunmei Gu and   
                      Shiqi Sai   LIDDE: a differential evolution
                                  algorithm based on
                                  local-influence-descending search
                                  strategy for influence maximization in
                                  social networks  . . . . . . . . . . . . ??
                 Wendi Feng and   
             Chuanchang Liu and   
                   Bo Cheng and   
                  Junliang Chen   Secure and cost-effective controller
                                  deployment in multi-domain SDN with
                                  Baguette . . . . . . . . . . . . . . . . ??
              Ali Shakarami and   
           Ali Shahidinejad and   
          Mostafa Ghobaei-Arani   An autonomous computation offloading
                                  strategy in Mobile Edge Computing: a
                                  deep learning-based hybrid approach  . . ??
              Mehdi Sookhak and   
   Mohammad Reza Jabbarpour and   
         Nader Sohrabi Safa and   
                  F. Richard Yu   Blockchain and smart contract for access
                                  control in healthcare: a survey, issues
                                  and challenges, and open issues  . . . . ??
              B. V. Natesha and   
       Ram Mohana Reddy Guddeti   Adopting elitism-based Genetic Algorithm
                                  for minimizing multi-objective problems
                                  of IoT service placement in fog
                                  computing environment  . . . . . . . . . ??
                    Miao Hu and   
               Xianzhuo Luo and   
                Jiawen Chen and   
            Young Choon Lee and   
                Yipeng Zhou and   
                          Di Wu   Virtual reality: a survey of enabling
                                  technologies and its applications in IoT ??
            Hamed Aboutorab and   
            Omar K. Hussain and   
             Morteza Saberi and   
    Farookh Khadeer Hussain and   
                Elizabeth Chang   A survey on the suitability of risk
                                  identification techniques in the current
                                  networked environment  . . . . . . . . . ??
          Mokhtar Mohammadi and   
            Tarik A. Rashid and   
     Sarkhel H. Taher Karim and   
Adil Hussain Mohammed Aldalwie and   
             Quan Thanh Tho and   
              Moazam Bidaki and   
        Amir Masoud Rahmani and   
             Mehdi Hosseinzadeh   A comprehensive survey and taxonomy of
                                  the SVM-based intrusion detection
                                  systems  . . . . . . . . . . . . . . . . ??
      Md. Shahin Alom Shuvo and   
     Md. Azad Rahaman Munna and   
               Sujan Sarker and   
             Tamal Adhikary and   
         Md. Abdur Razzaque and   
     Mohammad Mehedi Hassan and   
              Gianluca Aloi and   
              Giancarlo Fortino   Energy-efficient scheduling of small
                                  cells in 5G: a meta-heuristic approach   ??


Journal of Network and Computer Applications
Volume 179, Number ??, April 1, 2021

                      Anonymous   1 April 2021 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Ankush Manocha and   
              Munish Bhatia and   
                  Gulshan Kumar   Dew computing-inspired
                                  health-meteorological factor analysis
                                  for early prediction of bronchial asthma ??
                    Jie Jia and   
                  Jian Chen and   
                Yansha Deng and   
               Xingwei Wang and   
            Abdol-Hamid Aghvami   Reliability optimization for industrial
                                  WSNs with FD relays and multiple
                                  parallel connections . . . . . . . . . . ??
                Yating Yang and   
                  Tian Song and   
                Weijia Yuan and   
                    Jianping An   Towards reliable and efficient data
                                  retrieving in ICN-based satellite
                                  networks . . . . . . . . . . . . . . . . ??
             Mahender Kumar and   
                   Satish Chand   MedHypChain: a patient-centered
                                  interoperability hyperledger-based
                                  medical healthcare system: Regulation in
                                  COVID-19 pandemic  . . . . . . . . . . . ??
                Hazim Hanif and   
 Mohd Hairul Nizam Md Nasir and   
       Mohd Faizal Ab Razak and   
              Ahmad Firdaus and   
               Nor Badrul Anuar   The rise of software vulnerability:
                                  Taxonomy of software vulnerabilities
                                  detection and machine learning
                                  approaches . . . . . . . . . . . . . . . ??
              Muhammad Saad and   
              Joongheon Kim and   
               DaeHun Nyang and   
                 David Mohaisen   Contra-*: Mechanisms for countering spam
                                  attacks on blockchain's memory pools . . ??


Journal of Network and Computer Applications
Volume 180, Number ??, April 15, 2021

                      Anonymous   15 April 2021  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
         Raafat O. Aburukba and   
              Taha Landolsi and   
                     Dalia Omer   A heuristic scheduling approach for
                                  fog--cloud computing environment with
                                  stationary IoT devices . . . . . . . . . ??
         Mir Salim Ul Islam and   
                Ashok Kumar and   
                     Yu-Chen Hu   Context-aware scheduling in Fog
                                  computing: a survey, taxonomy,
                                  challenges and future directions . . . . ??
                 Chunlin Li and   
                    Jun Liu and   
                      Bo Lu and   
                    Youlong Luo   Cost-aware automatic scaling and
                                  workload-aware replica management for
                                  edge-cloud environment . . . . . . . . . ??
                Xiaojie Liu and   
               Xingwei Wang and   
                    Jie Jia and   
                      Min Huang   A distributed deployment algorithm for
                                  communication coverage in wireless
                                  robotic networks . . . . . . . . . . . . ??
                 Enes Erdin and   
                 Mumin Cebe and   
               Kemal Akkaya and   
              Eyuphan Bulut and   
                 Selcuk Uluagac   A scalable private Bitcoin payment
                                  channel network with privacy guarantees  ??
             Samaneh Sadegh and   
           Kamran Zamanifar and   
             Piotr Kasprzak and   
                Ramin Yahyapour   A two-phase virtual machine placement
                                  policy for data-intensive applications
                                  in cloud . . . . . . . . . . . . . . . . ??
                  Ali Dorri and   
                 Fengji Luo and   
             Samuel Karumba and   
              Salil Kanhere and   
                Raja Jurdak and   
                 Zhao Yang Dong   Temporary immutability: a removable
                                  blockchain solution for prosumer-side
                                  energy trading . . . . . . . . . . . . . ??
        Aleksandro Montanha and   
        Airton M. Polidorio and   
María del Carmen Romero-Ternero   New signal location method based on
                                  signal-range data for proximity tracing
                                  tools  . . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 181, Number ??, May 1, 2021

                      Anonymous   1 May 2021 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Umer Majeed and   
              Latif U. Khan and   
               Ibrar Yaqoob and   
          S. M. Ahsan Kazmi and   
               Khaled Salah and   
               Choong Seon Hong   Blockchain for IoT-based smart cities:
                                  Recent advances, requirements, and
                                  future challenges  . . . . . . . . . . . ??
              Zahra Eghbali and   
             Mina Zolfy Lighvan   A hierarchical approach for accelerating
                                  IoT data management process based on SDN
                                  principles . . . . . . . . . . . . . . . ??
               Junaid Shuja and   
               Kashif Bilal and   
            Waleed Alasmary and   
               Hassan Sinky and   
                   Eisa Alanazi   Applying machine learning techniques for
                                  caching in next-generation edge
                                  networks: a comprehensive survey . . . . ??
          Simone Bolettieri and   
             Raffaele Bruno and   
                  Enzo Mingozzi   Application-aware resource allocation
                                  and data management for MEC-assisted IoT
                                  service providers  . . . . . . . . . . . ??
              Shivam Saxena and   
             Bharat Bhushan and   
                Mohd Abdul Ahad   Blockchain based solutions to secure
                                  IoT: Background, integration trends and
                                  a way forward  . . . . . . . . . . . . . ??
               Jonghyun Kim and   
           Pratik K. Biswas and   
            Stephan Bohacek and   
           Sharon J. Mackey and   
             Siamak Samoohi and   
                Mitesh P. Patel   Advanced protocols for the mitigation of
                                  friendly jamming in mobile ad-hoc
                                  networks . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 182, Number ??, May 15, 2021

                      Anonymous   15 May 2021  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Le Tian and   
               Serena Santi and   
          Amina Seferagi\'c and   
                 Julong Lan and   
                  Jeroen Famaey   Wi-Fi HaLow for the Internet of Things:
                                  an up-to-date survey on IEEE 802.11ah
                                  research . . . . . . . . . . . . . . . . ??
                    Tao Ren and   
                Jianwei Niu and   
                  Jiahe Cui and   
            Zhenchao Ouyang and   
                    Xuefeng Liu   An application of multi-objective
                                  reinforcement learning for efficient
                                  model-free control of canals deployed
                                  with IoT networks  . . . . . . . . . . . ??
           Md Sadek Ferdous and   
Mohammad Jabed Morshed Chowdhury and   
              Mohammad A. Hoque   A survey of consensus algorithms in
                                  public blockchain systems for
                                  crypto-currencies  . . . . . . . . . . . ??
           Prashanth Podili and   
                 Kotaro Kataoka   TRAQR: Trust aware End-to-End QoS
                                  routing in multi-domain SDN using
                                  Blockchain . . . . . . . . . . . . . . . ??
                 Sheng Feng and   
                 Haiyan Shi and   
              Longjun Huang and   
                Shigen Shen and   
                    Shui Yu and   
                   Hua Peng and   
                   Chengdong Wu   Unknown hostile environment-oriented
                                  autonomous WSN deployment using a mobile
                                  robot  . . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 183--184, Number ??, June 1, 2021

                      Anonymous   1 June 2021  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Giuseppe Aceto and   
           Domenico Ciuonzo and   
           Antonio Montieri and   
         Antonio Pescapé   DISTILLER: Encrypted traffic
                                  classification via multimodal multitask
                                  deep learning  . . . . . . . . . . . . . ??
               Quanjun Zhao and   
                Songtao Guo and   
                     Guiyan Liu   Cost\_EACP: Cost-effective adaptive
                                  controller provisioning in software
                                  defined DCNs . . . . . . . . . . . . . . ??
            Shumaila Javaid and   
               Zhenqiang Wu and   
                 Zara Hamid and   
           Sherali Zeadally and   
                    Hamza Fahim   Temperature-aware routing protocol for
                                  Intrabody Nanonetworks . . . . . . . . . ??
                 LanLan Rui and   
              Menglei Zhang and   
                Zhipeng Gao and   
                Xuesong Qiu and   
                 Zhili Wang and   
                       Ao Xiong   Service migration in multi-access edge
                                  computing: a joint state adaptation and
                                  reinforcement learning mechanism . . . . ??
             S. Jayalekshmi and   
              R. Leela Velusamy   GSA-RPI: GSA based Rendezvous Point
                                  Identification in a two-level cluster
                                  based LR-WPAN for uncovering the optimal
                                  trajectory of Mobile Data Collection
                                  Agent  . . . . . . . . . . . . . . . . . ??
           Mohamed Mohamadi and   
               Badis Djamaa and   
      Mustapha Reda Senouci and   
             Abdelhamid Mellouk   FAN: Fast and Active Network Formation
                                  in IEEE 802.15.4 TSCH Networks . . . . . ??
              Ajit Muzumdar and   
                Chirag Modi and   
                Madhu G. M. and   
                  C. Vyjayanthi   A trustworthy and incentivized smart
                                  grid energy trading framework using
                                  distributed ledger and smart contracts   ??


Journal of Network and Computer Applications
Volume 185, Number ??, July 1, 2021

                      Anonymous   1 July 2021  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Bilal Abu-Salih   Domain-specific knowledge graphs: a
                                  survey . . . . . . . . . . . . . . . . . ??
                Xinqian Liu and   
                Jiadong Ren and   
                  Haitao He and   
                 Bing Zhang and   
                  Chen Song and   
                    Yunxue Wang   A fast all-packets-based DDoS attack
                                  detection approach based on network
                                  graph and graph kernel . . . . . . . . . ??
                  Stella Ho and   
                 Youyang Qu and   
                   Bruce Gu and   
              Longxiang Gao and   
                 Jianxin Li and   
                     Yong Xiang   DP-GAN: Differentially private
                                  consecutive data publishing using
                                  generative adversarial nets  . . . . . . ??
         Zahra Makki Nayeri and   
           Toktam Ghafarian and   
                  Bahman Javadi   Application placement in Fog computing
                                  with AI approach: Taxonomy and a state
                                  of the art survey  . . . . . . . . . . . ??
                   Leyi Shi and   
                  Xiaoyu Li and   
                 Zhenbo Gao and   
               Pengfei Duan and   
                     Na Liu and   
                  Honglong Chen   Worm computing: a blockchain-based
                                  resource sharing and cybersecurity
                                  framework  . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 186, Number ??, July 15, 2021

                      Anonymous   15 July 2021 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 LanLan Rui and   
              Menglei Zhang and   
                Zhipeng Gao and   
                Xuesong Qiu and   
                 Zhili Wang and   
                       Ao Xiong   Corrigendum to ``Service migration in
                                  multi-access edge computing: a joint
                                  state adaptation and reinforcement
                                  learning mechanism'' [J. Netw. Comput.
                                  Appl. \bf 183--184 (2021) 103058]  . . . ??
                Pangun Park and   
     Hossein S. Ghadikolaei and   
                Carlo Fischione   Proactive fault-tolerant wireless mesh
                                  networks for mission-critical control
                                  systems  . . . . . . . . . . . . . . . . ??
                 Qingtao Wu and   
                Qianyu Wang and   
            Mingchuan Zhang and   
              Ruijuan Zheng and   
                Junlong Zhu and   
                     Jiankun Hu   Learned Bloom-filter for the efficient
                                  name lookup in Information-Centric
                                  Networking . . . . . . . . . . . . . . . ??
         Nabajyoti Mazumdar and   
                Saugata Roy and   
                Amitava Nag and   
                  Sukumar Nandi   An adaptive hierarchical data
                                  dissemination mechanism for mobile data
                                  collector enabled dynamic wireless
                                  sensor network . . . . . . . . . . . . . ??
               Ahmad Zareie and   
              Rizos Sakellariou   Minimizing the spread of misinformation
                                  in online social networks: a survey  . . ??


Journal of Network and Computer Applications
Volume 187, Number ??, August 1, 2021

                      Anonymous   1 August 2021  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Meghna Raj and   
             Shashank Gupta and   
              Vinay Chamola and   
            Anubhav Elhence and   
                 Tanya Garg and   
       Mohammed Atiquzzaman and   
                   Dusit Niyato   A survey on the role of Internet of
                                  Things for adopting and promoting
                                  Agriculture 4.0  . . . . . . . . . . . . ??
                Nisha Ahuja and   
              Gaurav Singal and   
     Debajyoti Mukhopadhyay and   
                   Neeraj Kumar   Automated DDOS attack detection in
                                  software defined networking  . . . . . . ??
  Ismael Amezcua Valdovinos and   
Jesús Arturo Pérez-Díaz and   
     Kim-Kwang Raymond Choo and   
             Juan Felipe Botero   Emerging DDoS attack detection and
                                  mitigation strategies in
                                  software-defined networks: Taxonomy,
                                  challenges and future directions . . . . ??
             Sang-Woong Lee and   
       Haval Mohammed sidqi and   
          Mokhtar Mohammadi and   
              Shima Rashidi and   
        Amir Masoud Rahmani and   
           Mohammad Masdari and   
             Mehdi Hosseinzadeh   Towards secure intrusion detection
                                  systems using deep learning techniques:
                                  Comprehensive analysis and review  . . . ??


