Last update:
Thu Oct 2 08:26:39 MDT 2025
Hermann Maurer Editorial . . . . . . . . . . . . . . . 1
L. C. Jain Editorial . . . . . . . . . . . . . . . 3
Herbert Dawid and
Kurt Hornik The dynamics of genetic algorithms in
interactive environments . . . . . . . . 5--19
Charles L. Karr Adaptive process control using
biological paradigms . . . . . . . . . . 21--44
Kaihei Kuwata and
Yuji Kajitani and
Masahide Watanabe and
Ryu Katayama Chaos simulator as a developing tool and
a research environment for applications
of chaos engineering . . . . . . . . . . 45--66
Ranjit Bose and
Vijayan Sugumaran Knowledge-based approach to domain
modeling: organizational process
modeling application . . . . . . . . . . 67--89
Dinesh P. Mital and
Eam Khwang Teoh and
P. N. Suganthan Learning parameters for object
recognition by the self-organizing
Hopfield network . . . . . . . . . . . . 91--108
L. C. Jain Guest Editorial: Intelligent systems:
design and applications. Part 2 . . . . 109
David V. Sánchez A. On the design of a class of neural
networks . . . . . . . . . . . . . . . . 111--118
Ferda N. Civelek-Alpaslan and
Kathleen M. Swigger A temporal neural network model for
constructing connectionist expert system
knowledge bases . . . . . . . . . . . . 119--133
Krishna Kottathra and
Yianni Attikiouzel A novel multicriteria optimization
algorithm for the structure
determination of multilayer feedforward
neural networks . . . . . . . . . . . . 135--147
Ibikunle Ashiru and
Chris Czarnecki and
Tom Routen Characteristics of a genetic based
approach to path planning for mobile
robots . . . . . . . . . . . . . . . . . 149--169
Walter Cedeño and
Rao V. Vemuri Genetic algorithms in aquifer management 171--187
John E. Hunt and
Denise E. Cooke Learning using an artificial immune
system . . . . . . . . . . . . . . . . . 189--212
Larry R. Medsker Microcomputer applications of hybrid
intelligent systems . . . . . . . . . . 213--234
Yi Pan and
Mounir Hamdi Singular value decomposition on
processor arrays with a pipelined bus
system . . . . . . . . . . . . . . . . . 235--248
J. M. Kuhlman and
M. J. Lyell Development of a user-friendly software
planning tool to assess effects of
biofilm activity on contaminant
reduction in streams . . . . . . . . . . 249--264
Sun-Teck Tan Architecture of a generic instructional
planner . . . . . . . . . . . . . . . . 265--274
N. Bourbakis and
N. Pereira and
S. Mertoguno Hardware design of a letter-driven OCR
and document processing system . . . . . 275--294
Jian Tao Wang and
Dinesh P. Mital A microcomputer-based prototype for ECG
paper record conversion . . . . . . . . 295--307
Gokul Rajaram and
V. Rajaraman A probabilistic method for calculating
hit ratios in direct mapped caches . . . 309--319
K. Padmanabhan and
D. Nedumaran and
S. Ananthi Bedside monitor for combined ECG and
ultrasound Doppler-echo observations
using a microprocessor . . . . . . . . . 321--334
Anonymous Index . . . . . . . . . . . . . . . . . i--vi
P. G. O'Donoghue and
M. H. Murphy Object modelling and formal
specification during real-time system
development . . . . . . . . . . . . . . 335--352
Roger Nkambou and
Gilles Gauthier Integrating WWW resources in an
Intelligent Tutoring System . . . . . . 353--366
Hueyching Janice Jih The impact of learners' pathways on
learning performance in multimedia
Computer Aided Learning . . . . . . . . 367--380
Daniel J. Helm and
Raymond J. D'Amore and
Puck-Fai Yan MIDS: a framework for information
organization and discovery . . . . . . . 381--394
K. Maly and
C. Wild and
C. M. Overstreet and
H. Abdel-Wahab and
A. Gupta and
A. Youssef and
E. Stoica and
R. Talla and
A. Prabhu Interactive remote instruction: lessons
learned . . . . . . . . . . . . . . . . 395--404
D. Radhakrishnan A microcontroller based pacemaker tester 405--413
Benjamin Singer and
George Saon An efficient algorithm for parallel
integer multiplication . . . . . . . . . 415--418
Anonymous Guest Editorial: Special issue of JNCA
on the digital libraries . . . . . . . . 1--2
Ee-Peng Lim and
Ying Lu Integrated queries to existing
bibliographic and structured databases 3--24
Shigeo Sugimoto and
Akira Maeda and
Tetsuo Sakaguchi and
Koichi Tabata and
Takehisa Fujita Experimental studies on software tools
to enhance accessibility to information
in digital libraries . . . . . . . . . . 25--44
Alfredo J. Sánchez and
John J. Leggett Agent services for users of digital
libraries . . . . . . . . . . . . . . . 45--58
Klaus Tochtermann and
Thomas Alders and
Andreas Seifert DogitaLS1: the Dortmund digital library
system . . . . . . . . . . . . . . . . . 59--73
Gene Alloway and
Nathan Bos and
Kathleen Hamel and
Tracy Hammerman and
Elisabeth Klann and
Joseph Krajcik and
David Lyons and
Terry Madden and
Jon Margerum-Leys and
James Reed and
Nancy Scala and
Elliot Soloway and
Ioanna Vekiri and
Raven Wallace Creating an inquiry-learning environment
using the World Wide Web . . . . . . . . 75--85
John L. Schnase and
Deborah L. Kama and
Kay L. Tomlinson and
José Alfredo Sánchez and
Edward L. Cunnius and
Nancy R. Morin The Flora of North America digital
library: a case study in biodiversity
database publishing . . . . . . . . . . 87--103
Gerald Tripp On the design of an ATM interface with
facilities for traffic monitoring and
generation . . . . . . . . . . . . . . . 105--121
Paul Losleben and
Alice S. Tull and
Erming Zhou Help-Exchange: an arbitrated system for
a help network . . . . . . . . . . . . . 123--134
Richard H. Fowler and
Wendy A. L. Fowler and
Jorge L. Williams 3D visualization of WWW semantic content
for browsing and query formulation . . . 135--149
Daniel R. Bielenberg and
Ted Carpenter-Smith Efficacy of story in multimedia training 151--159
B. S. Lee and
T. K. Y. Chan and
P. C. Leong A `pay-as-you-use' controller for
networked laser printers . . . . . . . . 161--169
S. C. Hui and
K. Y. Chan and
G. Y. Qian Distributed fax message processing
system . . . . . . . . . . . . . . . . . 171--190
L. P. Khoo and
M. Y. Teo A prototype fuzzy-based classifier
system for trajectory planning . . . . . 191--202
Hock C. Chan Visual query languages for entity
relationship model databases . . . . . . 203--221
Sumit Ghosh An asynchronous approach to efficient
execution of programs on adaptive
architectures utilizing FPGAs . . . . . 223--252
Ellen Yu Borkowski and
David Henry and
Lida L. Larsen and
Deborah Mateik Supporting teaching and learning via the
Web: transforming hard-copy linear
mindsets into Web-flexible creative
thinking . . . . . . . . . . . . . . . . 253--265
Jianying Zhou and
Dieter Gollmann Evidence and non-repudiation . . . . . . 267--281
Renji Tao and
Shihua Chen A variant of the public key cryptosystem
FAPKC3 . . . . . . . . . . . . . . . . . 283--303
H. J. Schumacher and
Sumit Ghosh A fundamental framework for network
security . . . . . . . . . . . . . . . . 305--322
Anonymous Index and Contents to Volume 20 . . . . i--x
Holger Bock and
Wolfgang Mayerwieser and
Karl C. Posch and
Reinhard Posch and
Volker Schindler An integrated co-processor architecture
for a smartcard . . . . . . . . . . . . 323--337
Sandra L. Esler and
Michael L. Nelson NASA indexing benchmarks: evaluating
text search engines . . . . . . . . . . 339--353
Michal Iglewski and
Tomasz Müldner Comparison of formal specification
methods and object-oriented paradigms 355--377
Don E. George and
E. Salari Real-time pitch extraction of voiced
speech . . . . . . . . . . . . . . . . . 379--387
Schubert Foo and
Siu Cheung Hui Delivery of video mail on the World Wide
Web . . . . . . . . . . . . . . . . . . 389--403
Bernhard Leisch and
Peter Schuhmayer An architecture for distributed
visualization of technical processes . . 405--420
Guojun Lu and
Chester Kang An efficient communication scheme for
media on-demand services with hard QoS
guarantees . . . . . . . . . . . . . . . 1--15
P. Blenkhorn and
D. G. Evans Using speech and touch to enable blind
people to access schematic diagrams . . 17--29
Nader Mir-Fakhraei An efficient multicast approach in an
ATM switching network for multimedia
applications . . . . . . . . . . . . . . 31--39
Ee-Luang Ang and
Syin Chan and
Bu-Sung Lee Deployment of VCR services on a computer
network . . . . . . . . . . . . . . . . 41--52
Mark Ratcliffe and
Tim Paul Davies Using MBone technology to support a
framework for a remote advisory service 53--68
Imran Khan and
Howard C. Card Adaptive information agents using
competitive learning . . . . . . . . . . 69--89
N. Vlajic and
H. C. Card Categorizing Web pages on the subject of
neural networks . . . . . . . . . . . . 91--105
Sherali Zeadally and
Weiyou Cui Experiences with multimedia applications
over native ATM . . . . . . . . . . . . 107--123
E. C. Tan and
A. Wahab and
H. W. Yong Interfacing reprogrammable universal
remote controller with multimedia PC . . 125--134
C. C. Charlton and
P. H. Leng and
R. K. Lloyd and
R. Turnbull The use of macroprocessing for Web site
standardization . . . . . . . . . . . . 135--148
Gerard Parr and
Kevin Curran Optimal multimedia transport on the
Internet . . . . . . . . . . . . . . . . 149--161
Johnny S. K. Wong and
Rishi Nayar and
Armin R. Mikler A framework for a World Wide Web-based
Data Mining system . . . . . . . . . . . 163--185
P. C. Saxena and
Sangita Gupta A performance comparison of token- and
tree-based mutual exclusion algorithms
on Chordal Rings . . . . . . . . . . . . 187--201
K. V. Chin and
S. C. Hui and
S. Foo Enhancing the quality of Internet voice
communication for Internet telephony
systems . . . . . . . . . . . . . . . . 203--218
Anonymous Contents and Index to Volume 21 . . . . i--viii
Bor Prihavec and
Franc Solina User interface for video observation
over the Internet . . . . . . . . . . . 219--237
Nikolas M. Mitrou and
Konstantine Kavidopoulos Traffic engineering using a class of
M/G/1 models . . . . . . . . . . . . . . 239--271
Nasser-Eddine Rikli An effective model for VBR video with
application to an ATM multiplexer . . . 273--285
L. Moreno and
R. M. Aguilar and
C. A. Martin and
J. D. Piñeiro and
J. I. Estévez and
J. L. Sánchez and
J. F. Sigut and
V. I. Jiménez Patient-centered computer simulation in
hospital management . . . . . . . . . . 287--310
Wei-Chou Chen and
Tzung-Pei Hong and
Rong Jeng A framework of decision support systems
for use on the World Wide Web . . . . . 1--17
Denis Helic and
Hermann Maurer and
Nick Scherbakov Introducing hypermedia composites to WWW 19--32
Hamesh Chawla and
Geoff Dillon and
Riccardo Bettati HYDRANET: Network support for scaling of
large-scale services . . . . . . . . . . 33--50
Joachim Hasebrook Web-based training, performance and
controlling . . . . . . . . . . . . . . 51--64
Claude Ghaoui and
M. J. Taylor Special issue on: `Support for Open and
Distance Learning on the WWW' . . . . . 65--68
Harri Klapuri and
Jarmo Takala and
Jukka Saarinen Safety, liveness and real-time in
embedded system design . . . . . . . . . 69--89
M. Kumar and
S. Venkatesh and
K.-Y. Lim and
H. Santoso Information access and QoS issues in a
mobile computing environment . . . . . . 91--118
K. Hanner and
R. Hörmanseder Managing Windows NT$^\reg $ file system
permissions --- a security tool to
master the complexity of Microsoft
Windows NT$^\reg $ file system
permissions . . . . . . . . . . . . . . 119--131
Christine Steeples and
Peter Goodyear Enabling professional learning in
distributed communities of practice:
Descriptors for multimedia objects . . . 133--145
Uffe Kock Wiil and
Kenneth M. Anderson and
Michael Bieber Call for Papers: Special Issue on:
Hypermedia Extensibility Mechanisms and
Scripting Languages . . . . . . . . . . 147--148
J. E. Gilbert and
C. Y. Han Adapting instruction in search of `a
significant difference' . . . . . . . . 149--160
Brian M. Slator and
Paul Juell and
Philip E. McClean and
Bernhardt Saini-Eidukat and
Donald P. Schwert and
Alan R. White and
Curt Hill Virtual environments for education . . . 161--174
Guojun Lu Design issues of multimedia information
indexing and retrieval systems . . . . . 175--198
Gail J. Ahn and
Ravi Sandhu Towards role-based administration in
network information services . . . . . . 199--213
Anonymous Index and Contents to Volume 22 . . . . i--viii
Hongbo Du and
Laurent Wery Micro: a normalization tool for
relational database designers . . . . . 215--232
David Mioduser and
Rafi Nachmias and
Avigail Oren and
Orly Lahav Web-based learning environments (WBLE):
Current implementation and evolving
trends . . . . . . . . . . . . . . . . . 233--247
Rosa María Carro and
Estrella Pulido and
Pilar Rodríguez Dynamic generation of adaptive
Internet-based courses . . . . . . . . . 249--257
Luca Iocchi The Web-OEM approach to Web information
extraction . . . . . . . . . . . . . . . 259--269
Wolfgang Hürst User interfaces for telepresentations
--- Input devices, interaction concepts
and design issues . . . . . . . . . . . 1--15
Wim de Boer and
Betty Collis Instructors' choices for a WWW-based
course-support environment . . . . . . . 17--26
Chih-Hsiung Tu On-line learning migration: from social
learning theory to social presence
theory in a CMC environment . . . . . . 27--37
Chih-Hsiung Tu Critical examination of factors
affecting interaction on CMC . . . . . . 39--58
Chwei-King Mok and
Nader F. Mir An efficient interconnection network for
large-scale computer communications
applications . . . . . . . . . . . . . . 59--75
Dave Berque and
Andrew Hutcheson and
David K. Johnson and
Larry Jovanovic and
Kyle Moore and
Carl Singer and
Kevin M. Slattery The design of an interface for student
note annotation in a networked
electronic classroom . . . . . . . . . . 77--91
Colin Pattinson A simulated network management
information base . . . . . . . . . . . . 93--107
Gerhard Eschelbeck Active Security --- a proactive approach
for computer security systems . . . . . 109--130
Jon Dron and
Richard Mitchell and
Phil Siviter and
Chris Boyne CoFIND --- an experiment in
$N$-dimensional collaborative filtering 131--142
Bu-Sung Lee and
Chiew-Tong Lau and
Nicholas C. H. Vun Power LAN MIB for management of
intelligent telecommunication equipment 143--154
Anonymous Preface by the Editor in Chief . . . . . 155
Bert J. Dempsey and
Micah Beck Preface to `Developing New Network-based
Storage Services for Internet-supported
Collaborative Communities' . . . . . . . 157--159
Ivan Tomek Preface to `Virtual Environments' . . . 161--162
John Chung-I Chuang and
Marvin A. Sirbu Distributed network storage service with
quality-of-service guarantees . . . . . 163--185
Ann Chervenak and
Ian Foster and
Carl Kesselman and
Charles Salisbury and
Steven Tuecke The data grid: Towards an architecture
for the distributed management and
analysis of large scientific datasets 187--200
Bert J. Dempsey Performance analysis of a scaleable
design for replicating file collections
in wide-area networks . . . . . . . . . 201--218
Laura Slaughter and
Gary Marchionini and
Gary Geisler Open video: a framework for a test
collection . . . . . . . . . . . . . . . 219--245
Anna Cicognani Language and design in text-based
virtual worlds . . . . . . . . . . . . . 247--274
Ivan Tomek The design and implementation of a MOO 275--289
Alicia Díaz and
Alejandro Fernández A pattern language for virtual
environments . . . . . . . . . . . . . . 291--309
Zi\`ed Choukair and
Damien Retailleau A QoS model for collaboration through
Distributed Virtual Environments . . . . 311--334
Anonymous Index and contents to volume 23 . . . . iii--viii
H. Maurer Preface for the special issue `Support
for flexible e-Learning on the WWW' . . 335
Claude Ghaoui and
M. J. Taylor Support for flexible e-Learning on the
WWW: a special issue . . . . . . . . . . 337--338
O. Brand and
L. Petrak and
D. Sturzebecher and
M. Zitterbart Supporting Tele-Teaching: visualization
aspects . . . . . . . . . . . . . . . . 339--355
Weigang Wang and
Jörg M. Haake and
Jessica Rubart and
Daniel A. Tietze Hypermedia-based support for cooperative
learning of process knowledge . . . . . 357--379
Samuli Pekkola and
Mike Robinson and
Jonni Korhonen and
Saku Hujala and
Tero Toivonen Multimedia application to support
distance learning and other social
interactions in real-time . . . . . . . 381--399
Hans-Peter Dommel and
J. J. Garcia-Luna-Aceves A coordination framework and
architecture for Internet groupware . . 401--427
Stuart K. MacGlashan and
Malcolm J. Taylor MUSiCAL: an object-oriented hypermedia
data model for the reuse of museum
information for computer-aided learning
and the World-Wide Web . . . . . . . . . 429--453
Claude Ghaoui Document icon bar for the support of
authoring, learning and navigation on
the Web: Usability issues . . . . . . . 455--475
Uffe Kock Wiil and
Kenneth M. Anderson Preface to `Hypermedia extensibility
mechanisms and scripting languages' . . 1--5
Uffe Kock Wiil A framework for classifying
extensibility mechanisms in hypermedia
systems . . . . . . . . . . . . . . . . 7--18
Peter J. Nürnberg Extensibility in component-based open
hypermedia systems . . . . . . . . . . . 19--38
John Noll and
Walt Scacchi Specifying process-oriented hypertext
for organizational computing . . . . . . 39--61
Serge Demeyer Extensibility via a meta-level
architecture . . . . . . . . . . . . . . 63--74
Kenneth M. Anderson The extensibility mechanisms of the
Chimera open hypermedia system . . . . . 75--86
Gail-Joon Ahn and
Kwangjo Kim CONUGA: Constrained User-Group
Assignment . . . . . . . . . . . . . . . 87--100
Harri Klapuri and
Jarmo Takala and
Jukka Saarinen Implementing reactive closed-system
specifications . . . . . . . . . . . . . 101--123
Guoyi Li and
Ian Li-Jin Thng and
Lawrence Wai Choong Wong ABR services for overcoming misbehaving
sources in a heterogeneous environment 125--149
David Hua Min Tan and
Siu Cheung Hui and
Chiew Tong Lau Wireless messaging services for mobile
users . . . . . . . . . . . . . . . . . 151--166
Igor Djurovic and
Srdjan Stankovic and
Ioannis Pitas Digital watermarking in the fractional
Fourier transformation domain . . . . . 167--173
C. Bouras and
A. Philopoulos and
Th. Tsiatsos e-Learning through distributed virtual
environments . . . . . . . . . . . . . . 175--199
Duen-Ren Liu and
Yuh-Jaan Lin and
Chung-Min Chen and
Ya-Wen Huang Deployment of personalized e-catalogues:
an agent-based framework integrated with
XML metadata and user models . . . . . . 201--228
W. F. Poon and
K. T. Lo Design of a starvation-free storage
system for a multicast video-on-demand
system using a double-rate batching
policy . . . . . . . . . . . . . . . . . 229--247
Ming-Chung Tang and
Chun-Nun Chou and
Ching-Hui Tang and
D. C. Pan and
Wei-Kuan Shih Exploiting GSM short message service for
ubiquitous accessing . . . . . . . . . . 249--267
Uffe Kock Wiil and
David L. Hicks and
Peter J. Nürnberg Special Issue on `Structural Computing' 269--271
Anonymous Volume Contents . . . . . . . . . . . . i--viii
J. A. Lennon and
H. Maurer MUSLI: a hypermedia interface for
dynamic, interactive, and symbolic
communication . . . . . . . . . . . . . 273--291
J. A. Lennon and
H. Maurer Augmenting text and voice conversations
with dynamic, interactive abstractions
using P2P networking . . . . . . . . . . 293--306
Nawel Sabri and
Chantal Taconet A generic tool to federate WAN servers 307--331
Rached N. Zantout and
Ahmed A. Guessoum An automatic English--Arabic HTML page
translation system . . . . . . . . . . . 333--357
P. C. Saxena and
D. R. Choudhury and
G. Gabrani and
S. Gupta and
M. Bhardwaj and
M. Chopra A heuristic approach to resource
locations in broadband networks . . . . 1--35
M. Kouadio and
U. Pooch Technology on social issues of
videoconferencing on the Internet: a
survey . . . . . . . . . . . . . . . . . 37--56
Yoon-Jung Rhee and
Eun-Sil Hyun and
Tai-Yun Kim Connection management for QoS service on
the Web . . . . . . . . . . . . . . . . 57--68
Heejin Jang and
Sangwook Kim Intruder tracing through dynamic
extension of a security domain . . . . . 69--91
Chun-I Fan and
Chin-Laung Lei An unlinkably divisible and intention
attachable ticket scheme for runoff
elections . . . . . . . . . . . . . . . 93--107
Waleed E. Farag and
Hussein Abdel-Wahab A new paradigm for analysis of MPEG
compressed videos . . . . . . . . . . . 109--127
T. Morris and
P. Blenkhorn and
Farhan Zaidi Blink detection for real-time eye
tracking . . . . . . . . . . . . . . . . 129--143
Bu-Sung Lee and
Chai-Kiat Yeo and
Ruijin Fu Hybrid quality adaptation mechanism for
layered multicast over the Internet . . 145--159
Chih-Yung Chang and
Shin-Chih Tu Active route-maintenance protocol for
signal-based communication path in ad
hoc networks . . . . . . . . . . . . . . 161--177
Nischal M. Piratla and
Anura P. Jayasumana A neural network based real-time gaze
tracker . . . . . . . . . . . . . . . . 179--196
Anita Behle and
Michael Kirchhof and
Manfred Nagl and
Ralf Welter Retrieval of software components using a
distributed web system . . . . . . . . . 197--222
Rudolf Hörmanseder and
Johann Murauer and
Jörg R. Mühlbacher Managing data flow in a DAC supporting
security system . . . . . . . . . . . . 223--238
Fawzi Daoud and
Takahiko Nomura Preface to `smart spaces' . . . . . . . 239--242
Daphne Economou and
William L. Mitchell and
Steve R. Pettifer Problem driven CVE technology
development . . . . . . . . . . . . . . 243--262
Takahiko Nomura Design of `Ba' for successful Knowledge
Management --- how enterprises should
design the places of interaction to gain
competitive advantage . . . . . . . . . 263--278
Masakatsu Kosuga and
Naoki Kirimoto and
Tatsuya Yamazaki and
Tomonori Nakanishi and
Masakazu Masuzaki and
Kazuo Hasuike A multimedia service composition scheme
for ubiquitous networks . . . . . . . . 279--293
Christopher Maher and
Margaret Corbit Creating genetic applications for
informal science learning in multi-user
virtual environments . . . . . . . . . . 295--308
Tatsuya Yamazaki QoS-based media retrieval for networked
digital archives . . . . . . . . . . . . 309--317
Stéphane Lo Presti and
Didier Bert and
Andrzej Duda TAO: Temporal Algebraic Operators for
modeling multimedia presentations . . . 319--342
Hilde van der Togt Publisher's Note . . . . . . . . . . . . 1--2
Uffe K. Wiil and
Peter J. Nürnberg and
David L. Hicks Structural computing: research
directions, systems and issues . . . . . 3--9
Peter J. Nürnberg and
Monica M. C. Schraefel Relationships among structural computing
and other fields . . . . . . . . . . . . 11--26
David L. Hicks and
Uffe K. Wiil Searching for revolution in structural
computing . . . . . . . . . . . . . . . 27--45
Kenneth M. Anderson and
Susanne A. Sherba and
William Van Lepthien Structural templates and
transformations: the Themis structural
computing environment . . . . . . . . . 47--71
Weigang Wang Visualizing and interacting with
hypermedia-based process-centric
enterprise models . . . . . . . . . . . 73--93
David E. Millard Discussions at the data border: from
generalised hypertext to structural
computing . . . . . . . . . . . . . . . 95--114
Uffe K. Wiil and
Samir Tata and
David L. Hicks Cooperation services in the Construct
structural computing environment . . . . 115--137
Manolis Tzagarakis and
Dimitris Avramidis and
Maria Kyriakopoulou and
Monica M. C. Schraefel and
Michalis Vaitis and
Dimitris Christodoulakis Structuring primitives in the
Callimachus component-based open
hypermedia system . . . . . . . . . . . 139--162
Anonymous Calendar . . . . . . . . . . . . . . . . ifc--ifc
B. Prabhakaran and
Yuguang Tu and
Yin Wu Experiences with an object-level
scalable web framework . . . . . . . . . 163--196
K. Komathy and
V. Ramachandran and
P. Vivekanandan Security for XML messaging services ---
a component-based approach . . . . . . . 197--211
Gareth Evans and
Paul Blenkhorn Architectures of assistive software
applications for Windows-based computers 213--228
M. Zaki and
M. G. Darwish and
G. Osman GBF: a grammar based filter for Internet
applications . . . . . . . . . . . . . . 229--257
Nikitas M. Sgouros and
Stelios Gerogiannakis Robot teleoperation environments
featuring WAP-based wireless devices . . 259--271
C. K. Yeo and
B. S. Lee and
M. H. Er A framework for multicast video
streaming over IP networks . . . . . . . 273--289
Anonymous Index to volume 26 . . . . . . . . . . . III--IV
Ching-Lung Chang and
Kuo-Sheng Hsu Design and implementation of MP3-music
on demand system using streaming
technology . . . . . . . . . . . . . . . 291--321
Li Chunlin and
Li Layuan Apply agent to build grid service
management . . . . . . . . . . . . . . . 323--340
Jasmine Banks and
Geoffery Ericksson and
Kevin Burrage and
Peter Yellowlees and
Sean Ivermee and
Jennifer Tichon Constructing the hallucinations of
psychosis in Virtual Reality . . . . . . 1--11
Wassim Itani and
Ayman Kayssi J2ME application-layer end-to-end
security for m-commerce . . . . . . . . 13--32
Duen-Ren Liu and
Tzyy-Feng Hwang An agent-based approach to flexible
commerce in intermediary-centric
electronic markets . . . . . . . . . . . 33--48
Asrar Sheikh and
Tao Wan and
Zaki Alakhdhar A unified approach to analyze multiple
access protocols for buffered finite
users . . . . . . . . . . . . . . . . . 49--76
Heng Wang and
Jie Fang and
Hua Wang and
Ya-Min Sun TSDLMRA: an efficient multicast routing
algorithm based on Tabu search . . . . . 77--90
C. Bouras and
Th. Tsiatsos Distributed virtual reality: building a
multi-user layer for the EVE Platform 91--111
G. A. Aderounmu Performance comparison of remote
procedure calling and mobile agent
approach to control and data transfer in
distributed computing environment . . . 113--129
A. U. H. Sheikh and
T. Wan and
S. Z. Alakhdhar and
I. Lambadaris and
M. Devetsikiotis Performance analysis of buffered R-ALOHA
systems using tagged user approach . . . 131--150
Wen-Lin Yang A comparison of two optimal approaches
for the MCOP problem . . . . . . . . . . 151--162
Denis Helic and
Hermann Maurer and
Nick Scerbakov Knowledge transfer processes in a modern
WBT system . . . . . . . . . . . . . . . 163--190
Anonymous Index . . . . . . . . . . . . . . . . . III--IV
Wei-Bin Lee and
Kuan-Chieh Liao Constructing identity-based
cryptosystems for discrete logarithm
based cryptosystems . . . . . . . . . . 191--199
M. Zaki and
Tarek S. Sobh A cooperative agent-based model for
active security systems . . . . . . . . 201--220
Sergio A. Velastin and
Benny Lo and
Jie Sun A flexible communications protocol for a
distributed surveillance system . . . . 221--253
Tao Gu and
Hung Keng Pung and
Da Qing Zhang A service-oriented middleware for
building context-aware services . . . . 1--18
M. Khedr and
A. Karmouch ACAI: agent-based context-aware
infrastructure for spontaneous
applications . . . . . . . . . . . . . . 19--44
Ismail Erturk A new method for transferring CAN
messages using wireless ATM . . . . . . 45--56
Huamin Chen and
Prasant Mohapatra Using service brokers for accessing
backend servers for web applications . . 57--74
Anonymous Announcement . . . . . . . . . . . . . . I
Anonymous Announcement . . . . . . . . . . . . . . II
Anonymous Preface . . . . . . . . . . . . . . . . 75--76
Reginald L. Walker Hierarchical task topology for
retrieving information from within a
simulated information ecosystem . . . . 77--96
A. Rungsawang and
N. Angkawattanawit Learnable topic-specific web crawler . . 97--114
Wataru Sunayama and
Masahiko Yachida Panoramic View System for extracting key
sentences based on viewpoints and
application to a search engine . . . . . 115--127
Mark P. Sinka and
David W. Corne The BankSearch web document dataset:
investigating unsupervised clustering
and category similarity . . . . . . . . 129--146
Xiaozhe Wang and
Ajith Abraham and
Kate A. Smith Intelligent web traffic mining and
analysis . . . . . . . . . . . . . . . . 147--165
Srinivas Mukkamala and
Andrew H. Sung and
Ajith Abraham Intrusion detection using an ensemble of
intelligent paradigms . . . . . . . . . 167--182
Elhadi Shakshuki and
Zhonghai Luo and
Jing Gong An agent-based approach to security
service . . . . . . . . . . . . . . . . 183--208
Ch. Bouras and
A. Gkamas and
I. Nave and
D. Primpas and
A. Shani and
O. Sheory and
K. Stamos and
Y. Tzruya Application on demand system over the
Internet . . . . . . . . . . . . . . . . 209--232
Tao Gu and
Hung Keng Pung and
Jian Kang Yao Towards a flexible service discovery . . 233--248
Anonymous Index to Volume 28 . . . . . . . . . . . III--IV
D. Di Sorte and
G. Reali Pricing and brokering services over
interconnected IP networks . . . . . . . 249--283
Christos Bouras and
Afrodite Sevasti Service level agreements for
DiffServ-based services' provisioning 285--302
Bing-Yi Zhang and
Ya-Min Sun Fractional alpha stable network traffic
model and its application in QoS routing 1--10
Elizabeth A. Thompson and
Eric Harmison and
Robert Carper and
Robert Martin and
Jim Isaacs Robot teleoperation featuring
commercially available wireless network
cards . . . . . . . . . . . . . . . . . 11--24
Leonardo Bidese de Pinho and
Claudio Luis de Amorim Assessing the efficiency of stream reuse
techniques in P2P video-on-demand
systems . . . . . . . . . . . . . . . . 25--45
N. Zhang and
Q. Shi and
M. Merabti and
R. Askwith Practical and efficient fair document
exchange over networks . . . . . . . . . 46--61
T. Morris and
V. Chauhan Facial feature tracking for cursor
control . . . . . . . . . . . . . . . . 62--80
Anonymous Editorial board . . . . . . . . . . . . CO2
Nikhil Ichalkaranje Editorial . . . . . . . . . . . . . . . 81--82
Yukiko I. Nakano and
Toshihiro Murayama and
Masashi Okamoto and
Daisuke Kawahara and
Qing Li and
Sadao Kurohashi and
Toyoaki Nishida Cards-to-presentation on the web:
generating multimedia contents featuring
agent animations . . . . . . . . . . . . 83--104
Pierre Urlings and
Christos Sioutis and
Jeff Tweedale and
Nikhil Ichalkaranje and
Lakhmi Jain A future framework for interfacing BDI
agents in a real-time teaming
environment . . . . . . . . . . . . . . 105--123
E. V. Krishnamurthy and
V. K. Murthy Distributed agent paradigm for soft and
hard computation . . . . . . . . . . . . 124--146
Colin Fyfe and
Lakhmi Jain Teams of intelligent agents which learn
using artificial immune systems . . . . 147--159
J. Jarvis and
R. Rönnquist and
D. McFarlane and
L. Jain A team-based holonic approach to robotic
assembly cell control . . . . . . . . . 160--176
Anders I. Mòrch and
Jan A. Dolonen and
Jan Eirik B. Nævdal An evolutionary approach to prototyping
pedagogical agents: from simulation to
integrated system . . . . . . . . . . . 177--199
Weiqin Chen Supporting teachers' intervention in
collaborative knowledge building . . . . 200--215
Anonymous Editorial board . . . . . . . . . . . . CO2
A. A. Akintola and
G. A. Aderounmu and
M. O. Adigun Performance analysis of double buffer
technique (DBT) model for mobility
support in wireless IP networks . . . . 217--234
Shih-Lin Wu and
Sui Fan-Jiang and
Zi-Tsan Chou An efficient quality-of-service MAC
protocol for infrastructure WLANs . . . 235--261
Hea-Sook Park and
Doo-Kwon Baik A study for control of client value
using cluster analysis . . . . . . . . . 262--276
Susanne Loidl Towards pervasive learning:
WeLearn.Mobile. A CPS package viewer for
handhelds . . . . . . . . . . . . . . . 277--293
Peng Liu and
Hai Wang and
Lunquan Li Real-time data attack isolation for
commercial database applications . . . . 294--320
Crescencio Bravo and
Miguel Á. Redondo and
Manuel Ortega and
M. Felisa Verdejo Collaborative distributed environments
for learning design tasks by means of
modelling and simulation . . . . . . . . 321--342
M. Avvenuti and
A. Vecchio Application-level network emulation: the
EmuSocket toolkit . . . . . . . . . . . 343--360
Anonymous Editorial board . . . . . . . . . . . . CO2
Ajith Abraham and
Kate Smith and
Ravi Jain and
Lakhmi Jain Network and information security: a
computational intelligence approach:
Special Issue of Journal of Network and
Computer Applications . . . . . . . . . 1--3
Feng-Hsing Wang and
Lakhmi C. Jain and
Jeng-Shyang Pan VQ-based watermarking scheme with
genetic codebook partition . . . . . . . 4--23
Tai-Wen Yue and
Suchen Chiang The semipublic encryption for visual
cryptography using Q'tron neural
networks . . . . . . . . . . . . . . . . 24--41
Gail-Joon Ahn and
Badrinath Mohan and
Seng-Phil Hong Towards secure information sharing using
role-based delegation . . . . . . . . . 42--59
Yihua Liao and
V. Rao Vemuri and
Alejandro Pasos Adaptive anomaly detection with evolving
connectionist systems . . . . . . . . . 60--80
Ajith Abraham and
Ravi Jain and
Johnson Thomas and
Sang Yong Han D-SCIDS: Distributed soft computing
intrusion detection system . . . . . . . 81--98
Tansel Özyer and
Reda Alhajj and
Ken Barker Intrusion detection by integrating
boosting genetic fuzzy classifier and
data mining criteria for rule
pre-screening . . . . . . . . . . . . . 99--113
Sandhya Peddabachigari and
Ajith Abraham and
Crina Grosan and
Johnson Thomas Modeling intrusion detection system
using hybrid intelligent systems . . . . 114--132
Ali El Kateeb High-speed routers design using data
stream distributor unit . . . . . . . . 133--144
Chen Hongsong and
Ji Zhenzhou and
Hu Mingzeng and
Fu Zhongchuan and
Jiang Ruixiang Design and performance evaluation of a
multi-agent-based dynamic lifetime
security scheme for AODV routing
protocol . . . . . . . . . . . . . . . . 145--166
Khong Neng Choong and
B. M. Ali and
V. Prakash and
Yoke Chek Yee The case for a dynamic proxy framework
with voluntary/incentive-based client
hosting scheme . . . . . . . . . . . . . 167--185
Hojjat Jafarpour and
Nasser Yazdani and
Navid Bazzaz-zadeh A scalable group communication mechanism
for mobile agents . . . . . . . . . . . 186--208
V. Kalogeraki and
D. Zeinalipour-Yazti and
D. Gunopulos and
A. Delis Distributed middleware architectures for
scalable media services . . . . . . . . 209--243
Tainchi Lu and
Chinghao Hsu Mobile agents for information retrieval
in hybrid simulation environment . . . . 244--264
Hui Guo and
Guobin Shen and
Zhiguang Wang and
Shipeng Li Optimized streaming media proxy and its
applications . . . . . . . . . . . . . . 265--281
Lei Guo and
Hongfang Yu and
Lemin Li Dynamic survivable algorithm for meshed
WDM optical networks . . . . . . . . . . 282--295
Jenq-Shiou Leu and
Yuan-Po Chi and
Wei-Kuan Shih Design and implementation of Blog
Rendering and Accessing INstantly system
(BRAINS) . . . . . . . . . . . . . . . . 296--307
Lijun Qian and
Ning Song and
Xiangfang Li Detection of wormhole attacks in
multi-path routed wireless ad hoc
networks: a statistical analysis
approach . . . . . . . . . . . . . . . . 308--330
Kwang Sik Shin and
Jin Ha Jung and
Jin Young Cheon and
Sang Bang Choi Real-time network monitoring scheme
based on SNMP for dynamic information 331--353
Xiaobo Zhou and
Jianbin Wei and
Cheng-Zhong Xu Quality-of-service differentiation on
the Internet: a taxonomy . . . . . . . . 354--383
Suneuy Kim and
Chita R. Das An analytical model for interval caching
in interactive video servers . . . . . . 384--413
M. Saniee Abadeh and
J. Habibi and
C. Lucas Intrusion detection using a fuzzy
genetics-based learning algorithm . . . 414--428
Anonymous Editorial board . . . . . . . . . . . . CO2
Rongxi He and
Bin Lin and
Lemin Li Dynamic service-level-agreement aware
shared-path protection in WDM mesh
networks . . . . . . . . . . . . . . . . 429--444
B. Stephen and
L. Petropoulakis The design and implementation of an
agent-based framework for acceptable
usage policy monitoring and enforcement 445--465
Wang Liang and
Guo Yi-Ping and
Fang Ming Web search engine based on DNS . . . . . 466--478
M. Esteve and
C. E. Palau and
J. Martínez-Nohales and
B. Molina A video streaming application for urban
traffic management . . . . . . . . . . . 479--498
M. Can Filibeli and
Oznur Ozkasap and
M. Reha Civanlar Embedded web server-based home appliance
networks . . . . . . . . . . . . . . . . 499--514
Xiaobo Zhou and
Cheng-Zhong Xu Efficient algorithms of video
replication and placement on a cluster
of streaming servers . . . . . . . . . . 515--540
Kenneth J. Turner Representing and analysing composed web
services using \sc Cress . . . . . . . . 541--562
Bouras Christos and
Kounenis Giorgos and
Misedakis Ioannis A web content manipulation technique
based on page Fragmentation . . . . . . 563--585
Siti Z. Z. Abidin and
Min Chen and
Phil W. Grant Designing interaction protocols using
noughts and crosses type games . . . . . 586--613
Alejandro Quintero and
Da Yu Li and
Harold Castro A location routing protocol based on
smart antennas for ad hoc networks . . . 614--636
Y. Bai and
M. R. Ito A new technique for minimizing network
loss from users' perspective . . . . . . 637--649
Lei Guo and
Jin Cao and
Hongfang Yu and
Lemin Li A new shared-risk link groups
(SRLG)-disjoint path provisioning with
shared protection in WDM optical
networks . . . . . . . . . . . . . . . . 650--661
Chin-Chen Chang and
Chih-Yang Lin and
Keng-Chu Lin Simple efficient mutual anonymity
protocols for peer-to-peer network based
on primitive roots . . . . . . . . . . . 662--676
Jin Cao and
Lei Guo and
Hongfang Yu and
Lemin Li A novel recursive shared segment
protection algorithm in survivable WDM
networks . . . . . . . . . . . . . . . . 677--694
Rongping Lin and
Sheng Wang and
Lemin Li Protections for multicast session in WDM
optical networks under reliability
constraints . . . . . . . . . . . . . . 695--705
Chan-Ho Min and
Sehun Kim On-demand utility-based power control
routing for energy-aware optimization in
mobile ad hoc networks . . . . . . . . . 706--727
Gwo-Jong Yu and
Chih-Yung Chang and
Kuei-Ping Shih and
Shih-Chieh Lee Relay reduction and disjoint routes
construction for scatternet over
Bluetooth radio system . . . . . . . . . 728--749
Kwang-Sik Shin and
Jin-Ha Jung and
Wan-Oh Yoon and
Sang-Bang Choi P2P transfer of partial stream in
multimedia multicast . . . . . . . . . . 750--774
Yiqun Xu and
Luigi Logrippo and
Jacques Sincennes Detecting feature interactions in CPL 775--799
Ibrahim Özçelik and
Hüseyin Ekiz Building an interconnection between
PROFIBUS and ATM networks . . . . . . . 800--817
Anonymous Editorial board . . . . . . . . . . . . CO2
Xiaobo Zhou and
Cheng-Zhong Xu Distributed denial-of-service and
intrusion detection . . . . . . . . . . 819--822
Shigang Chen and
Yong Tang and
Wenliang Du Stateful DDoS attacks and targeted
filtering . . . . . . . . . . . . . . . 823--840
Matthias Bossardt and
Thomas Dübendorfer and
Bernhard Plattner Enhanced Internet security by a
distributed traffic control service
based on traffic ownership . . . . . . . 841--857
Vasilios A. Siris and
Ilias Stavrakis Provider-based deterministic packet
marking against distributed DoS attacks 858--876
Tao Peng and
Christopher Leckie and
Kotagiri Ramamohanarao Information sharing for distributed
intrusion detection systems . . . . . . 877--899
Gabriel López and
Oscar Cánovas and
Antonio F. Gómez and
Jesús D. Jiménez and
Rafael Marín A network access control approach based
on the AAA architecture and
authorization attributes . . . . . . . . 900--919
Celia Li and
Cungang Yang and
Richard Cheung Key management for role hierarchy in
distributed systems . . . . . . . . . . 920--936
Bing Wu and
Jie Wu and
Eduardo B. Fernandez and
Mohammad Ilyas and
Spyros Magliveras Secure and efficient key management in
mobile ad hoc networks . . . . . . . . . 937--954
George D. Magoulas and
George Ghinea Intelligence-based adaptation for
ubiquitous multimedia communications . . 955--957
Dietmar Jannach and
Klaus Leopold Knowledge-based multimedia adaptation
for ubiquitous multimedia consumption 958--982
Nicola Cranley and
Philip Perry and
Liam Murphy Dynamic content-based adaptation of
streamed multimedia . . . . . . . . . . 983--1006
M. J. O'Grady and
G. M. P. O'Hare and
C. Donaghey Delivering adaptivity through
context-awareness . . . . . . . . . . . 1007--1033
Vincent Charvillat and
Romulus Grigoras Reinforcement learning for dynamic
multimedia adaptation . . . . . . . . . 1034--1058
Johan Bollen and
Michael L. Nelson and
Gary Geisler and
Raquel Araujo Usage derived recommendations for a
video digital library . . . . . . . . . 1059--1083
Gloria Phillips-Wren and
Anders Morch and
Jeff Tweedale and
Nikhil Ichalkaranje Innovations in agent collaboration,
cooperation and Teaming, Part 2 . . . . 1085--1088
J. Tweedale and
N. Ichalkaranje and
C. Sioutis and
B. Jarvis and
A. Consoli and
G. Phillips-Wren Innovations in multi-agent systems . . . 1089--1115
Lin Padgham and
Wei Liu Internet collaboration and service
composition as a loose form of teamwork 1116--1135
Antonella Di Stefano and
Giuseppe Pappalardo and
Corrado Santoro and
Emiliano Tramontana A framework for the design and automated
implementation of communication aspects
in multi-agent systems . . . . . . . . . 1136--1152
Wei Xu and
Jiannong Cao and
Beihong Jin and
Jing Li and
Liang Zhang GCS-MA: a group communication system for
mobile agents . . . . . . . . . . . . . 1153--1172
Tom Wanyama and
Behrouz Homayoun Far A protocol for multi-agent negotiation
in a group-choice decision making
process . . . . . . . . . . . . . . . . 1173--1195
Gerhard Weiß and
Matthias Nickles and
Michael Rovatsos and
Felix Fischer Specifying the intertwining of
cooperation and autonomy in agent-based
systems . . . . . . . . . . . . . . . . 1196--1215
Justin Zhan and
Stan Matwin and
LiWu Chang Privacy-preserving collaborative
association rule mining . . . . . . . . 1216--1227
Abdelhamid Ouardani and
Samuel Pierre and
Hanifa Boucheneb A security protocol for mobile agents
based upon the cooperation of sedentary
agents . . . . . . . . . . . . . . . . . 1228--1243
Ruth Aguilar-Ponce and
Ashok Kumar and
J. Luis Tecpanecatl-Xihuitl and
Magdy Bayoumi A network of sensor-based framework for
automated visual surveillance . . . . . 1244--1271
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xiangjian He Editorial . . . . . . . . . . . . . . . 1273--1274
Shinichi Suzuki and
Yasushi Shinjo and
Toshio Hirotsu and
Kozo Itano and
Kazuhiko Kato Capability-based egress network access
control by using DNS server . . . . . . 1275--1282
Yanni Wu and
Kuo Zhang and
Xiaoge Wang and
Jinlan Tian Extending metadata with scenarios in
adaptive distributed system . . . . . . 1283--1294
M. J. Callaghan and
J. Harkin and
E. McColgan and
T. M. McGinnity and
L. P. Maguire Client-server architecture for
collaborative remote experimentation . . 1295--1308
Carolyn McGregor and
Bruce Kneale and
Mark Tracy On-demand Virtual Neonatal Intensive
Care units supporting rural, remote and
urban healthcare with Bush Babies
Broadband . . . . . . . . . . . . . . . 1309--1323
Wenjing Jia and
Huaifeng Zhang and
Xiangjian He Region-based license plate detection . . 1324--1333
Hatice Gunes and
Massimo Piccardi Bi-modal emotion recognition from
expressive face and body gestures . . . 1334--1345
Junjun Xia and
Lin Ni and
Y. Miao A new digital implementation of ridgelet
transform for images of dyadic length 1346--1355
Donn Morrison and
Liyanage C. De Silva Voting ensembles for spoken affect
classification . . . . . . . . . . . . . 1356--1365
Ben-Nian Wang and
Yang Gao and
Zhao-Qian Chen and
Jun-Yuan Xie and
Shi-Fu Chen A two-layered multi-agent reinforcement
learning model and algorithm . . . . . . 1366--1376
Jung-San Lee and
Chin-Chen Chang Secure communications for cluster-based
ad hoc networks using node identities 1377--1396
Christopher J. Martinez and
Wei-Ming Lin and
Parimal Patel Optimal XOR hashing for non-uniformly
distributed address lookup in computer
networks . . . . . . . . . . . . . . . . 1397--1427
Bart Duysburgh and
Thijs Lambrecht and
Filip De Turck and
Bart Dhoedt and
Piet Demeester Design and analysis of a stable set-up
protocol for transcoding multicast trees
in active networks . . . . . . . . . . . 1428--1444
S. A. Al-Talib and
B. M. Ali and
S. Khatun and
S. Subramaniam Improving the multicast state
scalability in Internet routers by
integrating hash algorithm with
recursive unicast . . . . . . . . . . . 1445--1454
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hsu-Yang Kung and
Hao-Hsiang Ku and
Che-I Wu and
Ching-Yu Lin Intelligent and situation-aware
pervasive system to support debris-flow
disaster prediction and alerting in
Taiwan . . . . . . . . . . . . . . . . . 1--18
Mosaab Daoud and
Qusay H. Mahmoud Monte Carlo simulation-based algorithms
for estimating the reliability of mobile
agent-based systems . . . . . . . . . . 19--31
Xiao Qin Performance comparisons of load
balancing algorithms for I/O-intensive
workloads on clusters . . . . . . . . . 32--46
Ming-Tsung Chen and
B. M. T. Lin and
Shian-Shyong Tseng Multicast routing and wavelength
assignment with delay constraints in WDM
networks with heterogeneous capabilities 47--65
Tushar M. Raste and
D. B. Kulkarni Design and implementation scheme for
deploying IPv4 over IPv6 tunnel . . . . 66--72
Anonymous Editorial board . . . . . . . . . . . . CO2
Christos Makris and
Athanasios Tsakalidis Trends in peer to peer and service
oriented computing . . . . . . . . . . . 73--74
Sinuhe Arroyo and
Miguel-Angel Sicilia and
José-Manuel López-Cobo Patterns of message interchange in
decoupled hypermedia systems . . . . . . 75--92
Serena Pastore The service discovery methods issue: a
web services UDDI specification
framework integrated in a grid
environment . . . . . . . . . . . . . . 93--107
Vassiliki Diamadopoulou and
Christos Makris and
Yannis Panagis and
Evangelos Sakkopoulos Techniques to support Web Service
selection and consumption with QoS
characteristics . . . . . . . . . . . . 108--130
K. Votis and
C. Alexakos and
B. Vassiliadis and
S. Likothanassis An ontologically principled
service-oriented architecture for
managing distributed e-government nodes 131--148
S. Sioutas and
E. Sakkopoulos and
L. Drossos and
S. Sirmakessis Balanced distributed web service lookup
system . . . . . . . . . . . . . . . . . 149--162
Sampath N. Ranasinghe and
Vasilis Friderikos and
Hamid Aghvami Dynamic proxy assisted mobility support
for third generation peer-to-peer
networks . . . . . . . . . . . . . . . . 163--178
Dimitris N. Kanellopoulos and
Alkiviadis A. Panagopoulos Exploiting tourism destinations'
knowledge in an RDF-based P2P network 179--200
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gwo-Jong Yu and
Chih-Yung Chang Congestion control of Bluetooth radio
system by piconet restructuring . . . . 201--223
Dhouha Ayed and
Chantal Taconet and
Guy Bernard and
Yolande Berbers CADeComp: Context-aware deployment of
component-based applications . . . . . . 224--257
Li Chunlin and
Li Layuan Cross-layer optimization policy for QoS
scheduling in computational grid . . . . 258--284
Lin Chen and
Changjun Jiang and
Junjie Li VGITS: ITS based on intervehicle
communication networks and grid
technology . . . . . . . . . . . . . . . 285--302
Luhua Liao and
Lemin Li and
Sheng Wang Multicast protection scheme in
survivable WDM optical networks . . . . 303--316
James Lembke and
Byung Kyu Choi Edge-limited scalable QoS flow set-up 317--337
Ferhat Khendek and
Tong Zheng Modeling and analysis of value added
services using message sequence charts 338--356
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Javier Varona and
Cristina Manresa-Yee and
Francisco J. Perales Hands-free vision-based interface for
computer accessibility . . . . . . . . . 357--374
Hongjun Liu and
Ping Luo and
Daoshun Wang A scalable authentication model based on
public keys . . . . . . . . . . . . . . 375--386
Wen-Hwa Liao and
Yucheng Kao and
Chien-Ming Fan Data aggregation in wireless sensor
networks using ant colony algorithm . . 387--401
Vidhyacharan Bhaskar and
Patrick Lallement Activity routing in a distributed supply
chain: Performance evaluation with two
inputs . . . . . . . . . . . . . . . . . 402--428
Bing Zheng and
Mohammed Atiquzzaman A framework to determine bounds of
maximum loss rate parameter of RED queue
for next generation routers . . . . . . 429--445
K. Komathy and
P. Narayanasamy Trust-based evolutionary game model
assisting AODV routing against
selfishness . . . . . . . . . . . . . . 446--471
Hongjun Liu and
Ping Luo and
Daoshun Wang A distributed expansible authentication
model based on Kerberos . . . . . . . . 472--486
Carles Garrigues and
Sergi Robles and
Joan Borrell Securing dynamic itineraries for mobile
agent applications . . . . . . . . . . . 487--508
Haidar Safa and
Mohamad Chouman and
Hassan Artail and
Marcel Karam A collaborative defense mechanism
against SYN flooding attacks in IP
networks . . . . . . . . . . . . . . . . 509--534
Prasan Kumar Sahoo and
Chih-Yung Chang and
Sheng-Wen Chang Novel route maintenance protocols for
the Bluetooth ad hoc network with
mobility . . . . . . . . . . . . . . . . 535--558
Weili Han and
Xingdong Shi and
Ronghua Chen Process-context aware matchmaking for
web service composition . . . . . . . . 559--576
G. Varaprasad and
R. S. D. Wahidabanu and
P. Venkataram An efficient resource allocation scheme
for multimedia applications in MANET . . 577--584
Eric Gamess and
Rina Surós An upper bound model for TCP and UDP
throughput in IPv4 and IPv6 . . . . . . 585--602
Yiouli Kritikou and
Panagiotis Demestichas and
Evgenia Adamopoulou and
Konstantinos Demestichas and
Michael Theologou and
Maria Paradia User Profile Modeling in the context of
web-based learning management systems 603--627
Venet Osmani and
Sasitharan Balasubramaniam and
Dmitri Botvich Human activity recognition in pervasive
health-care: Supporting efficient remote
collaboration . . . . . . . . . . . . . 628--655
P. Khadivi and
S. Samavi and
T. D. Todd Multi-constraint QoS routing using a new
single mixed metrics . . . . . . . . . . 656--676
Beatriz Prieto and
Fernando Tricas and
Juan J. Merelo and
Antonio Mora and
Alberto Prieto Visualizing the evolution of a web-based
social network . . . . . . . . . . . . . 677--698
Mouhammd Al-Kasassbeh and
Mo Adda Analysis of mobile agents in network
fault management . . . . . . . . . . . . 699--711
Janus S. Liang The troubleshooting task implementation
in automotive chassis using virtual
interactive technique and
knowledge-based approach . . . . . . . . 712--734
Xiang-Yang Wang and
Pan-Pan Niu and
Wei Qi A new adaptive digital audio
watermarking based on support vector
machine . . . . . . . . . . . . . . . . 735--749
Hussein Abdel-Jaber and
Mike Woodward and
Fadi Thabtah and
Amer Abu-Ali Performance evaluation for DRED
discrete-time queueing network
analytical model . . . . . . . . . . . . 750--770
Y. C. Yee and
K. N. Choong and
Andy L. Y. Low and
S. W. Tan SIP-based proactive and adaptive
mobility management framework for
heterogeneous networks . . . . . . . . . 771--792
Juan J. Samper and
Pedro A. Castillo and
Lourdes Araujo and
J. J. Merelo and
Óscar Cordón and
Fernando Tricas NectaRSS, an intelligent RSS feed reader 793--806
Wen-Hwa Liao and
Hsiao-Hsien Wang An asynchronous MAC protocol for
wireless sensor networks . . . . . . . . 807--820
Jianjun Zhang and
Ling Liu and
Lakshmish Ramaswamy and
Calton Pu PeerCast: Churn-resilient end system
multicast on heterogeneous overlay
networks . . . . . . . . . . . . . . . . 821--850
Kazuya Odagiri and
Rihito Yaegashi and
Masaharu Tadauchi and
Naohiro Ishii Secure DACS Scheme . . . . . . . . . . . 851--861
Javed I. Khan and
Sajid S. Shaikh Computing in social networks with
relationship algebra . . . . . . . . . . 862--878
Ibrahim Ozcelik Interconnection of CAN segments through
IEEE 802.16 wireless MAN . . . . . . . . 879--890
Bhuvan Urgaonkar and
Prashant Shenoy Cataclysm: Scalable overload policing
for Internet applications . . . . . . . 891--920
K. Salah and
P. Calyam and
M. I. Buhari Assessing readiness of IP networks to
support desktop videoconferencing using
OPNET . . . . . . . . . . . . . . . . . 921--943
Haibin Cai and
Fang Pu and
Runcai Huang and
Qiying Cao A novel ANN-based service selection
model for ubiquitous computing
environments . . . . . . . . . . . . . . 944--965
Eleni Georgiou and
Marios D. Dikaiakos and
Athena Stassopoulou On the properties of spam-advertised URL
addresses . . . . . . . . . . . . . . . 966--985
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tzu-Chi Huang and
Ce-Kuen Shieh and
Yu-Ben Miao Bottleneck Active Node Detouring for
capsule-based active network . . . . . . 1--30
Xiaohong Guan and
Wei Wang and
Xiangliang Zhang Fast intrusion detection based on a
non-negative matrix factorization model 31--44
Di Wu and
Ye Tian and
Kam-Wing Ng Resilient and efficient load balancing
in distributed hash tables . . . . . . . 45--60
JungYul Choi and
Jaebong Lee and
ShinJung Woo and
ByoungKwon Shim An engineering approach to the design of
a BcN control network . . . . . . . . . 61--77
Pete Davies and
Theodore Tryfonas A lightweight web-based vulnerability
scanner for small-scale computer network
security assessment . . . . . . . . . . 78--95
Hassan Artail and
Manal Shihab and
Haidar Safa A distributed mobile database
implementation on Pocket PC mobile
devices communicating over Bluetooth . . 96--115
Konstantinos P. Demestichas and
Evgenia F. Adamopoulou and
John G. Markoulidakis and
Michael E. Theologou Towards Anonymous Mobile Community
services . . . . . . . . . . . . . . . . 116--134
Giancarlo Fortino and
Carlo Mastroianni and
Wilma Russo A hierarchical control protocol for
group-oriented playbacks supported by
content distribution networks . . . . . 135--157
Meng Yu and
Peng Liu and
Wanyu Zang The implementation and evaluation of a
recovery system for workflows . . . . . 158--183
Wade A. Fagen and
João W. Cangussu and
Ram Dantu A virtual environment for network
testing . . . . . . . . . . . . . . . . 184--214
Chryssa A. Papagianni and
Nikolaos D. Tselikas and
Evangelos A. Kosmatos and
Stauros Papapanagiotou and
Iakovos S. Venieris Performance evaluation study for
QoS-aware triple play services over
entry-level xDSL connections . . . . . . 215--225
Chin-Chen Chang and
Jung-San Lee Robust $t$-out-of-$n$ oblivious transfer
mechanism based on CRT . . . . . . . . . 226--235
Muhammad N. Marsono and
M. Watheq El-Kharashi and
Fayez Gebali A spam rejection scheme during SMTP
sessions based on layer-3 e-mail
classification . . . . . . . . . . . . . 236--257
Hua Wang and
Zhao Shi and
Shuai Li Multicast routing for delay variation
bound using a modified ant colony
algorithm . . . . . . . . . . . . . . . 258--272
Yuh-Shyan Chen and
Yun-Wei Lin and
Chih-Yung Chang An overlapping communication protocol
using improved time-slot leasing for
Bluetooth WPANs . . . . . . . . . . . . 273--292
Francisco Almeida and
Vicente Blanco and
Carlos Delgado and
Francisco de Sande and
Adrián Santos IDEWEP: Web service for astronomical
parallel image deconvolution . . . . . . 293--313
D. Di Sorte and
M. Femminella and
G. Reali QoS-enabled multicast for delivering
live events in a Digital Cinema scenario 314--344
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Wanlei Zhou and
Yang Xiang Network and system security . . . . . . 345--346
Chuan Yue and
Haining Wang Profit-aware overload protection in
E-commerce Web sites . . . . . . . . . . 347--356
Md Rafiqul Islam and
Wanlei Zhou and
Minyi Guo and
Yang Xiang An innovative analyser for
multi-classifier e-mail classification
based on grey list analysis . . . . . . 357--366
Wei-Zhou Lu and
Wei-Xuan Gu and
Shun-Zheng Yu One-way queuing delay measurement and
its application on detecting DDoS attack 367--376
Bai Li and
Lynn Batten Using mobile agents to recover from node
and database compromise in path-based
DoS attacks in wireless sensor networks 377--387
Suriadi Suriadi and
Ernest Foo and
Audun Jòsang A user-centric federated single sign-on
system . . . . . . . . . . . . . . . . . 388--401
Deqing Zou and
Ligang He and
Hai Jin and
Xueguang Chen CRBAC: Imposing multi-grained
constraints on the RBAC model in the
multi-application environment . . . . . 402--411
Jian Cao and
Jinjun Chen and
Haiyan Zhao and
Minglu Li A policy-based authorization model for
workflow-enabled dynamic process
management . . . . . . . . . . . . . . . 412--422
Wenyu Qu and
Masaru Kitsuregawa and
Hong Shen and
Zhiguang Shan A novel fault-tolerant execution model
by using of mobile agents . . . . . . . 423--432
Muhammad Younas and
Irfan Awan and
Laurence T. Yang Special issue on service oriented
computing and advanced network
applications . . . . . . . . . . . . . . 433
Agustinus Borgy Waluyo and
David Taniar and
Wenny Rahayu and
Bala Srinivasan Mobile service oriented architectures
for NN-queries . . . . . . . . . . . . . 434--447
Arjan Durresi and
Vamsi Paruchuri and
Leonard Barolli Fast autonomous system traceback . . . . 448--454
D. R. W. Holton and
I. Nafea and
M. Younas and
I. Awan A class-based scheme for E-commerce web
servers: Formal specification and
performance evaluation . . . . . . . . . 455--460
I. Al-Oqily and
A. Karmouch Towards automating overlay network
management . . . . . . . . . . . . . . . 461--473
M. Lozano and
P. Morillo and
J. M. Orduña and
V. Cavero and
G. Vigueras A new system architecture for crowd
simulation . . . . . . . . . . . . . . . 474--482
Yan Zhang and
Laurence T. Yang and
Jianhua Ma and
Jun Zheng Quantitative analysis of location
management and QoS in wireless networks 483--489
Mieso K. Denko and
Elhadi Shakshuki and
Haroon Malik Enhanced cross-layer based middleware
for mobile ad hoc networks . . . . . . . 490--499
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mostafa Abd-El-Barr Topological network design: a survey . . 501--509
Byoung-Dai Lee and
Jon B. Weissman and
Young-Kwang Nam Adaptive middleware supporting scalable
performance for high-end network
services . . . . . . . . . . . . . . . . 510--524
Chunlin Li and
Layuan Li Three-layer control policy for grid
resource management . . . . . . . . . . 525--537
Yuh-Jzer Joung and
Chu-Jui Yang Email licensing . . . . . . . . . . . . 538--549
Selim Ciraci and
Ibrahim Körpeo\ugu and
Özgür Ulusoy Reducing query overhead through route
learning in unstructured peer-to-peer
network . . . . . . . . . . . . . . . . 550--567
Songtao Guo and
Gang Feng and
Xiaofeng Liao and
Qun Liu Novel delay-range-dependent stability
analysis of the second-order congestion
control algorithm with heterogeneous
communication delays . . . . . . . . . . 568--577
Eric Jui-Lin Lu and
Yung-Fa Huang and
Shu-Chiu Lu ML-Chord: a multi-layered P2P resource
sharing model . . . . . . . . . . . . . 578--588
Shi-Jen Lin and
Ding-Chyu Liu An incentive-based electronic payment
scheme for digital content transactions
over the Internet . . . . . . . . . . . 589--598
Thomas E. Carroll and
Daniel Grosu A secure and anonymous voter-controlled
election scheme . . . . . . . . . . . . 599--606
Y. Tachwali and
W. J. Barnes and
H. Refai Configurable symbol synchronizers for
software-defined radio applications . . 607--615
I-Ching Hsu and
Li-Pin Chi and
Sheau-Shong Bor A platform for transcoding heterogeneous
markup documents using ontology-based
metadata . . . . . . . . . . . . . . . . 616--629
Konstantinos Samdanis and
Vasilis Friderikos and
A. Hamid Aghvami Autonomic hierarchical reconfiguration
for wireless access networks . . . . . . 630--641
Li Ou and
Xubin He and
Jizhong Han An efficient design for fast memory
registration in RDMA . . . . . . . . . . 642--651
Jenn-Hwan Tarng and
Bing-Wen Chuang and
Pei-Chen Liu A relay node deployment method for
disconnected wireless sensor networks:
Applied in indoor environments . . . . . 652--659
Satish Chand and
Bijendra Kumar and
Hari Om Video Data Delivery using Slotted
Patching . . . . . . . . . . . . . . . . 660--665
Oznur Ozkasap and
Mine Caglar and
Ali Alagoz Principles and performance analysis of
SeCond: a system for epidemic
peer-to-peer content distribution . . . 666--683
Lambros Boukas and
Georgios Kambourakis and
Stefanos Gritzalis Pandora: an SMS-oriented m-informational
system for educational realms . . . . . 684--702
Babek Abbasov and
Serdar Korukoglu Effective RED: an algorithm to improve
RED's performance by reducing packet
loss rate . . . . . . . . . . . . . . . 703--709
Zonghua Zhang and
Pin-Han Ho Janus: a dual-purpose analytical model
for understanding, characterizing and
countermining multi-stage collusive
attacks in enterprise networks . . . . . 710--720
Li Feng and
Wei Wang and
Lina Zhu and
Yi Zhang Predicting intrusion goal using dynamic
Bayesian network with transfer
probability estimation . . . . . . . . . 721--732
Mohammad Hamed Firooz and
Alireza Nasiri Avanaki and
Mohammad Reza Pakravan and
Keivan Ronasi A fast and reliable multi-sender
algorithm for peer-to-peer networks . . 733--740
Tzu-Chi Huang and
Sherali Zeadally and
Naveen Chilamkurti and
Ce-Kuen Shieh Design, implementation, and evaluation
of a Programmable Bandwidth Aggregation
System for home networks . . . . . . . . 741--759
Li Chunlin and
Zhong Jin Xiu and
Li Layuan Resource scheduling with conflicting
objectives in grid environments: Model
and evaluation . . . . . . . . . . . . . 760--769
J. H. Abawajy Adaptive hierarchical scheduling policy
for enterprise grid computing systems 770--779
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Li Feng and
Zili Li and
Yi Zhang Security bootstrap model of key
pre-sharing by polynomial group in
mobile Ad Hoc Network . . . . . . . . . 781--787
Jiankun Hu and
Fengling Han A pixel-based scrambling scheme for
digital medical images protection . . . 788--794
C. Bouras and
E. Giannaka and
Thrasyvoulos Tsiatsos Identifying best practices for
supporting broadband growth: Methodology
and analysis . . . . . . . . . . . . . . 795--807
Manuel Sánchez and
Gabriel López and
Óscar Cánovas and
Antonio F. Gómez-Skarmeta Performance analysis of a cross-layer
SSO mechanism for a roaming
infrastructure . . . . . . . . . . . . . 808--823
Mouhammd Al-Kasassbeh and
Mo Adda Network fault detection with Wiener
filter-based agent . . . . . . . . . . . 824--833
Chao-Tung Yang and
Ming-Feng Yang and
Wen-Chung Chiang Enhancement of anticipative recursively
adjusting mechanism for redundant
parallel file transfer in data grids . . 834--845
Sergio Ilarri and
Eduardo Mena and
Arantza Illarramendi A system based on mobile agents to test
mobile computing applications . . . . . 846--865
Kuei-Ping Shih and
Hung-Chang Chen and
Chien-Min Chou and
Bo-Jun Liu On target coverage in wireless
heterogeneous sensor networks with
multiple sensing units . . . . . . . . . 866--877
Prasan Kumar Sahoo and
Jang-Ping Sheu and
Yu-Chia Chang Performance evaluation of wireless
sensor network with hybrid channel
access mechanism . . . . . . . . . . . . 878--888
Dan Wu and
Chi Hong Cheong and
Man Hon Wong Supporting asynchronous update for
distributed data cubes . . . . . . . . . 889--900
Jiaming Li and
Chai Kiat Yeo Content and overlay-aware scheduling for
peer-to-peer streaming in fluctuating
networks . . . . . . . . . . . . . . . . 901--912
Javed I. Khan and
Sajid S. Shaikh A phenotype reputation estimation
function and its study of resilience to
social attacks . . . . . . . . . . . . . 913--924
Robert L. R. Mattson and
Somnath Ghosh HTTP-MPLEX: an enhanced hypertext
transfer protocol and its performance
evaluation . . . . . . . . . . . . . . . 925--939
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Giancarlo Fortino and
Carlo Mastroianni Next generation content networks . . . . 941--942
Jayashree Ravi and
Zhifeng Yu and
Weisong Shi A survey on dynamic Web content
generation and delivery techniques . . . 943--960
Gilles Fedak and
Haiwu He and
Franck Cappello BitDew: a data management and
distribution service with multi-protocol
file transfer and metadata abstraction 961--975
Mukaddim Pathan and
Rajkumar Buyya Resource discovery and
request-redirection for dynamic load
sharing in multi-provider peering
content delivery networks . . . . . . . 976--990
Jaime Lloret and
Miguel Garcia and
Diana Bri and
Juan R. Diaz Study and performance of a group-based
Content Delivery Network . . . . . . . . 991--999
Benjamin Molina and
Salvatore F. Pileggi and
Manuel Esteve and
Carlos E. Palau A negotiation framework for content
distribution in mobile transient
networks . . . . . . . . . . . . . . . . 1000--1011
James Broberg and
Rajkumar Buyya and
Zahir Tari MetaCDN: Harnessing `Storage Clouds' for
high performance content delivery . . . 1012--1022
Ying-Dar Lin and
Chun-Nan Lu and
Yuan-Cheng Lai and
Wei-Hao Peng and
Po-Ching Lin Application classification using packet
size distribution and port association 1023--1030
Ling Wang and
Yahia Tachwali and
Pramode Verma and
Anjan Ghosh Impact of bounded delay on throughput in
multi-hop networks . . . . . . . . . . . 1031--1038
K. Salah and
M. Hamawi Comparative packet-forwarding
measurement of three popular operating
systems . . . . . . . . . . . . . . . . 1039--1048
Behnoosh Hariri and
Shervin Shirmohammadi and
Mohammad Reza Pakravan and
Mohammad Hossein Alavi An adaptive latency mitigation scheme
for massively multiuser virtual
environments . . . . . . . . . . . . . . 1049--1063
Yuhui Deng Deconstructing Network Attached Storage
systems . . . . . . . . . . . . . . . . 1064--1072
Fang-Yie Leu A novel network mobility handoff scheme
using SIP and SCTP for multimedia
applications . . . . . . . . . . . . . . 1073--1091
Iván Martínez-Ortiz and
José-Luis Sierra and
Baltasar Fernández-Manjón and
Alfredo Fernández-Valmayor Language engineering techniques for the
development of e-learning applications 1092--1105
Chenfeng Vincent Zhou and
Christopher Leckie and
Shanika Karunasekera Decentralized multi-dimensional alert
correlation for collaborative intrusion
detection . . . . . . . . . . . . . . . 1106--1123
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Tarique and
Kemal E. Tepe and
Sasan Adibi and
Shervin Erfani Survey of multipath routing protocols
for mobile ad hoc networks . . . . . . . 1125--1143
Wen-Hwa Liao and
Wen-Ming Yen Power-saving scheduling with a QoS
guarantee in a mobile WiMAX system . . . 1144--1152
Neng-Chung Wang and
Chao-Yang Lee A reliable QoS aware routing protocol
with slot assignment for mobile ad hoc
networks . . . . . . . . . . . . . . . . 1153--1166
R. Martí and
S. Robles and
A. Martín-Campillo and
J. Cucurull Providing early resource allocation
during emergencies: the mobile triage
tag . . . . . . . . . . . . . . . . . . 1167--1182
Mohamed K. Watfa and
Omar Mirza and
Jad Kawtharani BARC: a Battery Aware Reliable
Clustering algorithm for sensor networks 1183--1193
Martín López-Nores and
Jorge García-Duque and
José J. Pazos-Arias and
Yolanda Blanco-Fernández and
Manuel Ramos-Cabrer and
Alberto Gil-Solla and
Rebeca P. Díaz-Redondo and
Ana Fernández-Vilas KEPPAN: Knowledge exploitation for
proactively-planned ad-hoc networks . . 1194--1209
Cuneyt Bayilmis and
Ersoy Kelebekler and
Ismail Erturk and
Celal Ceken and
Ibrahim Ozcelik Integration of a speech activated
control system and a wireless
interworking unit for a CAN-based
distributed application . . . . . . . . 1210--1218
Xuan Dau Hoang and
Jiankun Hu and
Peter Bertok A program-based anomaly intrusion
detection scheme using multiple
detection engines and fuzzy inference 1219--1228
Chien-Chih Lai and
Ren-Guey Lee and
Chun-Chieh Hsiao and
Hsin-Sheng Liu and
Chun-Chang Chen A H-QoS-demand personalized home
physiological monitoring system over a
wireless multi-hop relay network for
mobile home healthcare applications . . 1229--1241
Bruno Van Den Bossche and
Bart De Vleeschauwer and
Tom Verdickt and
Filip De Turck and
Bart Dhoedt and
Piet Demeester Autonomic microcell assignment in
massively distributed online virtual
environments . . . . . . . . . . . . . . 1242--1256
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Ta Li and
Min-Shiang Hwang An efficient biometrics-based remote
user authentication scheme using smart
cards . . . . . . . . . . . . . . . . . 1--5
K. Salah and
A. Kahtani Performance evaluation comparison of
Snort NIDS under Linux and Windows
Server . . . . . . . . . . . . . . . . . 6--15
Giorgos Karopoulos and
Georgios Kambourakis and
Stefanos Gritzalis and
Elisavet Konstantinou A framework for identity privacy in SIP 16--28
Jianhong Zhang and
Chenglian Liu and
Yixian Yang An efficient secure proxy verifiably
encrypted signature scheme . . . . . . . 29--34
Nader Mohamed and
Jameela Al-Jaroodi Self-configured
multiple-network-interface socket . . . 35--42
Ming-Wen Tong and
Zong-Kai Yang and
Qing-Tang Liu A novel model of adaptation
decision-taking engine in multimedia
adaptation . . . . . . . . . . . . . . . 43--49
Youtao Zhang and
Jun Yang and
Weijia Li and
Linzhang Wang and
Lingling Jin An authentication scheme for locating
compromised sensor nodes in WSNs . . . . 50--62
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Junqi Zhang and
Vijay Varadharajan Wireless sensor network key management
survey and taxonomy . . . . . . . . . . 63--75
Weili Han and
Min Xu and
Weidong Zhao and
Guofu Li A trusted decentralized access control
framework for the client/server
architecture . . . . . . . . . . . . . . 76--83
Matthias Strobbe and
Olivier Van Laere and
Samuel Dauwe and
Bart Dhoedt and
Filip De Turck and
Piet Demeester and
Christof van Nimwegen and
Jeroen Vanattenhoven Interest based selection of user
generated content for rich communication
services . . . . . . . . . . . . . . . . 84--97
Cheng-Fu Chou and
William C. Cheng and
Leana Golubchik Performance study of online batch-based
digital signature schemes . . . . . . . 98--114
Ming Xu and
Shuigeng Zhou and
Jihong Guan and
Xiaohua Hu A path-traceable query routing mechanism
for search in unstructured peer-to-peer
networks . . . . . . . . . . . . . . . . 115--127
Eduardo Moschetta and
Rodolfo S. Antunes and
Marinho P. Barcellos Flexible and secure service discovery in
ubiquitous computing . . . . . . . . . . 128--140
Jenn-Wei Lin and
Wei-Shou Wang An efficient reconstruction approach for
improving Bluetree scatternet formation
in personal area networks . . . . . . . 141--155
Ming-Yang Su Discovery and prevention of attack
episodes by frequent episodes mining and
finite state machines . . . . . . . . . 156--167
Haidar Safa and
Hassan Artail and
Mirna Nahhas A cache invalidation strategy for mobile
networks . . . . . . . . . . . . . . . . 168--182
Yuh-Jzer Joung and
Zhang-Wen Lin On the self-organization of a hybrid
peer-to-peer system . . . . . . . . . . 183--202
Anonymous Special Issue of Journal of Network and
Computer Applications on ``Dependable
Multimedia Communications: Systems,
Services, and Applications'' . . . . . . 203
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Khurram Khan and
Mohamed Kamel and
Xudong Jiang Special issue on: Recent advances and
future directions in biometrics personal
identification . . . . . . . . . . . . . 205--206
Peng Li and
Xin Yang and
Kai Cao and
Xunqiang Tao and
Ruifang Wang and
Jie Tian An alignment-free fingerprint
cryptosystem based on fuzzy vault scheme 207--220
Eryun Liu and
Jimin Liang and
Liaojun Pang and
Min Xie and
Jie Tian Minutiae and modified Biocode fusion for
fingerprint-based key generation . . . . 221--235
Chulhan Lee and
Jaihie Kim Cancelable fingerprint templates using
minutiae-based bit-strings . . . . . . . 236--246
Miao Qi and
Yinghua Lu and
Ning Du and
Yinan Zhang and
Chengxi Wang and
Jun Kong A novel image hiding approach based on
correlation analysis for secure
multimodal biometrics . . . . . . . . . 247--257
Kai Cao and
Xin Yang and
Xunqiang Tao and
Peng Li and
Yali Zang and
Jie Tian Combining features for distorted
fingerprint matching . . . . . . . . . . 258--267
Neyire Deniz Sarier Improving the accuracy and storage cost
in biometric remote authentication
schemes . . . . . . . . . . . . . . . . 268--274
Zhi Liu and
Yilong Yin and
Hongjun Wang and
Shangling Song and
Qingli Li Finger vein recognition with manifold
learning . . . . . . . . . . . . . . . . 275--282
Dong-Ju Kim and
Jeong-Hoon Shin and
Kwang-Seok Hong Teeth recognition based on multiple
attempts in mobile device . . . . . . . 283--292
David Delgado-Gómez and
Federico Sukno and
David Aguado and
Carlos Santacruz and
Antonio Artés-Rodriguez Individual identification using
personality traits . . . . . . . . . . . 293--299
Hunny Mehrotra and
Banshidhar Majhi and
Phalguni Gupta Robust iris indexing scheme using
geometric hashing of SIFT keypoints . . 300--313
Jian-Gang Wang and
Eric Sung and
Wei-Yun Yau Incremental two-dimensional linear
discriminant analysis with applications
to face recognition . . . . . . . . . . 314--322
Jianzhong Wang and
Baoxue Zhang and
Shuyan Wang and
Miao Qi and
Jun Kong An adaptively weighted sub-pattern
locality preserving projection for face
recognition . . . . . . . . . . . . . . 323--332
Kumiko Yasuda and
Daigo Muramatsu and
Satoshi Shirato and
Takashi Matsumoto Visual-based online signature
verification using features extracted
from video . . . . . . . . . . . . . . . 333--341
Siraj A. Shaikh and
Joseph R. Rabaiotti Characteristic trade-offs in designing
large-scale biometric-based identity
management systems . . . . . . . . . . . 342--351
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chung-Nan Lee and
Yung-Cheng Kao and
Ming-Te Tsai A vEB-tree-based architecture for
interactive video on demand services in
peer-to-peer networks . . . . . . . . . 353--362
Neelofer Tamboli and
Mohamed Younis Coverage-aware connectivity restoration
in mobile sensor networks . . . . . . . 363--374
Leo Carro-Calvo and
Sancho Salcedo-Sanz and
Jose A. Portilla-Figueras and
E. G. Ortiz-García A genetic algorithm with switch-device
encoding for optimal partition of
switched industrial Ethernet networks 375--382
Lei Wang and
Ruizhong Wei and
Yaping Lin and
Bo Wang A clique base node scheduling method for
wireless sensor networks . . . . . . . . 383--396
Feng Zhong and
Chai Kiat Yeo and
Bu Sung Lee Enabling inter-PMIPv6-domain handover
with traffic distributors . . . . . . . 397--409
Christos Bouras and
Vassilis Poulopoulos and
Vassilis Tsogkas Adaptation of RSS feeds based on the
user profile and on the end device . . . 410--421
Yuwang Yang and
Chunshan Zhong and
Yamin Sun and
Jingyu Yang Network coding based reliable disjoint
and braided multipath routing for sensor
networks . . . . . . . . . . . . . . . . 422--432
Arthur Callado and
Judith Kelner and
Djamel Sadok and
Carlos Alberto Kamienski and
Stênio Fernandes Better network traffic identification
through the independent combination of
techniques . . . . . . . . . . . . . . . 433--446
D. González-Ortega and
F. J. Díaz-Pernas and
M. Martínez-Zarzuela and
M. Antón-Rodríguez and
J. F. Díez-Higuera and
D. Boto-Giralda Real-time hands, face and facial
features detection and tracking:
Application to cognitive rehabilitation
tests monitoring . . . . . . . . . . . . 447--466
Chih-Peng Lin and
Jenhui Chen and
Hsing-Lung Chen An efficient bandwidth allocation
algorithm for real-time VBR stream
transmission under IEEE 802.16 wireless
networks . . . . . . . . . . . . . . . . 467--476
Javad Akbari Torkestani and
Mohammad Reza Meybodi An efficient cluster-based CDMA/TDMA
scheme for wireless mobile ad-hoc
networks: a learning automata approach 477--490
Abdun Naser Mahmood and
Jiankun Hu and
Zahir Tari and
Christopher Leckie Critical infrastructure protection:
Resource efficient sampling to improve
detection of less frequent patterns in
network traffic . . . . . . . . . . . . 491--502
Henrique S. L. Pequeno and
George A. M. Gomes and
Rossana M. C. Andrade and
José N. de Souza and
Miguel F. de Castro FrameIDTV: a framework for developing
interactive applications on digital
television environments . . . . . . . . 503--511
Hui Cheng and
Xingwei Wang and
Shengxiang Yang and
Min Huang and
Jiannong Cao QoS multicast tree construction in
IP/DWDM optical Internet by bio-inspired
algorithms . . . . . . . . . . . . . . . 512--522
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jameela Al-Jaroodi and
Nader Mohamed Middleware trends for network
applications . . . . . . . . . . . . . . 523--524
C. Boldrini and
M. Conti and
F. Delmastro and
A. Passarella Context- and social-aware middleware for
opportunistic networks . . . . . . . . . 525--541
Praveen Madiraju and
Srilaxmi Malladi and
Janaka Balasooriya and
Arthi Hariharan and
Sushil K. Prasad and
Anu Bourgeois A methodology for engineering
collaborative and ad-hoc mobile
applications using SyD middleware . . . 542--555
Jordi Pujol-Ahulló and
Pedro García-López Enabling portability in advanced
information-centric services over
structured peer-to-peer systems . . . . 556--568
Bruno P. S. Rocha and
Daniel N. O. Costa and
Rande A. Moreira and
Cristiano G. Rezende and
Antonio A. F. Loureiro and
Azzedine Boukerche Adaptive security protocol selection for
mobile computing . . . . . . . . . . . . 569--587
Pedro García López and
Raúl Gracia Tinedo and
Josep M. Banús Alsina Moving routing protocols to the user
space in MANET middleware . . . . . . . 588--602
Víctor Manuel Álvarez García and
María del Puerto Paule Ruiz and
Juan Ramón Pérez Pérez Voice interactive classroom, a
service-oriented software architecture
for speech-enabled learning . . . . . . 603--610
Yasser Gadallah and
Mohamed Adel Serhani and
Nader Mohamed Middleware support for service discovery
in special operations mobile ad hoc
networks . . . . . . . . . . . . . . . . 611--619
Cheng Bo and
Zhang Yang and
Zhou Peng and
Duan Hua and
Hu Xiaoxiao and
Wang Zheng and
Chen Junliang Development of Web-Telecom based hybrid
services orchestration and execution
middleware over convergence networks . . 620--630
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jason J. Jung and
Chung-Ming Ou and
Ngoc Thanh Nguyen and
Chong Gun Kim Advances on agent-based network
management . . . . . . . . . . . . . . . 631--632
Bo Chen Agent-based artificial immune system
approach for adaptive damage detection
in monitoring networks . . . . . . . . . 633--645
Mary Wu and
ChongGun Kim A cost matrix agent for shortest path
routing in ad hoc networks . . . . . . . 646--652
Pradeep Ray and
N. Parameswaran and
Lundy Lewis Distributed autonomic management: an
approach and experiment towards managing
service-centric networks . . . . . . . . 653--660
S. Venkatesan and
C. Chellappan and
T. Vengattaraman and
P. Dhavachelvan and
Anurika Vaish Advanced mobile agent security models
for code integrity and malicious
availability check . . . . . . . . . . . 661--671
Yao-Tien Wang A dynamic resource management in mobile
agent by artificial neural network . . . 672--681
Yue-Shan Chang and
Pei-Chun Shih A resource-awareness information
extraction architecture on mobile grid
environment . . . . . . . . . . . . . . 682--695
Umar Manzoor and
Samia Nefti QUIET: a Methodology for Autonomous
Software Deployment using Mobile Agents 696--706
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
S. Subashini and
V. Kavitha A survey on security issues in service
delivery models of cloud computing . . . 1--11
Dai-Rui Lin and
Chih-I Wang and
D. J. Guan Efficient vehicle ownership
identification scheme based on
triple-trapdoor chameleon hash function 12--19
Sireesha Muppala and
Xiaobo Zhou Coordinated session-based admission
control with statistical learning for
multi-tier Internet applications . . . . 20--29
Neeraj Kumar and
Manoj Kumar and
R. B. Patel Capacity and interference aware link
scheduling with channel assignment in
wireless mesh networks . . . . . . . . . 30--38
Marcela Mejia and
Néstor Peña and
Jose L. Muñoz and
Oscar Esparza and
Marco A. Alzate A game theoretic trust model for on-line
distributed evolution of cooperation in
MANETs . . . . . . . . . . . . . . . . . 39--51
Sanaa Sharafeddine and
Rakan Maddah A lightweight adaptive compression
scheme for energy-efficient
mobile-to-mobile file sharing
applications . . . . . . . . . . . . . . 52--61
Sanaa Sharafeddine Capacity assignment in multiservice
packet networks with soft maximum
waiting time guarantees . . . . . . . . 62--72
Xiong Li and
Jian-Wei Niu and
Jian Ma and
Wen-Dong Wang and
Cheng-Lian Liu Cryptanalysis and improvement of a
biometrics-based remote user
authentication scheme using smart cards 73--79
Biming Tian and
Song Han and
Jiankun Hu and
Tharam Dillon A mutual-healing key distribution scheme
in wireless sensor networks . . . . . . 80--88
Christos Bouras and
Eri Giannaka and
Thrasyvoulos Tsiatsos A dynamic management scheme for DVEs . . 89--101
Hyuck Han and
Hyungsoo Jung and
Hyeonsang Eom and
H. Y. Yeom An efficient skyline framework for
matchmaking applications . . . . . . . . 102--115
Song Wang and
Jinli Cao and
Jiankun Hu A frequency domain subspace blind
channel estimation method for trailing
zero OFDM systems . . . . . . . . . . . 116--120
Chih-Lin Hu and
Chien-An Cho User-provided multimedia content
distribution architecture in mobile and
ubiquitous communication networks . . . 121--136
Istemi Ekin Akkus and
Öznur Özkasap and
M. Reha Civanlar Peer-to-peer multipoint video
conferencing with layered video . . . . 137--150
Joel J. P. C. Rodrigues and
Orlando R. E. Pereira and
Paulo A. C. S. Neves Biofeedback data visualization for body
sensor networks . . . . . . . . . . . . 151--158
Atif Bin Mansoor and
Hassan Masood and
Mustafa Mumtaz and
Shoab A. Khan A feature level multimodal approach for
palmprint identification using
directional subband energies . . . . . . 159--171
Mingyu Lim and
Bart Kevelham and
Niels Nijdam and
Nadia Magnenat-Thalmann Rapid development of distributed
applications using high-level
communication support . . . . . . . . . 172--182
Xiaohong Huang and
Maode Ma A performance model for differentiated
service over single-hop passive star
coupled WDM optical networks . . . . . . 183--193
Aristides Mpitziopoulos and
Charalampos Konstantopoulos and
Damianos Gavalas and
Grammati Pantziou A pervasive assistive environment for
visually impaired people using wireless
sensor network infrastructure . . . . . 194--206
Ameneh Daeinabi and
Akbar Ghaffar Pour Rahbar and
Ahmad Khademzadeh VWCA: an efficient clustering algorithm
in vehicular ad hoc networks . . . . . . 207--222
Pejman Goudarzi Improving rate allocation for ephemeral
traffic using a second-order algorithm 223--231
Tzu-Chi Huang Universal connection architecture for
interactive applications to achieve
distributed computing . . . . . . . . . 232--251
Song Fu and
Cheng-Zhong Xu and
Haiying Shen Randomized load balancing strategies
with churn resilience in peer-to-peer
networks . . . . . . . . . . . . . . . . 252--261
Bo Zhang and
Fangguo Zhang An efficient public key encryption with
conjunctive-subset keywords search . . . 262--267
Jesús Ibáñez and
Carlos Delgado-Mata Lessons from research on interaction
with virtual environments . . . . . . . 268--281
Fahim Sufi and
Ibrahim Khalil Faster person identification using
compressed ECG in time critical wireless
telecardiology applications . . . . . . 282--293
Antonio Ruiz-Martínez and
Juan Sánchez-Montesinos and
Daniel Sánchez-Martínez A mobile network operator-independent
mobile signature service . . . . . . . . 294--311
Wenjia Niu and
Gang Li and
Zhijun Zhao and
Hui Tang and
Zhongzhi Shi Multi-granularity context model for
dynamic Web service composition . . . . 312--326
Hadi Goudarzi and
Amir Hesam Salavati and
Mohammad Reza Pakravan An ant-based rate allocation algorithm
for media streaming in peer to peer
networks: Extension to multiple sessions
and dynamic networks . . . . . . . . . . 327--340
Marc Liberatore and
Bikas Gurung and
Brian Neil Levine and
Matthew Wright Empirical tests of anonymous voice over
IP . . . . . . . . . . . . . . . . . . . 341--350
Patrik Moravek and
Dan Komosny and
Radim Burget and
Jaroslav Sveda and
Tomas Handl and
Lucie Jarosova Study and performance of localization
methods in IP based networks: Vivaldi
algorithm . . . . . . . . . . . . . . . 351--367
E. Costa-Montenegro and
J. C. Burguillo-Rial and
F. Gil-Castiñeira and
F. J. González-Castaño Implementation and analysis of the
BitTorrent protocol with a multi-agent
model . . . . . . . . . . . . . . . . . 368--383
Elisavet Konstantinou Efficient cluster-based group key
agreement protocols for wireless ad hoc
networks . . . . . . . . . . . . . . . . 384--393
Jung Yul Choi and
Shin Jung Woo and
Byoung Kwon Shim Reliable service provisioning in
converged multimedia network environment 394--401
Prajakta Kulkarni and
Yusuf Ozturk mPHASiS: Mobile patient healthcare and
sensor information system . . . . . . . 402--417
William R. Claycomb and
Dongwan Shin A novel node level security policy
framework for wireless sensor networks 418--428
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jonathan Loo Special issue on: Efficient and robust
security and services of wireless mesh
networks . . . . . . . . . . . . . . . . 429--431
Frank A. Zdarsky and
Sebastian Robitzsch and
Albert Banchs Security analysis of wireless mesh
backhauls for mobile networks . . . . . 432--442
Shanshan Jiang and
Yuan Xue Providing survivability against jamming
attack for multi-radio multi-channel
wireless mesh networks . . . . . . . . . 443--454
Zorana Bankovic and
David Fraga and
José Manuel Moya and
Juan Carlos Vallejo and
Pedro Malagón and
Álvaro Araujo and
Juan-Mariano de Goyeneche and
Elena Romero and
Javier Blesa and
Daniel Villanueva and
Octavio Nieto-Taladriz Improving security in WMNs with
reputation systems and self-organizing
maps . . . . . . . . . . . . . . . . . . 455--463
Ching-Fang Hsu and
Guo-Hua Cui and
Qi Cheng and
Jing Chen A novel linear multi-secret sharing
scheme for group communication in
wireless mesh networks . . . . . . . . . 464--468
Yiliang Han and
Xiaolin Gui and
Xuguang Wu and
Xiaoyuan Yang Proxy encryption based secure multicast
in wireless mesh networks . . . . . . . 469--477
Okechukwu E. Muogilim and
Kok-Keong Loo and
Richard Comley Wireless mesh network security: a
traffic engineering management approach 478--491
Raquel Lacuesta and
Jaime Lloret and
Miguel Garcia and
Lourdes Peñalver Two secure and energy-saving spontaneous
ad-hoc protocol for wireless mesh client
networks . . . . . . . . . . . . . . . . 492--505
Rafael Lopes Gomes and
Waldir Moreira Junior and
Eduardo Cerqueira and
Antônio Jorge Abelém Using fuzzy link cost and dynamic choice
of link quality metrics to achieve QoS
and QoE in wireless mesh networks . . . 506--516
Altaf Mukati A survey of memory error correcting
techniques for improved reliability . . 517--522
Lucas D. P. Mendes and
Joel J. P. C. Rodrigues A survey on cross-layer solutions for
wireless sensor networks . . . . . . . . 523--534
Tingting Chen and
Ankur Bansal and
Sheng Zhong A reputation system for wireless mesh
networks using network coding . . . . . 535--541
Pere Montolio-Aranda and
Joaquin Garcia-Alfaro and
David Megías Improved flooding of broadcast messages
using extended multipoint relaying . . . 542--550
Duong Nguyen Binh Ta and
Suiping Zhou and
Wentong Cai and
Xueyan Tang and
Rassul Ayani Multi-objective zone mapping in
large-scale distributed virtual
environments . . . . . . . . . . . . . . 551--561
Niels Sluijs and
Frédéric Iterbeke and
Tim Wauters and
Filip De Turck and
Bart Dhoedt and
Piet Demeester Cooperative caching versus proactive
replication for location dependent
request patterns . . . . . . . . . . . . 562--574
Mohammad Bsoul and
Ahmad Al-Khasawneh and
Emad Eddien Abdallah and
Yousef Kilani Enhanced Fast Spread Replication
strategy for Data Grid . . . . . . . . . 575--580
Xiaohong Huang and
Maode Ma A heuristic adaptive QoS prediction
scheme in single-hop passive star
coupled WDM optical networks . . . . . . 581--588
Cynthia Villalba and
Franco Zambonelli Towards nature-inspired pervasive
service ecosystems: Concepts and
simulation experiences . . . . . . . . . 589--602
Jianyong Chen and
Huawang Zeng and
Cunying Hu and
Zhen Ji Optimization between security and delay
of quality-of-service . . . . . . . . . 603--608
Sandeep K. Sood and
Anil K. Sarje and
Kuldip Singh A secure dynamic identity based
authentication protocol for multi-server
architecture . . . . . . . . . . . . . . 609--618
Hai Dong and
Farookh Khadeer Hussain and
Elizabeth Chang A service concept recommendation system
for enhancing the dependability of
semantic service matchmakers in the
service ecosystem environment . . . . . 619--631
Fang-Yie Leu and
Ilsun You and
Yao-Tien Huang A coordinated multiple channel
assignment scheme and AP deployment for
channel reuse in metropolitan scale
wireless networks . . . . . . . . . . . 632--643
Mohamed Saad Joint admission and power control for
quality-of-service in the wireless
downlink . . . . . . . . . . . . . . . . 644--652
Q. Shi and
N. Zhang and
M. Merabti and
R. Askwith Achieving autonomous fair exchange in
ubiquitous network settings . . . . . . 653--667
Anabela Moreira Bernardino and
Eugénia Moreira Bernardino and
Juan Manuel Sanchez-Perez and
Juan Antonio Gomez-Pulido and
Miguel Angel Vega-Rodriguez Solving ring loading problems using
bio-inspired algorithms . . . . . . . . 668--685
Zoran Milicevic and
Zoran Bojkovic H.264/AVC standard: a proposal for
selective intra- and optimized
inter-prediction . . . . . . . . . . . . 686--691
Yebin Chen and
Ying Li and
Jiankun Wang On the wide diameter of directed
double-loop networks . . . . . . . . . . 692--696
Fatna Belqasmi and
Roch Glitho and
Rachida Dssouli An overlay network for autonomous
information discovery in the
post-composition registries of ambient
networks . . . . . . . . . . . . . . . . 697--707
Huo Zhihong and
Zheng Yuan and
Xu Chang A robust fault-tolerant control strategy
for networked control systems . . . . . 708--714
Yusuf Sani and
Mohamed Othman A provision-aware fair bandwidth
distribution marker algorithm for
DiffServ networks . . . . . . . . . . . 715--721
Ming-Yang Su Using clustering to improve the
KNN-based classifiers for online anomaly
network traffic identification . . . . . 722--730
Naser Movahhedinia and
Behrouz Shahgholi Ghahfarokhi Performance analysis of Bluetooth
asynchronous connection-less service . . 731--738
Chunlin Li and
Layuan Li Two-level market solution for services
composition optimization in mobile grid 739--749
Li Yu and
Maode Ma and
Weidong Hu and
Zibo Shi and
Yantai Shu Design of parameter tunable robust
controller for active queue management
based on $ H_\infty $ control theory . . 750--764
Jinchang Lu and
Maode Ma Cross-layer QoS support framework and
holistic opportunistic scheduling for
QoS in single carrier WiMAX system . . . 765--773
Li Chunlin and
Li Layuan Context aware service provisioning in
mobile grid . . . . . . . . . . . . . . 774--782
Congduc Pham and
Abdallah Makhoul and
Rachid Saadi Risk-based adaptive scheduling in
randomly deployed video sensor networks
for critical surveillance applications 783--795
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Quan Z. Sheng and
Sherali Zeadally and
Aikaterini Mitrokotsa and
Zakaria Maamar RFID technology, systems, and
applications . . . . . . . . . . . . . . 797--798
Wen Yao and
Chao-Hsien Chu and
Zang Li Leveraging complex event processing for
smart hospitals using RFID . . . . . . . 799--810
Yi-Wei Ma and
Han-Chieh Chao and
Jiann-Liang Chen and
Cheng-Yen Wu Load-balancing mechanism for the RFID
middleware applications over grid
networking . . . . . . . . . . . . . . . 811--820
Filippo Gandino and
Renato Ferrero and
Bartolomeo Montrucchio and
Maurizio Rebaudengo Probabilistic DCS: an RFID
reader-to-reader anti-collision protocol 821--832
Pedro Peris-Lopez and
Agustin Orfila and
Julio C. Hernandez-Castro and
Jan C. A. van der Lubbe Flaws on RFID grouping-proofs.
Guidelines for future sound protocols 833--845
Francesco Rizzo and
Marcello Barboni and
Lorenzo Faggion and
Graziano Azzalin and
Marco Sironi Improved security for commercial
container transports using an innovative
active RFID system . . . . . . . . . . . 846--852
Roberto Di Pietro and
Refik Molva An optimal probabilistic solution for
information confinement, privacy, and
security in RFID systems . . . . . . . . 853--863
M. V. Bueno-Delgado and
J. Vales-Alonso On the optimal frame-length
configuration on real passive RFID
systems . . . . . . . . . . . . . . . . 864--876
G. P. Hancke Design of a secure distance-bounding
channel for RFID . . . . . . . . . . . . 877--887
Hanning Chen and
Yunlong Zhu and
Kunyuan Hu and
Tao Ku RFID network planning using a
multi-swarm optimizer . . . . . . . . . 888--901
Apostolia Papapostolou and
Hakima Chaouchi RFID-assisted indoor localization and
the impact of interference on its
performance . . . . . . . . . . . . . . 902--913
Wei-Shinn Ku and
Kazuya Sakai and
Min-Te Sun The optimal $k$-covering tag deployment
for RFID-based localization . . . . . . 914--924
Pilar Manzanares-Lopez and
Juan Pedro Muñoz-Gea and
Josemaria Malgosa-Sanahuja and
Juan Carlos Sanchez-Aarnoutse An efficient distributed discovery
service for EPCglobal network in nested
package scenarios . . . . . . . . . . . 925--937
Huanjia Yang and
Lili Yang and
Shuang-Hua Yang Hybrid ZigBee RFID sensor network for
humanitarian logistics centre management 938--948
Worapot Jakkhupan and
Somjit Arch-int and
Yuefeng Li Business process analysis and simulation
for the RFID and EPCglobal Network
enabled supply chain: a proof-of-concept
approach . . . . . . . . . . . . . . . . 949--957
Taewoo Nam and
Keunhyuk Yeom Business-aware framework for supporting
RFID-enabled applications in EPC Network 958--971
Leonardo A. Amaral and
Fabiano P. Hessel and
Eduardo A. Bezerra and
Jerônimo C. Corrêa and
Oliver B. Longhi and
Thiago F. O. Dias eCloudRFID --- a mobile software
framework architecture for pervasive
RFID-based applications . . . . . . . . 972--979
Pablo Najera and
Javier Lopez and
Rodrigo Roman Real-time location and inpatient care
systems based on passive RFID . . . . . 980--989
Chuong C. Vo and
Naveen Chilamkurti and
Seng W. Loke and
Torab Torabi Radio-Mama: an RFID based business
process framework for asset management 990--997
Maria Chaudhry and
Ali Hammad Akbar and
Qanita Ahmad and
Imran Sarwar SOARware$^1$: Treading through the
crossroads of RFID middleware and SOA
paradigm . . . . . . . . . . . . . . . . 998--1014
Damith C. Ranasinghe and
Mark Harrison and
Kary Främling and
Duncan McFarlane Enabling through life product-instance
management: Solutions and challenges . . 1015--1031
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Keqiu Li and
Laurence T. Yang and
Xuemin Lin Advanced topics in cloud computing . . . 1033--1034
Gang Chen and
Yongwei Wu and
Jia Liu and
Guangwen Yang and
Weimin Zheng Optimization of sub-query processing in
distributed data integration systems . . 1035--1042
Z. Zhou and
L. T. Yang and
S. Bhiri and
L. Shu and
N. Xiong and
M. Hauswirth Verifying mediated service interactions
considering expected behaviours . . . . 1043--1053
Yuqing Zhu and
Jianmin Wang and
Chaokun Wang Ripple: a publish/subscribe service for
multidata item updates propagation in
the cloud . . . . . . . . . . . . . . . 1054--1067
Xiangzhen Kong and
Chuang Lin and
Yixin Jiang and
Wei Yan and
Xiaowen Chu Efficient dynamic task scheduling in
virtualized data centers with fuzzy
prediction . . . . . . . . . . . . . . . 1068--1077
Weidong Shi and
Yang Lu and
Zhu Li and
Jonathan Engelsma SHARC: a scalable 3D graphics virtual
appliance delivery framework in cloud 1078--1087
Hai Jin and
Wei Gao and
Song Wu and
Xuanhua Shi and
Xiaoxin Wu and
Fan Zhou Optimizing the live migration of virtual
machine by CPU scheduling . . . . . . . 1088--1096
Ashley Chonka and
Yang Xiang and
Wanlei Zhou and
Alessio Bonti Cloud security defence to protect cloud
computing against HTTP-DoS and XML-DoS
attacks . . . . . . . . . . . . . . . . 1097--1107
Yanming Shen and
Keqiu Li and
Junfeng Xu and
Lu Li Layered video multicast with a P2P
cooperation approach . . . . . . . . . . 1108--1112
Flavio Lombardi and
Roberto Di Pietro Secure virtualization for cloud
computing . . . . . . . . . . . . . . . 1113--1122
Fouzi Semchedine and
Louiza Bouallouche-Medjkoune and
Djamil A\"\issani Task assignment policies in distributed
server systems: a survey . . . . . . . . 1123--1130
Tien-Ho Chen and
Yen-Chiu Chen and
Wei-Kuan Shih and
Hsin-Wen Wei An efficient anonymous authentication
protocol for mobile pay-TV . . . . . . . 1131--1137
Jian Wang and
Yanheng Liu and
Yu Jiao Building a trusted route in a mobile ad
hoc network considering communication
reliability and path length . . . . . . 1138--1149
J. Hu and
I. Khalil and
S. Han and
A. Mahmood Seamless integration of dependability
and security concepts in SOA: a feedback
control system based framework and
taxonomy . . . . . . . . . . . . . . . . 1150--1159
Hyun Sung Kim Location-based authentication protocol
for first cognitive radio networking
standard . . . . . . . . . . . . . . . . 1160--1167
David G. Rosado and
Eduardo Fernández-Medina and
Javier López and
Mario Piattini Systematic design of secure Mobile Grid
systems . . . . . . . . . . . . . . . . 1168--1183
Fatemeh Amiri and
MohammadMahdi Rezaei Yousefi and
Caro Lucas and
Azadeh Shakery and
Nasser Yazdani Mutual information-based feature
selection for intrusion detection
systems . . . . . . . . . . . . . . . . 1184--1199
Rafael Duque and
Crescencio Bravo and
Manuel Ortega A model-based framework to automate the
analysis of users' activity in
collaborative systems . . . . . . . . . 1200--1209
Meirong Liu and
Timo Koskela and
Zhonghong Ou and
Jiehan Zhou and
Jukka Riekki and
Mika Ylianttila Super-peer-based coordinated service
provision . . . . . . . . . . . . . . . 1210--1224
Jaime Chen and
Manuel Díaz and
Luis Llopis and
Bartolomé Rubio and
José M. Troya A survey on quality of service support
in wireless sensor and actor networks:
Requirements and challenges in the
context of critical infrastructure
protection . . . . . . . . . . . . . . . 1225--1239
Mahmut Tenruh Message scheduling with reduced matrix
cycle and evenly distributed sparse
allocation for time-triggered CAN . . . 1240--1251
Sheikh Tahir Bakhsh and
Halabi Hasbullah and
Sabeen Tahir Dynamic Congestion Control through
backup relay in Bluetooth scatternet . . 1252--1262
Xingwei Liu and
Xuming Fang and
Xu Chen and
Xuesong Peng A bidding model and cooperative
game-based vertical handoff decision
algorithm . . . . . . . . . . . . . . . 1263--1271
Qi Lu and
Maode Ma Group mobility support in mobile WiMAX
networks . . . . . . . . . . . . . . . . 1272--1282
Jesús Ibáñez Minimalist approach to show emotions via
a flock of smileys . . . . . . . . . . . 1283--1291
Chun-Ying Huang and
Shang-Pin Ma and
Kuan-Ta Chen Using one-time passwords to prevent
password phishing attacks . . . . . . . 1292--1301
Miao Xie and
Song Han and
Biming Tian and
Sazia Parvin Anomaly detection in wireless sensor
networks: a survey . . . . . . . . . . . 1302--1325
Sinan Senol and
Kemal Leblebicioglu and
Ece G. Schmidt INtERCEDE: an algorithmic approach to
networked control system design . . . . 1326--1341
Rafael Teigão and
Carlos Maziero and
Altair Santin Applying a usage control model in an
operating system kernel . . . . . . . . 1342--1352
Songtao Guo and
Chuangyin Dang and
Xiaofeng Liao Joint opportunistic power and rate
allocation for wireless ad hoc networks:
an adaptive particle swarm optimization
approach . . . . . . . . . . . . . . . . 1353--1365
Justin Dean and
Andrew Harrison and
Robert N. Lass and
Joe Macker and
David Millar and
Ian Taylor Client/server messaging protocols in
serverless environments . . . . . . . . 1366--1379
Y. Challal and
A. Ouadjaout and
N. Lasla and
M. Bagaa and
A. Hadjidj Secure and efficient disjoint multipath
construction for fault tolerant routing
in wireless sensor networks . . . . . . 1380--1397
Wenfeng Li and
Weiming Shen Swarm behavior control of mobile
multi-robots with wireless sensor
networks . . . . . . . . . . . . . . . . 1398--1407
R. O. Ocaya A framework for collaborative remote
experimentation for a physical
laboratory using a low cost embedded web
server . . . . . . . . . . . . . . . . . 1408--1415
Wenjun Xu and
Zude Zhou and
D. T. Pham and
C. Ji and
M. Yang and
Quan Liu Hybrid congestion control for high-speed
networks . . . . . . . . . . . . . . . . 1416--1428
Javad Akbari Torkestani and
Mohammad Reza Meybodi A link stability-based multicast routing
protocol for wireless mobile ad hoc
networks . . . . . . . . . . . . . . . . 1429--1440
André Vicente Calvinho and
Rui Gustavo Crespo Email FI identification and resolution
with model checking . . . . . . . . . . 1441--1446
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Han-Chieh Chao and
Jean-Pierre Seifert and
Shiguo Lian and
Liang Zhou Dependable multimedia communications:
Systems, services, and applications . . 1447--1448
Rongbo Zhu Intelligent rate control for supporting
real-time traffic in WLAN mesh networks 1449--1458
Po-Yi Shih and
Po-Chuan Lin and
Jhing-Fa Wang and
Yuan-Ning Lin Robust several-speaker speech
recognition with highly dependable
online speaker adaptation and
identification . . . . . . . . . . . . . 1459--1467
Der-Jiunn Deng PSSB: Priority enforced slow-start
backoff algorithm for multimedia
transmission in wireless ad-hoc networks 1468--1473
Philip Leroux and
Steven Latré and
Nicolas Staelens and
Piet Demeester and
Filip De Turck Mobile TV services through IP Datacast
over DVB-H: Dependability of the quality
of experience on the IP-based
distribution network quality of service 1474--1488
Wen Ji and
Min Chen and
Xiaohu Ge and
Peng Li and
Yiqiang Chen A perceptual macroblock layer power
control for energy scalable video
encoder based on just noticeable
distortion principle . . . . . . . . . . 1489--1497
Sanjay K. Dhurandher and
Sudip Misra and
Puneet Pruthi and
Shubham Singhal and
Saurabh Aggarwal and
Isaac Woungang Using bee algorithm for peer-to-peer
file searching in mobile ad hoc networks 1498--1508
I.-Ju Liao and
Tin-Yu Wu and
Jen-Wen Ding and
Wei-Tsong Lee A novel 3D streaming protocol supported
multi-mode display . . . . . . . . . . . 1509--1517
Rashid Mehmood and
Raad Alturki and
Sherali Zeadally Multimedia applications over
metropolitan area networks (MANs) . . . 1518--1529
Sudip Misra and
Ankur Jain Policy controlled self-configuration in
unattended wireless sensor networks . . 1530--1544
Chia-Hui Wang and
Yu-Shun Liu A dependable privacy protection for
end-to-end VoIP via Elliptic-Curve
Diffie--Hellman and dynamic key changes 1545--1556
Guangjie Liu and
Junwen Wang and
Shiguo Lian and
Zhiquan Wang A passive image authentication scheme
for detecting region-duplication forgery
with rotation . . . . . . . . . . . . . 1557--1565
Yeong-Sheng Chen and
Yuan-Wei Lee and
Jong Hyuk Park Enhanced HCCA mechanism for multimedia
traffics with QoS support in IEEE
802.11e networks . . . . . . . . . . . . 1566--1571
Kevin J. Ma and
Radim Bartos and
Swapnil Bhatia A survey of schemes for Internet-based
video delivery . . . . . . . . . . . . . 1572--1586
Neyre Tekbiyik and
Elif Uysal-Biyikoglu Energy efficient wireless unicast
routing alternatives for
machine-to-machine networks . . . . . . 1587--1614
Ching-Hao Mao and
Hahn-Ming Lee and
Che-Fu Yeh Adaptive e-mails intention finding
system based on words social networks 1615--1622
Jun Yang and
Bin Dai and
Benxiong Huang and
Shui Yu Orthogonal feedback scheme for network
coding . . . . . . . . . . . . . . . . . 1623--1633
Jordán Pascual Espada and
Oscar Sanjuán Martínez and
Juan Manuel Cueva Lovelle and
B. Cristina Pelayo G-Bustelo and
Manuel Álvarez Álvarez and
Alejandro González García Modeling architecture for collaborative
virtual objects based on services . . . 1634--1647
Ting Chen and
Xiao-song Zhang and
Hua Li and
Xiong-da Li and
Yue Wu Fast quarantining of proactive worms in
unstructured P2P networks . . . . . . . 1648--1659
Anindya Tahsin Prodhan and
Rajkumar Das and
Humayun Kabir and
Gholamali C. Shoja TTL based routing in opportunistic
networks . . . . . . . . . . . . . . . . 1660--1670
Imad Jawhar and
Nader Mohamed and
Dharma P. Agrawal Linear wireless sensor networks:
Classification and applications . . . . 1671--1682
Stenio Fernandes and
Judith Kelner and
Djamel Sadok An adaptive-predictive architecture for
video streaming servers . . . . . . . . 1683--1694
Liqiang Zhang and
Yu-Jen Cheng and
Xiaobo Zhou Enhanced statistics-based rate
adaptation for 802.11 wireless networks 1695--1706
Martin Kuehnhausen and
Victor S. Frost Application of the Java Message Service
in mobile monitoring environments . . . 1707--1716
Zac Sadan and
David G. Schwartz Social network analysis of web links to
eliminate false positives in
collaborative anti-spam systems . . . . 1717--1723
Chien-Lung Hsu and
Han-Yu Lin New identity-based key-insulated
convertible multi-authenticated
encryption scheme . . . . . . . . . . . 1724--1731
Tao Qin and
Xiaohong Guan and
Wei Li and
Pinghui Wang and
Qiuzhen Huang Monitoring abnormal network traffic
based on blind source separation
approach . . . . . . . . . . . . . . . . 1732--1742
Hwa-Chun Ma and
Prasan Kumar Sahoo and
Yen-Wen Chen Computational geometry based distributed
coverage hole detection protocol for the
wireless sensor networks . . . . . . . . 1743--1756
Wenjia Niu and
Gang Li and
Hui Tang and
Xu Zhou and
Zhongzhi Shi CARSA: a context-aware reasoning-based
service agent model for AI planning of
web service composition . . . . . . . . 1757--1770
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jiming Chen and
David K. Y. Yau Control and optimization over wireless
networks . . . . . . . . . . . . . . . . 1771--1772
Ning Weng and
I-Hung Li and
Lucas Vespa Information quality model and
optimization for 802.15.4-based wireless
sensor networks . . . . . . . . . . . . 1773--1783
Rabun Kosar and
Ilir Bojaxhiu and
Ertan Onur and
Cem Ersoy Lifetime extension for surveillance
wireless sensor networks with
intelligent redeployment . . . . . . . . 1784--1793
Wahabou Abdou and
Adrien Henriet and
Christelle Bloch and
Dominique Dhoutaut and
Damien Charlet and
François Spies Using an evolutionary algorithm to
optimize the broadcasting methods in
mobile ad hoc networks . . . . . . . . . 1794--1804
Dang Tu Nguyen and
Wook Choi and
Minh Thiep Ha and
Hyunseung Choo Design and analysis of a multi-candidate
selection scheme for greedy routing in
wireless sensor networks . . . . . . . . 1805--1817
Wenjia Liu and
Bo Chen Optimal control of mobile monitoring
agents in immune-inspired wireless
monitoring networks . . . . . . . . . . 1818--1826
Qing Chen and
Zubair Md. Fadlullah and
Xiaodong Lin and
Nei Kato A clique-based secure admission control
scheme for mobile ad hoc networks
(MANETs) . . . . . . . . . . . . . . . . 1827--1835
Bader Al-Manthari and
Nidal Nasser and
Najah Abu Ali and
Hossam Hassanein Congestion prevention in broadband
wireless access systems: an economic
approach . . . . . . . . . . . . . . . . 1836--1847
Jihoon Ryoo and
Hwangnam Kim Multi-sector multi-range control for
self-organizing wireless networks . . . 1848--1860
Zhaoming Lu and
Yan Yang and
Xiangming Wen and
Ying Ju and
Wei Zheng A cross-layer resource allocation scheme
for ICIC in LTE-Advanced . . . . . . . . 1861--1868
M. Jahanshahi and
M. Dehghan and
M. R. Meybodi A mathematical formulation for joint
channel assignment and multicast routing
in multi-channel multi-radio wireless
mesh networks . . . . . . . . . . . . . 1869--1882
Juan Rodríguez-Covili and
Sergio F. Ochoa and
José A. Pino and
Roc Messeguer and
Esunly Medina and
Dolors Royo A communication infrastructure to ease
the development of mobile collaborative
applications . . . . . . . . . . . . . . 1883--1893
Bin Li and
Zheng Zhou and
Dejian Li and
Weixia Zou A novel Parzen probabilistic neural
network based noncoherent detection
algorithm for distributed ultra-wideband
sensors . . . . . . . . . . . . . . . . 1894--1902
Kyusuk Han and
Youngjoon Seo and
Sungjune Yoon and
James J. (Jong Hyuk) Park and
Taeshik Shon Providing security vertical handoff in
SARAH for heterogeneous networks . . . . 1903--1907
Muhammad Ayaz and
Imran Baig and
Azween Abdullah and
Ibrahima Faye A survey on routing techniques in
underwater wireless sensor networks . . 1908--1927
Sarogini Grace Pease and
Lin Guan and
Iain Phillips and
Alan Grigg Cross-layer signalling and middleware: a
survey for inelastic soft real-time
applications in MANETs . . . . . . . . . 1928--1941
David Antolino Rivas and
José M. Barceló-Ordinas and
Manel Guerrero Zapata and
Julián D. Morillo-Pozo Security on VANETs: Privacy, misbehaving
nodes, false information and secure data
aggregation . . . . . . . . . . . . . . 1942--1955
Muhammad Azhar Iqbal and
Bin Dai and
Benxiong Huang and
A. Hassan and
Shui Yu Survey of network coding-aware routing
protocols in wireless networks . . . . . 1956--1970
M. Bakhouya and
J. Gaber and
P. Lorenz An adaptive approach for information
dissemination in Vehicular Ad hoc
Networks . . . . . . . . . . . . . . . . 1971--1978
Lu Leng and
Jiashu Zhang Dual-key-binding cancelable palmprint
cryptosystem for palmprint protection
and information security . . . . . . . . 1979--1989
Jeremiah D. Deng and
Martin K. Purvis Multi-core application performance
optimization using a constrained tandem
queueing model . . . . . . . . . . . . . 1990--1996
Pedro M. Wightman and
Miguel A. Labrador A family of simple distributed minimum
connected dominating set-based topology
construction algorithms . . . . . . . . 1997--2010
Sanjay Kumar Biswash and
Chiranjeev Kumar An efficient metric-based (EM-B)
location management scheme for wireless
cellular networks . . . . . . . . . . . 2011--2026
Tzu-Chi Huang and
Kuo-Chih Chu Networking without Dynamic Host
Configuration Protocol server in
Ethernet and Wireless Local Area Network 2027--2041
Maziar Ahmad Sharbafi and
Mohammad Javad Yazdanpanah IDFC: a new approach to control
bifurcation in TCP/RED . . . . . . . . . 2042--2050
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Contents list continued . . . . . . . . II
Weiming Shen and
Yinsheng Li and
Anne James Collaborative computing and applications 1--2
Hugo Paredes and
F. Mario Martins Social interaction regulation in virtual
web environments using the Social
Theatres model . . . . . . . . . . . . . 3--19
Weizhan Zhang and
Qinghua Zheng and
Haifei Li and
Feng Tian An overlay multicast protocol for live
streaming and delay-guaranteed
interactive media . . . . . . . . . . . 20--28
Min Liu and
Shijun Xu and
Siyi Sun An agent-assisted QoS-based routing
algorithm for wireless sensor networks 29--36
Tossaporn Srisooksai and
Kamol Keamarungsi and
Poonlap Lamsrichan and
Kiyomichi Araki Practical data compression in wireless
sensor networks: a survey . . . . . . . 37--59
Junzhou Luo and
Xiaogang Wang and
Ming Yang An interval centroid based spread
spectrum watermarking scheme for
multi-flow traceback . . . . . . . . . . 60--71
Kyuyong Shin and
Douglas S. Reeves Winnowing: Protecting P2P systems
against pollution through cooperative
index filtering . . . . . . . . . . . . 72--84
Guoqiang Gao and
Ruixuan Li and
Kunmei Wen and
Xiwu Gu Proactive replication for rare objects
in unstructured peer-to-peer networks 85--96
Kwanghoon Kim A model-driven workflow fragmentation
framework for collaborative workflow
architectures and systems . . . . . . . 97--110
Junpeng Du and
Shikai Jing and
Jihong Liu Creating shared design thinking process
for collaborative design . . . . . . . . 111--120
Yunjiao Xue and
Hamada H. Ghenniwa and
Weiming Shen Frame-based ontological view for
semantic integration . . . . . . . . . . 121--131
Hongbo Sun and
Wenhui Fan and
Weiming Shen and
Tianyuan Xiao Ontology-based interoperation model of
collaborative product development . . . 132--144
Juan Rodríguez-Covili and
Sergio F. Ochoa and
José A. Pino High level MANET protocol: Enhancing the
communication support for mobile
collaborative work . . . . . . . . . . . 145--155
Yuqing Sun and
Dickson K. W. Chiu and
Bin Gong and
Xiangxu Meng and
Peng Zhang Scheduling mobile collaborating
workforce for multiple urgent events . . 156--163
Fabrício Enembreck and
Jean-Paul André Barth\`es Distributed constraint optimization with
MULBS: a case study on collaborative
meeting scheduling . . . . . . . . . . . 164--175
Mar Pérez-Sanagustín and
Gustavo Ramirez-Gonzalez and
Davinia Hernández-Leo and
Mario Muñoz-Organero and
Patricia Santos and
Josep Blat and
Carlos Delgado Kloos Discovering the campus together: a
mobile and computer-based learning
experience . . . . . . . . . . . . . . . 176--188
Adriana S. Vivacqua and
Marcos R. S. Borges Taking advantage of collective knowledge
in emergency response systems . . . . . 189--198
Amir Talaei-Khoei and
Pradeep Ray and
Nandan Parameshwaran and
Lundy Lewis A framework for awareness maintenance 199--210
Jameela Al-Jaroodi and
Nader Mohamed Service-oriented middleware: a survey 211--220
Rajashekhar C. Biradar and
Sunilkumar S. Manvi Review of multicast routing mechanisms
in mobile ad hoc networks . . . . . . . 221--239
Xianhui Che and
Barry Ip Packet-level traffic analysis of online
games from the genre characteristics
perspective . . . . . . . . . . . . . . 240--252
Kok-Lim Alvin Yau and
Peter Komisarczuk and
Paul D. Teal Reinforcement learning for context
awareness and intelligence in wireless
networks: Review, new features and open
issues . . . . . . . . . . . . . . . . . 253--267
Mawloud Omar and
Yacine Challal and
Abdelmadjid Bouabdallah Certification-based trust models in
mobile ad hoc networks: a survey and
taxonomy . . . . . . . . . . . . . . . . 268--286
Eleftherios Stergiou and
John Garofalakis Performance estimation of banyan semi
layer networks with drop resolution
mechanism . . . . . . . . . . . . . . . 287--294
Ibrahim Al-Surmi and
Mohamed Othman and
Borhanuddin Mohd Ali Mobility management for IP-based next
generation mobile networks: Review,
challenge and perspective . . . . . . . 295--315
Feng Zhong and
Chai Kiat Yeo and
Bu Sung Lee Adaptive load balancing algorithm for
multiple homing mobile nodes . . . . . . 316--327
Marinho P. Barcellos and
Rodolfo S. Antunes and
Hisham H. Muhammad and
Ruthiano S. Munaretti Beyond network simulators: Fostering
novel distributed applications and
protocols through extendible design . . 328--339
Fagen Li and
Muhammad Khurram Khan and
Khaled Alghathbar and
Tsuyoshi Takagi Identity-based online/offline
signcryption for low power devices . . . 340--347
Walid Saad and
Zaher Dawy and
Sanaa Sharafeddine A utility-based algorithm for joint
uplink/downlink scheduling in wireless
cellular networks . . . . . . . . . . . 348--356
Jing Nie IPv6 based relay gateway protocol in
hybrid networks . . . . . . . . . . . . 357--364
Dhiah Al-Shammary and
Ibrahim Khalil Redundancy-aware SOAP messages
compression and aggregation for enhanced
performance . . . . . . . . . . . . . . 365--381
Eduardo Cañete and
Jaime Chen and
R. Marcos Luque and
Bartolomé Rubio NeuralSens: a neural network based
framework to allow dynamic adaptation in
wireless sensor and actor networks . . . 382--393
Mohammad Javad Rostami and
Azadeh Alsadat Emrani Zarandi and
Seyed Mohamad Hoseininasab MSDP with ACO: a maximal SRLG disjoint
routing algorithm based on ant colony
optimization . . . . . . . . . . . . . . 394--402
Ronald Beaubrun and
Jhon-Fredy Llano-Ruiz and
Benoit Poirier and
Alejandro Quintero A middleware architecture for
disseminating delay-constrained
information in wireless sensor networks 403--411
Jasma Balasangameshwara and
Nedunchezhian Raju A hybrid policy for fault tolerant load
balancing in grid computing environments 412--422
Tzu-Chi Huang Program Ultra-Dispatcher for launching
applications in a customization manner
on cloud computing . . . . . . . . . . . 423--446
Chao-Tsun Chang Hash caching mechanism in source-based
routing for wireless ad hoc networks . . 447--458
Sajjad Zare and
Akbar Ghaffarpour Rahbar An FEC scheme combined with weighted
scheduling to reduce multicast packet
loss in IPTV over PON . . . . . . . . . 459--468
Jun Huang and
Xiaohong Huang and
Yan Ma Routing with multiple
quality-of-services constraints: an
approximation perspective . . . . . . . 469--479
Serif Bahtiyar and
Mehmet Ufuk Çaglayan Extracting trust information from
security system of a service . . . . . . 480--490
Jorge Blasco and
Julio Cesar Hernandez-Castro and
José María de Fuentes and
Benjamín Ramos A framework for avoiding steganography
usage over HTTP . . . . . . . . . . . . 491--501
Bing Hu and
Kwan L. Yeung and
Zhaoyang Zhang Load-balanced three-stage switch . . . . 502--509
Ioannis Krikidis and
John S. Thompson MIMO two-way relay channel with
superposition coding and imperfect
channel estimation . . . . . . . . . . . 510--516
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mesut Günes and
Yan Zhang In memory of Mieso Denko . . . . . . . . 517
Ming-Tuo Zhou and
Hiroshi Harada Cognitive maritime wireless mesh/ad hoc
networks . . . . . . . . . . . . . . . . 518--526
Theofanis P. Lambrou and
Christos G. Panayiotou A testbed for coverage control using
mixed wireless sensor networks . . . . . 527--537
Joachim Fischer and
Jens-Peter Redlich and
Jochen Zschau and
Claus Milkereit and
Matteo Picozzi and
Kevin Fleming and
Mihal Brumbulli and
Björn Lichtblau and
Ingmar Eveslage A wireless mesh sensing network for
early warning . . . . . . . . . . . . . 538--547
Evangelos Theodoridis and
Ioannis Chatzigiannakis and
Stefan Dulman Post-processing in wireless sensor
networks: Benchmarking sensor trace
files for in-network data aggregation 548--561
Iván Corredor and
José F. Martínez and
Miguel S. Familiar and
Lourdes López Knowledge-Aware and Service-Oriented
Middleware for deploying pervasive
services . . . . . . . . . . . . . . . . 562--576
Bo Yang and
Manohar Mareboyana Similarity search in sensor networks
using semantic-based caching . . . . . . 577--583
Mari Carmen Domingo An overview of the Internet of Things
for people with disabilities . . . . . . 584--596
Sajjad Rizvi and
Hassaan Khaliq Qureshi and
Syed Ali Khayam and
Veselin Rakocevic and
Muttukrishnan Rajarajan A1: an energy efficient topology control
algorithm for connected area coverage in
wireless sensor networks . . . . . . . . 597--605
Malabika Sengupta and
Swapan Kumar Mondal and
Debashis Saha A comparison of wavelength reservation
protocols for WDM optical networks . . . 606--618
Chuan Zhu and
Chunlin Zheng and
Lei Shu and
Guangjie Han A survey on coverage and connectivity
issues in wireless sensor networks . . . 619--632
Jingyu Wang and
Jianxin Liao and
Tonghong Li OSIA: Out-of-order Scheduling for
In-order Arriving in concurrent
multi-path transfer . . . . . . . . . . 633--643
Sanaa Sharafeddine and
Ibrahim Al-Kassem and
Zaher Dawy A scatternet formation algorithm for
Bluetooth networks with a non-uniform
distribution of devices . . . . . . . . 644--656
Wenjie Zhang and
Chai Kiat Yeo Throughput and delay scaling laws for
mobile overlaid wireless networks . . . 657--667
Hoda Hassan and
Mohamed Eltoweissy CORM: a reference model for future
computer networks . . . . . . . . . . . 668--680
Nicola Cordeschi and
Tatiana Patriarca and
Enzo Baccarelli Stochastic traffic engineering for
real-time applications over wireless
networks . . . . . . . . . . . . . . . . 681--694
Francisco Jurado and
Miguel A. Redondo and
Manuel Ortega Using fuzzy logic applied to software
metrics and test cases to assess
programming assignments and give advice 695--712
Golnaz Vakili and
Siavash Khorsandi Coordination of cooperation policies in
a peer-to-peer system using swarm-based
RL . . . . . . . . . . . . . . . . . . . 713--722
Radim Burget and
Dan Komosny and
Kathiravelu Ganeshan Topology aware feedback transmission for
real-time control protocol . . . . . . . 723--730
Mahboobeh Sedighizad and
Babak Seyfe and
Keivan Navaie MR-BART: Multi-Rate Available Bandwidth
Estimation in Real-Time . . . . . . . . 731--742
Yi-hua Zhu and
Hui Xu and
Kai-kai Chi and
Hua Hu Accumulating error-free frame blocks to
improve throughput for IEEE 802.11-based
WLAN . . . . . . . . . . . . . . . . . . 743--752
Carlos T. Calafate and
Giancarlo Fortino and
Sascha Fritsch and
Janio Monteiro and
Juan-Carlos Cano and
Pietro Manzoni An efficient and robust content delivery
solution for IEEE 802.11p vehicular
environments . . . . . . . . . . . . . . 753--762
Xiong Li and
Yongping Xiong and
Jian Ma and
Wendong Wang An efficient and security dynamic
identity based authentication protocol
for multi-server architecture using
smart cards . . . . . . . . . . . . . . 763--769
Min-Feng Wang and
Meng-Feng Tsai and
Sie-Long Jheng and
Cheng-Hsien Tang Social feature-based enterprise email
classification without examining email
contents . . . . . . . . . . . . . . . . 770--777
Waltenegus Dargie A medium access control protocol that
supports a seamless handover in wireless
sensor networks . . . . . . . . . . . . 778--786
Rajesh Karunamurthy and
Ferhat Khendek and
Roch H. Glitho A novel architecture for Web service
composition . . . . . . . . . . . . . . 787--802
Georgios Kastaniotis and
Elias Maragos and
Christos Douligeris and
Dimitris K. Despotis Using data envelopment analysis to
evaluate the efficiency of web caching
object replacement strategies . . . . . 803--817
Wen-Hwa Liao and
Hung-Chun Yang A power-saving data storage scheme for
wireless sensor networks . . . . . . . . 818--825
Gildas Avoine and
Xavier Carpent and
Benjamin Martin Privacy-friendly synchronized
ultralightweight authentication
protocols in the storm . . . . . . . . . 826--843
Muhammad Imran and
Mohamed Younis and
Abas Md Said and
Halabi Hasbullah Localized motion-based connectivity
restoration algorithms for wireless
sensor and actor networks . . . . . . . 844--856
Mohit P. Tahiliani and
K. C. Shet and
T. G. Basavaraju CARED: Cautious Adaptive RED gateways
for TCP/IP networks . . . . . . . . . . 857--864
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Laurence T. Yang and
Guojun Wang Special issue on trusted computing and
communications . . . . . . . . . . . . . 865--866
Yanli Yu and
Keqiu Li and
Wanlei Zhou and
Ping Li Trust mechanisms in wireless sensor
networks: Attack analysis and
countermeasures . . . . . . . . . . . . 867--880
Lei Jiang and
Lixin Ding and
Jianxun Liu and
Jinjun Chen Reputation rating modeling for open
environment lack of communication by
using online social cognition . . . . . 881--891
Weizhong Qiang and
Aleksandr Konstantinov and
Deqing Zou and
Laurence T. Yang A standards-based interoperable single
sign-on framework in ARC Grid middleware 892--904
Zhongtian Jia and
Xiaodong Lin and
Seng-Hua Tan and
Lixiang Li and
Yixian Yang Public key distribution scheme for delay
tolerant networks based on two-channel
cryptography . . . . . . . . . . . . . . 905--913
Fei Wang and
Furong Wang and
Benxiong Huang and
Laurence T. Yang SONR: a reliable reputation system of
self-organized network . . . . . . . . . 914--926
Qin Liu and
Guojun Wang and
Jie Wu Secure and privacy preserving keyword
searching for cloud storage services . . 927--933
Félix Gómez Mármol and
Gregorio Martínez Pérez TRIP, a trust and reputation
infrastructure-based proposal for
vehicular ad hoc networks . . . . . . . 934--941
Mohammad-Amin Kharraz and
Hamid Sarbazi-Azad and
Albert Y. Zomaya On-demand multicast routing protocol
with efficient route discovery . . . . . 942--950
Huanyu Zhao and
Xin Yang and
Xiaolin Li An incentive mechanism to reinforce
truthful reports in reputation systems 951--961
Laiping Zhao and
Yizhi Ren and
Mingchu Li and
Kouichi Sakurai Flexible service selection with
user-specific QoS support in
service-oriented architecture . . . . . 962--973
Liang Gu and
Guangdong Bai and
Yao Guo and
Xiangqun Chen and
Hong Mei Security model oriented attestation on
dynamically reconfigurable
component-based systems . . . . . . . . 974--981
Min Choi and
Jong Hyuk Park and
Seungho Lim and
Young-Sik Jeong Achieving reliable system performance by
fast recovery of branch miss prediction 982--991
Yu Wang and
Yang Xiang and
Wanlei Zhou and
Shunzheng Yu Generating regular expression signatures
for network traffic classification in
trusted network management . . . . . . . 992--1000
Jin-Hee Cho and
Ananthram Swami and
Ing-Ray Chen Modeling and analysis of trust
management with trust chain optimization
in mobile ad hoc networks . . . . . . . 1001--1012
Ousmane Diallo and
Joel J. P. C. Rodrigues and
Mbaye Sene Real-time data management on wireless
sensor networks: a survey . . . . . . . 1013--1021
Wen Tao Zhu and
Jianying Zhou and
Robert H. Deng and
Feng Bao Detecting node replication attacks in
wireless sensor networks: a survey . . . 1022--1034
Jihao Yin and
Yifei Wang and
Jiankun Hu Free Search with Adaptive Differential
Evolution Exploitation and
Quantum-Inspired Exploration . . . . . . 1035--1051
Panho Lee and
Anura P. Jayasumana and
H. M. N. Dilum Bandara and
Sanghun Lim and
V. Chandrasekar A peer-to-peer collaboration framework
for multi-sensor data fusion . . . . . . 1052--1066
Chao-Yang Lee and
Shou-Jen Lin and
Chen-Wei Lee and
Chu-Sing Yang An efficient continuous tracking system
in real-time surveillance application 1067--1073
Rajashekhar C. Biradar and
Sunilkumar S. Manvi Neighbor supported reliable multipath
multicast routing in MANETs . . . . . . 1074--1085
Jesús Gallardo and
Crescencio Bravo and
Miguel A. Redondo A model-driven development method for
collaborative modeling tools . . . . . . 1086--1105
S. Suraprasert and
J. Fakcharoenphol Comparison of recovery schemes to
maximize restorable throughput in
multicast networks . . . . . . . . . . . 1106--1115
Bettahally N. Keshavamurthy and
Durga Toshniwal and
Bhavani K. Eshwar Hiding co-occurring prioritized
sensitive patterns over distributed
progressive sequential data streams . . 1116--1129
Abderrahmane Baadache and
Ali Belmehdi Fighting against packet dropping
misbehavior in multi-hop wireless ad hoc
networks . . . . . . . . . . . . . . . . 1130--1139
M. C. Batistatos and
G. V. Tsoulos and
G. E. Athanasiadou Mobile telemedicine for moving vehicle
scenarios: Wireless technology options
and challenges . . . . . . . . . . . . . 1140--1150
Zubair A. Baig Multi-agent systems for protecting
critical infrastructures: a survey . . . 1151--1161
Abhik Banerjee and
Chuan Heng Foh and
Chai Kiat Yeo and
Bu Sung Lee Performance improvements for
network-wide broadcast with
instantaneous network information . . . 1162--1174
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alfredo Cuzzocrea Intelligent algorithms for data-centric
sensor networks . . . . . . . . . . . . 1175--1176
Aris Papadopoulos and
Alfredo Navarra and
Julie A. McCann and
Cristina M. Pinotti VIBE: an energy efficient routing
protocol for dense and mobile sensor
networks . . . . . . . . . . . . . . . . 1177--1190
Mark Roantree and
Jie Shi and
Paolo Cappellari and
Martin F. O'Connor and
Michael Whelan and
Niall Moyna Data transformation and query management
in personal health sensor networks . . . 1191--1202
Paolo Bellavista and
Giuseppe Cardone and
Antonio Corradi and
Luca Foschini The Future Internet convergence of IMS
and ubiquitous smart environments: an
IMS-based solution for energy efficiency 1203--1209
Alfredo Cuzzocrea and
Alexis Papadimitriou and
Dimitrios Katsaros and
Yannis Manolopoulos Edge betweenness centrality: a novel
algorithm for QoS-based topology control
over wireless sensor networks . . . . . 1210--1217
Gianluca Moro and
Gabriele Monti W-Grid: a scalable and efficient
self-organizing infrastructure for
multi-dimensional data management,
querying and routing in wireless
data-centric sensor networks . . . . . . 1218--1234
R. Madhusudhan and
R. C. Mittal Dynamic ID-based remote user password
authentication schemes using smart
cards: a review . . . . . . . . . . . . 1235--1248
Jan von Mulert and
Ian Welch and
Winston K. G. Seah Security threats and solutions in
MANETs: a case study using AODV and
SAODV . . . . . . . . . . . . . . . . . 1249--1259
Chien-Fu Cheng and
Kuo-Tang Tsai Eventual strong consensus with fault
detection in the presence of dual
failure mode on processors under dynamic
networks . . . . . . . . . . . . . . . . 1260--1276
Dong Kun Noh and
Junbeom Hur Using a dynamic backbone for efficient
data delivery in solar-powered WSNs . . 1277--1284
Longxiang Gao and
Ming Li and
Alessio Bonti and
Wanlei Zhou and
Shui Yu $M$-Dimension: Multi-characteristics
based routing protocol in human
associated delay-tolerant networks with
improved performance over one
dimensional classic models . . . . . . . 1285--1296
Najme Mansouri and
Gholam Hosein Dastghaibyfard A dynamic replica management strategy in
data grid . . . . . . . . . . . . . . . 1297--1303
Kenneth J. Turner and
Koon Leai Larry Tan Rigorous development of composite grid
services . . . . . . . . . . . . . . . . 1304--1316
Mustapha Reda Senouci and
Abdelhamid Mellouk and
Hadj Senouci and
Amar Aissani Performance evaluation of network
lifetime spatial-temporal distribution
for WSN routing protocols . . . . . . . 1317--1328
Hassen A. Mogaibel and
Mohamed Othman and
Shamala Subramaniam and
Nor Asilah Wati Abdul Hamid On-demand channel reservation scheme for
common traffic in wireless mesh networks 1329--1351
Elizabeth A. Thompson and
Nathan Clem and
Isaac Renninger and
Timothy Loos Software-defined GPS receiver on
USRP-platform . . . . . . . . . . . . . 1352--1360
Ameen M. Alkharasani and
Mohamed Othman M$^2$I$^2$ tswTCM: a new efficient
optimization marker algorithm to improve
fairness bandwidth in DiffServ networks 1361--1366
Miao Zhou and
Yi Mu and
Willy Susilo and
Jun Yan and
Liju Dong Privacy enhanced data outsourcing in the
cloud . . . . . . . . . . . . . . . . . 1367--1373
Bettahally N. Keshavamurthy and
Durga Toshniwal and
Bhavani K. Eshwar Corrigendum to ``Hiding co-occurring
prioritized sensitive patterns over
distributed progressive sequential data
streams'' [J. Network Comput. Appl. \bf
35 (3) (2012) 1116--1129] . . . . . . . 1374
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Paolo Bellavista and
Chi-Ming Chen and
Hossam Hassanein Special issue on service delivery
management in broadband networks . . . . 1375--1376
Djamal-Eddine Meddour and
Alaeddine Abdallah and
Toufik Ahmed and
Raouf Boutaba A cross layer architecture for multicast
and unicast video transmission in mobile
broadband networks . . . . . . . . . . . 1377--1391
Cristiano Bonato Both and
Clarissa Cassales Marquezan and
Rafael Kunst and
Lisandro Zambenedetti Granville and
Juergen Rochol A self-adapting connection admission
control solution for mobile WiMAX:
Enabling dynamic switching of admission
control algorithms based on predominant
network usage profiles . . . . . . . . . 1392--1401
Giuseppe Aceto and
Alessio Botta and
Antonio Pescapé and
Maurizio D'Arienzo Unified architecture for network
measurement: the case of available
bandwidth . . . . . . . . . . . . . . . 1402--1414
Werner Sandmann Delays in a series of queues with
correlated service times . . . . . . . . 1415--1423
Kaouther Abrougui and
Azzedine Boukerche and
Hussam Ramadan Performance evaluation of an efficient
fault tolerant service discovery
protocol for vehicular networks . . . . 1424--1435
Nassima Hadid and
Alexandre Guitton and
Michel Misson Exploiting a meeting channel to
interconnect mobile robots . . . . . . . 1436--1445
Christos Bouras and
Vassilis Poulopoulos Enhancing meta-portals using dynamic
user context personalization techniques 1446--1453
Ahmed A. Mosa and
Aisha H. Abdalla and
Rashid A. Saeed Evaluation of MANEMO route optimization
schemes . . . . . . . . . . . . . . . . 1454--1472
A. Ruiz-Martínez A survey on solutions and main free
tools for privacy enhancing Web
communications . . . . . . . . . . . . . 1473--1492
Mohammad Masdari and
Mehdi Maleknasab and
Moazam Bidaki A survey and taxonomy of name systems in
mobile ad hoc networks . . . . . . . . . 1493--1507
Adamu Murtala Zungeru and
Li-Minn Ang and
Kah Phooi Seng Classical and swarm intelligence based
routing protocols for wireless sensor
networks: a survey and comparison . . . 1508--1536
Liang Liu and
Xiao-Lin Qin and
Gui-Neng Zheng Reliable spatial window aggregation
query processing algorithm in wireless
sensor networks . . . . . . . . . . . . 1537--1547
Kranthi K. Mamidisetty and
Michael J. Ferrara and
Shivakumar Sastry Systematic selection of cluster heads
for data collection . . . . . . . . . . 1548--1558
Rosen Ivanov Real-time GPS track simplification
algorithm for outdoor navigation of
visually impaired . . . . . . . . . . . 1559--1567
Yun He and
Zhongyang Xiong and
Yufang Zhang and
Xiaolin Tan and
Zhixing Li Modeling and analysis of multi-channel
P2P VoD systems . . . . . . . . . . . . 1568--1578
Patrick Battistello and
Joaquin Garcia-Alfaro and
Cyril Delétré Transaction-based authentication and key
agreement protocol for inter-domain VoIP 1579--1597
Samia A. Ali and
Khaled M. Shaaban and
Islam M. Alkabbany Distributed patching for mobile wireless
sensor networks . . . . . . . . . . . . 1598--1605
Jipeng Zhou and
Liyang Peng and
Yuhui Deng and
Jianzhu Lu An on-demand routing protocol for
improving channel use efficiency in
multichannel ad hoc networks . . . . . . 1606--1614
Seiven Leu and
Ruay-Shiung Chang A weight-value algorithm for finding
connected dominating sets in a MANET . . 1615--1619
Bert Vankeirsbilck and
Dieter Verslype and
Nicolas Staelens and
Pieter Simoens and
Chris Develder and
Bart Dhoedt and
Filip De Turck and
Piet Demeester Automatic fine-grained area detection
for thin client systems . . . . . . . . 1620--1632
Javad Akbari Torkestani Mobility prediction in mobile wireless
networks . . . . . . . . . . . . . . . . 1633--1645
Ashok Kumar Das and
Pranay Sharma and
Santanu Chatterjee and
Jamuna Kanta Sing A dynamic password-based user
authentication scheme for hierarchical
wireless sensor networks . . . . . . . . 1646--1656
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Peer Azmat Shah and
Muhammad Yousaf and
Amir Qayyum and
Halabi B. Hasbullah Performance comparison of end-to-end
mobility management protocols for TCP 1657--1673
Allen L. Ramaboli and
Olabisi E. Falowo and
Anthony H. Chan Bandwidth aggregation in heterogeneous
wireless networks: a survey of current
approaches and issues . . . . . . . . . 1674--1690
Sazia Parvin and
Farookh Khadeer Hussain and
Omar Khadeer Hussain and
Song Han and
Biming Tian and
Elizabeth Chang Cognitive radio network security: a
survey . . . . . . . . . . . . . . . . . 1691--1708
Shajulin Benedict Energy-aware performance analysis
methodologies for HPC architectures ---
an exploratory study . . . . . . . . . . 1709--1719
Tarek Moulahi and
Salem Nasri and
Hervé Guyennet Broadcasting based on dominated
connecting sets with MPR in a realistic
environment for WSNs & ad hoc . . . . . . 1720--1727
JungYul Choi and
Min-Gon Kim and
Hongkyu Jeong and
Hong-Shik Park Power-saving mechanisms for energy
efficient IEEE 802.16e/m . . . . . . . . 1728--1739
Jihao Yin and
Chongyang Fu and
Jiankun Hu Using incremental subspace and contour
template for object tracking . . . . . . 1740--1748
Hamid Shokrzadeh and
Siavash Khorsandi and
Abolfazl Toroghi Haghighat Optimized query-driven appointment
routing based on
Expectation-Maximization in wireless
sensor networks . . . . . . . . . . . . 1749--1761
Kwangcheol Shin and
Kyungjun Kim and
Soontae Kim Traffic management strategy for
delay-tolerant networks . . . . . . . . 1762--1770
M. S. Kakkasageri and
S. S. Manvi Multiagent driven dynamic clustering of
vehicles in VANETs . . . . . . . . . . . 1771--1780
Alexandre Aguiar Amaral and
Bruno Bogaz Zarpelão and
Leonardo de Souza Mendes and
Joel José Puga Coelho Rodrigues and
Mario Lemes Proença Junior Inference of network anomaly propagation
using spatio-temporal correlation . . . 1781--1792
Q. Shi and
N. Zhang and
D. Llewellyn-Jones Efficient autonomous signature exchange
on ubiquitous networks . . . . . . . . . 1793--1806
Victoria Ying Zhang and
Albert Kai-sun Wong Kernel-based particle filtering for
indoor tracking in WLANs . . . . . . . . 1807--1817
Mourad Amad and
Ahmed Meddahi and
Djamil A\"\issani and
Zonghua Zhang HPM: a novel hierarchical Peer-to-Peer
model for lookup acceleration with
provision of physical proximity . . . . 1818--1830
Sandeep K. Sood A combined approach to ensure data
security in cloud computing . . . . . . 1831--1838
Zuowen Tan A lightweight conditional
privacy-preserving authentication and
access control scheme for pervasive
computing environments . . . . . . . . . 1839--1846
Bo Dong and
Qinghua Zheng and
Feng Tian and
Kuo-Ming Chao and
Rui Ma and
Rachid Anane An optimized approach for storing and
accessing small files on cloud storage 1847--1862
Rafael Antonello and
Stenio Fernandes and
Carlos Kamienski and
Djamel Sadok and
Judith Kelner and
István Gódor and
Géza Szabó and
Tord Westholm Deep packet inspection tools and
techniques in commodity platforms:
Challenges and trends . . . . . . . . . 1863--1878
Mari Carmen Domingo An overview of the Internet of
underwater things . . . . . . . . . . . 1879--1890
Javier Barrachina and
Piedad Garrido and
Manuel Fogue and
Francisco J. Martinez and
Juan-Carlos Cano and
Carlos T. Calafate and
Pietro Manzoni VEACON: a Vehicular Accident Ontology
designed to improve safety on the roads 1891--1900
Adamu Murtala Zungeru and
Li-Minn Ang and
Kah Phooi Seng Termite-hill: Performance optimized
swarm intelligence based routing
algorithm for wireless sensor networks 1901--1917
Mohamed Bakillah and
Mir Abolfazl Mostafavi and
Steve H. L. Liang and
Alexander Zipf Real time query propagation strategies
with Lightweight Coordination Calculus
(LCC) for ad hoc networks of geospatial
databases . . . . . . . . . . . . . . . 1918--1933
G. Fortino and
A. Guerrieri and
G. M. P. O'Hare and
A. Ruzzelli A flexible building management framework
based on wireless sensor and actuator
networks . . . . . . . . . . . . . . . . 1934--1952
Linfeng Liu and
Ruchuan Wang and
Fu Xiao Topology control algorithm for
underwater wireless sensor networks
using GPS-free mobile sensor nodes . . . 1953--1963
Gurpreet Singh and
Neeraj Kumar and
Anil Kumar Verma Ant colony algorithms in MANETs: a
review . . . . . . . . . . . . . . . . . 1964--1972
S. Sudha and
N. Ammasaigounden An aggregate marker for bandwidth
fairness in DiffServ . . . . . . . . . . 1973--1978
Li Li and
Qing-Shan Jia and
Hengtao Wang and
Ruixi Yuan and
Xiaohong Guan A systematic method for network topology
reconfiguration with limited link
additions . . . . . . . . . . . . . . . 1979--1989
Chih-Lin Hu and
Tzu-Han Kuo A hierarchical overlay with
cluster-based reputation tree for
dynamic peer-to-peer systems . . . . . . 1990--2002
Miguel Franklin de Castro and
Levi Bayde Ribeiro and
Camila Helena Souza Oliveira An autonomic bio-inspired algorithm for
wireless sensor network
self-organization and efficient routing 2003--2015
Mohammad H. Hajiesmaili and
Ahmad Khonsari and
Ali Sehati and
Mohammad Sadegh Talebi Content-aware rate allocation for
efficient video streaming via dynamic
network utility maximization . . . . . . 2016--2027
Javad Akbari Torkestani A distributed resource discovery
algorithm for P2P grids . . . . . . . . 2028--2036
D. Gregor and
S. L. Toral and
T. Ariza and
F. Barrero An ontology-based semantic service for
cooperative urban equipments . . . . . . 2037--2050
Qingyang Song and
Zhaolong Ning and
Shiqiang Wang and
Abbas Jamalipour Link stability estimation based on link
connectivity changes in mobile ad-hoc
networks . . . . . . . . . . . . . . . . 2051--2058
Süleyman Kardas and
Serkan Çelik and
Muhammet Yildiz and
Albert Levi PUF-enhanced offline RFID security and
privacy . . . . . . . . . . . . . . . . 2059--2067
Khalid A. Darabkh and
Shereen S. Ismail and
Mohammad Al-Shurman and
Iyad F. Jafar and
Eman Alkhader and
Mamoun F. Al-Mistarihi Performance evaluation of selective and
adaptive heads clustering algorithms
over wireless sensor networks . . . . . 2068--2080
Yi Xie and
J. Hu and
S. Tang and
X. Huang A structural approach for modelling the
hierarchical dynamic process of Web
workload in a large-scale campus network 2081--2091
Yuan-Cheng Lai and
Yen-Hung Chen A best block exploring algorithm for
two-dimensional downlink burst
construction in IEEE 802.16 networks . . 2092--2104
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdelkrim Hadjidj and
Marion Souil and
Abdelmadjid Bouabdallah and
Yacine Challal and
Henry Owen Wireless sensor networks for
rehabilitation applications: Challenges
and opportunities . . . . . . . . . . . 1--15
Hung-Jen Liao and
Chun-Hung Richard Lin and
Ying-Chih Lin and
Kuang-Yuan Tung Intrusion detection system: a
comprehensive review . . . . . . . . . . 16--24
Ahmed Patel and
Mona Taghavi and
Kaveh Bakhtiyari and
Joaquim Celestino Júnior An intrusion detection and prevention
system in cloud computing: a systematic
review . . . . . . . . . . . . . . . . . 25--41
Chirag Modi and
Dhiren Patel and
Bhavesh Borisaniya and
Hiren Patel and
Avi Patel and
Muttukrishnan Rajarajan A survey of intrusion detection
techniques in Cloud . . . . . . . . . . 42--57
Fadoua Mhiri and
Kaouthar Sethom and
Ridha Bouallegue A survey on interference management
techniques in femtocell self-organizing
networks . . . . . . . . . . . . . . . . 58--65
Md. Mahedi Hassan and
Poo Kuan Hoong Seamless handover integrated solution
for video transmission over proxy mobile
IPv6 in a micro mobility domain . . . . 66--76
Rodrigo Palucci Pantoni and
Dennis Brandão A gradient based routing scheme for
street lighting wireless sensor networks 77--90
D. Satish Kumar and
N. Nagarajan Relay technologies and technical issues
in IEEE 802.16j Mobile Multi-hop Relay
(MMR) networks . . . . . . . . . . . . . 91--102
Christos Emmanouilidis and
Remous-Aris Koutsiamanis and
Aimilia Tasidou Mobile guides: Taxonomy of
architectures, context awareness,
technologies and applications . . . . . 103--125
Saleem-ullah Lar and
Xiaofeng Liao An initiative for a classified
bibliography on TCP/IP congestion
control . . . . . . . . . . . . . . . . 126--133
A. J. Dinusha Rathnayaka and
Vidyasagar M. Potdar Wireless Sensor Network transport
protocol: a critical review . . . . . . 134--146
Slimane Bah and
Roch Glitho and
Rachida Dssouli A SIP servlets-based framework for
service provisioning in stand-alone
MANETs . . . . . . . . . . . . . . . . . 147--155
Seung-Wan Han and
In-Seon Jeong and
Seung-Ho Kang Low latency and energy efficient routing
tree for wireless sensor networks with
multiple mobile sinks . . . . . . . . . 156--166
Junjie Xiong and
Yangfan Zhou and
Michael R. Lyu and
Evan F. Y. Young MDiag: Mobility-assisted diagnosis for
wireless sensor networks . . . . . . . . 167--177
Wen Tao Zhu Towards secure and
communication-efficient broadcast
encryption systems . . . . . . . . . . . 178--186
Bing Hu and
Kwan L. Yeung and
Zhaoyang Zhang An efficient single-iteration single-bit
request scheduling algorithm for
input-queued switches . . . . . . . . . 187--194
Kemal Akkaya and
Izzet F. Senturk and
Shanthi Vemulapalli Handling large-scale node failures in
mobile sensor/robot networks . . . . . . 195--210
Zhan-feng Wang and
Ming Chen and
Chang-you Xing and
Jing Feng and
Xiang-lin Wei and
Hua-li Bai Multi-manifold model of the Internet
delay space . . . . . . . . . . . . . . 211--218
Jeroen Famaey and
Frédéric Iterbeke and
Tim Wauters and
Filip De Turck Towards a predictive cache replacement
strategy for multimedia content . . . . 219--227
Huan Dai and
Zhao-min Zhu and
Xiao-Feng Gu Multi-target indoor localization and
tracking on video monitoring system in a
wireless sensor network . . . . . . . . 228--234
Adeela Waqar and
Asad Raza and
Haider Abbas and
Muhammad Khurram Khan A framework for preservation of cloud
users' data privacy using dynamic
reconstruction of metadata . . . . . . . 235--248
Pekka Jäppinen and
Renata Guarneri and
Luis M. Correia An applications perspective into the
Future Internet . . . . . . . . . . . . 249--254
Isabel de la Torre-Díez and
Saúl Álvaro-Muñoz and
Miguel López-Coronado and
Joel Rodrigues Development and performance evaluation
of a new RSS tool for a Web-based
system: RSS\_PROYECT . . . . . . . . . . 255--261
Marjan Naderan and
Mehdi Dehghan and
Hossein Pedram Sensing task assignment via sensor
selection for maximum target coverage in
WSNs . . . . . . . . . . . . . . . . . . 262--273
Reinaldo B. Braga and
Igor A. Chaves and
Carina T. de Oliveira and
Rossana M. C. Andrade and
José Neuman de Souza and
Hervé Martin and
Bruno Schulze RETENTION: a reactive trust-based
mechanism to detect and punish malicious
nodes in ad hoc grid environments . . . 274--283
Lo-Yao Yeh and
Chun-Chuan Yang and
Jee-Gong Chang and
Yi-Lang Tsai A secure and efficient batch binding
update scheme for route optimization of
nested NEtwork MObility (NEMO) in VANETs 284--292
Minwoo Kim and
Karam Park and
Won W. Ro Benefits of using parallelized
non-progressive network coding . . . . . 293--305
Ting Yang and
Yugeng Sun and
Javid Taheri and
Albert Y. Zomaya DLS: a dynamic local stitching mechanism
to rectify transmitting path fragments
in wireless sensor networks . . . . . . 306--315
Kaiping Xue and
Changsha Ma and
Peilin Hong and
Rong Ding A temporal-credential-based mutual
authentication and key agreement scheme
for wireless sensor networks . . . . . . 316--323
Rafiqul Islam and
Jemal Abawajy A multi-tier phishing detection and
filtering approach . . . . . . . . . . . 324--335
Vishnu Monn Baskaran and
Yoong Choon Chang and
Jonathan Loo and
KokSheik Wong Software-based serverless endpoint video
combiner architecture for
high-definition multiparty video
conferencing . . . . . . . . . . . . . . 336--352
Mingfu Li and
Yueh-Lin Wu and
Chia-Rong Chang Available bandwidth estimation for the
network paths with multiple tight links
and bursty traffic . . . . . . . . . . . 353--367
Fadi M. Al-Turjman and
Hossam S. Hassanein and
Mohamad Ibnkahla Quantifying connectivity in wireless
sensor networks with grid-based
deployments . . . . . . . . . . . . . . 368--377
Xun Yi and
Eiji Okamoto Practical Internet voting system . . . . 378--387
Yuehua Wang and
Zhong Zhou and
Ling Liu and
Wei Wu Replica-aided load balancing in overlay
networks . . . . . . . . . . . . . . . . 388--401
D. Rosaci and
G. M. L. Sarné Cloning mechanisms to improve agent
performances . . . . . . . . . . . . . . 402--408
M. Hooshmand and
S. M. R. Soroushmehr and
P. Khadivi and
S. Samavi and
S. Shirani Visual sensor network lifetime
maximization by prioritized scheduling
of nodes . . . . . . . . . . . . . . . . 409--419
Weigang Hou and
Lei Guo and
Xiaoxue Gong Survivable power efficiency oriented
integrated grooming in green networks 420--428
Jesús L. Alvaro and
Beatriz Barros A new cloud computing architecture for
music composition . . . . . . . . . . . 429--443
I-Hsuan Peng and
Yen-Wen Chen Energy consumption bounds analysis and
its applications for grid based wireless
sensor networks . . . . . . . . . . . . 444--451
K. Salah and
M. Hamawi Performance of IP-forwarding of Linux
hosts with multiple network interfaces 452--465
Imran Baig and
Muhammad Ayaz and
Varun Jeoti On the peak-to-average power ratio
reduction in mobile WiMAX: a discrete
cosine transform matrix precoding based
random-interleaved orthogonal frequency
division multiple access uplink system 466--475
Mary Looney and
Oliver Gough A provision aware proportional fair
sharing three colour marker . . . . . . 476--483
Maria-Victoria Belmonte and
Manuel Díaz and
Jose-Luis Pérez-de-la-Cruz and
Ana Reyna COINS: COalitions and INcentiveS for
effective Peer-to-Peer downloads . . . . 484--497
Chao Lv and
Maode Ma and
Hui Li and
Jianfeng Ma and
Yaoyu Zhang An novel three-party authenticated key
exchange protocol using one-time key . . 498--503
Eugénia Moreira Bernardino and
Anabela Moreira Bernardino and
Juan Manuel Sánchez-Pérez and
Juan Antonio Gómez Pulido and
Miguel A. Vega Rodríguez Swarm optimisation algorithms applied to
large balanced communication networks 504--522
Haythem Bany Salameh and
Osamah S. Badarneh Opportunistic medium access control for
maximizing packet delivery rate in
dynamic access networks . . . . . . . . 523--532
Ting-Yi Chang and
Yan-Ru Ke A personalized e-course composition
based on a genetic algorithm with
forcing legality in an adaptive learning
system . . . . . . . . . . . . . . . . . 533--542
Sepideh Adabi and
Ali Movaghar and
Amir Masoud Rahmani and
Hamid Beigy Market-based grid resource allocation
using new negotiation model . . . . . . 543--565
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Bingdong Li and
Jeff Springer and
George Bebis and
Mehmet Hadi Gunes A survey of network flow applications 567--581
Shams Qazi and
Raad Raad and
Yi Mu and
Willy Susilo Securing DSR against wormhole attacks in
multirate ad hoc networks . . . . . . . 582--592
Ahmed Hassan Mohammed and
Bin Dai and
Benxiong Huang and
Muhammad Azhar and
Guan Xu and
Peng Qin and
Shui Yu A survey and tutorial of wireless relay
network protocols based on network
coding . . . . . . . . . . . . . . . . . 593--610
Xiaobing He and
Michael Niedermeier and
Hermann de Meer Dynamic key management in wireless
sensor networks: a survey . . . . . . . 611--622
Sudhanshu Tyagi and
Neeraj Kumar A systematic review on clustering and
routing techniques based upon LEACH
protocol for wireless sensor networks 623--645
Rafiqul Islam and
Ronghua Tian and
Lynn M. Batten and
Steve Versteeg Classification of malware based on
integrated static and dynamic features 646--656
Kun Huang and
Gaogang Xie and
Rui Li and
Shuai Xiong Fast and deterministic hash table lookup
using discriminative Bloom filters . . . 657--666
Chiapin Wang Dynamic ARF for throughput improvement
in 802.11 WLAN via a machine-learning
approach . . . . . . . . . . . . . . . . 667--676
Eyüp S. Canlar and
Mauro Conti and
Bruno Crispo and
Roberto Di Pietro Windows Mobile LiveSD Forensics . . . . 677--684
Sardar Muhammad Bilal and
Carlos Jesus Bernardos and
Carmen Guerrero Position-based routing in vehicular
networks: a survey . . . . . . . . . . . 685--697
M. Kretschmer and
P. Batroff and
G. Ghinea Topology forming and optimization
framework for heterogeneous wireless
back-haul networks supporting
unidirectional technologies . . . . . . 698--710
Najme Mansouri and
Gholam Hosein Dastghaibyfard and
Ehsan Mansouri Combination of data replication and
scheduling algorithm for improving data
availability in Data Grids . . . . . . . 711--722
D. C. Vasiliadis and
G. E. Rizos and
C. Vassilakis Modelling and performance study of
finite-buffered blocking multistage
interconnection networks supporting
natively $2$-class priority routing
traffic . . . . . . . . . . . . . . . . 723--737
Shiliang Luo and
Xu Lu and
Lianglun Cheng TSOIA: an efficient node selection
algorithm facing the uncertain process
for Internet of Things . . . . . . . . . 738--743
Gimer Cervera and
Michel Barbeau and
Joaquin Garcia-Alfaro and
Evangelos Kranakis A multipath routing strategy to prevent
flooding disruption attacks in link
state routing protocols for MANETs . . . 744--755
Kuang-Yow Lian and
Sung-Jung Hsiao and
Wen-Tsai Sung Intelligent multi-sensor control system
based on innovative technology
integration via ZigBee and Wi-Fi
networks . . . . . . . . . . . . . . . . 756--767
Po-Ching Lin and
Jia-Hau Lee Re-examining the performance bottleneck
in a NIDS with detailed profiling . . . 768--780
Yan Yang and
Yulong Zhang and
Alex Hai Wang and
Meng Yu and
Wanyu Zang and
Peng Liu and
Sushil Jajodia Quantitative survivability evaluation of
three virtual machine-based server
architectures . . . . . . . . . . . . . 781--790
C. Xu and
C. Du and
G. F. Zhao and
S. Yu A novel model for user clicks
identification based on hidden
semi-Markov . . . . . . . . . . . . . . 791--798
Jian An and
Xiaolin Gui and
Wendong Zhang and
Jinhua Jiang and
Jianwei Yang Research on social relations cognitive
model of mobile nodes in Internet of
Things . . . . . . . . . . . . . . . . . 799--810
Yanheng Liu and
Longxiang Suo and
Dayang Sun and
Aimin Wang A virtual square grid-based coverage
algorithm of redundant node for wireless
sensor network . . . . . . . . . . . . . 811--817
Peng Xiao and
Zhigang Hu and
Dongbo Liu and
Guofeng Yan and
Xilong Qu Virtual machine power measuring
technique with bounded error in cloud
environments . . . . . . . . . . . . . . 818--828
Gaik-Yee Chan and
Chien-Sing Lee and
Swee-Huay Heng Discovering fuzzy association rule
patterns and increasing sensitivity
analysis of XML-related attacks . . . . 829--842
Yuhuai Peng and
Yao Yu and
Lei Guo and
Dingde Jiang and
Qiming Gai An efficient joint channel assignment
and QoS routing protocol for IEEE 802.11
multi-radio multi-channel wireless mesh
networks . . . . . . . . . . . . . . . . 843--857
Shahram Jamali and
Seyyed Nasser Seyyed Hashemi and
Amir Masoud Eftekhari Moghadam On the use of a full information
feedback to stabilize RED . . . . . . . 858--869
Abraham Martín-Campillo and
Jon Crowcroft and
Eiko Yoneki and
Ramon Martí Evaluating opportunistic networks in
disaster scenarios . . . . . . . . . . . 870--880
Mahesh Kumar and
Shishir Kumar AGRIB-BHF: a sustainable and fault
tolerant aggregation . . . . . . . . . . 881--886
Mahmoud Al-shugran and
Osman Ghazali and
Suhaidi Hassan and
Kashif Nisar and
A. Suki M. Arif A qualitative comparison evaluation of
the greedy forwarding strategies in
Mobile Ad Hoc Network . . . . . . . . . 887--897
Laisen Nie and
Dingde Jiang and
Lei Guo A power laws-based reconstruction
approach to end-to-end network traffic 898--907
Enver Ever and
Orhan Gemikonakli and
Altan Kocyigit and
Eser Gemikonakli A hybrid approach to minimize state
space explosion problem for the solution
of two stage tandem queues . . . . . . . 908--926
Hu Xiong and
Zhong Chen and
Fagen Li New identity-based three-party
authenticated key agreement protocol
with provable security . . . . . . . . . 927--932
Kashif Nisar and
Angela Amphawan and
Suhaidi Hassan and
Nurul I. Sarkar A comprehensive survey on scheduler for
VoIP over WLAN . . . . . . . . . . . . . 933--948
Mohamed K. Watfa and
Haitham Al-Hassanieh and
Samir Salmen A novel solution to the energy hole
problem in sensor networks . . . . . . . 949--958
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and
Russel Hsing and
Min Chen and
Bingli Jiao and
Binod Vaidya Guest Editorial on Vehicular Networking
Protocols . . . . . . . . . . . . . . . 959--960
António Fonseca and
Teresa Vazão Applicability of position-based routing
for VANET in highways and urban
environment . . . . . . . . . . . . . . 961--973
Rajashree Nair and
Ben Soh and
Naveen Chilamkurti and
James J. (Jong Hyuk) Park Structure-free message aggregation and
routing in traffic information system
(SMART) . . . . . . . . . . . . . . . . 974--980
Salim Bitam and
Abdelhamid Mellouk Bee life-based multi constraints
multicast routing optimization for
vehicular ad hoc networks . . . . . . . 981--991
Zhenxia Zhang and
Azzedine Boukerche and
Hussam Ramadan Design and evaluation of a fast MAC
layer handoff management scheme for
WiFi-based multichannel Vehicular Mesh
Networks . . . . . . . . . . . . . . . . 992--1000
Angelos Antonopoulos and
Charalabos Skianis and
Christos Verikoukis Network coding-based cooperative ARQ
scheme for VANETs . . . . . . . . . . . 1001--1007
Navid Tadayon and
Sasan Khoshroo and
Elaheh Askari and
Honggang Wang and
Howard Michel Power management in SMAC-based
energy-harvesting wireless sensor
networks using queuing analysis . . . . 1008--1017
Youxiang Wang and
Jianquan Wang and
Lu Zhaobiao and
Xingang Liu Performance improvement of QO-STBC over
time-selective channel for wireless
network . . . . . . . . . . . . . . . . 1018--1026
Jaime Lloret and
Alejandro Canovas and
Angel Catalá and
Miguel Garcia Group-based protocol and mobility model
for VANETs to offer Internet access . . 1027--1038
Md. Humayun Kabir and
Mohammad Mukhtaruzzaman and
Mohammed Atiquzzaman Efficient route optimization scheme for
nested-NEMO . . . . . . . . . . . . . . 1039--1049
Liren Zhang and