Journal of Network and Computer Applications
Volume 188, Number ??, August 15, 2021

                      Anonymous   15 August 2021 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Meena Pundir and   
          Jasminder Kaur Sandhu   A Systematic Review of Quality of
                                  Service in Wireless Sensor Networks
                                  using Machine Learning: Recent Trend and
                                  Future Vision  . . . . . . . . . . . . . ??
                Xuerui Wang and   
                  Zheng Yan and   
                  Rui Zhang and   
                     Peng Zhang   Attacks and defenses in user
                                  authentication systems: a survey . . . . ??
                    Xu Zhao and   
             Guangqiu Huang and   
                   Ling Gao and   
                 Maozhen Li and   
                     Quanli Gao   Low load DIDS task scheduling based on
                                  $Q$-learning in edge computing
                                  environment  . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 189, Number ??, September 1, 2021

                      Anonymous   1 September 2021 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                   Xin Jian and   
                 Langyun Wu and   
                  Keping Yu and   
            Moayad Aloqaily and   
               Jalel Ben-Othman   Energy-efficient user association with
                                  load-balancing for cooperative IIoT
                                  network within B5G era . . . . . . . . . ??
                 Yingya Guo and   
               Weipeng Wang and   
                  Han Zhang and   
               Wenzhong Guo and   
              Zhiliang Wang and   
                  Ying Tian and   
                    Xia Yin and   
                    Jianping Wu   Traffic Engineering in Hybrid Software
                                  Defined Network via Reinforcement
                                  Learning . . . . . . . . . . . . . . . . ??
               Zhiwei Zhang and   
                    Lin Cui and   
                         Jia Wu   Exploring an edge convolution and
                                  normalization based approach for link
                                  prediction in complex networks . . . . . ??
           Rizwana Shahzadi and   
               Mudassar Ali and   
        Humayun Zubair Khan and   
                 Muhammad Naeem   UAV assisted 5G and beyond wireless
                                  networks: a survey . . . . . . . . . . . ??
              Tommaso Zoppi and   
              Andrea Ceccarelli   Prepare for trouble and make it double!
                                  Supervised--unsupervised stacking for
                                  anomaly-based intrusion detection  . . . ??
              Hoang Minh Do and   
            Mark A. Gregory and   
                        Shuo Li   SDN-based wireless mobile backhaul
                                  architecture: Review and challenges  . . ??
                   Yuan Liu and   
                  Rentao Gu and   
                Zeyuan Yang and   
                     Yuefeng Ji   Hierarchical community discovery for
                                  multi-stage IP bearer network
                                  upgradation  . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 190, Number ??, September 15, 2021

                      Anonymous   15 September 2021  . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
 Mohammad Sadegh Yousefpoor and   
            Efat Yousefpoor and   
               Hamid Barati and   
                 Ali Barati and   
               Ali Movaghar and   
             Mehdi Hosseinzadeh   Secure data aggregation methods and
                                  countermeasures against various attacks
                                  in wireless sensor networks: a
                                  comprehensive review . . . . . . . . . . ??
               Tanveer Khan and   
           Antonis Michalas and   
                Adnan Akhunzada   Fake news outbreak 2021: Can we stop the
                                  viral spread?  . . . . . . . . . . . . . ??
                 Jiajing Wu and   
                  Jieli Liu and   
                Yijing Zhao and   
                    Zibin Zheng   Analysis of cryptocurrency transactions
                                  from a network perspective: an overview  ??
              Hai T. Nguyen and   
                 Tien V. Do and   
                   Csaba Rotter   Optimizing the resource usage of
                                  actor-based systems  . . . . . . . . . . ??
               Elie Zaraket and   
        Nour Mohammad Murad and   
         Samar Syed Yazdani and   
           Lala Rajaoarisoa and   
                  Blaise Ravelo   An overview on low energy wake-up radio
                                  technology: Active and passive circuits
                                  associated with MAC and routing
                                  protocols  . . . . . . . . . . . . . . . ??
        Ahmad Salah AlAhmad and   
               Hasan Kahtan and   
      Yehia Ibrahim Alzoubi and   
                   Omar Ali and   
                 Ashraf Jaradat   Mobile cloud computing models security
                                  issues: a systematic review  . . . . . . ??
                Fran Casino and   
          Nikolaos Lykousas and   
              Ivan Homoliak and   
      Constantinos Patsakis and   
         Julio Hernandez-Castro   Intercepting Hail Hydra: Real-time
                                  detection of Algorithmically Generated
                                  Domains  . . . . . . . . . . . . . . . . ??
                   Hui Yang and   
               Kaixuan Zhan and   
                  Bowen Bao and   
                 Qiuyan Yao and   
                  Jie Zhang and   
                Mohamed Cheriet   Automatic guarantee scheme for
                                  intent-driven network slicing and
                                  reconfiguration  . . . . . . . . . . . . ??
                  Yunhe Cui and   
                  Qing Qian and   
                   Chun Guo and   
                Guowei Shen and   
              Youliang Tian and   
               Huanlai Xing and   
                   Lianshan Yan   Towards DDoS detection mechanisms in
                                  Software-Defined Networking  . . . . . . ??


Journal of Network and Computer Applications
Volume 191, Number ??, October 1, 2021

                      Anonymous   1 October 2021 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Quoc-Viet Pham and   
             Dinh C. Nguyen and   
         Seyedali Mirjalili and   
            Dinh Thai Hoang and   
             Diep N. Nguyen and   
        Pubudu N. Pathirana and   
                  Won-Joo Hwang   Swarm intelligence for next-generation
                                  networks: Recent advances and
                                  applications . . . . . . . . . . . . . . ??
                  Yan Huang and   
                     Wei Li and   
                Jinbao Wang and   
                Zhipeng Cai and   
               Anu G. Bourgeois   Privacy protection among three
                                  antithetic-parties for context-aware
                                  services . . . . . . . . . . . . . . . . ??
                Imen Jemili and   
               Dhouha Ghrab and   
       Abdelfettah Belghith and   
             Mohamed Mosbah and   
                 Saad Al-Ahmadi   Cross-layer multipath approach for
                                  critical traffic in duty-cycled wireless
                                  sensor networks  . . . . . . . . . . . . ??
               Maha Kadadha and   
                 Hadi Otrok and   
               Shakti Singh and   
              Rabeb Mizouni and   
                     Anis Ouali   Two-sided preferences task matching
                                  mechanisms for blockchain-based
                                  crowdsourcing  . . . . . . . . . . . . . ??
          Ahmad Zairi Zaidi and   
            Chun Yong Chong and   
                    Zhe Jin and   
        Rajendran Parthiban and   
                Ali Safaa Sadiq   Touch-based continuous mobile device
                                  authentication: State-of-the-art,
                                  challenges and opportunities . . . . . . ??
           Anand M. Baswade and   
               Mohith Reddy and   
         Antony Franklin A. and   
    Bheemarjuna Reddy Tamma and   
                  Vanlin Sathya   Performance analysis of spatially
                                  distributed LTE-U/NR-U and Wi-Fi
                                  networks: an analytical model for
                                  coexistence study  . . . . . . . . . . . ??
              Longbiao Chen and   
               Zhihan Jiang and   
                Dingqi Yang and   
                 Cheng Wang and   
           Thi-Mai-Trang Nguyen   Fog radio access network optimization
                                  for 5G leveraging user mobility and
                                  traffic data . . . . . . . . . . . . . . ??
                 Chunlin Li and   
                 Yong Zhang and   
              Mingyang Song and   
                    Xin Yan and   
                    Youlong Luo   An optimized content caching strategy
                                  for video stream in edge-cloud
                                  environment  . . . . . . . . . . . . . . ??
       Mahmoud Said ElSayed and   
           Nhien-An Le-Khac and   
         Marwan Ali Albahar and   
                    Anca Jurcut   A novel hybrid model for intrusion
                                  detection systems in SDNs based on CNN
                                  and a new regularization technique . . . ??
             Vincenzo Agate and   
        Alessandra De Paola and   
           Pierluca Ferraro and   
             Giuseppe Lo Re and   
                   Marco Morana   SecureBallot: a secure open source
                                  e-Voting system  . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 192, Number ??, October 15, 2021

                      Anonymous   15 October 2021  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
              Jannatun Noor and   
         Saiful Islam Salim and   
         A. B. M. Alim Al Islam   Strategizing secured image storing and
                                  efficient image retrieval through a new
                                  cloud framework  . . . . . . . . . . . . ??
Ahmed Yaser Fahad Alsahlani and   
                 Alexandru Popa   LMAAS-IoT: Lightweight multi-factor
                                  authentication and authorization scheme
                                  for real-time data access in IoT
                                  cloud-based environment  . . . . . . . . ??
                    Sen Liu and   
               Jiawei Huang and   
              Wenchao Jiang and   
                   Jianxin Wang   Reducing traffic burstiness for MPTCP in
                                  data center networks . . . . . . . . . . ??
             Fillipe Santos and   
         Andre L. L. Aquino and   
      Edmundo R. M. Madeira and   
               Raquel S. Cabral   Temporal complex networks modeling
                                  applied to vehicular ad-hoc networks . . ??
          EL Hocine Bouzidi and   
      Abdelkader Outtagarts and   
                Rami Langar and   
                  Raouf Boutaba   Deep Q-Network and Traffic Prediction
                                  based Routing Optimization in Software
                                  Defined Networks . . . . . . . . . . . . ??
                 Shwet Ketu and   
            Pramod Kumar Mishra   Internet of Healthcare Things: a
                                  contemporary survey  . . . . . . . . . . ??
             Changsong Yang and   
                  Feng Zhao and   
               Xiaoling Tao and   
                      Yong Wang   Publicly verifiable outsourced data
                                  migration scheme supporting efficient
                                  integrity checking . . . . . . . . . . . ??
      Mostafa Haghi Kashani and   
            Mona Madanipour and   
          Mohammad Nikravan and   
           Parvaneh Asghari and   
              Ebrahim Mahdipour   A systematic review of IoT in
                                  healthcare: Applications, techniques,
                                  and trends . . . . . . . . . . . . . . . ??
               Qiumei Cheng and   
                Chunming Wu and   
               Haifeng Zhou and   
               Dezhang Kong and   
                 Dong Zhang and   
                Junchi Xing and   
                       Wei Ruan   Machine learning based malicious payload
                                  identification in software-defined
                                  networking . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 193, Number ??, November 1, 2021

                      Anonymous   1 November 2021  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                 Liqun Yang and   
                   You Zhai and   
                     Zhoujun Li   Deep learning for online AC False Data
                                  Injection Attack detection in smart
                                  grids: an approach using
                                  LSTM-Autoencoder . . . . . . . . . . . . ??
         Prabhakar Krishnan and   
        Subhasri Duttagupta and   
                 Rajkumar Buyya   OpenPATH: Application aware
                                  high-performance software-defined
                                  switching framework  . . . . . . . . . . ??
                 Junyan Guo and   
                      Ye Du and   
               Yahang Zhang and   
                     Meihong Li   A provably secure ECC-based access and
                                  handover authentication protocol for
                                  space information networks . . . . . . . ??
                    Hao Hao and   
               Changqiao Xu and   
                Shujie Yang and   
                Lujie Zhong and   
           Gabriel-Miro Muntean   Multicast-aware optimization for
                                  resource allocation with edge computing
                                  and caching  . . . . . . . . . . . . . . ??
               Yuning Jiang and   
                    Yacine Atif   A selective ensemble model for cognitive
                                  cybersecurity analysis . . . . . . . . . ??
               Huu-Khoi Bui and   
               Ying-Dar Lin and   
             Ren-Hung Hwang and   
               Po-Ching Lin and   
            Van-Linh Nguyen and   
                 Yuan-Cheng Lai   CREME: a toolchain of automatic dataset
                                  collection for machine learning in
                                  intrusion detection  . . . . . . . . . . ??
               Israat Haque and   
                     Dipon Saha   SoftIoT: a resource-aware SDN/NFV-based
                                  IoT network  . . . . . . . . . . . . . . ??
                Xiaobei Yan and   
                       Maode Ma   A lightweight and secure handover
                                  authentication scheme for 5G network
                                  using neighbour base stations  . . . . . ??


Journal of Network and Computer Applications
Volume 194, Number ??, November 15, 2021

                      Anonymous   15 November 2021 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Kaylani Bochie and   
          Mateus S. Gilbert and   
              Luana Gantert and   
      Mariana S. M. Barbosa and   
      Dianne S. V. Medeiros and   
       Miguel Elias M. Campista   A survey on deep learning for challenged
                                  networks: Applications and trends  . . . ??
                Selma Yahia and   
            Yassine Meraihi and   
        Amar Ramdane-Cherif and   
     Asma Benmessaoud Gabis and   
              Dalila Acheli and   
                    Hongyu Guan   A Survey of Channel Modeling Techniques
                                  for Visible Light Communications . . . . ??
       Majda Omer Elbasheer and   
     Abdulaziz Aldegheishem and   
               Jaime Lloret and   
                  Nabil Alrajeh   A QoS-Based routing algorithm over
                                  software defined networks  . . . . . . . ??
             Shie-Yuan Wang and   
               Jui-En Chang and   
                   Cheng-Da Lin   Design, implementation, and performance
                                  evaluation of a drone wakeup and data
                                  collection system for smart meters . . . ??
      Muralitharan Krishnan and   
                     Yongdo Lim   Reinforcement learning-based dynamic
                                  routing using mobile sink for data
                                  collection in WSNs and IoT applications  ??
                     Xi Liu and   
                   Jian Cen and   
               Huanzhong Hu and   
                 Zongwei Yu and   
                  Yuanxin Huang   A radio map self-updating algorithm
                                  based on mobile crowd sensing  . . . . . ??