Abderrahmane Lakas and
Hesham El-Sayed and
Ezedin Barka Mobility analysis in vehicular ad hoc
network (VANET) . . . . . . . . . . . . 1050--1056
Yejun Liu and
Qingyang Song and
Rui Ma and
Bing Li and
Bo Gong Protection based on backup radios and
backup fibers for survivable
Fiber-Wireless (FiWi) access network . . 1057--1069
Jian-Zhen Luo and
Shun-Zheng Yu Position-based automatic reverse
engineering of network protocols . . . . 1070--1077
Masoud Zarifneshat and
Pejman Khadivi Using mobile node speed changes for
movement direction change prediction in
a realistic category of mobility models 1078--1090
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ebrahim Mahdipour and
Amir Masoud Rahmani and
Saeed Setayeshi Importance sampling for Jackson networks
with customer impatience until the end
of service . . . . . . . . . . . . . . . 1091--1101
C. Dumez and
M. Bakhouya and
J. Gaber and
M. Wack and
P. Lorenz Model-driven approach supporting formal
verification for web service composition
protocols . . . . . . . . . . . . . . . 1102--1115
Nader Mohamed and
Jameela Al-Jaroodi and
Abdulla Eid A dual-direction technique for fast file
downloads with dynamic load balancing in
the Cloud . . . . . . . . . . . . . . . 1116--1130
Ammar Haider and
Iqbal Gondal and
Joarder Kamruzzaman Social-connectivity-aware vertical
handover for heterogeneous wireless
networks . . . . . . . . . . . . . . . . 1131--1139
A. Cagatay Talay and
D. Turgay Altilar Self adaptive routing for dynamic
spectrum access in cognitive radio
networks . . . . . . . . . . . . . . . . 1140--1151
Jasone Astorga and
Marina Aguado and
Nerea Toledo and
Marivi Higuero A high performance link layer mobility
management strategy for professional
private broadband networks . . . . . . . 1152--1163
Chien-Chao Tseng and
Chia-Liang Lin and
Li-Hsing Yen and
Jyun-Yan Liu and
Cheng-Yuan Ho Can: a context-aware NAT traversal
scheme . . . . . . . . . . . . . . . . . 1164--1173
D. D. Geeta and
N. Nalini and
Rajashekhar C. Biradar Fault tolerance in wireless sensor
network using hand-off and dynamic power
adjustment approach . . . . . . . . . . 1174--1185
Chao-Yang Lee and
Liang-Cheng Shiu and
Fu-Tian Lin and
Chu-Sing Yang Distributed topology control algorithm
on broadcasting in wireless sensor
network . . . . . . . . . . . . . . . . 1186--1195
El-Sayed M. El-Alfy and
Syed N. Mujahid and
Shokri Z. Selim A Pareto-based hybrid multiobjective
evolutionary approach for constrained
multipath traffic engineering
optimization in MPLS/GMPLS networks . . 1196--1207
Ying-Dar Lin and
Cheng-Yuan Ho and
Yuan-Cheng Lai and
Tzu-Hsiung Du and
Shun-Lee Chang Booting, browsing and streaming time
profiling, and bottleneck analysis on
Android-based systems . . . . . . . . . 1208--1218
Anwar Saif and
Mohamed Othman SRA-MSDU: Enhanced A-MSDU frame
aggregation with selective
retransmission in 802.11n wireless
networks . . . . . . . . . . . . . . . . 1219--1229
Muhammad Hamad Alizai and
Hanno Wirtz and
Bernhard Kirchen and
Klaus Wehrle Portable wireless-networking protocol
evaluation . . . . . . . . . . . . . . . 1230--1242
Mohammad Masdari and
Sadegh Mohammadzadeh Bazarchi and
Moazam Bidaki Analysis of Secure LEACH-Based
Clustering Protocols in Wireless Sensor
Networks . . . . . . . . . . . . . . . . 1243--1260
Aishwarya Bakshi and
Amir Talaei-Khoei and
Pradeep Ray Adaptive policy framework: a systematic
review . . . . . . . . . . . . . . . . . 1261--1271
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and
Russel Hsing and
Min Chen and
Bingli Jiao and
Binod Vaidya Guest editorial on vehicular
communications and applications . . . . 1273--1274
C. Campolo and
H. A. Cozzetti and
A. Molinaro and
R. Scopigno Augmenting Vehicle-to-Roadside
connectivity in multi-channel vehicular
Ad Hoc Networks . . . . . . . . . . . . 1275--1286
Yazhi Liu and
Jianwei Niu and
Jian Ma and
Lei Shu and
Takahiro Hara and
Wendong Wang The insights of message delivery delay
in VANETs with a bidirectional traffic
model . . . . . . . . . . . . . . . . . 1287--1294
R. Bauza and
J. Gozalvez Traffic congestion detection in
large-scale scenarios using
vehicle-to-vehicle communications . . . 1295--1307
Nitin Maslekar and
Joseph Mouzna and
Mounir Boussedjra and
Houda Labiod CATS: an adaptive traffic signal system
based on car-to-car communication . . . 1308--1315
Kai Lin Research on adaptive target tracking in
vehicle sensor networks . . . . . . . . 1316--1323
Nerea Toledo and
Jean Marie Bonnin and
Marivi Higuero Performance evaluation of user
applications in the ITS scenario: an
analytical assessment of the NeMHIP . . 1324--1336
Carlos Gañán and
Jose L. Muñoz and
Oscar Esparza and
Jorge Mata-Díaz and
Juan Hernández-Serrano and
Juanjo Alins COACH: COllaborative certificate stAtus
CHecking mechanism for VANETs . . . . . 1337--1351
Bidi Ying and
Dimitrios Makrakis and
Hussein T. Mouftah Privacy preserving broadcast message
authentication protocol for VANETs . . . 1352--1364
Xiong Li and
Jianwei Niu and
Muhammad Khurram Khan and
Junguo Liao An enhanced smart card based remote user
password authentication scheme . . . . . 1365--1371
Hai Van Luu and
Xueyan Tang Constructing rings overlay for robust
data collection in wireless sensor
networks . . . . . . . . . . . . . . . . 1372--1386
Ting Chen and
Xiao-song Zhang and
Hong-yuan Li and
Dong Wang and
Yue Wu Propagation modeling of active P2P worms
based on ternary matrix . . . . . . . . 1387--1394
Sulma Rashid and
Abdul Hanan Abdullah and
Qaisar Ayub and
M. Soperi Mohd Zahid Dynamic Prediction based Multi Queue
(DPMQ) drop policy for probabilistic
routing protocols of delay tolerant
network . . . . . . . . . . . . . . . . 1395--1402
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Weiming Shen and
Weidong Li Collaboration technologies and
applications . . . . . . . . . . . . . . 1403--1404
Steven Latré and
Jeroen Famaey and
John Strassner and
Filip De Turck Automated context dissemination for
autonomic collaborative networks through
semantic subscription filter generation 1405--1417
Yuanhao Xu and
Guofu Yin and
Yong Nie and
Zhengwei He and
Xiaolin Dai Research on an active knowledge push
service based on collaborative intent
capture . . . . . . . . . . . . . . . . 1418--1430
Tao Wu and
Xiaobing Pei and
Yongzhong Lu and
Changqing Chen and
Liang Gao A distributed collaborative product
design environment based on semantic
norm model and role-based access control 1431--1440
Amy J. C. Trappey and
Charles V. Trappey and
Chun-Yi Wu and
Chin Yuan Fan and
Yi-Liang Lin Intelligent patent recommendation system
for innovative design collaboration . . 1441--1450
Diego Carvalho Soares and
Flávia Maria Santoro and
Fernanda Araujo Baião Discovering collaborative
knowledge-intensive processes through
e-mail mining . . . . . . . . . . . . . 1451--1465
Pedro Antunes and
David Simões and
Luis Carriço and
José A. Pino An end-user approach to business process
modeling . . . . . . . . . . . . . . . . 1466--1479
Rahat Iqbal and
Nazaraf Shah and
Anne James and
Tomasz Cichowicz Integration, optimization and usability
of enterprise applications . . . . . . . 1480--1488
Leijie Fu and
Pingyu Jiang and
Wei Cao Modeling and performance analysis of
product development process network . . 1489--1502
Ta-Ping Lu and
Amy J. C. Trappey and
Yi-Kuang Chen and
Yu-Da Chang Collaborative design and analysis of
supply chain network management key
processes model . . . . . . . . . . . . 1503--1511
Yuan Cheng and
Fazhi He and
Xiantao Cai and
Dejun Zhang A group Undo/Redo method in 3D
collaborative modeling systems with
performance evaluation . . . . . . . . . 1512--1522
Jiancheng Shi and
Jianhua Liu and
Ruxin Ning and
Weiwei Hou A collisions evaluation method in
virtual environment for collaborative
assembly . . . . . . . . . . . . . . . . 1523--1530
Bin Guo and
Daqing Zhang and
Zhu Wang and
Zhiwen Yu and
Xingshe Zhou Opportunistic IoT: Exploring the
harmonious interaction between human and
the Internet of Things . . . . . . . . . 1531--1539
Yang Yang and
Xinyu Li and
Liang Gao and
Xinyu Shao A new approach for predicting and
collaborative evaluating the cutting
force in face milling based on gene
expression programming . . . . . . . . . 1540--1550
Jesús Gallardo and
Ana I. Molina and
Crescencio Bravo and
Miguel A. Redondo A model-driven and task-oriented method
for the development of collaborative
systems . . . . . . . . . . . . . . . . 1551--1565
María Blanca Ibáñez and
José J. García Rueda and
David Maroto and
Carlos Delgado Kloos Collaborative learning in multi-user
virtual environments . . . . . . . . . . 1566--1576
Weiming Shen and
Weidong Li Collaboration computing technologies and
applications . . . . . . . . . . . . . . 1577--1578
Dujuan Gu and
Xiaohan Liu and
Gang Qin and
Shuangjian Yan and
Ze luo and
Baoping Yan VNET6: IPv6 virtual network for the
collaboration between applications and
networks . . . . . . . . . . . . . . . . 1579--1588
Anbazhagan Rajesh and
Rangaswamy Nakkeeran Investigation on uplink collaborative
contention-based bandwidth request for
WiMAX three hop relay networks . . . . . 1589--1598
Yuanyuan Pan and
Jianqing Li Cooperative pseudonym change scheme
based on the number of neighbors in
VANETs . . . . . . . . . . . . . . . . . 1599--1609
Dami\`a Castell\`a and
Francesc Giné and
Francesc Solsona and
Josep Lluis Lérida Analyzing locality over a P2P computing
architecture . . . . . . . . . . . . . . 1610--1619
Josep Rius and
Fernando Cores and
Francesc Solsona Cooperative scheduling mechanism for
large-scale peer-to-peer computing
systems . . . . . . . . . . . . . . . . 1620--1631
Sheng-Cheng Yeh and
Ming-Yang Su and
Hui-Hui Chen and
Chun-Yuen Lin An efficient and secure approach for a
cloud collaborative editing . . . . . . 1632--1641
Hongchen Wu and
Xinjun Wang and
Zhaohui Peng and
Qingzhong Li Div-clustering: Exploring active users
for social collaborative recommendation 1642--1650
Ho Leung Li and
Vincent T. Y. Ng Discovering associations between news
and contents in social network sites
with the D-Miner service framework . . . 1651--1659
Xiaogang Wang and
Ming Yang and
Junzhou Luo A novel sequential watermark detection
model for efficient traceback of secret
network attack flows . . . . . . . . . . 1660--1670
Jian Jiang and
Wei Li and
Junzhou Luo and
Jing Tan A network accountability based
verification mechanism for detecting
inter-domain routing path inconsistency 1671--1683
JunPing Wang and
Qiliang Zhu and
Yan Ma An agent-based hybrid service delivery
for coordinating Internet of Things and
3rd party service providers . . . . . . 1684--1695
Wenfeng Li and
Ye Zhong and
Xun Wang and
Yulian Cao Resource virtualization and service
selection in cloud logistics . . . . . . 1696--1704
Mojtaba Seyedzadegan and
Mohamed Othman and
Borhanuddin Mohd Ali and
Shamala Subramaniam Zero-Degree algorithm for Internet
GateWay placement in backbone wireless
mesh networks . . . . . . . . . . . . . 1705--1723
Wu-Hsiao Hsu and
Yuh-Pyng Shieh Virtual network mapping algorithm in the
cloud infrastructure . . . . . . . . . . 1724--1734
Juan Felipe Botero and
Miguel Molina and
Xavier Hesselbach-Serra and
José Roberto Amazonas A novel paths algebra-based strategy to
flexibly solve the link mapping stage of
VNE problems . . . . . . . . . . . . . . 1735--1752
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hyuk Lim and
James Chang Wu Yu and
Binod Vaidya Advances in multimedia services over
emerging wireless networks . . . . . . . 1
Pradipta De and
Nilanjan Banerjee and
Swades De Exploiting multiple description coding
for intermediate recovery in wireless
mesh networks . . . . . . . . . . . . . 2--11
Paulo A. Neves and
Joel J. P. C. Rodrigues and
Min Chen and
Athanasios V. Vasilakos A multi-channel architecture for
IPv6-enabled wireless sensor and
actuator networks featuring PnP support 12--24
Soocheol Lee and
Seungmin Rho and
Jong Hyuk Park Multimedia contents adaptation by
modality conversion with user preference
in wireless network . . . . . . . . . . 25--32
Hayoung Yoon and
JongWon Kim and
Robert Hsieh Peer-assisted video on-demand streaming
system in practical WiFi-based mobile
opportunistic networks . . . . . . . . . 33--44
Maria Ganzha and
Marcin Paprzycki Agent-oriented computing for distributed
systems and networks . . . . . . . . . . 45--46
Dongsoo Kim and
Eric Noel and
K. Wendy Tang Expanded Borel Cayley Graphs (Ex-BCGs):
a novel communication topology for
multi-agent systems . . . . . . . . . . 47--61
Shashank Srivastava and
G. C. Nandi Self-reliant mobile code: a new
direction of agent security . . . . . . 62--75
Antonín Komenda and
Peter Novák and
Michal Pechoucek Domain-independent multi-agent plan
repair . . . . . . . . . . . . . . . . . 76--88
Sepideh Adabi and
Ali Movaghar and
Amir Masoud Rahmani and
Hamid Beigy and
Hengameh Dastmalchy-Tabrizi A new fuzzy negotiation protocol for
grid resource allocation . . . . . . . . 89--126
Giancarlo Fortino and
Wilma Russo and
Marino Vaccaro An agent-based approach for the design
and analysis of content delivery
networks . . . . . . . . . . . . . . . . 127--145
Álvaro Carrera and
Carlos A. Iglesias and
Javier García-Algarra and
Dusan Kolarík A real-life application of multi-agent
systems for fault diagnosis in the
provision of an Internet business
service . . . . . . . . . . . . . . . . 146--154
Wenjia Niu and
Gang Li and
Endong Tong and
Xinghua Yang and
Liang Chang and
Zhongzhi Shi and
Song Ci Interaction relationships of caches in
agent-based HD video surveillance:
Discovery and utilization . . . . . . . 155--169
Jaime Galán-Jiménez and
Alfonso Gazo-Cervero Using bio-inspired algorithms for energy
levels assessment in energy efficient
wired communication networks . . . . . . 171--185
Jiguo Yu and
Qingbo Zhang and
Dongxiao Yu and
Congcong Chen and
Guanghui Wang Domatic partition in homogeneous
wireless sensor networks . . . . . . . . 186--193
Demetris Hoplaros and
Zahir Tari and
Ibrahim Khalil Data summarization for network traffic
monitoring . . . . . . . . . . . . . . . 194--205
Chi-Tao Chiang and
Hung-Chang Chen and
Wen-Hwa Liao and
Kuei-Ping Shih A decentralized minislot scheduling
protocol (DMSP) in TDMA-based wireless
mesh networks . . . . . . . . . . . . . 206--215
Abbas Ali Rezaee and
Mohammad Hossein Yaghmaee and
Amir Masoud Rahmani and
Amir Hossein Mohajerzadeh HOCA: Healthcare Aware Optimized
Congestion Avoidance and control
protocol for wireless sensor networks 216--228
Chih-Min Chao and
Tzu-Ying Hsiao Design of structure-free and
energy-balanced data aggregation in
wireless sensor networks . . . . . . . . 229--239
Sajjad Zare and
Akbar Ghaffarpour Rahbar Congestion control in IPTV over PON
using Digital Fountain forward error
correction . . . . . . . . . . . . . . . 240--252
Feng Li and
Li Wang and
Weidang Lu Potential bargaining for resource
allocation in cognitive relay
transmission . . . . . . . . . . . . . . 253--258
Yuhuai Peng and
Qingyang Song and
Yao Yu and
Fei Wang Fault-tolerant routing mechanism based
on network coding in wireless mesh
networks . . . . . . . . . . . . . . . . 259--272
Yuemei Xu and
Yang Li and
Tao Lin and
Zihou Wang and
Wenjia Niu and
Hui Tang and
Song Ci A novel cache size optimization scheme
based on manifold learning in Content
Centric Networking . . . . . . . . . . . 273--281
Jacques M. Bahi and
Xiaole Fang and
Christophe Guyeux and
Qianxue Wang Suitability of chaotic iterations
schemes using XORshift for security
applications . . . . . . . . . . . . . . 282--292
Conor Cameron and
Ibrahim Khalil and
Zahir Tari An ID-based approach to the caching and
distribution of peer-to-peer,
proxy-based video content . . . . . . . 293--314
Wei Zheng and
Tao Su and
Haijun Zhang and
Wei Li and
Xiaoli Chu and
Xiangming Wen Distributed power optimization for
spectrum-sharing femtocell networks: a
fictitious game approach . . . . . . . . 315--322
Guilin Li and
Longjiang Guo and
Xing Gao and
Minghong Liao Bloom filter based processing algorithms
for the multi-dimensional event query in
wireless sensor networks . . . . . . . . 323--333
Jianwei Niu and
Wenfang Song and
Mohammed Atiquzzaman Bandwidth-adaptive partitioning for
distributed execution optimization of
mobile applications . . . . . . . . . . 334--347
Binh Viet Phan and
Eric Pardede Active XML (AXML) research: Survey on
the representation, system architecture,
data exchange mechanism and query
evaluation . . . . . . . . . . . . . . . 348--364
Harjit Pal Singh and
Sarabjeet Singh and
J. Singh and
S. A. Khan VoIP: State of art for global
connectivity --- a critical review . . . 365--379
Saif Al-Sultan and
Moath M. Al-Doori and
Ali H. Al-Bayatti and
Hussien Zedan A comprehensive survey on vehicular Ad
Hoc network . . . . . . . . . . . . . . 380--392
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ilsun You and
Marek R. Ogiela and
A. Min Tjoa and
Dongwan Shin Advanced technologies for homeland
defense and security . . . . . . . . . . 1--2
Leszek T. Lilien and
Lotfi ben Othmane and
Pelin Angin and
Andrew DeCarlo and
Raed M. Salih and
Bharat Bhargava A simulation study of ad hoc networking
of UAVs with opportunistic resource
utilization networks . . . . . . . . . . 3--15
Dongjin Choi and
Byeongkyu Ko and
Heesun Kim and
Pankoo Kim Text analysis for detecting
terrorism-related articles on the web 16--21
Aniello Castiglione and
Roberto De Prisco and
Alfredo De Santis and
Ugo Fiore and
Francesco Palmieri A botnet-based command and control
approach relying on swarm intelligence 22--33
Lidia Ogiela and
Marek R. Ogiela Cognitive systems and bio-inspired
computing in homeland security . . . . . 34--42
Seung-Hyun Seo and
Aditi Gupta and
Asmaa Mohamed Sallam and
Elisa Bertino and
Kangbin Yim Detecting mobile malware threats to
homeland security through static
analysis . . . . . . . . . . . . . . . . 43--53
Kerem Irgan and
Cem Ünsalan and
Sebnem Baydere Low-cost prioritization of image blocks
in wireless sensor networks for border
surveillance . . . . . . . . . . . . . . 54--64
Luigi Catuogno and
Hans Löhr and
Marcel Winandy and
Ahmad-Reza Sadeghi A trusted versioning file system for
passive mobile storage devices . . . . . 65--75
Zang Li and
Chao-Hsien Chu and
Wen Yao A semantic authorization model for
pervasive healthcare . . . . . . . . . . 76--87
Hsing-Chung Chen A multi-issued tag key agreement with
time constraint for homeland defense
sub-department in NFC environment . . . 88--98
Jong-Yeon Park and
Dong-Guk Han and
Okyeon Yi and
JeongNyeo Kim An improved side channel attack using
event information of subtraction . . . . 99--105
Subir Halder and
Sipra Das Bit Enhancement of wireless sensor network
lifetime by deploying heterogeneous
nodes . . . . . . . . . . . . . . . . . 106--124
Sheng Gao and
Jianfeng Ma and
Cong Sun and
Xinghua Li Balancing trajectory privacy and data
utility using a personalized
anonymization model . . . . . . . . . . 125--134
Gaya K. Jayasinghe and
J. Shane Culpepper and
Peter Bertok Efficient and effective realtime
prediction of drive-by download attacks 135--149
Hai Van Luu and
Xueyan Tang An efficient algorithm for scheduling
sensor data collection through
multi-path routing structures . . . . . 150--162
Mohammad Doraghinejad and
Hossein Nezamabadi-pour and
Ali Mahani Channel assignment in multi-radio
wireless mesh networks using an improved
gravitational search algorithm . . . . . 163--171
Messaoud Doudou and
Djamel Djenouri and
Nadjib Badache and
Abdelmadjid Bouabdallah Synchronous contention-based MAC
protocols for delay-sensitive wireless
sensor networks: a review and taxonomy 172--184
Wenjing Guo and
Wei Zhang A survey on intelligent routing
protocols in wireless sensor networks 185--201
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hélder Pereira Borges and
José Neuman de Souza and
Bruno Schulze and
Antonio Roberto Mury Automatic services instantiation based
on a process specification . . . . . . . 1--16
Ali Mohammed Alsahag and
Borhanuddin Mohd Ali and
Nor Kamariah Noordin and
Hafizal Mohamad Fair uplink bandwidth allocation and
latency guarantee for mobile WiMAX using
fuzzy adaptive deficit round robin . . . 17--25
Ding-Jie Huang and
Wei-Chung Teng A defense against clock skew replication
attacks in wireless sensor networks . . 26--37
Endong Tong and
Wenjia Niu and
Gang Li and
Ding Tang and
Liang Chang and
Zhongzhi Shi and
Song Ci Bloom filter-based workflow management
to enable QoS guarantee in wireless
sensor networks . . . . . . . . . . . . 38--51
Feng-Ming Yang and
Wei-Mei Chen and
Jean-Lien C. Wu A dynamic strategy for packet scheduling
and bandwidth allocation based on
channel quality in IEEE 802.16e OFDMA
system . . . . . . . . . . . . . . . . . 52--60
Zhaolong Ning and
Qingyang Song and
Yang Huang and
Lei Guo A channel estimation based opportunistic
scheduling scheme in wireless
bidirectional networks . . . . . . . . . 61--69
Haidar Safa and
Wassim El-Hajj and
Hanan Zoubian A robust topology control solution for
the sink placement problem in WSNs . . . 70--82
Yuxin Meng and
Lam-For Kwok Adaptive blacklist-based packet filter
with a statistic-based approach in
network intrusion detection . . . . . . 83--92
Smitha Shivshankar and
Abbas Jamalipour Spatio-temporal multicast grouping for
content-based routing in vehicular
networks: a distributed approach . . . . 93--103
Huailiang Tan and
Lianjun Huang and
Zaihong He and
Youyou Lu and
Xubin He DMVL: an I/O bandwidth dynamic
allocation method for virtual networks 104--116
Ali Moussaoui and
Fouzi Semchedine and
Abdallah Boukerram A link-state QoS routing protocol based
on link stability for Mobile Ad hoc
Networks . . . . . . . . . . . . . . . . 117--125
Abderrahim Benslimane and
Abderrezak Rachedi Rate adaptation scheme for IEEE
802.11-based MANETs . . . . . . . . . . 126--139
V. R. Budyal and
S. S. Manvi ANFIS and agent based bandwidth and
delay aware anycast routing in mobile ad
hoc networks . . . . . . . . . . . . . . 140--151
Wiem Tounsi and
Nora Cuppens-Boulahia and
Joaquin Garcia-Alfaro and
Yannick Chevalier and
Frédéric Cuppens KEDGEN2: a key establishment and
derivation protocol for EPC Gen2 RFID
systems . . . . . . . . . . . . . . . . 152--166
Aukrit Chadagorn and
Ibrahim Khalil and
Conor Cameron and
Zahir Tari PileCast: Multiple bit rate live video
streaming over BitTorrent . . . . . . . 167--178
Osama Al-Haj Hassan and
Thamer Al-Rousan and
Anas Abu Taleb and
Adi Maaita An efficient and scalable ranking
technique for mashups involving RSS data
sources . . . . . . . . . . . . . . . . 179--190
Ousmane Diallo and
Joel J. P. C. Rodrigues and
Mbaye Sene and
Jaime Lloret Simulation framework for real-time
database on WSNs . . . . . . . . . . . . 191--201
Tien-Wen Sung and
Chu-Sing Yang Voronoi-based coverage improvement
approach for wireless directional sensor
networks . . . . . . . . . . . . . . . . 202--213
Carlo Mastroianni and
Giuseppe Papuzzo A self-organizing P2P framework for
collective service discovery . . . . . . 214--222
Younghyun Kim and
Haneul Ko and
Sangheon Pack and
Jong-Hyouk Lee and
Seok-Joo Koh and
Heeyoung Jung Performance analysis of distributed
mapping system in ID/locator separation
architectures . . . . . . . . . . . . . 223--232
J. R. Gisbert and
C. Palau and
M. Uriarte and
G. Prieto and
J. A. Palazón and
M. Esteve and
O. López and
J. Correas and
M. C. Lucas-Estañ and
P. Giménez and
A. Moyano and
L. Collantes and
J. Gozálvez and
B. Molina and
O. Lázaro and
A. González Integrated system for control and
monitoring industrial wireless networks
for labor risk prevention . . . . . . . 233--252
Alper Rifat Ulucinar and
Ibrahim Korpeoglu and
Ezhan Karasan Effects of physical channel separation
on application flows in a multi-radio
multi-hop wireless mesh network: an
experimental study on BilMesh testbed 253--265
Mahantesh N. Birje and
Sunilkumar S. Manvi and
Sajal K. Das Reliable resources brokering scheme in
wireless grids based on non-cooperative
bargaining game . . . . . . . . . . . . 266--279
Shilei Lu and
Shunzheng Yu A fuzzy $k$-coverage approach for RFID
network planning using plant growth
simulation algorithm . . . . . . . . . . 280--291
Jenn Tang Designing an Anti-swindle Mahjong
Leisure Prototype System using RFID and
ontology theory . . . . . . . . . . . . 292--301
Qaisar Ayub and
Sulma Rashid and
M. Soperi Mohd Zahid and
Abdul Hanan Abdullah Contact quality based forwarding
strategy for delay tolerant network . . 302--309
Xuxun Liu and
Desi He Ant colony optimization with greedy
migration mechanism for node deployment
in wireless sensor networks . . . . . . 310--318
Damianos Gavalas and
Charalampos Konstantopoulos and
Konstantinos Mastakas and
Grammati Pantziou Mobile recommender systems in tourism 319--333
M. S. Kakkasageri and
S. S. Manvi Information management in vehicular ad
hoc networks: a review . . . . . . . . . 334--350
Hero Modares and
Amirhossein Moravejosharieh and
Jaime Lloret and
Rosli Salleh A survey of secure protocols in Mobile
IPv6 . . . . . . . . . . . . . . . . . . 351--368
Muhammad Nouman Durrani and
Jawwad A. Shamsi Volunteer computing: requirements,
challenges, and solutions . . . . . . . 369--380
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jine Tang and
ZhangBing Zhou and
Jianwei Niu and
Qun Wang An energy efficient hierarchical
clustering index tree for facilitating
time-correlated region queries in the
Internet of Things . . . . . . . . . . . 1--11
Francisco Fraile and
Juan Carlos Guerri Simple models of the content duration
and the popularity of television content 12--20
Haiyang Hu and
Yizhi Ren and
Xu Xu and
Liguo Huang and
Hua Hu Reducing view inconsistency by
predicting avatars' motion in
multi-server distributed virtual
environments . . . . . . . . . . . . . . 21--30
Vijay Varadharajan and
Udaya Tupakula Counteracting security attacks in
virtual machines in the cloud using
property based attestation . . . . . . . 31--45
Leili Farzinvash and
Mehdi Dehghan Multi-rate multicast routing in
multi-gateway multi-channel multi-radio
wireless mesh networks . . . . . . . . . 46--60
Peng-Yeng Yin and
Ray-I. Chang and
Chih-Chiang Chao and
Yen-Ting Chu Niched ant colony optimization with
colony guides for QoS multicast routing 61--72
Mohsen Arab and
Mohsen Afsharchi Community detection in social networks
using hybrid merging of sub-communities 73--84
Mohamed Ahmed Elfaki and
Hamidah Ibrahim and
Ali Mamat and
Mohamed Othman and
Haidar Safa Collaborative caching priority for
processing requests in MANETs . . . . . 85--96
Jianwei Wang and
Chen Jiang and
Jianfei Qian Robustness of Internet under targeted
attack: a cascading failure perspective 97--104
Sehoon Park and
Qichen Chen and
Hyuck Han and
Heon Y. Yeom Design and evaluation of mobile
offloading system for web-centric
devices . . . . . . . . . . . . . . . . 105--115
Peng Zhao and
Xinyu Yang and
Wei Yu and
Chiyong Dong and
Shusen Yang and
Sulabh Bhattarai Toward efficient estimation of available
bandwidth for IEEE 802.11-based wireless
networks . . . . . . . . . . . . . . . . 116--125
Yang Xia and
Chai Kiat Yeo Mobile Internet access over intermittent
network connectivity . . . . . . . . . . 126--138
Zhen-Yu Wu and
Ju-Chuan Wu and
Sung-Chiang Lin and
Charlotte Wang An electronic voting mechanism for
fighting bribery and coercion . . . . . 139--150
Samar Abdelaziz and
Mustafa ElNainay Metric-based taxonomy of routing
protocols for cognitive radio ad hoc
networks . . . . . . . . . . . . . . . . 151--163
Onur Yilmaz and
Orhan Dagdeviren and
Kayhan Erciyes Localization-free and energy-efficient
hole bypassing techniques for
fault-tolerant sensor networks . . . . . 164--178
Darren Quick and
Kim-Kwang Raymond Choo Google Drive: Forensic analysis of data
remnants . . . . . . . . . . . . . . . . 179--193
Laleh Arshadi and
Amir Hossein Jahangir Benford's law behavior of Internet
traffic . . . . . . . . . . . . . . . . 194--205
Lingfang Zeng and
Yang Wang Optimization on content service with
local search in cloud of clouds . . . . 206--215
Ke Li and
Sheng Wang and
Shizhong Xu and
Xiong Wang and
Haojun Huang and
Jin Ren and
Bo Zhai Evaluating the benefit of the core-edge
separation on intradomain traffic
engineering under uncertain traffic
demand . . . . . . . . . . . . . . . . . 216--226
Hyun-Ho Choi and
Ki-Ho Lee and
Jung-Ryun Lee Energy-delay tradeoff analysis of user
state transition mechanism for mobile
web services . . . . . . . . . . . . . . 227--233
Xinjie Guan and
Baek-Young Choi Push or pull? Toward optimal content
delivery using cloud storage . . . . . . 234--243
Francisco Macia-Perez and
Iren Lorenzo-Fonseca and
Jose Vicente Berna-Martinez A formal framework for modelling complex
network management systems . . . . . . . 255--269
Carlos Abreu and
Manuel Ricardo and
P. M. Mendes Energy-aware routing for biomedical
wireless sensor networks . . . . . . . . 270--278
R. I. Ciobanu and
D. G. Reina and
C. Dobre and
S. L. Toral and
P. Johnson JDER: a history-based forwarding scheme
for delay tolerant networks using
Jaccard distance and encountered ration 279--291
Dingde Jiang and
Zhengzheng Xu and
Peng Zhang and
Ting Zhu A transform domain-based anomaly
detection approach to network-wide
traffic . . . . . . . . . . . . . . . . 292--306
N. Hoque and
Monowar H. Bhuyan and
R. C. Baishya and
D. K. Bhattacharyya and
J. K. Kalita Network attacks: Taxonomy, tools and
systems . . . . . . . . . . . . . . . . 307--324
Md Whaiduzzaman and
Mehdi Sookhak and
Abdullah Gani and
Rajkumar Buyya A survey on vehicular cloud computing 325--344
Saeid Abolfazli and
Zohreh Sanaei and
Abdullah Gani and
Feng Xia and
Laurence T. Yang Rich Mobile Applications: Genesis,
taxonomy, and open issues . . . . . . . 345--362
Baraa T. Sharef and
Raed A. Alsaqour and
Mahamod Ismail Vehicular communication ad hoc routing
protocols: a survey . . . . . . . . . . 363--396
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dhiah Al-Shammary and
Ibrahim Khalil and
Zahir Tari A distributed aggregation and fast
fractal clustering approach for SOAP
traffic . . . . . . . . . . . . . . . . 1--14
Tao Qin and
Xiaohong Guan and
Wei Li and
Pinghui Wang and
Min Zhu A new connection degree calculation and
measurement method for large scale
network monitoring . . . . . . . . . . . 15--26
Gurkan Tuna and
Bilel Nefzi and
Gianpaolo Conte Unmanned aerial vehicle-aided
communications system for disaster
recovery . . . . . . . . . . . . . . . . 27--36
Lijun Gao and
Maode Ma and
Yantai Shu and
Yuhua Wei An ultralightweight RFID authentication
protocol with CRC and permutation . . . 37--46
Tin-Yu Wu and
Wei-Tsong Lee and
Nadra Guizani and
Tzu-Ming Wang Incentive mechanism for P2P file sharing
based on social network and game theory 47--55
Ricardo Anacleto and
Lino Figueiredo and
Ana Almeida and
Paulo Novais Mobile application to provide
personalized sightseeing tours . . . . . 56--64
J. J. Castro-Schez and
M. A. Redondo and
F. Jurado and
J. Albusac Experience applying language processing
techniques to develop educational
software that allow active learning
methodologies by advising students . . . 65--79
Ahmed Mohammed Abbas and
Azuraliza Abu Bakar and
Mohd Zakree Ahmad Fast dynamic clustering SOAP messages
based compression and aggregation model
for enhanced performance of Web services 80--88
Bhaskar Sardar and
Debashis Saha and
Mahbub Hassan A novel enhancement of TCP for on-board
IP networks with wireless cellular
connectivity . . . . . . . . . . . . . . 89--100
Wei Liu and
Wei Du and
Jing Chen and
Wei Wang and
GuoSun Zeng Adaptive energy-efficient scheduling
algorithm for parallel tasks on
homogeneous clusters . . . . . . . . . . 101--113
Jinzhu Wang and
Jianxin Liao and
Tonghong Li and
Jing Wang and
Jingyu Wang and
Qi Qi Probe-based end-to-end overload control
for networks of SIP servers . . . . . . 114--125
Giannis Haralabopoulos and
Ioannis Anagnostopoulos Real time enhanced random sampling of
online social networks . . . . . . . . . 126--134
Saleh Alghamdi and
Ron van Schyndel and
Ibrahim Khalil Accurate positioning using long range
active RFID technology to assist
visually impaired people . . . . . . . . 135--147
Yacine Atif and
Liren Zhang Network resource management in support
of QoS in ubiquitous learning . . . . . 148--156
Xiaoyuan Li and
Dexiang Wang and
Janise McNair and
Jianmin Chen Dynamic spectrum access with packet size
adaptation and residual energy balancing
for energy-constrained cognitive radio
sensor networks . . . . . . . . . . . . 157--166
Muhammad Hamad Alizai and
Klaus Wehrle Probabilistic location-free addressing
in wireless networks . . . . . . . . . . 167--181
Sergio Pastrana and
Agustin Orfila and
Juan E. Tapiador and
Pedro Peris-Lopez Randomized Anagram revisited . . . . . . 182--196
Tahir Ahmad and
Usman Younis Randomness testing of non-cryptographic
hash functions for real-time hash table
based storage and look-up of URLs . . . 197--205
Tim Verbelen and
Pieter Simoens and
Filip De Turck and
Bart Dhoedt Adaptive deployment and configuration
for mobile augmented reality in the
cloudlet . . . . . . . . . . . . . . . . 206--216
M. A. Raayatpanah and
H. Salehi Fathabadi and
B. H. Khalaj and
S. Khodayifar and
P. M. Pardalos Bounds on end-to-end statistical delay
and jitter in multiple multicast coded
packet networks . . . . . . . . . . . . 217--227
Bert Vankeirsbilck and
Pieter Simoens and
Filip De Turck and
Piet Demeester and
Bart Dhoedt Network latency hiding in thin client
systems through server-centric
speculative display updating . . . . . . 228--239
Radu-Ioan Ciobanu and
Ciprian Dobre and
Mihai Dascalu and
Stefan Trausan-Matu and
Valentin Cristea SENSE: a collaborative selfish node
detection and incentive mechanism for
opportunistic networks . . . . . . . . . 240--249
Thang Tran and
Maike Kuhnert and
Christian Wietfeld Cloud voice service as over-the-top
solution for seamless voice call
continuity in a heterogeneous network
environment . . . . . . . . . . . . . . 250--262
Yusen Li and
Wentong Cai Update schedules for improving
consistency in multi-server distributed
virtual environments . . . . . . . . . . 263--273
Fan Li and
Jinsheng Sun and
Moshe Zukerman and
Zhengfei Liu and
Qin Xu and
Sammy Chan and
Guanrong Chen and
King-Tim Ko A comparative simulation study of
TCP/AQM systems for evaluating the
potential of neuron-based AQM schemes 274--299
Govind P. Gupta and
Manoj Misra and
Kumkum Garg Energy and trust aware mobile agent
migration protocol for data aggregation
in wireless sensor networks . . . . . . 300--311
Mehrnaz Moudi and
Mohamed Othman A GreedyZero algorithm to minimise the
conflicts in an Optical Multistage
Interconnection Network . . . . . . . . 312--318
Álvaro Rubio-Largo and
Miguel A. Vega-Rodríguez and
David L. González-Álvarez Performance assessment of multiobjective
approaches in optical Traffic Grooming 319--350
Li Yi and
Huachun Zhou and
Daochao Huang and
Hongke Zhang An analytical study of distributed
mobility management schemes with a flow
duration based model . . . . . . . . . . 351--357
Lingfang Zeng and
Bharadwaj Veeravalli and
Qingsong Wei Space4time: Optimization
latency-sensitive content service in
cloud . . . . . . . . . . . . . . . . . 358--368
Satoshi Utsumi and
Salahuddin Muhammad Salim Zabir A new high-performance TCP friendly
congestion control over wireless
networks . . . . . . . . . . . . . . . . 369--378
Qingyang Song and
Zhaolong Ning and
Yang Huang and
Lei Guo and
Xiaobing Lu Joint power control and spectrum access
in cognitive radio networks . . . . . . 379--388
Nima Jafari Navimipour and
Amir Masoud Rahmani and
Ahmad Habibizad Navin and
Mehdi Hosseinzadeh Resource discovery mechanisms in grid
systems: a survey . . . . . . . . . . . 389--410
Ying Li and
Radim Bartos A survey of protocols for Intermittently
Connected Delay-Tolerant Wireless Sensor
Networks . . . . . . . . . . . . . . . . 411--423
Sunilkumar S. Manvi and
Gopal Krishna Shyam Resource management for Infrastructure
as a Service (IaaS) in cloud computing:
a survey . . . . . . . . . . . . . . . . 424--440
Ssu-Hsuan Lu and
Kuan-Ching Li and
Kuan-Chou Lai and
Yeh-Ching Chung Effectiveness of a replica mechanism to
improve availability with Arrangement
Graph-Based Overlay . . . . . . . . . . 441--450
Abderrazak Abdaoui and
Tarek M. El-Fouly TOSSIM and distributed binary consensus
algorithm in wireless sensor networks 451--458
R. Q. Shaddad and
A. B. Mohammad and
S. A. Al-Gailani and
A. M. Al-hetar and
M. A. Elmagzoub A survey on access technologies for
broadband optical and wireless networks 459--472
Ayesha Binte Ashfaq and
Sajjad Rizvi and
Mobin Javed and
Syed Ali Khayam and
Muhammad Qasim Ali and
Ehab Al-Shaer Information theoretic feature space
slicing for statistical anomaly
detection . . . . . . . . . . . . . . . 473--487
Ratnadip Adhikari A meticulous study of various medium
access control protocols for wireless
sensor networks . . . . . . . . . . . . 488--504
Jesús Friginal and
Juan-Carlos Ruiz and
David de Andrés and
Antonio Bustos Ambient noise in wireless mesh networks:
Evaluation and proposal of an adaptive
algorithm to mitigate link removal . . . 505--516
Shazana Md Zin and
Nor Badrul Anuar and
Miss Laiha Mat Kiah and
Al-Sakib Khan Pathan Routing protocol design for secure WSN:
Review and open research issues . . . . 517--530
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jinyuan Jia and
Wei Wang and
Xiaojun Hei An efficient caching algorithm for
peer-to-peer 3D streaming in distributed
virtual environments . . . . . . . . . . 1--11
Qin Xu and
Jinsheng Sun A simple active queue management based
on the prediction of the packet arrival
rate . . . . . . . . . . . . . . . . . . 12--20
Mehdi Naderi Soorki and
Habib Rostami Label switched protocol routing with
guaranteed bandwidth and end to end path
delay in MPLS networks . . . . . . . . . 21--38
Víctor Mateu and
Francesc Sebé and
Magda Valls Constructing credential-based E-voting
systems from offline E-coin protocols 39--44
Poria Pirozmand and
Guowei Wu and
Behrouz Jedari and
Feng Xia Human mobility in opportunistic
networks: Characteristics, models and
prediction methods . . . . . . . . . . . 45--58
Abbas Mehdizadeh and
Fazirulhisyam Hashim and
Mohamed Othman Lightweight decentralized
multicast-unicast key management method
in wireless IPv6 networks . . . . . . . 59--69
Guangjie Han and
Jia Chao and
Chenyu Zhang and
Lei Shu and
Qingwu Li The impacts of mobility models on DV-hop
based localization in Mobile Wireless
Sensor Networks . . . . . . . . . . . . 70--79
Hadi Shakibian and
Nasrollah Moghadam Charkari In-cluster vector evaluated particle
swarm optimization for distributed
regression in WSNs . . . . . . . . . . . 80--91
Nadine Akkari and
Ghadah Aldabbagh and
Michel Nahas and
John Cioffi Dynamic Clustering Protocol for
coordinated tethering over cellular
networks . . . . . . . . . . . . . . . . 92--101
Shahaboddin Shamshirband and
Nor Badrul Anuar and
Miss Laiha Mat Kiah and
Vala Ali Rohani and
Dalibor Petkovi\'c and
Sanjay Misra and
Abdul Nasir Khan Co-FAIS: Cooperative fuzzy artificial
immune system for detecting intrusion in
wireless sensor networks . . . . . . . . 102--117
Jordán Pascual Espada and
Ronald R. Yager and
Bin Guo Internet of Things: Smart things network
and communication . . . . . . . . . . . 118--119
Zheng Yan and
Peng Zhang and
Athanasios V. Vasilakos A survey on trust management for
Internet of Things . . . . . . . . . . . 120--134
Wei Xie and
Lei Xie and
Chen Zhang and
Qiang Wang and
Jian Xu and
Quan Zhang and
Chaojing Tang RFID seeking: Finding a lost tag rather
than only detecting its missing . . . . 135--142
Lianbo Ma and
Kunyuan Hu and
Yunlong Zhu and
Hanning Chen Cooperative artificial bee colony
algorithm for multi-objective RFID
network planning . . . . . . . . . . . . 143--162
Hicham Lakhlef and
Hakim Mabed and
Julien Bourgeois Optimization of the logical topology for
mobile MEMS networks . . . . . . . . . . 163--177
Guillermo Cueva-Fernandez and
Jordán Pascual Espada and
Vicente García-Díaz and
Cristian González García and
Nestor Garcia-Fernandez Vitruvius: an expert system for vehicle
sensor tracking and managing application
generation . . . . . . . . . . . . . . . 178--188
Jiajun Sun and
Huadong Ma Heterogeneous-belief based incentive
schemes for crowd sensing in mobile
social networks . . . . . . . . . . . . 189--196
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Yasir Saleem and
Mubashir Husain Rehmani Primary radio user activity models for
cognitive radio networks: a survey . . . 1--16
Dong Ma and
Maode Ma Network selection and resource
allocation for multicast in HetNets . . 17--26
Gongqi Lin and
Sieteng Soh and
Kwan-Wu Chin and
Mihai Lazarescu Energy Aware Two Disjoint Paths Routing 27--41
Zheng Xu and
Yunhuai Liu and
Lin Mei and
Chuanping Hu and
Lan Chen Generating temporal semantic context of
concepts using web search engines . . . 42--55
JuiHsi Fu and
PoChing Lin and
SingLing Lee Detecting spamming activities in a
campus network using incremental
learning . . . . . . . . . . . . . . . . 56--65
Mohamed A. Alrshah and
Mohamed Othman and
Borhanuddin Ali and
Zurina Mohd Hanapi Comparative study of high-speed Linux
TCP variants over high-BDP networks . . 66--75
Xiaoping Wu and
GuoYing Wang and
Dan Dai and
Mengjun Tong Accurate acoustic energy-based
localization with beacon position
uncertainty in wireless sensor networks 76--83
Abdullah Gani and
Golam Mokatder Nayeem and
Muhammad Shiraz and
Mehdi Sookhak and
Md Whaiduzzaman and
Suleman Khan A review on interworking and mobility
techniques for seamless connectivity in
mobile cloud computing . . . . . . . . . 84--102
Eduardo da Silva and
Luiz Carlos P. Albini Middleware proposals for mobile ad hoc
networks . . . . . . . . . . . . . . . . 103--120
Mehdi Sookhak and
Hamid Talebian and
Ejaz Ahmed and
Abdullah Gani and
Muhammad Khurram Khan A review on remote data auditing in
single cloud server: Taxonomy and open
issues . . . . . . . . . . . . . . . . . 121--141
Hui-Shyong Yeo and
Xiao-Shen Phang and
Hoon-Jae Lee and
Hyotaek Lim Leveraging client-side storage
techniques for enhanced use of multiple
consumer cloud storage services on
resource-constrained mobile devices . . 142--156
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Reza Jabbarpour and
Rafidah Md Noor and
Rashid Hafeez Khokhar and
Chih-Heng Ke Cross-layer congestion control model for
urban vehicular environments . . . . . . 1--16
Jiyan Wu and
Bo Cheng and
Yanlei Shang and
Jun Huang and
Junliang Chen A novel scheduling approach to
concurrent multipath transmission of
high definition video in overlay
networks . . . . . . . . . . . . . . . . 17--29
Amr El Mougy and
Aymen Kamoun and
Mohamed Ibnkahla and
Sa\"\id Tazi and
Khalil Drira A context and application-aware
framework for resource management in
dynamic collaborative wireless M2M
networks . . . . . . . . . . . . . . . . 30--45
Anindya Iqbal and
Manzur Murshed On demand-driven movement strategy for
moving beacons in sensor localization 46--62
Guo-Song Tian and
Yu-Chu Tian and
Colin Fidge Precise relative clock synchronization
for distributed control using TSC
registers . . . . . . . . . . . . . . . 63--71
Víctor Fernández and
Juan Manuel Orduña and
Pedro Morillo Server implementations for improving the
performance of CAR systems based on
mobile phones . . . . . . . . . . . . . 72--82
Khairul Azami Sidek and
Vu Mai and
Ibrahim Khalil Data mining in mobile ECG based
biometric identification . . . . . . . . 83--91
Guoxing Jiang and
Jun Chen and
Yanqing Shen Delivery ratio- and buffered
time-constrained: Multicasting for Delay
Tolerant Networks . . . . . . . . . . . 92--105
Ying-Dar Lin and
Ekarat Rattagan and
Yuan-Cheng Lai and
Li-Pin Chang and
Yun-Chien Yo and
Cheng-Yuan Ho and
Shun-Lee Chang Calibrating parameters and formulas for
process-level energy consumption
profiling in smartphones . . . . . . . . 106--119
Wenjia Niu and
Gang Li and
Endong Tong and
Quan Z. Sheng and
Qian Li and
Yue Hu and
Athanasios V. Vasilakos and
Li Guo A block-aware hybrid data dissemination
with hotspot elimination in wireless
sensor network . . . . . . . . . . . . . 120--133
Hassina Nacer and
Djamil Aissani Semantic web services: Standards,
applications, challenges and solutions 134--151
Weiwei Fang and
Zhulin An and
Lei Shu and
Qingyu Liu and
Yongjun Xu and
Yuan An Achieving optimal admission control with
dynamic scheduling in energy constrained
network systems . . . . . . . . . . . . 152--160
Jiyan Wu and
Yanlei Shang and
Chau Yuen and
Bo Cheng and
Junliang Chen TRADER: a reliable transmission scheme
to video conferencing applications over
the Internet . . . . . . . . . . . . . . 161--171
Changqing Ji and
Zhiyang Li and
Wenyu Qu and
Yujie Xu and
Yuanyuan Li Scalable nearest neighbor query
processing based on Inverted Grid Index 172--182
Shaahin Madani and
Ibrahim Khalil Garbled Routing (GR): a generic
framework towards unification of
anonymous communication systems . . . . 183--195
Pooia Lalbakhsh and
Bahram Zaeri and
Yi-Ping Phoebe Chen Using Dead Ants to improve the
robustness and adaptability of AntNet
routing algorithm . . . . . . . . . . . 196--211
Sudip Misra and
P. Venkata Krishna and
V. Saritha and
Harshit Agarwal and
Aditya Ahuja Learning automata-based
multi-constrained fault-tolerance
approach for effective energy management
in smart grid communication network . . 212--219
Israat Tanzeena Haque A sensor based indoor localization
through fingerprinting . . . . . . . . . 220--229
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and
Toufik Ahmed and
Raouf Boutaba and
Reaz Ahmed Efficient content delivery scheme for
layered video streaming in large-scale
networks . . . . . . . . . . . . . . . . 1--14
Jenhui Chen and
Zhuxiu Yuan and
Lei Wang An apropos signal report and adaptive
period (ASAP) scheme for fast handover
in the fourth-generation wireless
networks . . . . . . . . . . . . . . . . 15--26
An Huang and
Bing Hu The optimal joint sequence design in the
feedback-based two-stage switch . . . . 27--34
Jun Huang and
Guoquan Liu and
Qiang Duan On modeling and optimization for
composite network-Cloud service
provisioning . . . . . . . . . . . . . . 35--43
Junaid Qadir and
Adeel Baig and
Asad Ali and
Quratulain Shafi Multicasting in cognitive radio
networks: Algorithms, techniques and
protocols . . . . . . . . . . . . . . . 44--61
Vandana Kushwaha and
Ratneshwer Gupta Congestion control for high-speed wired
network: a systematic literature review 62--78
Kok-Lim Alvin Yau and
Nordin Ramli and
Wahidah Hashim and
Hafizal Mohamad Clustering algorithms for Cognitive
Radio networks: a survey . . . . . . . . 79--95
Mohammad Iftekhar Husain and
Steven Y. Ko and
Steve Uurtamo and
Atri Rudra and
Ramalingam Sridhar Bidirectional data verification for
cloud storage . . . . . . . . . . . . . 96--107
Saurabh Kumar Garg and
Adel Nadjaran Toosi and
Srinivasa K. Gopalaiyengar and
Rajkumar Buyya SLA-based virtual machine management for
heterogeneous workloads in a cloud
datacenter . . . . . . . . . . . . . . . 108--120
Yan Zhu and
Di Ma and
Changjun Hu and
Gail-Joon Ahn and
Hongxin Hu Secure and efficient random functions
with variable-length output . . . . . . 121--133
Le Sun and
Hai Dong and
Farookh Khadeer Hussain and
Omar Khadeer Hussain and
Elizabeth Chang Cloud service selection:
State-of-the-art and future research
directions . . . . . . . . . . . . . . . 134--150
Gurpreet Singh and
Neeraj Kumar and
Anil Kumar Verma ANTALG: an Innovative ACO based Routing
Algorithm for MANETs . . . . . . . . . . 151--167
Fatima Zohra Benhamida and
Yacine Challal and
Mouloud Koudil Adaptive failure detection in low power
lossy wireless sensor networks . . . . . 168--180
Julio Dondo and
Felix Villanueva and
David Garcia and
David Vallejo and
Carlos Glez-Morcillo and
Juan Carlos Lopez Distributed FPGA-based architecture to
support indoor localisation and
orientation services . . . . . . . . . . 181--190
Rawya Rizk and
Walaa Saber and
Hany Harb Conditional clustered matrix
factorization based network coordinate
system . . . . . . . . . . . . . . . . . 191--202
Masoume Jabbarifar and
Michel Dagenais LIANA: Live incremental time
synchronization of traces for
distributed systems analysis . . . . . . 203--214
Yosra Ben Saied and
Alexis Olivereau and
Djamal Zeghlache and
Maryline Laurent A survey of collaborative services and
security-related issues in modern
wireless Ad-Hoc communications . . . . . 215--227
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ivanilton Polato and
Reginaldo Ré and
Alfredo Goldman and
Fabio Kon A comprehensive view of Hadoop research
--- a systematic literature review . . . 1--25
Hosein Mohamadi and
Shaharuddin Salleh and
Mohd Norsyarizad Razali Heuristic methods to maximize network
lifetime in directional sensor networks
with adjustable sensing ranges . . . . . 26--35
Farzaneh R. Armaghani and
Iqbal Gondal and
Joarder Kamruzzaman and
David G. Green Sensor selection for tracking multiple
groups of targets . . . . . . . . . . . 36--47
Congduc Pham Communication performances of IEEE
802.15.4 wireless sensor motes for
data-intensive applications: a
comparison of WaspMote, Arduino MEGA,
TelosB, MicaZ and iMote2 for image
surveillance . . . . . . . . . . . . . . 48--59
Haidar Safa and
Marcel Karam and
Bassam Moussa PHAODV: Power aware heterogeneous
routing protocol for MANETs . . . . . . 60--71
Ning Liu and
Xiaoping Li and
Weiming Shen Multi-granularity resource
virtualization and sharing strategies in
cloud manufacturing . . . . . . . . . . 72--82
Tarek Khalifa and
Atef Abdrabou and
Khaled Bashir Shaban and
Maazen Alsabaan and
Kshirasagar Naik Transport layer performance analysis and
optimization for smart metering
infrastructure . . . . . . . . . . . . . 83--93
Jing Qin and
Hongwei Duan and
Huawei Zhao and
Jiankun Hu A new Lagrange solution to the
privacy-preserving general geometric
intersection problem . . . . . . . . . . 94--99
Omessaad Hamdi and
Mohamed Aymen Chalouf and
Dramane Ouattara and
Francine Krief eHealth: Survey on research projects,
comparative study of telemonitoring
architectures and main issues . . . . . 100--112
Vesal Hakami and
Mehdi Dehghan Efficient broadcasting in slow fading
wireless ad-hoc networks . . . . . . . . 113--123
Ing-Chau Chang and
Eric Jui-Lin Lu and
Shiuan-Yin Huang and
Yi-Hui Chen An RDF-based P2P overlay network
supporting range and wildcard queries 124--138
Kh Mahmudul Alam and
Joarder Kamruzzaman and
Gour Karmakar and
Manzur Murshed Dynamic adjustment of sensing range for
event coverage in wireless sensor
networks . . . . . . . . . . . . . . . . 139--153
Seytkamal Medetov and
Mohamed Bakhouya and
Jaafar Gaber and
Khalid Zinedine and
Maxime Wack and
Pascal Lorenz A decentralized approach for information
dissemination in Vehicular Ad hoc
Networks . . . . . . . . . . . . . . . . 154--165
Muhammad Zubair Farooqi and
Salma Malik Tabassum and
Mubashir Husain Rehmani and
Yasir Saleem A survey on network coding: From
traditional wireless networks to
emerging cognitive radio networks . . . 166--181
Cüneyt Sevgi and
Altan Koçyigit Optimal deployment in randomly deployed
heterogeneous WSNs: a connected coverage
approach . . . . . . . . . . . . . . . . 182--197
M. Mehdi Afsar and
Mohammad-H. Tayarani-N Clustering in sensor networks: a
literature survey . . . . . . . . . . . 198--226
Panayiotis G. Andreou and
Demetrios Zeinalipour-Yazti and
George S. Samaras and
Panos K. Chrysanthis A network-aware framework for
energy-efficient data acquisition in
wireless sensor networks . . . . . . . . 227--240
David H. S. Lima and
Andre L. L. Aquino and
Heitor S. Ramos and
Eliana S. Almeida and
Joel J. P. C. Rodrigues OASys: an opportunistic and agile system
to detect free on-street parking using
intelligent boards embedded in
surveillance cameras . . . . . . . . . . 241--249
Abderrahim Benslimane and
Jiankun Hu and
Xuemin (Sherman) Shen Special issue on ``Quality of service in
wireless and mobile networking'' . . . . 250--251
Meng-Shiuan Pan and
Ping-Lin Liu Low latency scheduling for convergecast
in ZigBee tree-based wireless sensor
networks . . . . . . . . . . . . . . . . 252--263
Neeraj Kumar and
Sudhanshu Tyagi and
Der-Jiunn Deng LA-EEHSC: Learning automata-based energy
efficient heterogeneous selective
clustering for wireless sensor networks 264--279
Adnan Shahid and
Saleem Aslam and
Hyung Seok Kim and
Kyung-Geun Lee Distributed joint resource and power
allocation in self-organized femtocell
networks: a potential game approach . . 280--292
Miloud Bagaa and
Mohamed Younis and
Adlen Ksentini and
Nadjib Badache Reliable multi-channel scheduling for
timely dissemination of aggregated data
in wireless sensor networks . . . . . . 293--304
Peijian Ju and
Wei Song and
A-Long Jin and
Dizhi Zhou Performance analysis and enhancement for
a cooperative wireless diversity network
with spatially random mobile helpers . . 305--314
Ruichun Tang and
Yuanzhen Yue and
Xiangqian Ding and
Yue Qiu Credibility-based cloud media resource
allocation algorithm . . . . . . . . . . 315--321
Li Jun Zhang and
Samuel Pierre An enhanced fast handover with seamless
mobility support for next-generation
wireless networks . . . . . . . . . . . 322--335
K. Ivesic and
L. Skorin-Kapov and
M. Matijasevic Cross-layer QoE-driven admission control
and resource allocation for adaptive
multimedia services in LTE . . . . . . . 336--351
Sonia Ben Rejeb and
Nidal Nasser and
Sami Tabbane A novel resource allocation scheme for
LTE network in the presence of mobility 352--361
Nourch\`ene Bradai and
Lamia Chaari Fourati and
Lotfi Kamoun Investigation and performance analysis
of MAC protocols for WBAN networks . . . 362--373
Jacques M. Bahi and
Christophe Guyeux and
Mourad Hakem and
Abdallah Makhoul Epidemiological approach for data
survivability in unattended wireless
sensor networks . . . . . . . . . . . . 374--383
Zhi Liu and
Jingyun Feng and
Yusheng Ji and
Yongbing Zhang EAF: Energy-aware adaptive free
viewpoint video wireless transmission 384--394
Abderrezak Rachedi and
Hakim Badis and
Abderrahim Benslimane How MIMO cross-layer design enables QoS
while detecting non-cooperative nodes in
wireless multi-hop networks . . . . . . 395--406
Tao Huang and
Baoliu Ye and
Song Guo and
Sanglu Lu Delay minimization by exploring
full-duplex capacity and relay-based
cooperative scheduling in WLANs . . . . 407--417
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ali Moussaoui and
Abdallah Boukeream A survey of routing protocols based on
link-stability in mobile ad hoc networks 1--10
T. Daniel Wallace and
Khalim Amjad Meerja and
Abdallah Shami On-demand scheduling for concurrent
multipath transfer using the stream
control transmission protocol . . . . . 11--22
G. Campobello and
O. Giordano and
A. Segreto and
S. Serrano Comparison of local lossless compression
algorithms for Wireless Sensor Networks 23--31
Raed Alsaqour and
Maha Abdelhaq and
Rashid Saeed and
Mueen Uddin and
Ola Alsukour and
Mohammed Al-Hubaishi and
Tariq Alahdal Dynamic packet beaconing for GPSR mobile
ad hoc position-based routing protocol
using fuzzy logic . . . . . . . . . . . 32--46
Muhammad Shiraz and
Mehdi Sookhak and
Abdullah Gani and
Syed Adeel Ali Shah A Study on the Critical Analysis of
Computational Offloading Frameworks for
Mobile Cloud Computing . . . . . . . . . 47--60
Anna Maria Vegni and
Enrico Natalizio Forwarder smart selection protocol for
limitation of broadcast storm problem 61--71
Xiaobo Ma and
Junjie Zhang and
Zhenhua Li and
Jianfeng Li and
Jing Tao and
Xiaohong Guan and
John C. S. Lui and
Don Towsley Accurate DNS query characteristics
estimation via active probing . . . . . 72--84
Jaime Garcia-Reinoso and
Norberto Fernández and
Ivan Vidal and
Jesús Arias Fisteus Scalable data replication in
content-centric networking based on
alias names . . . . . . . . . . . . . . 85--98
Rafael Weingärtner and
Gabriel Beims Bräscher and
Carlos Becker Westphall Cloud resource management: a survey on
forecasting and profiling models . . . . 99--106
Hela Mliki and
Lamia Chaari and
Lotfi Kamoun A comprehensive survey on Carrier
Ethernet Congestion Management mechanism 107--130
Angela Sara Cacciapuoti and
Marcello Caleffi and
Luigi Paura and
Md Arafatur Rahman Channel availability for mobile
cognitive radio networks . . . . . . . . 131--136
Lutful Karim and
N. Nasser and
Q. H. Mahmoud and
Alagan Anpalagan and
T. E. Salti Range-free localization approach for M2M
communication system using mobile anchor
nodes . . . . . . . . . . . . . . . . . 137--146
Subir Halder and
Sipra Das Bit Design of an Archimedes' spiral based
node deployment scheme targeting
enhancement of network lifetime in
wireless sensor networks . . . . . . . . 147--167
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Massimo Vecchio and
Roberto López-Valcarce Improving area coverage of wireless
sensor networks via controllable mobile
nodes: a greedy approach . . . . . . . . 1--13
Ruiying Li and
Jingfu Wang and
Haitao Liao and
Ning Huang A new method for reliability allocation
of avionics connected via an airborne
network . . . . . . . . . . . . . . . . 14--21
Alejandro Ruiz-Rivera and
Kwan-Wu Chin and
Sieteng Soh A novel framework to mitigate the
negative impacts of green techniques on
BGP . . . . . . . . . . . . . . . . . . 22--34
Wei Li and
Wei Zhang Coverage hole and boundary nodes
detection in wireless sensor networks 35--43
Adnan Akhunzada and
Mehdi Sookhak and
Nor Badrul Anuar and
Abdullah Gani and
Ejaz Ahmed and
Muhammad Shiraz and
Steven Furnell and
Amir Hayat and
Muhammad Khurram Khan Man-At-The-End attacks: Analysis,
taxonomy, human aspects, motivation and
future directions . . . . . . . . . . . 44--57
Muhammad Ashad Kabir and
Jun Han and
Bonghee Hong Reader level filtering for efficient
query processing in RFID middleware . . 58--70
Bin Liao and
Jiong Yu and
Tao Zhang and
Guo Binglei and
Sun Hua and
Changtian Ying Energy-efficient algorithms for
distributed storage system based on
block storage structure reconfiguration 71--86
Chien-Fu Cheng and
Kuo-Tang Tsai A recursive Byzantine-resilient protocol 87--98
Jieyao Liu and
Ejaz Ahmed and
Muhammad Shiraz and
Abdullah Gani and
Rajkumar Buyya and
Ahsan Qureshi Application partitioning algorithms in
mobile cloud computing: Taxonomy, review
and future directions . . . . . . . . . 99--117
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xianfu Meng and
Yanli Wang and
Yue Gong Perspective of space and time based
replica population organizing strategy
in unstructured peer-to-peer networks 1--14
Jia Hao Kong and
Li-Minn Ang and
Kah Phooi Seng A comprehensive survey of modern
symmetric cryptographic solutions for
resource constrained environments . . . 15--50
Peiyan Yuan and
Ping Liu Data fusion prolongs the lifetime of
mobile sensing networks . . . . . . . . 51--59
Faiza Nawaz and
Varun Jeoti NFRA-C, neighbor friendly reader to
reader anti-collision protocol with
counters for dense reader environments 60--67
Xiaonan Wang and
Deguang Le and
Yufeng Yao and
Conghua Xie Location-based mobility support for
6LoWPAN wireless sensor networks . . . . 68--77
Ying Zhang and
Houkuan Huang and
Hui He and
Jing Teng and
Zhuxiao Wang Efficient distributed semantic based
data and service unified discovery with
one-dimensional semantic space . . . . . 78--87
Amir Masoud Rahmani and
Zeinab Fadaie and
Anthony T. Chronopoulos Data placement using Dewey Encoding in a
hierarchical data grid . . . . . . . . . 88--98
Hendrik Moens and
Filip De Turck Shared resource network-aware impact
determination algorithms for service
workflow deployment with partial cloud
offloading . . . . . . . . . . . . . . . 99--111
Qazi Mamoon Ashraf and
Mohamed Hadi Habaebi Autonomic schemes for threat mitigation
in Internet of Things . . . . . . . . . 112--127
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Babak Daghighi and
Miss Laiha Mat Kiah and
Shahaboddin Shamshirband and
Muhammad Habib Ur Rehman Toward secure group communication in
wireless mobile environments: Issues,
solutions, and challenges . . . . . . . 1--14
Yasir Saleem and
Mubashir Husain Rehmani and
Sherali Zeadally Integration of Cognitive Radio
Technology with unmanned aerial
vehicles: Issues, opportunities, and
future research challenges . . . . . . . 15--31
Laisen Nie and
Dingde Jiang and
Lei Guo A convex optimization-based traffic
matrix estimation approach in
IP-over-WDM backbone networks . . . . . 32--38
Lingfang Zeng and
Bharadwaj Veeravalli and
Albert Y. Zomaya An integrated task computation and data
management scheduling strategy for
workflow applications in cloud
environments . . . . . . . . . . . . . . 39--48
Lorena González-Manzano and
Agustin Orfila An efficient confidentiality-preserving
Proof of Ownership for deduplication . . 49--59
Jonathan Loo and
Mahdi Aiash Special issue on information-centric
network architecture, protocols,
algorithms and applications . . . . . . 60--63
Jonathan Loo and
Mahdi Aiash Challenges and solutions for secure
information centric networks: a case
study of the NetInf architecture . . . . 64--72
Mahdi Aiash and
Jonathan Loo An integrated authentication and
authorization approach for the network
of information architecture . . . . . . 73--79
Mingwei Xu and
Zhongxing Ming and
Chunmei Xia and
Jia Ji and
Dan Li and
Dan Wang SIONA: a Service and Information
Oriented Network Architecture . . . . . 80--91
Charilaos Stais and
George Xylomenos and
Alexios Voulimeneas A reliable multicast transport protocol
for information-centric networks . . . . 92--100
Dabin Kim and
Sung-Won Lee and
Young-Bae Ko and
Jae-Hoon Kim Cache capacity-aware content centric
networking under flash crowds . . . . . 101--113
Paulo Mendes Combining data naming and context
awareness for pervasive networks . . . . 114--125
Bander A. Alzahrani and
Martin J. Reed and
Janne Riihijärvi and
Vassilios G. Vassilakis Scalability of information centric
networking using mediated topology
management . . . . . . . . . . . . . . . 126--133
Xiuquan Qiao and
Guoshun Nan and
Yue Peng and
Lei Guo and
Jingwen Chen and
Yunlei Sun and
Junliang Chen NDNBrowser: an extended web browser for
named data networking . . . . . . . . . 134--147
Marica Amadeo and
Claudia Campolo and
Antonella Molinaro Forwarding strategies in named data
wireless ad hoc networks: Design and
evaluation . . . . . . . . . . . . . . . 148--158
S. Eum and
Y. Shoji and
M. Murata and
N. Nishinaga Design and implementation of ICN-enabled
IEEE 802.11 access points as nano data
centers . . . . . . . . . . . . . . . . 159--167
Lingwei Zhang and
Yuhui Deng and
Weiheng Zhu and
Jipeng Zhou and
Frank Wang Skewly replicating hot data to construct
a power-efficient storage cluster . . . 168--179
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jack Fernando Bravo-Torres and
Martín López-Nores and
Yolanda Blanco-Fernández and
José Juan Pazos-Arias and
Manuel Ramos-Cabrer and
Alberto Gil-Solla An improved virtualization layer to
support distribution of multimedia
contents in pervasive social
applications . . . . . . . . . . . . . . 1--17
Víctor Berrocal-Plaza and
Miguel A. Vega-Rodríguez and
Juan M. Sánchez-Pérez Optimizing the mobility management task
in networks of four world capital cities 18--28
M. Sajid Mushtaq and
Scott Fowler and
Abdelhamid Mellouk and
Brice Augustin QoE/QoS-aware LTE downlink scheduler for
VoIP with power saving . . . . . . . . . 29--46
Kun Huang and
Gaogang Xie and
Yanbiao Li and
Dafang Zhang Memory-efficient IP lookup using trie
merging for scalable virtual routers . . 47--58
Yu Liu and
Bin Guo and
Chi Zhou and
Yu Cheng Network-coded cooperative information
recovery in cellular/802.11 mobile
Networks . . . . . . . . . . . . . . . . 59--67
Linfeng Liu and
Ningshen Zhang and
Ye Liu Topology control models and solutions
for signal irregularity in mobile
underwater wireless sensor networks . . 68--90
Rajesh Anbazhagan and
Nakkeeran Rangaswamy Investigations on enhanced power saving
mechanism for IEEE 802.16m network with
heterogeneous traffic . . . . . . . . . 91--101
Behnam Dezfouli and
Marjan Radi and
Shukor Abd Razak and
Tan Hwee-Pink and
Kamalrulnizam Abu Bakar Modeling low-power wireless
communications . . . . . . . . . . . . . 102--126
Mohammed Atiquzzaman Editorial . . . . . . . . . . . . . . . 127--129
Cüneyt Sevgi and
Altan Koçyigit Corrigendum to ``Optimal deployment in
randomly deployed heterogeneous WSNs: a
connected coverage approach'' [J. Netw.