Journal of Network and Computer Applications
Volume 195, Number ??, December 1, 2021

                      Anonymous   1 December 2021  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Abdellah Houmz and   
              Ghita Mezzour and   
                 Karim Zkik and   
              Mounir Ghogho and   
                Houda Benbrahim   Detecting the impact of software
                                  vulnerability on attacks: a case study
                                  of network telescope scans . . . . . . . ??
              Hongyan Zhang and   
                  Limei Lin and   
                      Li Xu and   
                  Xiaoding Wang   Graph partition based privacy-preserving
                                  scheme in social networks  . . . . . . . ??
  Abdurrashid Ibrahim Sanka and   
               Ray C. C. Cheung   A systematic review of blockchain
                                  scalability: Issues, solutions, analysis
                                  and future research  . . . . . . . . . . ??
Josué Castañeda and   
Saul E. Pomares Hernández and   
                Sami Yangui and   
Julio C. Pérez Sansalvador and   
Lil M. Rodr\'ìguez Henr\'ìquez and   
                   Khalil Drira   VNF-based network service consistent
                                  reconfiguration in multi-domain
                                  federations: a distributed approach  . . ??
                Ruhma Tahir and   
             Shahzaib Tahir and   
                Hasan Tahir and   
       Klaus McDonald-Maier and   
             Gareth Howells and   
                     Ali Sajjad   A novel ICMetric public key framework
                                  for secure communication . . . . . . . . ??
               Anjula Mehto and   
         Shashikala Tapaswi and   
                K. K. Pattanaik   Multi-objective particle swarm
                                  optimization based rendezvous point
                                  selection for the energy and delay
                                  efficient networked wireless sensor data
                                  acquisition  . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 196, Number ??, December 15, 2021

                      Anonymous   15 December 2021 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Kai Lei and   
               Junlin Huang and   
                Xiaodong Li and   
                      Yu Li and   
                   Ye Zhang and   
                     Bo Bai and   
                  Fan Zhang and   
                 Gong Zhang and   
                  Jingjie Jiang   HOPASS: a two-layer control framework
                                  for bandwidth and delay guarantee in
                                  datacenters  . . . . . . . . . . . . . . ??
                  Fan Zhang and   
                 Yazhe Tang and   
               Danfeng Shan and   
              Huanzhao Wang and   
                   Chengchen Hu   RICH: Strategy-proof and efficient
                                  coflow scheduling in non-cooperative
                                  environments . . . . . . . . . . . . . . ??
             Jiaojiao Jiang and   
         Jean-Guy Schneider and   
             Steve Versteeg and   
                    Jun Han and   
          MD Arafat Hossain and   
                   Chengfei Liu   R-gram: Inferring message formats of
                                  service protocols with relative
                                  positional $n$-grams . . . . . . . . . . ??
                Bingjie Wei and   
                   Lin Wang and   
                Junlong Zhu and   
            Mingchuan Zhang and   
                  Ling Xing and   
                     Qingtao Wu   Flow control oriented forwarding and
                                  caching in cache-enabled networks  . . . ??
  Mallikarjun Reddy Dorsala and   
               V. N. Sastry and   
               Sudhakar Chapram   Blockchain-based solutions for cloud
                                  computing: a survey  . . . . . . . . . . ??
   U. S. P. Srinivas Aditya and   
               Roshan Singh and   
         Pranav Kumar Singh and   
                 Anshuman Kalla   A Survey on Blockchain in Robotics:
                                  Issues, Opportunities, Challenges and
                                  Future Directions  . . . . . . . . . . . ??
       Nabila Sabrin Sworna and   
   A. K. M. Muzahidul Islam and   
          Swakkhar Shatabda and   
                  Salekul Islam   Towards development of IoT-ML driven
                                  healthcare systems: a survey . . . . . . ??


Journal of Network and Computer Applications
Volume 197, Number ??, January, 2022

                      Anonymous   January 2022 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   Thank You Reviewers  . . . . . . . . . . ??
     Debanjan Roy Chowdhury and   
              Sukumar Nandi and   
                Diganta Goswami   Video streaming over IoV using IP
                                  multicast  . . . . . . . . . . . . . . . ??
                Fanghui Sun and   
                  Shen Wang and   
                   Hongli Zhang   A progressive learning method on unknown
                                  protocol behaviors . . . . . . . . . . . ??
           Irian Leyva-Pupo and   
Cristina Cervelló-Pastor   Efficient solutions to the placement and
                                  chaining problem of User Plane Functions
                                  in 5G networks . . . . . . . . . . . . . ??
              Khizar Hameed and   
               Saurabh Garg and   
        Muhammad Bilal Amin and   
                Byeong Kang and   
                      Abid Khan   A context-aware information-based clone
                                  node attack detection scheme in Internet
                                  of Things  . . . . . . . . . . . . . . . ??
               Gunjan Verma and   
              Kelvin Marcus and   
                  Kevin S. Chan   Optimizing the quality of information of
                                  networked machine learning agents  . . . ??


Journal of Network and Computer Applications
Volume 198, Number ??, February, 2022

                      Anonymous   February 2022  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Sana Benhamaid and   
    Abdelmadjid Bouabdallah and   
                 Hicham Lakhlef   Recent advances in energy management for
                                  Green-IoT: an up-to-date and
                                  comprehensive survey . . . . . . . . . . ??
             Xiaoqing Zhang and   
                   Fei Yang and   
                     Yue Hu and   
                  Zhao Tian and   
                    Wei Liu and   
                    Yifa Li and   
                        Wei She   RANet: Network intrusion detection with
                                  group-gating convolutional neural
                                  network  . . . . . . . . . . . . . . . . ??
          Waleed Bin Shahid and   
                Baber Aslam and   
               Haider Abbas and   
            Saad Bin Khalid and   
                   Hammad Afzal   An enhanced deep learning based
                                  framework for web attacks detection,
                                  mitigation and attacker profiling  . . . ??
             Shie-Yuan Wang and   
                Jen-Chieh Chang   Design and implementation of an
                                  intrusion detection system by using
                                  Extended BPF in the Linux kernel . . . . ??
                   Ruhui Ma and   
                    Jin Cao and   
               Dengguo Feng and   
                     Hui Li and   
                 Xiaowei Li and   
                        Yang Xu   A robust authentication scheme for
                                  remote diagnosis and maintenance in 5G
                                  V2N  . . . . . . . . . . . . . . . . . . ??
                 Lanlan Rui and   
                  Siqi Yang and   
                Zhipeng Gao and   
                 Wenjing Li and   
                Xuesong Qiu and   
                   Luoming Meng   Smart network maintenance in edge cloud
                                  computing environment: an allocation
                                  mechanism based on comprehensive
                                  reputation and regional prediction model ??
            Abir EL Azzaoui and   
        Pradip Kumar Sharma and   
                 Jong Hyuk Park   Blockchain-based delegated Quantum Cloud
                                  architecture for medical big data
                                  security . . . . . . . . . . . . . . . . ??
           Kazi Yasin Islam and   
             Iftekhar Ahmad and   
            Daryoush Habibi and   
                    Adnan Waqar   A survey on energy efficiency in
                                  underwater wireless communications . . . ??
               Faheem Ullah and   
                   M. Ali Babar   On the scalability of Big Data Cyber
                                  Security Analytics systems . . . . . . . ??


Journal of Network and Computer Applications
Volume 199, Number ??, March, 2022

                      Anonymous   March 2022 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
            Tuan Anh Nguyen and   
                Minjune Kim and   
                 Jangse Lee and   
                  Dugki Min and   
                Jae-Woo Lee and   
                  Dongseong Kim   Performability evaluation of switch-over
                                  Moving Target Defence mechanisms in a
                                  Software Defined Networking using
                                  stochastic reward nets . . . . . . . . . ??
           Kiki Adhinugraha and   
               Wenny Rahayu and   
              Takahiro Hara and   
                   David Taniar   Measuring fault tolerance in IoT mesh
                                  networks using Voronoi diagram . . . . . ??
                  Yimin Liu and   
              Xiangyang Luo and   
                 Meng Zhang and   
                Zhiyuan Tao and   
                     Fenlin Liu   Who are there: Discover Twitter users
                                  and tweets for target area using mention
                                  relationship strength and local tweet
                                  ratio  . . . . . . . . . . . . . . . . . ??
           Micha\l Kalewski and   
             Jerzy Brzezi\'nski   Uniform and regular reliable broadcast
                                  protocols facilitating concurrent
                                  message dissemination for mobile ad hoc
                                  networks with the network liveness
                                  property . . . . . . . . . . . . . . . . ??
                Yadong Zhou and   
                     Hao Li and   
                Kaiyue Chen and   
                   Tian Pan and   
                   Kun Qian and   
                  Kai Zheng and   
                    Bin Liu and   
                 Peng Zhang and   
                 Yazhe Tang and   
                   Chengchen Hu   Raze policy conflicts in SDN . . . . . . ??
                  Bin Liang and   
            Mark A. Gregory and   
                        Shuo Li   Multi-access Edge Computing
                                  fundamentals, services, enablers and
                                  challenges: a complete survey  . . . . . ??
            Shuaib K. Memon and   
            Nurul I. Sarkar and   
            Adnan Al-Anbuky and   
               Md Akbar Hossain   Preemptive admission control mechanism
                                  for strict QoS guarantee to life-saving
                                  emergency traffic in wireless LANs . . . ??
           Himanshu Gauttam and   
            K. K. Pattanaik and   
           Saumya Bhadauria and   
               Divya Saxena and   
                          Sapna   A cost aware topology formation scheme
                                  for latency sensitive applications in
                                  edge infrastructure-as-a-service
                                  paradigm . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 200, Number ??, April, 2022

                      Anonymous   April 2022 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
           Sanjay Kumar Biswash   Device and network driven cellular
                                  networks architecture and mobility
                                  management technique for fog
                                  computing-based mobile communication
                                  system . . . . . . . . . . . . . . . . . ??
                  Abu Jahid and   
       Mohammed H. Alsharif and   
                 Trevor J. Hall   A contemporary survey on free space
                                  optical communication: Potentials,
                                  technical challenges, recent advances
                                  and research direction . . . . . . . . . ??
              Jong Wook Kim and   
            Kennedy Edemacu and   
                 Beakcheol Jang   Privacy-preserving mechanisms for
                                  location privacy in mobile crowdsensing:
                                  a survey . . . . . . . . . . . . . . . . ??
                Sophia Auer and   
              Sophia Nagler and   
           Somnath Mazumdar and   
          Raghava Rao Mukkamala   Towards blockchain-IoT based shared
                                  mobility: Car-sharing and leasing as a
                                  case study . . . . . . . . . . . . . . . ??
            Farrukh Mehmood and   
         Naveed Khan Baloch and   
              Fawad Hussain and   
                 Waqar Amin and   
          M. Shamim Hossain and   
          Yousaf Bin Zikria and   
                     Heejung Yu   An efficient and cost effective
                                  application mapping for network-on-chip
                                  using Andean condor algorithm  . . . . . ??
                   Shah Zeb and   
              Aamir Mahmood and   
            Syed Ali Hassan and   
            MD. Jalil Piran and   
             Mikael Gidlund and   
                 Mohsen Guizani   Industrial digital twins at the nexus of
                                  NextG wireless networks and
                                  computational intelligence: a survey . . ??
            Lorenzo Valerio and   
       Franco Maria Nardini and   
          Andrea Passarella and   
                Raffaele Perego   Dynamic hard pruning of Neural Networks
                                  at the edge of the Internet  . . . . . . ??
               Fares Mezrag and   
                Salim Bitam and   
             Abdelhamid Mellouk   An efficient and lightweight
                                  identity-based scheme for secure
                                  communication in clustered wireless
                                  sensor networks  . . . . . . . . . . . . ??
            Quang Tung Thai and   
                 Namseok Ko and   
             Sung Hyuk Byun and   
                     Sun-Me Kim   Design and implementation of NDN-based
                                  Ethereum blockchain  . . . . . . . . . . ??
               Meriem Achir and   
          Abdelkrim Abdelli and   
               Lynda Mokdad and   
                Jalel Benothman   Service discovery and selection in IoT:
                                  a survey and a taxonomy  . . . . . . . . ??


Journal of Network and Computer Applications
Volume 201, Number ??, May, 2022

                      Anonymous   May 2022 . . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
Venkatarami Reddy Chintapalli and   
           Madhura Adeppady and   
    Bheemarjuna Reddy Tamma and   
             Antony Franklin A.   \pkgRESTRAIN: a dynamic and
                                  cost-efficient resource management
                                  scheme for addressing performance
                                  interference in NFV-based systems  . . . ??
               Sadoon Azizi and   
          Mohammad Shojafar and   
              Jemal Abawajy and   
                 Rajkumar Buyya   Deadline-aware and energy-efficient IoT
                                  task scheduling in fog computing
                                  systems: a semi-greedy approach  . . . . ??
           Raihan Ur Rasool and   
         Hafiz Farooq Ahmad and   
              Wajid Rafique and   
               Adnan Qayyum and   
                   Junaid Qadir   Security and privacy of internet of
                                  medical things: a contemporary review in
                                  the age of surveillance, botnets, and
                                  adversarial ML . . . . . . . . . . . . . ??
          S. M. Asiful Huda and   
                    Sangman Moh   Survey on computation offloading in
                                  UAV-Enabled mobile edge computing  . . . ??
          Domenico Cotroneo and   
            Luigi De Simone and   
                Roberto Natella   \pkgThorFI: a Novel Approach for Network
                                  Fault Injection as a Service . . . . . . ??
             Shashwat Kumar and   
               Lalit Bhagat and   
         Antony Franklin A. and   
                      Jiong Jin   Multi-neural network based tiled
                                  360${}^\circ $ video caching with Mobile
                                  Edge Computing . . . . . . . . . . . . . ??
                    Qian Li and   
                  Cong Zeng and   
                     Wei Xu and   
                   Yunpeng Xiao   A social rumor and anti-rumor game
                                  diffusion model based on sparse
                                  representation and tensor completion . . ??
    Mostafa Ayoubi Mobarhan and   
               Mohammed Salamah   REPS-AKA3: a secure authentication and
                                  re- authentication protocol for LTE
                                  networks . . . . . . . . . . . . . . . . ??
            Guangxian Liang and   
               Xiaopeng Yao and   
                     Yue Gu and   
               Hejiao Huang and   
                    Chonglin Gu   Multi-Batches Revenue Maximization for
                                  competitive products over online social
                                  network  . . . . . . . . . . . . . . . . ??
                  Yang Wang and   
                 Xiong Wang and   
                Shizhong Xu and   
                      Ci He and   
              Yasheng Zheng and   
                   Jing Ren and   
                        Shui Yu   \pkgFlexMon: a flexible and fine-grained
                                  traffic monitor for programmable
                                  networks . . . . . . . . . . . . . . . . ??
                 Mert Nakip and   
         Erdem Çakan and   
             Volkan Rodoplu and   
       Cüneyt Güzelis   Dynamic Automatic Forecaster Selection
                                  via Artificial Neural Network Based
                                  Emulation to Enable Massive Access for
                                  the Internet of Things . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 202, Number ??, June, 2022

                      Anonymous   June 2022  . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
              Reza Honarvar and   
       Alireza Zolghadrasli and   
                   Mehdi Monemi   Context-oriented performance evaluation
                                  of network selection algorithms in 5G
                                  heterogeneous networks . . . . . . . . . ??
                Ahmed Salim and   
                Walid Osamy and   
                 Ahmed Aziz and   
                 Ahmed M. Khedr   SEEDGT: Secure and energy efficient data
                                  gathering technique for IoT applications
                                  based WSNs . . . . . . . . . . . . . . . ??
                    Jie Sun and   
                   Yi Zhang and   
                   Feng Liu and   
              Huandong Wang and   
                Xiaojian Xu and   
                        Yong Li   A survey on the placement of virtual
                                  network functions  . . . . . . . . . . . ??
                    Wei Wei and   
                    Qi Wang and   
               Weidong Yang and   
                    Yashuang Mu   Efficient stochastic scheduling for
                                  highly complex resource placement in
                                  edge clouds  . . . . . . . . . . . . . . ??
          Radhika Chapaneri and   
                     Seema Shah   Enhanced detection of imbalanced
                                  malicious network traffic with
                                  regularized Generative Adversarial
                                  Networks . . . . . . . . . . . . . . . . ??
                 Chuan Feng and   
               Pengchao Han and   
                   Xu Zhang and   
                 Bowen Yang and   
                  Yejun Liu and   
                        Lei Guo   Computation offloading in mobile edge
                                  computing networks: a survey . . . . . . ??
               Chadni Islam and   
               M. Ali Babar and   
               Roland Croft and   
                  Helge Janicke   SmartValidator: a framework for
                                  automatic identification and
                                  classification of cyber threat data  . . ??
               Nadeem Ahmed and   
          Regio A. Michelin and   
                  Wanli Xue and   
        Guntur Dharma Putra and   
               Sushmita Ruj and   
           Salil S. Kanhere and   
                     Sanjay Jha   DIMY: Enabling privacy-preserving
                                  contact tracing  . . . . . . . . . . . . ??
    B. Mohammad Hasani Zade and   
                N. Mansouri and   
                   M. M. Javidi   A two-stage scheduler based on New
                                  Caledonian Crow Learning Algorithm and
                                  reinforcement learning strategy for
                                  cloud environment  . . . . . . . . . . . ??
              Marta Catillo and   
            Antonio Pecchia and   
                Umberto Villano   No more DoS? An empirical study on
                                  defense techniques for web server Denial
                                  of Service mitigation  . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 203, Number ??, July, 2022

                      Anonymous   July 2022  . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                   Nan Wang and   
               Blesson Varghese   Context-aware distribution of fog
                                  applications using deep reinforcement
                                  learning . . . . . . . . . . . . . . . . ??
        Madhusanka Liyanage and   
             Quoc-Viet Pham and   
                  Kapal Dev and   
         Sweta Bhattacharya and   
Praveen Kumar Reddy Maddikunta and   
     Thippa Reddy Gadekallu and   
                  Gokul Yenduri   A survey on Zero touch network and
                                  Service Management (ZSM) for 5G and
                                  beyond networks  . . . . . . . . . . . . ??
               Shantanu Pal and   
                  Ali Dorri and   
                    Raja Jurdak   Blockchain for IoT access control:
                                  Recent trends and future research
                                  directions . . . . . . . . . . . . . . . ??
                Mauro Conti and   
              Gulshan Kumar and   
            Pranav Nerurkar and   
                 Rahul Saha and   
                  Luigi Vigneri   A survey on security challenges and
                                  solutions in the IOTA  . . . . . . . . . ??
                 Xingjia Li and   
                     Li Pan and   
                     Shijun Liu   A survey of resource provisioning
                                  problem in cloud brokers . . . . . . . . ??
                Pooja Gupta and   
            Volkan Dedeoglu and   
           Salil S. Kanhere and   
                    Raja Jurdak   TrailChain: Traceability of data
                                  ownership across blockchain-enabled
                                  multiple marketplaces  . . . . . . . . . ??
                Soo-Yeon Ji and   
            Bong Keun Jeong and   
            Charles Kamhoua and   
               Nandi Leslie and   
                Dong Hyun Jeong   Forecasting network events to estimate
                                  attack risk: Integration of wavelet
                                  transform and vector auto regression
                                  with exogenous variables . . . . . . . . ??
                Tianheng Li and   
                 Xiaofan He and   
               Siming Jiang and   
                       Juan Liu   A survey of privacy-preserving
                                  offloading methods in mobile-edge
                                  computing  . . . . . . . . . . . . . . . ??
             Huda Althumali and   
             Mohamed Othman and   
       Nor Kamariah Noordin and   
             Zurina Mohd Hanapi   Priority-based load-adaptive preamble
                                  separation random access for
                                  QoS-differentiated services in 5G
                                  networks . . . . . . . . . . . . . . . . ??
            Luigi Coppolino and   
        Salvatore D'Antonio and   
            Giovanni Mazzeo and   
               Luigi Romano and   
                Luigi Sgaglione   \pkgPriSIEM: Enabling privacy-preserving
                                  Managed Security Services  . . . . . . . ??
        Asterios Mpatziakas and   
          Anastasios Drosou and   
       Stavros Papadopoulos and   
             Dimitiris Tzovaras   IoT threat mitigation engine empowered
                                  by artificial intelligence
                                  multi-objective optimization . . . . . . ??
                   Long Luo and   
       Klaus-Tycho Foerster and   
              Stefan Schmid and   
                    Hongfang Yu   Optimizing multicast flows in
                                  high-bandwidth reconfigurable datacenter
                                  networks . . . . . . . . . . . . . . . . ??
               Mattia Fogli and   
            Carlo Giannelli and   
              Cesare Stefanelli   Software-Defined Networking in wireless
                                  ad hoc scenarios: Objectives and control
                                  architectures  . . . . . . . . . . . . . ??
            J. Kok Konjaang and   
                John Murphy and   
                    Liam Murphy   Energy-efficient virtual-machine mapping
                                  algorithm (EViMA) for workflow tasks
                                  with deadlines in a cloud environment    ??


Journal of Network and Computer Applications
Volume 204, Number ??, August, 2022

                      Anonymous   August 2022  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Chu-Fu Wang and   
                Yih-Kai Lin and   
                 Jun-Cheng Chen   A cooperative image object recognition
                                  framework and task offloading
                                  optimization in edge computing . . . . . ??
               Tahseen Khan and   
               Wenhong Tian and   
              Guangyao Zhou and   
          Shashikant Ilager and   
              Mingming Gong and   
                 Rajkumar Buyya   Machine learning (ML)-centric resource
                                  management in cloud computing: a review
                                  and future directions  . . . . . . . . . ??
               Taejune Park and   
                      Kilho Lee   Supporting ultra-low latency
                                  mixed-criticality communication using
                                  hardware-based data plane architecture   ??
                Sara Lahlou and   
           Youness Moukafih and   
               Anass Sebbar and   
                 Karim Zkik and   
          Mohammed Boulmalf and   
                  Mounir Ghogho   TD-RA policy-enforcement framework for
                                  an SDN-based IoT architecture  . . . . . ??
     Mansoureh Abbasi-Verki and   
              Saleh Yousefi and   
               Hashem Kalbkhani   Socially-aware and energy-efficient
                                  resource allocation and power control
                                  for D2D multicast content distribution   ??
          Mohammad Nikravan and   
          Mostafa Haghi Kashani   A review on trust management in fog/edge
                                  computing: Techniques, trends, and
                                  challenges . . . . . . . . . . . . . . . ??
               Ashish Kumar and   
                 Rahul Saha and   
                Mauro Conti and   
              Gulshan Kumar and   
        William J. Buchanan and   
                   Tai Hoon Kim   A comprehensive survey of authentication
                                  methods in Internet-of-Things and its
                                  conjunctions . . . . . . . . . . . . . . ??
           Dipanwita Thakur and   
                 Suparna Biswas   An Integration of feature extraction and
                                  Guided Regularized Random Forest feature
                                  selection for Smartphone based Human
                                  Activity Recognition . . . . . . . . . . ??
          Gerald K. Ijemaru and   
                Li Minn Ang and   
                 Kah Phooi Seng   Transformation from IoT to IoV for waste
                                  management in smart cities . . . . . . . ??
      Muhammad Morshed Alam and   
                    Sangman Moh   Joint topology control and routing in a
                                  UAV swarm for crowd surveillance . . . . ??
               Umar Ghafoor and   
               Mudassar Ali and   
        Humayun Zubair Khan and   
       Adil Masood Siddiqui and   
                 Muhammad Naeem   NOMA and future 5G and B5G wireless
                                  networks: a paradigm . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 205, Number ??, September, 2022

                      Anonymous   September 2022 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
            Ansa Shermin S. and   
              Sarang C. Dhongdi   Review of Underwater Mobile Sensor
                                  Network for ocean phenomena monitoring   ??
             Pau Ferrer-Cid and   
    Jose M. Barcelo-Ordinas and   
             Jorge Garcia-Vidal   Data reconstruction applications for IoT
                                  air pollution sensor networks using
                                  graph signal processing  . . . . . . . . ??
               Mamta Agiwal and   
                Anil Agiwal and   
    Mukesh Kumar Maheshwari and   
            Shapna Muralidharan   Split PO for paging in B5G networks  . . ??
           Shakoor Vakilian and   
                 Ali Fanian and   
          Hossein Falsafain and   
              T. Aaron Gulliver   Node cooperation for workload offloading
                                  in a fog computing network via
                                  multi-objective optimization . . . . . . ??
                Dinesh Soni and   
                  Neetesh Kumar   Machine learning techniques in emerging
                                  cloud computing integrated paradigms: a
                                  survey and taxonomy  . . . . . . . . . . ??
         Prasanta Kumar Roy and   
              Prashant Sahu and   
           Ansuman Bhattacharya   FastHand: a fast handover authentication
                                  protocol for densely deployed small-cell
                                  networks . . . . . . . . . . . . . . . . ??
             Samira Bokhari and   
           Sofiane Hamrioui and   
                  Meziane Aider   Cybersecurity strategy under
                                  uncertainties for an IoE environment . . ??
          Mattia G. Campana and   
               Franca Delmastro   On-device modeling of user's social
                                  context and familiar places from
                                  smartphone-embedded sensor data  . . . . ??
              Peiying Zhang and   
                   Peng Gan and   
               Neeraj Kumar and   
             Chunxiao Jiang and   
                Fanglin Liu and   
                      Lei Zhang   Survivable virtual network embedding
                                  algorithm considering multiple node
                                  failure in IIoT environment  . . . . . . ??
                  Haoran Ni and   
                  Zehua Guo and   
                Changlin Li and   
                Songshi Dou and   
                   Chao Yao and   
                     Thar Baker   Network Coding-based Resilient Routing
                                  for Maintaining Data Security and
                                  Availability in Software-Defined
                                  Networks . . . . . . . . . . . . . . . . ??
                Xiaoping Wu and   
                 Yunlong Li and   
                  Yana Shen and   
                     Xuefen Zhu   Efficient solutions for target
                                  localization in asynchronous MIMO
                                  networks . . . . . . . . . . . . . . . . ??
             Shamim Taimoor and   
           Lilatul Ferdouse and   
                    Waleed Ejaz   Holistic resource management in
                                  UAV-assisted wireless networks: an
                                  optimization perspective . . . . . . . . ??
              Hamza Baniata and   
                 Attila Kertesz   PriFoB: a Privacy-aware Fog-enhanced
                                  Blockchain-based system for Global
                                  Accreditation and Credential
                                  Verification . . . . . . . . . . . . . . ??
    Noe M. Yungaicela-Naula and   
       Cesar Vargas-Rosales and   
Jesús Arturo Pérez-Díaz and   
         Diego Fernando Carrera   A flexible SDN-based framework for
                                  slow-rate DDoS attack mitigation by
                                  using deep reinforcement learning  . . . ??
         Ihsan Mert Ozcelik and   
                      Cem Ersoy   ALVS: Adaptive Live Video Streaming
                                  using deep reinforcement learning  . . . ??
          Kamalesh Karmakar and   
           Somrita Banerjee and   
               Rajib K. Das and   
                Sunirmal Khatua   Utilization aware and network I/O
                                  intensive virtual machine placement
                                  policies for cloud data center . . . . . ??
                  Anal Paul and   
        Aneesh Kumar Mishra and   
        Shivam Shreevastava and   
             Anoop Kumar Tiwari   Deep Reinforcement Learning based
                                  reliable spectrum sensing under SSDF
                                  attacks in Cognitive Radio networks  . . ??
               Nazma Akther and   
              Kingshuk Dhar and   
      Shahid Md. Asif Iqbal and   
        Mohammed Nurul Huda and   
                    Asaduzzaman   \em Interest forwarding strategy in
                                  Named \em Data Networks (\em NDN) using
                                  Thompson Sampling  . . . . . . . . . . . ??
                     Min Li and   
                    Di Xiao and   
                  Hui Huang and   
                       Bo Zhang   Multi-level video quality services and
                                  security guarantees based on compressive
                                  sensing in sensor-cloud system . . . . . ??
                  Qiang Zou and   
                 Yifeng Zhu and   
                 Yujuan Tan and   
                       Wei Chen   Diagnosing the coexistence of Poissonity
                                  and self-similarity in memory workloads  ??
                   Nan Wang and   
                   Tong Liu and   
               Jinzhen Wang and   
                   Qing Liu and   
            Shakeel Alibhai and   
                       Xubin He   Locality-based transfer learning on
                                  compression autoencoder for efficient
                                  scientific data lossy compression  . . . ??


Journal of Network and Computer Applications
Volume 206, Number ??, October, 2022

                      Anonymous   October 2022 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Fauzia Irram and   
               Mudassar Ali and   
             Muhammad Naeem and   
                  Shahid Mumtaz   Physical layer security for beyond 5G/6G
                                  networks: Emerging technologies and
                                  future directions  . . . . . . . . . . . ??
              Jong Wook Kim and   
                 Beakcheol Jang   Deep learning-based privacy-preserving
                                  framework for synthetic trajectory
                                  generation . . . . . . . . . . . . . . . ??
                 Minghui Wu and   
                  Dawei Sun and   
                 Yijing Cui and   
                  Shang Gao and   
                 Xunyun Liu and   
                 Rajkumar Buyya   A state lossless scheduling strategy in
                                  distributed stream computing systems . . ??
           Nguyen Khoi Tran and   
               M. Ali Babar and   
                 Andrew Walters   A framework for automating deployment
                                  and evaluation of blockchain networks    ??
                Qianyu Long and   
         Kostas Kolomvatsos and   
       Christos Anagnostopoulos   Knowledge reuse in edge computing
                                  environments . . . . . . . . . . . . . . ??
Praveen Kumar Reddy Maddikunta and   
             Quoc-Viet Pham and   
             Dinh C. Nguyen and   
            Thien Huynh-The and   
                 Ons Aouedi and   
              Gokul Yenduri and   
         Sweta Bhattacharya and   
         Thippa Reddy Gadekallu   Incentive techniques for the Internet of
                                  Things: a survey . . . . . . . . . . . . ??
               Changue Jung and   
                 Suhwan Kim and   
              Younghoon Kim and   
                     Ikjun Yeom   Virtualizing GPU direct packet I/O on
                                  commodity Ethernet to accelerate GPU-NFV ??
            Ahmed Elshrkasi and   
          Kaharudin Dimyati and   
    Khairol Amali Bin Ahmad and   
 Mohamed Faidz bin Mohamed Said   Enhancement of cellular networks via an
                                  improved clustering technique with D2D
                                  communication for mission-critical
                                  applications . . . . . . . . . . . . . . ??
             Hisham Al-Ward and   
             Chee Keong Tan and   
                   Wern Han Lim   Caching transient data in
                                  Information-Centric Internet-of-Things
                                  (IC-IoT) networks: a survey  . . . . . . ??
    Fahimeh Dabaghi-Zarandi and   
               Parsa KamaliPour   Community detection in complex network
                                  based on an improved random algorithm
                                  using local and global network
                                  information  . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 207, Number ??, November, 2022