Comput. Appl. \bf 46, (2014), 182--197] 130
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Athanasios V. Vasilakos and
Zhe Li and
Gwendal Simon and
Wei You Information centric network: Research
challenges and opportunities . . . . . . 1--10
Raja Wasim Ahmad and
Abdullah Gani and
Siti Hafizah Ab. Hamid and
Muhammad Shiraz and
Abdullah Yousafzai and
Feng Xia A survey on virtual machine migration
and server consolidation frameworks for
cloud data centers . . . . . . . . . . . 11--25
Ying-Dar Lin and
Minh-Tuan Thai and
Chih-Chiang Wang and
Yuan-Cheng Lai Two-tier project and job scheduling for
SaaS cloud service providers . . . . . . 26--36
Elizabeth A. Thompson and
Charles McIntosh and
James Isaacs and
Eric Harmison and
Ross Sneary Robot communication link using 802.11n
or 900 MHz OFDM . . . . . . . . . . . . 37--51
Ejaz Ahmed and
Abdullah Gani and
Mehdi Sookhak and
Siti Hafizah Ab Hamid and
Feng Xia Application optimization in mobile cloud
computing: Motivation, taxonomies, and
open challenges . . . . . . . . . . . . 52--68
Guodong Sun and
Lin Zhao and
Zhibo Chen and
Guofu Qiao Effective link interference model in
topology control of wireless ad hoc and
sensor networks . . . . . . . . . . . . 69--78
Hao Ji and
Lei Xie and
Chuyu Wang and
Yafeng Yin and
Sanglu Lu CrowdSensing: a crowd-sourcing based
indoor navigation using RFID-based delay
tolerant network . . . . . . . . . . . . 79--89
Ming Tao and
Shuqiang Huang and
Yang Li and
Min Yan and
Yuyu Zhou SA-PSO based optimizing reader
deployment in large-scale RFID Systems 90--100
Ali Ghaffari Congestion control mechanisms in
wireless sensor networks: a survey . . . 101--115
Riham S. Y. Elhabyan and
Mustapha C. E. Yagoub Two-tier particle swarm optimization
protocol for clustering and routing in
wireless sensor network . . . . . . . . 116--128
Tien Van Do and
Nam H. Do and
Ádám Horváth and
Jinting Wang Modelling opportunistic spectrum renting
in mobile cellular networks . . . . . . 129--138
Wei Jiang and
Yue Ma and
Xia Zhang and
Xupeng Wang and
Zili Shao Adaptive security management of
real-time storage applications over NAND
based storage systems . . . . . . . . . 139--153
Ejaz Ahmed and
Abdullah Gani and
Muhammad Khurram Khan and
Rajkumar Buyya and
Samee U. Khan Seamless application execution in mobile
cloud computing: Motivation, taxonomy,
and open challenges . . . . . . . . . . 154--172
Athar Ali Khan and
Mubashir Husain Rehmani and
Yasir Saleem Neighbor discovery in traditional
wireless networks and cognitive radio
networks: Basics, taxonomy, challenges
and future research directions . . . . . 173--190
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Ebrahimzadeh and
Akbar Ghaffarpour Rahbar and
Behrooz Alizadeh QoS aware green routing and wavelength
assignment in core WDM networks . . . . 1--13
Engin Arslan and
Murat Yuksel and
Mehmet Hadi Gunes Training network administrators in a
game-like environment . . . . . . . . . 14--23
Sérgio Figueiredo and
Seil Jeon and
Diogo Gomes and
Rui L. Aguiar D3M: Multicast listener mobility support
mechanisms over distributed mobility
anchoring architectures . . . . . . . . 24--38
Sudeep Tanwar and
Neeraj Kumar and
Joel J. P. C. Rodrigues A systematic review on heterogeneous
routing protocols for wireless sensor
network . . . . . . . . . . . . . . . . 39--56
Yong Wang and
Yun Xia and
Jie Hou and
Shi-meng Gao and
Xiao Nie and
Qi Wang A fast privacy-preserving framework for
continuous location-based queries in
road networks . . . . . . . . . . . . . 57--73
S. Arunkumar and
M. Srivatsa and
M. Rajarajan A review paper on preserving privacy in
mobile environments . . . . . . . . . . 74--90
Abdelali Boushaba and
Adil Benabbou and
Rachid Benabbou and
Azeddine Zahi and
Mohammed Oumsis Multi-point relay selection strategies
to reduce topology control traffic for
OLSR protocol in MANETs . . . . . . . . 91--102
Jingyuan Wang and
Jiangtao Wen and
Chao Li and
Zhang Xiong and
Yuxing Han DC-Vegas: a delay-based TCP congestion
control algorithm for datacenter
applications . . . . . . . . . . . . . . 103--114
Valentina Caputi and
Antonio Garrido Student-oriented planning of e-learning
contents for Moodle . . . . . . . . . . 115--127
Chao-Liang Liu and
Cheng-Jung Tsai and
Ting-Yi Chang and
Wang-Jui Tsai and
Po-Kai Zhong Implementing multiple biometric features
for a recall-based graphical keystroke
dynamics authentication system on a
smart phone . . . . . . . . . . . . . . 128--139
Zhongbao Zhang and
Sen Su and
Yikai Lin and
Xiang Cheng and
Kai Shuang and
Peng Xu Adaptive multi-objective artificial
immune system based virtual network
embedding . . . . . . . . . . . . . . . 140--155
Zhiting Lin and
XiuLong Wu Analyzing and modeling mobility for
infrastructure-less communication . . . 156--163
Sara Modarres Razavi and
Di Yuan and
Fredrik Gunnarsson and
Johan Moe On dynamic signaling congestion
mitigation by overlapping tracking area
lists . . . . . . . . . . . . . . . . . 164--172
Xiumin Wang and
Chau Yuen and
Xiaoming Chen and
Naveed Ul Hassan and
Yiming Ouyang Cost-aware demand scheduling for delay
tolerant applications . . . . . . . . . 173--182
Mario Collotta FLBA: a fuzzy algorithm for load
balancing in IEEE 802.11 networks . . . 183--192
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Imad Abdeljaouad and
Ahmed Karmouch Monitoring IPTV quality of experience in
overlay networks using utility functions 1--10
Yujie Liu and
Yong Li and
Yue Wang and
Jian Yuan Optimal scheduling for multi-flow update
in Software-Defined Networks . . . . . . 11--19
Saman Homayounnejad and
Alireza Bagheri An efficient distributed max-flow
algorithm for Wireless Sensor Networks 20--32
Tarek AlSkaif and
Manel Guerrero Zapata and
Boris Bellalta Game theory for energy efficiency in
Wireless Sensor Networks: Latest trends 33--61
Leovigildo Sánchez-Casado and
Gabriel Maciá-Fernández and
Pedro García-Teodoro and
Nils Aschenbruck Identification of contamination zones
for sinkhole detection in MANETs . . . . 62--77
Maleeha Najam and
Usman Younis and
Raihan ur Rasool Speculative parallel pattern matching
using stride-$k$ DFA for deep packet
inspection . . . . . . . . . . . . . . . 78--87
Normalia Samian and
Zuriati Ahmad Zukarnain and
Winston K. G. Seah and
Azizol Abdullah and
Zurina Mohd Hanapi Cooperation stimulation mechanisms for
wireless multihop networks: a survey . . 88--106
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Apostolos Malatras State-of-the-art survey on P2P overlay
networks in pervasive computing
environments . . . . . . . . . . . . . . 1--23
Aqsa Malik and
Junaid Qadir and
Basharat Ahmad and
Kok-Lim Alvin Yau and
Ubaid Ullah QoS in IEEE 802.11-based wireless
networks: a contemporary review . . . . 24--46
Yaguang Lin and
Xiaoming Wang and
Lichen Zhang and
Peng Li and
Dan Zhang and
Sen Liu The impact of node velocity diversity on
mobile opportunistic network performance 47--58
Yingjie Wang and
Guisheng Yin and
Zhipeng Cai and
Yuxin Dong and
Hongbin Dong A trust-based probabilistic
recommendation model for social networks 59--67
Diego F. Ramírez and
Sandra Céspedes Routing in Neighborhood Area Networks: a
survey in the context of AMI
communications . . . . . . . . . . . . . 68--80
S. Liao and
J. Sun and
Y. Chen and
Y. Wang and
P. Zhang Distributed power control for wireless
networks via the alternating direction
method of multipliers . . . . . . . . . 81--88
Alireza Shameli-Sendi and
Michel Dagenais ORCEF: Online response cost evaluation
framework for intrusion response system 89--107
Zia-ur Rehman and
Omar Khadeer Hussain and
Farookh Khadeer Hussain User-side cloud service management:
State-of-the-art and future directions 108--122
Shazana Md Zin and
Nor Badrul Anuar and
Miss Laiha Mat Kiah and
Ismail Ahmedy Survey of secure multipath routing
protocols for WSNs . . . . . . . . . . . 123--153
Kai Wang and
Jun Li FREME: a pattern partition based engine
for fast and scalable regular expression
matching in practice . . . . . . . . . . 154--169
Dingqi Yang and
Daqing Zhang and
Longbiao Chen and
Bingqing Qu NationTelescope: Monitoring and
visualizing large-scale collective
behavior in LBSNs . . . . . . . . . . . 170--180
Mohamed A. Alrshah and
Mohamed Othman and
Borhanuddin Ali and
Zurina Mohd Hanapi Agile-SD: a Linux-based TCP congestion
control algorithm for supporting
high-speed and short-distance networks 181--190
Katja Cetinski and
Matjaz B. Juric AME-WPC: Advanced model for efficient
workload prediction in the cloud . . . . 191--201
Sudip Misra and
Samaresh Bera and
Tamoghna Ojha and
Liang Zhou ENTICE: Agent-based energy trading with
incomplete information in the smart grid 202--212
Vlasios Kasapakis and
Damianos Gavalas Pervasive gaming: Status, trends and
design principles . . . . . . . . . . . 213--236
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Karami ACCPndn: Adaptive Congestion Control
Protocol in Named Data Networking by
learning capacities using optimized
Time-Lagged Feedforward Neural Network 1--18
Zhaolong Ning and
Qingyang Song and
Lei Guo and
Xiangjie Kong A novel adaptive spectrum allocation
scheme for multi-channel multi-radio
wireless mesh networks . . . . . . . . . 19--27
Minhaj Ahmad Khan A survey of computation offloading
strategies for performance improvement
of applications running on mobile
devices . . . . . . . . . . . . . . . . 28--40
Sergio Ricciardi and
Francesco Palmieri and
Aniello Castiglione and
Davide Careglio Energy efficiency of elastic frequency
grids in multilayer
IP/MPLS-over-flexgrid networks . . . . . 41--47
Ibrahim Abdullahi and
Suki Arif and
Suhaidi Hassan Survey on caching approaches in
Information Centric Networking . . . . . 48--59
T. Hamrouni and
C. Hamdeni and
F. Ben Charrada Impact of the distribution quality of
file replicas on replication strategies 60--76
M. S. S. Khan and
Anup Kumar and
Bin Xie and
Prasanna K. Sahoo Network tomography application in mobile
ad-hoc network using stitching algorithm 77--87
Giannis Haralabopoulos and
Ioannis Anagnostopoulos and
Sherali Zeadally Lifespan and propagation of information
in On-line Social Networks: a case study
based on Reddit . . . . . . . . . . . . 88--100
Esa Kerttula A novel federated strong mobile
signature service --- the Finnish case 101--114
Maria Carla Calzarossa and
Daniele Tessera Modeling and predicting temporal
patterns of web content changes . . . . 115--123
Michael Till Beck and
Andreas Fischer and
Juan Felipe Botero and
Claudia Linnhoff-Popien and
Hermann de Meer Distributed and scalable embedding of
virtual networks . . . . . . . . . . . . 124--136
Mohd Izuan Hafez Ninggal and
Jemal H. Abawajy Utility-aware social network graph
anonymization . . . . . . . . . . . . . 137--148
Sheng-Shih Wang and
Chun-Chih Li and
Hsieh-Wei Lin and
Kuei-Ping Shih A passive self-configuration MAC
protocol for supporting network
management in IEEE 802.11-based
multi-hop mobile ad hoc networks . . . . 149--157
Chi Chen and
Xiaojie Zhu and
Peisong Shen and
Jing Yu and
Hong Zou and
Jiankun Hu SOLS: a scheme for outsourced location
based service . . . . . . . . . . . . . 158--165
Keyvan RahimiZadeh and
Morteza AnaLoui and
Peyman Kabiri and
Bahman Javadi Performance modeling and analysis of
virtualized multi-tier applications
under dynamic workloads . . . . . . . . 166--187
Veerabhadra R. Chandakanna and
Valli K. Vatsavayi A sliding window based Self-Learning and
Adaptive Load Balancer . . . . . . . . . 188--205
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and
Abderrahim Benslimane and
Kamal D. Singh Dynamic anchor points selection for
mobility management in Software Defined
Networks . . . . . . . . . . . . . . . . 1--11
Erdun Zhao and
Liansheng Tan A PCA based optimization approach for IP
traffic matrix estimation . . . . . . . 12--20
Younghoon Kim and
Ikjun Yeom and
Jun Bi and
Yusung Kim Scalable and efficient file sharing in
information-centric networking . . . . . 21--32
Gürkan Gür Energy-aware cache management at the
wireless network edge for
information-centric operation . . . . . 33--42
Qin Xu and
Fan Li and
Jinsheng Sun and
Moshe Zukerman A new TCP/AQM system analysis . . . . . 43--60
Shin-Jer Yang and
Yi-Ru Chen Design adaptive task allocation
scheduler to improve MapReduce
performance in heterogeneous clouds . . 61--70
Rup Kumar Deka and
Kausthav Pratim Kalita and
D. K. Bhattacharya and
Jugal K. Kalita Network defense: Approach's, methods and
techniques . . . . . . . . . . . . . . . 71--84
Suchetana Chakraborty and
Sandip Chakraborty and
Sukumar Nandi and
Sushanta Karmakar Fault resilience in sensor networks:
Distributed node-disjoint multi-path
multi-sink forwarding . . . . . . . . . 85--101
Maristella Ribas and
C. G. Furtado and
José Neuman de Souza and
Giovanni Cordeiro Barroso and
Antão Moura and
Alberto S. Lima and
Flávio R. C. Sousa A Petri net-based decision-making
framework for assessing cloud services
adoption: the use of spot instances for
cost reduction . . . . . . . . . . . . . 102--118
Wei Li and
Jorge Portilla and
Félix Moreno and
Guixuan Liang and
Teresa Riesgo Multiple feature points representation
in target localization of wireless
visual sensor networks . . . . . . . . . 119--128
Jiaoyan Chen and
Bang Wang and
Wenyu Liu Constructing perimeter barrier coverage
with bistatic radar sensors . . . . . . 129--141
Amir Hossein Mohajerzadeh and
Mohammad Hossein Yaghmaee and
Afsane Zahmatkesh Efficient data collecting and target
parameter estimation in wireless sensor
networks . . . . . . . . . . . . . . . . 142--155
Yuhwa Suh and
Kiyoung Kim and
Aran Kim and
Yongtae Shin A study on impact of wired access
networks for green Internet . . . . . . 156--168
Mohammad Khanjary and
Masoud Sabaei and
Mohammad Reza Meybodi Critical density for coverage and
connectivity in two-dimensional
fixed-orientation directional sensor
networks using continuum percolation . . 169--181
Dingde Jiang and
Zhengzheng Xu and
Wenqin Wang and
Yuanting Wang and
Yang Han A collaborative multi-hop routing
algorithm for maximum achievable rate 182--191
Haythem Bany Salameh Spread spectrum-based coordination
design for spectrum-agile wireless ad
hoc networks . . . . . . . . . . . . . . 192--201
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhe Guo and
Zheng Yan A Weighted Semi-Distributed Routing
Algorithm for LEO satellite networks . . 1--11
Francesco Carrabs and
Raffaele Cerulli and
Ciriaco D'Ambrosio and
Andrea Raiconi A hybrid exact approach for maximizing
lifetime in sensor networks with
complete and partial coverage
constraints . . . . . . . . . . . . . . 12--22
Osama M. Hussain Rehman and
Hadj Bourdoucen and
Mohamed Ould-Khaoua Forward link quality estimation in
VANETs for sender-oriented alert
messages broadcast . . . . . . . . . . . 23--41
Raja Wasim Ahmad and
Abdullah Gani and
Siti Hafizah Ab. Hamid and
Feng Xia and
Muhammad Shiraz A Review on mobile application energy
profiling: Taxonomy, state-of-the-art,
and open research issues . . . . . . . . 42--59
B. Coll-Perales and
J. Gozalvez and
M. Sepulcre Empirical models of the communications
performance of Multi-hop Cellular
Networks using D2D . . . . . . . . . . . 60--72
Bassam J. Mohd and
Thaier Hayajneh and
Athanasios V. Vasilakos A survey on lightweight block ciphers
for low-resource devices: Comparative
study and open issues . . . . . . . . . 73--93
Jianwei Niu and
Danning Wang and
Mohammed Atiquzzaman Copy limited flooding over opportunistic
networks . . . . . . . . . . . . . . . . 94--107
Fatima Lamia Haddi and
Mahfoud Bencha\"\iba A survey of incentive mechanisms in
static and mobile P2P systems . . . . . 108--118
Ihab Ahmed Najm and
Mahamod Ismail and
Jaime Lloret and
Kayhan Zrar Ghafoor and
B. B. Zaidan and
Abd Al-razak Tareq Rahem Improvement of SCTP congestion control
in the LTE-A network . . . . . . . . . . 119--129
Amjad Hajjar and
Jawad Khalife and
Jesús Díaz-Verdejo Network traffic application
identification based on message size
analysis . . . . . . . . . . . . . . . . 130--143
Sheharbano Khattak and
Zaafar Ahmed and
Affan A. Syed and
Syed Ali Khayam BotFlex: a community-driven tool for
botnet detection . . . . . . . . . . . . 144--154
Guijuan Wang and
Jiguo Yu and
Dongxiao Yu and
Haitao Yu and
Li Feng and
Pan liu DS--MAC: an energy efficient demand
sleep MAC protocol with low latency for
wireless sensor networks . . . . . . . . 155--164
Alireza Shameli-Sendi and
Makan Pourzandi and
Mohamed Fekih-Ahmed and
Mohamed Cheriet Taxonomy of Distributed Denial of
Service mitigation approaches for cloud
computing . . . . . . . . . . . . . . . 165--179
Fang-Yie Leu and
Chin-Yu Liu and
Jung-Chun Liu and
Fuu-Cheng Jiang and
Heru Susanto S-PMIPv6: an intra-LMA model for IPv6
mobility . . . . . . . . . . . . . . . . 180--191
Jaime Lloret and
Kayhan Zrar Ghafoor and
Danda B. Rawat and
Youssef Nasser Green network protocols and algorithms 192--193
Ruiqi Ding and
Cristina Hava Muntean and
Gabriel-Miro Muntean Energy-efficient device-differentiated
cooperative adaptive multimedia delivery
solution in wireless networks . . . . . 194--207
Zuhal Can and
Murat Demirbas Smartphone-based data collection from
wireless sensor networks in an urban
environment . . . . . . . . . . . . . . 208--216
Miguel Rodríguez-Pérez and
Sergio Herrería-Alonso and
Manuel Fernández-Veiga and
Cándido López-García An ant colonization routing algorithm to
minimize network power consumption . . . 217--226
Mahmoud Sami and
Nor Kamariah Noordin and
Fazirulhysiam Hashim and
Shamala Subramaniam and
Ayyoub Akbari-Moghanjoughi An Energy-Aware Cross-Layer Cooperative
MAC Protocol for Wireless Ad Hoc
Networks . . . . . . . . . . . . . . . . 227--240
Chengming Li and
Wenjing Liu and
Lei Wang and
Mingchu Li and
Koji Okamura Energy-efficient quality of service
aware forwarding scheme for
Content-Centric Networking . . . . . . . 241--254
Seyed Iman PourEmami and
Bahador Bakhshi On the trade-off between
power-efficiency and blocking
probability in fault-tolerant WDM
networks . . . . . . . . . . . . . . . . 255--266
Anas Daghistani and
Abderrahman Ben Khalifa and
Ahmad Showail and
Basem Shihada Green partial packet recovery in
wireless sensor networks . . . . . . . . 267--279
Chih-Heng Ke and
Chong-Yi Yang and
Jiann-Liang Chen and
Kayhan Zrar Ghafoor and
Jaime Lloret Frame-based mapping mechanism for
energy-efficient MPEG-4 video
transmission over IEEE 802.11e networks
with better quality of delivery . . . . 280--286
M. Bakhouya and
J. Gaber and
P. Lorenz Energy evaluation of AID protocol in
Mobile Ad Hoc Networks . . . . . . . . . 287--293
Mohammad Reza Jabbarpour and
Rafidah Md Noor and
Rashid Hafeez Khokhar Green vehicle traffic routing system
using ant-based algorithm . . . . . . . 294--308
Muhammad Faheem and
Muhammad Zahid Abbas and
Gurkan Tuna and
Vehbi Cagri Gungor EDHRP: Energy efficient event driven
hybrid routing protocol for densely
deployed wireless sensor networks . . . 309--326
Gangyong Jia and
Guangjie Han and
Jinfang Jiang and
Joel J. P. C. Rodrigues PARS: a scheduling of periodically
active rank to optimize power efficiency
for main memory . . . . . . . . . . . . 327--336
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhang Bing Zhou and
Wendong Xiao and
Jucheng Yang and
Faming Gong Special issue on green networking,
computing, and software systems . . . . 1--3
Jinfang Jiang and
Guangjie Han and
Hui Guo and
Lei Shu and
Joel J. P. C. Rodrigues Geographic multipath routing based on
geospatial division in duty-cycled
underwater wireless sensor networks . . 4--13
Qing Zhao and
Congcong Xiong and
Ce Yu and
Chuanlei Zhang and
Xi Zhao A new energy-aware task scheduling
method for data-intensive applications
in the cloud . . . . . . . . . . . . . . 14--27
Xiao Xue and
Shufang Wang and
Baoyun Lu Manufacturing service composition method
based on networked collaboration mode 28--38
Yanwen Wang and
Hainan Chen and
Xiaoling Wu and
Lei Shu An energy-efficient SDN based sleep
scheduling algorithm for WSNs . . . . . 39--45
Keke Gai and
Meikang Qiu and
Hui Zhao and
Lixin Tao and
Ziliang Zong Dynamic energy-aware cloudlet-based
mobile cloud computing model for green
computing . . . . . . . . . . . . . . . 46--54
Chao Tong and
Yu Lian and
Jianwei Niu and
Zhongyu Xie and
Yang Zhang A novel green algorithm for sampling
complex networks . . . . . . . . . . . . 55--62
Yonghua Xiong and
Shaoyun Wan and
Jinhua She and
Min Wu and
Yong He and
Keyuan Jiang An energy-optimization-based method of
task scheduling for a cloud video
surveillance center . . . . . . . . . . 63--73
Ana C. Riekstin and
Guilherme C. Januário and
Bruno B. Rodrigues and
Viviane T. Nascimento and
Tereza C. M. B. Carvalho and
Catalin Meirosu Orchestration of energy efficiency
capabilities in networks . . . . . . . . 74--87
Weidong Fang and
Chuanlei Zhang and
Zhidong Shi and
Qing Zhao and
Lianhai Shan BTRES: Beta-based Trust and Reputation
Evaluation System for wireless sensor
networks . . . . . . . . . . . . . . . . 88--94
Martina Marjanovi\'c and
Lea Skorin-Kapov and
Kresimir Pripuzi\'c and
Aleksandar Antoni\'c and
Ivana Podnar Zarko Energy-aware and quality-driven sensor
management for green mobile crowd
sensing . . . . . . . . . . . . . . . . 95--108
Teng Long and
Wenhui Zhang Termination analysis with recursive
calling graphs . . . . . . . . . . . . . 109--116
Chen Xiao and
Lifeng Wang and
Mengjiao Zhu and
Wendong Wang A resource-efficient multimedia
encryption scheme for embedded video
sensing system based on unmanned
aircraft . . . . . . . . . . . . . . . . 117--125
Liping Zhang and
Shanyu Tang and
Shaohui Zhu An energy efficient authenticated key
agreement protocol for SIP-based green
VoIP networks . . . . . . . . . . . . . 126--133
Piotr Cholda and
Piotr Jaglarz Optimization/simulation-based risk
mitigation in resilient green
communication networks . . . . . . . . . 134--157
Mingfu Li and
Jingping Bi and
Zhongcheng Li Improving consolidation of virtual
machine based on virtual switching
overhead estimation . . . . . . . . . . 158--167
Karn Yongsiriwit and
Nour Assy and
Walid Gaaloul A semantic framework for configurable
business process as a service in the
cloud . . . . . . . . . . . . . . . . . 168--184
Debdeep Paul and
Wen-De Zhong and
Sanjay K. Bose Energy efficiency aware load
distribution and electricity cost
volatility control for cloud service
providers . . . . . . . . . . . . . . . 185--197
Zheli Liu and
Xiaofeng Chen and
Jun Yang and
Chunfu Jia and
Ilsun You New order preserving encryption model
for outsourced databases in cloud
environments . . . . . . . . . . . . . . 198--207
Antonio Celesti and
Maria Fazio and
Massimo Villari and
Antonio Puliafito Adding long-term availability,
obfuscation, and encryption to
multi-cloud storage systems . . . . . . 208--218
Yunchuan Sun and
Cheng Lu and
Rongfang Bie and
Junsheng Zhang Semantic relation computing theory and
its application . . . . . . . . . . . . 219--229
Miguel Castro and
Antonio J. Jara and
Antonio F. Skarmeta Enabling end-to-end CoAP-based
communications for the Web of Things . . 230--236
Juan López-de-Armentia and
Diego Casado-Mansilla and
Diego López-de-Ipiña Making social networks a means to save
energy . . . . . . . . . . . . . . . . . 237--246
Ming Yu and
Nirwan Ansari Smart grid communications: Modeling and
validation . . . . . . . . . . . . . . . 247--249
D. A. Sbordone and
L. Martirano and
M. C. Falvo and
L. Chiavaroli and
B. Di Pietra and
I. Bertini and
A. Genovese Reactive power control for an energy
storage system: a real implementation in
a Micro-Grid . . . . . . . . . . . . . . 250--263
Ziyuan Cai and
Ming Yu and
Michael Steurer and
Hui Li and
Yizhou Dong A network model for the real-time
communications of a smart grid prototype 264--273
Dhananjay Bhor and
Kavinkadhirselvan Angappan and
Krishna M. Sivalingam Network and power-grid co-simulation
framework for Smart Grid wide-area
monitoring networks . . . . . . . . . . 274--284
Martin Wolkerstorfer and
Bernhard Schweighofer and
Hannes Wegleiter and
Driton Statovci and
Herbert Schwaiger and
Walter Lackner Measurement and simulation framework for
throughput evaluation of narrowband
power line communication links in
low-voltage grids . . . . . . . . . . . 285--300
Cristina Alcaraz and
Javier Lopez and
Stephen Wolthusen Policy enforcement system for secure
interoperable control in distributed
Smart Grid systems . . . . . . . . . . . 301--314
Yuan Zhang and
Navid Rahbari-Asr and
Mo-Yuen Chow A robust distributed system incremental
cost estimation algorithm for smart grid
economic dispatch with communications
information losses . . . . . . . . . . . 315--324
Ping Yi and
Ting Zhu and
Qingquan Zhang and
Yue Wu and
Li Pan Puppet attack: a denial of service
attack in advanced metering
infrastructure network . . . . . . . . . 325--332
Mungyu Bae and
Kangho Kim and
Hwangnam Kim Preserving privacy and efficiency in
data communication and aggregation for
AMI network . . . . . . . . . . . . . . 333--344
Raphael Amoah and
Seyit Camtepe and
Ernest Foo Formal modelling and analysis of DNP3
secure authentication . . . . . . . . . 345--360
Jemal H. Abawajy and
Albert Y. Zomaya and
Ivan Stojmenovic Network computing and applications for
Big Data analytics . . . . . . . . . . . 361
Wei Xu and
Jianshan Sun and
Jian Ma and
Wei Du A personalized information
recommendation system for R&D project
opportunity finding in big data contexts 362--369
Amineh Amini and
Hadi Saboohi and
Tutut Herawan and
Teh Ying Wah MuDi-Stream: a multi density clustering
algorithm for evolving data stream . . . 370--385
R. S. Villaça and
R. Pasquini and
L. B. de Paula and
M. F. Magalhães HCube: Routing and similarity search in
Data Centers . . . . . . . . . . . . . . 386--398
Khaleel Mershad and
Hassan Artail and
Mazen Saghir and
Hazem Hajj and
Mariette Awad A mathematical model to analyze the
utilization of a cloud datacenter
middleware . . . . . . . . . . . . . . . 399--415
Maumita Bhattacharya and
Rafiqul Islam and
Jemal Abawajy Evolutionary optimization: a big data
perspective . . . . . . . . . . . . . . 416--426
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Barbara Carminati and
Elena Ferrari and
Ngoc Hong Tran Trustworthy and effective
person-to-person payments over multi-hop
MANETs . . . . . . . . . . . . . . . . . 1--18
Mohiuddin Ahmed and
Abdun Naser Mahmood and
Jiankun Hu A survey of network anomaly detection
techniques . . . . . . . . . . . . . . . 19--31
Martin Garriga and
Cristian Mateos and
Andres Flores and
Alejandra Cechich and
Alejandro Zunino RESTful service composition at a glance:
a survey . . . . . . . . . . . . . . . . 32--53
Mina Nabi and
Maria Toeroe and
Ferhat Khendek Availability in the cloud: State of the
art . . . . . . . . . . . . . . . . . . 54--67
Hazim Jarrah and
Nurul I. Sarkar and
Jairo Gutierrez Comparison-based system-level fault
diagnosis protocols for mobile ad-hoc
networks: a survey . . . . . . . . . . . 68--81
Subir Halder and
Amrita Ghosal A survey on mobility-assisted
localization techniques in wireless
sensor networks . . . . . . . . . . . . 82--94
Victor Prokhorenko and
Kim-Kwang Raymond Choo and
Helen Ashman Web application protection techniques: a
taxonomy . . . . . . . . . . . . . . . . 95--112
Jose Moura and
David Hutchison Review and analysis of networking
challenges in cloud computing . . . . . 113--129
Pritish Vijayanand Ghate and
Hemanta Kumar Pati Collaborative distributed communication
in heterogeneous environments: a
comprehensive survey . . . . . . . . . . 1--20
Alekha Kumar Mishra and
Ashok Kumar Turuk A comparative analysis of node replica
detection schemes in wireless sensor
networks . . . . . . . . . . . . . . . . 21--32
Xiaonan Wang and
Hongbin Chen and
Deguang Le A novel IPv6 address configuration for a
6LoWPAN-based WBAN . . . . . . . . . . . 33--45
Petro P. Ernest and
Olabisi E. Falowo and
H. Anthony Chan Design and performance evaluation of
distributed mobility management schemes
for network mobility . . . . . . . . . . 46--58
Mojtaba Alizadeh and
Saeid Abolfazli and
Mazdak Zamani and
Sabariah Baharun and
Kouichi Sakurai Authentication in mobile cloud
computing: a survey . . . . . . . . . . 59--80
Mehdi Nazari Cheraghlou and
Ahmad Khadem-Zadeh and
Majid Haghparast A survey of fault tolerance architecture
in cloud computing . . . . . . . . . . . 81--92
Yu Xiang and
Zhaoguang Xuan and
Meng Tang and
Jun Zhang and
Ming Sun 3D space detection and coverage of
wireless sensor network based on spatial
correlation . . . . . . . . . . . . . . 93--101
Cuicui Lv and
Qiang Wang and
Wenjie Yan and
Yi Shen Energy-balanced compressive data
gathering in Wireless Sensor Networks 102--114
Omar Cheikhrouhou Secure Group Communication in Wireless
Sensor Networks: a survey . . . . . . . 115--132
Shruti Lall and
B. T. J. Maharaj and
P. A. Jansen van Vuuren Null-frequency jamming of a proactive
routing protocol in wireless mesh
networks . . . . . . . . . . . . . . . . 133--141
Atslands R. Rocha and
Flávia C. Delicato and
Luci Pirmez and
Danielo G. Gomes and
José Neuman de Souza A fully-decentralized semantic mechanism
for autonomous wireless sensor nodes . . 142--160
Krishan Kumar and
Arun Prakash and
Rajeev Tripathi Spectrum handoff in cognitive radio
networks: a classification and
comprehensive survey . . . . . . . . . . 161--188
Shun-Neng Yang and
Shu-Wei Ho and
Yi-Bing Lin and
Chai-Hien Gan A multi-RAT bandwidth aggregation
mechanism with software-defined
networking . . . . . . . . . . . . . . . 189--198
Adnan Akhunzada and
Abdullah Gani and
Nor Badrul Anuar and
Ahmed Abdelaziz and
Muhammad Khurram Khan and
Amir Hayat and
Samee U. Khan Secure and dependable software defined
networks . . . . . . . . . . . . . . . . 199--221
Tao Zhang and
Jianxing Wang and
Jiawei Huang and
Yi Huang and
Jianer Chen and
Yi Pan Adaptive marking threshold method for
delay-sensitive TCP in data center
network . . . . . . . . . . . . . . . . 222--234
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Prosanta Gope and
Tzonelih Hwang An efficient mutual authentication and
key agreement scheme preserving strong
anonymity of the mobile user in global
mobility networks . . . . . . . . . . . 1--8
Soo-Yeon Ji and
Bong-Keun Jeong and
Seonho Choi and
Dong Hyun Jeong A multi-level intrusion detection method
for abnormal network behaviors . . . . . 9--17
Usman Shaukat and
Ejaz Ahmed and
Zahid Anwar and
Feng Xia Cloudlet deployment in local wireless
networks: Motivation, architectures,
applications, and open challenges . . . 18--40
Athul Prasad and
Andreas Maeder and
Konstantinos Samdanis and
Andreas Kunz and
Genadi Velev Enabling group communication for public
safety in LTE-Advanced networks . . . . 41--52
Zakira Inayat and
Abdullah Gani and
Nor Badrul Anuar and
Muhammad Khurram Khan and
Shahid Anwar Intrusion response systems: Foundations,
design, and challenges . . . . . . . . . 53--74
Heena Rathore and
Venkataramana Badarla and
George K. J. Sociopsychological trust model for
Wireless Sensor Networks . . . . . . . . 75--87
Feng Tian and
Kuo-Ming Chao and
Zuren Feng and
Keyi Xing and
Nazaraf Shah Using a wireless visual sensor network
to harmonically navigate multiple
low-cost wheelchairs in an indoor
environment . . . . . . . . . . . . . . 88--99
Peiyan Yuan and
Ping Liu and
Shaojie Tang RIM: Relative-importance based data
forwarding in people-centric networks 100--111
Hui Xia and
Jia Yu and
Cheng-liang Tian and
Zhen-kuan Pan and
Edwin Sha Light-weight trust-enhanced on-demand
multi-path routing in mobile ad hoc
networks . . . . . . . . . . . . . . . . 112--127
Chengwen Luo and
Hande Hong and
Long Cheng and
Mun Choon Chan and
Jianqiang Li and
Zhong Ming Accuracy-aware wireless indoor
localization: Feasibility and
applications . . . . . . . . . . . . . . 128--136
Sultan Alneyadi and
Elankayer Sithirasenan and
Vallipuram Muthukkumarasamy A survey on data leakage prevention
systems . . . . . . . . . . . . . . . . 137--152
Mawloud Omar and
Hamida Boufaghes and
Lydia Mammeri and
Amel Taalba and
Abdelkamel Tari Secure and reliable certificate chains
recovery protocol for mobile ad hoc
networks . . . . . . . . . . . . . . . . 153--162
Peiyan Yuan and
Lilin Fan and
Ping Liu and
Shaojie Tang Recent progress in routing protocols of
mobile opportunistic networks: a clear
taxonomy, analysis and evaluation . . . 163--170
Seyed Yahya Vaezpour and
Rui Zhang and
Kui Wu and
Jianping Wang and
Gholamali C. Shoja A new approach to mitigating security
risks of phone clone co-location over
mobile clouds . . . . . . . . . . . . . 171--184
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Divya Saxena and
Vaskar Raychoudhury Radient: Scalable, memory efficient name
lookup algorithm for named data
networking . . . . . . . . . . . . . . . 1--13
Daniel-Ioan Curiac Towards wireless sensor, actuator and
robot networks: Conceptual framework,
challenges and perspectives . . . . . . 14--23
Mengmeng Ge and
Kim-Kwang Raymond Choo and
Huai Wu and
Yong Yu Survey on key revocation mechanisms in
wireless sensor networks . . . . . . . . 24--38
Meng Han and
Mingyuan Yan and
Zhipeng Cai and
Yingshu Li An exploration of broader influence
maximization in timeliness networks with
opportunistic selection . . . . . . . . 39--49
Wen-Hwa Liao and
Ssu-Chi Kuai and
Chen Liu Efficient scheduling algorithm for
multiple mobile subscriber stations with
unsolicited grant service in an IEEE
802.16e network . . . . . . . . . . . . 50--55
Hasan Abdulwahid and
Bin Dai and
Benxiong Huang and
Zijing Chen Scheduled-links multicast routing
protocol in MANETs . . . . . . . . . . . 56--67
Wazir Zada Khan and
Md. Shohrab Hossain and
Mohammed Y. Aalsalem and
N. M. Saad and
Mohammed Atiquzzaman A cost analysis framework for claimer
reporter witness based clone detection
schemes in WSNs . . . . . . . . . . . . 68--85
Amrita Ghosal and
Subir Halder Lifespan prolonging location-wise
predetermined deployment strategy for
visual sensor networks . . . . . . . . . 86--97
S. Avallone and
G. Di Stasi Design and implementation of WiMesh: a
tool for the performance evaluation of
multi-radio wireless mesh networks . . . 98--109
Hao Zhu and
Xiangke Liao and
Cees de Laat and
Paola Grosso Joint flow routing-scheduling for energy
efficient software defined data center
networks: a prototype of energy-aware
network management platform . . . . . . 110--124
Debao Wei and
Libao Deng and
Peng Zhang and
Liyan Qiao and
Xiyuan Peng A page-granularity wear-leveling (PGWL)
strategy for NAND flash memory-based
sink nodes in wireless sensor networks 125--139
Álvaro López García and
Enol Fernández del Castillo Efficient image deployment in cloud
environments . . . . . . . . . . . . . . 140--149
Osamah Ibrahiem Abdullaziz and
Vik Tor Goh and
Huo-Chong Ling and
KokSheik Wong AIPISteg: an active IP identification
based steganographic method . . . . . . 150--158
Emanuel F. Coutinho and
Paulo A. L. Rego and
Danielo G. Gomes and
José N. de Souza Physics and microeconomics-based metrics
for evaluating cloud computing
elasticity . . . . . . . . . . . . . . . 159--172
Diego Kreutz and
Oleksandr Malichevskyy and
Eduardo Feitosa and
Hugo Cunha and
Rodrigo da Rosa Righi and
Douglas D. J. de Macedo A cyber-resilient architecture for
critical security services . . . . . . . 173--189
Javier Suarez and
Jose Quevedo and
Ivan Vidal and
Daniel Corujo and
Jaime Garcia-Reinoso and
Rui L. Aguiar A secure IoT management architecture
based on Information-Centric Networking 190--204
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gilberto Fernandes, Jr. and
Luiz F. Carvalho and
Joel J. P. C. Rodrigues and
Mario Lemes Proença, Jr. Network anomaly detection using IP flows
with Principal Component Analysis and
Ant Colony Optimization . . . . . . . . 1--11
Syam Kumar Pasupuleti and
Subramanian Ramalingam and
Rajkumar Buyya An efficient and secure
privacy-preserving approach for
outsourced data of resource constrained
mobile devices in cloud computing . . . 12--22
Jiangtao Zhang and
Hejiao Huang and
Xuan Wang Resource provision algorithms in cloud
computing: a survey . . . . . . . . . . 23--42
Elias Chavarria-Reyes and
Etimad Fadel and
Suleiman Almasri and
M. G. Abbas Malik Reducing the energy consumption at the
user equipment through multi-stream
cross-carrier-aware discontinuous
reception (DRX) in LTE-advanced systems 43--61
Enrico Gregori and
Alessandro Improta and
Luciano Lenzini and
Valerio Luconi and
Nilo Redini and
Alessio Vecchio Smartphone-based crowdsourcing for
estimating the bottleneck capacity in
wireless networks . . . . . . . . . . . 62--75
Waqar Asif and
Hassaan Khaliq Qureshi and
Muttukrishnan Rajarajan and
Marios Lestas Combined Banzhaf & Diversity Index (CBDI)
for critical node detection . . . . . . 76--88
Lien-Wu Chen Cooperative energy-efficient
localization with node lifetime
extension in mobile long-thin networks 89--97
Debdeep Paul and
Wen-De Zhong and
Sanjay K. Bose Energy efficient cloud service pricing:
a two-timescale optimization approach 98--112
Michel Barbeau and
Gimer Cervera and
Joaquin Garcia-Alfaro and
Evangelos Kranakis Channel selection using a multiple radio
model . . . . . . . . . . . . . . . . . 113--123
Márcio Melo and
Susana Sargento and
Jorge Carapinha Optimal virtual network migration: a
step closer for seamless resource
mobility . . . . . . . . . . . . . . . . 124--136
Yongrui Qin and
Quan Z. Sheng and
Nickolas J. G. Falkner and
Schahram Dustdar and
Hua Wang and
Athanasios V. Vasilakos When things matter: a survey on
data-centric Internet of Things . . . . 137--153
Mustapha Reda Senouci and
Abdelhamid Mellouk and
Nadjib Aitsaadi and
Latifa Oukhellou Fusion-based surveillance WSN deployment
using Dempster--Shafer theory . . . . . 154--166
Yan Liu and
Shun-Zheng Yu Network coding-based multisource content
delivery in Content Centric Networking 167--175
Atiq Ur Rahman and
Abdulrahman Alharby and
Halabi Hasbullah and
Khalid Almuzaini Corona based deployment strategies in
wireless sensor network: a survey . . . 176--193
Cheng Zhan and
Fuyuan Xiao Coding based wireless broadcast
scheduling in real time applications . . 194--203
Lingzhi Li and
Zhe Yang and
Jin Wang and
Shukui Zhang and
Yanqin Zhu Network coding with crowdsourcing-based
trajectory estimation for vehicular
networks . . . . . . . . . . . . . . . . 204--215
Fabio Rafael Segundo and
Eraldo Silveira e Silva and
Jean-Marie Farines A DTN routing strategy based on neural
networks for urban bus transportation
system . . . . . . . . . . . . . . . . . 216--228
Bahareh Alami Milani and
Nima Jafari Navimipour A comprehensive review of the data
replication techniques in the cloud
environments: Major trends and future
directions . . . . . . . . . . . . . . . 229--238
Hashim A. Hashim and
B. O. Ayinde and
M. A. Abido Optimal placement of relay nodes in
wireless sensor network using artificial
bee colony algorithm . . . . . . . . . . 239--248
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Haitao Zhao and
Jibo Wei and
Nurul I. Sarkar and
Shengchun Huang E-MAC: an evolutionary solution for
collision avoidance in wireless ad hoc
networks . . . . . . . . . . . . . . . . 1--11
Mahir Kaya and
Altan Koçyigit and
P. Erhan Eren An adaptive mobile cloud computing
framework using a call graph based model 12--35
Jungwon Lee and
Miran Shim and
Hyesook Lim Name prefix matching using bloom filter
pre-searching for content centric
network . . . . . . . . . . . . . . . . 36--47
Rahma Chaabouni and
Marc Sánchez-Artigas and
Pedro García-López and
Lluís P\`amies-Ju\`arez The power of swarming in personal clouds
under bandwidth budget . . . . . . . . . 48--71
Jihun Seo and
Keuchul Cho and
Wooseong Cho and
Gisu Park and
Kijun Han A discovery scheme based on carrier
sensing in self-organizing Bluetooth Low
Energy networks . . . . . . . . . . . . 72--83
Wilson M. Tan and
Stephen A. Jarvis Heuristic solutions to the target
identifiability problem in directional
sensor networks . . . . . . . . . . . . 84--102
Deepak Kumar Patel and
Devashree Tripathy and
C. R. Tripathy Survey of load balancing techniques for
Grid . . . . . . . . . . . . . . . . . . 103--119
Ying Qu and
Bryan Ng and
Winston Seah A survey of routing and channel
assignment in multi-channel multi-radio
WMNs . . . . . . . . . . . . . . . . . . 120--130
Fida Gillani and
Ehab Al-Shaer and
Basil AsSadhan Economic metric to improve spam
detectors . . . . . . . . . . . . . . . 131--143
Gopal Kirshna Shyam and
Sunilkumar S. Manvi Virtual resource prediction in cloud
environment: a Bayesian approach . . . . 144--154
Mahmoud Khasawneh and
Saed Alrabaee and
Anjali Agarwal and
Nishith Goel and
Marzia Zaman Power trading in cognitive radio
networks . . . . . . . . . . . . . . . . 155--166
Chenhao Qu and
Rodrigo N. Calheiros and
Rajkumar Buyya A reliable and cost-efficient
auto-scaling system for web applications
using heterogeneous spot instances . . . 167--180
Mohammed Atiquzzaman Editorial: 2015 Best Paper Awards . . . A1--A3
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gianluigi Folino and
Pietro Sabatino Ensemble based collaborative and
distributed intrusion detection systems:
a survey . . . . . . . . . . . . . . . . 1--16
Neenu Garg and
Seema Bawa Comparative analysis of cloud data
integrity auditing protocols . . . . . . 17--32
Abayomi Moradeyo Otebolaku and
Maria Teresa Andrade User context recognition using
smartphone sensors and classification
models . . . . . . . . . . . . . . . . . 33--51
Shiyi Li and
Qiang Cao and
Shenggang Wan and
Lu Qian and
Changsheng Xie HRSPC: a hybrid redundancy scheme via
exploring computational locality to
support fast recovery and high
reliability in distributed storage
systems . . . . . . . . . . . . . . . . 52--63
Mohammad Masdari and
Sima ValiKardan and
Zahra Shahi and
Sonay Imani Azar Towards workflow scheduling in cloud
computing: a comprehensive analysis . . 64--82
Pawan Kumar Verma and
Rajesh Verma and
Arun Prakash and
Ashish Agrawal and
Kshirasagar Naik and
Rajeev Tripathi and
Maazen Alsabaan and
Tarek Khalifa and
Tamer Abdelkader and
Abdulhakim Abogharaf Machine-to-Machine (M2M) communications:
a survey . . . . . . . . . . . . . . . . 83--105
Mohammad Masdari and
Sayyid Shahab Nabavi and
Vafa Ahmadi An overview of virtual machine placement
schemes in cloud computing . . . . . . . 106--127
Fuu-Cheng Jiang and
Ilsun You and
Fang-Yi Leu Approaching green sensor field using
queue-based optimization technique . . . 128--136
Jurairat Phuttharak and
Seng W. Loke Mobile crowdsourcing in peer-to-peer
opportunistic networks: Energy usage and
response analysis . . . . . . . . . . . 137--150
Yatish K. Joshi and
Mohamed Younis Restoring connectivity in a resource
constrained WSN . . . . . . . . . . . . 151--165
Justin Grana and
David Wolpert and
Joshua Neil and
Dongping Xie and
Tanmoy Bhattacharya and
Russell Bent A likelihood ratio anomaly detector for
identifying within-perimeter computer
network attacks . . . . . . . . . . . . 166--179
Amna Qureshi and
David Megías and
Helena Rif\`a-Pous PSUM: Peer-to-peer multimedia content
distribution using collusion-resistant
fingerprinting . . . . . . . . . . . . . 180--197
David Airehrour and
Jairo Gutierrez and
Sayan Kumar Ray Secure routing for Internet of Things: a
survey . . . . . . . . . . . . . . . . . 198--213
Suleman Khan and
Abdullah Gani and
Ainuddin Wahid Abdul Wahab and
Muhammad Shiraz and
Iftikhar Ahmad Network forensics: Review, taxonomy, and
open challenges . . . . . . . . . . . . 214--235
Suvendu Kumar Mohapatra and
Prasan Kumar Sahoo and
Shih-Lin Wu Big data analytic architecture for
intruder detection in heterogeneous
wireless sensor networks . . . . . . . . 236--249
Li Chunlin and
Yan Xin and
Li LaYuan Flexible service provisioning based on
context constraint for enhancing user
experience in service oriented mobile
cloud . . . . . . . . . . . . . . . . . 250--261
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Rahim Masoudi and
Ali Ghaffari Software defined networks: a survey . . 1--25
Suchetana Chakraborty and
Sandip Chakraborty and
Sukumar Nandi and
Sushanta Karmakar Impact of redundant sensor deployment
over data gathering performance: a model
based approach . . . . . . . . . . . . . 26--42
Xuxun Liu A novel transmission range adjustment
strategy for energy hole avoiding in
wireless sensor networks . . . . . . . . 43--52
Huda Saleh Abbas and
Mark A. Gregory The next generation of passive optical
networks: a review . . . . . . . . . . . 53--74
Mathias Pelka and
Horst Hellbrück Survey of challenges and towards a
unified architecture for location
systems . . . . . . . . . . . . . . . . 75--85
Peter Bartalos and
Yi Wei and
M. Brian Blake and
Haluk Damgacioglu and
Iman Saleh and
Nurcin Celik Modeling energy-aware web services and
application . . . . . . . . . . . . . . 86--98
Manuel Díaz and
Cristian Martín and
Bartolomé Rubio State-of-the-art, challenges, and open
issues in the integration of Internet of
Things and cloud computing . . . . . . . 99--117
Eisa Zarepour and
Abdul Alim Abd Karim and
Ajay Sharma and
Mahbub Hassan and
Aruna Seneviratne Characterizing power saving for
device-to-device browser cache
cooperation . . . . . . . . . . . . . . 118--127
Sobin CC and
Vaskar Raychoudhury and
Gustavo Marfia and
Ankita Singla A survey of routing and data
dissemination in Delay Tolerant Networks 128--146
Opeyemi Osanaiye and
Kim-Kwang Raymond Choo and
Mqhele Dlodlo Distributed denial of service (DDoS)
resilience in cloud: Review and
conceptual cloud DDoS mitigation
framework . . . . . . . . . . . . . . . 147--165
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Nauman Ahad and
Junaid Qadir and
Nasir Ahsan Neural networks in wireless networks:
Techniques, applications and guidelines 1--27
Maxim Claeys and
Daphné Tuncer and
Jeroen Famaey and
Marinos Charalambides and
Steven Latré and
George Pavlou and
Filip De Turck Hybrid multi-tenant cache management for
virtualized ISP networks . . . . . . . . 28--41
Anum Ali and
Ghalib A. Shah and
Junaid Arshad Energy efficient techniques for M2M
communication: a survey . . . . . . . . 42--55
Zhiming Wang and
Xiaoping Zeng and
Xue Liu and
Man Xu and
Ya Wen and
Li Chen TCP congestion control algorithm for
heterogeneous Internet . . . . . . . . . 56--64
Yunhe Cui and
Lianshan Yan and
Saifei Li and
Huanlai Xing and
Wei Pan and
Jian Zhu and
Xiaoyang Zheng SD-Anti-DDoS: Fast and efficient DDoS
defense in software-defined networks . . 65--79
Han-Peng Jiang and
David Chuck and
Wei-Mei Chen Energy-aware data center networks . . . 80--89
Aisha Abdallah and
Mohd Aizaini Maarof and
Anazida Zainal Fraud detection system: a survey . . . . 90--113
Tran The Son and
Hoa Le-Minh and
Nauman Aslam MSAR: a metric self-adaptive routing
model for Mobile Ad Hoc Networks . . . . 114--125
Wenjuan Li and
Weizhi Meng and
Lam For Kwok A survey on OpenFlow-based Software
Defined Networks: Security challenges
and countermeasures . . . . . . . . . . 126--139
Yang Qin and
Weihong Yang and
Yibin Ye and
Yao Shi Analysis for TCP in data center
networks: Outcast and Incast . . . . . . 140--150
Wenbin Hu and
Zhenyu Qiu and
Huan Wang and
Liping Yan A Real-time scheduling algorithm for
on-demand wireless XML data broadcasting 151--163
Bijoy Chand Chatterjee and
Waya Fadini and
Eiji Oki A spectrum allocation scheme based on
first-last-exact fit policy for elastic
optical networks . . . . . . . . . . . . 164--172
Syed Hamid Hussain Madni and
Muhammad Shafie Abd Latiff and
Yahaya Coulibaly and
Shafi'i Muhammad Abdulhamid Resource scheduling for infrastructure
as a service (IaaS) in cloud computing:
Challenges and opportunities . . . . . . 173--200
Weizhi Meng and
Wang Hao Lee and
S. R. Murali and
S. P. T. Krishnan JuiceCaster: Towards automatic juice
filming attacks on smartphones . . . . . 201--212
P. V. Bindu and
P. Santhi Thilagam Mining social networks for anomalies:
Methods and challenges . . . . . . . . . 213--229
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alex F. R. Trajano and
Marcial P. Fernandez Two-phase load balancing of In-Memory
Key-Value Storages using Network
Functions Virtualization (NFV) . . . . . 1--13
Xavier Hesselbach and
Jos\`e Roberto Amazonas and
Santi Villanueva and
Juan Felipe Botero Coordinated node and link mapping VNE
using a new paths algebra strategy . . . 14--26
T. Panigrahi and
Meenakshi Panda and
G. Panda Fault tolerant distributed estimation in
wireless sensor networks . . . . . . . . 27--39
Cezar Plesca and
Vincent Charvillat and
Wei Tsang Ooi Multimedia prefetching with optimal
Markovian policies . . . . . . . . . . . 40--53
Sally E. El Khawaga and
Ahmed I. Saleh and
Hesham A. Ali An Administrative Cluster-based
Cooperative Caching (ACCC) strategy for
Mobile Ad Hoc Networks . . . . . . . . . 54--76
Ado Adamou Abba Ari and
Blaise Omer Yenke and
Nabila Labraoui and
Irepran Damakoa and
Abdelhak Gueroui A power efficient cluster-based routing
algorithm for wireless sensor networks:
Honeybees swarm intelligence based
approach . . . . . . . . . . . . . . . . 77--97
Rafael L. Gomes and
Luiz F. Bittencourt and
Edmundo R. M. Madeira and
Eduardo Cerqueira and
Mario Gerla A combined energy-bandwidth approach to
allocate resilient virtual software
defined networks . . . . . . . . . . . . 98--106
Du Yuanfeng and
Yang Dongkai and
Yang Huilin and
Xiu Chundi Flexible indoor localization and
tracking system based on mobile phone 107--116
V. K. Mohan Raj and
R. Shriram Power management in virtualized
datacenter --- a survey . . . . . . . . 117--133
Francisco Moyano and
Carmen Fernandez-Gago and
Javier Lopez A model-driven approach for engineering
trust and reputation into software
services . . . . . . . . . . . . . . . . 134--151
Cuong T. Do and
Nguyen H. Tran and
Eui-Nam Huh and
Choong Seon Hong and
Dusit Niyato and
Zhu Han Dynamics of service selection and
provider pricing game in heterogeneous
cloud market . . . . . . . . . . . . . . 152--165
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marcelo Caggiani Luizelli and
Leonardo Richter Bays and
Luciana Salete Buriol and
Marinho Pilla Barcellos and
Luciano Paschoal Gaspary How physical network topologies affect
virtual network embedding quality: a
characterization study based on ISP and
datacenter networks . . . . . . . . . . 1--16
Ali Mohammad Saghiri and
Mohammad Reza Meybodi An approach for designing cognitive
engines in cognitive peer-to-peer
networks . . . . . . . . . . . . . . . . 17--40
Jianwei Niu and
Lei Wang and
Xiting Liu and
Shui Yu FUIR: Fusing user and item information
to deal with data sparsity by using side
information in recommendation systems 41--50
Tekenate E. Amah and
Maznah Kamat and
Waldir Moreira and
Kamalrulnizam Abu Bakar and
Satria Mandala and
Marcos A. Batista Towards next-generation routing
protocols for pocket switched networks 51--88
Xiaoming Liu and
Yadong Zhou and
Chengchen Hu and
Xiaohong Guan MIRACLE: a multiple independent random
walks community parallel detection
algorithm for big graphs . . . . . . . . 89--101
Carlos Barba-Jimenez and
Raul Ramirez-Velarde and
Andrei Tchernykh and
Ramón Rodríguez-Dagnino and
Juan Nolazco-Flores and
Raul Perez-Cazares Cloud based Video-on-Demand service
model ensuring quality of service and
scalability . . . . . . . . . . . . . . 102--113
Fatih Senel and
Mohamed Younis Novel relay node placement algorithms
for establishing connected topologies 114--130
Juan Antonio Cordero Multi-path TCP performance evaluation in
dual-homed (wired/wireless) devices . . 131--139
Muhammad Anan and
Ala Al-Fuqaha and
Nidal Nasser and
Ting-Yu Mu and
Husnain Bustam Empowering networking research and
experimentation through Software-Defined
Networking . . . . . . . . . . . . . . . 140--155
Fuliang Li and
Jiahai Yang and
Xingwei Wang and
Tian Pan and
Changqing An and
Jianping Wu Characteristics analysis at prefix
granularity: a case study in an IPv6
network . . . . . . . . . . . . . . . . 156--170
Jian Peng and
Kim-Kwang Raymond Choo and
Helen Ashman Bit-level $n$-gram based forensic
authorship analysis on social media:
Identifying individuals from linguistic
profiles . . . . . . . . . . . . . . . . 171--182
Lin Xue and
Suman Kumar and
Cheng Cui and
Praveenkumar Kondikoppa and
Chui-Hui Chiu and
Seung-Jong Park Towards fair and low latency next
generation high speed networks: AFCD
queuing . . . . . . . . . . . . . . . . 183--193
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mahdi Nasrullah Al-Ameen and
Matthew Wright iPersea: Towards improving the
Sybil-resilience of social DHT . . . . . 1--10
Minhaj Ahmad Khan A survey of security issues for cloud
computing . . . . . . . . . . . . . . . 11--29
Hang Shen and
Guangwei Bai Routing in wireless multimedia sensor
networks: a survey and challenges ahead 30--49
Melike Yigit and
V. Cagri Gungor and
Etimad Fadel and
Laila Nassef and
Nadine Akkari and
Ian F. Akyildiz Channel-aware routing and priority-aware
multi-channel scheduling for WSN-based
smart grid applications . . . . . . . . 50--58
L. González-Manzano and
José M. de Fuentes and
Sergio Pastrana and
Pedro Peris-Lopez and
Luis Hernández-Encinas PAgIoT --- Privacy-preserving
Aggregation protocol for Internet of
Things . . . . . . . . . . . . . . . . . 59--71
Nusrat Zerin Zenia and
Mohammed Aseeri and
Muhammad R. Ahmed and
Zamshed I. Chowdhury and
M. Shamim Kaiser Energy-efficiency and reliability in MAC
and routing protocols for underwater
wireless sensor network: a survey . . . 72--85
Alireza Sadeghi Milani and
Nima Jafari Navimipour Load balancing mechanisms and techniques
in the cloud environments: Systematic
literature review and future trends . . 86--98
Pimmy Gandotra and
Rakesh Kumar Jha Device-to-Device Communication in
Cellular Networks: a Survey . . . . . . 99--117
Rodrigo R. Esch and
Fábio Protti and
Valmir C. Barbosa Adaptive event sensing in networks of
autonomous mobile agents . . . . . . . . 118--129
Mahda Noura and
Rosdiadee Nordin A survey on interference management for
Device-to-Device (D2D) communication and
its challenges in 5G networks . . . . . 130--150
Aisha Siddiqa and
Ibrahim Abaker Targio Hashem and
Ibrar Yaqoob and
Mohsen Marjani and
Shahabuddin Shamshirband and
Abdullah Gani and
Fariza Nasaruddin A survey of big data management:
Taxonomy and state-of-the-art . . . . . 151--166
Jingyuan Wang and
Jiangtao Wen and
Jun Zhang and
Zhang Xiong and
Yuxing Han TCP-FIT: an improved TCP algorithm for
heterogeneous networks . . . . . . . . . 167--180
Manel Seddiki and
Mahfoud Bencha\"\iba 2P-Lookup: Popularity and Proximity
based P2P Lookup mechanism over MANETs 181--193
João Santos and
Joel J. P. C. Rodrigues and
Bruno M. C. Silva and
João Casal and
Kashif Saleem and
Victor Denisov An IoT-based mobile gateway for
intelligent personal assistants on
mobile health environments . . . . . . . 194--204
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohamed Attia and
Hichem Sedjelmaci and
Sidi Mohammed Senouci and
El-Hassane Aglzim Game model to optimally combine electric
vehicles with green and non-green
sources into an end-to-end smart grid
architecture . . . . . . . . . . . . . . 1--13
Jian Peng and
Kim-Kwang Raymond Choo and
Helen Ashman User profiling in intrusion detection: a
review . . . . . . . . . . . . . . . . . 14--27
Kishor Singh and
Sangman Moh Routing protocols in cognitive radio ad
hoc networks: a comprehensive review . . 28--37
Rana Azzam and
Rabeb Mizouni and
Hadi Otrok and
Anis Ouali and
Shakti Singh GRS: a Group-Based Recruitment System
for Mobile Crowd Sensing . . . . . . . . 38--50
M. R. M. Assis and
L. F. Bittencourt A survey on cloud federation
architectures: Identifying functional
and non-functional properties . . . . . 51--71
Sakib Md. Bin Malek and
Md. Muntakim Sadik and
Ashikur Rahman On balanced $k$-coverage in visual
sensor networks . . . . . . . . . . . . 72--86
Shilpa Shashikant Chaudhari and
Rajashekhar C. Biradar Traffic and mobility aware resource
prediction using cognitive agent in
mobile ad hoc networks . . . . . . . . . 87--103
Tie Qiu and
Yuan Lv and
Feng Xia and
Ning Chen and
Jiafu Wan and
Amr Tolba ERGID: an efficient routing protocol for
emergency response Internet of Things 104--112
Hassen A. Mogaibel and
Mohamed Othman and
Shamala Subramaniam and
Nor Asilah Wati Abdul Hamid Review of channel assignment approaches
in multi-radio multi-channel wireless
mesh network . . . . . . . . . . . . . . 113--139
Jingyu Feng and
Guangyue Lu and
Honggang Wang and
Xuanhong Wang Supporting secure spectrum sensing data
transmission against SSDH attack in
cognitive radio ad hoc networks . . . . 140--149
C. Hamdeni and
T. Hamrouni and
F. Ben Charrada Data popularity measurements in
distributed systems: Survey and design
directions . . . . . . . . . . . . . . . 150--161
Xiaochen Hao and
Weijing Liu and
Ning Yao and
Dehua Geng and
Xida Li Distributed topology construction
algorithm to improve link quality and
energy efficiency for wireless sensor
networks . . . . . . . . . . . . . . . . 162--170
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xian Li and
Qiuling Tang and
Changyin Sun The impact of node position on outage
performance of RF energy powered
wireless sensor communication links in
overlaid deployment scenario . . . . . . 1--11
Ubaid Ullah Khan and
Naqqash Dilshad and
Mubashir Husain Rehmani and
Tariq Umer Fairness in Cognitive Radio Networks:
Models, measurement methods,
applications, and future research
directions . . . . . . . . . . . . . . . 12--26
Mehrnaz Moudi and
Mohamed Othman and
Kweh Yeah Lun and
Amir Rizaan Abdul Rahiman $x$-Folded TM: an efficient topology for
interconnection networks . . . . . . . . 27--34
M. Kaliappan and
Susan Augustine and
B. Paramasivan Enhancing energy efficiency and load
balancing in mobile ad hoc network using
dynamic genetic algorithms . . . . . . . 35--43
Song Han and
Xinbin Li and
Zhixin Liu and
Xinping Guan Hierarchical-game-based algorithm for
downlink joint subchannel and power
allocation in OFDMA femtocell networks 44--56
Aimad Karkouch and
Hajar Mousannif and
Hassan Al Moatassime and
Thomas Noel Data quality in Internet of Things: a
state-of-the-art survey . . . . . . . . 57--81
Guidan Yao and
Zhigang Jin and
Yishan Su An environment-friendly spectrum
decision strategy for underwater
acoustic networks . . . . . . . . . . . 82--93
K. Ivesic and
L. Skorin-Kapov and
M. Matijasevic Corrigendum to: ``Cross-layer QoE-driven
admission control and resource
allocation for adaptive multimedia
services in LTE'' [J. Netw. Comput.