                      Anonymous   November 2022  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                    Heng Ye and   
                Jiqiang Liu and   
                   Hao Zhen and   
               Wenbin Jiang and   
                   Bin Wang and   
                       Wei Wang   VREFL: Verifiable and
                                  Reconnection-Efficient Federated
                                  Learning in IoT scenarios  . . . . . . . ??
               Syed M. Raza and   
                 Boyun Jang and   
                Huigyu Yang and   
              Moonseong Kim and   
                 Hyunseung Choo   Improved GAN with fact forcing for
                                  mobility prediction  . . . . . . . . . . ??
                  Ruiyun Yu and   
             Ann Move Oguti and   
       Dennis Reagan Ochora and   
                     Shuchen Li   Towards a privacy-preserving smart
                                  contract-based data aggregation and
                                  quality-driven incentive mechanism for
                                  mobile crowdsensing  . . . . . . . . . . ??
        Mustafa Ibrahim Khaleel   PPR-RM: Performance-to-Power Ratio,
                                  Reliability and Makespan-aware
                                  scientific workflow scheduling based on
                                  a coalitional game in the cloud  . . . . ??
                 Yuxian Liu and   
                  Fagui Liu and   
                Hao-Tian Wu and   
              Jingfeng Yang and   
              Kaihong Zheng and   
                Lingling Xu and   
                 Xingfu Yan and   
                     Jiankun Hu   RPTD: Reliability-enhanced
                                  Privacy-preserving Truth Discovery for
                                  Mobile Crowdsensing  . . . . . . . . . . ??
    Gonzalo Munilla Garrido and   
          Johannes Sedlmeir and   
         Ömer Uluda\ug and   
          Ilias Soto Alaoui and   
               Andre Luckow and   
                Florian Matthes   Revealing the landscape of
                                  privacy-enhancing technologies in the
                                  context of data markets for the IoT: a
                                  systematic literature review . . . . . . ??
          Khalid A. Darabkh and   
             Muna Al-Akhras and   
            Jumana N. Zomot and   
           Mohammed Atiquzzaman   RPL routing protocol over IoT: a
                                  comprehensive survey, recent advances,
                                  insights, bibliometric analysis,
                                  recommendations, and future directions   ??
      Muhammad Morshed Alam and   
     Muhammad Yeasir Arafat and   
                Sangman Moh and   
                      Jian Shen   Topology control algorithms in
                                  multi-unmanned aerial vehicle networks:
                                  an extensive survey  . . . . . . . . . . ??
                   Ying Pan and   
                     Na Lyu and   
                  Chungang Yang   GOR: Group-oblivious multicast routing
                                  in airborne tactical networks under
                                  uncertainty  . . . . . . . . . . . . . . ??
              Gengbiao Shen and   
                    Qing Li and   
                 Wanxin Shi and   
                 Yong Jiang and   
                  Pei Zhang and   
                   Liang Gu and   
                     Mingwei Xu   Modeling and optimization of the data
                                  plane in the SDN-based DCN by queuing
                                  theory . . . . . . . . . . . . . . . . . ??
               Gaoyang Shan and   
                 Byeong-hee Roh   A slotted random request scheme for
                                  connectionless data transmission in
                                  bluetooth low energy 5.0 . . . . . . . . ??
             Bharat Dwivedi and   
               Debarati Sen and   
             Sandip Chakraborty   A survey of longitudinal changes in
                                  cellular network architecture: the good,
                                  the bad, and the ugly  . . . . . . . . . ??
                Ansif Arooj and   
     Muhammad Shoaib Farooq and   
                     Tariq Umer   Unfolding the blockchain era: Timeline,
                                  evolution, types and real-world
                                  applications . . . . . . . . . . . . . . ??
               A. Zeynivand and   
               A. Javadpour and   
                 S. Bolouki and   
             A. K. Sangaiah and   
                 F. Ja'fari and   
                   P. Pinto and   
                       W. Zhang   Traffic flow control using multi-agent
                                  reinforcement learning . . . . . . . . . ??
               Xinyin Xiang and   
                    Jin Cao and   
                     Weiguo Fan   Decentralized authentication and access
                                  control protocol for blockchain-based
                                  e-health systems . . . . . . . . . . . . ??
      Mehrnoosh Monshizadeh and   
         Vikramajeet Khatri and   
              Raimo Kantola and   
                      Zheng Yan   A deep density based and
                                  self-determining clustering approach to
                                  label unknown traffic  . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 208, Number ??, December, 2022

                      Anonymous   December 2022  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Sang-Hoon Choi and   
                  Ki-Woong Park   \em iContainer: Consecutive
                                  checkpointing with rapid resilience for
                                  immortal container-based services  . . . ??
                Jaehyun Nam and   
                Seung Ho Na and   
              Seungwon Shin and   
                   Taejune Park   Reconfigurable regular expression
                                  matching architecture for real-time
                                  pattern update and payload inspection    ??
              Guangyao Zhou and   
                Ruiming Wen and   
               Wenhong Tian and   
                 Rajkumar Buyya   Deep reinforcement learning-based
                                  algorithms selectors for the resource
                                  scheduling in hierarchical Cloud
                                  computing  . . . . . . . . . . . . . . . ??
             Souha Masmoudi and   
           Maryline Laurent and   
               Nesrine Kaaniche   PIMA: a Privacy-preserving Identity
                                  management system based on an unlinkable
                                  MAlleable signature  . . . . . . . . . . ??
           Usman Saleh Toro and   
        Basem M. ElHalawany and   
              Aslan B. Wong and   
                    Lu Wang and   
                     Kaishun Wu   Backscatter communication-based wireless
                                  sensing (BBWS): Performance enhancement
                                  and future applications  . . . . . . . . ??
            Marcello Cinque and   
       Raffaele Della Corte and   
                Antonio Pecchia   Micro2vec: Anomaly detection in
                                  microservices systems by mining numeric
                                  representations of computer logs . . . . ??
       Vishesh Kumar Tanwar and   
      Balasubramanian Raman and   
                  Rama Bhargava   \em Crypt-OR: a privacy-preserving
                                  distributed cloud computing framework
                                  for object-removal in the encrypted
                                  images . . . . . . . . . . . . . . . . . ??
             Shie-Yuan Wang and   
                    Hsin-Yin Fu   Design, implementation, and performance
                                  evaluation of an earliest-deadline-first
                                  packet scheduling scheme in P4 hardware
                                  switches . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 209, Number ??, January, 2023

                      Anonymous   January 2023 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   Reviewer Thankyou  . . . . . . . . . . . ??
               Sarah Qahtan and   
             Khaironi Yatim and   
            Hazura Zulzalil and   
          Mohd Hafeez Osman and   
               A. A. Zaidan and   
                 H. A. Alsattar   Review of Healthcare Industry 4.0
                                  application-based blockchain in terms of
                                  security and privacy development
                                  attributes: Comprehensive taxonomy, open
                                  issues and challenges and recommended
                                  solution . . . . . . . . . . . . . . . . ??
                 Shiyong Li and   
                   Huan Liu and   
                  Wenzhe Li and   
                        Wei Sun   Optimal cross-layer resource allocation
                                  in fog computing: a market-based
                                  framework  . . . . . . . . . . . . . . . ??
                Erfan Arvan and   
Mahshad Koohi Habibi Dehkordi and   
                   Saeed Jalili   Secured location-aware mobility-enabled
                                  RPL  . . . . . . . . . . . . . . . . . . ??
               Zhuofan Liao and   
                    Siwei Cheng   RVC: a reputation and voting based
                                  blockchain consensus mechanism for edge
                                  computing-enabled IoT systems  . . . . . ??
      Mohammad Kamrul Hasan and   
           AKM Ahasan Habib and   
              Zarina Shukur and   
              Fazil Ibrahim and   
               Shayla Islam and   
              Md Abdur Razzaque   Review on cyber-physical and
                                  cyber-security system in smart grid:
                                  Standards, protocols, constraints, and
                                  recommendations  . . . . . . . . . . . . ??
              Ankit Gangwal and   
Haripriya Ravali Gangavalli and   
             Apoorva Thirupathi   A survey of Layer-two blockchain
                                  protocols  . . . . . . . . . . . . . . . ??
                    Nitul Dutta   A bargain game theory assisted interest
                                  packet forwarding strategy for
                                  information centric network  . . . . . . ??
                Evrim Guler and   
              Murat Karakus and   
                    Furkan Ayaz   Genetic algorithm enabled virtual
                                  multicast tree embedding in
                                  Software-Defined Networks  . . . . . . . ??
       Prosper Zanu Sotenga and   
              Karim Djouani and   
           Anish Matthew Kurien   A virtual gateway media access placement
                                  approach for large-scale Internet of
                                  Things . . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 210, Number ??, January, 2023

                      Anonymous   January 2023 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                  Can Zhang and   
               Liehuang Zhu and   
                   Chang Xu and   
               Zijian Zhang and   
                    Rongxing Lu   EBDL: Effective blockchain-based covert
                                  storage channel with dynamic labels  . . ??
                 Da-ming Yu and   
                 Zhen Zhang and   
                Yu-hui Deng and   
               Long-xin Lin and   
               Teng-jiao He and   
                 Guang-liang He   Flexible, highly scalable and
                                  cost-effective network structures for
                                  data centers . . . . . . . . . . . . . . ??
       Panagiotis Bountakas and   
               Christos Xenakis   HELPHED: Hybrid Ensemble Learning
                                  PHishing Email Detection . . . . . . . . ??


Journal of Network and Computer Applications
Volume 211, Number ??, February, 2023

                      Anonymous   February 2023  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
              Hidaya Liazid and   
           Mohamed Lehsaini and   
               Abdelkrim Liazid   Data transmission reduction using
                                  prediction and aggregation techniques in
                                  IoT-based wireless sensor networks . . . ??
                Yadong Zhou and   
                   Bowen Hu and   
               Junjie Zhang and   
                 Liyuan Sun and   
                 Xingyu Zhu and   
                       Ting Liu   Detecting suspicious transactions in a
                                  virtual-currency-enabled online social
                                  network  . . . . . . . . . . . . . . . . ??
        Maryam Songhorabadi and   
             Morteza Rahimi and   
    AmirMehdi MoghadamFarid and   
          Mostafa Haghi Kashani   Fog computing approaches in IoT-enabled
                                  smart cities . . . . . . . . . . . . . . ??
                Imdad Ullah and   
           Salil S. Kanhere and   
                 Roksana Boreli   Privacy-preserving targeted mobile
                                  advertising: a blockchain-based
                                  framework for mobile ads . . . . . . . . ??
            The-Vinh Nguyen and   
            Ngoc Phi Nguyen and   
              Cheonshik Kim and   
                   Nhu-Ngoc Dao   Intelligent aerial video streaming:
                                  Achievements and challenges  . . . . . . ??
          Mustafa Al Samara and   
              Ismail Bennis and   
       Abdelhafid Abouaissa and   
                  Pascal Lorenz   Complete outlier detection and
                                  classification framework for WSNs based
                                  on OPTICS  . . . . . . . . . . . . . . . ??
                Linhao Cong and   
                     Jia Yu and   
                      Xinrui Ge   Privacy preserving subgraph isomorphism
                                  query for dynamic graph database . . . . ??


Journal of Network and Computer Applications
Volume 212, Number ??, March, 2023

                      Anonymous   March 2023 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
             Murad Ali Khan and   
                Naeem Iqbal and   
                      Imran and   
                Harun Jamil and   
                   Do-Hyeun Kim   An optimized ensemble prediction model
                                  using AutoML based on soft voting
                                  classifier for network intrusion
                                  detection  . . . . . . . . . . . . . . . ??
             Andrea Petroni and   
            Francesca Cuomo and   
            Gaetano Scarano and   
             Pietro Francia and   
          Marcello Pediconi and   
             Stefania Colonnese   MUSE: MUlti-lead Sub-beat ECG for remote
                                  AI based atrial fibrillation detection   ??
              Amin Shahraki and   
         Torsten Ohlenforst and   
              Felix Kreyß   When machine learning meets Network
                                  Management and Orchestration in
                                  edge-based networking paradigms  . . . . ??
             Ahmed Elsheikh and   
           Ahmed S. Ibrahim and   
              Mahmoud H. Ismail   Sequence-to-sequence learning for
                                  link-scheduling in D2D communication
                                  networks . . . . . . . . . . . . . . . . ??
Pedro Miguel Sánchez Sánchez and   
José Mar\'ìa Jorquera Valero and   
Alberto Huertas Celdrán and   
  Gérôme Bovet and   
    Manuel Gil Pérez and   
Gregorio Mart\'ìnez Pérez   A methodology to identify identical
                                  single-board computers based on hardware
                                  behavior fingerprinting  . . . . . . . . ??
     Mohammad Yahya Akhlaqi and   
       Zurina Binti Mohd Hanapi   Task offloading paradigm in mobile edge
                                  computing-current issues, adopted
                                  approaches, and future directions  . . . ??
            Frederik Hauser and   
         Marco Häberle and   
             Daniel Merling and   
            Steffen Lindner and   
          Vladimir Gurevich and   
             Florian Zeiger and   
             Reinhard Frank and   
                  Michael Menth   A survey on data plane programming with
                                  P4: Fundamentals, advances, and applied
                                  research . . . . . . . . . . . . . . . . ??
 Damiano Di Francesco Maesa and   
                Andrea Lisi and   
                 Paolo Mori and   
                Laura Ricci and   
                Gianluca Boschi   Self sovereign and blockchain based
                                  access control: Supporting attributes
                                  privacy with zero knowledge  . . . . . . ??
                     Tao Yi and   
               Xingshu Chen and   
                     Yi Zhu and   
                 Weijing Ge and   
                    Zhenhui Han   Review on the application of deep
                                  learning in network attack detection . . ??
               Samira Afzal and   
            Vanessa Testoni and   
Christian Esteve Rothenberg and   
              Prakash Kolan and   
                  Imed Bouazizi   A holistic survey of multipath wireless
                                  video streaming  . . . . . . . . . . . . ??
Mohamad Amar Irsyad Mohd Aminuddin and   
          Zarul Fitri Zaaba and   
             Azman Samsudin and   
                  Faiz Zaki and   
               Nor Badrul Anuar   The rise of website fingerprinting on
                                  Tor: Analysis on techniques and
                                  assumptions  . . . . . . . . . . . . . . ??
            Gianni D'Angelo and   
             Francesco Palmieri   A co-evolutionary genetic algorithm for
                                  robust and balanced controller placement
                                  in software-defined networks . . . . . . ??
               Andrea Tesei and   
           Domenico Lattuca and   
                Marco Luise and   
               Paolo Pagano and   
           Joaquim Ferreira and   
            Paulo C. Bartolomeu   A transparent distributed ledger-based
                                  certificate revocation scheme for VANETs ??
            Nguyen Thi Hanh and   
       Huynh Thi Thanh Binh and   
            Vu Quang Truong and   
            Nguyen Phuc Tan and   
                Huynh Cong Phap   Node placement optimization under
                                  Q-Coverage and Q-Connectivity
                                  constraints in wireless sensor networks  ??


Journal of Network and Computer Applications
Volume 213, Number ??, April, 2023

                      Anonymous   April 2023 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
    Ángel G. Andrade and   
                 Alexis Anzaldo   Accelerated resource allocation based on
                                  experience retention for B5G networks    ??
                 Omer Gulec and   
                     Emre Sahin   Red Deer Algorithm based nano-sensor
                                  node clustering for IoNT . . . . . . . . ??
             Poornima M. R. and   
               Vimala H. S. and   
                     Shreyas J.   Holistic survey on energy aware routing
                                  techniques for IoT applications  . . . . ??
                  Yaping Wu and   
                   Xili Wan and   
                Xinjie Guan and   
               Tingxiang Ji and   
                        Feng Ye   PGTCN: a novel password-guessing model
                                  based on temporal convolution network    ??
        Elmustafa Sayed Ali and   
            Rashid A. Saeed and   
     Ibrahim Khider Eltahir and   
              Othman O. Khalifa   A systematic review on energy efficiency
                                  in the Internet of Underwater Things
                                  (IoUT): Recent approaches and research
                                  gaps . . . . . . . . . . . . . . . . . . ??
               Nhu-Ngoc Dao and   
               Ngo Hoang Tu and   
           Tran Thien Thanh and   
         Vo Nguyen Quoc Bao and   
                Woongsoo Na and   
                    Sungrae Cho   Neglected infrastructures for
                                  6G-Underwater communications: How mature
                                  are they?  . . . . . . . . . . . . . . . ??
               Lamia Alkwai and   
       Abdelfettah Belghith and   
              Achraf Gazdar and   
                  Saad AlAhmadi   Awareness of user mobility in Named Data
                                  Networking for IoT traffic under the
                                  push communication mode  . . . . . . . . ??
                Mariusz Sepczuk   Dynamic Web Application Firewall
                                  detection supported by Cyber Mimic
                                  Defense approach . . . . . . . . . . . . ??
             Hirozumi Yamaguchi   Book Review: \booktitleWireless and
                                  Mobile Networking, Mahbub Hassan. CRC
                                  Press (2022) . . . . . . . . . . . . . . ??
           Pyry Veijalainen and   
  Themistoklis Charalambous and   
                  Risto Wichman   Feasibility of Bluetooth Low Energy for
                                  motion capturing with Inertial
                                  Measurement Units  . . . . . . . . . . . ??
                   Dan Tang and   
             Dongshuo Zhang and   
                  Zheng Qin and   
                Qiuwei Yang and   
                     Sheng Xiao   SFTO-Guard: Real-time detection and
                                  mitigation system for slow-rate flow
                                  table overflow attacks . . . . . . . . . ??
              Huda Abualola and   
              Rabeb Mizouni and   
                 Hadi Otrok and   
               Shakti Singh and   
                  Hassan Barada   A matching game-based crowdsourcing
                                  framework for last-mile delivery:
                                  Ground-vehicles and unmanned-aerial
                                  vehicles . . . . . . . . . . . . . . . . ??
                  Minsu Kim and   
                 Kwangsue Chung   HTTP adaptive streaming scheme based on
                                  reinforcement learning with edge
                                  computing assistance . . . . . . . . . . ??
                 Peirong Li and   
                     Wei Ou and   
               Haozhe Liang and   
                 Wenbao Han and   
              Qionglu Zhang and   
                     Guang Zeng   A zero trust and blockchain-based
                                  defense model for smart electric vehicle
                                  chargers . . . . . . . . . . . . . . . . ??
            Sami Abdellatif and   
           Okba Tibermacine and   
              Walid Bechkit and   
              Abdelmalik Bachir   Heterogeneous IoT/LTE ProSe virtual
                                  infrastructure for disaster situations   ??
              Xiaodong Zang and   
                  Jian Gong and   
                 Maoli Wang and   
                   Peng Gao and   
                   Guowei Zhang   IP traffic behavior characterization via
                                  semantic mining  . . . . . . . . . . . . ??
          Hassan Jalil Hadi and   
                    Yue Cao and   
            Khaleeq Un Nisa and   
          Abdul Majid Jamil and   
                       Qiang Ni   A comprehensive survey on security,
                                  privacy issues and emerging defence
                                  technologies for UAVs  . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 214, Number ??, May, 2023

                      Anonymous   May 2023 . . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
           Lala Rajaoarisoa and   
      Nacer Kouider M'Sirdi and   
     Moamar Sayed-Mouchaweh and   
                Laurent Clavier   Decentralized fault-tolerant controller
                                  based on cooperative smart-wireless
                                  sensors in large-scale buildings . . . . ??
                  Guowen Wu and   
                 Lanlan Xie and   
                 Hong Zhang and   
               Jianhua Wang and   
                Shigen Shen and   
                        Shui Yu   STSIR: an individual-group game-based
                                  model for disclosing virus spread in
                                  Social Internet of Things  . . . . . . . ??
                  Ruijie Ou and   
       Gordon Owusu Boateng and   
       Daniel Ayepah-Mensah and   
                 Guolin Sun and   
                    Guisong Liu   Stackelberg game-based dynamic resource
                                  trading for network slicing in 5G
                                  networks . . . . . . . . . . . . . . . . ??
            Somayeh Yeganeh and   
      Amin Babazadeh Sangar and   
                   Sadoon Azizi   A novel $Q$-learning-based hybrid
                                  algorithm for the optimal offloading and
                                  scheduling in mobile edge computing
                                  environments . . . . . . . . . . . . . . ??
                 Xingjia Li and   
                     Li Pan and   
                     Shijun Liu   An online service provisioning strategy
                                  for container-based cloud brokers  . . . ??
         Maryam Mohammadzad and   
                Jaber Karimpour   Using rootkits hiding techniques to
                                  conceal honeypot functionality . . . . . ??
                    Sumitra and   
               Meetha V. Shenoy   HFedDI: a novel privacy preserving
                                  horizontal federated learning based
                                  scheme for IoT device identification . . ??
                    Wei Yao and   
                    Han Shi and   
                       Hai Zhao   Scalable anomaly-based intrusion
                                  detection for secure Internet of Things
                                  using generative adversarial networks in
                                  fog environment  . . . . . . . . . . . . ??
        Madhusanka Liyanage and   
                 An Braeken and   
       Shahriar Shahabuddin and   
               Pasika Ranaweera   Open RAN security: Challenges and
                                  opportunities  . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 215, Number ??, June, 2023

                      Anonymous   June 2023  . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                Binayak Kar and   
               Ying-Dar Lin and   
                 Yuan-Cheng Lai   Cost optimization of omnidirectional
                                  offloading in two-tier cloud-edge
                                  federated systems  . . . . . . . . . . . ??
                 Xiuwen Sun and   
                      Da Mo and   
                      Di Wu and   
                 Chunhui Ye and   
                Qingying Yu and   
                    Jie Cui and   
                     Hong Zhong   Efficient regular expression matching
                                  over hybrid dictionary-based compressed
                                  data . . . . . . . . . . . . . . . . . . ??
                   Andrew J and   
         Deva Priya Isravel and   
          K. Martin Sagayam and   
             Bharat Bhushan and   
                 Yuichi Sei and   
                Jennifer Eunice   Blockchain for healthcare systems:
                                  Architecture, security challenges,
                                  trends and future directions . . . . . . ??
              Azad Jalalian and   
              Saleh Yousefi and   
                    Thomas Kunz   Network slicing in virtualized 5G Core
                                  with VNF sharing . . . . . . . . . . . . ??
          Abhishek Narwaria and   
          Arka Prokash Mazumdar   Software-Defined Wireless Sensor
                                  Network: a Comprehensive Survey  . . . . ??
            Mudhafar Nuaimi and   
       Lamia Chaari Fourati and   
               Bassem Ben Hamed   Intelligent approaches toward intrusion
                                  detection systems for Industrial
                                  Internet of Things: a systematic
                                  comprehensive review . . . . . . . . . . ??
               Gustavo Diel and   
    Charles Christian Miers and   
Maurício Aronne Pillon and   
Guilherme Piêgas Koslovski   RSCAT: Towards zero touch congestion
                                  control based on actor--critic
                                  reinforcement learning and
                                  software-defined networking  . . . . . . ??
               Luca Bedogni and   
               Federico Montori   Joint privacy and data quality aware
                                  reward in opportunistic Mobile
                                  Crowdsensing systems . . . . . . . . . . ??
           Uchechukwu Awada and   
             Jiankang Zhang and   
                 Sheng Chen and   
               Shuangzhi Li and   
                    Shouyi Yang   EdgeDrones: Co-scheduling of drones for
                                  multi-location aerial computing missions ??
       Ana Larrañaga and   
M. Carmen Lucas-Estañ and   
        Sandra Lagén and   
                 Zoraze Ali and   
            Imanol Martinez and   
                Javier Gozalvez   An open-source implementation and
                                  validation of 5G NR configured grant for
                                  URLLC in ns-3 5G LENA: a scheduling case
                                  study in industry 4.0 scenarios  . . . . ??
               Adarsh Kumar and   
         Neelu Jyothi Ahuja and   
           Monika Thapliyal and   
              Sarthika Dutt and   
               Tanesh Kumar and   
Diego Augusto De Jesus Pacheco and   
   Charalambos Konstantinou and   
         Kim-Kwang Raymond Choo   Blockchain for unmanned underwater
                                  drones: Research issues, challenges,
                                  trends and future directions . . . . . . ??
                Sana Sharif and   
           Sherali Zeadally and   
                    Waleed Ejaz   Space--aerial--ground--sea integrated
                                  networks: Resource optimization and
                                  challenges in 6G . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 216, Number ??, July, 2023

                      Anonymous   July 2023  . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
    Gokulnath Thandavarayan and   
            Miguel Sepulcre and   
            Javier Gozalvez and   
         Baldomero Coll-Perales   Scalable cooperative perception for
                                  connected and automated driving  . . . . ??
             Collin Connors and   
                   Dilip Sarkar   Survey of prominent blockchain
                                  development platforms  . . . . . . . . . ??
              Shreshth Tuli and   
          Fatemeh Mirhakimi and   
         Samodha Pallewatta and   
                 Syed Zawad and   
            Giuliano Casale and   
              Bahman Javadi and   
                   Feng Yan and   
             Rajkumar Buyya and   
           Nicholas R. Jennings   AI augmented Edge and Fog computing:
                                  Trends and challenges  . . . . . . . . . ??
     Oluwatosin Ahmed Amodu and   
             Umar Ali Bukar and   
   Raja Azlina Raja Mahmood and   
              Chedia Jarray and   
                 Mohamed Othman   Age of Information minimization in
                                  UAV-aided data collection for WSN and
                                  IoT applications: a systematic review    ??
           Mahmoud M. Salim and   
         Hussein A. Elsayed and   
          Mohamed S. Abdalzaher   A survey on essential challenges in
                                  relay-aided D2D communication for
                                  next-generation cellular networks  . . . ??
                  Dapeng Qu and   
                     Jun Wu and   
              Jiankun Zhang and   
                Chengxi Gao and   
               Haiying Shen and   
                       Keqin Li   Efficient congestion control scheme
                                  based on caching strategy in NDN . . . . ??
                   Yifei Lu and   
             Changjiang Cui and   
                      Xu Ma and   
                      Zeqi Ruan   A $^3$DCT: a cubic acceleration TCP for
                                  data center networks . . . . . . . . . . ??
                Junna Zhang and   
                Jiawei Chen and   
                  Xiang Bao and   
               Chunhong Liu and   
                Peiyan Yuan and   
              Xinglin Zhang and   
                Shangguang Wang   Dependent task offloading mechanism for
                                  cloud-edge-device collaboration  . . . . ??
                Isra M. Ali and   
           Noureddine Lasla and   
        Mohamed M. Abdallah and   
                    Aiman Erbad   SRP: an Efficient Runtime Protection
                                  Framework for Blockchain-based Smart
                                  Contracts  . . . . . . . . . . . . . . . ??
            Diego Hortelano and   
          Ignacio de Miguel and   
Ramón J. Durán Barroso and   
         Juan Carlos Aguado and   
      Noem\'ì Merayo and   
                 Lidia Ruiz and   
             Adrian Asensio and   
           Xavi Masip-Bruin and   
  Patricia Fernández and   
    Rubén M. Lorenzo and   
              Evaristo J. Abril   A comprehensive survey on
                                  reinforcement-learning-based computation
                                  offloading techniques in Edge Computing
                                  Systems  . . . . . . . . . . . . . . . . ??
          Kaddour Messaoudi and   
          Omar Sami Oubbati and   
         Abderrezak Rachedi and   
         Abderrahmane Lakas and   
             Tahar Bendouma and   
               Noureddine Chaib   A survey of UAV-based data collection:
                                  Challenges, solutions and future
                                  perspectives . . . . . . . . . . . . . . ??
              Xiaojun Cheng and   
                Xuyang Jing and   
                  Zheng Yan and   
                    Xian Li and   
                    Pu Wang and   
                         Wei Wu   ALSketch: an adaptive learning-based
                                  sketch for accurate network measurement
                                  under dynamic traffic distribution . . . ??
                 Xiaohan Tu and   
             Chuanhao Zhang and   
                 Siping Liu and   
                   Cheng Xu and   
                       Renfa Li   Point cloud segmentation of overhead
                                  contact systems with deep learning in
                                  high-speed rails . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 217, Number ??, August, 2023

                      Anonymous   August 2023  . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
            Aitor Belenguer and   
            Jose A. Pascual and   
               Javier Navaridas   GöwFed: a novel federated network
                                  intrusion detection system . . . . . . . ??
                 Jiang Shao and   
                 Minglin Li and   
                   Xinyi Li and   
                 Guowei Liu and   
                    Sen Liu and   
                    Bin Liu and   
                        Yang Xu   RaceCC: a rapidly converging explicit
                                  congestion control for datacenter
                                  networks . . . . . . . . . . . . . . . . ??
                  Ying Wang and   
              Fengjun Shang and   
                    Jianjun Lei   Energy-efficient and delay-guaranteed
                                  routing algorithm for software-defined
                                  wireless sensor networks: a cooperative
                                  deep reinforcement learning approach . . ??
              Thomas Lavaur and   
          Jonathan Detchart and   
  Jérôme Lacan and   
          Caroline P. C. Chanel   Modular zk-rollup on-demand  . . . . . . ??
         Saeed Banaeian Far and   
           Azadeh Imani Rad and   
Seyed Mojtaba Hosseini Bamakan and   
        Maryam Rajabzadeh Asaar   Toward Metaverse of everything:
                                  Opportunities, challenges, and future
                                  directions of the next generation of
                                  visual/virtual communications  . . . . . ??
                  Abu Jahid and   
       Mohammed H. Alsharif and   
                 Trevor J. Hall   The convergence of blockchain, IoT and
                                  6G: Potential, opportunities, challenges
                                  and research roadmap . . . . . . . . . . ??
         Roberto G. Pacheco and   
           Rodrigo S. Couto and   
                Osvaldo Simeone   On the impact of deep neural network
                                  calibration on adaptive edge offloading
                                  for image classification . . . . . . . . ??
         Daniel Chaves Temp and   
Paulo Silas Severo de Souza and   
  Arthur Francisco Lorenzon and   
  Marcelo Caggiani Luizelli and   
       Fábio Diniz Rossi   Mobility-Aware Registry Migration for
                                  Containerized Applications on Edge
                                  Computing Infrastructures  . . . . . . . ??
                  Huihui Ma and   
                          Du Xu   An INT-based TCP window modulator for
                                  congestion control in data center
                                  networks . . . . . . . . . . . . . . . . ??
                Mingru Dong and   
                  Haibin Li and   
                 Yongtao Hu and   
                   Haocai Huang   Learning automaton-based
                                  energy-efficient and fault-tolerant
                                  topology evolution algorithm for
                                  underwater acoustic sensor network . . . ??
                      Yi Li and   
               Jinsong Wang and   
                  Hongwei Zhang   A survey of state-of-the-art sharding
                                  blockchains: Models, components, and
                                  attack surfaces  . . . . . . . . . . . . ??
         Ioannis Dimolitsas and   
     Dimitrios Dechouniotis and   
           Symeon Papavassiliou   Time-efficient distributed virtual
                                  network embedding for round-trip delay
                                  minimization . . . . . . . . . . . . . . ??
              Chunghyun Lee and   
                  Junsuk Oh and   
                Woongsoo Na and   
                Jongha Yoon and   
                Wonjong Noh and   
                    Sungrae Cho   Directional-antenna-based spatial and
                                  energy-efficient semi-distributed
                                  spectrum sensing in cognitive
                                  Internet-of-Things networks  . . . . . . ??
               Ammar Hassan and   
             Imran Makhdoom and   
               Waseem Iqbal and   
                Awais Ahmad and   
                      Asad Raza   From trust to truth: Advancements in
                                  mitigating the Blockchain Oracle problem ??
             Rakib Ul Haque and   
    A. S. M. Touhidul Hasan and   
               Apubra Daria and   
               Abdur Rasool and   
                   Hui Chen and   
             Qingshan Jiang and   
                   Yuqing Zhang   A novel secure and distributed
                                  architecture for privacy-preserving
                                  healthcare system  . . . . . . . . . . . ??
             Zhongwei Huang and   
                  Dagang Li and   
                    Jun Cai and   
                         Hua Lu   Collective reinforcement learning based
                                  resource allocation for digital twin
                                  service in 6G networks . . . . . . . . . ??
                   Jin Wang and   
                Shuying Rao and   
                   Ying Liu and   
        Pradip Kumar Sharma and   
                      Jinbin Hu   Load balancing for heterogeneous traffic
                                  in datacenter networks . . . . . . . . . ??
             Mahbubun Nahar and   
             A. H. M. Kamal and   
               Gahangir Hossain   Protecting health data in the cloud
                                  through steganography: a table-driven,
                                  blind method using neural networks and
                                  bit-shuffling algorithm  . . . . . . . . ??
  Jorge Eduardo Rivadeneira and   
      Jorge Sá Silva and   
    Ricardo Colomo-Palacios and   
     André Rodrigues and   
               Fernando Boavida   User-centric privacy preserving models
                                  for a new era of the Internet of Things  ??
            Abolfazl Sajadi and   
              Ahmad Shabani and   
                 Bijan Alizadeh   DC-PUF: Machine learning-resistant
                                  PUF-based authentication protocol using
                                  dependency chain for resource-constraint
                                  IoT devices  . . . . . . . . . . . . . . ??
                    Hua Qin and   
                Weimin Chen and   
                      Ni Li and   
                   Tao Wang and   
                   Hao Chen and   
                 Gelan Yang and   
                      Yang Peng   CPS: Cross-interface network
                                  Partitioning and Scheduling towards
                                  QoS-aware data flow delivery in
                                  multimedia IoT . . . . . . . . . . . . . ??
             Luca Verderame and   
             Antonio Ruggia and   
                  Alessio Merlo   PARIOT: Anti-repackaging for IoT
                                  firmware integrity . . . . . . . . . . . ??
           Mohammed Atiquzzaman   Editorial: 2021 Best Paper Awards  . . . ??