Appl. \bf 46 (2014) 336--351] . . . . . 94--97
Tien Van Do and
Nam H. Do and
Ádám Horváth and
Jinting Wang Corrigendum to ``Modelling opportunistic
spectrum renting in mobile cellular
networks'' [J. Netw. Comput. Appl. 52
(2015) 129--138] . . . . . . . . . . . . 98
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Feng Lin and
Gang Wang and
Junhai Zhou and
Shiwen Zhang and
Xin Yao High-performance IPv6 address lookup in
GPU-accelerated software routers . . . . 1--10
Yanchao Zhao and
Wenzhong Li and
Sanglu Lu Navigation-driven handoff minimization
in wireless networks . . . . . . . . . . 11--20
Lin Tang and
Hui Cao and
Li Zheng and
Ningjian Huang Uncertainty-aware RFID network planning
for target detection and target location 21--30
Kirill Kogan and
Alejandro López-Ortiz and
Sergey I. Nikolenko and
Gabriel Scalosub and
Michael Segal Large profits or fast gains: a dilemma
in maximizing throughput with
applications to network processors . . . 31--43
Chen Lyu and
Shi-Feng Sun and
Yuanyuan Zhang and
Amit Pande and
Haining Lu and
Dawu Gu Privacy-preserving data sharing scheme
over cloud for social applications . . . 44--55
Manas Khatua and
Sudip Misra Exploiting anomalous slots for multiple
channel access in IEEE 802.11 networks 56--65
Yogesh Sharma and
Bahman Javadi and
Weisheng Si and
Daniel Sun Reliability and energy efficiency in
cloud computing systems: Survey and
taxonomy . . . . . . . . . . . . . . . . 66--85
Daniel Ricardo dos Santos and
Roberto Marinho and
Gustavo Roecker Schmitt and
Carla Merkle Westphall and
Carlos Becker Westphall A framework and risk assessment
approaches for risk-based access control
in the cloud . . . . . . . . . . . . . . 86--97
Salman Iqbal and
Miss Laiha Mat Kiah and
Babak Dhaghighi and
Muzammil Hussain and
Suleman Khan and
Muhammad Khurram Khan and
Kim-Kwang Raymond Choo On cloud security attacks: a taxonomy
and intrusion detection and prevention
as a service . . . . . . . . . . . . . . 98--120
Miguel Sepulcre and
Javier Gozalvez and
Baldomero Coll-Perales Multipath QoS-driven routing protocol
for industrial wireless networks . . . . 121--132
Michael Emmanuel and
Ramesh Rayudu Communication technologies for smart
grid applications: a survey . . . . . . 133--148
Chun-Cheng Lin and
Teng-Huei Chen and
Hui-Hsin Chin Adaptive router node placement with
gateway positions and QoS constraints in
dynamic wireless mesh networks . . . . . 149--164
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hafsa Zannat and
Taslima Akter and
Mashrura Tasnim and
Ashikur Rahman The coverage problem in visual sensor
networks: a target oriented approach . . 1--15
Dimitrios Zorbas and
Luigi Di Puglia Pugliese and
Tahiry Razafindralambo and
Francesca Guerriero Optimal drone placement and
cost-efficient target coverage . . . . . 16--31
Yousri Daldoul and
Djamal-Eddine Meddour and
Toufik Ahmed and
Raouf Boutaba Block Negative Acknowledgement protocol
for reliable multicast in IEEE 802.11 32--46
Ranesh Kumar Naha and
Mohamed Othman Cost-aware service brokering and
performance sentient load balancing
algorithms in the cloud . . . . . . . . 47--57
Mohd Faizal Ab Razak and
Nor Badrul Anuar and
Rosli Salleh and
Ahmad Firdaus The rise of ``malware'': Bibliometric
analysis of malware study . . . . . . . 58--76
Pawan Kumar Verma and
Rajesh Verma and
Arun Prakash and
Rajeev Tripathi and
Kshirasagar Naik A novel hybrid medium access control
protocol for inter-M2M communications 77--88
Qiaoyun Zhang and
Guilin Chen and
Liang Zhao and
Chih-Yung Chang Piconet construction and restructuring
mechanisms for interference avoiding in
Bluetooth PANs . . . . . . . . . . . . . 89--100
Ricardo Marco Alaez and
Jose M. Alcaraz Calero and
Fatna Belqasmi and
May El-Barachi and
Mohamad Badra and
Omar Alfandi Towards an open source architecture for
multi-operator LTE core networks . . . . 101--109
M. D'Arienzo and
S. P. Romano GOSPF: an energy efficient
implementation of the OSPF routing
protocol . . . . . . . . . . . . . . . . 110--127
Ozgur Ates and
Selcuk Keskin and
Taskin Kocak High throughput graphics processing unit
based Fano decoder . . . . . . . . . . . 128--137
Deval Bhamare and
Raj Jain and
Mohammed Samaka and
Aiman Erbad A survey on service function chaining 138--155
Jin B. Hong and
Dong Seong Kim Towards scalable security analysis using
multi-layered security models . . . . . 156--168
Satoshi Utsumi and
Salahuddin Muhammad Salim Zabir and
Sumet Prabhavat A new explicit congestion notification
scheme for satellite IP networks . . . . 169--180
Charalampos Konstantopoulos and
Grammati Pantziou and
Ioannis E. Venetis and
Damianos Gavalas Efficient event handling in Wireless
Sensor and Actor Networks: an on-line
computation approach . . . . . . . . . . 181--199
Saurabh Singh and
Young-Sik Jeong and
Jong Hyuk Park A survey on cloud computing security:
Issues, threats, and solutions . . . . . 200--222
Yaser Mansouri and
Rajkumar Buyya To move or not to move: Cost
optimization in a dual cloud-based
storage architecture . . . . . . . . . . 223--235
Sana Habib and
Junaid Qadir and
Anwaar Ali and
Durdana Habib and
Ming Li and
Arjuna Sathiaseelan The past, present, and future of
transport-layer multipath . . . . . . . 236--258
Nor Bakiah Abd Warif and
Ainuddin Wahid Abdul Wahab and
Mohd Yamani Idna Idris and
Roziana Ramli and
Rosli Salleh and
Shahaboddin Shamshirband and
Kim-Kwang Raymond Choo Copy--move forgery detection: Survey,
challenges and future directions . . . . 259--278
Waqar Asif and
Marios Lestas and
Hassaan Khaliq Qureshi and
Muttukrishnan Rajarajan Optimization based spectral partitioning
for node criticality assessment . . . . 279--292
Paulo Bartolomeu and
Muhammad Alam and
Joaquim Ferreira and
José Fonseca Survey on low power real-time wireless
MAC protocols . . . . . . . . . . . . . 293--316
Abid Khan and
Farhana Jabeen and
Farah Naz and
Sabah Suhail and
Mansoor Ahmed and
Sarfraz Nawaz Buyer seller watermarking protocols
issues and challenges --- a survey . . . 317--334
Junaid Shuja and
Abdullah Gani and
Muhammad Habib ur Rehman and
Ejaz Ahmed and
Sajjad A. Madani and
Muhammad Khurram Khan and
Kwangman Ko Towards native code offloading based MCC
frameworks for multimedia applications:
a survey . . . . . . . . . . . . . . . . 335--354
Minjae Park and
Hyun Ahn and
Kwanghoon Pio Kim Workflow-supported social networks:
Discovery, analyses, and system . . . . 355--373
Xun Shao and
Masahiro Jibiki and
Yuuichi Teranishi and
Nozomu Nishinaga A virtual replica node-based flash
crowds alleviation method for sensor
overlay networks . . . . . . . . . . . . 374--384
Nusrat Nowsheen and
Gour Karmakar and
Joarder Kamruzzaman PRADD: a path reliability-aware data
delivery protocol for underwater
acoustic sensor networks . . . . . . . . 385--397
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dilara Acarali and
Muttukrishnan Rajarajan and
Nikos Komninos and
Ian Herwono Survey of approaches and features for
the identification of HTTP-based botnet
traffic . . . . . . . . . . . . . . . . 1--15
Laisen Nie and
Dingde Jiang and
Lei Guo and
Shui Yu Traffic matrix prediction and estimation
based on deep learning in large-scale IP
backbone networks . . . . . . . . . . . 16--22
Nazmus S. Nafi and
Khandakar Ahmed and
Mark A. Gregory and
Manoj Datta A survey of smart grid architectures,
applications, benefits and
standardization . . . . . . . . . . . . 23--36
Qi Jiang and
Jianfeng Ma and
Fushan Wei and
Youliang Tian and
Jian Shen and
Yuanyuan Yang An untraceable temporal-credential-based
two-factor authentication scheme using
ECC for wireless sensor networks . . . . 37--48
Parisa Goudarzi and
Hadi Tabatabaee Malazi and
Mahmood Ahmadi Khorramshahr: a scalable peer to peer
architecture for port warehouse
management system . . . . . . . . . . . 49--59
Chun-Nan Lu and
Chun-Ying Huang and
Ying-Dar Lin and
Yuan-Cheng Lai High performance traffic classification
based on message size sequence and
distribution . . . . . . . . . . . . . . 60--74
Ehsan Ahvar and
Nafiseh Daneshgar-Moghaddam and
Antonio M. Ortiz and
Gyu Myoung Lee and
Noel Crespi On analyzing user location discovery
methods in smart homes: a taxonomy and
survey . . . . . . . . . . . . . . . . . 75--86
Ren-Hung Hwang and
Yu-Ling Hsueh and
Jang-Jiin Wu and
Fu-Hui Huang SocialHide: a generic distributed
framework for location privacy
protection . . . . . . . . . . . . . . . 87--100
Divya Saxena and
Vaskar Raychoudhury N-FIB: Scalable, memory efficient
name-based forwarding . . . . . . . . . 101--109
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dimitris Tsolkas and
Eirini Liotou and
Nikos Passas and
Lazaros Merakos A survey on parametric QoE estimation
for popular services . . . . . . . . . . 1--17
Preeti Mishra and
Emmanuel S. Pilli and
Vijay Varadharajan and
Udaya Tupakula Intrusion detection techniques in cloud
environment: a survey . . . . . . . . . 18--47
Gyanappa A. Walikar and
Rajashekar C. Biradar A survey on hybrid routing mechanisms in
mobile ad hoc networks . . . . . . . . . 48--63
Baogui Huang and
Jiguo Yu and
Xiuzhen Cheng and
Honglong Chen and
Hang Liu SINR based shortest link scheduling with
oblivious power control in wireless
networks . . . . . . . . . . . . . . . . 64--72
Fariba Aznoli and
Nima Jafari Navimipour Cloud services recommendation: Reviewing
the recent advances and suggesting the
future research directions . . . . . . . 73--86
Misbah Liaqat and
Victor Chang and
Abdullah Gani and
Siti Hafizah Ab Hamid and
Muhammad Toseef and
Umar Shoaib and
Rana Liaqat Ali Federated cloud resource management:
Review and discussion . . . . . . . . . 87--105
Fahimeh Dabaghi and
Zeinab Movahedi and
Rami Langar A survey on green routing protocols
using sleep-scheduling in wired networks 106--122
Long Cheng and
Jianwei Niu and
Linghe Kong and
Chengwen Luo and
Yu Gu and
Wenbo He and
Sajal K. Das Compressive sensing based data quality
improvement for crowd-sensing
applications . . . . . . . . . . . . . . 123--134
Wenjuan Li and
Weizhi Meng and
Lam-For Kwok and
Horace H. S. Ip Enhancing collaborative intrusion
detection networks against insider
attacks using supervised intrusion
sensitivity-based trust management model 135--145
Chen Lin and
Zhidong Shen and
Qian Chen and
Frederick T. Sheldon A data integrity verification scheme in
mobile cloud computing . . . . . . . . . 146--151
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tshiamo Sigwele and
Atm S. Alam and
Prashant Pillai and
Yim F. Hu Energy-efficient cloud radio access
networks by cloud based workload
consolidation for 5G . . . . . . . . . . 1--8
Pimmy Gandotra and
Rakesh Kumar Jha and
Sanjeev Jain A survey on device-to-device (D2D)
communication: Architecture and security
issues . . . . . . . . . . . . . . . . . 9--29
Giuseppina Garofalo and
Andrea Giordano and
Patrizia Piro and
Giandomenico Spezzano and
Andrea Vinci A distributed real-time approach for
mitigating CSO and flooding in urban
drainage systems . . . . . . . . . . . . 30--42
Ehsan Arianyan and
Hassan Taheri and
Vahid Khoshdel Novel fuzzy multi objective DVFS-aware
consolidation heuristics for energy and
SLA efficient resource management in
cloud data centers . . . . . . . . . . . 43--61
Xiumin Wang and
Xiaoming Chen and
Chau Yuen and
Weiwei Wu and
Meng Zhang and
Cheng Zhan Delay-cost tradeoff for virtual machine
migration in cloud data centers . . . . 62--72
Gulshan Kumar and
Mritunjay Kumar Rai An energy efficient and optimized load
balanced localization method using CDS
with one-hop neighbourhood and genetic
algorithm in WSNs . . . . . . . . . . . 73--82
Fábio D. Rossi and
Miguel G. Xavier and
César A. F. De Rose and
Rodrigo N. Calheiros and
Rajkumar Buyya E-eco: Performance-aware
energy-efficient cloud data center
orchestration . . . . . . . . . . . . . 83--96
Arani Bhattacharya and
Pradipta De A survey of adaptation techniques in
computation offloading . . . . . . . . . 97--115
Cuiyu Kong and
I.-Hsuan Peng Tradeoff design of radio resource
scheduling for power and spectrum
utilizations in LTE uplink systems . . . 116--124
Ying-Dar Lin and
Yuan-Cheng Lai and
Hung-Yi Teng and
Chun-Chieh Liao and
Yi-Chih Kao Scalable multicasting with multiple
shared trees in software defined
networking . . . . . . . . . . . . . . . 125--133
Abdulbaghi Ghaderzadeh and
Mehdi Kargahi and
Midia Reshadi InFreD: Intelligent Free Rider Detection
in collaborative distributed systems . . 134--145
Miguel López-Benítez and
Timothy D. Drysdale and
Simon Hadfield and
Mohamed Ismaeel Maricar Prototype for multidisciplinary research
in the context of the Internet of Things 146--161
Weizhi Meng and
Wenjuan Li and
Yang Xiang and
Kim-Kwang Raymond Choo A Bayesian inference-based detection
mechanism to defend medical smartphone
networks against insider attacks . . . . 162--169
Md Akbar Hossain and
Nurul I. Sarkar and
Jairo Gutierrez and
William Liu Performance study of block ACK and
reverse direction in IEEE 802.11n using
a Markov chain model . . . . . . . . . . 170--179
Sara Ayoubi and
Chadi Assi and
Yiheng Chen and
Tarek Khalifa and
Khaled Bashir Shaban Restoration methods for cloud multicast
virtual networks . . . . . . . . . . . . 180--190
Waqar Ahmed and
Osman Hasan and
Usman Pervez and
Junaid Qadir Reliability modeling and analysis of
communication networks . . . . . . . . . 191--215
Amrita Ghosal and
Subir Halder and
Stefano Chessa Secure key design approaches using
entropy harvesting in wireless sensor
network: a survey . . . . . . . . . . . 216--230
Mina Mirhosseini and
Fatemeh Barani and
Hossein Nezamabadi-pour QQIGSA: a quadrivalent quantum-inspired
GSA and its application in optimal
adaptive design of wireless sensor
networks . . . . . . . . . . . . . . . . 231--241
Mukhtiar Ahmed and
Mazleena Salleh and
M. Ibrahim Channa Routing protocols based on node mobility
for Underwater Wireless Sensor Network
(UWSN): a survey . . . . . . . . . . . . 242--252
Qing Li and
Yong Jiang and
Pengfei Duan and
Mingwei Xu and
Xi Xiao Quokka: Latency-Aware Middlebox
Scheduling with dynamic resource
allocation . . . . . . . . . . . . . . . 253--266
Thaha Muhammed and
Riaz Ahmed Shaikh An analysis of fault detection
strategies in wireless sensor networks 267--287
Sheng Wen and
Jiaojiao Jiang and
Bo Liu and
Yang Xiang and
Wanlei Zhou Using epidemic betweenness to measure
the influence of users in complex
networks . . . . . . . . . . . . . . . . 288--299
Chien-Fu Cheng and
Lung-Hao Li Data gathering problem with the data
importance consideration in Underwater
Wireless Sensor Networks . . . . . . . . 300--312
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Habib ur Rehman and
Chee Sun Liew and
Teh Ying Wah and
Muhammad Khurram Khan Towards next-generation heterogeneous
mobile data stream mining applications:
Opportunities, challenges, and future
research directions . . . . . . . . . . 1--24
Shahriar kaisar and
Joarder Kamruzzaman and
Gour Karmakar and
Iqbal Gondal Decentralized content sharing among
tourists in visiting hotspots . . . . . 25--40
Kayode Sakariyah Adewole and
Nor Badrul Anuar and
Amirrudin Kamsin and
Kasturi Dewi Varathan and
Syed Abdul Razak Malicious accounts: Dark of the social
networks . . . . . . . . . . . . . . . . 41--67
Annie Ibrahim Rana and
Brendan Jennings Semantic aware processing of user
defined inference rules to manage home
networks . . . . . . . . . . . . . . . . 68--87
Ashish Singh and
Kakali Chatterjee Cloud security issues and challenges: a
survey . . . . . . . . . . . . . . . . . 88--115
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ting Lu and
Guohua Liu and
Wei Li and
Shan Chang and
Wenjing Guo Distributed sampling rate allocation for
data quality maximization in
rechargeable sensor networks . . . . . . 1--9
Prasan Kumar Sahoo and
Jang-Ping Sheu Design and analysis of collision free
MAC for wireless sensor networks with or
without data retransmission . . . . . . 10--21
L. Manunza and
S. Marseglia and
S. P. Romano Kerberos: a real-time fraud detection
system for IMS-enabled VoIP networks . . 22--34
Chunhong Liu and
Chuanchang Liu and
Yanlei Shang and
Shiping Chen and
Bo Cheng and
Junliang Chen An adaptive prediction approach based on
workload pattern discrimination in the
cloud . . . . . . . . . . . . . . . . . 35--44
Fan Deng and
Li-Yong Zhang Elimination of policy conflict to
improve the PDP evaluation performance 45--57
N. Busom and
R. Petrlic and
F. Sebé and
C. Sorge and
M. Valls A privacy-preserving reputation system
with user rewards . . . . . . . . . . . 58--66
Habib Mostafaei and
Antonio Montieri and
Valerio Persico and
Antonio Pescapé A sleep scheduling approach based on
learning automata for WSN partial
coverage . . . . . . . . . . . . . . . . 67--78
Mohammad Masdari Markov chain-based evaluation of the
certificate status validations in hybrid
MANETs . . . . . . . . . . . . . . . . . 79--89
Jihong Wang and
Wenxiao Shi Joint multicast routing and channel
assignment for multi-radio multi-channel
wireless mesh networks with hybrid
traffic . . . . . . . . . . . . . . . . 90--108
Maryam Barshan and
Hendrik Moens and
Bruno Volckaert and
Filip De Turck Design and evaluation of a dual dynamic
adaptive reservation approach in media
production networks . . . . . . . . . . 109--122
Maicon Melo Alves and
Luci Pirmez and
Silvana Rossetto and
Flavia C. Delicato and
Claudio M. de Farias and
Paulo F. Pires and
Igor L. dos Santos and
Albert Y. Zomaya Damage prediction for wind turbines
using wireless sensor and actuator
networks . . . . . . . . . . . . . . . . 123--140
Chengwen Luo and
Long Cheng and
Hande Hong and
Kartik Sankaran and
Mun Choon Chan and
Jianqiang Li and
Zhong Ming From mapping to indoor semantic queries:
Enabling zero-effort indoor
environmental sensing . . . . . . . . . 141--151
Ahmed AlEroud and
Izzat Alsmadi Identifying cyber-attacks on software
defined networks: an inference-based
intrusion detection approach . . . . . . 152--164
Chao-Tung Yang and
Jung-Chun Liu and
Shuo-Tsung Chen and
Kuan-Lung Huang Virtual machine management system based
on the power saving algorithm in cloud 165--180
Saritha Arunkumar and
Berker Soyluoglu and
Murat Sensoy and
Mudhakar Srivatsa and
Muttukrishnan Rajarajan Location attestation and access control
for mobile devices using GeoXACML . . . 181--188
Mehdi Boulaiche and
Louiza Bouallouche-Medjkoune HSecGR: Highly Secure Geographic Routing 189--199
Murat Karakus and
Arjan Durresi Quality of Service (QoS) in Software
Defined Networking (SDN): a survey . . . 200--218
Mohammad Goudarzi and
Mehran Zamani and
Abolfazl Toroghi Haghighat A fast hybrid multi-site computation
offloading for mobile cloud computing 219--231
Alessandro Morelli and
Mauro Tortonesi and
Cesare Stefanelli and
Niranjan Suri Information-Centric Networking in
next-generation communications scenarios 232--250
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marco Cogoni and
Giovanni Busonera and
Paolo Anedda and
Gianluigi Zanetti Transition to congestion in
communication/computation networks for
near-optimal and sub-optimal resource
management via Monte Carlo simulations 1--11
Swati Sharma and
Alefiya Hussain and
Huzur Saran Towards repeatability & verifiability in
networking experiments: a stochastic
framework . . . . . . . . . . . . . . . 12--23
Asrin Vakili and
Nima Jafari Navimipour Comprehensive and systematic review of
the service composition mechanisms in
the cloud environments . . . . . . . . . 24--36
Yu Xin and
Zhi-Qiang Xie and
Jing Yang A load balance oriented cost efficient
scheduling method for parallel tasks . . 37--46
Shantanu Pal Evaluating the impact of network loads
and message size on mobile opportunistic
networks in challenged environments . . 47--58
Giancarlo Fortino and
Giuseppe Di Fatta and
Sergio F. Ochoa and
Carlos E. Palau Engineering future interoperable and
open IoT systems . . . . . . . . . . . . 59--61
Georgios Exarchakos and
Ilker Oztelcan and
Dimitris Sarakiotis and
Antonio Liotta plexi: Adaptive re-scheduling
web-service of time synchronized
low-power wireless networks . . . . . . 62--73
G. Aloi and
G. Caliciuri and
G. Fortino and
R. Gravina and
P. Pace and
W. Russo and
C. Savaglio Enabling IoT interoperability through
opportunistic smartphone-based mobile
gateways . . . . . . . . . . . . . . . . 74--84
Pal Varga and
Fredrik Blomstedt and
Luis Lino Ferreira and
Jens Eliasson and
Mats Johansson and
Jerker Delsing and
Iker Martínez de Soria Making system of systems interoperable
--- The core components of the arrowhead
framework . . . . . . . . . . . . . . . 85--95
Michael P. Andersen and
Gabe Fierro and
David E. Culler Enabling synergy in IoT: Platform to
service and beyond . . . . . . . . . . . 96--110
Maria Ganzha and
Marcin Paprzycki and
Wieslaw Pawlowski and
Pawel Szmeja and
Katarzyna Wasielewska Semantic interoperability in the
Internet of Things: an overview from the
INTER-IoT perspective . . . . . . . . . 111--124
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
R. Asorey-Cacheda and
A.-J. Garcia-Sanchez and
F. Garcia-Sanchez and
J. Garcia-Haro A survey on non-linear optimization
problems in wireless sensor networks . . 1--20
Gianluca Franchino and
Giorgio Buttazzo A power-aware MAC layer protocol for
real-time communication in wireless
embedded systems . . . . . . . . . . . . 21--34
Liang Zhu and
Changqiao Xu and
Jianfeng Guan and
Hongke Zhang SEM--PPA: a semantical pattern and
preference-aware service mining method
for personalized point of interest
recommendation . . . . . . . . . . . . . 35--46
Juan J. Pérez-Solano and
Santiago Felici-Castell Improving time synchronization in
Wireless Sensor Networks using Bayesian
Inference . . . . . . . . . . . . . . . 47--55
Wenting Shen and
Jia Yu and
Hui Xia and
Hanlin Zhang and
Xiuqing Lu and
Rong Hao Light-weight and privacy-preserving
secure cloud auditing scheme for group
users via the third party medium . . . . 56--64
Alaa Awad and
Amr Mohamed and
Carla-Fabiana Chiasserini and
Tarek Elfouly Distributed in-network processing and
resource optimization over mobile-health
systems . . . . . . . . . . . . . . . . 65--76
Hyunbum Kim and
Heekuck Oh and
Paolo Bellavista and
Jalel Ben-Othman Constructing event-driven partial
barriers with resilience in wireless
mobile sensor networks . . . . . . . . . 77--92
Maryam Amiri and
Leyli Mohammad-Khanli Survey on prediction models of
applications for resources provisioning
in cloud . . . . . . . . . . . . . . . . 93--113
Furui Zhan and
Nianmin Yao and
Zhenguo Gao and
Guozhen Tan A novel key generation method for
wireless sensor networks based on system
of equations . . . . . . . . . . . . . . 114--127
Hang Shen and
Guangwei Bai and
Mei Yang and
Zhonghui Wang Protecting trajectory privacy: a
user-centric analysis . . . . . . . . . 128--139
Sanjib K. Deka and
Nityananda Sarma Opportunity prediction at MAC-layer
sensing for ad-hoc cognitive radio
networks . . . . . . . . . . . . . . . . 140--151
Hamid Reza Arkian and
Abolfazl Diyanat and
Atefe Pourkhalili MIST: Fog-based data analytics scheme
with cost-efficient resource
provisioning for IoT crowdsensing
applications . . . . . . . . . . . . . . 152--165
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amir Rahimzadeh Ilkhechi and
Ibrahim Korpeoglu and
Ugur Güdükbay and
Özgür Ulusoy PETAL: a fully distributed location
service for wireless ad hoc networks . . 1--11
Mengmeng Ge and
Jin B. Hong and
Walter Guttmann and
Dong Seong Kim A framework for automating security
analysis of the Internet of Things . . . 12--27
Mariluz Congosto and
Pablo Basanta-Val and
Luis Sanchez-Fernandez T-Hoarder: a framework to process
Twitter data streams . . . . . . . . . . 28--39
Palvinder Singh Mann and
Satvir Singh Energy efficient clustering protocol
based on improved metaheuristic in
wireless sensor networks . . . . . . . . 40--52
Chang Ruan and
Jianxin Wang and
Wanchun Jiang and
Jiawei Huang and
Geyong Min and
Yi Pan FSQCN: Fast and simple quantized
congestion notification in data center
Ethernet . . . . . . . . . . . . . . . . 53--62
Yue Qiu and
Maode Ma and
Xilei Wang A proxy signature-based handover
authentication scheme for LTE wireless
networks . . . . . . . . . . . . . . . . 63--71
Nadine Abbas and
Hazem Hajj and
Zaher Dawy and
Karim Jahed and
Sanaa Sharafeddine An optimized approach to video traffic
splitting in heterogeneous wireless
networks with energy and QoE
considerations . . . . . . . . . . . . . 72--88
Jun Huang and
Liqian Xu and
Qiang Duan and
Cong-cong Xing and
Jiangtao Luo and
Shui Yu Modeling and performance analysis for
multimedia data flows scheduling in
software defined networks . . . . . . . 89--100
Jonghoon Park and
Cheoleun Moon and
Ikjun Yeom and
Yusung Kim Cardinality estimation using collective
interference for large-scale RFID
systems . . . . . . . . . . . . . . . . 101--110
Samira Chouikhi and
In\`es El Korbi and
Yacine Ghamri-Doudane and
Leila Azouz Saidane Centralized connectivity restoration in
multichannel wireless sensor networks 111--123
Anum Ali and
Ghalib A. Shah and
Muhammad Omer Farooq and
Usman Ghani Technologies and challenges in
developing machine-to-machine
applications: a survey . . . . . . . . . 124--139
Ada Gogu and
Dritan Nace and
Enrico Natalizio and
Yacine Challal Using dynamic programming to solve the
Wireless Sensor Network Configuration
Problem . . . . . . . . . . . . . . . . 140--154
Adel Nadjaran Toosi and
Chenhao Qu and
Marcos Dias de Assunção and
Rajkumar Buyya Renewable-aware geographical load
balancing of web applications for
sustainable data centers . . . . . . . . 155--168
Zina Chkirbene and
Sebti Foufou and
Ridha Hamila and
Zahir Tari and
Albert Y. Zomaya LaCoDa: Layered connected topology for
massive data centers . . . . . . . . . . 169--180
Abderrazak Abdaoui and
Tarek M. El Fouly and
Mohamed H. Ahmed Impact of time synchronization error on
the mode-shape identification and damage
detection/localization in WSNs for
structural health monitoring . . . . . . 181--189
Israel Leyva-Mayorga and
Vicent Pla and
Jorge Martinez-Bauset and
Mario E. Rivero-Angeles A hybrid method for the QoS analysis and
parameter optimization in time-critical
random access wireless sensor networks 190--203
Yunchuan Sun and
Xinpei Yu and
Rongfang Bie and
Houbing Song Discovering time-dependent shortest path
on traffic graph for drivers towards
green driving . . . . . . . . . . . . . 204--212
Yu Liu and
Changjie Zhang and
Bo Li and
Jianwei Niu DeMS: a hybrid scheme of task scheduling
and load balancing in computing clusters 213--220
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Neenu Garg and
Seema Bawa RITS--MHT: Relative indexed and time
stamped Merkle hash tree based data
auditing protocol for cloud computing 1--13
Ingrid Nunes and
Frederico Schardong and
Alberto Schaeffer-Filho BDI2DoS: an application using
collaborating BDI agents to combat DDoS
attacks . . . . . . . . . . . . . . . . 14--24
Bruno Bogaz Zarpelão and
Rodrigo Sanches Miani and
Cláudio Toshio Kawakani and
Sean Carlisto de Alvarenga A survey of intrusion detection in
Internet of Things . . . . . . . . . . . 25--37
Muhammad Baqer Mollah and
Md. Abul Kalam Azad and
Athanasios Vasilakos Security and privacy challenges in
mobile cloud computing: Survey and way
ahead . . . . . . . . . . . . . . . . . 38--54
Gürkan Solmaz and
Damla Turgut Tracking pedestrians and emergent events
in disaster areas . . . . . . . . . . . 55--67
Mahfuzur Rahman and
Peter Graham Compatibility-based static VM placement
minimizing interference . . . . . . . . 68--81
Babak Pourpeighambar and
Mehdi Dehghan and
Masoud Sabaei Multi-agent learning based routing for
delay minimization in Cognitive Radio
Networks . . . . . . . . . . . . . . . . 82--92
Imad Jawhar and
Nader Mohamed and
Jameela Al-Jaroodi and
Dharma P. Agrawal and
Sheng Zhang Communication and networking of
UAV-based systems: Classification and
associated architectures . . . . . . . . 93--108
Mohammed I. Alghamdi and
Xunfei Jiang and
Ji Zhang and
Jifu Zhang and
Minghua Jiang and
Xiao Qin Towards two-phase scheduling of
real-time applications in distributed
systems . . . . . . . . . . . . . . . . 109--117
Binglei Guo and
Jiong Yu and
Bin Liao and
Dexian Yang and
Liang Lu A green framework for DBMS based on
energy-aware query optimization and
energy-efficient query processing . . . 118--130
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Wei Tsai and
Priyanka Rawat and
Ming-Chao Chiang Intelligent systems for heterogeneous
networks . . . . . . . . . . . . . . . . 1--3
Heejun Roh and
Cheoulhoon Jung and
Kyunghwi Kim and
Sangheon Pack and
Wonjun Lee Joint flow and virtual machine placement
in hybrid cloud data centers . . . . . . 4--13
Bart Spinnewyn and
Ruben Mennes and
Juan Felipe Botero and
Steven Latré Resilient application placement for
geo-distributed cloud networks . . . . . 14--31
S. Kirthica and
Rajeswari Sridhar CIT: a Cloud Inter-operation Toolkit to
enhance elasticity and tolerate shut
down of external clouds . . . . . . . . 32--46
Aiqin Hou and
Chase Q. Wu and
Dingyi Fang and
Yongqiang Wang and
Meng Wang Bandwidth scheduling for big data
transfer using multiple fixed
node-disjoint paths . . . . . . . . . . 47--55
Jianfeng Guan and
Zhiwei Yan and
Su Yao and
Changqiao Xu and
Hongke Zhang GBC-based caching function group
selection algorithm for SINET . . . . . 56--63
Guangjie Han and
Chenyu Zhang and
Jinfang Jiang and
Xuan Yang and
Mohsen Guizani Mobile anchor nodes path planning
algorithms using network-density-based
clustering in wireless sensor networks 64--75
Junfeng Wang and
Yiming Miao and
Ping Zhou and
M. Shamim Hossain and
Sk Md Mizanur Rahman A software defined network routing in
wireless multihop network . . . . . . . 76--83
Samir S. Soliman and
Bongyong Song Fifth generation (5G) cellular and the
network for tomorrow: cognitive and
cooperative approach for energy savings 84--93
Vishal Sharma and
Kathiravan Srinivasan and
Han-Chieh Chao and
Kai-Lung Hua and
Wen-Huang Cheng Intelligent deployment of UAVs in 5G
heterogeneous communication environment
for improved coverage . . . . . . . . . 94--105
Chih-Cheng Tseng and
Hwang--Cheng Wang and
Kuo-Chang Ting and
Chih-Chieh Wang and
Fang-Chang Kuo Fast game-based handoff mechanism with
load balancing for LTE/LTE-A
heterogeneous networks . . . . . . . . . 106--115
Chen Chen and
Tie Qiu and
Jinna Hu and
Zhiyuan Ren and
Yang Zhou and
Arun Kumar Sangaiah A congestion avoidance game for
information exchange on intersections in
heterogeneous vehicular networks . . . . 116--126
Haneul Ko and
Sangheon Pack and
Jong-Hyouk Lee and
Alexandru Petrescu DLM: Delayed Location Management in
network mobility (NEMO)-based public
transportation systems . . . . . . . . . 127--133
Hyun-Ho Choi and
Jung-Ryun Lee A flocking-inspired algorithm for fair
resource allocation in vehicle-mounted
mobile relays . . . . . . . . . . . . . 134--142
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zheng Yan and
Jun Liu and
Laurence T. Yang Special issue on pervasive social
networking . . . . . . . . . . . . . . . 1--2
Chang Liu and
Liehuang Zhu and
Jinjun Chen Efficient searchable symmetric
encryption for storing multiple source
dynamic social data on cloud . . . . . . 3--14
Feng Lu and
Weikang Zhang and
Liwen Shao and
Xunfei Jiang and
Peng Xu and
Hai Jin Scalable influence maximization under
independent cascade model . . . . . . . 15--23
Darren Quick and
Kim-Kwang Raymond Choo Pervasive social networking forensics:
Intelligence and evidence from mobile
device extracts . . . . . . . . . . . . 24--33
Gang Sun and
Yuxia Xie and
Dan Liao and
Hongfang Yu and
Victor Chang User-defined privacy location-sharing
system in mobile online social networks 34--45
Zheng Yan and
Wangyang Shi CloudFile: a cloud data access control
system based on mobile social trust . . 46--58
Wenyin Yang and
Guojun Wang and
Md Zakirul Alam Bhuiyan and
Kim-Kwang Raymond Choo Hypergraph partitioning for social
networks based on information entropy
modularity . . . . . . . . . . . . . . . 59--71
Yue Zhang and
Bin Song and
Peng Zhang Social behavior study under pervasive
social networking based on decentralized
deep reinforcement learning . . . . . . 72--81
Zufan Zhang and
Lisha Wang and
Dan Liu and
Yu Zhang Peer discovery for D2D communications
based on social attribute and service
attribute . . . . . . . . . . . . . . . 82--91
Yadong Zhou and
Beibei Zhang and
Xiaoxiao Sun and
Qinghua Zheng and
Ting Liu Analyzing and modeling dynamics of
information diffusion in microblogging
social network . . . . . . . . . . . . . 92--102
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Masdari and
Safiyyeh Ahmadzadeh A survey and taxonomy of the
authentication schemes in Telecare
Medicine Information Systems . . . . . . 1--19
Bing Xiong and
Kun Yang and
Jinyuan Zhao and
Keqin Li Robust dynamic network traffic
partitioning against malicious attacks 20--31
Franciscus X. A. Wibowo and
Mark A. Gregory and
Khandakar Ahmed and
Karina M. Gomez Multi-domain Software Defined
Networking: Research status and
challenges . . . . . . . . . . . . . . . 32--45
Ping Song and
Yi Liu and
Chi Liu and
Depei Qian ParaFlow: Fine-grained parallel SDN
controller for large-scale networks . . 46--59
Sisi Xiong and
Yanjun Yao and
Michael Berry and
Hairong Qi and
Qing Cao Frequent traffic flow identification
through probabilistic Bloom filter and
its GPU-based acceleration . . . . . . . 60--72
Rodolfo S. Antunes and
Matheus B. Lehmann and
Rodrigo B. Mansilha and
Luciano P. Gaspary and
Marinho P. Barcellos NDNrel: a mechanism based on relations
among objects to improve the performance
of NDN . . . . . . . . . . . . . . . . . 73--86
B. Ducourthial and
S. Mottelet and
A. Busson Improving fairness between close Wi-Fi
access points . . . . . . . . . . . . . 87--99
Chunlin Li and
Jing Zhang and
Youlong Luo Real-time scheduling based on optimized
topology and communication traffic in
distributed real-time computation
platform of storm . . . . . . . . . . . 100--115
Muhammad Faran Majeed and
Matthew N. Dailey and
Riaz Khan and
Apinun Tunpan Pre-caching: a proactive scheme for
caching video traffic in named data mesh
networks . . . . . . . . . . . . . . . . 116--130
Reza Farrahi Moghaddam and
Vahid Asghari and
Fereydoun Farrahi Moghaddam and
Yves Lemieux and
Mohamed Cheriet A Monte-Carlo approach to lifespan
failure performance analysis of the
network fabric in modular data centers 131--146
Saeed Kargar and
Leyli Mohammad-Khanli Fractal: an advanced multidimensional
range query lookup protocol on nested
rings for distributed systems . . . . . 147--168
Animesh Roy and
Soumit Bose and
Tamaghna Acharya and
Sipra DasBit Social-based energy-aware multicasting
in delay tolerant networks . . . . . . . 169--184
W. Haider and
J. Hu and
J. Slay and
B. P. Turnbull and
Y. Xie Generating realistic intrusion detection
system dataset based on fuzzy
qualitative modeling . . . . . . . . . . 185--192
David Nuñez and
Isaac Agudo and
Javier Lopez Proxy Re-Encryption: Analysis of
constructions and its application to
secure access delegation . . . . . . . . 193--209
Peng Liu and
Biao Xu and
Guojun Dai and
Zhen Jiang and
Jie Wu MDP: Minimum delay hot-spot parking . . 210--222
I. B. Arun and
T. G. Venkatesh Design and performance analysis of a MAC
protocol for wireless LANs supporting
multipacket reception . . . . . . . . . 223--236
Mohammed Atiquzzaman Editorial: New Editors 2017 . . . . . . A1--A5
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
De-gan Zhang and
Si Liu and
Ting Zhang and
Zhao Liang Novel unequal clustering routing
protocol considering energy balancing
based on network partition & distance for
mobile education . . . . . . . . . . . . 1--9
Fadele Ayotunde Alaba and
Mazliza Othman and
Ibrahim Abaker Targio Hashem and
Faiz Alotaibi Internet of Things security: a survey 10--28
Melchizedek Alipio and
Nestor Michael Tiglao and
Antonio Grilo and
Fawaz Bokhari and
Umair Chaudhry and
Shavez Qureshi Cache-based transport protocols in
wireless sensor networks: a survey and
future directions . . . . . . . . . . . 29--49
Einollah Jafarnejad Ghomi and
Amir Masoud Rahmani and
Nooruldeen Nasih Qader Load-balancing algorithms in cloud
computing: a survey . . . . . . . . . . 50--71
Ahmed I. Saleh and
Khaled M. Abo-Al-Ez and
Ahmed A. Abdullah A Multi-Aware Query Driven (MAQD)
routing protocol for mobile wireless
sensor networks based on neuro-fuzzy
inference . . . . . . . . . . . . . . . 72--98
Sumair Khan and
Babar Nazir and
Iftikhar Ahmed Khan and
Shahaboddin Shamshirband and
Anthony T. Chronopoulos Load balancing in grid computing:
Taxonomy, trends and opportunities . . . 99--111
Eunsam Kim and
Jonathan C. L. Liu An integrated prefetching/caching scheme
in multimedia servers . . . . . . . . . 112--123
Ruiying Li and
Meinan Li and
Haitao Liao and
Ning Huang An efficient method for evaluating the
end-to-end transmission time reliability
of a switched Ethernet . . . . . . . . . 124--133
Carlos Abreu and
Francisco Miranda and
P. M. Mendes Smart context-aware QoS-based admission
control for biomedical wireless sensor
networks . . . . . . . . . . . . . . . . 134--145
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Victor Chang and
Verena Kantere and
Muthu Ramanchadran Emerging services for Internet of Things 1--2
Gang Sun and
Victor Chang and
Muthu Ramachandran and
Zhili Sun and
Gangmin Li and
Hongfang Yu and
Dan Liao Efficient location privacy algorithm for
Internet of Things (IoT) services and
applications . . . . . . . . . . . . . . 3--13
Faisal Fayyaz Qureshi and
Rahat Iqbal and
Muhammad Nabeel Asghar Energy efficient wireless communication
technique based on Cognitive Radio for
Internet of Things . . . . . . . . . . . 14--25
Yang Yang and
Xianghan Zheng and
Chunming Tang Lightweight distributed secure data
management system for health Internet of
Things . . . . . . . . . . . . . . . . . 26--37
Muneer Bani Yassein and
Shadi Aljawarneh and
Esra'a Masa'deh A new elastic trickle timer algorithm
for Internet of Things . . . . . . . . . 38--47
Chen Chen and
Honghui Zhao and
Tie Qiu and
Mingcheng Hu and
Hui Han and
Zhiyuan Ren An efficient power saving polling scheme
in the Internet of Energy . . . . . . . 48--61
Pradeep Kumar and
Rajkumar Saini and
Partha Pratim Roy and
Debi Prosad Dogra A bio-signal based framework to secure
mobile devices . . . . . . . . . . . . . 62--71
Fan Wu and
Lili Xu and
Saru Kumari and
Xiong Li and
Jian Shen and
Kim-Kwang Raymond Choo and
Mohammad Wazid and
Ashok Kumar Das An efficient authentication and key
agreement scheme for multi-gateway
wireless sensor networks in IoT
deployment . . . . . . . . . . . . . . . 72--85
Cong Zhang and
Chin-Feng Lai and
Ying-Hsun Lai and
Zhen-Wei Wu and
Han-Chieh Chao An inferential real-time falling posture
reconstruction for Internet of
Healthcare Things . . . . . . . . . . . 86--95
Thar Baker and
Muhammad Asim and
Hissam Tawfik and
Bandar Aldawsari and
Rajkumar Buyya An energy-aware service composition
algorithm for multiple cloud-based IoT
applications . . . . . . . . . . . . . . 96--108
Md Fasiul Alam and
Serafeim Katsikas and
Olga Beltramello and
Stathes Hadjiefthymiades Augmented and virtual reality based
monitoring and safety system: a
prototype IoT platform . . . . . . . . . 109--119
Xuan Thang Nguyen and
Huu Tam Tran and
Harun Baraki and
Kurt Geihs Optimization of non-functional
properties in Internet of Things
applications . . . . . . . . . . . . . . 120--129
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Cristian Cleder Machado and
Juliano Araujo Wickboldt and
Lisandro Zambenedetti Granville and
Alberto Schaeffer-Filho ARKHAM: an Advanced Refinement toolkit
for Handling Service Level Agreements in
Software-Defined Networking . . . . . . 1--16
Ahmad H. Dehwah and
Shahrazed Elmetennani and
Christian Claudel UD-WCMA: an energy estimation and
forecast scheme for solar powered
wireless sensor networks . . . . . . . . 17--25
Thiago P. B. Vieira and
Danilo F. Tenório and
João Paulo C. L. da Costa and
Edison P. de Freitas and
Giovanni Del Galdo and
Rafael T. de Sousa Júnior Model order selection and eigen
similarity based framework for detection
and identification of network attacks 26--41
Javad Zarrin and
Rui L. Aguiar and
João Paulo Barraca HARD: Hybrid Adaptive Resource Discovery
for Jungle Computing . . . . . . . . . . 42--73
Ju Hyoung Mun and
Hyesook Lim Cache sharing using bloom filters in
named data networking . . . . . . . . . 74--82
Tin-Yu Wu and
Nadra Guizani and
Jhih-Siang Huang Live migration improvements by related
dirty memory prediction in cloud
computing . . . . . . . . . . . . . . . 83--89
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Erwin Adi and
Zubair Baig and
Philip Hingston Stealthy Denial of Service (DoS) attack
modelling and detection for HTTP/2
services . . . . . . . . . . . . . . . . 1--13
Trung V. Phan and
Nguyen Khac Bao and
Minho Park Distributed-SOM: a novel performance
bottleneck handler for large-sized
software-defined networks under flooding
attacks . . . . . . . . . . . . . . . . 14--25
Shigen Shen and
Haiping Ma and
En Fan and
Keli Hu and
Shui Yu and
Jianhua Liu and
Qiying Cao A non-cooperative non-zero-sum
game-based dependability assessment of
heterogeneous WSNs with malware
diffusion . . . . . . . . . . . . . . . 26--35
Mohammad Masdari and
Safiyyeh Ahmadzadeh and
Moazam Bidaki Key management in wireless Body Area
Network: Challenges and issues . . . . . 36--51
Vireshwar Kumar and
Jung-Min (Jerry) Park and
Kaigui Bian Transmitter authentication using
hierarchical modulation in dynamic
spectrum sharing . . . . . . . . . . . . 52--60
Souad Ghazouani and
Yahya Slimani A survey on cloud service description 61--74
Jing Zhang and
Li Xu and
Shuming Zhou and
Geyong Min and
Yang Xiang and
Jia Hu Crossed Cube Ring: a $k$-connected
virtual backbone for wireless sensor
networks . . . . . . . . . . . . . . . . 75--88
Malik Muhammad Qirtas and
Yasir Faheem and
Mubashir Husain Rehmani Throwboxes in delay tolerant networks: a
survey of placement strategies,
buffering capacity, and mobility models 89--103
Angelos Michalas and
Aggeliki Sgora and
Dimitrios D. Vergados An integrated MIH-FPMIPv6 mobility
management approach for evolved-packet
system architectures . . . . . . . . . . 104--119
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Sabu M. Thampi and
Jaime Lloret Mauri and
Robin Doss Special issue on Underwater Acoustic
Sensor Networks: Emerging trends and
current perspectives . . . . . . . . . . 1--2
Sarang C. Dhongdi and
Pritish Nahar and
Rishabh Sethunathan and
Lucy J. Gudino and
K. R. Anupama Cross-layer protocol stack development
for three-dimensional underwater
Acoustic Sensor Network . . . . . . . . 3--19
Priyatosh Mandal Performance comparison of TDMA variants
for underwater acoustic sensor networks 20--30
Nadeem Javaid and
Sheraz Hussain and
Ashfaq Ahmad and
Muhammad Imran and
Abid Khan and
Mohsen Guizani Region based cooperative routing in
underwater wireless sensor networks . . 31--41
Shalli Rani and
Syed Hassan Ahmed and
Jyoteesh Malhotra and
Rajneesh Talwar Energy efficient chain based routing
protocol for underwater wireless sensor
networks . . . . . . . . . . . . . . . . 42--50
Guangjie Han and
Li Liu and
Na Bao and
Jinfang Jiang and
Wenbo Zhang and
Joel J. P. C. Rodrigues AREP: an asymmetric link-based reverse
routing protocol for underwater acoustic
sensor networks . . . . . . . . . . . . 51--58
Jingjing Wang and
Wei Shi and
Lingwei Xu and
Liya Zhou and
Qiuna Niu and
Ju liu Design of optical-acoustic hybrid
underwater wireless sensor network . . . 59--67
Weifeng Sun and
Chi Zhou and
Tie Qiu and
Yuqing Liu An efficient communication scheme for
solving merge conflicts in maritime
transportation . . . . . . . . . . . . . 68--76
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mustapha Boushaba and
Abdelhakim Hafid and
Michel Gendreau Node stability-based routing in Wireless
Mesh Networks . . . . . . . . . . . . . 1--12
Albert Sunny and
Sumankumar Panchal and
Nikhil Vidhani and
Subhashini Krishnasamy and
S. V. R. Anand and
Malati Hegde and
Joy Kuri and
Anurag Kumar A generic controller for managing TCP
transfers in IEEE 802.11 infrastructure
WLANs . . . . . . . . . . . . . . . . . 13--26
Chi-Sheng Huang and
Meng-Feng Tsai and
Po-Hsuan Huang and
Li-Ding Su and
Kuei-Sheng Lee Distributed asteroid discovery system
for large astronomical data . . . . . . 27--37
Farid Lalem and
Ahc\`ene Bounceur and
Madani Bezoui and
Massinissa Saoudi and
Reinhardt Euler and
Tahar Kechadi and
Marc Sevaux LPCN: Least polar-angle connected node
algorithm to find a polygon hull in a
connected Euclidean graph . . . . . . . 38--50
M. Ahmad and
M. Azam and
M. Naeem and
M. Iqbal and
A. Anpalagan and
M. Haneef Resource management in D2D
communication: an optimization
perspective . . . . . . . . . . . . . . 51--75
Chaofan Ma and
Wei Liang and
Meng Zheng Delay constrained relay node placement
in two-tiered wireless sensor networks:
a set-covering-based algorithm . . . . . 76--90
Jeyasekar A. and
Kasmir Raja S. V. and
Annie Uthra R. Congestion avoidance algorithm using
ARIMA(2,1,1) model-based RTT estimation
and RSS in heterogeneous wired-wireless
networks . . . . . . . . . . . . . . . . 91--109
Chengming Luo and
Wei Li and
Xinnan Fan and
Hai Yang and
Jianjun Ni and
Xuewu Zhang and
Gaifang Xin and
Pengfei Shi Positioning technology of mobile vehicle
using self-repairing heterogeneous
sensor networks . . . . . . . . . . . . 110--122
Chao Bu and
Xingwei Wang and
Hui Cheng and
Min Huang and
Keqin Li and
Sajal K. Das Enabling Adaptive Routing Service
Customization via the integration of SDN
and NFV . . . . . . . . . . . . . . . . 123--136
Sugi Lee and
Younghoon Kim and
Ikjun Yeom and
Yusung Kim Active request management in stateful
forwarding networks . . . . . . . . . . 137--149
Mohammad Sharif and
Abolghasem Sadeghi-Niaraki Ubiquitous sensor network simulation and
emulation environments: a survey . . . . 150--181
Pieter-Jan Maenhaut and
Hendrik Moens and
Bruno Volckaert and
Veerle Ongenae and
Filip De Turck A dynamic Tenant-Defined Storage system
for efficient resource management in
cloud applications . . . . . . . . . . . 182--196
Bo Yi and
Xingwei Wang and
Min Huang Design and evaluation of schemes for
provisioning service function chain with
function scalability . . . . . . . . . . 197--214
Yao-Chung Fan and
Huan Chen and
Fang-Yie Leu and
Ilsun You Enabling in-network aggregation by
diffusion units for urban scale M2M
networks . . . . . . . . . . . . . . . . 215--227
Akiya Kamimura and
Kohji Tomita A self-organizing network coordination
framework enabling collision-free and
congestion-less wireless sensor networks 228--244
Muhammad Asif Khan and
Wael Cherif and
Fethi Filali and
Ridha Hamila Wi-Fi Direct Research --- Current Status
and Future Perspectives . . . . . . . . 245--258
Shahid Anwar and
Zakira Inayat and
Mohamad Fadli Zolkipli and
Jasni Mohamad Zain and
Abdullah Gani and
Nor Badrul Anuar and
Muhammad Khurram Khan and
Victor Chang Cross-VM cache-based side channel
attacks and proposed prevention
mechanisms: a survey . . . . . . . . . . 259--279
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Reza Ghebleh and
Ali Ghaffari Retracted: A Comprehensive survey on 5G:
the prospect of future communications 1--32
Bin Dai and
Guan Xu and
Bengxiong Huang and
Peng Qin and
Yang Xu Enabling network innovation in data
center networks with software defined
networking: a survey . . . . . . . . . . 33--49
Faheem Zafar and
Abid Khan and
Saba Suhail and
Idrees Ahmed and
Khizar Hameed and
Hayat Mohammad Khan and
Farhana Jabeen and
Adeel Anjum Trustworthy data: a survey, taxonomy and
future trends of secure provenance
schemes . . . . . . . . . . . . . . . . 50--68
Arijit Nath and
Nityananda Sarma A distributed solution for cooperative
spectrum sensing scheduling in
multi-band cognitive radio networks . . 69--77
Stefano Petrangeli and
Tingyao Wu and
Tim Wauters and
Rafael Huysegems and
Tom Bostoen and
Filip De Turck A machine learning-based framework for
preventing video freezes in HTTP
adaptive streaming . . . . . . . . . . . 78--92
Warley Junior and
Adriano França and
Kelvin Dias and
José N. de Souza Supporting mobility-aware computational
offloading in mobile cloud environment 93--108
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Waqas Rehan and
Stefan Fischer and
Maaz Rehan and
Mubashir Husain Rehmani A comprehensive survey on multichannel
routing in wireless sensor networks . . 1--25
Mohammad Sadegh Aslanpour and
Mostafa Ghobaei-Arani and
Adel Nadjaran Toosi Auto-scaling web applications in clouds:
a cost-aware approach . . . . . . . . . 26--41
Antonio Marotta and
Enrica Zola and
Fabio D'Andreagiovanni and
Andreas Kassler A fast robust optimization-based
heuristic for the deployment of green
virtual network functions . . . . . . . 42--53
Garima Chopra and
Rakesh Kumar Jha and
Sanjeev Jain A survey on ultra-dense network and
emerging technologies: Security
challenges and possible solutions . . . 54--78
Leonard Heilig and
Rajkumar Buyya and
Stefan Voß Location-aware brokering for consumers
in multi-cloud computing environments 79--93
Daniel Yokoyama and
Bruno Schulze and
Henrique Kloh and
Matheus Bandini and
Vinod Rebello Affinity aware scheduling model of
cluster nodes in private clouds . . . . 94--104
Tingwei Zhu and
Dan Feng and
Fang Wang and
Yu Hua and
Qingyu Shi and
Yanwen Xie and
Yong Wan A congestion-aware and robust multicast
protocol in SDN-based data center
networks . . . . . . . . . . . . . . . . 105--117
Mohammed Atiquzzaman Editorial: 2016 Best Paper Awards . . . A1--A4
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chih-Min Chao and
Yun-Ting Ling and
Cheng-Hong Jiang Number of channels adjustment for
cognitive radio networks . . . . . . . . 1--13
M. De Benedetti and
F. D'Urso and
G. Fortino and
F. Messina and
G. Pappalardo and
C. Santoro A fault-tolerant self-organizing
flocking approach for UAV aerial survey 14--30
Amir Khorsandi Koohanestani and
Amin Ghalami Osgouei and
Hossein Saidi and
Ali Fanian An analytical model for delay bound of
OpenFlow based SDN using network
calculus . . . . . . . . . . . . . . . . 31--38
Pimmy Gandotra and
Rakesh Kumar Jha A survey on green communication and
security challenges in 5G wireless
communication networks . . . . . . . . . 39--61
Abolfazl Diyanat and
Ahmad Khonsari and
Hosein Shafiei Preservation of temporal privacy in body
sensor networks . . . . . . . . . . . . 62--71
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdusy Syarif and
Abdelhafid Abouaissa and
Pascal Lorenz Operator calculus approach for route
optimizing and enhancing wireless sensor
network . . . . . . . . . . . . . . . . 1--10
Jorge Maestre Vidal and
Ana Lucila Sandoval Orozco and
Luis Javier García Villalba Alert correlation framework for malware
detection by anomaly-based packet
payload analysis . . . . . . . . . . . . 11--22
Behrouz Pourghebleh and
Nima Jafari Navimipour Data aggregation mechanisms in the
Internet of things: a systematic review
of the literature and recommendations
for future research . . . . . . . . . . 23--34
Rekha Nachiappan and
Bahman Javadi and
Rodrigo N. Calheiros and
Kenan M. Matawie Cloud storage reliability for Big Data
applications: a state of the art survey 35--47
Mussab Alaa and
A. A. Zaidan and
B. B. Zaidan and
Mohammed Talal and
M. L. M. Kiah A review of smart home applications
based on Internet of Things . . . . . . 48--65
Suleman Khan and
Muhammad Shiraz and
Laleh Boroumand and
Abdullah Gani and
Muhammad Khurram Khan Towards port-knocking authentication
methods for mobile cloud computing . . . 66--78
Vishal Sharma and
Fei Song and
Ilsun You and
Mohammed Atiquzzaman Energy efficient device discovery for
reliable communication in 5G-based IoT
and BSNs using unmanned aerial vehicles 79--95
Diego V. Queiroz and
Marcelo S. Alencar and
Ruan D. Gomes and
Iguatemi E. Fonseca and
Cesar Benavente-Peces Survey and systematic mapping of
industrial Wireless Sensor Networks . . 96--125
Satish Kumar and
Arnab Sarkar and
Arijit Sur A resource allocation framework for
adaptive video streaming over LTE . . . 126--139
Stephen S. Oyewobi and
Gerhard P. Hancke A survey of cognitive radio handoff
schemes, challenges and issues for
industrial wireless sensor networks
(CR-IWSN) . . . . . . . . . . . . . . . 140--156
Shaufikah Shukri and
Latifah Munirah Kamarudin Device free localization technology for
human detection and counting with RF
sensor networks: a review . . . . . . . 157--174
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chaoyue Niu and
Minping Zhou and
Zhenzhe Zheng and
Fan Wu and
Guihai Chen ERA: Towards privacy preservation and
verifiability for online ad exchanges 1--10
Hassan Jamil Syed and
Abdullah Gani and
Raja Wasim Ahmad and
Muhammad Khurram Khan and
Abdelmuttlib Ibrahim Abdalla Ahmed Cloud monitoring: a review, taxonomy,
and open research issues . . . . . . . . 11--26
Pengfei Hu and
Sahraoui Dhelim and
Huansheng Ning and
Tie Qiu Survey on fog computing: architecture,
key technologies, applications and open
issues . . . . . . . . . . . . . . . . . 27--42
Avnish Thakur and
Major Singh Goraya A taxonomic survey on load balancing in
cloud . . . . . . . . . . . . . . . . . 43--57
Hussein Khayou and
Bakr Sarakbi A validation model for non-lexical
routing protocols . . . . . . . . . . . 58--64
Md Hasanul Ferdaus and
Manzur Murshed and
Rodrigo N. Calheiros and
Rajkumar Buyya An algorithm for network and data-aware
placement of multi-tier applications in
cloud data centers . . . . . . . . . . . 65--83
Zakaria Gheid and
Yacine Challal and
Xun Yi and
Abdelouahid Derhab Efficient and privacy-aware multi-party
classification protocol for human
activity recognition . . . . . . . . . . 84--96
Tarun Kulshrestha and
Divya Saxena and
Rajdeep Niyogi and
Vaskar Raychoudhury and
Manoj Misra SmartITS: Smartphone-based
identification and tracking using
seamless indoor-outdoor localization . . 97--113
Surajit Basak and
Tamaghna Acharya Cross layer optimization for outage
minimizing routing in cognitive radio ad
hoc networks with primary users' outage
protection . . . . . . . . . . . . . . . 114--124
Peiyan Yuan and
Mingyang Song and
Xiaoyan Zhao Effective and efficient collection of
control messages for opportunistic
routing algorithms . . . . . . . . . . . 125--130
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
YiPeng Wang and
Xiaochun Yun and
Yongzheng Zhang and
Liwei Chen and
Guangjun Wu A nonparametric approach to the
automated protocol fingerprint inference 1--9
Gulshan Kumar and
Mritunjay Kumar Rai and
Rahul Saha Securing range free localization against
wormhole attack using distance
estimation and maximum likelihood
estimation in Wireless Sensor Networks 10--16
Luis Miguel Torres and
Eduardo Magaña and
Daniel Morató and
Santiago Garcia-Jimenez and
Mikel Izal TBDClust: Time-based density clustering
to enable free browsing of sites in
pay-per-use mobile Internet providers 17--27
Ying Qu and
Bryan Ng and
Michael Homer A goodput distribution model for
planning IEEE 802.11 WBNs in built
environments . . . . . . . . . . . . . . 28--46
Seokseong Jeon and
Jae-Pil Jeong and
Young-Joo Suh and
Chansu Yu and
Dongsoo Han Selective AP probing for indoor
positioning in a large and AP-dense
environment . . . . . . . . . . . . . . 47--57
Adrián Sánchez-Carmona and
Carlos Borrego and
Sergi Robles and
Gerard Garcia-Vandellós Two birds, one stone: Using mobility
behavioral profiles both as destinations
and as a routing tool . . . . . . . . . 58--72
Fatima Tul Zuhra and
Kamalrulnizam Abu Bakar and
Adnan Ahmed and
Mohsin Ali Tunio Routing protocols in wireless body
sensor networks: a comprehensive survey 73--97
Sarogini Grace Pease and
Paul P. Conway and
Andrew A. West Hybrid ToF and RSSI real-time semantic
tracking with an adaptive industrial
Internet of Things architecture . . . . 98--109
Yu Xin and
Ya-Di Wang and
Zhi-Qiang Xie and
Jing Yang A cooperative scheduling method based on
the device load feedback for multiple
tasks scheduling . . . . . . . . . . . . 110--119
M. C. Lucas-Estañ and
J. Gozalvez Distributed radio resource allocation
for device-to-device communications
underlaying cellular networks . . . . . 120--130
Indu I. and
Rubesh Anand P. M. and
Vidhyacharan Bhaskar Encrypted token based authentication
with adapted SAML technology for cloud
web services . . . . . . . . . . . . . . 131--145
Giulio Aliberti and
Roberto Di Pietro and
Stefano Guarino Epidemic data survivability in
Unattended Wireless Sensor Networks: New
models and results . . . . . . . . . . . 146--165
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Atiquzzaman 100 Volumes of JNCA . . . . . . . . . . iii--iv
Cong Wang and
Maode Ma and
Zenghua Zhao Design of a novel dynamic trust model
for spectrum management in WRANs of TV
white space . . . . . . . . . . . . . . 1--10
A. B. M. Alim Al Islam and
Tusher Chakraborty and
Taslim Arefin Khan and
Mahabub Zoraf and
Chowdhury Sayeed Hyder Towards defending eavesdropping on NFC 11--23
Tassos Dimitriou and
Ioannis Krontiris Privacy-respecting auctions and
rewarding mechanisms in mobile
crowd-sensing applications . . . . . . . 24--34
Sandhya and
Yash Sinha and
K. Haribabu A survey: Hybrid SDN . . . . . . . . . . 35--55
Iria Estévez-Ayres and
Jesús Arias Fisteus and
Carlos Delgado-Kloos Lostrego: a distributed stream-based
infrastructure for the real-time
gathering and analysis of heterogeneous
educational data . . . . . . . . . . . . 56--68
Mohammed Hashem and
Shrief I. Barakat and
Mahmoud A. AttaAlla Enhanced tree routing protocols for
multi-hop and multi-channel cognitive
radio network (EMM--TRP) . . . . . . . . 69--79
Sidra Aslam and
Saif ul Islam and
Abid Khan and
Mansoor Ahmed and
Adnan Akhundzada and
Muhammad Khurram Khan Information collection centric
techniques for cloud resource
management: Taxonomy, analysis and
challenges . . . . . . . . . . . . . . . 80--94
Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Thank You Reviewers . . . . . . . . . . iii--ix
Nanda Kumar Thanigaivelan and
Ethiopia Nigussie and
Antti Hakkala and
Seppo Virtanen and
Jouni Isoaho CoDRA: Context-based dynamically
reconfigurable access control system for
Android . . . . . . . . . . . . . . . . 1--17
Faheem Ullah and
Matthew Edwards and
Rajiv Ramdhany and
Ruzanna Chitchyan and
M. Ali Babar and
Awais Rashid Data exfiltration: a review of external
attack vectors and countermeasures . . . 18--54
Mohamed Amine Ferrag and
Leandros Maglaras and
Antonios Argyriou and
Dimitrios Kosmanos and
Helge Janicke Security for 4G and 5G cellular
networks: a survey of existing
authentication and privacy-preserving
schemes . . . . . . . . . . . . . . . . 55--82
Yao Shen and
Wei Yang and
Liusheng Huang Concealed in web surfing: Behavior-based
covert channels in HTTP . . . . . . . . 83--95
Philip Parsch and
Alejandro Masrur On reliable communication in
transmit-only networks for home
automation . . . . . . . . . . . . . . . 96--110
Lei Wang and
Jianwei Niu and
Houbing Song and
Mohammed Atiquzzaman SentiRelated: a cross-domain sentiment
classification algorithm for short texts
through sentiment related index . . . . 111--119
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Jin Cao and
Maode Ma and
Hui Li and
Yulong Fu and
Xuefeng Liu EGHR: Efficient group-based handover
authentication protocols for mMTC in 5G
wireless networks . . . . . . . . . . . 1--16
Kumar Ravi and
Yogesh Khandelwal and
Boora Shiva Krishna and
Vadlamani Ravi Analytics in/for cloud --- an
interdependence: a review . . . . . . . 17--37
Vishal Sharma and
Ilsun You and
Fang-Yie Leu and
Mohammed Atiquzzaman Secure and efficient protocol for fast
handover in 5G mobile Xhaul networks . . 38--57
Naina Emmanuel and
Abid Khan and
Masoom Alam and
Tanveer Khan and
Muhammad Khurram Khan Structures and data preserving
homomorphic signatures . . . . . . . . . 58--70
Usama Mir and
Zeeshan Ahmed Bhatti Time triggered handoff schemes in
cognitive radio networks: a survey . . . 71--85
Anonymous Editorial Board . . . . . . . . . . . . i--i
Marcos Dias de Assunção and
Alexandre da Silva Veith and
Rajkumar Buyya Distributed data stream processing and
edge computing: a survey on resource
elasticity and future directions . . . . 1--17
Furui Zhan and
Nianmin Yao and
Zhenguo Gao and
Haitao Yu Efficient key generation leveraging
wireless channel reciprocity for MANETs 18--28
Haneet Kour and
Rakesh Kumar Jha and
Sanjeev Jain A comprehensive survey on spectrum
sharing: Architecture, energy efficiency
and security issues . . . . . . . . . . 29--57
Sadip Midya and
Asmita Roy and
Koushik Majumder and
Santanu Phadikar Multi-objective optimization technique
for resource allocation and task
scheduling in vehicular cloud
architecture: a hybrid adaptive nature
inspired approach . . . . . . . . . . . 58--84
Veerabhadra Rao Chandakanna REHDFS: a random read/write enhanced
HDFS . . . . . . . . . . . . . . . . . . 85--100
Yuan Zhang and
Lin Cui and
Wei Wang and
Yuxiang Zhang A survey on software defined networking
with multiple controllers . . . . . . . 101--118
Laizhong Cui and
Huaixiong Hu and
Shui Yu and
Qiao Yan and
Zhong Ming and
Zhenkun Wen and
Nan Lu DDSE: a novel evolutionary algorithm
based on degree-descending search
strategy for influence maximization in
social networks . . . . . . . . . . . . 119--130
Giuseppe Aceto and
Domenico Ciuonzo and
Antonio Montieri and
Antonio Pescapé Multi-classification approaches for
classifying mobile app traffic . . . . . 131--145
Yan Huang and
Zhipeng Cai and
Anu G. Bourgeois Search locations safely and accurately:
a location privacy protection algorithm
with accurate service . . . . . . . . . 146--156
Sameh Zakhary and
Abderrahim Benslimane On location-privacy in opportunistic
mobile networks, a survey . . . . . . . 157--170
Jungang Lou and
Yunliang Jiang and
Qing Shen and
Ruiqin Wang Failure prediction by relevance vector
regression with improved
quantum-inspired gravitational search 171--177
Lu Zhou and
Quanlong Wang and
Xin Sun and
Piotr Kulicki and
Arcangelo Castiglione Quantum technique for access control in
cloud computing II: Encryption and key
distribution . . . . . . . . . . . . . . 178--184
Changsong Yang and
Xiaofeng Chen and
Yang Xiang Blockchain-based publicly verifiable
data deletion scheme for cloud storage 185--193
Xiong Li and
Jianwei Niu and
Saru Kumari and
Fan Wu and
Arun Kumar Sangaiah and
Kim-Kwang Raymond Choo A three-factor anonymous authentication
scheme for wireless sensor networks in
Internet of Things environments . . . . 194--204
Guangjie Han and
Wenhui Que and
Gangyong Jia and
Wenbo Zhang Resource-utilization-aware energy
efficient server consolidation algorithm
for green computing in IIOT . . . . . . 205--214
Qinying Lin and
Houbing Song and
Xiaolin Gui and
Xiaoping Wang and
Saiyu Su A shortest path routing algorithm for
unmanned aerial systems based on grid
position . . . . . . . . . . . . . . . . 215--224
Bin Cao and
Jianwei Zhao and
Zhihan Lv and
Xin Liu and
Xinyuan Kang and
Shan Yang Deployment optimization for 3D
industrial wireless sensor networks
based on particle swarm optimizers with
distributed parallelism . . . . . . . . 225--238
Weishan Zhang and
Gaowa Wulan and
Jia Zhai and
Liang Xu and
Dehai Zhao and
Xin Liu and
Su Yang and
Jiehan Zhou An intelligent power distribution
service architecture using cloud
computing and deep learning techniques 239--248
Muzzamil Noor and
Haider Abbas and
Waleed Bin Shahid Countering cyber threats for industrial
applications: an automated approach for
malware evasion detection and analysis 249--261
Keke Gai and
Meikang Qiu and
Xiaotong Sun A survey on FinTech . . . . . . . . . . 262--273
Deze Zeng and
Shiyan Zhang and
Lin Gu and
Shui Yu and
Zhangjie Fu Quality-of-sensing aware budget
constrained contaminant detection sensor
deployment in water distribution system 274--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Amrita Bose Paul and
Santosh Biswas and
Sukumar Nandi and
Sandip Chakraborty MATEM: A unified framework based on
trust and MCDM for assuring security,
reliability and QoS in DTN routing . . . 1--20
Mahdi Zareei and
A. K. M. Muzahidul Islam and
Cesar Vargas-Rosales and
Nafees Mansoor and
Shidrokh Goudarzi and
Mubashir Husain Rehmani Mobility-aware medium access control
protocols for wireless sensor networks:
A survey . . . . . . . . . . . . . . . . 21--37
Shuo Yu and
Jiaying Liu and
Zhuo Yang and
Zhen Chen and
Huizhen Jiang and
Amr Tolba and
Feng Xia PAVE: Personalized Academic Venue
recommendation Exploiting co-publication
networks . . . . . . . . . . . . . . . . 38--47
Jai Sukh Paul Singh and
Mritunjay Kumar Rai CROP: Cognitive radio ROuting Protocol
for link quality channel diverse
cognitive networks . . . . . . . . . . . 48--60
Zainab AlSaeed and
Imtiaz Ahmad and
Iftekhar Hussain Multicasting in software defined
networks: A comprehensive survey . . . . 61--77
Wenjie Ruan and
Quan Z. Sheng and
Lina Yao and
Xue Li and
Nickolas J. G. Falkner and
Lei Yang Device-free human localization and
tracking with UHF passive RFID tags: A
data-driven approach . . . . . . . . . . 78--96
Anmin Fu and
Yuhan Li and
Shui Yu and
Yan Yu and
Gongxuan Zhang DIPOR: An IDA-based dynamic proof of
retrievability scheme for cloud storage
systems . . . . . . . . . . . . . . . . 97--106
Alejandro Cánovas and
Miran Taha and
Jaime Lloret and
Jesús Tomás Smart resource allocation for improving
QoE in IP Multimedia Subsystems . . . . 107--116
Zeinab Rezaeifar and
Jian Wang and
Heekuck Oh A trust-based method for mitigating
cache poisoning in Name Data Networking 117--132
Ruhul Amin and
S. K. Hafizul Islam and
Neeraj Kumar and
Kim-Kwang Raymond Choo An untraceable and anonymous password
authentication protocol for
heterogeneous wireless sensor networks 133--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mahmoud Bahnasy and
Halima Elbiaze and
Bochra Boughzala Zero-queue Ethernet congestion control
protocol based on available bandwidth
estimation . . . . . . . . . . . . . . . 1--20
Maryam Amiri and
Leyli Mohammad-Khanli and
Raffaela Mirandola A sequential pattern mining model for
application workload prediction in cloud
environment . . . . . . . . . . . . . . 21--62
Ivan Vidal and
Jaime Garcia-Reinoso and
Ignacio Soto and
Francisco Valera and
Diego Lopez SCoT: A secure content-oriented
transport . . . . . . . . . . . . . . . 63--78
Naresh Kumar Reddy Beechu and
Vasantha Moodabettu Harishchandra and
Nithin Kumar Yernad Balachandra An energy-efficient fault-aware core
mapping in mesh-based network on chip
systems . . . . . . . . . . . . . . . . 79--87
Jorge Blasco and
Thomas M. Chen and
Igor Muttik and
Markus Roggenbach Detection of app collusion potential
using logic programming . . . . . . . . 88--104
Gao Liu and
Zheng Yan and
Witold Pedrycz Data collection for attack detection and
security measurement in Mobile Ad Hoc
Networks: A survey . . . . . . . . . . . 105--122
André Naz and
Beno\^\it Piranda and
Julien Bourgeois and
Seth Copen Goldstein A time synchronization protocol for
large-scale distributed embedded systems
with low-precision clocks and
neighbor-to-neighbor communications . . 123--142
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
G. Nardini and
G. Stea and
A. Virdis and
A. Frangioni and
L. Galli and
D. Sabella and
G. M. Dell'Aera Practical feasibility, scalability and
effectiveness of coordinated scheduling
algorithms in cellular networks towards
5G . . . . . . . . . . . . . . . . . . . 1--16
Sancheng Peng and
Yongmei Zhou and
Lihong Cao and
Shui Yu and
Jianwei Niu and
Weijia Jia Influence analysis in social networks: A
survey . . . . . . . . . . . . . . . . . 17--32
Shahid Md. Asif Iqbal and
Asaduzzaman Adaptive forwarding strategies to reduce
redundant Interests and Data in named
data networks . . . . . . . . . . . . . 33--47
Lalatendu Muduli and
Devi Prasad Mishra and
Prasanta K. Jana Application of wireless sensor network
for environmental monitoring in
underground coal mines: A systematic
review . . . . . . . . . . . . . . . . . 48--67
Koushik A. M. and
Elizabeth Bentley and
Fei Hu and
Sunil Kumar A hardware testbed for learning-based
spectrum handoff in cognitive radio
networks . . . . . . . . . . . . . . . . 68--77
Flora Amato and
Nicola Mazzocca and
Francesco Moscato Model driven design and evaluation of
security level in orchestrated cloud
services . . . . . . . . . . . . . . . . 78--89
Li Yang and
Ziyi Han and
Zhengan Huang and
Jianfeng Ma A remotely keyed file encryption scheme
under mobile cloud computing . . . . . . 90--99
Tong Li and
Zhengan Huang and
Ping Li and
Zheli Liu and
Chunfu Jia Outsourced privacy-preserving
classification service over encrypted
data . . . . . . . . . . . . . . . . . . 100--110
Xiaohui Jin and
Baojiang Cui and
Dong Li and
Zishuai Cheng and
Congxian Yin An improved payload-based anomaly
detector for web applications . . . . . 111--116
Jian Shen and
Ziyuan Gui and
Sai Ji and
Jun Shen and
Haowen Tan and
Yi Tang Cloud-aided lightweight certificateless
authentication protocol with anonymity
for wireless body area networks . . . . 117--123
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Nourhene Ellouze and
Slim Rekhis and
Noureddine Boudriga and
Mohamed Allouche Powerless Security for Cardiac
Implantable Medical Devices: Use of
Wireless Identification and Sensing
Platform . . . . . . . . . . . . . . . . 1--21
Jaume Segura-Garcia and
Santiago Felici-Castell and
Miguel Garcia-Pineda Performance evaluation of different
techniques to estimate subjective
quality in live video streaming
applications over LTE-Advance mobile
networks . . . . . . . . . . . . . . . . 22--37
Shima Pakdaman Tirani and
Avid Avokh On the performance of sink placement in
WSNs considering energy-balanced
compressive sensing-based data
aggregation . . . . . . . . . . . . . . 38--55
José V. V. Sobral and
Joel J. P. C. Rodrigues and
Ricardo A. L. Rabelo and
José C. Lima Filho and
Natanael Sousa and
Harilton S. Araujo and
Raimir Holanda Filho A framework for enhancing the
performance of Internet of Things
applications based on RFID and WSNs . . 56--68
Yu-an Tan and
Yuan Xue and
Chen Liang and
Jun Zheng and
Quanxin Zhang and
Jiamin Zheng and
Yuanzhang Li A root privilege management scheme with
revocable authorization for Android
devices . . . . . . . . . . . . . . . . 69--82
Guangquan Xu and
Jia Liu and
Yanrong Lu and
Xianjiao Zeng and
Yao Zhang and
Xiaoming Li A novel efficient MAKA protocol with
desynchronization for anonymous roaming
service in Global Mobility Networks . . 83--92
Mukesh Kumar Giluka and
Thomas Valerrian Pasca and
Tathagat Priyadarshi and
Bheemarjuna Reddy Tamma Enhanced class based dynamic priority
scheduling to support uplink IoT traffic
in LTE-A networks . . . . . . . . . . . 93--112
Jian Xu and
Laiwen Wei and
Yu Zhang and
Andi Wang and
Fucai Zhou and
Chong-zhi Gao Dynamic Fully Homomorphic
encryption-based Merkle Tree for
lightweight streaming authenticated data
structures . . . . . . . . . . . . . . . 113--124
Giuseppe Aceto and
Valerio Persico and
Antonio Pescapé The role of Information and
Communication Technologies in
healthcare: taxonomies, perspectives,
and challenges . . . . . . . . . . . . . 125--154
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ahsan Saleem and
Abid Khan and
Furqan Shahid and
M. Masoom Alam and
Muhammad Khurram Khan Recent advancements in garbled
computing: How far have we come towards
achieving secure, efficient and reusable
garbled circuits . . . . . . . . . . . . 1--19
Pingping Dong and
Wenjun Yang and
Wensheng Tang and
Jiawei Huang and
Haodong Wang and
Yi Pan and
Jianxin Wang Reducing transport latency for short
flows with multipath TCP . . . . . . . . 20--36
Praveen Kumar P and
Syam Kumar P and
Alphonse P. J. A. Attribute based encryption in cloud
computing: A survey, gap analysis, and
future directions . . . . . . . . . . . 37--52
Wassila Lalouani and
Mohamed Younis and
Nadjib Badache Interconnecting isolated network
segments through intermittent links . . 53--63
Jiuxin Cao and
Shuai Xu and
Xuelin Zhu and
Renjun Lv and
Bo Liu Effective fine-grained location
prediction based on user check-in
pattern in LBSNs . . . . . . . . . . . . 64--75
José Francisco Colom and
David Gil and
Higinio Mora and
Bruno Volckaert and
Antonio Manuel Jimeno Scheduling framework for distributed
intrusion detection systems over
heterogeneous network architectures . . 76--86
Muhammad Aqib Javed and
Muhammad Shahzad Younis and
Siddique Latif and
Junaid Qadir and
Adeel Baig Community detection in networks: A
multidisciplinary review . . . . . . . . 87--111
Zechao Liu and
Zoe L. Jiang and
Xuan Wang and
S. M. Yiu Practical attribute-based encryption:
Outsourcing decryption, attribute
revocation and policy updating . . . . . 112--123
Christian Esposito Interoperable, dynamic and
privacy-preserving access control for
cloud data storage when integrating
heterogeneous organizations . . . . . . 124--136
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Minh-Tuan Thai and
Ying-Dar Lin and
Po-Ching Lin and
Yuan-Cheng Lai Towards load-balanced service chaining
by Hash-based Traffic Steering on
Softswitches . . . . . . . . . . . . . . 1--10
Souvik Basu and
Ayanesh Biswas and
Siuli Roy and
Sipra DasBit Wise-PRoPHET: A Watchdog supervised
PRoPHET for reliable dissemination of
post disaster situational information
over smartphone based DTN . . . . . . . 11--23
Muhammad Ehatisham-ul-Haq and
Muhammad Awais Azam and
Usman Naeem and
Yasar Amin and
Jonathan Loo Continuous authentication of smartphone
users based on activity pattern
recognition using passive mobile sensing 24--35
Yuan Rao and
Cheng Deng and
Gang Zhao and
Yan Qiao and
Lei-yang Fu and
Xing Shao and
Ru-chuan Wang Self-adaptive implicit contention window
adjustment mechanism for QoS
optimization in wireless sensor networks 36--52
Mauro A. A. da Cruz and
Joel J. P. C. Rodrigues and
Arun Kumar Sangaiah and
Jalal Al-Muhtadi and
Valery Korotaev Performance evaluation of IoT middleware 53--65
Ester López and
Leandro Navarro Coordinated detection of forwarding
faults in Wireless Community Networks 66--77
Xuangou Wu and
Panlong Yang and
Shaojie Tang and
Xiao Zheng and
Xiaolin Wang Privacy-aware data publishing against
sparse estimation attack . . . . . . . . 78--88
G. Deepa and
P. Santhi Thilagam and
Amit Praseed and
Alwyn R. Pais DetLogic: A black-box approach for
detecting logic vulnerabilities in web
applications . . . . . . . . . . . . . . 89--109
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mostafa Noshy and
Abdelhameed Ibrahim and
Hesham Arafat Ali Optimization of live virtual machine
migration in cloud computing: A survey
and future directions . . . . . . . . . 1--10
Umber Sheikh and
Abid Khan and
Bilal Ahmed and
Abdul Waheed and
Abdul Hameed Provenance Inference Techniques:
Taxonomy, comparative analysis and
design challenges . . . . . . . . . . . 11--26
Arsany Guirguis and
Mohammed Karmoose and
Karim Habak and
Mustafa El-Nainay and
Moustafa Youssef Cooperation-based multi-hop routing
protocol for cognitive radio networks 27--42
Qiang Yang and
Wei Li and
Jose Neuman de Souza and
Albert Y. Zomaya Resilient virtual communication networks
using multi-commodity flow based local
optimal mapping . . . . . . . . . . . . 43--51
Vahideh Hayyolalam and
Ali Asghar Pourhaji Kazem A systematic literature review on
QoS-aware service composition and
selection in cloud environment . . . . . 52--74
Choon Beng Tan and
Mohd Hanafi Ahmad Hijazi and
Yuto Lim and
Abdullah Gani A survey on Proof of Retrievability for
cloud data integrity and availability:
Cloud storage state-of-the-art, issues,
solutions and future trends . . . . . . 75--86
Fahri Wisnu Murti and
Rahmat Faddli Siregar and
Soo Young Shin SU-MIMO based uplink non-orthogonal
multiple access for 5G . . . . . . . . . 87--96
Jin Li and
Aniello Castiglione and
Changyu Dong Special issue on security in cloud
computing . . . . . . . . . . . . . . . 97--98
Agnieszka Jakóbik and
Francesco Palmieri and
Joanna Kolodziej Stackelberg games for modeling defense
scenarios against cloud security threats 99--107
Dan Liao and
Hui Li and
Gang Sun and
Ming Zhang and
Victor Chang Location and trajectory privacy
preservation in 5G-Enabled vehicle
social network services . . . . . . . . 108--118
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Suman Bhattacharjee and
Siuli Roy and
Sipra DasBit DPDRM: A decentralized post-disaster
resource management scheme using energy
efficient smart phone based DTN . . . . 1--16
Hongtao Zhang and
Ying Chen and
Zihua Yang Hierarchical cache-aided transmission
cooperation in 5G user-centric network:
Performance analysis and design insights 17--27
Aohan Li and
Guangjie Han A fairness-based MAC protocol for 5G
Cognitive Radio Ad Hoc Networks . . . . 28--34
José Luis García-Dorado and
Javier Ramos and
Miguel Rodríguez and
Javier Aracil DNS weighted footprints for web browsing
analytics . . . . . . . . . . . . . . . 35--48
Sunny Behal and
Krishan Kumar and
Monika Sachdeva D-FACE: An anomaly based distributed
approach for early detection of DDoS
attacks and flash events . . . . . . . . 49--63
Chih-Cheng Tseng and
Jyun-Yao Shih Two-stage coalition formation and radio
resource allocation with Nash bargaining
solution for inband underlaid D2D
communications in 5G networks . . . . . 64--76
Farkhana Muchtar and
Abdul Hanan Abdullah and
Suhaidi Hassan and
Farhan Masud Energy conservation strategies in Host
Centric Networking based MANET: A review 77--98
Raaid Alubady and
Suhaidi Hassan and
Adib Habbal Pending interest table control
management in Named Data Network . . . . 99--116
Guangliang Xu and
Wei Yang and
Liusheng Huang Hybrid covert channel in LTE-A: Modeling
and analysis . . . . . . . . . . . . . . 117--126
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Faran Ahmed and
Muhammad Naeem and
Waleed Ejaz and
Muhammad Iqbal and
Alagan Anpalagan Resource management in cellular base
stations powered by renewable energy
sources . . . . . . . . . . . . . . . . 1--17
Rung-Shiang Cheng and
Chung-Ming Huang and
Sheng-Yuan Pan WiFi offloading using the
device-to-device (D2D) communication
paradigm based on the Software Defined
Network (SDN) architecture . . . . . . . 18--28
Ziwen Sun and
Yuhui Liu and
Li Tao Attack localization task allocation in
wireless sensor networks based on
multi-objective binary particle swarm
optimization . . . . . . . . . . . . . . 29--40
Ali Benzerbadj and
Bouabdellah Kechar and
Ahc\`ene Bounceur and
Mohammad Hammoudeh Surveillance of sensitive fenced areas
using duty-cycled wireless sensor
networks with asymmetrical links . . . . 41--52
Ravneet Kaur and
Sarbjeet Singh and
Harish Kumar Rise of spam and compromised accounts in
online social networks: A
state-of-the-art review of different
combating approaches . . . . . . . . . . 53--88
Jin Li and
Xiaofeng Chen and
Sherman S. M. Chow and
Qiong Huang and
Duncan S. Wong and
Zheli Liu Multi-authority fine-grained access
control with accountability and its
application in cloud . . . . . . . . . . 89--96
Karanpreet Singh and
Paramvir Singh and
Krishan Kumar User behavior analytics-based
classification of application layer
HTTP-GET flood attacks . . . . . . . . . 97--114
Mao Yang and
Bo Li and
Zhicheng Bai and
Zhongjiang Yan SGMA: Semi-granted multiple access for
non-orthogonal multiple access (NOMA) in
5G networking . . . . . . . . . . . . . 115--125
Ch. Md. Rakin Haider and
Anindya Iqbal and
Atif Hasan Rahman and
M. Sohel Rahman An ensemble learning based approach for
impression fraud detection in mobile
advertising . . . . . . . . . . . . . . 126--141
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Xiong Wang and
Qian Zhang and
Jing Ren and
Shizhong Xu and
Sheng Wang and
Shui Yu Toward efficient parallel routing
optimization for large-scale SDN
networks using GPGPU . . . . . . . . . . 1--13
Wei Jiang and
Wanchun Jiang and
Weiping Wang and
Haodong Wang and
Yi Pan and
Jianxin Wang A fine-grained rule partition algorithm
in cloud data centers . . . . . . . . . 14--25
Md. Arafatur Rahman and
A. Taufiq Asyhari and
Md Zakirul Alam Bhuiyan and
Qusay Medhat Salih and
Kamal Zuhairi Bin Zamli L-CAQ: Joint link-oriented
channel-availability and channel-quality
based channel selection for mobile
cognitive radio networks . . . . . . . . 26--35
Giuseppe Aceto and
Alessio Botta and
Pietro Marchetta and
Valerio Persico and
Antonio Pescapé A comprehensive survey on Internet
outages . . . . . . . . . . . . . . . . 36--63
Wenhong Tian and
Majun He and
Wenxia Guo and
Wenqiang Huang and
Xiaoyu Shi and
Mingsheng Shang and
Adel Nadjaran Toosi and
Rajkumar Buyya On minimizing total energy consumption
in the scheduling of virtual machine
reservations . . . . . . . . . . . . . . 64--74
Xiaohong Huang and
Tingting Yuan and
Yan Zhang Utility-optimized bandwidth and power
allocation for non-orthogonal multiple
access in software defined 5G networks 75--86
Mohammed Y. Aalsalem and
Wazir Zada Khan and
Wajeb Gharibi and
Muhammad Khurram Khan and
Quratulain Arshad Wireless Sensor Networks in oil and gas
industry: Recent advances, taxonomy,
requirements, and open challenges . . . 87--97
Chih-Min Chao and
Hsiang-Yuan Fu Supporting fast and fair rendezvous for
cognitive radio networks . . . . . . . . 98--108
Yang Qin and
Weihong Yang and
Xiao Ai and
Lingjian Chen Fault tolerant storage and data access
optimization in data center networks . . 109--118
Ahmed Fahmin and
Yuan-Cheng Lai and
Md. Shohrab Hossain and
Ying-Dar Lin Performance modeling and comparison of
NFV integrated with SDN: Under or aside? 119--129
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Saad Saleh and
Junaid Qadir and
Muhammad U. Ilyas Shedding Light on the Dark Corners of
the Internet: A Survey of Tor Research 1--28
Alejandro Santoyo-González and
Cristina Cervelló-Pastor Latency-aware cost optimization of the
service infrastructure placement in 5G
networks . . . . . . . . . . . . . . . . 29--37
Hsueh-Wen Tseng and
Ting-Ting Yang and
Wan-Chi Chang and
Yu-Xiang Lan An efficient error prevention and
recovery scheme for multicast traffic in
data center networks . . . . . . . . . . 38--47
Jianfeng Guan and
Zhijun Wei and
Ilsun You GRBC-based Network Security Functions
placement scheme in SDS for 5G security 48--56
Riham Elhabyan and
Wei Shi and
Marc St-Hilaire A Pareto optimization-based approach to
clustering and routing in Wireless
Sensor Networks . . . . . . . . . . . . 57--69
Michael Robinson and
Kevin Jones and
Helge Janicke and
Leandros Maglaras An introduction to cyber peacekeeping 70--87
Wei-Che Chien and
Chin-Feng Lai and
Hsin-Hung Cho and
Han-Chieh Chao A SDN-SFC-based service-oriented load
balancing for the IoT applications . . . 88--97
Ya-Ju Yu and
Ai-Chun Pang and
Ming-Yu Yeh Video encoding adaptation for QoE
maximization over 5G cellular networks 98--107
Haiyang Hu and
Zhongjin Li and
Hua Hu and
Jie Chen and
Jidong Ge and
Chuanyi Li and
Victor Chang Multi-objective scheduling for
scientific workflow in multicloud
environment . . . . . . . . . . . . . . 108--122
Amar Kaswan and
Abhinav Tomar and
Prasanta K. Jana An efficient scheduling scheme for
mobile charger in on-demand wireless
rechargeable sensor networks . . . . . . 123--134
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mohammad Etemad and
Alptekin Küpçü Verifiable database outsourcing
supporting join . . . . . . . . . . . . 1--19
Badiul Alam and
Zhe Jin and
Wun-She Yap and
Bok-Min Goi An alignment-free cancelable fingerprint
template for bio-cryptosystems . . . . . 20--32
Walaa N. Ismail and
Mohammad Mehedi Hassan and
Hessah A. Alsalamah and
Giancarlo Fortino Mining productive-periodic frequent
patterns in tele-health systems . . . . 33--47
Salvatore Cuomo and
Raffaele Farina and
Francesco Piccialli An inverse Bayesian scheme for the
denoising of ECG signals . . . . . . . . 48--58
Shaymaa Akraa and
Anh Pham Tran Tam and
Haifeng Shen and
Youhong Tang and
Ben Zhong Tang and
Jimmy Li and
Sandy Walker A smartphone-based point-of-care
quantitative urinalysis device for
chronic kidney disease patients . . . . 59--69
Talal H. Noor and
Sherali Zeadally and
Abdullah Alfazi and
Quan Z. Sheng Mobile cloud computing: Challenges and
future research directions . . . . . . . 70--85
Majdi Rawashdeh and
Mohammed Gh. Al Zamil and
M. Shamim Hossain and
Samer Samarah and
Syed Umar Amin and
Ghulam Muhammad Reliable service delivery in Tele-health
care systems . . . . . . . . . . . . . . 86--93
Han-Chuan Hsieh and
Jiann-Liang Chen and
Abderrahim Benslimane 5G Virtualized Multi-access Edge
Computing Platform for IoT Applications 94--102
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Otkrist Gupta and
Ramesh Raskar Distributed learning of deep neural
network over multiple agents . . . . . . 1--8
Donghao Zhou and
Zheng Yan and
Yulong Fu and
Zhen Yao A survey on network data collection . . 9--23
Sanjay Kumar Biswash and
Dushantha Nalin K. Jayakody Performance based user-centric dynamic
mode switching and mobility management
scheme for $5$G networks . . . . . . . . 24--34
Chun-Cheng Lin and
Hui-Hsin Chin and
Wei-Bo Chen Balancing latency and cost in
software-defined vehicular networks
using genetic algorithm . . . . . . . . 35--41
Chao Lin and
Debiao He and
Xinyi Huang and
Kim-Kwang Raymond Choo and
Athanasios V. Vasilakos BSeIn: a blockchain-based secure mutual
authentication with fine-grained access
control system for industry 4.0 . . . . 42--52
Jia-Ming Liang and
Po-Yen Chang and
Jen-Jee Chen and
Chien-Feng Huang and
Yu-Chee Tseng Energy-efficient DRX scheduling for D2D
communication in $5$G networks . . . . . 53--64
Mariacarla Staffa and
Luigi Sgaglione and
Giovanni Mazzeo and
Luigi Coppolino and
Salvatore D'Antonio and
Luigi Romano and
Erol Gelenbe and
Oana Stan and
Sergiu Carpov and
Evangelos Grivas and
Paolo Campegiani and
Luigi Castaldo and
Konstantinos Votis and
Vassilis Koutkias and
Ioannis Komnios An OpenNCP-based Solution for Secure
eHealth Data Exchange . . . . . . . . . 65--85
Sergio Herrería-Alonso and
Miguel Rodríguez-Pérez and
Manuel Fernández-Veiga and
Cándido López-García An optimal dynamic sleeping control
policy for single base stations in green
cellular networks . . . . . . . . . . . 86--94
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Weizhi Meng and
Yu Wang and
Duncan S. Wong and
Sheng Wen and
Yang Xiang TouchWB: Touch behavioral user
authentication based on web browsing on
smartphones . . . . . . . . . . . . . . 1--9
Yin Zhang and
Raffaele Gravina and
Huimin Lu and
Massimo Villari and
Giancarlo Fortino PEA: Parallel electrocardiogram-based
authentication for smart healthcare
systems . . . . . . . . . . . . . . . . 10--16
Domenico Calcaterra and
Giuseppe Di Modica and
Orazio Tomarchio and
Placido Romeo A clinical decision support system to
increase appropriateness of diagnostic
imaging prescriptions . . . . . . . . . 17--29
Jamal Abdul Nasir and
Shahid Hussain and
Chuangyin Dang An Integrated Planning Approach Towards
Home Health Care, Telehealth and
Patients Group Based Care . . . . . . . 30--41
Hanane Lamaazi and
Nabil Benamar OF--EC: a novel energy consumption aware
objective function for RPL based on
fuzzy logic. . . . . . . . . . . . . . . 42--58
Rodrigo S. Couto and
Hugo Sadok and
Pedro Cruz and
Felipe F. da Silva and
Tatiana Sciammarella and
Miguel Elias M. Campista and
Lu\'ìs Henrique M. K. Costa and
Pedro B. Velloso and
Marcelo G. Rubinstein Building an IaaS cloud with droplets: a
collaborative experience with OpenStack 59--71
Yang Yang and
Songtao Guo and
Guiyan Liu and
Yuanyuan Yang Two-layer compressive sensing based
video encoding and decoding framework
for WMSN . . . . . . . . . . . . . . . . 72--85
Yan Li and
Shifang Dai and
Weiwei Wu Cooperative video caching scheme over
software defined passive optical network 86--100
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ishfaq Bashir Sofi and
Akhil Gupta A survey on energy efficient $5$G green
network with a planned multi-tier
architecture . . . . . . . . . . . . . . 1--28
Musab Isah and
Steven Simpson and
Chris Edwards An Improved LISP Mobile Node
Architecture . . . . . . . . . . . . . . 29--43
Nicholas Capurso and
Bo Mei and
Tianyi Song and
Xiuzhen Cheng and
Jiguo Yu A survey on key fields of context
awareness for mobile devices . . . . . . 44--60
Nicolas Tsiftes and
Thiemo Voigt Velox VM: a safe execution environment
for resource-constrained IoT
applications . . . . . . . . . . . . . . 61--73
Jenny I. Glitza and
Frerk Müller-von Aschwege and
Marco Eichelberg and
Nils Reiss and
Thomas Schmidt and
Christina Feldmann and
Regina Wendl and
Jan D. Schmitto and
Andreas Hein Advanced telemonitoring of Left
Ventricular Assist Device patients for
the early detection of thrombosis . . . 74--82
Karunanithy Kalaivanan and
Velusamy Bhanumathi Reliable location aware and Cluster-Tap
Root based data collection protocol for
large scale wireless sensor networks . . 83--101
Anmin Fu and
Shuai Li and
Shui Yu and
Yuqing Zhang and
Yinxia Sun Privacy-preserving composite modular
exponentiation outsourcing with optimal
checkability in single untrusted cloud
server . . . . . . . . . . . . . . . . . 102--112
Upasana Sarmah and
D. K. Bhattacharyya and
J. K. Kalita A survey of detection methods for XSS
attacks . . . . . . . . . . . . . . . . 113--143
Chen Liang and
Yu-an Tan and
Xiaosong Zhang and
Xianmin Wang and
Jun Zheng and
Quanxin Zhang Building packet length covert channel
over mobile VoIP traffics . . . . . . . 144--153
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ivanoe De Falco and
Antonio Della Cioppa and
Tomas Koutny and
Michal Krcma and
Umberto Scafuri and
Ernesto Tarantino Genetic Programming-based induction of a
glucose-dynamics model for telemedicine 1--13
Armando Céspedes-Mota and
Gerardo Castañón and
Alberto F. Martínez-Herrera and
Leopoldo Eduardo Cárdenas-Barrón and
Ana María Sarmiento Differential evolution algorithm applied
to wireless sensor distribution on
different geometric shapes with area and
energy optimization . . . . . . . . . . 14--23
Samet Tonyali and
Ruben Munoz and
Kemal Akkaya and
Utku Ozgur A realistic performance evaluation of
privacy-preserving protocols for smart
grid AMI networks . . . . . . . . . . . 24--41
Habib Mostafaei and
Michael Menth Software-defined wireless sensor
networks: a survey . . . . . . . . . . . 42--56
Jianhui Lv and
Xingwei Wang and
Qingyi Zhang and
Min Huang LAPGN: Accomplishing information
consistency under OSPF in General
Networks (an extension) . . . . . . . . 57--69
S. A. R. Shah and
Wenji Wu and
Qiming Lu and
Liang Zhang and
Sajith Sasidharan and
Phil DeMar and
Chin Guok and
John Macauley and
Eric Pouyoul and
Jin Kim and
Seo-Young Noh AmoebaNet: an SDN-enabled network
service for big data science . . . . . . 70--82
Fei Gu and
Jianwei Niu and
Zhiping Qi and
Mohammed Atiquzzaman Partitioning and offloading in smart
mobile devices for mobile cloud
computing: State of the art and future
directions . . . . . . . . . . . . . . . 83--96
Xili Wan and
Xinjie Guan and
Tianjing Wang and
Guangwei Bai and
Baek-Yong Choi Application deployment using
Microservice and Docker containers:
Framework and optimization . . . . . . . 97--109
Yongnan Zhang and
Yonghua Zhou Distributed coordination control of
traffic network flow using adaptive
genetic algorithm based on cloud
computing . . . . . . . . . . . . . . . 110--120
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Abhinav Jain and
Sandeep Kumar FriendShare: a secure and reliable
framework for file sharing on network 1--16
A. Bagula and
M. Mandava and
H. Bagula A framework for healthcare support in
the rural and low income areas of the
developing world . . . . . . . . . . . . 17--29
Nima Moradianzadeh and
Pooya Moradian Zadeh and
Ziad Kobti and
Sarah Hansen and
Kathryn Pfaff Using social network analysis to model
palliative care . . . . . . . . . . . . 30--41
Abishi Chowdhury and
Shital A. Raut A survey study on Internet of Things
resource management . . . . . . . . . . 42--60
Parvaneh Asghari and
Amir Masoud Rahmani and
Hamid Haj Seyyed Javadi Service composition approaches in IoT: a
systematic review . . . . . . . . . . . 61--77
Amol Vasudeva and
Manu Sood Survey on sybil attack defense
mechanisms in wireless ad hoc networks 78--118
Han-Peng Jiang and
Wei-Mei Chen Self-adaptive resource allocation for
energy-aware virtual machine placement
in dynamic computing cloud . . . . . . . 119--129
K. Bilal and
A. Erbad and
M. Hefeeda QoE-aware distributed cloud-based live
streaming of multisourced multiview
videos . . . . . . . . . . . . . . . . . 130--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Maha Saadeh and
Azzam Sleit and
Khair Eddin Sabri and
Wesam Almobaideen Hierarchical architecture and protocol
for mobile object authentication in the
context of IoT smart cities . . . . . . 1--19
Dapeng Qu and
Xingwei Wang and
Min Huang and
Keqin Li and
Sajal K. Das and
Sijin Wu A cache-aware social-based QoS routing
scheme in Information Centric Networks 20--32
Dyson Pereira Junior and
Emilio Carlos Gomes Wille FB-APSP: a new efficient algorithm for
computing all-pairs shortest-paths . . . 33--43
Ahmed H. Anwar and
George Atia and
Mina Guirguis Adaptive topologies against jamming
attacks in wireless networks: a
game-theoretic approach . . . . . . . . 44--58
Longbiao Chen and
Dingqi Yang and
Daqing Zhang and
Cheng Wang and
Jonathan Li and
Thi-Mai-Trang Nguyen Deep mobile traffic forecast and
complementary base station clustering
for C-RAN optimization . . . . . . . . . 59--69
Ranida Hamidouche and
Zibouda Aliouat and
Abdelhak Mourad Gueroui and
Ado Adamou Abba Ari and
Lemia Louail Classical and bio-inspired mobility in
sensor networks for IoT applications . . 70--88
Waqas Rehan and
Stefan Fischer and
Maaz Rehan Anatomizing the robustness of
multichannel MAC protocols for WSNs: an
evaluation under MAC oriented design
issues impacting QoS . . . . . . . . . . 89--118
M. Amarlingam and
Pradeep Kumar Mishra and
P. Rajalakshmi and
Sumohana S. Channappayya and
C. S. Sastry Novel Light Weight Compressed Data
Aggregation using sparse measurements
for IoT networks . . . . . . . . . . . . 119--134
Behnam Dezfouli and
Immanuel Amirtharaj and
Chia-Chi (Chelsey) Li EMPIOT: an energy measurement platform
for wireless IoT devices . . . . . . . . 135--148
Teodora Sanislav and
Sherali Zeadally and
George Dan Mois and
Silviu Corneliu Folea Wireless energy harvesting: Empirical
results and practical considerations for
Internet of Things . . . . . . . . . . . 149--158
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Lei Zhou and
Anmin Fu and
Shui Yu and
Mang Su and
Boyu Kuang Data integrity verification of the
outsourced big data in the cloud
environment: a survey . . . . . . . . . 1--15
Xu Lu and
Jun Liu and
Wei Qi and
Qingyun Dai Multiple-target tracking based on
compressed sensing in the Internet of
Things . . . . . . . . . . . . . . . . . 16--23
Deepak Singh and
Bryan Ng and
Yuan-Cheng Lai and
Ying-Dar Lin and
Winston K. G. Seah Modelling Software-Defined Networking:
Software and hardware switches . . . . . 24--36
De-gan Zhang and
Ting Zhang and
Yue Dong and
Xiao-huan Liu and
Yu-ya Cui and
De-xin Zhao Novel optimized link state routing
protocol based on quantum genetic
strategy for mobile learning . . . . . . 37--49
Yinghui Zhang and
Jin Li and
Dong Zheng and
Ping Li and
Yangguang Tian Privacy-preserving communication and
power injection over vehicle networks
and $5$G smart grid slice . . . . . . . 50--60
Youcef Imine and
Ahmed Lounis and
Abdelmadjid Bouabdallah Revocable attribute-based access control
in multi-authority systems . . . . . . . 61--76
Diogo Menezes Ferrazani Mattos and
Otto Carlos Muniz Bandeira Duarte and
Guy Pujolle A lightweight protocol for consistent
policy update on software-defined
networking with multiple controllers . . 77--87
Chuan Xu and
Wenqiang Jin and
Xinheng Wang and
Guofeng Zhao and
Shui Yu MC-VAP: a multi-connection virtual
access point for high performance
software-defined wireless networks . . . 88--98
Vinícius F. S. Mota and
Thiago H. Silva and
Daniel F. Macedo and
Yacine Ghamri-Doudane and
José M. S. Nogueira Towards scalable mobile crowdsensing
through device-to-device communication 99--106
Debasis Das and
Rajiv Misra Improvised dynamic network connectivity
model for Vehicular Ad-Hoc Networks
(VANETs) . . . . . . . . . . . . . . . . 107--114
Franco Cicirelli and
Agostino Forestiero and
Andrea Giordano and
Carlo Mastroianni Parallelization of space-aware
applications: Modeling and performance
analysis . . . . . . . . . . . . . . . . 115--127
Mahmood Javadi and
Habib Mostafaei and
Morshed U. Chowdhurry and
Jemal H. Abawajy Learning automaton based topology
control protocol for extending wireless
sensor networks lifetime . . . . . . . . 128--136
Reza Ghebleh and
Ali Ghaffari Retraction notice to ``A comprehensive
survey on $5$G: the prospect of future
communications'' [J. Netw. Comput. Appl.
94 (2017) 1--32] . . . . . . . . . . . . 137--137
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Qikun Zhang and
Yong Gan and
Lu Liu and
Xianmin Wang and
Xiangyang Luo and
Yuanzhang Li An authenticated asymmetric group key
agreement based on attribute encryption 1--10
Md. Ahsan Habib and
Sajeeb Saha and
Md. Abdur Razzaque and
Md. Mamun-or-Rashid and
Giancarlo Fortino and
Mohammad Mehedi Hassan Starfish routing for sensor networks
with mobile sink . . . . . . . . . . . . 11--22
Chenglong Shao and
Heejun Roh and
Wonjun Lee Next-generation RF-powered networks for
Internet of Things: Architecture and
research perspectives . . . . . . . . . 23--31
Antesar M. Shabut and
M. Shamim Kaiser and
Keshav P. Dahal and
Wenbing Chen A multidimensional trust evaluation
model for MANETs . . . . . . . . . . . . 32--41
Farah Khedim and
Nabila Labraoui and
Ado Adamou Abba Ari A cognitive chronometry strategy
associated with a revised cloud model to
deal with the dishonest recommendations
attacks in wireless sensor networks . . 42--56
Roberto Di Pietro and
Gabriele Oligeri GopJam: Key-less jamming mitigation via
gossiping . . . . . . . . . . . . . . . 57--68
Dimitrios Sikeridis and
Eirini Eleni Tsiropoulou and
Michael Devetsikiotis and
Symeon Papavassiliou Wireless powered Public Safety IoT: a
UAV-assisted adaptive-learning approach
towards energy efficiency . . . . . . . 69--79
Sara Kassan and
Jaafar Gaber and
Pascal Lorenz Game theory based distributed clustering
approach to maximize wireless sensors
network lifetime . . . . . . . . . . . . 80--88
Yinghui Zhang and
Robert H. Deng and
Gang Han and
Dong Zheng Secure smart health with privacy-aware
aggregate authentication and access
control in Internet of Things . . . . . 89--100
Jiangang Shu and
Ximeng Liu and
Yinghui Zhang and
Xiaohua Jia and
Robert H. Deng Dual-side privacy-preserving task
matching for spatial crowdsourcing . . . 101--111
Mohammad Wazid and
Ashok Kumar Das and
Athanasios V. Vasilakos Authenticated key management protocol
for cloud-assisted body area sensor
networks . . . . . . . . . . . . . . . . 112--126
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Imen Mahjri and
Amine Dhraief and
Abdelfettah Belghith and
Sofien Gannouni and
Issam Mabrouki and
Maram AlAjlan Collision risk assessment in Flying Ad
Hoc aerial wireless networks . . . . . . 1--13
Daniel Morato and
Eduardo Berrueta and
Eduardo Magaña and
Mikel Izal Ransomware early detection by the
analysis of file sharing traffic . . . . 14--32
Dina Shehada and
Chan Yeob Yeun and
M. Jamal Zemerly and
Mahmoud Al-Qutayri and
Yousof Al-Hammadi and
Jiankun Hu A new adaptive trust and reputation
model for Mobile Agent Systems . . . . . 33--43
Abdullah Al Zishan and
Imtiaz Karim and
Sudipta Saha Shubha and
Ashikur Rahman Maximizing heterogeneous coverage in
over and under provisioned visual sensor
networks . . . . . . . . . . . . . . . . 44--62
Qi Liao and
Ting Li and
Benjamin A. Blakely Anomaly analysis and visualization for
dynamic networks through spatiotemporal
graph segmentations . . . . . . . . . . 63--79
Ruben Ricart-Sanchez and
Pedro Malagon and
Pablo Salva-Garcia and
Enrique Chirivella Perez and
Qi Wang and
Jose M. Alcaraz Calero Towards an FPGA-Accelerated programmable
data path for edge-to-core
communications in $5$G networks . . . . 80--93
Waheed Iqbal and
Abdelkarim Erradi and
Arif Mahmood Dynamic workload patterns prediction for
proactive auto-scaling of web
applications . . . . . . . . . . . . . . 94--107
Jianwei Zhang and
Xinchang Zhang and
Meng Sun and
Chunling Yang Maximizing streaming efficiency of
multiple streams in peer-to-peer
networks . . . . . . . . . . . . . . . . 108--120
Khaled Hejja and
Xavier Hesselbach Online power aware coordinated virtual
network embedding with $5$G delay
constraint . . . . . . . . . . . . . . . 121--136
Satoshi Utsumi and
Salahuddin Muhammad Salim Zabir and
Yuto Usuki and
Seisho Takeda and
Norio Shiratori and
Yasushi Kato and
Jeyeon Kim A new analytical model of TCP Hybla for
satellite IP networks . . . . . . . . . 137--147
Xiaolong Xu and
Shucun Fu and
Lianyong Qi and
Xuyun Zhang and
Qingxiang Liu and
Qiang He and
Shancang Li An IoT-Oriented data placement method
with privacy preservation in cloud
environment . . . . . . . . . . . . . . 148--157
Shuyue Chen and
Chin-Tau Lea Constraint-based scheduling algorithm
with the non-adjacency requirement for
multi-flow AWG switches . . . . . . . . 158--168
Aparna Kumari and
Sudeep Tanwar and
Sudhanshu Tyagi and
Neeraj Kumar and
Michele Maasberg and
Kim-Kwang Raymond Choo Multimedia big data computing and
Internet of Things applications: a
taxonomy and process model . . . . . . . 169--195
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Anonymous Thank You Reviewers . . . . . . . . . . iii--xii
I. Val and
A. Etxabe and
R. Torrego and
P. M. Rodriguez and
C. Cruces and
V. Diez and
M. Mendicute and
A. Arriola Design, analysis and implementation of a
time-bounded spectrum handoff algorithm
for real-time industrial wireless sensor
and actuator networks . . . . . . . . . 1--16
Seema Kharb and
Anita Singhrova Fuzzy based priority aware scheduling
technique for dense industrial IoT
networks . . . . . . . . . . . . . . . . 17--27
V. Indu and
Sabu M. Thampi A nature --- inspired approach based on
Forest Fire model for modeling rumor
propagation in social networks . . . . . 28--41
Srikant Manas Kala and
Vanlin Sathya and
M. Pavan Kumar Reddy and
Betty Lala and
Bheemarjuna Reddy Tamma A socio-inspired CALM approach to
channel assignment performance
prediction and WMN capacity estimation 42--66
Vishal Sharma and
Jianfeng Guan and
Jiyoon Kim and
Soonhyun Kwon and
Ilsun You and
Francesco Palmieri and
Mario Collotta MIH-SPFP: MIH-base secure cross-layer
handover protocol for Fast Proxy Mobile
IPv6-IoT networks . . . . . . . . . . . 67--81
Zhitao Guan and
Yue Zhang and
Longfei Wu and
Jun Wu and
Jing Li and
Yinglong Ma and
Jingjing Hu APPA: an anonymous and privacy
preserving data aggregation scheme for
fog-enhanced IoT . . . . . . . . . . . . 82--92
Jinfang Jiang and
Guangjie Han and
Hao Wang and
Mohsen Guizani A survey on location privacy protection
in Wireless Sensor Networks . . . . . . 93--114
Anil Kumar Rangisetti and
Bheemarjuna Reddy Tamma Interference and QoS aware cell
switch-off strategy for software defined
LTE HetNets . . . . . . . . . . . . . . 115--129
Chao Bu and
Xingwei Wang and
Hui Cheng and
Min Huang and
Keqin Li Routing as a service (RaaS): an open
framework for customizing routing
services . . . . . . . . . . . . . . . . 130--145
Alper Bereketli and
Muharrem Tümçakir and
Burcu Yeni P-AUV: Position aware routing and medium
access for ad hoc AUV networks . . . . . 146--154
Kostas Kolomvatsos Time-optimized management of mobile IoT
nodes for pervasive applications . . . . 155--167
Zhuhua Liao and
Zengde Teng and
Jian Zhang and
Yizhi Liu and
Hao Xiao and
Aiping Yi A Semantic Concast service for data
discovery, aggregation and processing on
NDN . . . . . . . . . . . . . . . . . . 168--178
Garima Chopra and
Rakesh Kumar Jha and
Sanjeev Jain RBA: Region Based Algorithm for secure
harvesting in Ultra Dense Network . . . 179--189
Zhen Liu and
Ruoyu Wang and
Nathalie Japkowicz and
Yongming Cai and
Deyu Tang and
Xianfa Cai Mobile app traffic flow feature
extraction and selection for improving
classification robustness . . . . . . . 190--208
Shuhua Deng and
Xing Gao and
Zebin Lu and
Zhengfa Li and
Xieping Gao DoS vulnerabilities and mitigation
strategies in software-defined networks 209--219
Xiuquan Qiao and
Pei Ren and
Junliang Chen and
Wei Tan and
M. Brian Blake and
Wangli Xu Session persistence for dynamic web
applications in Named Data Networking 220--235
Weijie Han and
Jingfeng Xue and
Yong Wang and
Zhenyan Liu and
Zixiao Kong MalInsight: a systematic profiling based
malware detection framework . . . . . . 236--250
Imran Makhdoom and
Mehran Abolhasan and
Haider Abbas and
Wei Ni Blockchain's adoption in IoT: the
challenges, and a way forward . . . . . 251--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ming Tao and
Wenhong Wei and
Shuqiang Huang Location-based trustworthy services
recommendation in
cooperative-communication-enabled
Internet of Vehicles . . . . . . . . . . 1--11
Ahmed Aziz and
Karan Singh and
Walid Osamy and
Ahmed M. Khedr Effective algorithm for optimizing
compressive sensing in IoT and periodic
monitoring applications . . . . . . . . 12--28
Xiaosong Zhang and
Liehuang Zhu and
Xianmin Wang and
Changyou Zhang and
Hongfei Zhu and
Yu-an Tan A packet-reordering covert channel over
VoLTE voice and video traffics . . . . . 29--38
Tong Li and
Chongzhi Gao and
Liaoliang Jiang and
Witold Pedrycz and
Jian Shen Publicly verifiable privacy-preserving
aggregation and its application in IoT 39--44
Qi Feng and
Debiao He and
Sherali Zeadally and
Muhammad Khurram Khan and
Neeraj Kumar A survey on privacy protection in
blockchain system . . . . . . . . . . . 45--58
Seema Kharb and
Anita Singhrova A survey on network formation and
scheduling algorithms for time slotted
channel hopping in industrial networks 59--87
Huaqing Lin and
Zheng Yan and
Yulong Fu Adaptive security-related data
collection with context awareness . . . 88--103
EmadelDin A. Mazied and
Mustafa Y. ElNainay and
Mohammad J. Abdel-Rahman and
Scott F. Midkiff and
Mohamed R. M. Rizk and
Hesham A. Rakha and
Allen B. MacKenzie The wireless control plane: an overview
and directions for future research . . . 104--122
Karim Akilal and
Hachem Slimani and
Mawloud Omar A robust trust inference algorithm in
weighted signed social networks based on
collaborative filtering and agreement as
a similarity metric . . . . . . . . . . 123--132
Cleverton Vicentini and
Altair Santin and
Eduardo Viegas and
Vilmar Abreu SDN-based and multitenant-aware resource
provisioning mechanism for cloud-based
big data streaming . . . . . . . . . . . 133--149
Abderazek Seba and
Nadia Nouali-Taboudjemat and
Nadjib Badache and
Hamida Seba A review on security challenges of
wireless communications in disaster
emergency response and crisis management
situations . . . . . . . . . . . . . . . 150--161
Fatemeh Shabestari and
Amir Masoud Rahmani and
Nima Jafari Navimipour and
Sam Jabbehdari A taxonomy of software-based and
hardware-based approaches for energy
efficiency management in the Hadoop . . 162--177
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Rahmat Faddli Siregar and
Fahri Wisnu Murti and
Soo Young Shin Bit allocation approach of spatial
modulation for multi-user scenario . . . 1--8
Sanaa Kawther Ghalem and
Bouabdellah Kechar and
Ahc\`ene Bounceur and
Reinhardt Euler A probabilistic multivariate
copula-based technique for faulty node
diagnosis in wireless sensor networks 9--25
Francesc Wilhelmi and
Sergio Barrachina-Muñoz and
Boris Bellalta and
Cristina Cano and
Anders Jonsson and
Gergely Neu Potential and pitfalls of Multi-Armed
Bandits for decentralized Spatial Reuse
in WLANs . . . . . . . . . . . . . . . . 26--42
Licheng Wang and
Xiaoying Shen and
Jing Li and
Jun Shao and
Yixian Yang Cryptographic primitives in blockchains 43--58
Hui Tian and
Fulin Nan and
Chin-Chen Chang and
Yongfeng Huang and
Jing Lu and
Yongqian Du Privacy-preserving public auditing for
secure data storage in fog-to-cloud
computing . . . . . . . . . . . . . . . 59--69
Orhan Dagdeviren and
Vahid Khalilpour Akram and
Ali Farzan A Distributed Evolutionary algorithm for
detecting minimum vertex cuts for
wireless ad hoc and sensor networks . . 70--81
Kiran Ahuja and
Arun Khosla Network selection criterion for
ubiquitous communication provisioning in
smart cities for smart energy system . . 82--91
Li Yang and
Yifang Zhi and
Teng Wei and
Shui Yu and
Jianfeng Ma Inference attack in Android activity
based on program fingerprint . . . . . . 92--106
Mehmet Fatih Tuysuz and
Murat Ucan and
Ramona Trestian A real-time power monitoring and
energy-efficient network/interface
selection tool for Android smartphones 107--121
Xiuwen Sun and
Hao Li and
Dan Zhao and
Xingxing Lu and
Kaiyu Hou and
Chengchen Hu COIN: a fast packet inspection method
over compressed traffic . . . . . . . . 122--134
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Salah-Eddine Belouanas and
Kim-Loan Thai and
Prométhée Spathis and
Marcelo Dias de Amorim Mobility-assisted offloading in
centrally-coordinated cellular networks 1--10
Lingling Xu and
Jin Li and
Xiaofeng Chen and
Wanhua Li and
Shaohua Tang and
Hao-Tian Wu Tc-PEDCKS: Towards time controlled
public key encryption with delegatable
conjunctive keyword search for Internet
of Things . . . . . . . . . . . . . . . 11--20
Haomiao Yang and
Xiaofen Wang and
Chun Yang and
Xin Cong and
You Zhang Securing content-centric networks with
content-based encryption . . . . . . . . 21--32
Nour Moustafa and
Jiankun Hu and
Jill Slay A holistic review of Network Anomaly
Detection Systems: a comprehensive
survey . . . . . . . . . . . . . . . . . 33--55
Wenjuan Li and
Weizhi Meng and
Zhiyuan Tan and
Yang Xiang Design of multi-view based email
classification for IoT systems via
semi-supervised learning . . . . . . . . 56--63
Mainak Adhikari and
Sudarshan Nandy and
Tarachand Amgoth Meta heuristic-based task deployment
mechanism for load balancing in IaaS
cloud . . . . . . . . . . . . . . . . . 64--77
Helder M. N. S. Oliveira and
Nelson L. S. da Fonseca Routing, spectrum and core assignment
algorithms for protection of space
division multiplexing elastic optical
networks . . . . . . . . . . . . . . . . 78--89
Aparna Kumari and
Sudeep Tanwar and
Sudhanshu Tyagi and
Neeraj Kumar and
Reza M. Parizi and
Kim-Kwang Raymond Choo Fog data analytics: a taxonomy and
process model . . . . . . . . . . . . . 90--104
Hanan Elazhary Internet of Things (IoT), mobile cloud,
cloudlet, mobile IoT, IoT cloud, fog,
mobile edge, and edge emerging computing
paradigms: Disambiguation and research
directions . . . . . . . . . . . . . . . 105--140
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Qingchen Zhang and
Changchuan Bai and
Zhikui Chen and
Peng Li and
Shuo Wang and
He Gao Smart Chinese medicine for hypertension
treatment with a deep learning model . . 1--8
Shahriar Kaisar and
Joarder Kamruzzaman and
Gour Karmakar A dynamic content distribution scheme
for decentralized sharing in tourist
hotspots . . . . . . . . . . . . . . . . 9--24
Voundi Koe Arthur Sandor and
Yaping Lin and
Xiehua Li and
Feng Lin and
Shiwen Zhang Efficient decentralized multi-authority
attribute based encryption for mobile
cloud data storage . . . . . . . . . . . 25--36
Siguang Chen and
Shujun Zhang and
Xiaoyao Zheng and
Xiukai Ruan Layered adaptive compression design for
efficient data collection in industrial
wireless sensor networks . . . . . . . . 37--45
Yanling Shao and
Chunlin Li and
Zhao Fu and
Leyue Jia and
Youlong Luo Cost-effective replication management
and scheduling in edge computing . . . . 46--61
Haichun Zhao and
Xuanxia Yao and
Xuefeng Zheng and
Tie Qiu and
Huansheng Ning User stateless privacy-preserving TPA
auditing scheme for cloud storage . . . 62--70
Mittal K. Pedhadiya and
Rakesh Kumar Jha and
Hetal G. Bhatt Device to device communication: a survey 71--89
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Gang Liu and
Wei Quan and
Nan Cheng and
Hongke Zhang and
Shui Yu Efficient DDoS attacks mitigation for
stateful forwarding in Internet of
Things . . . . . . . . . . . . . . . . . 1--13
Firas D. Ahmed and
Mazlina Abdul Majid Towards agent-based Petri net decision
making modelling for cloud service
composition: a literature survey . . . . 14--38
Hamza Ben-Ammar and
Yassine Hadjadj-Aoul and
Gerardo Rubino and
Soraya Ait-Chellouche On the performance analysis of
distributed caching systems using a
customizable Markov chain model . . . . 39--51
Menatalla Abououf and
Rabeb Mizouni and
Shakti Singh and
Hadi Otrok and
Anis Ouali Multi-worker multi-task selection
framework in mobile crowd sourcing . . . 52--62
Pasquale Imputato and
Stefano Avallone Enhancing the fidelity of network
emulation through direct access to
device buffers . . . . . . . . . . . . . 63--75
Yuan-Cheng Lai and
Ahsan Ali and
Md. Shohrab Hossain and
Ying-Dar Lin Performance modeling and analysis of TCP
and UDP flows over software defined
networks . . . . . . . . . . . . . . . . 76--88
Rahul Kumar Verma and
K. K. Pattanaik and
Sourabh Bharti and
Divya Saxena In-network context inference in IoT
sensory environment for efficient
network resource utilization . . . . . . 89--103
Antonio Celesti and
Antoine Bagula and
Ivanoe De Falco and
Pedro Brandão and
Giovanna Sannino Emerging Networked Computer Applications
for Telemedicine . . . . . . . . . . . . 104--106
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Chunlin Li and
Jianhang Tang and
Youlong Luo Dynamic multi-user computation
offloading for wireless powered mobile
edge computing . . . . . . . . . . . . . 1--15
Yuxin Liu and
Anfeng Liu and
Ning Zhang and
Xiao Liu and
Ming Ma and
Yanling Hu DDC: Dynamic duty cycle for improving
delay and energy efficiency in wireless
sensor networks . . . . . . . . . . . . 16--27
Wander Queiroz and
Miriam A. M. Capretz and
Mario Dantas An approach for SDN traffic monitoring
based on big data techniques . . . . . . 28--39
Tusher Chakraborty and
Novia Nurain and
Suraiya Tairin and
Taslim Arefin Khan and
Jannatun Noor and
Md. Rezwanul Islam and
A. B. M. Alim Al Islam A new network paradigm for low-cost and
lightweight real-time communication
between train and rail track to detect
missing and faulty rail blocks . . . . . 40--54
Minghao Zhao and
Chengyu Hu and
Xiangfu Song and
Chuan Zhao Towards dependable and trustworthy
outsourced computing: a comprehensive
survey and tutorial . . . . . . . . . . 55--65
Bidi Ying and
Amiya Nayak Lightweight remote user authentication
protocol for multi-server $5$G networks
using self-certified public key
cryptography . . . . . . . . . . . . . . 66--74
Jiawei Huang and
Shuping Li and
Rui Han and
Jianxin Wang Receiver-driven fair congestion control
for TCP outcast in data center networks 75--88
Rishikesh Sahay and
Weizhi Meng and
Christian D. Jensen The application of Software Defined
Networking on securing computer
networks: a survey . . . . . . . . . . . 89--108
Muchtar Farkhana and
Abdullah Abdul Hanan and
Hassan Suhaidi and
Khader Ahamad Tajudin and
Zamli Kamal Zuhairi Energy conservation of content routing
through wireless broadcast control in
NDN based MANET: a review . . . . . . . 109--132
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Jinyoung Han and
Daejin Choi and
Taejoong Chung and
Chen-Nee Chuah and
Hyun-chul Kim and
Ted Taekyoung Kwon Predicting content consumption from
content-to-content relationships . . . . 1--9
P. Thulasiraman and
T. Haakensen and
A. Callanan Countering passive cyber attacks against
sink nodes in tactical sensor networks
using reactive route obfuscation . . . . 10--21
Ruan D. Gomes and
Cesar Benavente-Peces and
Iguatemi E. Fonseca and
Marcelo S. Alencar Adaptive and Beacon-based multi-channel
protocol for Industrial Wireless Sensor
Networks . . . . . . . . . . . . . . . . 22--39
Wenyuan Han and
Weijiang Liu and
Kaiye Zhang and
Zhiyang Li and
Zhaobin Liu A protocol for detecting missing target
tags in RFID systems . . . . . . . . . . 40--48
Sharleen Joy Y. Go and
Cedric Angelo M. Festin and
Wilson M. Tan An SDN-based framework for improving the
performance of underprovisioned IP Video
Surveillance networks . . . . . . . . . 49--74
Shi Dong and
Raj Jain Flow online identification method for
the encrypted Skype . . . . . . . . . . 75--85
Xiangjie Kong and
Yajie Shi and
Shuo Yu and
Jiaying Liu and
Feng Xia Academic social networks: Modeling
analysis, mining and applications . . . 86--103
Nouman Ashraf and
Muhammad Faizan and
Waqar Asif and
Hassaan Khaliq Qureshi and
Adnan Iqbal and
Marios Lestas Energy management in harvesting enabled
sensing nodes: Prediction and control 104--117
Abhishek Gupta and
Alagan Anpalagan and
Glaucio H. S. Carvalho and
Ahmed S. Khwaja and
Ling Guan and
Isaac Woungang RETRACTED: Prevailing and emerging cyber
threats and security practices in
IoT-Enabled smart grids: a survey . . . 118--148
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Masoume Jabbarifar and
Alireza Shameli-Sendi and
Bettina Kemme A scalable network-aware framework for
cloud monitoring orchestration . . . . . 1--14
Shanshan Wang and
Zhenxiang Chen and
Qiben Yan and
Bo Yang and
Lizhi Peng and
Zhongtian Jia A mobile malware detection method using
behavior features in network traffic . . 15--25
Md. Tareq Mahmud and
Md. Obaidur Rahman and
Mohammad Mehedi Hassan and
Ahmad Almogren and
Mengchu Zhou An Efficient Cooperative Medium Access
Control Protocol for Wireless IoT
networks in Smart World System . . . . . 26--38
Muluneh Mekonnen Tulu and
Ronghui Hou and
Talha Younas Vital nodes extracting method based on
user's behavior in $5$G mobile social
networks . . . . . . . . . . . . . . . . 39--50
Kehua Guo and
Rui Cao and
Xiaoyan Kui and
Jianhua Ma and
Jian Kang and
Tao Chi LCC: Towards efficient label completion
and correction for supervised medical
image learning in smart diagnosis . . . 51--59
Mohammed Abdullahi and
Md Asri Ngadi and
Salihu Idi Dishing and
Shafi'i Muhammad Abdulhamid and
Barroon Isma'eel Ahmad An efficient symbiotic organisms search
algorithm with chaotic optimization
strategy for multi-objective task
scheduling problems in cloud computing
environment . . . . . . . . . . . . . . 60--74
Xiaolong Xu and
Yuancheng Li and
Tao Huang and
Yuan Xue and
Kai Peng and
Lianyong Qi and
Wanchun Dou An energy-aware computation offloading
method for smart edge computing in
wireless metropolitan area networks . . 75--85
Alexandre B. Barreto and
Paulo C. G. Costa Cyber-ARGUS --- a mission assurance
framework . . . . . . . . . . . . . . . 86--108
Jiawei Li and
Hongbin Luo and
Shan Zhang and
Hongyi Li and
Fei Yan Design and implementation of efficient
control for incoming inter-domain
traffic with Information-Centric
Networking . . . . . . . . . . . . . . . 109--125
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Tong Wang and
Leszek Lilien Opportunistic topology control for ad
hoc wireless network survivability
enhancement based on LIMOS model . . . . 1--12
Lichuan Ma and
Qingqi Pei and
Yong Xiang and
Lina Yao and
Shui Yu A reliable reputation computation
framework for online items in E-commerce 13--25
Huiying Hou and
Jia Yu and
Rong Hao Cloud storage auditing with
deduplication supporting different
security levels according to data
popularity . . . . . . . . . . . . . . . 26--39
Kai Guo and
Mingcong Yang and
Yongbing Zhang and
Xiaohua Jia Efficient resource assignment in mobile
edge computing: a dynamic
congestion-aware offloading approach . . 40--51
JiLiang Li and
WeiGuo Zhang and
Vivek Dabra and
Kim-Kwang Raymond Choo and
Saru Kumari and
Dieter Hogrefe AEP-PPA: an anonymous, efficient and
provably-secure privacy-preserving
authentication protocol for mobile
services in smart cities . . . . . . . . 52--61
Yongxin Liu and
Jianqiang Li and
Zhong Ming and
Houbing Song and
Xiaoxiong Weng and
Jian Wang Domain-specific data mining for
residents' transit pattern retrieval
from incomplete information . . . . . . 62--71
Su Peng and
Fucai Zhou and
Jin Li and
Qiang Wang and
Zifeng Xu Efficient, dynamic and identity-based
Remote Data Integrity Checking for
multiple replicas . . . . . . . . . . . 72--88
Gang Sun and
Siyu Sun and
Jian Sun and
Hongfang Yu and
Xiaojiang Du and
Mohsen Guizani Security and privacy preservation in
fog-based crowd sensing on the Internet
of Vehicles . . . . . . . . . . . . . . 89--99
Azadeh Zamanifar and
Eslam Nazemi RETRACTED: An approach for predicting
health status in IoT health care . . . . 100--113
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Xuxin Zhang and
Honglong Chen and
Kai Lin and
Zhibo Wang and
Jiguo Yu and
Leyi Shi RMTS: a robust clock synchronization
scheme for wireless sensor networks . . 1--10
Tian Wang and
Yuzhu Liang and
Weijia Jia and
Muhammad Arif and
Anfeng Liu and
Mande Xie Coupling resource management based on
fog computing in smart city systems . . 11--19
Muhammad Toaha Raza Khan and
Syed Hassan Ahmed and
Yalew Zelalem Jembre and
Dongkyun Kim An energy-efficient data collection
protocol with AUV path planning in the
Internet of Underwater Things . . . . . 20--31
Gonzalo De La Torre Parra and
Paul Rad and
Kim-Kwang Raymond Choo Implementation of deep packet inspection
in smart grids and industrial Internet
of Things: Challenge's and opportunities 32--46
Yingya Guo and
Zhiliang Wang and
Han Zhang and
Xia Yin and
Xingang Shi and
Jianping Wu Joint optimization of tasks placement
and routing to minimize Coflow
Completion Time . . . . . . . . . . . . 47--61
Thomas McGhin and
Kim-Kwang Raymond Choo and
Charles Zhechao Liu and
Debiao He Blockchain in healthcare applications:
Research challenges and opportunities 62--75
Asmaa Elsaeidy and
Kumudu S. Munasinghe and
Dharmendra Sharma and
Abbas Jamalipour Intrusion detection in smart cities
using Restricted Boltzmann Machines . . 76--83
Rúben Vales and
José Moura and
Rui Marinheiro Energy-aware and adaptive fog storage
mechanism with data replication ruled by
spatio-temporal content popularity . . . 84--96
Adib Habbal and
Swetha Indudhar Goudar and
Suhaidi Hassan A Context-aware Radio Access Technology
selection mechanism in $5$G mobile
network for smart city applications . . 97--107
Giovanni Pau and
Alessandro Bazzi and
Miguel Elias M. Campista and
Ali Balador Towards $5$G and beyond for the Internet
of UAVs, vehicles, smartphones, Sensors
and Smart Objects . . . . . . . . . . . 108--109
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Xin Jin and
Fei Gu and
Jianwei Niu and
Shui Yu and
Zhenchao Ouyang HRCal: an effective calibration system
for heart rate detection during
exercising . . . . . . . . . . . . . . . 1--10
Feng Wang and
Wenjun Jiang and
Guojun Wang and
Song Guo Influence maximization by leveraging the
crowdsensing data in information
diffusion network . . . . . . . . . . . 11--21
Deepak Singh and
Bryan Ng and
Yuan-Cheng Lai and
Ying-Dar Lin and
Winston K. G. Seah Analytical Modelling of Software and
Hardware Switches with Internal Buffer
in Software-Defined Networks . . . . . . 22--37
Carlos Guimarães and
José Quevedo and
Rui Ferreira and
Daniel Corujo and
Rui L. Aguiar Exploring interoperability assessment
for Future Internet Architecture's roll
out . . . . . . . . . . . . . . . . . . 38--56
Xiaoping Wu and
Xuefen Zhu and
Shenghui Wang and
Lufeng Mo Cooperative motion parameter estimation
using RSS measurements in robotic sensor
networks . . . . . . . . . . . . . . . . 57--70
Celyn Birkinshaw and
Elpida Rouka and
Vassilios G. Vassilakis Implementing an intrusion detection and
prevention system using software-defined
networking: Defending against
port-scanning and denial-of-service
attacks . . . . . . . . . . . . . . . . 71--85
Kashif Bilal and
Emna Baccour and
Aiman Erbad and
Amr Mohamed and
Mohsen Guizani Collaborative joint caching and
transcoding in mobile edge networks . . 86--99
Ripon Patgiri and
Sabuzima Nayak and
Samir Kumar Borgohain rDBF: a $r$-Dimensional Bloom Filter for
massive scale membership query . . . . . 100--113
Marco Antonio Sotelo Monge and
Andrés Herranz González and
Borja Lorenzo Fernández and
Diego Maestre Vidal and
Guillermo Rius Garc\'ìa and
Jorge Maestre Vidal Traffic-flow analysis for source-side
DDoS recognition on $5$G environments 114--131
Murat Karakus and
Arjan Durresi An economic framework for analysis of
network architectures: SDN and MPLS
cases . . . . . . . . . . . . . . . . . 132--146
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mian Ahmad Jan and
Wenjing Zhang and
Muhammad Usman and
Zhiyuan Tan and
Fazlullah Khan and
Entao Luo SmartEdge: an end-to-end encryption
framework for an edge-enabled smart city
application . . . . . . . . . . . . . . 1--10
Xiuwen Fu and
Haiqing Yao and
Octavian Postolache and
Yongsheng Yang Message forwarding for WSN-Assisted
Opportunistic Network in disaster
scenarios . . . . . . . . . . . . . . . 11--24
A. I. C. Mohideen and
M. Rajiullah and
R. Secchi and
G. Fairhurst and
A. Brunstrom and
F. Weinrank Evaluating the impact of transport
mechanisms on web performance for
effective web access . . . . . . . . . . 25--34
Mainak Adhikari and
Satish Narayana Srirama Multi-objective accelerated particle
swarm optimization with a
container-based scheduling for
Internet-of-Things in cloud environment 35--61
Muhammad Usman Younus and
Saif ul Islam and
Ihsan Ali and
Suleman Khan and
Muhammad Khurram Khan A survey on software defined networking
enabled smart buildings: Architecture
challenges and use cases . . . . . . . . 62--77
Rudraksh Shrivastava and
Konstantinos Samdanis and
Vincenzo Sciancalepore Towards service-oriented soft spectrum
slicing for $5$G TDD networks . . . . . 78--90
Jin Li and
Francesco Palmieri and
Qiben Yan Special issue on advances in security
and privacy in IoT . . . . . . . . . . . 91--92
Ayesha Altaf and
Haider Abbas and
Faiza Iqbal and
Abdelouahid Derhab Trust models of Internet of Smart
Things: a survey, open issues, and
future directions . . . . . . . . . . . 93--111
Guolin Sun and
Daniel Ayepah-Mensah and
Li Lu and
Wei Jiang and
Guisong Liu Delay-aware content distribution via
cell clustering and content placement
for multiple tenants . . . . . . . . . . 112--126
Beakal Gizachew Assefa and
Öznur Özkasap A survey of energy efficiency in SDN:
Software-base methods and optimization
models . . . . . . . . . . . . . . . . . 127--143
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Esraa M. Ghourab and
Mohamed Azab and
Ahmed Mansour Spatiotemporal diversification by
moving-target defense through benign
employment of false-data injection for
dynamic, secure cognitive radio network 1--14
Jun Young Kim and
Wen Hu and
Dilip Sarkar and
Sanjay Jha Long-term secure management of large
scale Internet of Things applications 15--26
Sourav Mondal and
Goutam Das and
Elaine Wong Cost-optimal cloudlet placement
frameworks over fiber-wireless access
networks for low-latency applications 27--38
Abdullah Aydeger and
Nico Saputro and
Kemal Akkaya and
Selcuk Uluagac SDN-enabled recovery for Smart Grid
teleprotection applications in
post-disaster scenarios . . . . . . . . 39--50
Abishi Chowdhury and
Shital A. Raut and
Husnu S. Narman DA-DRLS: Drift adaptive deep
reinforcement learning based scheduling
for IoT resource management . . . . . . 51--65
Abhishek Gupta and
Alagan Anpalagan and
Glaucio H. S. Carvalho and
Ahmed S. Khwaja and
Ling Guan and
Isaac Woungang Retraction notice to Prevailing and
emerging cyber threats and security
practices in IoT-Enabled smart grids: a
survey [J. Netw. Comput. Appl. \bf 132
(2019) 118--148] . . . . . . . . . . . . 66--66
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mohammed Atiquzzaman Editorial: New editors 2019 . . . . . . iii--v
Vladimir Rocha and
Anarosa Alves Franco Brandão A scalable multiagent architecture for
monitoring IoT devices . . . . . . . . . 1--14
Xiaowu Liu and
Jiguo Yu and
Weifeng Lv and
Dongxiao Yu and
Yinglong Wang and
Yu Wu Network security situation: From
awareness to awareness-control . . . . . 15--30
Md. Farhad Hossain and
Ayman Uddin Mahin and
Topojit Debnath and
Farjana Binte Mosharrof and
Khondoker Ziaul Islam Recent research in cloud radio access
network (C-RAN) for $5$G cellular
systems --- a survey . . . . . . . . . . 31--48
Reyhaneh Rabaninejad and
Mahmoud Ahmadian Attari and
Maryam Rajabzadeh Asaar and
Mohammad Reza Aref Comments on a lightweight cloud auditing
scheme: Security analysis and
improvement . . . . . . . . . . . . . . 49--56
Shantanu Pal and
Michael Hitchens and
Vijay Varadharajan and
Tahiry Rabehaja Policy-based access control for
constrained healthcare resources in the
context of the Internet of Things . . . 57--74
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Partha Pratim Ray and
Dinesh Dash and
Debashis De Edge computing for Internet of Things: a
survey, e-healthcare case study and
future direction . . . . . . . . . . . . 1--22
Yue Li and
Yongmin Zhang and
Lin Cai Optimal location of supplementary node
in UAV surveillance system . . . . . . . 23--39
Jirui Li and
Xiaoyong Li and
Xianglong Cheng and
Jie Yuan and
Rui Zhang A trustworthiness-enhanced reliable
forwarding scheme in mobile Internet of
Things . . . . . . . . . . . . . . . . . 40--53
Yali Zeng and
Li Xu and
Xu Yang and
Xun Yi and
Ibrahim Khalil Privacy-preserving aggregation for
cooperative spectrum sensing . . . . . . 54--64
Prasanta Majumdar and
Tanmay De An alternative minimum cost route setup
algorithm in a large EON for long-haul
traffic under dynamic traffic grooming 65--86
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Asad Arfeen and
Krzysztof Pawlikowski and
Don McNickle and
Andreas Willig The role of the Weibull distribution in
modelling traffic in Internet access and
backbone core networks . . . . . . . . . 1--22
Surbhi Saraswat and
Vishal Agarwal and
Hari Prabhat Gupta and
Rahul Mishra and
Ashish Gupta and
Tanima Dutta Challenges and solutions in Software
Defined Networking: a survey . . . . . . 23--58
Md Osman Gani and
Taskina Fayezeen and
Richard J. Povinelli and
Roger O. Smith and
Muhammad Arif and
Ahmed J. Kattan and
Sheikh Iqbal Ahamed A light weight smartphone based human
activity recognition system with high
accuracy . . . . . . . . . . . . . . . . 59--72
Yanbing Liu and
Xiaowei Qin and
Ting Zhu and
Xiaohui Chen and
Guo Wei Improve MPTCP with SDN: From the
perspective of resource pooling . . . . 73--85
Long Luo and
Hongfang Yu and
Shouxi Luo and
Zilong Ye and
Xiaojiang Du and
Mohsen Guizani Scalable explicit path control in
software-defined networks . . . . . . . 86--103
Shouxi Luo and
Hongfang Yu and
Long Luo and
Lemin Li Customizable network update planning in
SDN . . . . . . . . . . . . . . . . . . 104--115
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mohammed Atiquzzaman Editorial: 2018 best paper awards . . . iii--iii
Ankita Atrey and
Gregory Van Seghbroeck and
Higinio Mora and
Filip De Turck and
Bruno Volckaert SpeCH: a scalable framework for data
placement of data-intensive services in
geo-distributed clouds . . . . . . . . . 1--14
Xuyang Jing and
Jingjing Zhao and
Qinghua Zheng and
Zheng Yan and
Witold Pedrycz A reversible sketch-based method for
detecting and mitigating amplification
attacks . . . . . . . . . . . . . . . . 15--24
Erfan Mozaffari Ahrar and
Mohammad Nassiri and
Fabrice Theoleyre Multipath aware scheduling for high
reliability and fault tolerance in low
power industrial networks . . . . . . . 25--36
Omar Abdel Wahab and
Nadjia Kara and
Claes Edstrom and
Yves Lemieux MAPLE: a Machine Learning Approach for
Efficient Placement and Adjustment of
Virtual Network Functions . . . . . . . 37--50
Xincheng Tan and
Yi Xie and
Haishou Ma and
Shunzheng Yu and
Jiankun Hu Recognizing the content types of network
traffic based on a hybrid DNN-HMM model 51--62
Soroush Karimian-Aliabadi and
Danilo Ardagna and
Reza Entezari-Maleki and
Eugenio Gianniti and
Ali Movaghar Analytical composite performance models
for Big Data applications . . . . . . . 63--75
Mostafa Ghobaei-Arani and
Reihaneh Khorsand and
Mohammadreza Ramezanpour An autonomous resource provisioning
framework for massively multiplayer
online games in cloud environment . . . 76--97
Shie-Yuan Wang and
Chia-Ming Wu and
Yi-Bing Lin and
Ching-Chun Huang High-speed data-plane packet aggregation
and disaggregation by P4 switches . . . 98--110
Fakhrosadat Fanian and
Marjan Kuchaki Rafsanjani Cluster-based routing protocols in
wireless sensor networks: a survey based
on methodology . . . . . . . . . . . . . 111--142
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Mohit Kumar and
S. C. Sharma and
Anubhav Goel and
S. P. Singh A comprehensive survey for scheduling
techniques in cloud computing . . . . . 1--33
Mahadev A. Gawas and
Sweta S. Govekar A novel selective cross layer based
routing scheme using ACO method for
vehicular networks . . . . . . . . . . . 34--46
Mani Shekhar Gupta and
Krishan Kumar Progression on spectrum sensing for
cognitive radio networks: a survey,
classification, challenges and future
research issues . . . . . . . . . . . . 47--76
Meiguang Liu and
Lei Zhang and
Panlong Yang and
Liangfu Lu and
Liangyi Gong Wi-Run: Device-free step estimation
system with commodity Wi-Fi . . . . . . 77--88
Alexis Huf and
Frank Siqueira Composition of heterogeneous web
services: a systematic review . . . . . 89--110
Abhishek Singh and
Ashish Payal and
Sourabh Bharti A walkthrough of the emerging IoT
paradigm: Visualizing inside
functionalities, key features, and open
issues . . . . . . . . . . . . . . . . . 111--151
Chunlin Li and
YaPing Wang and
Yi Chen and
Youlong Luo Energy-efficient fault-tolerant replica
management policy with deadline and
budget constraints in edge-cloud
environment . . . . . . . . . . . . . . 152--166
Shailendra Rathore and
Byung Wook Kwon and
Jong Hyuk Park BlockSecIoTNet: Blockchain-based
decentralized security architecture for
IoT network . . . . . . . . . . . . . . 167--177
Khalid Hasan and
Kamanashis Biswas and
Khandakar Ahmed and
Nazmus S. Nafi and
Md Saiful Islam A comprehensive review of wireless body
area network . . . . . . . . . . . . . . 178--198
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Jiun Terng Liew and
Fazirulhisyam Hashim and
Aduwati Sali and
Mohd Fadlee A. Rasid and
Abbas Jamalipour Probability-based opportunity dynamic
adaptation (PODA) of contention window
for home M2M networks . . . . . . . . . 1--12
Shubhani Aggarwal and
Rajat Chaudhary and
Gagangeet Singh Aujla and
Neeraj Kumar and
Kim-Kwang Raymond Choo and
Albert Y. Zomaya Blockchain for smart communities:
Applications challenges and
opportunities . . . . . . . . . . . . . 13--48
Hailong Huang and
Andrey V. Savkin and
Ming Ding and
Mohamed Ali Kaafar Optimized deployment of drone base
station to improve user experience in
cellular networks . . . . . . . . . . . 49--58
Deepsubhra Guha Roy and
Puja Das and
Debashis De and
Rajkumar Buyya QoS-aware secure transaction framework
for Internet of Things using blockchain
mechanism . . . . . . . . . . . . . . . 59--78
Sowmya Ravidas and
Alexios Lekidis and
Federica Paci and
Nicola Zannone Access control in Internet-of-Things: a
survey . . . . . . . . . . . . . . . . . 79--101
Ching-Hao Chang and
Ying-Dar Lin and
Yu-Kuen Lai and
Yuan-Cheng Lai A scalable and accurate distributed
traffic generator with Fourier
transformed distribution over multiple
commodity platforms . . . . . . . . . . 102--117
Sonam Maurya and
Vinod Kumar Jain and
Debanjan Roy Chowdhury Delay aware energy efficient reliable
routing for data transmission in
heterogeneous mobile sink wireless
sensor network . . . . . . . . . . . . . 118--137
Ayoub Benayache and
Azeddine Bilami and
Sami Barkat and
Pascal Lorenz and
Hafnaoui Taleb MsM: a microservice middleware for smart
WSN-based IoT application . . . . . . . 138--154
Naveen Kumar and
Abdul Aleem and
Ashutosh Kumar Singh and
Shashank Srivastava NBP: Namespace-based privacy to counter
timing-based attack in named data
networking . . . . . . . . . . . . . . . 155--170
Harkiran Kaur and
Sandeep K. Sood Fog-assisted IoT-enabled scalable
network infrastructure for wildfire
surveillance . . . . . . . . . . . . . . 171--183
M. Mehdi Afsar and
Mohamed Younis A load-balanced cross-layer design for
energy-harvesting sensor networks . . .
Ashar Ahmad and
Muhammad Saad and
Aziz Mohaisen Secure and transparent audit logs with
BlockAudit . . . . . . . . . . . . . . .
Abdelmuttlib Ibrahim Abdalla Ahmed and
Siti Hafizah Ab Hamid and
Abdullah Gani and
Suleman Khan and
Muhammad Khurram Khan Trust and reputation for Internet of
Things: Fundamentals, taxonomy, and open
research challenges . . . . . . . . . .
Melchizedek Alipio and
Nestor Michael Tiglao and
Fawaz Bokhari and
Salman Khalid TCP incast solutions in data center
networks: a classification and survey
Anonymous Editorial Board . . . . . . . . . . . .
Anonymous Editorial Board . . . . . . . . . . . .
Anonymous Publisher's note . . . . . . . . . . . .
Narmeen Zakaria Bawany and
Jawwad A. Shamsi SEAL: SDN based secure and agile
framework for protecting smart city
applications from DDoS attacks . . . . .
Sheng Feng and
Shigen Shen and
Longjun Huang and
Adam C. Champion and
Shui Yu and
Chengdong Wu and
Yunzhou Zhang Three-dimensional robot localization
using cameras in wireless multimedia
sensor networks . . . . . . . . . . . .
Anatoliy Gorbenko and
Alexander Romanovsky and
Olga Tarasyuk Fault tolerant Internet computing:
Benchmarking and modelling trade-offs
between availability, latency and
consistency . . . . . . . . . . . . . .
Mohammad Goudarzi and
Marimuthu Palaniswami and
Rajkumar Buyya A fog-driven dynamic resource allocation
technique in ultra dense femtocell
networks . . . . . . . . . . . . . . . .
Mordechai Guri and
Rami Puzis and
Kim-Kwang Raymond Choo and
Sergey Rubinshtein and
Gabi Kedma and
Yuval Elovici Using malware for the greater good:
Mitigating data leakage . . . . . . . .
Ana Serrano Mamolar and
Pablo Salvá-Garc\'ìa and
Enrique Chirivella-Perez and
Zeeshan Pervez and
Jose M. Alcaraz Calero and
Qi Wang Autonomic protection of multi-tenant
$5$G mobile networks against UDP
flooding DDoS attacks . . . . . . . . .
Ivan Marsa-Maestre and
Jose Manuel Gimenez-Guzman and
David Orden and
Enrique de la Hoz and
Mark Klein REACT: reactive resilience for critical
infrastructures using graph-coloring
techniques . . . . . . . . . . . . . . .
Cem Mergenci and
Ibrahim Korpeoglu Generic resource allocation metrics and
methods for heterogeneous cloud
infrastructures . . . . . . . . . . . .
Partha Sarathi Paul and
Bishakh Chandra Ghosh and
Hridoy Sankar Dutta and
Kingshuk De and
Arka Prava Basu and
Prithviraj Pramanik and
Sujoy Saha and
Sandip Chakraborty and
Niloy Ganguly and
Subrata Nandi CRIMP: Here crisis mapping goes offline
Mustapha Reda Senouci and
Abdelhamid Mellouk A robust uncertainty-aware cluster-based
deployment approach for WSNs: Coverage,
connectivity, and lifespan . . . . . . .
Shigen Shen and
Haiping Zhou and
Sheng Feng and
Longjun Huang and
Jianhua Liu and
Shui Yu and
Qiying Cao HSIRD: a model for characterizing
dynamics of malware diffusion in
heterogeneous WSNs . . . . . . . . . . .
Xincheng Tan and
Yi Xie and
Haishou Ma and
Shunzheng Yu and
Jiankun Hu Corrigendum to ``Recognizing the content
types of network traffic based on a
hybrid DNN-HMM model'' [J. Netw. Comput.
Appl. \bf 142 (2019) 51--62] . . . . . .
Fulvio Valenza and
Serena Spinoso and
Riccardo Sisto Formally specifying and checking
policies and anomalies in service
function chaining . . . . . . . . . . .
Yanjun Yan and
Guangjie Han and
Huihui Xu A survey on secure routing protocols for
satellite network . . . . . . . . . . .
Bo Yang and
Bo Li and
Zhongjiang Yan and
Der-Jiunn Deng and
Mao Yang Performance analysis of multi-channel
MAC with single transceiver for the next
generation WLAN . . . . . . . . . . . .
Azadeh Zamanifar and
Eslam Nazemi Retraction notice to ``An approach for
predicting health status in IoT health
care'' [YJNCA \bf 134 (2019) 100--113]
Chuanji Zhang and
Harshvardhan P. Joshi and
George F. Riley and
Steven A. Wright Towards a virtual network function
research agenda: a systematic literature
review of VNF design considerations . .
Anonymous 1 December 2019 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Masoud Asghari and
Saleh Yousefi and
Dusit Niyato Pricing strategies of IoT wide area
network service providers with
complementary services included . . . . ??
Jamila Manan and
Atiq Ahmed and
Ihsan Ullah and
Le\"\ila Merghem-Boulahia and
Dominique Ga\"\iti Distributed intrusion detection scheme
for next generation networks . . . . . . ??
Maryam Imani and
Gholam Ali Montazer A survey of emotion recognition methods
with emphasis on E-Learning environments ??
Sedef Demirci and
Seref Sagiroglu Optimal placement of virtual network
functions in software defined networks:
a survey . . . . . . . . . . . . . . . . ??
Hamed Alimohammadi and
Mahmood Ahmadi Clustering-based many-field packet
classification in Software-Defined
Networking . . . . . . . . . . . . . . . ??
Shubhra Jain and
K. K. Pattanaik and
Anupam Shukla QWRP: Query-driven virtual wheel based
routing protocol for wireless sensor
networks with mobile sink . . . . . . . ??
Yinbo Yu and
Jianfeng Yang and
Chengcheng Guo and
Hong Zheng and
Jiancheng He Joint optimization of service request
routing and instance placement in the
microservice system . . . . . . . . . . ??
Phi Le Nguyen and
Kien Nguyen and
Huy Vu and
Yusheng Ji TELPAC: a time and energy efficient
protocol for locating and patching
coverage holes in WSNs . . . . . . . . . ??
Hua Dai and
Xuelong Dai and
Xun Yi and
Geng Yang and
Haiping Huang Semantic-aware multi-keyword ranked
search scheme over encrypted cloud data ??
Gauhar Ali and
Naveed Ahmad and
Yue Cao and
Qazi Ejaz Ali and
Fazal Azim and
Haitham Cruickshank BCON: Blockchain based access CONtrol
across multiple conflict of interest
domains . . . . . . . . . . . . . . . . ??
Anonymous 15 December 2019 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Amar Abane and
Mehammed Daoui and
Samia Bouzefrane and
Paul Muhlethaler A Lightweight Forwarding Strategy for
Named Data Networking in Low-end IoT . . ??
Simon Yusuf Enoch and
Jin B. Hong and
Dong Seong Kim Security modelling and assessment of
modern networks using time independent
Graphical Security Models . . . . . . . ??
Lahlou Laaziz and
Nadjia Kara and
Rafi Rabipour and
Claes Edstrom and
Yves Lemieux FASTSCALE: a fast and scalable
evolutionary algorithm for the joint
placement and chaining of virtualized
services . . . . . . . . . . . . . . . . ??
Souhila Benmakrelouf and
Nadjia Kara and
Hanine Tout and
Rafi Rabipour and
Claes Edstrom Resource needs prediction in virtualized
systems: Generic proactive and
self-adaptive solution . . . . . . . . . ??
Francesco Palmieri Network anomaly detection based on
logistic regression of nonlinear chaotic
invariants . . . . . . . . . . . . . . . ??
Christos Anagnostopoulos and
Kostas Kolomvatsos An intelligent, time-optimized
monitoring scheme for edge nodes . . . . ??
Anandarup Mukherjee and
Sudip Misra and
Narendra Singh Raghuwanshi A survey of unmanned aerial sensing
solutions in precision agriculture . . . ??
El Arbi Abdellaoui Alaoui and
Hanane Zekkori and
Said Agoujil Hybrid delay tolerant network routing
protocol for heterogeneous networks . . ??
Shaonan Li and
Wenyu Qu and
Chunfeng Liu and
Tie Qiu and
Zhao Zhao Survey on high reliability wireless
communication for underwater sensor
networks . . . . . . . . . . . . . . . . ??
Anonymous 1 January 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous Thank You Reviewers . . . . . . . . . . ??
Dapeng Wu and
Bingxu Liu and
Qing Yang and
Ruyan Wang Social-aware cooperative caching
mechanism in mobile social networks . . ??
Fei Gu and
Jianwei Niu and
Landu Jiang and
Xue Liu and
Mohammed Atiquzzaman Survey of the low power wide area
network technologies . . . . . . . . . . ??
David A. Monge and
Elina Pacini and
Cristian Mateos and
Enrique Alba and
Carlos García Garino CMI: an online multi-objective genetic
autoscaler for scientific and
engineering workflows in cloud
infrastructures with unreliable virtual
machines . . . . . . . . . . . . . . . . ??
Qiuyun Lyu and
Yizhen Qi and
Xiaochen Zhang and
Huaping Liu and
Qiuhua Wang and
Ning Zheng SBAC: a secure blockchain-based access
control framework for
information-centric networking . . . . . ??
Amritraj Singh and
Kelly Click and
Reza M. Parizi and
Qi Zhang and
Ali Dehghantanha and
Kim-Kwang Raymond Choo Sidechain technologies in blockchain
networks: an examination and
state-of-the-art review . . . . . . . . ??
Mayssa Ghribi and
Aref Meddeb Survey and taxonomy of MAC, routing and
cross layer protocols using wake-up
radio . . . . . . . . . . . . . . . . . ??
Jaiprakash Nagar and
S. K. Chaturvedi and
Sieteng Soh An analytical model to estimate the
performance metrics of a finite multihop
network deployed in a rectangular region ??
Nusrat J. Shoumy and
Li-Minn Ang and
Kah Phooi Seng and
D. M. Motiur Rahaman and
Tanveer Zia Multimodal big data affective analytics:
a comprehensive survey using text,
audio, visual and physiological signals ??
Hong Zhong and
Zhanfei Li and
Jie Cui and
Yue Sun and
Lu Liu Efficient dynamic multi-keyword fuzzy
search over encrypted cloud data . . . . ??
Jayasree Sengupta and
Sushmita Ruj and
Sipra Das Bit A Comprehensive Survey on Attacks,
Security Issues and Blockchain Solutions
for IoT and IIoT . . . . . . . . . . . . ??
Anonymous 15 January 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Xiong Wang and
Yukun Yang and
Hanyu Liu and
Jing Ren and
Shizhong Xu and
Sheng Wang and
Shui Yu Efficient measurement of round-trip link
delays in software-defined networks . . ??
Mohammad Alauthman and
Nauman Aslam and
Mouhammd Al-Kasassbeh and
Suleman Khan and
Ahmad Al-Qerem and
Kim-Kwang Raymond Choo An efficient reinforcement
learning-based Botnet detection approach ??
Ahmed S. Ali and
Korany R. Mahmoud and
Khaled M. Naguib Optimal caching policy for wireless
content delivery in D2D networks . . . . ??
Alejandro Canovas and
Albert Rego and
Oscar Romero and
Jaime Lloret A robust multimedia traffic SDN-Based
management system using patterns and
models of QoE estimation with BRNN . . . ??
Ayaz Ali Khan and
Muhammad Zakarya and
Rahim Khan and
Izaz Ur Rahman and
Mukhtaj Khan and
Atta ur Rehman Khan An energy, performance efficient
resource consolidation scheme for
heterogeneous cloud datacenters . . . . ??
Mohamed Ali Kandi and
Hicham Lakhlef and
Abdelmadjid Bouabdallah and
Yacine Challal A versatile Key Management protocol for
secure Group and Device-to-Device
Communication in the Internet of Things ??
Muhammad Asif Khan and
Ridha Hamila and
Nasser Ahmed Al-Emadi and
Serkan Kiranyaz and
Moncef Gabbouj Real-time throughput prediction for
cognitive Wi-Fi networks . . . . . . . . ??
Mohammad Wazid and
Ashok Kumar Das and
Vivekananda Bhat K. and
Athanasios V. Vasilakos LAM-CIoT: Lightweight authentication
mechanism in cloud-based IoT environment ??
Yan Chen and
Yanjing Sun and
Nannan Lu and
Bin Wang Channel-reserved medium access control
for edge computing based IoT . . . . . . ??
Anonymous 1 February 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Stela Kucek and
Maria Leitner An Empirical Survey of Functions and
Configurations of Open-Source Capture
the Flag (CTF) Environments . . . . . . ??
Haijun Geng and
Han Zhang and
Xingang Shi and
Zhiliang Wang and
Xia Yin Efficient computation of loop-free
alternates . . . . . . . . . . . . . . . ??
Jingjing Guo and
Chunlin Li and
Yi Chen and
Youlong Luo On-demand resource provision based on
load estimation and service expenditure
in edge cloud environment . . . . . . . ??
Mahdi Rabbani and
Yong Li Wang and
Reza Khoshkangini and
Hamed Jelodar and
Ruxin Zhao and
Peng Hu A hybrid machine learning approach for
malicious behaviour detection and
recognition in cloud computing . . . . . ??
Guangjie Han and
Haofei Guan and
Zeren Zhou and
Zhifan Li and
Sammy Chan and
Wenbo Zhang CTRA: a complex terrain region-avoidance
charging algorithm in Smart World . . . ??
Anonymous 15 February 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Akbar Majidi and
Nazila Jahanbakhsh and
Xiaofeng Gao and
Jiaqi Zheng and
Guihai Chen ECN$^+$: a marking-aware optimization
for ECN threshold via per-port in Data
Center Networks . . . . . . . . . . . . ??
Farkhana Muchtar and
Abdul Hanan Abdullah and
Mosleh Al-Adhaileh and
Kamal Zuhairi Zamli Energy conservation strategies in Named
Data Networking based MANET using
congestion control: a review . . . . . . ??
Chunlin Li and
Jianhang Tang and
Tao Ma and
Xihao Yang and
Youlong Luo Load balance based workflow job
scheduling algorithm in distributed
cloud . . . . . . . . . . . . . . . . . ??
Mehdi Nobakht and
Yulei Sui and
Aruna Seneviratne and
Wen Hu PGFit: Static permission analysis of
health and fitness apps in IoT
programming frameworks . . . . . . . . . ??
Ru Wang and
Muhammad Imran and
Kashif Saleem A microservice recommendation mechanism
based on mobile architecture . . . . . . ??
Anonymous 1 March 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Leonardo Richter Bays and
Luciano Paschoal Gaspary Reality shock in virtual network
embedding: Flexibilizing demands for
dealing with multiple operational
requirements in SDNs . . . . . . . . . . ??
Daniel Gibert and
Carles Mateu and
Jordi Planes The rise of machine learning for
detection and classification of malware:
Research developments, trends and
challenges . . . . . . . . . . . . . . . ??
Weihong Wu and
Jiang Liu and
Tao Huang The source-multicast: a sender-initiated
multicast member management mechanism in
SRv6 networks . . . . . . . . . . . . . ??
Morteza Rahimi and
Maryam Songhorabadi and
Mostafa Haghi Kashani Fog-based smart homes: a systematic
review . . . . . . . . . . . . . . . . . ??
Liang Yang and
Bryan Ng and
Winston K. G. Seah and
Deepak Singh Performance evaluation of equivalent
forwarding sets in software defined
networking . . . . . . . . . . . . . . . ??
Xiuwen Sun and
Hao Li and
Dan Zhao and
Xingxing Lu and
Kaiyu Hou and
Chengchen Hu Corrigendum to ``COIN: a fast packet
inspection method over compressed
traffic'' [J. Netw. Comput. Appl. \bf
127 (2019) 122--134] . . . . . . . . . . ??
Anonymous 15 March 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ye Wang and
Qingbao Li and
Zhifeng Chen and
Ping Zhang and
Guimin Zhang A Survey of Exploitation Techniques and
Defenses for Program Data Attacks . . . ??
Zeli Wang and
Weiqi Dai and
Kim-Kwang Raymond Choo and
Hai Jin and
Deqing Zou FSFC: an input filter-based secure
framework for smart contract . . . . . . ??
Lang Fang and
Xiaoning Zhang and
Keshav Sood and
Yunqing Wang and
Shui Yu Reliability-aware virtual network
function placement in carrier networks ??
Muhammad Fahad Khan and
Kok-Lim Alvin Yau and
Rafidah MD. Noor and
Muhammad Ali Imran Survey and taxonomy of clustering
algorithms in 5G . . . . . . . . . . . . ??
Ali Mohsenzadeh and
Amir Jalaly Bidgoly and
Yaghoub Farjami A novel reward and penalty trust
evaluation model based on confidence
interval using Petri Net . . . . . . . . ??
Hamid Tahaei and
Firdaus Afifi and
Adeleh Asemi and
Faiz Zaki and
Nor Badrul Anuar The rise of traffic classification in
IoT networks: a survey . . . . . . . . . ??
Anonymous 1 April 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Abdulaziz Al-Darrab and
Ibrahim Al-Darrab and
Ali Rushdi Software-Defined Networking load
distribution technique for an Internet
service provider . . . . . . . . . . . . ??
Bodhi Chakraborty and
Shekhar Verma and
Krishna Pratap Singh Temporal Differential Privacy in
Wireless Sensor Networks . . . . . . . . ??
Bo Yi and
Xingwei Wang and
Min Huang and
Yong Zhao Novel resource allocation mechanism for
SDN-based data center networks . . . . . ??
Yulong Fu and
Hanlu Chen and
Qinghua Zheng and
Zheng Yan and
Raimo Kantola and
Xuyang Jing and
Jin Cao and
Hui Li An Adaptive Security Data Collection and
Composition Recognition method for
security measurement over LTE/LTE-A
networks . . . . . . . . . . . . . . . . ??
Luning Liu and
Zhaoming Lu and
Luhan Wang and
Xin Chen and
Xiangming Wen Large-volume data dissemination for
cellular-assisted automated driving with
edge intelligence . . . . . . . . . . . ??
Anonymous 15 April 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Zhenchun Wei and
Chengkai Xia and
Xiaohui Yuan and
Renhao Sun and
Zengwei Lyu and
Lei Shi and
Jianjun Ji The path planning scheme for joint
charging and data collection in WRSNs: a
multi-objective optimization method . . ??
Zohaib Latif and
Kashif Sharif and
Fan Li and
Md Monjurul Karim and
Sujit Biswas and
Yu Wang A comprehensive survey of interface
protocols for software defined networks ??
Yang Xiao and
Qingqi Pei and
Lina Yao and
Shui Yu and
Lei Bai and
Xianzhi Wang An enhanced probabilistic fairness-aware
group recommendation by incorporating
social activeness . . . . . . . . . . . ??
Abbas Yazdinejad and
Reza M. Parizi and
Ali Bohlooli and
Ali Dehghantanha and
Kim-Kwang Raymond Choo A high-performance framework for a
network programmable packet processor
using P4 and FPGA . . . . . . . . . . . ??
Waqas Rehan and
Stefan Fischer and
Maaz Rehan and
Yasser Mawad and
Shahzad Saleem QCM2R: a QoS-aware cross-layered
multichannel multisink routing protocol
for stream based wireless sensor
networks . . . . . . . . . . . . . . . . ??
Md Zakirul Alam Bhuiyan and
Guojun Wang and
Zhong Fan Smart world systems, applications, and
technologies . . . . . . . . . . . . . . ??
Anonymous 1 May 2020 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Guolin Sun and
Kun Xiong and
Gordon Owusu Boateng and
Guisong Liu and
Wei Jiang Resource slicing and customization in
RAN with dueling deep Q-Network . . . . ??
Stefano Rovetta and
Grazyna Suchacka and
Francesco Masulli Bot recognition in a Web store: an
approach based on unsupervised learning ??
Haroon Elahi and
Guojun Wang and
Jianer Chen Pleasure or pain? An evaluation of the
costs and utilities of bloatware
applications in Android smartphones . . ??
Rentao Gu and
Zeyuan Yang and
Yuefeng Ji Machine learning for intelligent optical
networks: a comprehensive survey . . . . ??
Mu Wang and
Changqiao Xu and
Xingyan Chen and
Lujie Zhong and
Gabriel-Miro Muntean Decentralized asynchronous optimization
for dynamic adaptive multimedia
streaming over information centric
networking . . . . . . . . . . . . . . . ??
Sahar Aldhaheri and
Daniyal Alghazzawi and
Li Cheng and
Ahmed Barnawi and
Bandar A. Alzahrani Artificial Immune Systems approaches to
secure the Internet of Things: a
systematic review of the literature and
recommendations for future research . . ??
Anonymous 15 May 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Marufa Yeasmin Mukta and
Md Arafatur Rahman and
A. Taufiq Asyhari and
Md Zakirul Alam Bhuiyan IoT for energy efficient green highway
lighting systems: Challenges and issues ??
Mingchuan Zhang and
Bowei Hao and
Fei Song and
Meiyi Yang and
Junlong Zhu and
Qingtao Wu Smart collaborative video caching for
energy efficiency in cognitive Content
Centric Networks . . . . . . . . . . . . ??
Pan Zhou and
Xinshu He and
Shouxi Luo and
Hongfang Yu and
Gang Sun JPAS: Job-progress-aware flow scheduling
for deep learning clusters . . . . . . . ??
Ivo Sousa and
Maria Paula Queluz and
António Rodrigues A survey on QoE-oriented wireless
resources scheduling . . . . . . . . . . ??
Mazen Juma and
Azza Abdel Monem and
Khaled Shaalan Hybrid End-to-End VPN Security Approach
for Smart IoT Objects . . . . . . . . . ??
Anonymous 1 June 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Judy C. Guevara and
Ricardo da S. Torres and
Nelson L. S. da Fonseca On the classification of fog computing
applications: a machine learning
perspective . . . . . . . . . . . . . . ??
Brieuc Berruet and
Oumaya Baala and
Alexandre Caminada and
Valery Guillet An evaluation method of channel state
information fingerprinting for single
gateway indoor localization . . . . . . ??
Imane El Mensoum and
Omar Abdul Wahab and
Nadjia Kara and
Claes Edstrom MuSC: a multi-stage service chains
embedding approach . . . . . . . . . . . ??
Juan Camilo Correa Chica and
Jenny Cuatindioy Imbachi and
Juan Felipe Botero Vega Security in SDN: a comprehensive survey ??
Tiago C. S. Xavier and
Igor L. Santos and
Flavia C. Delicato and
Paulo F. Pires and
Marcelo P. Alves and
Tiago S. Calmon and
Ana C. Oliveira and
Claudio L. Amorim Collaborative resource allocation for
Cloud of Things systems . . . . . . . . ??
Anonymous 15 June 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Misbah Shafi and
Rakesh Kumar Jha and
Manish Sabraj A survey on security issues of 5G NR:
Perspective of artificial dust and
artificial rain . . . . . . . . . . . . ??
Waleed Ejaz and
Shree K. Sharma and
Salman Saadat and
Muhammad Naeem and
Alagan Anpalagan and
N. A. Chughtai A comprehensive survey on resource
allocation for CRAN in 5G and beyond
networks . . . . . . . . . . . . . . . . ??
Satish Narayana Srirama and
Mainak Adhikari and
Souvik Paul Application deployment using containers
with auto-scaling for microservices in
cloud environment . . . . . . . . . . . ??
PanJun Sun Security and privacy protection in cloud
computing: Discussions and challenges ??
Kai Lin and
Honglong Chen and
Xin Ai and
Vladimir Shakhov and
Lina Ni and
Jiguo Yu and
Yanjun Li EUMD: Efficient slot utilization based
missing tag detection with unknown tags ??
Khaled Riad and
Teng Huang and
Lishan Ke A dynamic and hierarchical access
control for IoT in multi-authority cloud
storage . . . . . . . . . . . . . . . . ??
Anonymous 1 July 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Yajie Wang and
Yu-an Tan and
Wenjiao Zhang and
Yuhang Zhao and
Xiaohui Kuang An adversarial attack on DNN-based
black-box object detectors . . . . . . . ??
Di Xiao and
Min Li and
Mengdi Wang and
Jia Liang and
Ran Liu Low-cost and high-efficiency
privacy-protection scheme for
distributed compressive video sensing in
wireless multimedia sensor networks . . ??
Inam ul Haq and
Jian Wang and
Youwen Zhu Secure two-factor lightweight
authentication protocol using
self-certified public key cryptography
for multi-server 5G networks . . . . . . ??
Noé Torres-Cruz and
Mario E. Rivero-Angeles and
Gerardo Rubino and
Ricardo Menchaca-Mendez and
Rolando Menchaca-Mendez and
David Ramirez A comprehensive analytical framework for
VoD services in hybrid CDN-P2P systems ??
Shi Dong and
Raj Jain Retraction notice to ``Flow online
identification method for the encrypted
Skype'' [YJNCA (2019) 75--85] . . . . . ??
Syeda Manjia Tahsien and
Hadis Karimipour and
Petros Spachos Machine learning based solutions for
security of Internet of Things (IoT): a
survey . . . . . . . . . . . . . . . . . ??
Wenjuan Li and
Weizhi Meng and
Man Ho Au Enhancing collaborative intrusion
detection via disagreement-based
semi-supervised learning in IoT
environments . . . . . . . . . . . . . . ??
Yilei Wang and
Guoyu Yang and
Tao Li and
Fengyin Li and
Youliang Tian and
Xiaomei Yu Belief and fairness: a secure two-party
protocol toward the view of entropy for
IoT devices . . . . . . . . . . . . . . ??
Xiongwen Pang and
Yanqiang Zhou and
Pengcheng Li and
Weiwei Lin and
Wentai Wu and
James Z. Wang A novel syntax-aware automatic graphics
code generation with attention-based
deep neural network . . . . . . . . . . ??
Anonymous 15 July 2020 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Fernando Zanferrari Morais and
Cristiano André da Costa and
Antonio Marcos Alberti and
Cristiano Bonato Both and
Rodrigo da Rosa Righi When SDN meets C-RAN: a survey exploring
multi-point coordination, interference,
and performance . . . . . . . . . . . . ??
Dipanwita Thakur and
Manas Khatua Multi-domain virtual network embedding
with dynamic flow migration in
software-defined networks . . . . . . . ??
Cheng Guo and
Xueru Jiang and
Kim-Kwang Raymond Choo and
Yingmo Jie R-Dedup: Secure client-side
deduplication for encrypted data without
involving a third-party entity . . . . . ??
Yali Zeng and
Li Xu and
Xu Yang and
Xun Yi and
Ibrahim Khalil Lightweight privacy preservation for
secondary users in cognitive radio
networks . . . . . . . . . . . . . . . . ??
Nazanin Zahed Benisi and
Mehdi Aminian and
Bahman Javadi Blockchain-based decentralized storage
networks: a survey . . . . . . . . . . . ??
Teng Huang and
Qixiang Zhang and
Jiabao Liu and
Ruitao Hou and
Xianmin Wang and
Ya Li Adversarial attacks on
deep-learning-based SAR image target
recognition . . . . . . . . . . . . . . ??
Yize Yang and
Hongyong Yang and
Fei Liu Group motion of autonomous vehicles with
anti-disturbance protection . . . . . . ??
Xiao Zhang and
Lijia Xie and
Wang Yao Spatio-temporal heterogeneous bandwidth
allocation mechanism against DDoS attack ??
Xueshuo Xie and
Zongming Jin and
Jiming Wang and
Lei Yang and
Ye Lu and
Tao Li Confidence guided anomaly detection
model for anti-concept drift in dynamic
logs . . . . . . . . . . . . . . . . . . ??
Anonymous 1 August 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Gonzalo De La Torre Parra and
Paul Rad and
Kim-Kwang Raymond Choo and
Nicole Beebe Detecting Internet of Things attacks
using distributed deep learning . . . . ??
Rosario G. Garroppo and
Maria Grazia Scutell\`a and
Fabio D'Andreagiovanni Robust green Wireless Local Area
Networks: a matheuristic approach . . . ??
Ali Raza and
Sanghwan Lee A priority based greedy path assignment
mechanism in OpenFlow based datacenter
networks . . . . . . . . . . . . . . . . ??
Wafa'a Kassab and
Khalid A. Darabkh A--Z survey of Internet of Things:
Architectures, protocols, applications,
recent advances, future directions and
recommendations . . . . . . . . . . . . ??
Jun Cai and
Zhongwei Huang and
Jianzhen Luo and
Yan Liu and
Huimin Zhao and
Liping Liao Composing and deploying parallelized
service function chains . . . . . . . . ??
Tariq Benmansour and
Toufik Ahmed and
Samira Moussaoui and
Zouina Doukha Performance analyses of the IEEE
802.15.6 Wireless Body Area Network with
heterogeneous traffic . . . . . . . . . ??
Arunima Ghosh and
Shashank Gupta and
Amit Dua and
Neeraj Kumar Security of Cryptocurrencies in
blockchain technology: State-of-art,
challenges and future prospects . . . . ??
Anonymous 15 August 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Mauro Conti and
Pallavi Kaliyar and
Chhagan Lal A robust multicast communication
protocol for Low power and Lossy
networks . . . . . . . . . . . . . . . . ??
Ming Chen and
Shunkang Zhang and
Hai Deng and
Bing Chen and
Changyou Xing and
Bo Xu Automatic deployment and control of
network services in NFV environments . . ??
Yu Tian and
Baoqi Huang and
Bing Jia and
Long Zhao Optimizing AP and Beacon Placement in
WiFi and BLE hybrid localization . . . . ??