Journal of Network and Computer Applications
Volume 218, Number ??, September, 2023

                      Anonymous   September 2023 . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
              Luis de Pedro and   
          Adrian Mihai Rosu and   
Jorge E. López de Vergara   Server load estimation by Burr
                                  distribution mixture analysis of TCP SYN
                                  response time  . . . . . . . . . . . . . ??
               Changbo Tian and   
               Shuyuan Zhao and   
                   Zhenyu Cheng   AntCom: an effective and efficient
                                  anti-tracking system with dynamic and
                                  asymmetric communication channel . . . . ??
                   Ji Huang and   
                 Yinghao Lu and   
              Zhenlong Xiao and   
                       Xin Wang   A novel distributed multi-slot
                                  TDMA-based MAC protocol for LED-based
                                  UOWC networks  . . . . . . . . . . . . . ??
            Pascal Maniriho and   
        Abdun Naser Mahmood and   
Mohammad Jabed Morshed Chowdhury   API-MalDetect: Automated malware
                                  detection framework for windows based on
                                  API calls and deep learning techniques   ??
Alejandro Llorens-Carrodeguas and   
Cristina Cervelló-Pastor and   
               Francisco Valera   DQN-based intelligent controller for
                                  multiple edge domains  . . . . . . . . . ??
            Khalid M. Hosny and   
              Ahmed I. Awad and   
          Marwa M. Khashaba and   
           Mostafa M. Fouda and   
             Mohsen Guizani and   
                Ehab R. Mohamed   Enhanced multi-objective gorilla troops
                                  optimizer for real-time multi-user
                                  dependent tasks offloading in edge-cloud
                                  computing  . . . . . . . . . . . . . . . ??
                    Jie Sun and   
                  Tianyu Wo and   
                 Xudong Liu and   
                Tianjiao Ma and   
                 Xudong Mou and   
               Jinghong Lan and   
                  Nan Zhang and   
                    Jianwei Niu   Scalable inter-domain network
                                  virtualization . . . . . . . . . . . . . ??
                  Juan Wang and   
                  Wenzhe Yi and   
                Mengda Yang and   
                   Jiaci Ma and   
             Shengzhi Zhang and   
                    Shirong Hao   Enhance the trust between IoT devices,
                                  mobile apps, and the cloud based on
                                  blockchain . . . . . . . . . . . . . . . ??
         Wojciech Niewolski and   
            Tomasz W. Nowak and   
            Mariusz Sepczuk and   
              Zbigniew Kotulski   Security architecture for authorized
                                  anonymous communication in 5G MEC  . . . ??
               Junwei Liang and   
             Muhammad Sadiq and   
                  Geng Yang and   
                Dongsheng Cheng   BAC-CRL: Blockchain-Assisted Coded
                                  Caching Certificate Revocation List for
                                  Authentication in VANETs . . . . . . . . ??
                     Bo Yin and   
                   Yihu Liu and   
                  Binyao Xu and   
                  Hang Chen and   
                       Sai Tang   TTAF: a two-tier task assignment
                                  framework for cooperative unit-based
                                  crowdsourcing systems  . . . . . . . . . ??
               Zhuofan Liao and   
              Xiangyu Zhang and   
                 Shiming He and   
                     Qiang Tang   PMP: a partition-match parallel
                                  mechanism for DNN inference acceleration
                                  in cloud-edge collaborative environments ??


Journal of Network and Computer Applications
Volume 219, Number ??, October, 2023

                      Anonymous   October 2023 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
               Asma Bechkit and   
                      Ali Melit   One-shot models for local core network
                                  placement and traffic optimization in
                                  self deployable networks . . . . . . . . ??
                 Bolin Song and   
                Xiaoyu Wang and   
                   Peng Sun and   
             Azzedine Boukerche   Robust COVID-19 vaccination control in a
                                  multi-city dynamic transmission network:
                                  a novel reinforcement learning-based
                                  approach . . . . . . . . . . . . . . . . ??
         Vamshi Sunku Mohan and   
            Sriram Sankaran and   
           Priyadarsi Nanda and   
          Krishnashree Achuthan   Enabling secure lightweight mobile
                                  Narrowband Internet of Things (NB-IoT)
                                  applications using blockchain  . . . . . ??
           Mobasshir Mahbub and   
                Raed M. Shubair   Contemporary advances in multi-access
                                  edge computing: a survey of
                                  fundamentals, architecture,
                                  technologies, deployment cases,
                                  security, challenges, and directions . . ??
                    Ziyi Hu and   
                    Yue Cao and   
                   Xinyu Li and   
               Yongdong Zhu and   
            Muhammad Khalid and   
                   Naveed Ahmad   Autonomous valet parking optimization
                                  with two-step reservation and pricing
                                  strategy . . . . . . . . . . . . . . . . ??
Alberto García Pérez and   
Antonio López Martínez and   
        Manuel Gil Pérez   Adaptive vulnerability-based risk
                                  identification software with
                                  virtualization functions for dynamic
                                  management . . . . . . . . . . . . . . . ??
        Krzysztof Ostrowski and   
         Krzysztof Ma\lecki and   
        Piotr Dziurza\'nski and   
               Amit Kumar Singh   Mobility-aware fog computing in dynamic
                                  networks with mobile nodes: a survey . . ??
              Chenjing Tian and   
                Haotong Cao and   
                    Jun Xie and   
                 Sahil Garg and   
    Joel J. P. C. Rodrigues and   
              M. Shamim Hossain   MADDPG-empowered slice reconfiguration
                                  approach for 5G multi-tier system  . . . ??
                 Kaixi Wang and   
                  Yunhe Cui and   
                  Qing Qian and   
                    Yi Chen and   
                   Chun Guo and   
                    Guowei Shen   USAGE: Uncertain flow graph and
                                  spatio-temporal graph convolutional
                                  network-based saturation attack
                                  detection method . . . . . . . . . . . . ??
                 Waqar Amin and   
              Fawad Hussain and   
               Sheraz Anjum and   
             Sharoon Saleem and   
         Naveed Khan Baloch and   
          Yousaf Bin Zikria and   
                     Heejung Yu   Efficient application mapping approach
                                  based on grey wolf optimization for
                                  network on chip  . . . . . . . . . . . . ??
               Linyao Zheng and   
                 Meiqin Liu and   
                   Senlin Zhang   An end-to-end sensor scheduling method
                                  based on D3QN for underwater passive
                                  tracking in UWSNs  . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 220, Number ??, November, 2023

                      Anonymous   November 2023  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
              Hongjian Zeng and   
              Yonghua Xiong and   
                     Jinhua She   An evolutionary multi-task assignment
                                  method adapting to travel convenience in
                                  mobile crowdsensing  . . . . . . . . . . ??
    Badra Souhila Guendouzi and   
              Samir Ouchani and   
             Hiba EL Assaad and   
             Madeleine EL Zaher   A systematic review of federated
                                  learning: Challenges, aggregation
                                  methods, and development tools . . . . . ??
          Mebanjop Kharjana and   
      Fabiola Hazel Pohrmen and   
      Subhas Chandra Sahana and   
                    Goutam Saha   Blockchain-based key management system
                                  in Named Data Networking: a survey . . . ??
                  Haoyu Yin and   
               Yingjian Liu and   
                     Yue Li and   
               Zhongwen Guo and   
                        Yu Wang   Defeating deep learning based
                                  de-anonymization attacks with
                                  adversarial example  . . . . . . . . . . ??
                 Niclas Ilg and   
                Paul Duplys and   
         Dominik Sisejkovic and   
                  Michael Menth   A survey of contemporary open-source
                                  honeypots, frameworks, and tools . . . . ??
                Hoang V. Vo and   
                 Hanh P. Du and   
                  Hoa N. Nguyen   AI-powered intrusion detection in
                                  large-scale traffic networks based on
                                  flow sensing strategy and parallel deep
                                  analysis . . . . . . . . . . . . . . . . ??
                  Linna Wei and   
              Wenlong Huang and   
                   Wei Zhao and   
                 Xuangou Wu and   
                     Xiao Zheng   Boundary node detection in wireless
                                  networks with uneven node distribution
                                  on open surfaces . . . . . . . . . . . . ??
                     Bin Yu and   
                    He Zhao and   
                  Tong Zhou and   
               Nianzu Sheng and   
                Xiaofeng Li and   
                      Jinlin Xu   OverShard: Scaling blockchain by full
                                  sharding with overlapping network and
                                  virtual accounts . . . . . . . . . . . . ??
              Hamza Kheddar and   
             Yassine Himeur and   
                Ali Ismail Awad   Deep transfer learning for intrusion
                                  detection in industrial control
                                  networks: a comprehensive review . . . . ??
                 Yingya Guo and   
                 Yufei Peng and   
                    Run Hao and   
                     Xiang Tang   Capturing spatial-temporal correlations
                                  with Attention based Graph Convolutional
                                  Network for network traffic prediction   ??
       Zarrin Tasnim Sworna and   
              Zahra Mousavi and   
             Muhammad Ali Babar   NLP methods in host-based intrusion
                                  detection systems: a systematic review
                                  and future directions  . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 221, Number ??, January, 2024

                      Anonymous   January 2024 . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   Reviewer Thankyou  . . . . . . . . . . . ??
          Fatma Foad Ashrif and   
  Elankovan A. Sundararajan and   
                 Rami Ahmad and   
      Mohammad Kamrul Hasan and   
        Elaheh Yadegaridehkordi   Survey on the authentication and key
                                  agreement of 6LoWPAN: Open issues and
                                  future direction . . . . . . . . . . . . ??
   Shunmugapriya Ramanathan and   
     Abhishek Bhattacharyya and   
       Koteswararao Kondepu and   
               Andrea Fumagalli   Enabling containerized Central Unit live
                                  migration in 5G radio access network: an
                                  experimental study . . . . . . . . . . . ??
        Pranjal Kumar Nandi and   
      Md. Rejaul Islam Reaj and   
               Sujan Sarker and   
         Md. Abdur Razzaque and   
        Md. Mamun-or-Rashid and   
                     Palash Roy   Task offloading to edge cloud balancing
                                  utility and cost for energy harvesting
                                  Internet of Things . . . . . . . . . . . ??
                  Anitha P. and   
               H. S. Vimala and   
                     Shreyas J.   Comprehensive review on congestion
                                  detection, alleviation, and control for
                                  IoT networks . . . . . . . . . . . . . . ??
              Peiying Zhang and   
                  Zhihu Luo and   
               Neeraj Kumar and   
             Mohsen Guizani and   
              Hongxia Zhang and   
                      Jian Wang   CE-VNE: Constraint escalation virtual
                                  network embedding algorithm assisted by
                                  graph convolutional networks . . . . . . ??
               Guangxuan He and   
                 Chunlin Li and   
                   Yong Shu and   
                    Youlong Luo   Fine-grained access control policy in
                                  blockchain-enabled edge computing  . . . ??
        Angel Cañete and   
              Mercedes Amor and   
                  Lidia Fuentes   HADES: an NFV solution for
                                  energy-efficient placement and resource
                                  allocation in heterogeneous
                                  infrastructures  . . . . . . . . . . . . ??
Dénes László Fekete and   
                    Attila Kiss   Trust-minimized optimistic cross-rollup
                                  arbitrary message bridge . . . . . . . . ??
             Shaik Sharmila and   
                      Ch Aparna   Tracing footprints of anti-forensics and
                                  assuring secured data transmission in
                                  the cloud using an effective ECCDH and
                                  Kalman Filter  . . . . . . . . . . . . . ??
        Jean Nestor M. Dahj and   
          Kingsley A. Ogudo and   
             Leandro Boonzaaier   A hybrid analytical concept to QoE index
                                  evaluation: Enhancing eMBB service
                                  detection in 5G SA networks  . . . . . . ??
                Ruijin Wang and   
                Jinshan Lai and   
                   Xiong Li and   
                 Donglin He and   
          Muhammad Khurram Khan   RPIFL: Reliable and Privacy-Preserving
                                  Federated Learning for the Internet of
                                  Things . . . . . . . . . . . . . . . . . ??
Miguel Rodríguez-Pérez and   
Sergio Herrería-Alonso and   
J. Carlos López-Ardao and   
Raúl F. Rodríguez-Rubio   End-to-end active queue management with
                                  Named-Data Networking  . . . . . . . . . ??
                    Wu Chen and   
                  Jiayi Zhu and   
                 Jiajia Liu and   
                    Hongzhi Guo   A fast coordination approach for
                                  large-scale drone swarm  . . . . . . . . ??
               Sachin Kadam and   
        Kaustubh S. Bhargao and   
             Gaurav S. Kasbekar   Node cardinality estimation in a
                                  heterogeneous wireless network deployed
                                  over a large region using a mobile base
                                  station  . . . . . . . . . . . . . . . . ??
                 Ali Nauman and   
     Haya Mesfer Alshahrani and   
               Nadhem Nemri and   
            Kamal M. Othman and   
         Nojood O. Aljehane and   
             Mashael Maashi and   
          Ashit Kumar Dutta and   
            Mohammed Assiri and   
                Wali Ullah Khan   Dynamic resource management in
                                  integrated NOMA terrestrial-satellite
                                  networks using multi-agent reinforcement
                                  learning . . . . . . . . . . . . . . . . ??
            S. Periyanayagi and   
                 S. P. Raja and   
                 S. Vairachilai   Multipoint communication using a
                                  fog-robotic coordinated nodal conveying
                                  system for wireless networks . . . . . . ??
                Rongji Liao and   
                 Yuan Zhang and   
                 Jinyao Yan and   
                   Yang Cai and   
                     Narisu Tao   STOP: Joint send buffer and transmission
                                  control for user-perceived deadline
                                  guarantee via curriculum guided-deep
                                  reinforcement learning . . . . . . . . . ??
        Mustafa Ibrahim Khaleel   Region-aware dynamic job scheduling and
                                  resource efficiency for load balancing
                                  based on adaptive chaotic sparrow search
                                  optimization and coalitional game in
                                  cloud computing environments . . . . . . ??
             Shie-Yuan Wang and   
                   Cheng-Da Lin   Using deep reinforcement learning to
                                  train and periodically re-train a
                                  data-collecting drone based on real-life
                                  measurements . . . . . . . . . . . . . . ??
               Ala Altaweel and   
                Sidra Aslam and   
                  Ibrahim Kamel   Security attacks in Opportunistic Mobile
                                  Networks: a systematic literature review ??
          Songyut Phoemphon and   
      Nutthanon Leelathakul and   
                 Chakchai So-In   An enhanced node segmentation and
                                  distance estimation scheme with a
                                  reduced search space boundary and
                                  improved PSO for obstacle-aware wireless
                                  sensor network localization  . . . . . . ??
               Shahid Latif and   
              Wadii Boulila and   
                Anis Koubaa and   
                   Zhuo Zou and   
                    Jawad Ahmad   DTL-IDS: an optimized Intrusion
                                  Detection Framework using Deep Transfer
                                  Learning and Genetic Algorithm . . . . . ??
Cristiano Costa Argemon Vieira and   
  Luiz Fernando Bittencourt and   
 Thiago Augusto Lopes Genez and   
    Maycon Leone M. Peixoto and   
  Edmundo Roberto Mauro Madeira   RAaaS: Resource Allocation as a Service
                                  in multiple cloud providers  . . . . . . ??