Abd Ullah Khan and
Ghulam Abbas and
Ziaul Haq Abbas and
Muhammad Waqas and
Ahmad Kamal Hassan Spectrum utilization efficiency in the
cognitive radio enabled 5G-based IoT . . ??
Shreya Ghosh and
Soumya K. Ghosh and
Rajkumar Buyya MARIO: a spatio-temporal data mining
framework on Google Cloud to explore
mobility dynamics from taxi trajectories ??
Christos Anagnostopoulos Edge-centric inferential modeling and
analytics . . . . . . . . . . . . . . . ??
Lixia Xie and
Ying Ding and
Hongyu Yang and
Ze Hu Mitigating LFA through segment rerouting
in IoT environment with traceroute flow
abnormality detection . . . . . . . . . ??
Zhendong Wu and
Jingjing Wang and
Liqin Hu and
Zhang Zhang and
Han Wu A network intrusion detection method
based on semantic re-encoding and deep
learning . . . . . . . . . . . . . . . . ??
Anonymous 1 September 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Eder Leão Fernandes and
Elisa Rojas and
Joaquin Alvarez-Horcajo and
Zolt\`an Lajos Kis and
Davide Sanvito and
Nicola Bonelli and
Carmelo Cascone and
Christian Esteve Rothenberg The road to BOFUSS: the basic OpenFlow
userspace software switch . . . . . . . ??
Faizan Murtaza and
Adnan Akhunzada and
Saif ul Islam and
Jalil Boudjadar and
Rajkumar Buyya QoS-aware service provisioning in fog
computing . . . . . . . . . . . . . . . ??
Shie-Yuan Wang and
Jun-Yi Li and
Yi-Bing Lin Aggregating and disaggregating packets
with various sizes of payload in P4
switches at 100 Gbps line rate . . . . . ??
J. E. Giti and
A. Sakzad and
B. Srinivasan and
J. Kamruzzaman and
R. Gaire Secrecy capacity against adaptive
eavesdroppers in a random wireless
network using friendly jammers and
protected zone . . . . . . . . . . . . . ??
Steven M. Hernandez and
Eyuphan Bulut Using perceived direction information
for anchorless relative indoor
localization . . . . . . . . . . . . . . ??
Gustavo Zurita and
Amit K. Shukla and
José A. Pino and
José M. Merigó and
Valeria Lobos-Ossandón and
Pranab K. Muhuri A bibliometric overview of the
\booktitleJournal of Network and
Computer Applications between 1997 and
2019 . . . . . . . . . . . . . . . . . . ??
Chunlin Li and
Mingyang Song and
Shaofeng Du and
Xiaohai Wang and
Min Zhang and
Youlong Luo Adaptive priority-based cache
replacement and prediction-based cache
prefetching in edge computing
environment . . . . . . . . . . . . . . ??
Wenjuan Li and
Jiao Tan and
Weizhi Meng and
Yu Wang A swipe-based unlocking mechanism with
supervised learning on smartphones:
Design and evaluation . . . . . . . . . ??
Shunzhi Jiang and
Dengpan Ye and
Jiaqing Huang and
Yueyun Shang and
Zhuoyuan Zheng SmartSteganogaphy: Light-weight
generative audio steganography model for
smart embedding application . . . . . . ??
Anonymous 15 September 2020 . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Dinh C. Nguyen and
Pubudu N. Pathirana and
Ming Ding and
Aruna Seneviratne Blockchain for 5G and beyond networks: a
state of the art survey . . . . . . . . ??
Nur Nasuha Daud and
Siti Hafizah Ab Hamid and
Muntadher Saadoon and
Firdaus Sahran and
Nor Badrul Anuar Applications of link prediction in
social networks: a review . . . . . . . ??
Bander Alzahrani and
Omar Sami Oubbati and
Ahmed Barnawi and
Mohammed Atiquzzaman and
Daniyal Alghazzawi UAV assistance paradigm:
State-of-the-art in applications and
challenges . . . . . . . . . . . . . . . ??
Mokhtar Sellami and
Haithem Mezni and
Mohand Said Hacid On the use of big data frameworks for
big service composition . . . . . . . . ??
Miguel Rodríguez-Pérez and
Sergio Herrería-Alonso and
Raúl F. Rodríguez-Rubio and
José Carlos López-Ardao Leveraging energy saving capabilities of
current EEE interfaces via
pre-coalescing . . . . . . . . . . . . . ??
Marcio Roberto Miranda Assis and
Luiz Fernando Bittencourt MultiCloud Tournament: a cloud
federation approach to prevent
Free-Riders by encouraging resource
sharing . . . . . . . . . . . . . . . . ??
Yang Liu and
Debiao He and
Mohammad S. Obaidat and
Neeraj Kumar and
Muhammad Khurram Khan and
Kim-Kwang Raymond Choo Blockchain-based identity management
systems: a review . . . . . . . . . . . ??
Xiaoguo Li and
Tao Xiang and
Peng Wang Achieving forward unforgeability in
keyword-field-free conjunctive search ??
Zhongjiang Yao and
Jingguo Ge and
Yulei Wu and
Xiaosheng Lin and
Runkang He and
Yuxiang Ma Encrypted traffic classification based
on Gaussian mixture models and Hidden
Markov Models . . . . . . . . . . . . . ??
Kehua Guo and
Haifu Guo and
Sheng Ren and
Jian Zhang and
Xi Li Towards efficient motion-blurred public
security video super-resolution based on
back-projection networks . . . . . . . . ??
Anonymous 1 October 2020 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Huan Fei and
Fu Xiao and
Haiping Huang and
Lijuan Sun Indoor static localization based on
Fresnel zones model using COTS Wi-Fi . . ??
Sapna and
K. K. Pattanaik and
Aditya Trivedi A dynamic distributed boundary node
detection algorithm for management zone
delineation in Precision Agriculture . . ??
Jiancheng Chi and
Yu Li and
Jing Huang and
Jing Liu and
Yingwei Jin and
Chen Chen and
Tie Qiu A secure and efficient data sharing
scheme based on blockchain in industrial
Internet of Things . . . . . . . . . . . ??
Ahmad Shabani and
Bijan Alizadeh PODEM: a low-cost property-based design
modification for detecting Hardware
Trojans in resource-constraint IoT
devices . . . . . . . . . . . . . . . . ??
Zawar Hussain and
Quan Z. Sheng and
Wei Emma Zhang A review and categorization of
techniques on device-free human activity
recognition . . . . . . . . . . . . . . ??
Ke Ma and
Geng Yang and
Yang Xiang RCBAC: a risk-aware content-based access
control model for large-scale text data ??
Yaser Mansouri and
Victor Prokhorenko and
M. Ali Babar An automated implementation of hybrid
cloud for performance evaluation of
distributed databases . . . . . . . . . ??
Mohammad Alkhalaileh and
Rodrigo N. Calheiros and
Quang Vinh Nguyen and
Bahman Javadi Data-intensive application scheduling on
Mobile Edge Cloud Computing . . . . . . ??
Li Jin and
Dong Changyu and
Palmieric Francesco Special issue on advanced techniques for
security and privacy of
Internet-of-Things with machine learning ??
Xu Ma and
Cunmei Ji and
Xiaoyu Zhang and
Jianfeng Wang and
Jin Li and
Kuan-Ching Li and
Xiaofeng Chen Secure multiparty learning from the
aggregation of locally trained models ??
Yahye Abukar Ahmed and
Baris Koçer and
Shamsul Huda and
Bander Ali Saleh Al-rimy and
Mohammad Mehedi Hassan A system call refinement-based enhanced
Minimum Redundancy Maximum Relevance
method for ransomware early detection ??
Anonymous 15 October 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Si Chen and
Anmin Fu and
Jian Shen and
Shui Yu and
Huaqun Wang and
Huaijiang Sun RNN-DP: a new differential privacy
scheme base on Recurrent Neural Network
for Dynamic trajectory privacy
protection . . . . . . . . . . . . . . . ??
Shashwat Kumar and
Sai Vineeth Doddala and
A. Antony Franklin and
Jiong Jin RAN-aware adaptive video caching in
multi-access edge computing networks . . ??
Salva Daneshgadeh Çakmakçi and
Thomas Kemmerich and
Tarem Ahmed and
Nazife Baykal Online DDoS attack detection using
Mahalanobis distance and Kernel-based
learning algorithm . . . . . . . . . . . ??
Mobasshir Mahbub Progressive researches on IoT security:
an exhaustive analysis from the
perspective of protocols,
vulnerabilities, and preemptive
architectonics . . . . . . . . . . . . . ??
Akanksha Srivastava and
Mani Shekhar Gupta and
Gurjit Kaur Energy efficient transmission trends
towards future green cognitive radio
networks (5G): Progress, taxonomy and
open challenges . . . . . . . . . . . . ??
Iqbal H. Sarker and
A. S. M. Kayes ABC-RuleMiner: User behavioral
rule-based machine learning method for
context-aware intelligent services . . . ??
Wai-Xi Liu and
Jun Cai and
Yu Wang and
Qing Chun Chen and
Jia-Qi Zeng Fine-grained flow classification using
deep learning for software defined data
center networks . . . . . . . . . . . . ??
Atis Elsts and
Niall Twomey and
Ryan McConville and
Ian Craddock Energy-efficient activity recognition
framework using wearable accelerometers ??
Abhishek Sharma and
Pankhuri Vanjani and
Nikhil Paliwal and
Chathuranga M. Wijerathna Basnayaka and
Dushantha Nalin K. Jayakody and
Hwang-Cheng Wang and
P. Muthuchidambaranathan Communication and networking
technologies for UAVs: a survey . . . . ??
Peppino Fazio and
Miralem Mehic and
Miroslav Voznak A deep stochastical and predictive
analysis of users mobility based on
Auto-Regressive processes and pairing
functions . . . . . . . . . . . . . . . ??
Anonymous 1 November 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Rafael Fayos-Jordan and
Santiago Felici-Castell and
Jaume Segura-Garcia and
Jesus Lopez-Ballester and
Maximo Cobos Performance comparison of container
orchestration platforms with low cost
devices in the fog, assisting Internet
of Things applications . . . . . . . . . ??
Muluneh Mekonnen Tulu and
Mbazingwa E. Mkiramweni and
Ronghui Hou and
Sultan Feisso and
Talha Younas Influential nodes selection to enhance
data dissemination in mobile social
networks: a survey . . . . . . . . . . . ??
Jose Moura and
David Hutchison Fog computing systems: State of the art,
research issues and future trends, with
a focus on resilience . . . . . . . . . ??
Daniel Merling and
Steffen Lindner and
Michael Menth P4-based implementation of BIER and
BIER-FRR for scalable and resilient
multicast . . . . . . . . . . . . . . . ??
Guolin Sun and
Daniel Ayepah-Mensah and
Rong Xu and
Gordon Owusu Boateng and
Guisong Liu End-to-end CNN-based dueling deep
Q-Network for autonomous cell activation
in Cloud-RANs . . . . . . . . . . . . . ??
Hai Lin and
Sherali Zeadally and
Zhihong Chen and
Houda Labiod and
Lusheng Wang A survey on computation offloading
modeling for edge computing . . . . . . ??
Song Yang and
Fan Li and
Stojan Trajanovski and
Xiaoming Fu Traffic routing in stochastic network
function virtualization networks . . . . ??
Wen-Kang Jia and
Xufang Wang Flow aggregation for large-scale SDNs
with scattered address space allocation ??
R. Yugha and
S. Chithra A survey on technologies and security
protocols: Reference for future
generation IoT . . . . . . . . . . . . . ??
Sunanda Gamage and
Jagath Samarabandu Deep learning methods in network
intrusion detection: a survey and an
objective comparison . . . . . . . . . . ??
Anonymous 15 November 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ahmed S. Almasoud and
Farookh Khadeer Hussain and
Omar K. Hussain Smart contracts for blockchain-based
reputation systems: a systematic
literature review . . . . . . . . . . . ??
Lei Cui and
Youyang Qu and
Longxiang Gao and
Gang Xie and
Shui Yu Detecting false data attacks using
machine learning techniques in smart
grid: a survey . . . . . . . . . . . . . ??
Kübra Uludag and
Sinan Emre Tasçi and
Omer Korçak Sequential bargaining based incentive
mechanism for collaborative Internet
access . . . . . . . . . . . . . . . . . ??
Ahmed Alagha and
Shakti Singh and
Hadi Otrok and
Rabeb Mizouni RFLS --- Resilient Fault-proof
Localization System in IoT and
Crowd-based Sensing Applications . . . . ??
Somayeh Rahmani and
Vahid Khajehvand and
Mohsen Torabian Kullback--Leibler distance criterion
consolidation in cloud . . . . . . . . . ??
F. Orts and
G. Ortega and
E. F. Combarro and
E. M. Garzón A review on reversible quantum adders ??
Baris Yamansavascilar and
Ahmet Cihat Baktir and
Atay Ozgovde and
Cem Ersoy Fault tolerance in SDN data plane
considering network and application
based metrics . . . . . . . . . . . . . ??
Dilli P. Sharma and
Simon Yusuf Enoch and
Jin-Hee Cho and
Terrence J. Moore and
Frederica F. Nelson and
Hyuk Lim and
Dong Seong Kim Dynamic Security Metrics for
Software-Defined Network-based Moving
Target Defense . . . . . . . . . . . . . ??
Balázs Sonkoly and
Dávid Haja and
Balázs Németh and
Márk Szalay and
János Czentye and
Róbert Szabó and
Rehmat Ullah and
Byung-Seo Kim and
László Toka Scalable edge cloud platforms for IoT
services . . . . . . . . . . . . . . . . ??
Guangli Zhu and
Zhuangzhuang Pan and
Qiaoyun Wang and
Shunxiang Zhang and
Kuan-Ching Li Building multi-subtopic Bi-level network
for micro-blog hot topic based on
feature Co-Occurrence and semantic
community division . . . . . . . . . . . ??
Anonymous 1 December 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Yan Pan and
Shining Li and
Yu Zhang and
Ting Zhu CDA: Coordinating data dissemination and
aggregation in heterogeneous IoT
networks using CTC . . . . . . . . . . . ??
Mostafa Abdollahi and
Farshad Eshghi and
Manoochehr Kelarestaghi and
Mozafar Bag-Mohammadi Opportunistic routing metrics: a timely
one-stop tutorial survey . . . . . . . . ??
Md Akbar Hossain and
Sayan Kumar Ray and
Jaswinder Lota SmartDR: a device-to-device
communication for post-disaster recovery ??
Nesrine Kaaniche and
Maryline Laurent and
Sana Belguith Privacy enhancing technologies for
solving the privacy-personalization
paradox: Taxonomy and survey . . . . . . ??
Narges Yousefnezhad and
Avleen Malhi and
Kary Främling Security in product lifecycle of IoT
devices: a survey . . . . . . . . . . . ??
Shu Yang and
Lu Bai and
Laizhong Cui and
Zhongxing Ming and
Yulei Wu and
Shui Yu and
Hongfei Shen and
Yi Pan An efficient pipeline processing scheme
for programming Protocol-independent
Packet Processors . . . . . . . . . . . ??
Juan Gutiérrez-Aguado and
Raúl Peña-Ortiz and
Miguel García-Pineda and
Jose M. Claver Cloud-based elastic architecture for
distributed video encoding: Evaluating
H.265, VP9, and AV1 . . . . . . . . . . ??
Ying-Dar Lin and
Yu-Kuen Lai and
Quan Tien Bui and
Yuan-Cheng Lai ReFSM: Reverse engineering from protocol
packet traces to test generation by
extended finite state machines . . . . . ??
N. Mansouri and
Behnam Mohammad Hasani Zade and
Mohammad Masoud Javidi A multi-objective optimized replication
using fuzzy based self-defense algorithm
for cloud computing . . . . . . . . . . ??
Khizra Asaf and
Rana Asif Rehman and
Byung-Seo Kim Blockchain technology in Named Data
Networks: a detailed survey . . . . . . ??
Yongkai Fan and
Jianrong Bai and
Xia Lei and
Yuqing Zhang and
Bin Zhang and
Kuan-Ching Li and
Gang Tan Privacy preserving based logistic
regression on big data . . . . . . . . . ??
Anonymous 15 December 2020 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Shaoyong Guo and
Fengning Wang and
Neng Zhang and
Feng Qi and
Xuesong Qiu Master-slave chain based trusted
cross-domain authentication mechanism in
IoT . . . . . . . . . . . . . . . . . . ??
Raihan ur Rasool and
Hua Wang and
Usman Ashraf and
Khandakar Ahmed and
Zahid Anwar and
Wajid Rafique A survey of link flooding attacks in
software defined network ecosystems . . ??
Fei Chen and
Zhe Xiao and
Laizhong Cui and
Qiuzhen Lin and
Jianqiang Li and
Shui Yu Blockchain for Internet of Things
applications: a review and open issues ??
Md Jalil Piran and
Quoc-Viet Pham and
S. M. Riazul Islam and
Sukhee Cho and
Byungjun Bae and
Doug Young Suh and
Zhu Han Multimedia communication over cognitive
radio networks from QoS/QoE perspective:
a comprehensive survey . . . . . . . . . ??
Ying Li and
Jianbo Li and
Manzoor Ahmed A three-stage incentive formation for
optimally pricing social data offloading ??
Yun-Wei Lin and
Tai-Hsiang Yen and
Cheng-Han Chou and
Yi-Bing Lin and
Wen-Shu Lai Investigating Asian Parti-colored bats
using the BatTalk Internet of Things
approach . . . . . . . . . . . . . . . . ??
Suyel Namasudra and
Suraj Sharma and
Ganesh Chandra Deka and
Pascal Lorenz DNA computing and table based data
accessing in the cloud environment . . . ??
Emna Baccour and
Aiman Erbad and
Amr Mohamed and
Mohsen Guizani and
Mounir Hamdi Collaborative hierarchical caching and
transcoding in edge network with CE-D2D
communication . . . . . . . . . . . . . ??
Khalid A. Darabkh and
Oswa M. Amro and
Raed T. Al-Zubi and
Haythem Bany Salameh and
Ramzi Saifan JavaSim-IBFD-CRNs: Novel Java simulator
for in-band full-duplex cognitive radio
networks over Internet of Things
environment . . . . . . . . . . . . . . ??
Zheng Yan and
Willy Susilo and
Elisa Bertino and
Jun Zhang and
Laurence T. Yang AI-driven data security and privacy . . ??
Anonymous 1 January 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous Thank You Reviewers . . . . . . . . . . ??
Nguyen Khoi Tran and
M. Ali Babar and
Jonathan Boan Integrating blockchain and Internet of
Things systems: a systematic review on
objectives and designs . . . . . . . . . ??
Dana Yang and
Seohee Yoo and
Inshil Doh and
Kijoon Chae Selective blockchain system for secure
and efficient D2D communication . . . . ??
Khalid A. Darabkh and
Oswa M. Amro and
Raed T. Al-Zubi and
Haythem Bany Salameh Yet efficient routing protocols for
half- and full-duplex cognitive radio
Ad-Hoc Networks over IoT environment . . ??
Zhishu Shen and
Tiehua Zhang and
Atsushi Tagami and
Jiong Jin When RSSI encounters deep learning: an
area localization scheme for pervasive
sensing systems . . . . . . . . . . . . ??
Bentian Li and
Dechang Pi and
Yunxia Lin and
Lin Cui DNC: a Deep Neural Network-based
Clustering-oriented Network Embedding
Algorithm . . . . . . . . . . . . . . . ??
Arvin Ghotbou and
Mohammad Khansari VE-CoAP: a constrained application layer
protocol for IoT video transmission . . ??
Sakshi Popli and
Rakesh Kumar Jha and
Sanjeev Jain Adaptive Small Cell position algorithm
(ASPA) for green farming using NB-IoT ??
PanJun Sun A Trust Game Model of Service
Cooperation in Cloud Computing . . . . . ??
Wenbo Zhang and
Xin Wang and
Guangjie Han and
Yan Peng and
Mohsen Guizani and
Jingyi Sun A load-adaptive fair access protocol for
MAC in underwater acoustic sensor
networks . . . . . . . . . . . . . . . . ??
Xingrui Fei and
Yi Xie and
Shensheng Tang and
Jiankun Hu Identifying click-requests for the
network-side through traffic behavior ??
A. S. Albahri and
Jwan K. Alwan and
Zahraa K. Taha and
Sura F. Ismail and
Rula A. Hamid and
A. A. Zaidan and
O. S. Albahri and
B. B. Zaidan and
A. H. Alamoodi and
M. A. Alsalem IoT-based telemedicine for disease
prevention and health promotion:
State-of-the-Art . . . . . . . . . . . . ??
Ying Zhang and
Cui-Hua Zhang and
Xuyang Shao User preference-aware navigation for
mobile robot in domestic via defined
virtual area . . . . . . . . . . . . . . ??
Ayaz Ali Khan and
Muhammad Zakarya and
Izaz Ur Rahman and
Rahim Khan and
Rajkumar Buyya HeporCloud: an energy and performance
efficient resource orchestrator for
hybrid heterogeneous cloud computing
environments . . . . . . . . . . . . . . ??
Gianni D'Angelo and
Francesco Palmieri Network traffic classification using
deep convolutional recurrent autoencoder
neural networks for spatial-temporal
features extraction . . . . . . . . . . ??
Norberto Garcia and
Tomas Alcaniz and
Aurora González-Vidal and
Jorge Bernal Bernabe and
Diego Rivera and
Antonio Skarmeta Distributed real-time SlowDoS attacks
detection over encrypted traffic using
Artificial Intelligence . . . . . . . . ??
Yang-Wai Chow and
Willy Susilo and
Jianfeng Wang and
Richard Buckland and
Joonsang Baek and
Jongkil Kim and
Nan Li Utilizing QR codes to verify the visual
fidelity of image datasets for machine
learning . . . . . . . . . . . . . . . . ??
Anonymous 15 January 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ruijie Zhu and
Aretor Samuel and
Peisen Wang and
Shihua Li and
Bounsou Kham Oun and
Lulu Li and
Pei Lv and
Mingliang Xu and
Shui Yu Protected Resource Allocation in Space
Division Multiplexing-Elastic Optical
Networks with Fluctuating Traffic . . . ??
Ali Akbar Sadri and
Amir Masoud Rahmani and
Morteza Saberikamarposhti and
Mehdi Hosseinzadeh Fog data management: a vision,
challenges, and future directions . . . ??
Mosab Hamdan and
Entisar Hassan and
Ahmed Abdelaziz and
Abdallah Elhigazi and
Bushra Mohammed and
Suleman Khan and
Athanasios V. Vasilakos and
M. N. Marsono A comprehensive survey of load balancing
techniques in software-defined network ??
João Paulo A. Maranhão and
João Paulo C. L. da Costa and
Elnaz Javidi and
César A. Borges de Andrade and
Rafael T. de Sousa Tensor based framework for Distributed
Denial of Service attack detection . . . ??
Juan A. Fraire and
Olivier De Jonck\`ere and
Scott C. Burleigh Routing in the Space Internet: a contact
graph routing tutorial . . . . . . . . . ??
Pietro Colombo and
Elena Ferrari and
Engin Deniz Tümer Regulating data sharing across MQTT
environments . . . . . . . . . . . . . . ??
Saira Beg and
Adeel Anjum and
Mansoor Ahmad and
Shahid Hussain and
Ghufran Ahmad and
Suleman Khan and
Kim-Kwang Raymond Choo A privacy-preserving protocol for
continuous and dynamic data collection
in IoT enabled mobile app recommendation
system (MARS) . . . . . . . . . . . . . ??
Azade Fotouhi and
Ming Ding and
Mahbub Hassan DroneCells: Improving spectral
efficiency using drone-mounted flying
base stations . . . . . . . . . . . . . ??
Xiaoshuai Zhang and
Chao Liu and
Kok Keong Chai and
Stefan Poslad A privacy-preserving consensus mechanism
for an electric vehicle charging scheme ??
Zhongyu Ma and
Jie Cao and
Qun Guo and
Xiangwei Li and
Hongfeng Ma QoS-oriented joint optimization of
concurrent scheduling and power control
in millimeter wave mesh backhaul network ??
Yifei Lu and
Xu Ma and
Zhengzhi Xu FAMD: a Flow-Aware Marking and
Delay-based TCP algorithm for datacenter
networks . . . . . . . . . . . . . . . . ??
Carlo K. da S. Rodrigues and
Vladimir Rocha Enhancing BitTorrent for efficient
interactive video-on-demand streaming
over MANETs . . . . . . . . . . . . . . ??
Azana Hafizah Mohd Aman and
Wan Haslina Hassan and
Shilan Sameen and
Zainab Senan Attarbashi and
Mojtaba Alizadeh and
Liza Abdul Latiff IoMT amid COVID-19 pandemic:
Application, architecture, technology,
and security . . . . . . . . . . . . . . ??
Savio Sciancalepore and
Saeif Alhazbi and
Roberto Di Pietro Receivers location privacy in avionic
crowdsourced networks: Issues and
countermeasures . . . . . . . . . . . . ??
Pan Jun Sun Corrigendum to ``A trust game model of
service cooperation in cloud computing''
[J. Netw. Comput. Appl. \bf 173 (20)
2020 102864] . . . . . . . . . . . . . . ??
Anonymous 1 February 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Muhammad Khalid and
Kezhi Wang and
Nauman Aslam and
Yue Cao and
Naveed Ahmad and
Muhammad Khurram Khan From smart parking towards autonomous
valet parking: a survey, challenges and
future works . . . . . . . . . . . . . . ??
José Santos and
Tim Wauters and
Bruno Volckaert and
Filip De Turck Towards end-to-end resource provisioning
in Fog Computing over Low Power Wide
Area Networks . . . . . . . . . . . . . ??
Adil Israr and
Qiang Yang and
Wei Li and
Albert Y. Zomaya Renewable energy powered sustainable 5G
network infrastructure: Opportunities,
challenges and perspectives . . . . . . ??
Yang Yang and
Songtao Guo and
Guiyan Liu and
Lin Yi Fine granularity resource allocation of
virtual data center with consideration
of virtual switches . . . . . . . . . . ??
Piotr Borylo and
Gianluca Davoli and
Michal Rzepka and
Artur Lason and
Walter Cerroni Unified and standalone monitoring module
for NFV/SDN infrastructures . . . . . . ??
Fernando Boronat and
Mario Montagud and
Pau Salvador and
Javier Pastor Wersync: a web platform for synchronized
social viewing enabling interaction and
collaboration . . . . . . . . . . . . . ??
Will Serrano The Blockchain Random Neural Network for
cybersecure IoT and 5G infrastructure in
Smart Cities . . . . . . . . . . . . . . ??
Mian Ahmad Jan and
Jinjin Cai and
Xiang-Chuan Gao and
Fazlullah Khan and
Spyridon Mastorakis and
Muhammad Usman and
Mamoun Alazab and
Paul Watters Security and blockchain convergence with
Internet of Multimedia Things: Current
trends, research challenges and future
directions . . . . . . . . . . . . . . . ??
Wilson S. Melo and
Luiz V. G. Tarelho and
Bruno A. Rodrigues and
Alysson N. Bessani and
Luiz F. R. C. Carmo Field surveillance of fuel dispensers
using IoT-based metering and blockchains ??
Anonymous 15 February 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Tomas Hernandez-Quintanilla and
Eduardo Magaña and
Daniel Morató and
Mikel Izal On the reduction of authoritative DNS
cache timeouts: Detection and
implications for user privacy . . . . . ??
Neda Maleki and
Amir Masoud Rahmani and
Mauro Conti SPO: a Secure and Performance-aware
Optimization for MapReduce Scheduling ??
Cheng Xu and
Xinxin Wang and
Shihong Duan and
Jiawang Wan Spatial-temporal constrained particle
filter for cooperative target tracking ??
Liang Yang and
Bryan Ng and
Winston K. G. Seah and
Lindsay Groves and
Deepak Singh A survey on network forwarding in
Software-Defined Networking . . . . . . ??
Kostas Kolomvatsos Proactive tasks management for Pervasive
Computing Applications . . . . . . . . . ??
Jie Xu and
Jingyu Wang and
Qi Qi and
Jianxin Liao and
Haifeng Sun and
Zhu Han and
Tonghong Li Network-aware task selection to reduce
multi-application makespan in cloud . . ??
Yuexin Xiang and
Wei Ren and
Tiantian Li and
Xianghan Zheng and
Tianqing Zhu and
Kim-Kwang Raymond Choo A multi-type and decentralized data
transaction scheme based on smart
contracts and digital watermarks . . . . ??
Leandro Loffi and
Carla Merkle Westphall and
Lukas Derner Grüdtner and
Carlos Becker Westphall Mutual authentication with multi-factor
in IoT--Fog--Cloud environment . . . . . ??
Ahsan Manzoor and
An Braeken and
Salil S. Kanhere and
Mika Ylianttila and
Madhsanka Liyanage Proxy re-encryption enabled secure and
anonymous IoT data sharing platform
based on blockchain . . . . . . . . . . ??
Lijun Sun and
Qian Yang and
Xiao Chen and
Zhenxiang Chen RC-chain: Reputation-based crowdsourcing
blockchain for vehicular networks . . . ??
Anonymous 1 March 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Víctor Berrocal-Plaza and
Miguel A. Vega-Rodríguez Analysis and comparison of mobility
management strategies in public land
mobile networks from a multiobjective
perspective . . . . . . . . . . . . . . ??
Pranav Nerurkar and
Dhiren Patel and
Yann Busnel and
Romaric Ludinard and
Saru Kumari and
Muhammad Khurram Khan Dissecting bitcoin blockchain: Empirical
analysis of bitcoin network (2009--2020) ??
Tharaka Hewa and
Mika Ylianttila and
Madhusanka Liyanage Survey on blockchain based smart
contracts: Applications, opportunities
and challenges . . . . . . . . . . . . . ??
Wai-xi Liu and
Jun Cai and
Qing Chun Chen and
Yu Wang DRL-R: Deep reinforcement learning
approach for intelligent routing in
software-defined data-center networks ??
Ahmed Alagha and
Rabeb Mizouni and
Shakti Singh and
Hadi Otrok and
Anis Ouali SDRS: a stable data-based recruitment
system in IoT crowdsensing for
localization tasks . . . . . . . . . . . ??
Marcos V. O. Assis and
Luiz F. Carvalho and
Jaime Lloret and
Mario L. Proença A GRU deep learning system against
attacks in software defined networks . . ??
Bo Yi and
Xingwei Wang and
Min Huang Content delivery enhancement in
Vehicular Social Network with better
routing and caching mechanism . . . . . ??
Yang Xiao and
Qingqi Pei and
Tingting Xiao and
Lina Yao and
Huan Liu MutualRec: Joint friend and item
recommendations with mutualistic
attentional graph neural networks . . . ??
Chunlin Li and
Lei Zhu and
Weigang Li and
Youlong Luo Joint edge caching and dynamic service
migration in SDN based mobile edge
computing . . . . . . . . . . . . . . . ??
Bahar Farahani and
Farshad Firouzi and
Markus Luecking The convergence of IoT and distributed
ledger technologies (DLT):
Opportunities, challenges, and solutions ??
Anonymous 15 March 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Yihong Chen and
Quanyuan Feng and
Xiaolin Jia and
Huayue Chen Modeling and analyzing RFID Generation-2
under unreliable channels . . . . . . . ??
Liqing Qiu and
Xiangbo Tian and
Jianyi Zhang and
Chunmei Gu and
Shiqi Sai LIDDE: a differential evolution
algorithm based on
local-influence-descending search
strategy for influence maximization in
social networks . . . . . . . . . . . . ??
Wendi Feng and
Chuanchang Liu and
Bo Cheng and
Junliang Chen Secure and cost-effective controller
deployment in multi-domain SDN with
Baguette . . . . . . . . . . . . . . . . ??
Ali Shakarami and
Ali Shahidinejad and
Mostafa Ghobaei-Arani An autonomous computation offloading
strategy in Mobile Edge Computing: a
deep learning-based hybrid approach . . ??
Mehdi Sookhak and
Mohammad Reza Jabbarpour and
Nader Sohrabi Safa and
F. Richard Yu Blockchain and smart contract for access
control in healthcare: a survey, issues
and challenges, and open issues . . . . ??
B. V. Natesha and
Ram Mohana Reddy Guddeti Adopting elitism-based Genetic Algorithm
for minimizing multi-objective problems
of IoT service placement in fog
computing environment . . . . . . . . . ??
Miao Hu and
Xianzhuo Luo and
Jiawen Chen and
Young Choon Lee and
Yipeng Zhou and
Di Wu Virtual reality: a survey of enabling
technologies and its applications in IoT ??
Hamed Aboutorab and
Omar K. Hussain and
Morteza Saberi and
Farookh Khadeer Hussain and
Elizabeth Chang A survey on the suitability of risk
identification techniques in the current
networked environment . . . . . . . . . ??
Mokhtar Mohammadi and
Tarik A. Rashid and
Sarkhel H. Taher Karim and
Adil Hussain Mohammed Aldalwie and
Quan Thanh Tho and
Moazam Bidaki and
Amir Masoud Rahmani and
Mehdi Hosseinzadeh A comprehensive survey and taxonomy of
the SVM-based intrusion detection
systems . . . . . . . . . . . . . . . . ??
Md. Shahin Alom Shuvo and
Md. Azad Rahaman Munna and
Sujan Sarker and
Tamal Adhikary and
Md. Abdur Razzaque and
Mohammad Mehedi Hassan and
Gianluca Aloi and
Giancarlo Fortino Energy-efficient scheduling of small
cells in 5G: a meta-heuristic approach ??
Anonymous 1 April 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ankush Manocha and
Munish Bhatia and
Gulshan Kumar Dew computing-inspired
health-meteorological factor analysis
for early prediction of bronchial asthma ??
Jie Jia and
Jian Chen and
Yansha Deng and
Xingwei Wang and
Abdol-Hamid Aghvami Reliability optimization for industrial
WSNs with FD relays and multiple
parallel connections . . . . . . . . . . ??
Yating Yang and
Tian Song and
Weijia Yuan and
Jianping An Towards reliable and efficient data
retrieving in ICN-based satellite
networks . . . . . . . . . . . . . . . . ??
Mahender Kumar and
Satish Chand MedHypChain: a patient-centered
interoperability hyperledger-based
medical healthcare system: Regulation in
COVID-19 pandemic . . . . . . . . . . . ??
Hazim Hanif and
Mohd Hairul Nizam Md Nasir and
Mohd Faizal Ab Razak and
Ahmad Firdaus and
Nor Badrul Anuar The rise of software vulnerability:
Taxonomy of software vulnerabilities
detection and machine learning
approaches . . . . . . . . . . . . . . . ??
Muhammad Saad and
Joongheon Kim and
DaeHun Nyang and
David Mohaisen Contra-*: Mechanisms for countering spam
attacks on blockchain's memory pools . . ??
Anonymous 15 April 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Raafat O. Aburukba and
Taha Landolsi and
Dalia Omer A heuristic scheduling approach for
fog--cloud computing environment with
stationary IoT devices . . . . . . . . . ??
Mir Salim Ul Islam and
Ashok Kumar and
Yu-Chen Hu Context-aware scheduling in Fog
computing: a survey, taxonomy,
challenges and future directions . . . . ??
Chunlin Li and
Jun Liu and
Bo Lu and
Youlong Luo Cost-aware automatic scaling and
workload-aware replica management for
edge-cloud environment . . . . . . . . . ??
Xiaojie Liu and
Xingwei Wang and
Jie Jia and
Min Huang A distributed deployment algorithm for
communication coverage in wireless
robotic networks . . . . . . . . . . . . ??
Enes Erdin and
Mumin Cebe and
Kemal Akkaya and
Eyuphan Bulut and
Selcuk Uluagac A scalable private Bitcoin payment
channel network with privacy guarantees ??
Samaneh Sadegh and
Kamran Zamanifar and
Piotr Kasprzak and
Ramin Yahyapour A two-phase virtual machine placement
policy for data-intensive applications
in cloud . . . . . . . . . . . . . . . . ??
Ali Dorri and
Fengji Luo and
Samuel Karumba and
Salil Kanhere and
Raja Jurdak and
Zhao Yang Dong Temporary immutability: a removable
blockchain solution for prosumer-side
energy trading . . . . . . . . . . . . . ??
Aleksandro Montanha and
Airton M. Polidorio and
María del Carmen Romero-Ternero New signal location method based on
signal-range data for proximity tracing
tools . . . . . . . . . . . . . . . . . ??
Anonymous 1 May 2021 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Umer Majeed and
Latif U. Khan and
Ibrar Yaqoob and
S. M. Ahsan Kazmi and
Khaled Salah and
Choong Seon Hong Blockchain for IoT-based smart cities:
Recent advances, requirements, and
future challenges . . . . . . . . . . . ??
Zahra Eghbali and
Mina Zolfy Lighvan A hierarchical approach for accelerating
IoT data management process based on SDN
principles . . . . . . . . . . . . . . . ??
Junaid Shuja and
Kashif Bilal and
Waleed Alasmary and
Hassan Sinky and
Eisa Alanazi Applying machine learning techniques for
caching in next-generation edge
networks: a comprehensive survey . . . . ??
Simone Bolettieri and
Raffaele Bruno and
Enzo Mingozzi Application-aware resource allocation
and data management for MEC-assisted IoT
service providers . . . . . . . . . . . ??
Shivam Saxena and
Bharat Bhushan and
Mohd Abdul Ahad Blockchain based solutions to secure
IoT: Background, integration trends and
a way forward . . . . . . . . . . . . . ??
Jonghyun Kim and
Pratik K. Biswas and
Stephan Bohacek and
Sharon J. Mackey and
Siamak Samoohi and
Mitesh P. Patel Advanced protocols for the mitigation of
friendly jamming in mobile ad-hoc
networks . . . . . . . . . . . . . . . . ??
Anonymous 15 May 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Le Tian and
Serena Santi and
Amina Seferagi\'c and
Julong Lan and
Jeroen Famaey Wi-Fi HaLow for the Internet of Things:
an up-to-date survey on IEEE 802.11ah
research . . . . . . . . . . . . . . . . ??
Tao Ren and
Jianwei Niu and
Jiahe Cui and
Zhenchao Ouyang and
Xuefeng Liu An application of multi-objective
reinforcement learning for efficient
model-free control of canals deployed
with IoT networks . . . . . . . . . . . ??
Md Sadek Ferdous and
Mohammad Jabed Morshed Chowdhury and
Mohammad A. Hoque A survey of consensus algorithms in
public blockchain systems for
crypto-currencies . . . . . . . . . . . ??
Prashanth Podili and
Kotaro Kataoka TRAQR: Trust aware End-to-End QoS
routing in multi-domain SDN using
Blockchain . . . . . . . . . . . . . . . ??
Sheng Feng and
Haiyan Shi and
Longjun Huang and
Shigen Shen and
Shui Yu and
Hua Peng and
Chengdong Wu Unknown hostile environment-oriented
autonomous WSN deployment using a mobile
robot . . . . . . . . . . . . . . . . . ??
Anonymous 1 June 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Giuseppe Aceto and
Domenico Ciuonzo and
Antonio Montieri and
Antonio Pescapé DISTILLER: Encrypted traffic
classification via multimodal multitask
deep learning . . . . . . . . . . . . . ??
Quanjun Zhao and
Songtao Guo and
Guiyan Liu Cost\_EACP: Cost-effective adaptive
controller provisioning in software
defined DCNs . . . . . . . . . . . . . . ??
Shumaila Javaid and
Zhenqiang Wu and
Zara Hamid and
Sherali Zeadally and
Hamza Fahim Temperature-aware routing protocol for
Intrabody Nanonetworks . . . . . . . . . ??
LanLan Rui and
Menglei Zhang and
Zhipeng Gao and
Xuesong Qiu and
Zhili Wang and
Ao Xiong Service migration in multi-access edge
computing: a joint state adaptation and
reinforcement learning mechanism . . . . ??
S. Jayalekshmi and
R. Leela Velusamy GSA-RPI: GSA based Rendezvous Point
Identification in a two-level cluster
based LR-WPAN for uncovering the optimal
trajectory of Mobile Data Collection
Agent . . . . . . . . . . . . . . . . . ??
Mohamed Mohamadi and
Badis Djamaa and
Mustapha Reda Senouci and
Abdelhamid Mellouk FAN: Fast and Active Network Formation
in IEEE 802.15.4 TSCH Networks . . . . . ??
Ajit Muzumdar and
Chirag Modi and
Madhu G. M. and
C. Vyjayanthi A trustworthy and incentivized smart
grid energy trading framework using
distributed ledger and smart contracts ??
Anonymous 1 July 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Bilal Abu-Salih Domain-specific knowledge graphs: a
survey . . . . . . . . . . . . . . . . . ??
Xinqian Liu and
Jiadong Ren and
Haitao He and
Bing Zhang and
Chen Song and
Yunxue Wang A fast all-packets-based DDoS attack
detection approach based on network
graph and graph kernel . . . . . . . . . ??
Stella Ho and
Youyang Qu and
Bruce Gu and
Longxiang Gao and
Jianxin Li and
Yong Xiang DP-GAN: Differentially private
consecutive data publishing using
generative adversarial nets . . . . . . ??
Zahra Makki Nayeri and
Toktam Ghafarian and
Bahman Javadi Application placement in Fog computing
with AI approach: Taxonomy and a state
of the art survey . . . . . . . . . . . ??
Leyi Shi and
Xiaoyu Li and
Zhenbo Gao and
Pengfei Duan and
Na Liu and
Honglong Chen Worm computing: a blockchain-based
resource sharing and cybersecurity
framework . . . . . . . . . . . . . . . ??
Anonymous 15 July 2021 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
LanLan Rui and
Menglei Zhang and
Zhipeng Gao and
Xuesong Qiu and
Zhili Wang and
Ao Xiong Corrigendum to ``Service migration in
multi-access edge computing: a joint
state adaptation and reinforcement
learning mechanism'' [J. Netw. Comput.
Appl. \bf 183--184 (2021) 103058] . . . ??
Pangun Park and
Hossein S. Ghadikolaei and
Carlo Fischione Proactive fault-tolerant wireless mesh
networks for mission-critical control
systems . . . . . . . . . . . . . . . . ??
Qingtao Wu and
Qianyu Wang and
Mingchuan Zhang and
Ruijuan Zheng and
Junlong Zhu and
Jiankun Hu Learned Bloom-filter for the efficient
name lookup in Information-Centric
Networking . . . . . . . . . . . . . . . ??
Nabajyoti Mazumdar and
Saugata Roy and
Amitava Nag and
Sukumar Nandi An adaptive hierarchical data
dissemination mechanism for mobile data
collector enabled dynamic wireless
sensor network . . . . . . . . . . . . . ??
Ahmad Zareie and
Rizos Sakellariou Minimizing the spread of misinformation
in online social networks: a survey . . ??
Anonymous 1 August 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Meghna Raj and
Shashank Gupta and
Vinay Chamola and
Anubhav Elhence and
Tanya Garg and
Mohammed Atiquzzaman and
Dusit Niyato A survey on the role of Internet of
Things for adopting and promoting
Agriculture 4.0 . . . . . . . . . . . . ??
Nisha Ahuja and
Gaurav Singal and
Debajyoti Mukhopadhyay and
Neeraj Kumar Automated DDOS attack detection in
software defined networking . . . . . . ??
Ismael Amezcua Valdovinos and
Jesús Arturo Pérez-Díaz and
Kim-Kwang Raymond Choo and
Juan Felipe Botero Emerging DDoS attack detection and
mitigation strategies in
software-defined networks: Taxonomy,
challenges and future directions . . . . ??
Sang-Woong Lee and
Haval Mohammed sidqi and
Mokhtar Mohammadi and
Shima Rashidi and
Amir Masoud Rahmani and
Mohammad Masdari and
Mehdi Hosseinzadeh Towards secure intrusion detection
systems using deep learning techniques:
Comprehensive analysis and review . . . ??
Anonymous 15 August 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Meena Pundir and
Jasminder Kaur Sandhu A Systematic Review of Quality of
Service in Wireless Sensor Networks
using Machine Learning: Recent Trend and
Future Vision . . . . . . . . . . . . . ??
Xuerui Wang and
Zheng Yan and
Rui Zhang and
Peng Zhang Attacks and defenses in user
authentication systems: a survey . . . . ??
Xu Zhao and
Guangqiu Huang and
Ling Gao and
Maozhen Li and
Quanli Gao Low load DIDS task scheduling based on
$Q$-learning in edge computing
environment . . . . . . . . . . . . . . ??
Anonymous 1 September 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Xin Jian and
Langyun Wu and
Keping Yu and
Moayad Aloqaily and
Jalel Ben-Othman Energy-efficient user association with
load-balancing for cooperative IIoT
network within B5G era . . . . . . . . . ??
Yingya Guo and
Weipeng Wang and
Han Zhang and
Wenzhong Guo and
Zhiliang Wang and
Ying Tian and
Xia Yin and
Jianping Wu Traffic Engineering in Hybrid Software
Defined Network via Reinforcement
Learning . . . . . . . . . . . . . . . . ??
Zhiwei Zhang and
Lin Cui and
Jia Wu Exploring an edge convolution and
normalization based approach for link
prediction in complex networks . . . . . ??
Rizwana Shahzadi and
Mudassar Ali and
Humayun Zubair Khan and
Muhammad Naeem UAV assisted 5G and beyond wireless
networks: a survey . . . . . . . . . . . ??
Tommaso Zoppi and
Andrea Ceccarelli Prepare for trouble and make it double!
Supervised--unsupervised stacking for
anomaly-based intrusion detection . . . ??
Hoang Minh Do and
Mark A. Gregory and
Shuo Li SDN-based wireless mobile backhaul
architecture: Review and challenges . . ??
Yuan Liu and
Rentao Gu and
Zeyuan Yang and
Yuefeng Ji Hierarchical community discovery for
multi-stage IP bearer network
upgradation . . . . . . . . . . . . . . ??
Anonymous 15 September 2021 . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Mohammad Sadegh Yousefpoor and
Efat Yousefpoor and
Hamid Barati and
Ali Barati and
Ali Movaghar and
Mehdi Hosseinzadeh Secure data aggregation methods and
countermeasures against various attacks
in wireless sensor networks: a
comprehensive review . . . . . . . . . . ??
Tanveer Khan and
Antonis Michalas and
Adnan Akhunzada Fake news outbreak 2021: Can we stop the
viral spread? . . . . . . . . . . . . . ??
Jiajing Wu and
Jieli Liu and
Yijing Zhao and
Zibin Zheng Analysis of cryptocurrency transactions
from a network perspective: an overview ??
Hai T. Nguyen and
Tien V. Do and
Csaba Rotter Optimizing the resource usage of
actor-based systems . . . . . . . . . . ??
Elie Zaraket and
Nour Mohammad Murad and
Samar Syed Yazdani and
Lala Rajaoarisoa and
Blaise Ravelo An overview on low energy wake-up radio
technology: Active and passive circuits
associated with MAC and routing
protocols . . . . . . . . . . . . . . . ??
Ahmad Salah AlAhmad and
Hasan Kahtan and
Yehia Ibrahim Alzoubi and
Omar Ali and
Ashraf Jaradat Mobile cloud computing models security
issues: a systematic review . . . . . . ??
Fran Casino and
Nikolaos Lykousas and
Ivan Homoliak and
Constantinos Patsakis and
Julio Hernandez-Castro Intercepting Hail Hydra: Real-time
detection of Algorithmically Generated
Domains . . . . . . . . . . . . . . . . ??
Hui Yang and
Kaixuan Zhan and
Bowen Bao and
Qiuyan Yao and
Jie Zhang and
Mohamed Cheriet Automatic guarantee scheme for
intent-driven network slicing and
reconfiguration . . . . . . . . . . . . ??
Yunhe Cui and
Qing Qian and
Chun Guo and
Guowei Shen and
Youliang Tian and
Huanlai Xing and
Lianshan Yan Towards DDoS detection mechanisms in
Software-Defined Networking . . . . . . ??
Anonymous 1 October 2021 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Quoc-Viet Pham and
Dinh C. Nguyen and
Seyedali Mirjalili and
Dinh Thai Hoang and
Diep N. Nguyen and
Pubudu N. Pathirana and
Won-Joo Hwang Swarm intelligence for next-generation
networks: Recent advances and
applications . . . . . . . . . . . . . . ??
Yan Huang and
Wei Li and
Jinbao Wang and
Zhipeng Cai and
Anu G. Bourgeois Privacy protection among three
antithetic-parties for context-aware
services . . . . . . . . . . . . . . . . ??
Imen Jemili and
Dhouha Ghrab and
Abdelfettah Belghith and
Mohamed Mosbah and
Saad Al-Ahmadi Cross-layer multipath approach for
critical traffic in duty-cycled wireless
sensor networks . . . . . . . . . . . . ??
Maha Kadadha and
Hadi Otrok and
Shakti Singh and
Rabeb Mizouni and
Anis Ouali Two-sided preferences task matching
mechanisms for blockchain-based
crowdsourcing . . . . . . . . . . . . . ??
Ahmad Zairi Zaidi and
Chun Yong Chong and
Zhe Jin and
Rajendran Parthiban and
Ali Safaa Sadiq Touch-based continuous mobile device
authentication: State-of-the-art,
challenges and opportunities . . . . . . ??
Anand M. Baswade and
Mohith Reddy and
Antony Franklin A. and
Bheemarjuna Reddy Tamma and
Vanlin Sathya Performance analysis of spatially
distributed LTE-U/NR-U and Wi-Fi
networks: an analytical model for
coexistence study . . . . . . . . . . . ??
Longbiao Chen and
Zhihan Jiang and
Dingqi Yang and
Cheng Wang and
Thi-Mai-Trang Nguyen Fog radio access network optimization
for 5G leveraging user mobility and
traffic data . . . . . . . . . . . . . . ??
Chunlin Li and
Yong Zhang and
Mingyang Song and
Xin Yan and
Youlong Luo An optimized content caching strategy
for video stream in edge-cloud
environment . . . . . . . . . . . . . . ??
Mahmoud Said ElSayed and
Nhien-An Le-Khac and
Marwan Ali Albahar and
Anca Jurcut A novel hybrid model for intrusion
detection systems in SDNs based on CNN
and a new regularization technique . . . ??
Vincenzo Agate and
Alessandra De Paola and
Pierluca Ferraro and
Giuseppe Lo Re and
Marco Morana SecureBallot: a secure open source
e-Voting system . . . . . . . . . . . . ??
Anonymous 15 October 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Jannatun Noor and
Saiful Islam Salim and
A. B. M. Alim Al Islam Strategizing secured image storing and
efficient image retrieval through a new
cloud framework . . . . . . . . . . . . ??
Ahmed Yaser Fahad Alsahlani and
Alexandru Popa LMAAS-IoT: Lightweight multi-factor
authentication and authorization scheme
for real-time data access in IoT
cloud-based environment . . . . . . . . ??
Sen Liu and
Jiawei Huang and
Wenchao Jiang and
Jianxin Wang Reducing traffic burstiness for MPTCP in
data center networks . . . . . . . . . . ??
Fillipe Santos and
Andre L. L. Aquino and
Edmundo R. M. Madeira and
Raquel S. Cabral Temporal complex networks modeling
applied to vehicular ad-hoc networks . . ??
EL Hocine Bouzidi and
Abdelkader Outtagarts and
Rami Langar and
Raouf Boutaba Deep Q-Network and Traffic Prediction
based Routing Optimization in Software
Defined Networks . . . . . . . . . . . . ??
Shwet Ketu and
Pramod Kumar Mishra Internet of Healthcare Things: a
contemporary survey . . . . . . . . . . ??
Changsong Yang and
Feng Zhao and
Xiaoling Tao and
Yong Wang Publicly verifiable outsourced data
migration scheme supporting efficient
integrity checking . . . . . . . . . . . ??
Mostafa Haghi Kashani and
Mona Madanipour and
Mohammad Nikravan and
Parvaneh Asghari and
Ebrahim Mahdipour A systematic review of IoT in
healthcare: Applications, techniques,
and trends . . . . . . . . . . . . . . . ??
Qiumei Cheng and
Chunming Wu and
Haifeng Zhou and
Dezhang Kong and
Dong Zhang and
Junchi Xing and
Wei Ruan Machine learning based malicious payload
identification in software-defined
networking . . . . . . . . . . . . . . . ??
Anonymous 1 November 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Liqun Yang and
You Zhai and
Zhoujun Li Deep learning for online AC False Data
Injection Attack detection in smart
grids: an approach using
LSTM-Autoencoder . . . . . . . . . . . . ??
Prabhakar Krishnan and
Subhasri Duttagupta and
Rajkumar Buyya OpenPATH: Application aware
high-performance software-defined
switching framework . . . . . . . . . . ??
Junyan Guo and
Ye Du and
Yahang Zhang and
Meihong Li A provably secure ECC-based access and
handover authentication protocol for
space information networks . . . . . . . ??
Hao Hao and
Changqiao Xu and
Shujie Yang and
Lujie Zhong and
Gabriel-Miro Muntean Multicast-aware optimization for
resource allocation with edge computing
and caching . . . . . . . . . . . . . . ??
Yuning Jiang and
Yacine Atif A selective ensemble model for cognitive
cybersecurity analysis . . . . . . . . . ??
Huu-Khoi Bui and
Ying-Dar Lin and
Ren-Hung Hwang and
Po-Ching Lin and
Van-Linh Nguyen and
Yuan-Cheng Lai CREME: a toolchain of automatic dataset
collection for machine learning in
intrusion detection . . . . . . . . . . ??
Israat Haque and
Dipon Saha SoftIoT: a resource-aware SDN/NFV-based
IoT network . . . . . . . . . . . . . . ??
Xiaobei Yan and
Maode Ma A lightweight and secure handover
authentication scheme for 5G network
using neighbour base stations . . . . . ??
Anonymous 15 November 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Kaylani Bochie and
Mateus S. Gilbert and
Luana Gantert and
Mariana S. M. Barbosa and
Dianne S. V. Medeiros and
Miguel Elias M. Campista A survey on deep learning for challenged
networks: Applications and trends . . . ??
Selma Yahia and
Yassine Meraihi and
Amar Ramdane-Cherif and
Asma Benmessaoud Gabis and
Dalila Acheli and
Hongyu Guan A Survey of Channel Modeling Techniques
for Visible Light Communications . . . . ??
Majda Omer Elbasheer and
Abdulaziz Aldegheishem and
Jaime Lloret and
Nabil Alrajeh A QoS-Based routing algorithm over
software defined networks . . . . . . . ??
Shie-Yuan Wang and
Jui-En Chang and
Cheng-Da Lin Design, implementation, and performance
evaluation of a drone wakeup and data
collection system for smart meters . . . ??
Muralitharan Krishnan and
Yongdo Lim Reinforcement learning-based dynamic
routing using mobile sink for data
collection in WSNs and IoT applications ??
Xi Liu and
Jian Cen and
Huanzhong Hu and
Zongwei Yu and
Yuanxin Huang A radio map self-updating algorithm
based on mobile crowd sensing . . . . . ??
Anonymous 1 December 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Abdellah Houmz and
Ghita Mezzour and
Karim Zkik and
Mounir Ghogho and
Houda Benbrahim Detecting the impact of software
vulnerability on attacks: a case study
of network telescope scans . . . . . . . ??
Hongyan Zhang and
Limei Lin and
Li Xu and
Xiaoding Wang Graph partition based privacy-preserving
scheme in social networks . . . . . . . ??
Abdurrashid Ibrahim Sanka and
Ray C. C. Cheung A systematic review of blockchain
scalability: Issues, solutions, analysis
and future research . . . . . . . . . . ??
Josué Castañeda and
Saul E. Pomares Hernández and
Sami Yangui and
Julio C. Pérez Sansalvador and
Lil M. Rodr\'ìguez Henr\'ìquez and
Khalil Drira VNF-based network service consistent
reconfiguration in multi-domain
federations: a distributed approach . . ??
Ruhma Tahir and
Shahzaib Tahir and
Hasan Tahir and
Klaus McDonald-Maier and
Gareth Howells and
Ali Sajjad A novel ICMetric public key framework
for secure communication . . . . . . . . ??
Anjula Mehto and
Shashikala Tapaswi and
K. K. Pattanaik Multi-objective particle swarm
optimization based rendezvous point
selection for the energy and delay
efficient networked wireless sensor data
acquisition . . . . . . . . . . . . . . ??
Anonymous 15 December 2021 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Kai Lei and
Junlin Huang and
Xiaodong Li and
Yu Li and
Ye Zhang and
Bo Bai and
Fan Zhang and
Gong Zhang and
Jingjie Jiang HOPASS: a two-layer control framework
for bandwidth and delay guarantee in
datacenters . . . . . . . . . . . . . . ??
Fan Zhang and
Yazhe Tang and
Danfeng Shan and
Huanzhao Wang and
Chengchen Hu RICH: Strategy-proof and efficient
coflow scheduling in non-cooperative
environments . . . . . . . . . . . . . . ??
Jiaojiao Jiang and
Jean-Guy Schneider and
Steve Versteeg and
Jun Han and
MD Arafat Hossain and
Chengfei Liu R-gram: Inferring message formats of
service protocols with relative
positional $n$-grams . . . . . . . . . . ??
Bingjie Wei and
Lin Wang and
Junlong Zhu and
Mingchuan Zhang and
Ling Xing and
Qingtao Wu Flow control oriented forwarding and
caching in cache-enabled networks . . . ??
Mallikarjun Reddy Dorsala and
V. N. Sastry and
Sudhakar Chapram Blockchain-based solutions for cloud
computing: a survey . . . . . . . . . . ??
U. S. P. Srinivas Aditya and
Roshan Singh and
Pranav Kumar Singh and
Anshuman Kalla A Survey on Blockchain in Robotics:
Issues, Opportunities, Challenges and
Future Directions . . . . . . . . . . . ??
Nabila Sabrin Sworna and
A. K. M. Muzahidul Islam and
Swakkhar Shatabda and
Salekul Islam Towards development of IoT-ML driven
healthcare systems: a survey . . . . . . ??
Anonymous January 2022 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous Thank You Reviewers . . . . . . . . . . ??
Debanjan Roy Chowdhury and
Sukumar Nandi and
Diganta Goswami Video streaming over IoV using IP
multicast . . . . . . . . . . . . . . . ??
Fanghui Sun and
Shen Wang and
Hongli Zhang A progressive learning method on unknown
protocol behaviors . . . . . . . . . . . ??
Irian Leyva-Pupo and
Cristina Cervelló-Pastor Efficient solutions to the placement and
chaining problem of User Plane Functions
in 5G networks . . . . . . . . . . . . . ??
Khizar Hameed and
Saurabh Garg and
Muhammad Bilal Amin and
Byeong Kang and
Abid Khan A context-aware information-based clone
node attack detection scheme in Internet
of Things . . . . . . . . . . . . . . . ??
Gunjan Verma and
Kelvin Marcus and
Kevin S. Chan Optimizing the quality of information of
networked machine learning agents . . . ??
Anonymous February 2022 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Sana Benhamaid and
Abdelmadjid Bouabdallah and
Hicham Lakhlef Recent advances in energy management for
Green-IoT: an up-to-date and
comprehensive survey . . . . . . . . . . ??
Xiaoqing Zhang and
Fei Yang and
Yue Hu and
Zhao Tian and
Wei Liu and
Yifa Li and
Wei She RANet: Network intrusion detection with
group-gating convolutional neural
network . . . . . . . . . . . . . . . . ??
Waleed Bin Shahid and
Baber Aslam and
Haider Abbas and
Saad Bin Khalid and
Hammad Afzal An enhanced deep learning based
framework for web attacks detection,
mitigation and attacker profiling . . . ??
Shie-Yuan Wang and
Jen-Chieh Chang Design and implementation of an
intrusion detection system by using
Extended BPF in the Linux kernel . . . . ??
Ruhui Ma and
Jin Cao and
Dengguo Feng and
Hui Li and
Xiaowei Li and
Yang Xu A robust authentication scheme for
remote diagnosis and maintenance in 5G
V2N . . . . . . . . . . . . . . . . . . ??
Lanlan Rui and
Siqi Yang and
Zhipeng Gao and
Wenjing Li and
Xuesong Qiu and
Luoming Meng Smart network maintenance in edge cloud
computing environment: an allocation
mechanism based on comprehensive
reputation and regional prediction model ??
Abir El Azzaoui and
Pradip Kumar Sharma and
Jong Hyuk Park Blockchain-based delegated Quantum Cloud
architecture for medical big data
security . . . . . . . . . . . . . . . . ??
Kazi Yasin Islam and
Iftekhar Ahmad and
Daryoush Habibi and
Adnan Waqar A survey on energy efficiency in
underwater wireless communications . . . ??
Faheem Ullah and
M. Ali Babar On the scalability of Big Data Cyber
Security Analytics systems . . . . . . . ??
Anonymous March 2022 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Tuan Anh Nguyen and
Minjune Kim and
Jangse Lee and
Dugki Min and
Jae-Woo Lee and
Dongseong Kim Performability evaluation of switch-over
Moving Target Defence mechanisms in a
Software Defined Networking using
stochastic reward nets . . . . . . . . . ??
Kiki Adhinugraha and
Wenny Rahayu and
Takahiro Hara and
David Taniar Measuring fault tolerance in IoT mesh
networks using Voronoi diagram . . . . . ??
Yimin Liu and
Xiangyang Luo and
Meng Zhang and
Zhiyuan Tao and
Fenlin Liu Who are there: Discover Twitter users
and tweets for target area using mention
relationship strength and local tweet
ratio . . . . . . . . . . . . . . . . . ??
Micha\l Kalewski and
Jerzy Brzezi\'nski Uniform and regular reliable broadcast
protocols facilitating concurrent
message dissemination for mobile ad hoc
networks with the network liveness
property . . . . . . . . . . . . . . . . ??
Yadong Zhou and
Hao Li and
Kaiyue Chen and
Tian Pan and
Kun Qian and
Kai Zheng and
Bin Liu and
Peng Zhang and
Yazhe Tang and
Chengchen Hu Raze policy conflicts in SDN . . . . . . ??
Bin Liang and
Mark A. Gregory and
Shuo Li Multi-access Edge Computing
fundamentals, services, enablers and
challenges: a complete survey . . . . . ??
Shuaib K. Memon and
Nurul I. Sarkar and
Adnan Al-Anbuky and
Md Akbar Hossain Preemptive admission control mechanism
for strict QoS guarantee to life-saving
emergency traffic in wireless LANs . . . ??
Himanshu Gauttam and
K. K. Pattanaik and
Saumya Bhadauria and
Divya Saxena and
Sapna A cost aware topology formation scheme
for latency sensitive applications in
edge infrastructure-as-a-service
paradigm . . . . . . . . . . . . . . . . ??
Anonymous April 2022 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Sanjay Kumar Biswash Device and network driven cellular
networks architecture and mobility
management technique for fog
computing-based mobile communication
system . . . . . . . . . . . . . . . . . ??
Abu Jahid and
Mohammed H. Alsharif and
Trevor J. Hall A contemporary survey on free space
optical communication: Potentials,
technical challenges, recent advances
and research direction . . . . . . . . . ??
Jong Wook Kim and
Kennedy Edemacu and
Beakcheol Jang Privacy-preserving mechanisms for
location privacy in mobile crowdsensing:
a survey . . . . . . . . . . . . . . . . ??
Sophia Auer and
Sophia Nagler and
Somnath Mazumdar and
Raghava Rao Mukkamala Towards blockchain-IoT based shared
mobility: Car-sharing and leasing as a
case study . . . . . . . . . . . . . . . ??
Farrukh Mehmood and
Naveed Khan Baloch and
Fawad Hussain and
Waqar Amin and
M. Shamim Hossain and
Yousaf Bin Zikria and
Heejung Yu An efficient and cost effective
application mapping for network-on-chip
using Andean condor algorithm . . . . . ??
Shah Zeb and
Aamir Mahmood and
Syed Ali Hassan and
MD. Jalil Piran and
Mikael Gidlund and
Mohsen Guizani Industrial digital twins at the nexus of
NextG wireless networks and
computational intelligence: a survey . . ??
Lorenzo Valerio and
Franco Maria Nardini and
Andrea Passarella and
Raffaele Perego Dynamic hard pruning of Neural Networks
at the edge of the Internet . . . . . . ??
Fares Mezrag and
Salim Bitam and
Abdelhamid Mellouk An efficient and lightweight
identity-based scheme for secure
communication in clustered wireless
sensor networks . . . . . . . . . . . . ??
Quang Tung Thai and
Namseok Ko and
Sung Hyuk Byun and
Sun-Me Kim Design and implementation of NDN-based
Ethereum blockchain . . . . . . . . . . ??
Meriem Achir and
Abdelkrim Abdelli and
Lynda Mokdad and
Jalel Benothman Service discovery and selection in IoT:
a survey and a taxonomy . . . . . . . . ??
Anonymous May 2022 . . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Venkatarami Reddy Chintapalli and
Madhura Adeppady and
Bheemarjuna Reddy Tamma and
Antony Franklin A. \pkgRESTRAIN: a dynamic and
cost-efficient resource management
scheme for addressing performance
interference in NFV-based systems . . . ??
Sadoon Azizi and
Mohammad Shojafar and
Jemal Abawajy and
Rajkumar Buyya Deadline-aware and energy-efficient IoT
task scheduling in fog computing
systems: a semi-greedy approach . . . . ??
Raihan Ur Rasool and
Hafiz Farooq Ahmad and
Wajid Rafique and
Adnan Qayyum and
Junaid Qadir Security and privacy of internet of
medical things: a contemporary review in
the age of surveillance, botnets, and
adversarial ML . . . . . . . . . . . . . ??
S. M. Asiful Huda and
Sangman Moh Survey on computation offloading in
UAV-Enabled mobile edge computing . . . ??
Domenico Cotroneo and
Luigi De Simone and
Roberto Natella \pkgThorFI: a Novel Approach for Network
Fault Injection as a Service . . . . . . ??
Shashwat Kumar and
Lalit Bhagat and
Antony Franklin A. and
Jiong Jin Multi-neural network based tiled
360${}^\circ $ video caching with Mobile
Edge Computing . . . . . . . . . . . . . ??
Qian Li and
Cong Zeng and
Wei Xu and
Yunpeng Xiao A social rumor and anti-rumor game
diffusion model based on sparse
representation and tensor completion . . ??
Mostafa Ayoubi Mobarhan and
Mohammed Salamah REPS-AKA3: a secure authentication and
re- authentication protocol for LTE
networks . . . . . . . . . . . . . . . . ??
Guangxian Liang and
Xiaopeng Yao and
Yue Gu and
Hejiao Huang and
Chonglin Gu Multi-Batches Revenue Maximization for
competitive products over online social
network . . . . . . . . . . . . . . . . ??
Yang Wang and
Xiong Wang and
Shizhong Xu and
Ci He and
Yasheng Zheng and
Jing Ren and
Shui Yu \pkgFlexMon: a flexible and fine-grained
traffic monitor for programmable
networks . . . . . . . . . . . . . . . . ??
Mert Nakip and
Erdem Çakan and
Volkan Rodoplu and
Cüneyt Güzelis Dynamic Automatic Forecaster Selection
via Artificial Neural Network Based
Emulation to Enable Massive Access for
the Internet of Things . . . . . . . . . ??
Anonymous June 2022 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Reza Honarvar and
Alireza Zolghadrasli and
Mehdi Monemi Context-oriented performance evaluation
of network selection algorithms in 5G
heterogeneous networks . . . . . . . . . ??
Ahmed Salim and
Walid Osamy and
Ahmed Aziz and
Ahmed M. Khedr SEEDGT: Secure and energy efficient data
gathering technique for IoT applications
based WSNs . . . . . . . . . . . . . . . ??
Jie Sun and
Yi Zhang and
Feng Liu and
Huandong Wang and
Xiaojian Xu and
Yong Li A survey on the placement of virtual
network functions . . . . . . . . . . . ??
Wei Wei and
Qi Wang and
Weidong Yang and
Yashuang Mu Efficient stochastic scheduling for
highly complex resource placement in
edge clouds . . . . . . . . . . . . . . ??
Radhika Chapaneri and
Seema Shah Enhanced detection of imbalanced
malicious network traffic with
regularized Generative Adversarial
Networks . . . . . . . . . . . . . . . . ??
Chuan Feng and
Pengchao Han and
Xu Zhang and
Bowen Yang and
Yejun Liu and
Lei Guo Computation offloading in mobile edge
computing networks: a survey . . . . . . ??
Chadni Islam and
M. Ali Babar and
Roland Croft and
Helge Janicke SmartValidator: a framework for
automatic identification and
classification of cyber threat data . . ??
Nadeem Ahmed and
Regio A. Michelin and
Wanli Xue and
Guntur Dharma Putra and
Sushmita Ruj and
Salil S. Kanhere and
Sanjay Jha DIMY: Enabling privacy-preserving
contact tracing . . . . . . . . . . . . ??
B. Mohammad Hasani Zade and
N. Mansouri and
M. M. Javidi A two-stage scheduler based on New
Caledonian Crow Learning Algorithm and
reinforcement learning strategy for
cloud environment . . . . . . . . . . . ??
Marta Catillo and
Antonio Pecchia and
Umberto Villano No more DoS? An empirical study on
defense techniques for web server Denial
of Service mitigation . . . . . . . . . ??
Anonymous July 2022 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Nan Wang and
Blesson Varghese Context-aware distribution of fog
applications using deep reinforcement
learning . . . . . . . . . . . . . . . . ??
Madhusanka Liyanage and
Quoc-Viet Pham and
Kapal Dev and
Sweta Bhattacharya and
Praveen Kumar Reddy Maddikunta and
Thippa Reddy Gadekallu and
Gokul Yenduri A survey on Zero touch network and
Service Management (ZSM) for 5G and
beyond networks . . . . . . . . . . . . ??
Shantanu Pal and
Ali Dorri and
Raja Jurdak Blockchain for IoT access control:
Recent trends and future research
directions . . . . . . . . . . . . . . . ??
Mauro Conti and
Gulshan Kumar and
Pranav Nerurkar and
Rahul Saha and
Luigi Vigneri A survey on security challenges and
solutions in the IOTA . . . . . . . . . ??
Xingjia Li and
Li Pan and
Shijun Liu A survey of resource provisioning
problem in cloud brokers . . . . . . . . ??
Pooja Gupta and
Volkan Dedeoglu and
Salil S. Kanhere and
Raja Jurdak TrailChain: Traceability of data
ownership across blockchain-enabled
multiple marketplaces . . . . . . . . . ??
Soo-Yeon Ji and
Bong Keun Jeong and
Charles Kamhoua and
Nandi Leslie and
Dong Hyun Jeong Forecasting network events to estimate
attack risk: Integration of wavelet
transform and vector auto regression
with exogenous variables . . . . . . . . ??
Tianheng Li and
Xiaofan He and
Siming Jiang and
Juan Liu A survey of privacy-preserving
offloading methods in mobile-edge
computing . . . . . . . . . . . . . . . ??
Huda Althumali and
Mohamed Othman and
Nor Kamariah Noordin and
Zurina Mohd Hanapi Priority-based load-adaptive preamble
separation random access for
QoS-differentiated services in 5G
networks . . . . . . . . . . . . . . . . ??
Luigi Coppolino and
Salvatore D'Antonio and
Giovanni Mazzeo and
Luigi Romano and
Luigi Sgaglione \pkgPriSIEM: Enabling privacy-preserving
Managed Security Services . . . . . . . ??
Asterios Mpatziakas and
Anastasios Drosou and
Stavros Papadopoulos and
Dimitiris Tzovaras IoT threat mitigation engine empowered
by artificial intelligence
multi-objective optimization . . . . . . ??
Long Luo and
Klaus-Tycho Foerster and
Stefan Schmid and
Hongfang Yu Optimizing multicast flows in
high-bandwidth reconfigurable datacenter
networks . . . . . . . . . . . . . . . . ??
Mattia Fogli and
Carlo Giannelli and
Cesare Stefanelli Software-Defined Networking in wireless
ad hoc scenarios: Objectives and control
architectures . . . . . . . . . . . . . ??
J. Kok Konjaang and
John Murphy and
Liam Murphy Energy-efficient virtual-machine mapping
algorithm (EViMA) for workflow tasks
with deadlines in a cloud environment ??
Anonymous August 2022 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Chu-Fu Wang and
Yih-Kai Lin and
Jun-Cheng Chen A cooperative image object recognition
framework and task offloading
optimization in edge computing . . . . . ??
Tahseen Khan and
Wenhong Tian and
Guangyao Zhou and
Shashikant Ilager and
Mingming Gong and
Rajkumar Buyya Machine learning (ML)-centric resource
management in cloud computing: a review
and future directions . . . . . . . . . ??
Taejune Park and
Kilho Lee Supporting ultra-low latency
mixed-criticality communication using
hardware-based data plane architecture ??
Sara Lahlou and
Youness Moukafih and
Anass Sebbar and
Karim Zkik and
Mohammed Boulmalf and
Mounir Ghogho TD-RA policy-enforcement framework for
an SDN-based IoT architecture . . . . . ??
Mansoureh Abbasi-Verki and
Saleh Yousefi and
Hashem Kalbkhani Socially-aware and energy-efficient
resource allocation and power control
for D2D multicast content distribution ??
Mohammad Nikravan and
Mostafa Haghi Kashani A review on trust management in fog/edge
computing: Techniques, trends, and
challenges . . . . . . . . . . . . . . . ??
Ashish Kumar and
Rahul Saha and
Mauro Conti and
Gulshan Kumar and
William J. Buchanan and
Tai Hoon Kim A comprehensive survey of authentication
methods in Internet-of-Things and its
conjunctions . . . . . . . . . . . . . . ??
Dipanwita Thakur and
Suparna Biswas An Integration of feature extraction and
Guided Regularized Random Forest feature
selection for Smartphone based Human
Activity Recognition . . . . . . . . . . ??
Gerald K. Ijemaru and
Li Minn Ang and
Kah Phooi Seng Transformation from IoT to IoV for waste
management in smart cities . . . . . . . ??
Muhammad Morshed Alam and
Sangman Moh Joint topology control and routing in a
UAV swarm for crowd surveillance . . . . ??
Umar Ghafoor and
Mudassar Ali and
Humayun Zubair Khan and
Adil Masood Siddiqui and
Muhammad Naeem NOMA and future 5G and B5G wireless
networks: a paradigm . . . . . . . . . . ??
Anonymous September 2022 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ansa Shermin S. and
Sarang C. Dhongdi Review of Underwater Mobile Sensor
Network for ocean phenomena monitoring ??
Pau Ferrer-Cid and
Jose M. Barcelo-Ordinas and
Jorge Garcia-Vidal Data reconstruction applications for IoT
air pollution sensor networks using
graph signal processing . . . . . . . . ??
Mamta Agiwal and
Anil Agiwal and
Mukesh Kumar Maheshwari and
Shapna Muralidharan Split PO for paging in B5G networks . . ??
Shakoor Vakilian and
Ali Fanian and
Hossein Falsafain and
T. Aaron Gulliver Node cooperation for workload offloading
in a fog computing network via
multi-objective optimization . . . . . . ??
Dinesh Soni and
Neetesh Kumar Machine learning techniques in emerging
cloud computing integrated paradigms: a
survey and taxonomy . . . . . . . . . . ??
Prasanta Kumar Roy and
Prashant Sahu and
Ansuman Bhattacharya FastHand: a fast handover authentication
protocol for densely deployed small-cell
networks . . . . . . . . . . . . . . . . ??
Samira Bokhari and
Sofiane Hamrioui and
Meziane Aider Cybersecurity strategy under
uncertainties for an IoE environment . . ??
Mattia G. Campana and
Franca Delmastro On-device modeling of user's social
context and familiar places from
smartphone-embedded sensor data . . . . ??
Peiying Zhang and
Peng Gan and
Neeraj Kumar and
Chunxiao Jiang and
Fanglin Liu and
Lei Zhang Survivable virtual network embedding
algorithm considering multiple node
failure in IIoT environment . . . . . . ??
Haoran Ni and
Zehua Guo and
Changlin Li and
Songshi Dou and
Chao Yao and
Thar Baker Network Coding-based Resilient Routing
for Maintaining Data Security and
Availability in Software-Defined
Networks . . . . . . . . . . . . . . . . ??
Xiaoping Wu and
Yunlong Li and
Yana Shen and
Xuefen Zhu Efficient solutions for target
localization in asynchronous MIMO
networks . . . . . . . . . . . . . . . . ??
Shamim Taimoor and
Lilatul Ferdouse and
Waleed Ejaz Holistic resource management in
UAV-assisted wireless networks: an
optimization perspective . . . . . . . . ??
Hamza Baniata and
Attila Kertesz PriFoB: a Privacy-aware Fog-enhanced
Blockchain-based system for Global
Accreditation and Credential
Verification . . . . . . . . . . . . . . ??
Noe M. Yungaicela-Naula and
Cesar Vargas-Rosales and
Jesús Arturo Pérez-Díaz and
Diego Fernando Carrera A flexible SDN-based framework for
slow-rate DDoS attack mitigation by
using deep reinforcement learning . . . ??
Ihsan Mert Ozcelik and
Cem Ersoy ALVS: Adaptive Live Video Streaming
using deep reinforcement learning . . . ??
Kamalesh Karmakar and
Somrita Banerjee and
Rajib K. Das and
Sunirmal Khatua Utilization aware and network I/O
intensive virtual machine placement
policies for cloud data center . . . . . ??
Anal Paul and
Aneesh Kumar Mishra and
Shivam Shreevastava and
Anoop Kumar Tiwari Deep Reinforcement Learning based
reliable spectrum sensing under SSDF
attacks in Cognitive Radio networks . . ??
Nazma Akther and
Kingshuk Dhar and
Shahid Md. Asif Iqbal and
Mohammed Nurul Huda and
Asaduzzaman \em Interest forwarding strategy in
Named \em Data Networks (\em NDN) using
Thompson Sampling . . . . . . . . . . . ??
Min Li and
Di Xiao and
Hui Huang and
Bo Zhang Multi-level video quality services and
security guarantees based on compressive
sensing in sensor-cloud system . . . . . ??
Qiang Zou and
Yifeng Zhu and
Yujuan Tan and
Wei Chen Diagnosing the coexistence of Poissonity
and self-similarity in memory workloads ??
Nan Wang and
Tong Liu and
Jinzhen Wang and
Qing Liu and
Shakeel Alibhai and
Xubin He Locality-based transfer learning on
compression autoencoder for efficient
scientific data lossy compression . . . ??
Anonymous October 2022 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Fauzia Irram and
Mudassar Ali and
Muhammad Naeem and
Shahid Mumtaz Physical layer security for beyond 5G/6G
networks: Emerging technologies and
future directions . . . . . . . . . . . ??
Jong Wook Kim and
Beakcheol Jang Deep learning-based privacy-preserving
framework for synthetic trajectory
generation . . . . . . . . . . . . . . . ??
Minghui Wu and
Dawei Sun and
Yijing Cui and
Shang Gao and
Xunyun Liu and
Rajkumar Buyya A state lossless scheduling strategy in
distributed stream computing systems . . ??
Nguyen Khoi Tran and
M. Ali Babar and
Andrew Walters A framework for automating deployment
and evaluation of blockchain networks ??
Qianyu Long and
Kostas Kolomvatsos and
Christos Anagnostopoulos Knowledge reuse in edge computing
environments . . . . . . . . . . . . . . ??
Praveen Kumar Reddy Maddikunta and
Quoc-Viet Pham and
Dinh C. Nguyen and
Thien Huynh-The and
Ons Aouedi and
Gokul Yenduri and
Sweta Bhattacharya and
Thippa Reddy Gadekallu Incentive techniques for the Internet of
Things: a survey . . . . . . . . . . . . ??
Changue Jung and
Suhwan Kim and
Younghoon Kim and
Ikjun Yeom Virtualizing GPU direct packet I/O on
commodity Ethernet to accelerate GPU-NFV ??
Ahmed Elshrkasi and
Kaharudin Dimyati and
Khairol Amali Bin Ahmad and
Mohamed Faidz bin Mohamed Said Enhancement of cellular networks via an
improved clustering technique with D2D
communication for mission-critical
applications . . . . . . . . . . . . . . ??
Hisham Al-Ward and
Chee Keong Tan and
Wern Han Lim Caching transient data in
Information-Centric Internet-of-Things
(IC-IoT) networks: a survey . . . . . . ??
Fahimeh Dabaghi-Zarandi and
Parsa KamaliPour Community detection in complex network
based on an improved random algorithm
using local and global network
information . . . . . . . . . . . . . . ??