Journal of Network and Computer Applications
Volume 222, Number ??, February, 2024

                      Anonymous   February 2024  . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
   Gabriel F. C. de Queiroz and   
  José F. de Rezende and   
              Valmir C. Barbosa   A flexible algorithm to offload DAG
                                  applications for edge computing  . . . . ??
               Sabir Saheel and   
                  Anik Alvi and   
             Aninda Roy Ani and   
                Tarem Ahmed and   
          Mohammad Faisal Uddin   Semi-supervised, neural network based
                                  approaches to face mask and anomaly
                                  detection in surveillance networks . . . ??
                Zihang Zhen and   
              Xiaoding Wang and   
                    Hui Lin and   
                 Sahil Garg and   
              Prabhat Kumar and   
              M. Shamim Hossain   A dynamic state sharding blockchain
                                  architecture for scalable and secure
                                  crowdsourcing systems  . . . . . . . . . ??
               Puneet Kumar and   
                Behnam Dezfouli   quicSDN: Transitioning from TCP to QUIC
                                  for southbound communication in
                                  software-defined networks  . . . . . . . ??
      Shahmir Khan Mohammed and   
               Shakti Singh and   
              Rabeb Mizouni and   
                     Hadi Otrok   TRACE: Transformer-based continuous
                                  tracking framework using IoT and MCS . . ??
                  Yuxiao Qi and   
                     Li Pan and   
                     Shijun Liu   An online bi-objective scheduling
                                  algorithm for service provisioning in
                                  cloud computing  . . . . . . . . . . . . ??
           Mohammed Alabbad and   
             Neerja Mhaskar and   
                   Ridha Khedri   Two formal design solutions for the
                                  generalization of network segmentation   ??
           Mohammed Shurrab and   
            Dunia Mahboobeh and   
              Rabeb Mizouni and   
               Shakti Singh and   
                     Hadi Otrok   Overcoming cold start and sensor bias: a
                                  deep learning-based framework for
                                  IoT-enabled monitoring applications  . . ??
              Hongwei Zhang and   
                    Wei Fan and   
                   Jinsong Wang   Bidirectional utilization of blockchain
                                  and privacy computing: Issues, progress,
                                  and challenges . . . . . . . . . . . . . ??
                 Wanqi Yang and   
               Pengfei Chen and   
                 Guangba Yu and   
               Haibin Zhang and   
                   Huxing Zhang   Network shortcut in data plane of
                                  service mesh with eBPF . . . . . . . . . ??
                   Ali El Kamel   Using FlowVisor and evolutionary
                                  algorithms to improve the switch
                                  migration in SDN . . . . . . . . . . . . ??
     David Herranz-Oliveros and   
         Ivan Marsa-Maestre and   
 Jose Manuel Gimenez-Guzman and   
      Marino Tejedor-Romero and   
              Enrique de la Hoz   Surgical immunization strategies against
                                  lateral movement in Active Directory
                                  environments . . . . . . . . . . . . . . ??
                Yuanhang Qi and   
              M. Shamim Hossain   Harnessing federated generative learning
                                  for green and sustainable Internet of
                                  Things . . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 223, Number ??, March, 2024

                      Anonymous   March 2024 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
           Muna Al-Hawawreh and   
              Mamoun Alazab and   
       Mohamed Amine Ferrag and   
              M. Shamim Hossain   Securing the Industrial Internet of
                                  Things against ransomware attacks: a
                                  comprehensive analysis of the emerging
                                  threat landscape and detection
                                  mechanisms . . . . . . . . . . . . . . . ??
             Vincenzo Agate and   
           Pierluca Ferraro and   
             Giuseppe Lo Re and   
                   Sajal K. Das   BLIND: a privacy preserving truth
                                  discovery system for mobile crowdsensing ??
                   Shah Zeb and   
              Aamir Mahmood and   
         Sunder Ali Khowaja and   
                  Kapal Dev and   
            Syed Ali Hassan and   
             Mikael Gidlund and   
               Paolo Bellavista   Towards defining Industry 5.0 vision
                                  with intelligent and softwarized
                                  wireless network architectures and
                                  services: a survey . . . . . . . . . . . ??
                  Ming Zhou and   
                  Zhen Yang and   
                 Haiyang Yu and   
                        Shui Yu   VDFChain: Secure and verifiable
                                  decentralized federated learning via
                                  committee-based blockchain . . . . . . . ??
              Harpreet Kaur and   
            Simranjit Singh and   
                Ranjit Kaur and   
                Rajandeep Singh   Advances in fronthauling of
                                  communication technologies: a review . . ??
                 Eunjin Kim and   
                  Junsu Kim and   
               Jae-Hyun Kim and   
                      Howon Lee   HiMAQ: Hierarchical multi-agent
                                  Q-learning-based throughput and fairness
                                  improvement for UAV-Aided IoT networks   ??
                  Xiaobo Yu and   
                Weizhi Meng and   
                 Yining Liu and   
                       Fei Zhou   TridentShell: an enhanced covert and
                                  scalable backdoor injection attack on
                                  web applications . . . . . . . . . . . . ??
                  Naser AlDuaij   mPillBox: an open framework for a
                                  smarter pillbox  . . . . . . . . . . . . ??
                    Hao Hao and   
                   Wei Ding and   
                      Wei Zhang   Time-continuous computing offloading
                                  algorithm with user fairness guarantee   ??
                 Omar Lajam and   
             Salahadin Mohammed   Optimizing efficiency of P2P content
                                  distribution with network coding:
                                  Principles, challenges, and future
                                  directions . . . . . . . . . . . . . . . ??
              Muhammad Adil and   
               Houbing Song and   
      Muhammad Khurram Khan and   
               Ahmed Farouk and   
                   Zhanpeng Jin   5G/6G-enabled metaverse technologies:
                                  Taxonomy, applications, and open
                                  security challenges with future research
                                  directions . . . . . . . . . . . . . . . ??
               Jeongho Kang and   
                 Kwangsue Chung   RL-based HTTP adaptive streaming with
                                  edge collaboration in multi-client
                                  environment  . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 224, Number ??, April, 2024

                      Anonymous   April 2024 . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
        Abeer Z. Al-Marridi and   
                Amr Mohamed and   
                    Aiman Erbad   Optimized blockchain-based healthcare
                                  framework empowered by mixed multi-agent
                                  reinforcement learning . . . . . . . . . ??
               Awnish Kumar and   
          Vijaya V. Saradhi and   
          Venkatesh Tamarapalli   Compressive sensing of Internet traffic
                                  data using relative-error bound
                                  tensor-CUR decomposition . . . . . . . . ??
        Dipanwita Sadhukhan and   
                Sangram Ray and   
               Mou Dasgupta and   
          Muhammad Khurram Khan   Development of a provably secure and
                                  privacy-preserving lightweight
                                  authentication scheme for roaming
                                  services in global mobility network  . . ??
          Ngangbam Indrason and   
                    Goutam Saha   Exploring Blockchain-driven security in
                                  SDN-based IoT networks . . . . . . . . . ??
          Pedro Horchulhack and   
          Eduardo K. Viegas and   
           Altair O. Santin and   
            Felipe V. Ramos and   
                Pietro Tedeschi   Detection of quality of service
                                  degradation on multi-tenant
                                  containerized services . . . . . . . . . ??
           Ali Y. Aldailamy and   
          Abdullah Muhammed and   
               Rohaya Latip and   
Nor Asilah Wati Abdul Hamid and   
                  Waidah Ismail   Online dynamic replication and placement
                                  algorithms for cost optimization of
                                  online social networks in two-tier
                                  multi-cloud  . . . . . . . . . . . . . . ??
                   Tao Peng and   
                    Wei You and   
                Kejian Guan and   
                  Entao Luo and   
               Shaobo Zhang and   
                Guojun Wang and   
                  Tian Wang and   
                       Youke Wu   Privacy-preserving multiobjective task
                                  assignment scheme with differential
                                  obfuscation in mobile crowdsensing . . . ??
              Peiying Zhang and   
                 Kunkun Yan and   
               Neeraj Kumar and   
               Lizhuang Tan and   
             Mohsen Guizani and   
Konstantin Igorevich Kostromitin and   
                  Jian Wang and   
                 Jianyong Zhang   A service function chain mapping scheme
                                  based on functional aggregation in
                                  space-air-ground integrated networks . . ??
              Tariq Mahmood and   
               Jianqiang Li and   
               Tanzila Saba and   
               Amjad Rehman and   
                      Saqib Ali   Energy optimized data fusion approach
                                  for scalable wireless sensor network
                                  using deep learning-based scheme . . . . ??
               Faheem Ullah and   
             Shagun Dhingra and   
                 Xiaoyu Xia and   
                   M. Ali Babar   Evaluation of distributed data
                                  processing frameworks in hybrid clouds   ??
                 Juhwan Kim and   
                 Jihyeon Yu and   
               Youngwoo Lee and   
          Dan Dongseong Kim and   
                    Joobeom Yun   HD-FUZZ: Hardware dependency-aware
                                  firmware fuzzing via hybrid MMIO
                                  modeling . . . . . . . . . . . . . . . . ??
                     Ying Huang   Firm social management system for
                                  supporting IoT users in application
                                  environment  . . . . . . . . . . . . . . ??
             Shariq Murtuza and   
                  Krishna Asawa   Early Prevention and Mitigation of Link
                                  Flooding Attacks in Software Defined
                                  Networks . . . . . . . . . . . . . . . . ??
                Hadi Ghaemi and   
  Dariush Abbasinezhad-Mood and   
        Arezou Ostad-Sharif and   
            Zakieh Alizadehsani   Novel blockchain-assisted fault-tolerant
                                  roaming authentication protocol for
                                  mobility networks without home agent
                                  entanglement . . . . . . . . . . . . . . ??
                Qingyang Yu and   
               Nengwen Zhao and   
                 Mingjie Li and   
                   Zeyan Li and   
               Honglin Wang and   
               Wenchi Zhang and   
                 Kaixin Sui and   
                        Dan Pei   A survey on intelligent management of
                                  alerts and incidents in IT services  . . ??
                 Bing Xiong and   
               Yongqing Liu and   
                    Rui Liu and   
               Jinyuan Zhao and   
                 Shiming He and   
               Baokang Zhao and   
                   Kun Yang and   
                       Keqin Li   ActiveGuardian: an accurate and
                                  efficient algorithm for identifying
                                  active elephant flows in network traffic ??
           Mohammed Alabbad and   
             Neerja Mhaskar and   
                   Ridha Khedri   Hardening of network segmentation using
                                  automated referential penetration
                                  testing  . . . . . . . . . . . . . . . . ??


Journal of Network and Computer Applications
Volume 225, Number ??, May, 2024

                      Anonymous   May 2024 . . . . . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
           Alessandra Somma and   
   Alessandra De Benedictis and   
  Christiancarmine Esposito and   
                Nicola Mazzocca   The convergence of Digital Twins and
                                  Distributed Ledger Technologies: a
                                  systematic literature review and an
                                  architectural proposal . . . . . . . . . ??
                Sana Younes and   
                 Maroua Idi and   
                  Riadh Robbana   Discrete-time Markov decision process
                                  for performance analysis of virtual
                                  machine allocation schemes in C-RAN  . . ??
              Soumen Mondal and   
                Luca Davoli and   
            Sanjay Dhar Roy and   
                Sumit Kundu and   
          Gianluigi Ferrari and   
                Riccardo Raheli   Throughput and delay analysis of
                                  cognitive M2M communications . . . . . . ??
               Dalila Ressi and   
         Riccardo Romanello and   
               Carla Piazza and   
                   Sabina Rossi   AI-enhanced blockchain technology: a
                                  review of advancements and opportunities ??
       Maedeh Abedini Bagha and   
          Kambiz Majidzadeh and   
           Mohammad Masdari and   
                 Yousef Farhang   ELA-RCP: an energy-efficient and load
                                  balanced algorithm for reliable
                                  controller placement in software-defined
                                  networks . . . . . . . . . . . . . . . . ??
               Lotfi Mhamdi and   
                   Mohd Mat Isa   Securing SDN: Hybrid autoencoder-random
                                  forest for intrusion detection and
                                  attack mitigation  . . . . . . . . . . . ??
          Oladipupo Adekoya and   
                    Adel Aneiba   A Stochastic Computational Graph with
                                  Ensemble Learning Model for solving
                                  Controller Placement Problem in
                                  Software-Defined Wide Area Networks  . . ??
                   Yu Liang and   
                Sheng Zhang and   
                         Jie Wu   SplitStream: Distributed and
                                  workload-adaptive video analytics at the
                                  edge . . . . . . . . . . . . . . . . . . ??
             Sheharyar Khan and   
             Zheng Jiangbin and   
             Muhammad Irfan and   
               Farhan Ullah and   
                    Sohrab Khan   An expert system for hybrid edge to
                                  cloud computational offloading in
                                  heterogeneous MEC-MCC environments . . . ??