Anonymous November 2022 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Heng Ye and
Jiqiang Liu and
Hao Zhen and
Wenbin Jiang and
Bin Wang and
Wei Wang VREFL: Verifiable and
Reconnection-Efficient Federated
Learning in IoT scenarios . . . . . . . ??
Syed M. Raza and
Boyun Jang and
Huigyu Yang and
Moonseong Kim and
Hyunseung Choo Improved GAN with fact forcing for
mobility prediction . . . . . . . . . . ??
Ruiyun Yu and
Ann Move Oguti and
Dennis Reagan Ochora and
Shuchen Li Towards a privacy-preserving smart
contract-based data aggregation and
quality-driven incentive mechanism for
mobile crowdsensing . . . . . . . . . . ??
Mustafa Ibrahim Khaleel PPR-RM: Performance-to-Power Ratio,
Reliability and Makespan-aware
scientific workflow scheduling based on
a coalitional game in the cloud . . . . ??
Yuxian Liu and
Fagui Liu and
Hao-Tian Wu and
Jingfeng Yang and
Kaihong Zheng and
Lingling Xu and
Xingfu Yan and
Jiankun Hu RPTD: Reliability-enhanced
Privacy-preserving Truth Discovery for
Mobile Crowdsensing . . . . . . . . . . ??
Gonzalo Munilla Garrido and
Johannes Sedlmeir and
Ömer Uluda\ug and
Ilias Soto Alaoui and
Andre Luckow and
Florian Matthes Revealing the landscape of
privacy-enhancing technologies in the
context of data markets for the IoT: a
systematic literature review . . . . . . ??
Khalid A. Darabkh and
Muna Al-Akhras and
Jumana N. Zomot and
Mohammed Atiquzzaman RPL routing protocol over IoT: a
comprehensive survey, recent advances,
insights, bibliometric analysis,
recommendations, and future directions ??
Muhammad Morshed Alam and
Muhammad Yeasir Arafat and
Sangman Moh and
Jian Shen Topology control algorithms in
multi-unmanned aerial vehicle networks:
an extensive survey . . . . . . . . . . ??
Ying Pan and
Na Lyu and
Chungang Yang GOR: Group-oblivious multicast routing
in airborne tactical networks under
uncertainty . . . . . . . . . . . . . . ??
Gengbiao Shen and
Qing Li and
Wanxin Shi and
Yong Jiang and
Pei Zhang and
Liang Gu and
Mingwei Xu Modeling and optimization of the data
plane in the SDN-based DCN by queuing
theory . . . . . . . . . . . . . . . . . ??
Gaoyang Shan and
Byeong-hee Roh A slotted random request scheme for
connectionless data transmission in
bluetooth low energy 5.0 . . . . . . . . ??
Bharat Dwivedi and
Debarati Sen and
Sandip Chakraborty A survey of longitudinal changes in
cellular network architecture: the good,
the bad, and the ugly . . . . . . . . . ??
Ansif Arooj and
Muhammad Shoaib Farooq and
Tariq Umer Unfolding the blockchain era: Timeline,
evolution, types and real-world
applications . . . . . . . . . . . . . . ??
A. Zeynivand and
A. Javadpour and
S. Bolouki and
A. K. Sangaiah and
F. Ja'fari and
P. Pinto and
W. Zhang Traffic flow control using multi-agent
reinforcement learning . . . . . . . . . ??
Xinyin Xiang and
Jin Cao and
Weiguo Fan Decentralized authentication and access
control protocol for blockchain-based
e-health systems . . . . . . . . . . . . ??
Mehrnoosh Monshizadeh and
Vikramajeet Khatri and
Raimo Kantola and
Zheng Yan A deep density based and
self-determining clustering approach to
label unknown traffic . . . . . . . . . ??
Anonymous December 2022 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Sang-Hoon Choi and
Ki-Woong Park \em iContainer: Consecutive
checkpointing with rapid resilience for
immortal container-based services . . . ??
Jaehyun Nam and
Seung Ho Na and
Seungwon Shin and
Taejune Park Reconfigurable regular expression
matching architecture for real-time
pattern update and payload inspection ??
Guangyao Zhou and
Ruiming Wen and
Wenhong Tian and
Rajkumar Buyya Deep reinforcement learning-based
algorithms selectors for the resource
scheduling in hierarchical Cloud
computing . . . . . . . . . . . . . . . ??
Souha Masmoudi and
Maryline Laurent and
Nesrine Kaaniche PIMA: a Privacy-preserving Identity
management system based on an unlinkable
MAlleable signature . . . . . . . . . . ??
Usman Saleh Toro and
Basem M. ElHalawany and
Aslan B. Wong and
Lu Wang and
Kaishun Wu Backscatter communication-based wireless
sensing (BBWS): Performance enhancement
and future applications . . . . . . . . ??
Marcello Cinque and
Raffaele Della Corte and
Antonio Pecchia Micro2vec: Anomaly detection in
microservices systems by mining numeric
representations of computer logs . . . . ??
Vishesh Kumar Tanwar and
Balasubramanian Raman and
Rama Bhargava \em Crypt-OR: a privacy-preserving
distributed cloud computing framework
for object-removal in the encrypted
images . . . . . . . . . . . . . . . . . ??
Shie-Yuan Wang and
Hsin-Yin Fu Design, implementation, and performance
evaluation of an earliest-deadline-first
packet scheduling scheme in P4 hardware
switches . . . . . . . . . . . . . . . . ??
Anonymous January 2023 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous Reviewer Thankyou . . . . . . . . . . . ??
Sarah Qahtan and
Khaironi Yatim and
Hazura Zulzalil and
Mohd Hafeez Osman and
A. A. Zaidan and
H. A. Alsattar Review of Healthcare Industry 4.0
application-based blockchain in terms of
security and privacy development
attributes: Comprehensive taxonomy, open
issues and challenges and recommended
solution . . . . . . . . . . . . . . . . ??
Shiyong Li and
Huan Liu and
Wenzhe Li and
Wei Sun Optimal cross-layer resource allocation
in fog computing: a market-based
framework . . . . . . . . . . . . . . . ??
Erfan Arvan and
Mahshad Koohi Habibi Dehkordi and
Saeed Jalili Secured location-aware mobility-enabled
RPL . . . . . . . . . . . . . . . . . . ??
Zhuofan Liao and
Siwei Cheng RVC: a reputation and voting based
blockchain consensus mechanism for edge
computing-enabled IoT systems . . . . . ??
Mohammad Kamrul Hasan and
AKM Ahasan Habib and
Zarina Shukur and
Fazil Ibrahim and
Shayla Islam and
Md Abdur Razzaque Review on cyber-physical and
cyber-security system in smart grid:
Standards, protocols, constraints, and
recommendations . . . . . . . . . . . . ??
Ankit Gangwal and
Haripriya Ravali Gangavalli and
Apoorva Thirupathi A survey of Layer-two blockchain
protocols . . . . . . . . . . . . . . . ??
Nitul Dutta A bargain game theory assisted interest
packet forwarding strategy for
information centric network . . . . . . ??
Evrim Guler and
Murat Karakus and
Furkan Ayaz Genetic algorithm enabled virtual
multicast tree embedding in
Software-Defined Networks . . . . . . . ??
Prosper Zanu Sotenga and
Karim Djouani and
Anish Matthew Kurien A virtual gateway media access placement
approach for large-scale Internet of
Things . . . . . . . . . . . . . . . . . ??
Anonymous January 2023 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Can Zhang and
Liehuang Zhu and
Chang Xu and
Zijian Zhang and
Rongxing Lu EBDL: Effective blockchain-based covert
storage channel with dynamic labels . . ??
Da-ming Yu and
Zhen Zhang and
Yu-hui Deng and
Long-xin Lin and
Teng-jiao He and
Guang-liang He Flexible, highly scalable and
cost-effective network structures for
data centers . . . . . . . . . . . . . . ??
Panagiotis Bountakas and
Christos Xenakis HELPHED: Hybrid Ensemble Learning
PHishing Email Detection . . . . . . . . ??
Anonymous February 2023 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Hidaya Liazid and
Mohamed Lehsaini and
Abdelkrim Liazid Data transmission reduction using
prediction and aggregation techniques in
IoT-based wireless sensor networks . . . ??
Yadong Zhou and
Bowen Hu and
Junjie Zhang and
Liyuan Sun and
Xingyu Zhu and
Ting Liu Detecting suspicious transactions in a
virtual-currency-enabled online social
network . . . . . . . . . . . . . . . . ??
Maryam Songhorabadi and
Morteza Rahimi and
AmirMehdi MoghadamFarid and
Mostafa Haghi Kashani Fog computing approaches in IoT-enabled
smart cities . . . . . . . . . . . . . . ??
Imdad Ullah and
Salil S. Kanhere and
Roksana Boreli Privacy-preserving targeted mobile
advertising: a blockchain-based
framework for mobile ads . . . . . . . . ??
The-Vinh Nguyen and
Ngoc Phi Nguyen and
Cheonshik Kim and
Nhu-Ngoc Dao Intelligent aerial video streaming:
Achievements and challenges . . . . . . ??
Mustafa Al Samara and
Ismail Bennis and
Abdelhafid Abouaissa and
Pascal Lorenz Complete outlier detection and
classification framework for WSNs based
on OPTICS . . . . . . . . . . . . . . . ??
Linhao Cong and
Jia Yu and
Xinrui Ge Privacy preserving subgraph isomorphism
query for dynamic graph database . . . . ??
Anonymous March 2023 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Murad Ali Khan and
Naeem Iqbal and
Imran and
Harun Jamil and
Do-Hyeun Kim An optimized ensemble prediction model
using AutoML based on soft voting
classifier for network intrusion
detection . . . . . . . . . . . . . . . ??
Andrea Petroni and
Francesca Cuomo and
Gaetano Scarano and
Pietro Francia and
Marcello Pediconi and
Stefania Colonnese MUSE: MUlti-lead Sub-beat ECG for remote
AI based atrial fibrillation detection ??
Amin Shahraki and
Torsten Ohlenforst and
Felix Kreyß When machine learning meets Network
Management and Orchestration in
edge-based networking paradigms . . . . ??
Ahmed Elsheikh and
Ahmed S. Ibrahim and
Mahmoud H. Ismail Sequence-to-sequence learning for
link-scheduling in D2D communication
networks . . . . . . . . . . . . . . . . ??
Pedro Miguel Sánchez Sánchez and
José Mar\'ìa Jorquera Valero and
Alberto Huertas Celdrán and
Gérôme Bovet and
Manuel Gil Pérez and
Gregorio Mart\'ìnez Pérez A methodology to identify identical
single-board computers based on hardware
behavior fingerprinting . . . . . . . . ??
Mohammad Yahya Akhlaqi and
Zurina Binti Mohd Hanapi Task offloading paradigm in mobile edge
computing-current issues, adopted
approaches, and future directions . . . ??
Frederik Hauser and
Marco Häberle and
Daniel Merling and
Steffen Lindner and
Vladimir Gurevich and
Florian Zeiger and
Reinhard Frank and
Michael Menth A survey on data plane programming with
P4: Fundamentals, advances, and applied
research . . . . . . . . . . . . . . . . ??
Damiano Di Francesco Maesa and
Andrea Lisi and
Paolo Mori and
Laura Ricci and
Gianluca Boschi Self sovereign and blockchain based
access control: Supporting attributes
privacy with zero knowledge . . . . . . ??
Tao Yi and
Xingshu Chen and
Yi Zhu and
Weijing Ge and
Zhenhui Han Review on the application of deep
learning in network attack detection . . ??
Samira Afzal and
Vanessa Testoni and
Christian Esteve Rothenberg and
Prakash Kolan and
Imed Bouazizi A holistic survey of multipath wireless
video streaming . . . . . . . . . . . . ??
Mohamad Amar Irsyad Mohd Aminuddin and
Zarul Fitri Zaaba and
Azman Samsudin and
Faiz Zaki and
Nor Badrul Anuar The rise of website fingerprinting on
Tor: Analysis on techniques and
assumptions . . . . . . . . . . . . . . ??
Gianni D'Angelo and
Francesco Palmieri A co-evolutionary genetic algorithm for
robust and balanced controller placement
in software-defined networks . . . . . . ??
Andrea Tesei and
Domenico Lattuca and
Marco Luise and
Paolo Pagano and
Joaquim Ferreira and
Paulo C. Bartolomeu A transparent distributed ledger-based
certificate revocation scheme for VANETs ??
Nguyen Thi Hanh and
Huynh Thi Thanh Binh and
Vu Quang Truong and
Nguyen Phuc Tan and
Huynh Cong Phap Node placement optimization under
Q-Coverage and Q-Connectivity
constraints in wireless sensor networks ??
Anonymous April 2023 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Ángel G. Andrade and
Alexis Anzaldo Accelerated resource allocation based on
experience retention for B5G networks ??
Omer Gulec and
Emre Sahin Red Deer Algorithm based nano-sensor
node clustering for IoNT . . . . . . . . ??
Poornima M. R. and
Vimala H. S. and
Shreyas J. Holistic survey on energy aware routing
techniques for IoT applications . . . . ??
Yaping Wu and
Xili Wan and
Xinjie Guan and
Tingxiang Ji and
Feng Ye PGTCN: a novel password-guessing model
based on temporal convolution network ??
Elmustafa Sayed Ali and
Rashid A. Saeed and
Ibrahim Khider Eltahir and
Othman O. Khalifa A systematic review on energy efficiency
in the Internet of Underwater Things
(IoUT): Recent approaches and research
gaps . . . . . . . . . . . . . . . . . . ??
Nhu-Ngoc Dao and
Ngo Hoang Tu and
Tran Thien Thanh and
Vo Nguyen Quoc Bao and
Woongsoo Na and
Sungrae Cho Neglected infrastructures for
6G-Underwater communications: How mature
are they? . . . . . . . . . . . . . . . ??
Lamia Alkwai and
Abdelfettah Belghith and
Achraf Gazdar and
Saad AlAhmadi Awareness of user mobility in Named Data
Networking for IoT traffic under the
push communication mode . . . . . . . . ??
Mariusz Sepczuk Dynamic Web Application Firewall
detection supported by Cyber Mimic
Defense approach . . . . . . . . . . . . ??
Hirozumi Yamaguchi Book Review: \booktitleWireless and
Mobile Networking, Mahbub Hassan. CRC
Press (2022) . . . . . . . . . . . . . . ??
Pyry Veijalainen and
Themistoklis Charalambous and
Risto Wichman Feasibility of Bluetooth Low Energy for
motion capturing with Inertial
Measurement Units . . . . . . . . . . . ??
Dan Tang and
Dongshuo Zhang and
Zheng Qin and
Qiuwei Yang and
Sheng Xiao SFTO-Guard: Real-time detection and
mitigation system for slow-rate flow
table overflow attacks . . . . . . . . . ??
Huda Abualola and
Rabeb Mizouni and
Hadi Otrok and
Shakti Singh and
Hassan Barada A matching game-based crowdsourcing
framework for last-mile delivery:
Ground-vehicles and unmanned-aerial
vehicles . . . . . . . . . . . . . . . . ??
Minsu Kim and
Kwangsue Chung HTTP adaptive streaming scheme based on
reinforcement learning with edge
computing assistance . . . . . . . . . . ??
Peirong Li and
Wei Ou and
Haozhe Liang and
Wenbao Han and
Qionglu Zhang and
Guang Zeng A zero trust and blockchain-based
defense model for smart electric vehicle
chargers . . . . . . . . . . . . . . . . ??
Sami Abdellatif and
Okba Tibermacine and
Walid Bechkit and
Abdelmalik Bachir Heterogeneous IoT/LTE ProSe virtual
infrastructure for disaster situations ??
Xiaodong Zang and
Jian Gong and
Maoli Wang and
Peng Gao and
Guowei Zhang IP traffic behavior characterization via
semantic mining . . . . . . . . . . . . ??
Hassan Jalil Hadi and
Yue Cao and
Khaleeq Un Nisa and
Abdul Majid Jamil and
Qiang Ni A comprehensive survey on security,
privacy issues and emerging defence
technologies for UAVs . . . . . . . . . ??
Anonymous May 2023 . . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Lala Rajaoarisoa and
Nacer Kouider M'Sirdi and
Moamar Sayed-Mouchaweh and
Laurent Clavier Decentralized fault-tolerant controller
based on cooperative smart-wireless
sensors in large-scale buildings . . . . ??
Guowen Wu and
Lanlan Xie and
Hong Zhang and
Jianhua Wang and
Shigen Shen and
Shui Yu STSIR: an individual-group game-based
model for disclosing virus spread in
Social Internet of Things . . . . . . . ??
Ruijie Ou and
Gordon Owusu Boateng and
Daniel Ayepah-Mensah and
Guolin Sun and
Guisong Liu Stackelberg game-based dynamic resource
trading for network slicing in 5G
networks . . . . . . . . . . . . . . . . ??
Somayeh Yeganeh and
Amin Babazadeh Sangar and
Sadoon Azizi A novel $Q$-learning-based hybrid
algorithm for the optimal offloading and
scheduling in mobile edge computing
environments . . . . . . . . . . . . . . ??
Xingjia Li and
Li Pan and
Shijun Liu An online service provisioning strategy
for container-based cloud brokers . . . ??
Maryam Mohammadzad and
Jaber Karimpour Using rootkits hiding techniques to
conceal honeypot functionality . . . . . ??
Sumitra and
Meetha V. Shenoy HFedDI: a novel privacy preserving
horizontal federated learning based
scheme for IoT device identification . . ??
Wei Yao and
Han Shi and
Hai Zhao Scalable anomaly-based intrusion
detection for secure Internet of Things
using generative adversarial networks in
fog environment . . . . . . . . . . . . ??
Madhusanka Liyanage and
An Braeken and
Shahriar Shahabuddin and
Pasika Ranaweera Open RAN security: Challenges and
opportunities . . . . . . . . . . . . . ??
Anonymous June 2023 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Binayak Kar and
Ying-Dar Lin and
Yuan-Cheng Lai Cost optimization of omnidirectional
offloading in two-tier cloud-edge
federated systems . . . . . . . . . . . ??
Xiuwen Sun and
Da Mo and
Di Wu and
Chunhui Ye and
Qingying Yu and
Jie Cui and
Hong Zhong Efficient regular expression matching
over hybrid dictionary-based compressed
data . . . . . . . . . . . . . . . . . . ??
Andrew J and
Deva Priya Isravel and
K. Martin Sagayam and
Bharat Bhushan and
Yuichi Sei and
Jennifer Eunice Blockchain for healthcare systems:
Architecture, security challenges,
trends and future directions . . . . . . ??
Azad Jalalian and
Saleh Yousefi and
Thomas Kunz Network slicing in virtualized 5G Core
with VNF sharing . . . . . . . . . . . . ??
Abhishek Narwaria and
Arka Prokash Mazumdar Software-Defined Wireless Sensor
Network: a Comprehensive Survey . . . . ??
Mudhafar Nuaimi and
Lamia Chaari Fourati and
Bassem Ben Hamed Intelligent approaches toward intrusion
detection systems for Industrial
Internet of Things: a systematic
comprehensive review . . . . . . . . . . ??
Gustavo Diel and
Charles Christian Miers and
Maurício Aronne Pillon and
Guilherme Piêgas Koslovski RSCAT: Towards zero touch congestion
control based on actor--critic
reinforcement learning and
software-defined networking . . . . . . ??
Luca Bedogni and
Federico Montori Joint privacy and data quality aware
reward in opportunistic Mobile
Crowdsensing systems . . . . . . . . . . ??
Uchechukwu Awada and
Jiankang Zhang and
Sheng Chen and
Shuangzhi Li and
Shouyi Yang EdgeDrones: Co-scheduling of drones for
multi-location aerial computing missions ??
Ana Larrañaga and
M. Carmen Lucas-Estañ and
Sandra Lagén and
Zoraze Ali and
Imanol Martinez and
Javier Gozalvez An open-source implementation and
validation of 5G NR configured grant for
URLLC in ns-3 5G LENA: a scheduling case
study in industry 4.0 scenarios . . . . ??
Adarsh Kumar and
Neelu Jyothi Ahuja and
Monika Thapliyal and
Sarthika Dutt and
Tanesh Kumar and
Diego Augusto De Jesus Pacheco and
Charalambos Konstantinou and
Kim-Kwang Raymond Choo Blockchain for unmanned underwater
drones: Research issues, challenges,
trends and future directions . . . . . . ??
Sana Sharif and
Sherali Zeadally and
Waleed Ejaz Space--aerial--ground--sea integrated
networks: Resource optimization and
challenges in 6G . . . . . . . . . . . . ??
Anonymous July 2023 . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Gokulnath Thandavarayan and
Miguel Sepulcre and
Javier Gozalvez and
Baldomero Coll-Perales Scalable cooperative perception for
connected and automated driving . . . . ??
Collin Connors and
Dilip Sarkar Survey of prominent blockchain
development platforms . . . . . . . . . ??
Shreshth Tuli and
Fatemeh Mirhakimi and
Samodha Pallewatta and
Syed Zawad and
Giuliano Casale and
Bahman Javadi and
Feng Yan and
Rajkumar Buyya and
Nicholas R. Jennings AI augmented Edge and Fog computing:
Trends and challenges . . . . . . . . . ??
Oluwatosin Ahmed Amodu and
Umar Ali Bukar and
Raja Azlina Raja Mahmood and
Chedia Jarray and
Mohamed Othman Age of Information minimization in
UAV-aided data collection for WSN and
IoT applications: a systematic review ??
Mahmoud M. Salim and
Hussein A. Elsayed and
Mohamed S. Abdalzaher A survey on essential challenges in
relay-aided D2D communication for
next-generation cellular networks . . . ??
Dapeng Qu and
Jun Wu and
Jiankun Zhang and
Chengxi Gao and
Haiying Shen and
Keqin Li Efficient congestion control scheme
based on caching strategy in NDN . . . . ??
Yifei Lu and
Changjiang Cui and
Xu Ma and
Zeqi Ruan A $^3$DCT: a cubic acceleration TCP for
data center networks . . . . . . . . . . ??
Junna Zhang and
Jiawei Chen and
Xiang Bao and
Chunhong Liu and
Peiyan Yuan and
Xinglin Zhang and
Shangguang Wang Dependent task offloading mechanism for
cloud-edge-device collaboration . . . . ??
Isra M. Ali and
Noureddine Lasla and
Mohamed M. Abdallah and
Aiman Erbad SRP: an Efficient Runtime Protection
Framework for Blockchain-based Smart
Contracts . . . . . . . . . . . . . . . ??
Diego Hortelano and
Ignacio de Miguel and
Ramón J. Durán Barroso and
Juan Carlos Aguado and
Noem\'ì Merayo and
Lidia Ruiz and
Adrian Asensio and
Xavi Masip-Bruin and
Patricia Fernández and
Rubén M. Lorenzo and
Evaristo J. Abril A comprehensive survey on
reinforcement-learning-based computation
offloading techniques in Edge Computing
Systems . . . . . . . . . . . . . . . . ??
Kaddour Messaoudi and
Omar Sami Oubbati and
Abderrezak Rachedi and
Abderrahmane Lakas and
Tahar Bendouma and
Noureddine Chaib A survey of UAV-based data collection:
Challenges, solutions and future
perspectives . . . . . . . . . . . . . . ??
Xiaojun Cheng and
Xuyang Jing and
Zheng Yan and
Xian Li and
Pu Wang and
Wei Wu ALSketch: an adaptive learning-based
sketch for accurate network measurement
under dynamic traffic distribution . . . ??
Xiaohan Tu and
Chuanhao Zhang and
Siping Liu and
Cheng Xu and
Renfa Li Point cloud segmentation of overhead
contact systems with deep learning in
high-speed rails . . . . . . . . . . . . ??
Anonymous August 2023 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Aitor Belenguer and
Jose A. Pascual and
Javier Navaridas GöwFed: a novel federated network
intrusion detection system . . . . . . . ??
Jiang Shao and
Minglin Li and
Xinyi Li and
Guowei Liu and
Sen Liu and
Bin Liu and
Yang Xu RaceCC: a rapidly converging explicit
congestion control for datacenter
networks . . . . . . . . . . . . . . . . ??
Ying Wang and
Fengjun Shang and
Jianjun Lei Energy-efficient and delay-guaranteed
routing algorithm for software-defined
wireless sensor networks: a cooperative
deep reinforcement learning approach . . ??
Thomas Lavaur and
Jonathan Detchart and
Jérôme Lacan and
Caroline P. C. Chanel Modular zk-rollup on-demand . . . . . . ??
Saeed Banaeian Far and
Azadeh Imani Rad and
Seyed Mojtaba Hosseini Bamakan and
Maryam Rajabzadeh Asaar Toward Metaverse of everything:
Opportunities, challenges, and future
directions of the next generation of
visual/virtual communications . . . . . ??
Abu Jahid and
Mohammed H. Alsharif and
Trevor J. Hall The convergence of blockchain, IoT and
6G: Potential, opportunities, challenges
and research roadmap . . . . . . . . . . ??
Roberto G. Pacheco and
Rodrigo S. Couto and
Osvaldo Simeone On the impact of deep neural network
calibration on adaptive edge offloading
for image classification . . . . . . . . ??
Daniel Chaves Temp and
Paulo Silas Severo de Souza and
Arthur Francisco Lorenzon and
Marcelo Caggiani Luizelli and
Fábio Diniz Rossi Mobility-Aware Registry Migration for
Containerized Applications on Edge
Computing Infrastructures . . . . . . . ??
Huihui Ma and
Du Xu An INT-based TCP window modulator for
congestion control in data center
networks . . . . . . . . . . . . . . . . ??
Mingru Dong and
Haibin Li and
Yongtao Hu and
Haocai Huang Learning automaton-based
energy-efficient and fault-tolerant
topology evolution algorithm for
underwater acoustic sensor network . . . ??
Yi Li and
Jinsong Wang and
Hongwei Zhang A survey of state-of-the-art sharding
blockchains: Models, components, and
attack surfaces . . . . . . . . . . . . ??
Ioannis Dimolitsas and
Dimitrios Dechouniotis and
Symeon Papavassiliou Time-efficient distributed virtual
network embedding for round-trip delay
minimization . . . . . . . . . . . . . . ??
Chunghyun Lee and
Junsuk Oh and
Woongsoo Na and
Jongha Yoon and
Wonjong Noh and
Sungrae Cho Directional-antenna-based spatial and
energy-efficient semi-distributed
spectrum sensing in cognitive
Internet-of-Things networks . . . . . . ??
Ammar Hassan and
Imran Makhdoom and
Waseem Iqbal and
Awais Ahmad and
Asad Raza From trust to truth: Advancements in
mitigating the Blockchain Oracle problem ??
Rakib Ul Haque and
A. S. M. Touhidul Hasan and
Apubra Daria and
Abdur Rasool and
Hui Chen and
Qingshan Jiang and
Yuqing Zhang A novel secure and distributed
architecture for privacy-preserving
healthcare system . . . . . . . . . . . ??
Zhongwei Huang and
Dagang Li and
Jun Cai and
Hua Lu Collective reinforcement learning based
resource allocation for digital twin
service in 6G networks . . . . . . . . . ??
Jin Wang and
Shuying Rao and
Ying Liu and
Pradip Kumar Sharma and
Jinbin Hu Load balancing for heterogeneous traffic
in datacenter networks . . . . . . . . . ??
Mahbubun Nahar and
A. H. M. Kamal and
Gahangir Hossain Protecting health data in the cloud
through steganography: a table-driven,
blind method using neural networks and
bit-shuffling algorithm . . . . . . . . ??
Jorge Eduardo Rivadeneira and
Jorge Sá Silva and
Ricardo Colomo-Palacios and
André Rodrigues and
Fernando Boavida User-centric privacy preserving models
for a new era of the Internet of Things ??
Abolfazl Sajadi and
Ahmad Shabani and
Bijan Alizadeh DC-PUF: Machine learning-resistant
PUF-based authentication protocol using
dependency chain for resource-constraint
IoT devices . . . . . . . . . . . . . . ??
Hua Qin and
Weimin Chen and
Ni Li and
Tao Wang and
Hao Chen and
Gelan Yang and
Yang Peng CPS: Cross-interface network
Partitioning and Scheduling towards
QoS-aware data flow delivery in
multimedia IoT . . . . . . . . . . . . . ??
Luca Verderame and
Antonio Ruggia and
Alessio Merlo PARIOT: Anti-repackaging for IoT
firmware integrity . . . . . . . . . . . ??
Mohammed Atiquzzaman Editorial: 2021 Best Paper Awards . . . ??
Anonymous September 2023 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Luis de Pedro and
Adrian Mihai Rosu and
Jorge E. López de Vergara Server load estimation by Burr
distribution mixture analysis of TCP SYN
response time . . . . . . . . . . . . . ??
Changbo Tian and
Shuyuan Zhao and
Zhenyu Cheng AntCom: an effective and efficient
anti-tracking system with dynamic and
asymmetric communication channel . . . . ??
Ji Huang and
Yinghao Lu and
Zhenlong Xiao and
Xin Wang A novel distributed multi-slot
TDMA-based MAC protocol for LED-based
UOWC networks . . . . . . . . . . . . . ??
Pascal Maniriho and
Abdun Naser Mahmood and
Mohammad Jabed Morshed Chowdhury API-MalDetect: Automated malware
detection framework for windows based on
API calls and deep learning techniques ??
Alejandro Llorens-Carrodeguas and
Cristina Cervelló-Pastor and
Francisco Valera DQN-based intelligent controller for
multiple edge domains . . . . . . . . . ??
Khalid M. Hosny and
Ahmed I. Awad and
Marwa M. Khashaba and
Mostafa M. Fouda and
Mohsen Guizani and
Ehab R. Mohamed Enhanced multi-objective gorilla troops
optimizer for real-time multi-user
dependent tasks offloading in edge-cloud
computing . . . . . . . . . . . . . . . ??
Jie Sun and
Tianyu Wo and
Xudong Liu and
Tianjiao Ma and
Xudong Mou and
Jinghong Lan and
Nan Zhang and
Jianwei Niu Scalable inter-domain network
virtualization . . . . . . . . . . . . . ??
Juan Wang and
Wenzhe Yi and
Mengda Yang and
Jiaci Ma and
Shengzhi Zhang and
Shirong Hao Enhance the trust between IoT devices,
mobile apps, and the cloud based on
blockchain . . . . . . . . . . . . . . . ??
Wojciech Niewolski and
Tomasz W. Nowak and
Mariusz Sepczuk and
Zbigniew Kotulski Security architecture for authorized
anonymous communication in 5G MEC . . . ??
Junwei Liang and
Muhammad Sadiq and
Geng Yang and
Dongsheng Cheng BAC-CRL: Blockchain-Assisted Coded
Caching Certificate Revocation List for
Authentication in VANETs . . . . . . . . ??
Bo Yin and
Yihu Liu and
Binyao Xu and
Hang Chen and
Sai Tang TTAF: a two-tier task assignment
framework for cooperative unit-based
crowdsourcing systems . . . . . . . . . ??
Zhuofan Liao and
Xiangyu Zhang and
Shiming He and
Qiang Tang PMP: a partition-match parallel
mechanism for DNN inference acceleration
in cloud-edge collaborative environments ??
Anonymous October 2023 . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Asma Bechkit and
Ali Melit One-shot models for local core network
placement and traffic optimization in
self deployable networks . . . . . . . . ??
Bolin Song and
Xiaoyu Wang and
Peng Sun and
Azzedine Boukerche Robust COVID-19 vaccination control in a
multi-city dynamic transmission network:
a novel reinforcement learning-based
approach . . . . . . . . . . . . . . . . ??
Vamshi Sunku Mohan and
Sriram Sankaran and
Priyadarsi Nanda and
Krishnashree Achuthan Enabling secure lightweight mobile
Narrowband Internet of Things (NB-IoT)
applications using blockchain . . . . . ??
Mobasshir Mahbub and
Raed M. Shubair Contemporary advances in multi-access
edge computing: a survey of
fundamentals, architecture,
technologies, deployment cases,
security, challenges, and directions . . ??
Ziyi Hu and
Yue Cao and
Xinyu Li and
Yongdong Zhu and
Muhammad Khalid and
Naveed Ahmad Autonomous valet parking optimization
with two-step reservation and pricing
strategy . . . . . . . . . . . . . . . . ??
Alberto García Pérez and
Antonio López Martínez and
Manuel Gil Pérez Adaptive vulnerability-based risk
identification software with
virtualization functions for dynamic
management . . . . . . . . . . . . . . . ??
Krzysztof Ostrowski and
Krzysztof Ma\lecki and
Piotr Dziurza\'nski and
Amit Kumar Singh Mobility-aware fog computing in dynamic
networks with mobile nodes: a survey . . ??
Chenjing Tian and
Haotong Cao and
Jun Xie and
Sahil Garg and
Joel J. P. C. Rodrigues and
M. Shamim Hossain MADDPG-empowered slice reconfiguration
approach for 5G multi-tier system . . . ??
Kaixi Wang and
Yunhe Cui and
Qing Qian and
Yi Chen and
Chun Guo and
Guowei Shen USAGE: Uncertain flow graph and
spatio-temporal graph convolutional
network-based saturation attack
detection method . . . . . . . . . . . . ??
Waqar Amin and
Fawad Hussain and
Sheraz Anjum and
Sharoon Saleem and
Naveed Khan Baloch and
Yousaf Bin Zikria and
Heejung Yu Efficient application mapping approach
based on grey wolf optimization for
network on chip . . . . . . . . . . . . ??
Linyao Zheng and
Meiqin Liu and
Senlin Zhang An end-to-end sensor scheduling method
based on D3QN for underwater passive
tracking in UWSNs . . . . . . . . . . . ??
Anonymous November 2023 . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Hongjian Zeng and
Yonghua Xiong and
Jinhua She An evolutionary multi-task assignment
method adapting to travel convenience in
mobile crowdsensing . . . . . . . . . . ??
Badra Souhila Guendouzi and
Samir Ouchani and
Hiba EL Assaad and
Madeleine EL Zaher A systematic review of federated
learning: Challenges, aggregation
methods, and development tools . . . . . ??
Mebanjop Kharjana and
Fabiola Hazel Pohrmen and
Subhas Chandra Sahana and
Goutam Saha Blockchain-based key management system
in Named Data Networking: a survey . . . ??
Haoyu Yin and
Yingjian Liu and
Yue Li and
Zhongwen Guo and
Yu Wang Defeating deep learning based
de-anonymization attacks with
adversarial example . . . . . . . . . . ??
Niclas Ilg and
Paul Duplys and
Dominik Sisejkovic and
Michael Menth A survey of contemporary open-source
honeypots, frameworks, and tools . . . . ??
Hoang V. Vo and
Hanh P. Du and
Hoa N. Nguyen AI-powered intrusion detection in
large-scale traffic networks based on
flow sensing strategy and parallel deep
analysis . . . . . . . . . . . . . . . . ??
Linna Wei and
Wenlong Huang and
Wei Zhao and
Xuangou Wu and
Xiao Zheng Boundary node detection in wireless
networks with uneven node distribution
on open surfaces . . . . . . . . . . . . ??
Bin Yu and
He Zhao and
Tong Zhou and
Nianzu Sheng and
Xiaofeng Li and
Jinlin Xu OverShard: Scaling blockchain by full
sharding with overlapping network and
virtual accounts . . . . . . . . . . . . ??
Hamza Kheddar and
Yassine Himeur and
Ali Ismail Awad Deep transfer learning for intrusion
detection in industrial control
networks: a comprehensive review . . . . ??
Yingya Guo and
Yufei Peng and
Run Hao and
Xiang Tang Capturing spatial-temporal correlations
with Attention based Graph Convolutional
Network for network traffic prediction ??
Zarrin Tasnim Sworna and
Zahra Mousavi and
Muhammad Ali Babar NLP methods in host-based intrusion
detection systems: a systematic review
and future directions . . . . . . . . . ??
Guangxuan He and
Chunlin Li and
Yong Shu and
Youlong Luo Fine-grained access control policy in
blockchain-enabled edge computing . . . ??
Peiying Zhang and
Zhihu Luo and
Neeraj Kumar and
Mohsen Guizani and
Hongxia Zhang and
Jian Wang CE-VNE: Constraint escalation virtual
network embedding algorithm assisted by
graph convolutional networks . . . . . . ??
Anitha P. and
H. S. Vimala and
Shreyas J. Comprehensive review on congestion
detection, alleviation, and control for
IoT networks . . . . . . . . . . . . . . ??
Fatma Foad Ashrif and
Elankovan A. Sundararajan and
Rami Ahmad and
Mohammad Kamrul Hasan and
Elaheh Yadegaridehkordi Survey on the authentication and key
agreement of 6LoWPAN: Open issues and
future direction . . . . . . . . . . . . ??
Shaik Sharmila and
Ch Aparna Tracing footprints of anti-forensics and
assuring secured data transmission in
the cloud using an effective ECCDH and
Kalman Filter . . . . . . . . . . . . . ??
Angel Cañete and
Mercedes Amor and
Lidia Fuentes HADES: an NFV solution for
energy-efficient placement and resource
allocation in heterogeneous
infrastructures . . . . . . . . . . . . ??
Jean Nestor M. Dahj and
Kingsley A. Ogudo and
Leandro Boonzaaier A hybrid analytical concept to QoE index
evaluation: Enhancing eMBB service
detection in 5G SA networks . . . . . . ??
Pranjal Kumar Nandi and
Md. Rejaul Islam Reaj and
Sujan Sarker and
Md. Abdur Razzaque and
Md. Mamun-or-Rashid and
Palash Roy Task offloading to edge cloud balancing
utility and cost for energy harvesting
Internet of Things . . . . . . . . . . . ??
Shunmugapriya Ramanathan and
Abhishek Bhattacharyya and
Koteswararao Kondepu and
Andrea Fumagalli Enabling containerized Central Unit live
migration in 5G radio access network: an
experimental study . . . . . . . . . . . ??
Ruijin Wang and
Jinshan Lai and
Xiong Li and
Donglin He and
Muhammad Khurram Khan RPIFL: Reliable and Privacy-Preserving
Federated Learning for the Internet of
Things . . . . . . . . . . . . . . . . . ??
Wu Chen and
Jiayi Zhu and
Jiajia Liu and
Hongzhi Guo A fast coordination approach for
large-scale drone swarm . . . . . . . . ??
Ali Nauman and
Haya Mesfer Alshahrani and
Nadhem Nemri and
Kamal M. Othman and
Nojood O. Aljehane and
Mashael Maashi and
Ashit Kumar Dutta and
Mohammed Assiri and
Wali Ullah Khan Dynamic resource management in
integrated NOMA terrestrial-satellite
networks using multi-agent reinforcement
learning . . . . . . . . . . . . . . . . ??
Dénes László Fekete and
Attila Kiss Trust-minimized optimistic cross-rollup
arbitrary message bridge . . . . . . . . ??
Miguel Rodríguez-Pérez and
Sergio Herrería-Alonso and
J. Carlos López-Ardao and
Raúl F. Rodríguez-Rubio End-to-end active queue management with
Named-Data Networking . . . . . . . . . ??
Sachin Kadam and
Kaustubh S. Bhargao and
Gaurav S. Kasbekar Node cardinality estimation in a
heterogeneous wireless network deployed
over a large region using a mobile base
station . . . . . . . . . . . . . . . . ??
S. Periyanayagi and
S. P. Raja and
S. Vairachilai Multipoint communication using a
fog-robotic coordinated nodal conveying
system for wireless networks . . . . . . ??
Ala Altaweel and
Sidra Aslam and
Ibrahim Kamel Security attacks in Opportunistic Mobile
Networks: a systematic literature review ??
Songyut Phoemphon and
Nutthanon Leelathakul and
Chakchai So-In An enhanced node segmentation and
distance estimation scheme with a
reduced search space boundary and
improved PSO for obstacle-aware wireless
sensor network localization . . . . . . ??
Shahid Latif and
Wadii Boulila and
Anis Koubaa and
Zhuo Zou and
Jawad Ahmad DTL-IDS: an optimized Intrusion
Detection Framework using Deep Transfer
Learning and Genetic Algorithm . . . . . ??
Rongji Liao and
Yuan Zhang and
Jinyao Yan and
Yang Cai and
Narisu Tao STOP: Joint send buffer and transmission
control for user-perceived deadline
guarantee via curriculum guided-deep
reinforcement learning . . . . . . . . . ??
Mustafa Ibrahim Khaleel Region-aware dynamic job scheduling and
resource efficiency for load balancing
based on adaptive chaotic sparrow search
optimization and coalitional game in
cloud computing environments . . . . . . ??
Shie-Yuan Wang and
Cheng-Da Lin Using deep reinforcement learning to
train and periodically re-train a
data-collecting drone based on real-life
measurements . . . . . . . . . . . . . . ??
Cristiano Costa Argemon Vieira and
Luiz Fernando Bittencourt and
Thiago Augusto Lopes Genez and
Maycon Leone M. Peixoto and
Edmundo Roberto Mauro Madeira RAaaS: Resource Allocation as a Service
in multiple cloud providers . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous Reviewer Thankyou . . . . . . . . . . . ??
Anonymous January 2024 . . . . . . . . . . . . . . ??
Mohammed Alabbad and
Neerja Mhaskar and
Ridha Khedri Two formal design solutions for the
generalization of network segmentation ??
Puneet Kumar and
Behnam Dezfouli quicSDN: Transitioning from TCP to QUIC
for southbound communication in
software-defined networks . . . . . . . ??
Zihang Zhen and
Xiaoding Wang and
Hui Lin and
Sahil Garg and
Prabhat Kumar and
M. Shamim Hossain A dynamic state sharding blockchain
architecture for scalable and secure
crowdsourcing systems . . . . . . . . . ??
Sabir Saheel and
Anik Alvi and
Aninda Roy Ani and
Tarem Ahmed and
Mohammad Faisal Uddin Semi-supervised, neural network based
approaches to face mask and anomaly
detection in surveillance networks . . . ??
Gabriel F. C. de Queiroz and
José F. de Rezende and
Valmir C. Barbosa A flexible algorithm to offload DAG
applications for edge computing . . . . ??
Yuxiao Qi and
Li Pan and
Shijun Liu An online bi-objective scheduling
algorithm for service provisioning in
cloud computing . . . . . . . . . . . . ??
Shahmir Khan Mohammed and
Shakti Singh and
Rabeb Mizouni and
Hadi Otrok TRACE: Transformer-based continuous
tracking framework using IoT and MCS . . ??
Mohammed Shurrab and
Dunia Mahboobeh and
Rabeb Mizouni and
Shakti Singh and
Hadi Otrok Overcoming cold start and sensor bias: a
deep learning-based framework for
IoT-enabled monitoring applications . . ??
Hongwei Zhang and
Wei Fan and
Jinsong Wang Bidirectional utilization of blockchain
and privacy computing: Issues, progress,
and challenges . . . . . . . . . . . . . ??
Wanqi Yang and
Pengfei Chen and
Guangba Yu and
Haibin Zhang and
Huxing Zhang Network shortcut in data plane of
service mesh with eBPF . . . . . . . . . ??
Ali El Kamel Using FlowVisor and evolutionary
algorithms to improve the switch
migration in SDN . . . . . . . . . . . . ??
David Herranz-Oliveros and
Ivan Marsa-Maestre and
Jose Manuel Gimenez-Guzman and
Marino Tejedor-Romero and
Enrique de la Hoz Surgical immunization strategies against
lateral movement in Active Directory
environments . . . . . . . . . . . . . . ??
Yuanhang Qi and
M. Shamim Hossain Harnessing federated generative learning
for green and sustainable Internet of
Things . . . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous February 2024 . . . . . . . . . . . . . ??
Shah Zeb and
Aamir Mahmood and
Sunder Ali Khowaja and
Kapal Dev and
Syed Ali Hassan and
Mikael Gidlund and
Paolo Bellavista Towards defining Industry 5.0 vision
with intelligent and softwarized
wireless network architectures and
services: a survey . . . . . . . . . . . ??
Harpreet Kaur and
Simranjit Singh and
Ranjit Kaur and
Rajandeep Singh Advances in fronthauling of
communication technologies: a review . . ??
Muna Al-Hawawreh and
Mamoun Alazab and
Mohamed Amine Ferrag and
M. Shamim Hossain Securing the Industrial Internet of
Things against ransomware attacks: a
comprehensive analysis of the emerging
threat landscape and detection
mechanisms . . . . . . . . . . . . . . . ??
Vincenzo Agate and
Pierluca Ferraro and
Giuseppe Lo Re and
Sajal K. Das BLIND: a privacy preserving truth
discovery system for mobile crowdsensing ??
Eunjin Kim and
Junsu Kim and
Jae-Hyun Kim and
Howon Lee HiMAQ: Hierarchical multi-agent
Q-learning-based throughput and fairness
improvement for UAV-Aided IoT networks ??
Ming Zhou and
Zhen Yang and
Haiyang Yu and
Shui Yu VDFChain: Secure and verifiable
decentralized federated learning via
committee-based blockchain . . . . . . . ??
Xiaobo Yu and
Weizhi Meng and
Yining Liu and
Fei Zhou TridentShell: an enhanced covert and
scalable backdoor injection attack on
web applications . . . . . . . . . . . . ??
Naser AlDuaij mPillBox: an open framework for a
smarter pillbox . . . . . . . . . . . . ??
Omar Lajam and
Salahadin Mohammed Optimizing efficiency of P2P content
distribution with network coding:
Principles, challenges, and future
directions . . . . . . . . . . . . . . . ??
Hao Hao and
Wei Ding and
Wei Zhang Time-continuous computing offloading
algorithm with user fairness guarantee ??
Muhammad Adil and
Houbing Song and
Muhammad Khurram Khan and
Ahmed Farouk and
Zhanpeng Jin 5G/6G-enabled metaverse technologies:
Taxonomy, applications, and open
security challenges with future research
directions . . . . . . . . . . . . . . . ??
Jeongho Kang and
Kwangsue Chung RL-based HTTP adaptive streaming with
edge collaboration in multi-client
environment . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous March 2024 . . . . . . . . . . . . . . . ??
Ali Y. Aldailamy and
Abdullah Muhammed and
Rohaya Latip and
Nor Asilah Wati Abdul Hamid and
Waidah Ismail Online dynamic replication and placement
algorithms for cost optimization of
online social networks in two-tier
multi-cloud . . . . . . . . . . . . . . ??
Peiying Zhang and
Kunkun Yan and
Neeraj Kumar and
Lizhuang Tan and
Mohsen Guizani and
Konstantin Igorevich Kostromitin and
Jian Wang and
Jianyong Zhang A service function chain mapping scheme
based on functional aggregation in
space-air-ground integrated networks . . ??
Awnish Kumar and
Vijaya V. Saradhi and
Venkatesh Tamarapalli Compressive sensing of Internet traffic
data using relative-error bound
tensor-CUR decomposition . . . . . . . . ??
Dipanwita Sadhukhan and
Sangram Ray and
Mou Dasgupta and
Muhammad Khurram Khan Development of a provably secure and
privacy-preserving lightweight
authentication scheme for roaming
services in global mobility network . . ??
Shariq Murtuza and
Krishna Asawa Early Prevention and Mitigation of Link
Flooding Attacks in Software Defined
Networks . . . . . . . . . . . . . . . . ??
Abeer Z. Al-Marridi and
Amr Mohamed and
Aiman Erbad Optimized blockchain-based healthcare
framework empowered by mixed multi-agent
reinforcement learning . . . . . . . . . ??
Juhwan Kim and
Jihyeon Yu and
Youngwoo Lee and
Dan Dongseong Kim and
Joobeom Yun HD-FUZZ: Hardware dependency-aware
firmware fuzzing via hybrid MMIO
modeling . . . . . . . . . . . . . . . . ??
Tao Peng and
Wei You and
Kejian Guan and
Entao Luo and
Shaobo Zhang and
Guojun Wang and
Tian Wang and
Youke Wu Privacy-preserving multiobjective task
assignment scheme with differential
obfuscation in mobile crowdsensing . . . ??
Faheem Ullah and
Shagun Dhingra and
Xiaoyu Xia and
M. Ali Babar Evaluation of distributed data
processing frameworks in hybrid clouds ??
Ngangbam Indrason and
Goutam Saha Exploring Blockchain-driven security in
SDN-based IoT networks . . . . . . . . . ??
Pedro Horchulhack and
Eduardo K. Viegas and
Altair O. Santin and
Felipe V. Ramos and
Pietro Tedeschi Detection of quality of service
degradation on multi-tenant
containerized services . . . . . . . . . ??
Ying Huang Firm social management system for
supporting IoT users in application
environment . . . . . . . . . . . . . . ??
Tariq Mahmood and
Jianqiang Li and
Tanzila Saba and
Amjad Rehman and
Saqib Ali Energy optimized data fusion approach
for scalable wireless sensor network
using deep learning-based scheme . . . . ??
Qingyang Yu and
Nengwen Zhao and
Mingjie Li and
Zeyan Li and
Honglin Wang and
Wenchi Zhang and
Kaixin Sui and
Dan Pei A survey on intelligent management of
alerts and incidents in IT services . . ??
Hadi Ghaemi and
Dariush Abbasinezhad-Mood and
Arezou Ostad-Sharif and
Zakieh Alizadehsani Novel blockchain-assisted fault-tolerant
roaming authentication protocol for
mobility networks without home agent
entanglement . . . . . . . . . . . . . . ??
Mohammed Alabbad and
Neerja Mhaskar and
Ridha Khedri Hardening of network segmentation using
automated referential penetration
testing . . . . . . . . . . . . . . . . ??
Bing Xiong and
Yongqing Liu and
Rui Liu and
Jinyuan Zhao and
Shiming He and
Baokang Zhao and
Kun Yang and
Keqin Li ActiveGuardian: an accurate and
efficient algorithm for identifying
active elephant flows in network traffic ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous April 2024 . . . . . . . . . . . . . . . ??
Maedeh Abedini Bagha and
Kambiz Majidzadeh and
Mohammad Masdari and
Yousef Farhang ELA-RCP: an energy-efficient and load
balanced algorithm for reliable
controller placement in software-defined
networks . . . . . . . . . . . . . . . . ??
Soumen Mondal and
Luca Davoli and
Sanjay Dhar Roy and
Sumit Kundu and
Gianluigi Ferrari and
Riccardo Raheli Throughput and delay analysis of
cognitive M2M communications . . . . . . ??
Alessandra Somma and
Alessandra De Benedictis and
Christiancarmine Esposito and
Nicola Mazzocca The convergence of Digital Twins and
Distributed Ledger Technologies: a
systematic literature review and an
architectural proposal . . . . . . . . . ??
Dalila Ressi and
Riccardo Romanello and
Carla Piazza and
Sabina Rossi AI-enhanced blockchain technology: a
review of advancements and opportunities ??
Sana Younes and
Maroua Idi and
Riadh Robbana Discrete-time Markov decision process
for performance analysis of virtual
machine allocation schemes in C-RAN . . ??
Yu Liang and
Sheng Zhang and
Jie Wu SplitStream: Distributed and
workload-adaptive video analytics at the
edge . . . . . . . . . . . . . . . . . . ??
Sheharyar Khan and
Zheng Jiangbin and
Muhammad Irfan and
Farhan Ullah and
Sohrab Khan An expert system for hybrid edge to
cloud computational offloading in
heterogeneous MEC-MCC environments . . . ??
Lotfi Mhamdi and
Mohd Mat Isa Securing SDN: Hybrid autoencoder-random
forest for intrusion detection and
attack mitigation . . . . . . . . . . . ??
Oladipupo Adekoya and
Adel Aneiba A Stochastic Computational Graph with
Ensemble Learning Model for solving
Controller Placement Problem in
Software-Defined Wide Area Networks . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous May 2024 . . . . . . . . . . . . . . . . ??
Chao Meng and
Xiaoyong Yan and
Lin Guo and
Zhixin Sun and
Pan Wang An energy-efficient asynchronous
neighbor discovery algorithm based on
cyclic difference set in duty-cycle
wireless sensor networks . . . . . . . . ??
Nesma Mahmoud and
Hatem Abdelkader and
Asmaa Aly BRIP: Towards a privacy-preserving,
trustworthy, and transparent
ride-sharing system with semantic
matching powered by blockchain and IPFS ??
Youssef Ibrahim and
Rabeb Mizouni and
Hadi Otrok and
Shakti Singh and
Vinod Khadkikar and
Hatem Zeineldin Blockchain based crowdsourcing framework
for vehicle-to-vehicle charging . . . . ??
Manpreet Kaur and
Vinod Kumar Verma Cooperative-centrality enabled
investigations on edge-based trustworthy
framework for cloud focused Internet of
Things . . . . . . . . . . . . . . . . . ??
WaiMing Lau and
KaKei Wong and
Lin Cui Optimizing the performance of OpenFlow
Protocol over QUIC . . . . . . . . . . . ??
S. Reshmi and
E. Ramanujam An ensemble maximal feature subset
selection for smartphone based human
activity recognition . . . . . . . . . . ??
Guangfu Wu and
HaiPing Wang and
Xin Lai and
Mengmeng Wang and
Daojing He and
Sammy Chan A comprehensive survey of smart contract
security: State of the art and research
directions . . . . . . . . . . . . . . . ??
Yong Liu and
Tianyi Yu and
Qian Meng and
Quanze Liu Flow optimization strategies in data
center networks: a survey . . . . . . . ??
Tri Nguyen and
Huong Nguyen and
Tuan Nguyen Gia Exploring the integration of edge
computing and blockchain IoT:
Principles, architectures, security, and
applications . . . . . . . . . . . . . . ??
Seyyed Meysam Rozehkhani and
Farnaz Mahan and
Witold Pedrycz Efficient cloud data center: an adaptive
framework for dynamic Virtual Machine
Consolidation . . . . . . . . . . . . . ??
Ehzaz Mustafa and
Junaid Shuja and
Faisal Rehman and
Ahsan Riaz and
Mohammed Maray and
Muhammad Bilal and
Muhammad Khurram Khan Deep Neural Networks meet computation
offloading in mobile edge networks:
Applications, taxonomy, and open issues ??
Muna Al-Hawawreh and
M. Shamim Hossain Digital twin-driven secured edge-private
cloud Industrial Internet of Things
(IIoT) framework . . . . . . . . . . . . ??
Dongjae Kim and
Dong-Wook Seo and
Minseok Choi Edge caching and computing of video
chunks in multi-tier wireless networks ??
Sahar Pilevar Moakhar and
Saeid Abrishami An efficient mechanism for function
scheduling and placement in function as
a service edge environment . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous June 2024 . . . . . . . . . . . . . . . ??
Hao Su and
Jianwei Niu and
Xuefeng Liu and
Mohammed Atiquzzaman SafeCoder: a machine-learning-based
encoding system to embed safety
identification information into QR codes ??
Kisong Lee and
Hyun-Ho Choi Energy-efficient resource allocation for
bidirectional wireless power and
information transfer over interference
channels . . . . . . . . . . . . . . . . ??
Mohammad Zolghadri and
Parvaneh Asghari and
Seyed Ebrahim Dashti and
Alireza Hedayati Resource allocation in Fog-Cloud
Environments: State of the art . . . . . ??
Jun Yin and
Jiaxin Wen and
Ming Zhu and
Yulong Li and
Lei Wang Nefis: a network coding based flexible
device-to-device video streaming scheme ??
Saumyaranjan Dash and
Asif Uddin Khan and
Binayak Kar and
Santosh Kumar Swain and
Primatar Kuswiradyo and
Seifu Birhanu Tadele and
Frezer Guteta Wakgra CRAMP: Clustering-based RANs association
and MEC placement for delay-sensitive
applications . . . . . . . . . . . . . . ??
Razvan Bocu and
Maksim Iavich Enhanced detection of low-rate DDoS
attack patterns using machine learning
models . . . . . . . . . . . . . . . . . ??
Chun-Cheng Lin and
Der-Jiunn Deng and
Li-Tsung Hsieh and
Pei-Tzu Pan Optimal deployment of private 5G
multi-access edge computing systems at
smart factories: Using hybrid crow
search algorithm . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous July 2024 . . . . . . . . . . . . . . . ??
Hongyan Liu and
Xi Sun and
Xiang Chen and
Qun Huang and
Dong Zhang and
Haifeng Zhou and
Chunming Wu and
Xuan Liu and
Muhammad Khurram Khan \sf Terra: Low-latency and reliable
event collection in network measurement ??
Dalhatu Muhammed and
Ehsan Ahvar and
Shohreh Ahvar and
Maria Trocan and
Marie-José Montpetit and
Reza Ehsani Artificial Intelligence of Things (AIoT)
for smart agriculture: a review of
architectures, technologies and
solutions . . . . . . . . . . . . . . . ??
Syeda Zeenat Marshoodulla and
Goutam Saha A survey of data mining methodologies in
the environment of IoT and its variants ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous August 2024 . . . . . . . . . . . . . . ??
Sami Nadif and
Essaid Sabir and
Halima Elbiaze and
Abdelkrim Haqiq Green grant-free power allocation for
ultra-dense Internet of Things: a
mean-field perspective . . . . . . . . . ??
Jie Ma and
Wei Su and
Yikun Li and
Yuan Yuan and
Ziqing Zhang Synchronizing real-time and
high-precision LDoS defense of learning
model-based in AIoT with programmable
data plane, SDN . . . . . . . . . . . . ??
Sana Younes and
Maroua Idi Formal dependability analysis of fault
tolerant Virtual Machine allocation
strategies in Cloud Radio Access Network ??
Antonio Matencio Escolar and
Qi Wang and
Jose Maria Alcaraz Calero Enhancing honeynet-based protection with
network slicing for massive Pre-6G IoT
Smart Cities deployments . . . . . . . . ??
Tao Ju and
Linjuan Li and
Shuai Liu and
Yu Zhang A multi-UAV assisted task offloading and
path optimization for mobile edge
computing via multi-agent deep
reinforcement learning . . . . . . . . . ??
Wendi Feng and
Ke Liu and
Shuo Sun and
Bo Cheng and
Wei Zhang Seraph: Towards secure and efficient
multi-controller authentication with $
(t, n) $-threshold signature in
multi-domain SDWAN . . . . . . . . . . . ??
Lien-Wu Chen and
Hsing-Fu Tseng and
Chun-Yu Cho and
Ming-Fong Tsai Hybrid kitchen safety guarding with
stove fire recognition based on the
Internet of Things . . . . . . . . . . . ??
Asad Ali and
Ying-Dar Lin and
Jian Liu and
Chin-Tser Huang The universal federator: a third-party
authentication solution to federated
cloud, edge, and fog . . . . . . . . . . ??
Van Tong and
Sami Souihi and
Hai Anh Tran and
Abdelhamid Mellouk Troubleshooting solution for traffic
congestion control . . . . . . . . . . . ??
D. Manivannan Recent endeavors in machine
learning-powered intrusion detection
systems for the Internet of Things . . . ??
Giuseppe Aceto and
Fabio Giampaolo and
Ciro Guida and
Stefano Izzo and
Antonio Pescap\`e and
Francesco Piccialli and
Edoardo Prezioso Synthetic and privacy-preserving traffic
trace generation using generative AI
models for training Network Intrusion
Detection Systems . . . . . . . . . . . ??
Mingjie Ding and
Yingya Guo and
Zebo Huang and
Bin Lin and
Huan Luo GROM: a generalized routing optimization
method with graph neural network and
deep reinforcement learning . . . . . . ??
Hua Qin and
Ni Li and
Tao Wang and
Gelan Yang and
Yang Peng CDT: Cross-interface Data Transfer
scheme for bandwidth-efficient LoRa
communications in energy harvesting
multi-hop wireless networks . . . . . . ??
Ying-Dar Lin and
Hao-Xuan Huang and
Didik Sudyana and
Yuan-Cheng Lai AI for AI-based intrusion detection as a
service: Reinforcement learning to
configure models, tasks, and capacities ??
Javad Mohajerani and
Mokhtar Mohammadi Ghanatghestani and
Malihe Hashemipour MCTE-RPL: a multi-context trust-based
efficient RPL for IoT . . . . . . . . . ??
Xu Zhao and
Yichuan Wu and
Tianhao Zhao and
Feiyu Wang and
Maozhen Li Federated deep reinforcement learning
for task offloading and resource
allocation in mobile edge
computing-assisted vehicular networks ??
Weitao Yang and
Li Pan and
Shijun Liu Caching or not: an online cost
optimization algorithm for
geodistributed data analysis in cloud
environments . . . . . . . . . . . . . . ??
Anmol Kumar and
Mayank Agarwal Quick service during DDoS attacks in the
container-based cloud environment . . . ??
Junyong Tang and
Hui Li and
Jiankang Zhang and
Kangqian Guan and
Qiqi Shan and
Xiangyang Liang A robust PID and RLS controller for
TCP/AQM system . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous September 2024 . . . . . . . . . . . . . ??
B. Padmavathi and
Vanaja Selvaraj Advanced optimization-based weighted
features for ensemble deep learning
smart occupancy detection network for
road traffic parking . . . . . . . . . . ??
Namkyung Yoon and
Hwangnam Kim Detecting DDoS based on attention
mechanism for Software-Defined Networks ??
Noureddine Mouhoub and
Maria Moloney and
Damien Magoni Metarouting with automatic tunneling in
multilayer networks . . . . . . . . . . ??
El-hacen Diallo and
Mohameden Dieye and
Omar Dib and
Pierre Valiorgue An agnostic and secure interoperability
protocol for seamless asset movement . . ??
Mohand Yazid Saidi and
Issam Abdeldjalil Ikhelef and
Shuopeng Li and
Ken Chen Constrained routing in multi-partite
graph to solve VNF placement and
chaining problem . . . . . . . . . . . . ??
Diana Hawashin and
Mohamed Nemer and
Senay A. Gebreab and
Khaled Salah and
Raja Jayaraman and
Muhammad Khurram Khan and
Ernesto Damiani Blockchain applications in UAV industry:
Review, opportunities, and challenges ??
Emna Baccour and
Aiman Erbad and
Amr Mohamed and
Mounir Hamdi and
Mohsen Guizani Multi-agent reinforcement learning for
privacy-aware distributed CNN in
heterogeneous IoT surveillance systems ??
Orlando Landrove and
Rufino Cabrera and
Eneko Iradier and
Erick Jimenez and
Pablo Angueira and
Jon Montalban Broadcast/multicast delivery integration
in B5G/6G environments . . . . . . . . . ??
Man Li and
Huachun Zhou and
Shuangxing Deng Parallel path selection mechanism for
DDoS attack detection . . . . . . . . . ??
Seyedeh Soheila Shaabanzadeh and
Marc Carrascosa-Zamacois and
Juan Sánchez-González and
Costas Michaelides and
Boris Bellalta Virtual reality traffic prioritization
for Wi-Fi quality of service improvement
using machine learning classification
techniques . . . . . . . . . . . . . . . ??
Yue Li and
Yingjian Liu and
Haoyu Yin and
Zhongwen Guo and
Yu Wang RECAR: Robust and efficient
collision-avoiding routing for 3D
underwater named data networking . . . . ??
Riya Goyal and
Abhinav Tomar Dynamic Charging Scheduling and Path
Planning Scheme for Multiple MC-enabled
On-demand Wireless Rechargeable Sensor
Networks . . . . . . . . . . . . . . . . ??
Zainab H. Ali and
Nora El-Rashidy and
Mostafa A. Elhosseini and
Sarah M. Ayyad SDN-based reliable emergency message
routing schema using Digital Twins for
adjusting beacon transmission in VANET ??
Muhammad Tahir Abbas and
Karl-Johan Grinnemo and
Guillaume Ferré and
Philippe Laurent and
Stefan Alfredsson and
Mohammad Rajiullah and
Johan Eklund Towards zero-energy: Navigating the
future with 6G in Cellular Internet of
Things . . . . . . . . . . . . . . . . . ??
Quang Tuan Do and
Thien Duc Hua and
Anh-Tien Tran and
Dongwook Won and
Geeranuch Woraphonbenjakul and
Wonjong Noh and
Sungrae Cho Multi-UAV aided energy-aware
transmissions in mmWave communication
network: Action-branching QMIX network ??
Sekione Reward Jeremiah and
Haotian Chen and
Stefanos Gritzalis and
Jong Hyuk Park Leveraging application permissions and
network traffic attributes for Android
ransomware detection . . . . . . . . . . ??
Jong Wook Kim and
Beakcheol Jang Privacy-preserving generation and
publication of synthetic trajectory
microdata: a comprehensive survey . . . ??
Yakoub Mordjana and
Badis Djamaa and
Mustapha Reda Senouci and
Aymen Herzallah A Contextual Multi-Armed Bandit approach
for NDN forwarding . . . . . . . . . . . ??
Ala Altaweel and
Sidra Aslam and
Ibrahim Kamel JamholeHunter: On detecting new wormhole
attack in Opportunistic Mobile Networks ??
K. G. Raghavendra Narayan and
Rakesh Ganesula and
Tamminaina Sai Somasekhar and
Srijanee Mookherji and
Vanga Odelu and
Rajendra Prasath and
Alavalapati Goutham Reddy Attenuating majority attack class bias
using hybrid deep learning based IDS
framework . . . . . . . . . . . . . . . ??
Yingze Liu and
Yuanbo Guo CL-AP$^2$: a composite learning approach
to attack prediction via attack
portraying . . . . . . . . . . . . . . . ??
Lázaro Bustio-Martínez and
Vitali Herrera-Semenets and
Juan Luis García-Mendoza and
Miguel Ángel Álvarez-Carmona and
Jorge Ángel González-Ordiano and
Luis Zúñiga-Morales and
J. Emilio Quiróz-Ibarra and
Pedro Antonio Santander-Molina and
Jan van den Berg Uncovering phishing attacks using
principles of persuasion analysis . . . ??
Libin Yang and
Wei Lou On designing a profitable system model
to harmonize the tripartite dissension
in content delivery applications . . . . ??
Muhammad Abdullah and
Humayun Zubair Khan and
Umair Fakhar and
Ahmad Naeem Akhtar and
Shuja Ansari Satellite synergy: Navigating resource
allocation and energy efficiency in IoT
networks . . . . . . . . . . . . . . . . ??
Guangchen Chen and
Benjie Shi and
Yinhui Zhang and
Zifen He and
Pengcheng Zhang CGSNet: Cross-consistency guiding
semi-supervised semantic segmentation
network for remote sensing of plateau
lake . . . . . . . . . . . . . . . . . . ??
Rikhi Ram Jagat and
Dilip Singh Sisodia and
Pradeep Singh Exploiting web content semantic features
to detect web robots from weblogs . . . ??
Sulyman Age Abdulkareem and
Chuan Heng Foh and
François Carrez and
Klaus Moessner A lightweight SEL for attack detection
in IoT/IIoT networks . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous October 2024 . . . . . . . . . . . . . . ??
Jitesh Pradhan and
Ashish Singh and
Abhinav Kumar and
Muhammad Khurram Khan Skin lesion classification using
modified deep and multi-directional
invariant handcrafted features . . . . . ??
Panjun Sun and
Yi Wan and
Zongda Wu and
Zhaoxi Fang A survey on security issues in IoT
operating systems . . . . . . . . . . . ??
Yi-Xiang Wang and
Yu-Ling Hsueh A low-storage synchronization framework
for blockchain systems . . . . . . . . . ??
Taejune Park and
Myoungsung You and
Jinwoo Kim and
Seungsoo Lee \em Fatriot: Fault-tolerant MEC
architecture for mission-critical
systems using a SmartNIC . . . . . . . . ??
Michael Frey and
Thomas Evans and
Angela Folz and
Mary Gregg and
Jeanne Quimby and
Jacob D. Rezac Anomalous state detection in radio
access networks: a proof-of-concept . . ??
Yingya Guo and
Mingjie Ding and
Weihong Zhou and
Bin Lin and
Cen Chen and
Huan Luo MATE: a multi-agent reinforcement
learning approach for Traffic
Engineering in Hybrid Software Defined
Networks . . . . . . . . . . . . . . . . ??
Devi D. and
Godfrey Winster S. HRMF-DRP: a next-generation solution for
overcoming provisioning challenges in
cloud environments . . . . . . . . . . . ??
Subhra Priyadarshini Biswal and
Sanjeev Patel A bandwidth delay product based modified
Veno for high-speed networks: BDP-Veno ??
Zeli Wang and
Weiqi Dai and
Ming Li and
Kim-Kwang Raymond Choo and
Deqing Zou DFier: a directed vulnerability verifier
for Ethereum smart contracts . . . . . . ??
Nguyen Thi My Binh and
Huynh Thi Thanh Binh and
Ho Viet Duc Luong and
Nguyen Tien Long and
Trinh Van Chien An efficient exact method with
polynomial time-complexity to achieve
$k$-strong barrier coverage in
heterogeneous wireless multimedia sensor
networks . . . . . . . . . . . . . . . . ??
Alain Bertrand Bomgni and
Garrik Brel Jagho Mdemaya and
Miguel Landry Foko Sindjoung and
Mthulisi Velempini and
Celine Cabrelle Tchuenko Djoko and
Jean Frederic Myoupo CIBORG: CIrcuit-Based and ORiented Graph
theory permutation routing protocol for
single-hop IoT networks . . . . . . . . ??
Mohamad Wazzeh and
Mohamad Arafeh and
Hani Sami and
Hakima Ould-Slimane and
Chamseddine Talhi and
Azzam Mourad and
Hadi Otrok CRSFL: Cluster-based Resource-aware
Split Federated Learning for Continuous
Authentication . . . . . . . . . . . . . ??
Rong Zheng and
Xiaoqin Feng and
Fengyuan Ren Designing transport scheme of 3D
naked-eye system . . . . . . . . . . . . ??
Mahdi Alkaeed and
Adnan Qayyum and
Junaid Qadir Privacy preservation in Artificial
Intelligence and Extended Reality
(AI-XR) metaverses: a survey . . . . . . ??
Zu-Sheng Tan and
Eric W. K. See-To and
Kwan-Yeung Lee and
Hong-Ning Dai and
Man-Leung Wong Privacy-preserving federated learning
for proactive maintenance of
IoT-empowered multi-location smart city
facilities . . . . . . . . . . . . . . . ??
Ruijin Wang and
Jinbo Wang and
Xiong Li and
Jinshan Lai and
Fengli Zhang and
Xikai Pei and
Muhammad Khurram Khan CESA: Communication efficient secure
aggregation scheme via sparse graph in
federated learning . . . . . . . . . . . ??
Lingling Zi and
Xin Cong A blockchain transaction mechanism in
the delay tolerant network . . . . . . . ??
Yilin Li and
Peiying Zhang and
Neeraj Kumar and
Mohsen Guizani and
Jian Wang and
Konstantin Igorevich Kostromitin and
Yi Wang and
Lizhuang Tan Reliability-assured service function
chain migration strategy in edge
networks using deep reinforcement
learning . . . . . . . . . . . . . . . . ??
Onur Sahin and
Vanlin Sathya Network quality prediction in a
designated area using GPS data . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous November 2024 . . . . . . . . . . . . . ??
Samane Sharif and
Mohammad Hossein Yaghmaee Moghaddam and
Seyed Amin Hosseini Seno A hybrid bi-level management framework
for caching and communication in
Edge--AI enabled IoT . . . . . . . . . . ??
Mengjie Lv and
Xuanli Liu and
Hui Dong and
Weibei Fan An expandable and cost-effective data
center network . . . . . . . . . . . . . ??
Ji Wan and
Kai Hu and
Jie Li and
Yichen Guo and
Hao Su and
Shenzhang Li and
Yafei Ye Zebra: a cluster-aware blockchain
consensus algorithm . . . . . . . . . . ??
Arash Mahboubi and
Khanh Luong and
Hamed Aboutorab and
Hang Thanh Bui and
Geoff Jarrad and
Mohammed Bahutair and
Seyit Camtepe and
Ganna Pogrebna and
Ejaz Ahmed and
Bazara Barry and
Hannah Gately Evolving techniques in cyber threat
hunting: a systematic review . . . . . . ??
Baoshan Lu and
Junli Fang and
Junxiu Liu and
Xuemin Hong Energy efficient multi-user task
offloading through active RIS with
hybrid TDMA--NOMA transmission . . . . . ??
Quang Truong Vu and
Phuc Tan Nguyen and
Thi Hanh Nguyen and
Thi Thanh Binh Huynh and
Van Chien Trinh and
Mikael Gidlund Striking the perfect balance:
Multi-objective optimization for
minimizing deployment cost and
maximizing coverage with Harmony Search ??
Cong Wang and
Tong Zhou and
Maode Ma and
Yuwen Xiong and
Xiankun Zhang and
Chao Liu An efficient certificateless
blockchain-enabled authentication scheme
to secure producer mobility in named
data networks . . . . . . . . . . . . . ??
Guoqing Tian and
Li Pan and
Shijun Liu An online cost optimization approach for
edge resource provisioning in cloud
gaming . . . . . . . . . . . . . . . . . ??
Xiaolei Yang and
Zhixin Xia and
Junhui Song and
Yongshan Liu Credit risk prediction for small and
micro enterprises based on federated
transfer learning frozen network
parameters . . . . . . . . . . . . . . . ??
Muhammad Numan and
Fazli Subhan and
Mohd Nor Akmal Khalid and
Wazir Zada Khan and
Hiroyuki Iida Clone node detection in static wireless
sensor networks: a hybrid approach . . . ??
Shivani Jamwal and
José Cano and
Gyu Myoung Lee and
Nguyen H. Tran and
Nguyen Truong A survey on Ethereum pseudonymity:
Techniques, challenges, and future
directions . . . . . . . . . . . . . . . ??
Xiaoyan Wei and
Zheng Yan and
Xueqin Liang A survey on fuzz testing technologies
for industrial control protocols . . . . ??
Yash Sharma and
Anshul Arora PHIGrader: Evaluating the effectiveness
of Manifest file components in Android
malware detection using Multi Criteria
Decision Making techniques . . . . . . . ??
Tao Lin and
Yang Chen and
Hao Yang and
Yuan Zhang and
Bo Jiang and
Jinyao Yan DeCa360: Deadline-aware edge caching for
two-tier 360$^\circ $ video streaming ??
Xueshu Hong and
Xingkong Ma and
Shaoyong Li and
Yiqing Cai and
Bo Liu SSBM: a spatially separated boxes-based
multi-tab website fingerprinting model ??
Pedro R. X. do Carmo and
Diego de Freitas Bezerra and
Assis T. Oliveira Filho and
Eduardo Freitas and
Miguel L. P. C. Silva and
Marrone Dantas and
Beatriz Oliveira and
Judith Kelner and
Djamel F. H. Sadok and
Ricardo Souza Living on the edge: a survey of Digital
Twin-Assisted Task Offloading in
safety-critical environments . . . . . . ??
Ponjit Borgohain and
Hiten Choudhury An AKA protocol for 5G-assisted D2D
communication in Out-of-Coverage
scenario . . . . . . . . . . . . . . . . ??
Héctor Martinez and
Francisco J. Rodriguez-Lozano and
Fernando León-García and
Jose M. Palomares and
Joaquín Olivares Distributed Fog computing system for
weapon detection and face recognition ??
Juan Eloy Espozo-Espinoza and
Manuel Fernández-Veiga and
Francisco Troncoso-Pastoriza Generalized hierarchical coded caching ??
Sungbin Park and
Changbae Seo and
Xueqiang Wang and
Yeonjoon Lee and
Seung-Hyun Seo Exclusively in-store: Acoustic location
authentication for stationary business
devices . . . . . . . . . . . . . . . . ??
Tahani Aladwani and
Christos Anagnostopoulos and
Kostas Kolomvatsos Node and relevant data selection in
distributed predictive analytics: a
query-centric approach . . . . . . . . . ??
Amirmohammad Karamzadeh and
Alireza Shameli-Sendi Reducing cold start delay in serverless
computing using lightweight virtual
machines . . . . . . . . . . . . . . . . ??
Van-Tam Hoang and
Yared Abera Ergu and
Van-Linh Nguyen and
Rong-Guey Chang Security risks and countermeasures of
adversarial attacks on AI-driven
applications in 6G networks: a survey ??
Anita Panwar and
Satyasai Jagannath Nanda Distributed enhanced multi-objective
evolutionary algorithm based on
decomposition for cluster analysis in
wireless sensor network . . . . . . . . ??
Bo Yin and
Zeshu Ai and
Jun Lu and
Ying Feng A cooperative task assignment framework
with minimum cooperation cost in
crowdsourcing systems . . . . . . . . . ??
Moez Krichen and
Mohamed S. Abdalzaher Performance enhancement of artificial
intelligence: a survey . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous December 2024 . . . . . . . . . . . . . ??
Asmitha K. A. and
Vinod P. and
Rafidha Rehiman K. A. and
Neeraj Raveendran and
Mauro Conti Android malware defense through a hybrid
multi-modal approach . . . . . . . . . . ??
Zhengqiu Weng and
Weinuo Zhang and
Tiantian Zhu and
Zhenhao Dou and
Haofei Sun and
Zhanxiang Ye and
Ye Tian RT-APT: a real-time APT anomaly
detection method for large-scale
provenance graph . . . . . . . . . . . . ??
Shinu M. Rajagopal and
Supriya M. and
Rajkumar Buyya Leveraging blockchain and federated
learning in Edge--Fog--Cloud computing
environments for intelligent
decision-making with ECG data in IoT . . ??
Jiaqi Chen and
Shuhang Han and
Donghai Tian and
Changzhen Hu IMUNE: a novel evolutionary algorithm
for influence maximization in UAV
networks . . . . . . . . . . . . . . . . ??
Mingyang Zhao and
Chengtai Liu and
Sifeng Zhu Joint optimization scheme for task
offloading and resource allocation based
on MO-MFEA algorithm in intelligent
transportation scenarios . . . . . . . . ??
Muhammad Sajjad Akbar and
Zawar Hussain and
Muhammad Ikram and
Quan Z. Sheng and
Subhas Chandra Mukhopadhyay On challenges of sixth-generation (6G)
wireless networks: a comprehensive
survey of requirements, applications,
and security issues . . . . . . . . . . ??
Mohammed Talal and
Salem Garfan and
Rami Qays and
Dragan Pamucar and
Dursun Delen and
Witold Pedrycz and
Amneh Alamleh and
Abdullah Alamoodi and
B. B. Zaidan and
Vladimir Simic A comprehensive systematic review on
machine learning application in the
5G-RAN architecture: Issues, challenges,
and future directions . . . . . . . . . ??
Mina Emami Khansari and
Saeed Sharifian A deep reinforcement learning approach
towards distributed Function as a
Service (FaaS) based edge application
orchestration in cloud--edge continuum ??
Yong Liu and
Yuanhang Ge and
Qian Meng and
Quanze Liu Controller load optimization strategies
in Software-Defined Networking: a survey ??
Saeed Banaeian Far and
Seyed Mojtaba Hosseini Bamakan Third layer blockchains are being
rapidly developed: Addressing
state-of-the-art paradigms and future
horizons . . . . . . . . . . . . . . . . ??
Goshgar Ismayilov and
Can Özturan PTTS: Zero-knowledge proof-based private
token transfer system on Ethereum
blockchain and its network flow based
balance range privacy attack analysis ??
Hao Peng and
Yifan Zhao and
Dandan Zhao and
Bo Zhang and
Cheng Qian and
Ming Zhong and
Jianmin Han and
Xiaoyang Liu and
Wei Wang Robustness of multilayer interdependent
higher-order network . . . . . . . . . . ??
Andjela Jovanovic and
Luka Jovanovic and
Miodrag Zivkovic and
Nebojsa Bacanin and
Vladimir Simic and
Dragan Pamucar and
Milos Antonijevic Particle swarm optimization tuned
multi-headed long short-term memory
networks approach for fuel prices
forecasting . . . . . . . . . . . . . . ??
Farkhondeh Kiaee and
Ehsan Arianyan Joint VM and container consolidation
with auto-encoder based contribution
extraction of decision criteria in
Edge--Cloud environment . . . . . . . . ??
Hassan Jalil Hadi and
Yue Cao and
Sifan Li and
Naveed Ahmad and
Mohammed Ali Alshara FCG-MFD: Benchmark function call
graph-based dataset for malware family
detection . . . . . . . . . . . . . . . ??
Senthil Kumar Jagatheesaperumal and
Ijaz Ahmad and
Marko Höyhtyä and
Suleman Khan and
Andrei Gurtov Deep learning frameworks for cognitive
radio networks: Review and open research
challenges . . . . . . . . . . . . . . . ??
Abeer Iftikhar and
Kashif Naseer Qureshi and
Faisal Bashir Hussain and
Muhammad Shiraz and
Mehdi Sookhak A blockchain based secure authentication
technique for ensuring user privacy in
edge based smart city networks . . . . . ??
Zhiyuan Li and
Hongyi Zhao and
Jingyu Zhao and
Yuqi Jiang and
Fanliang Bu SAT-Net: a staggered attention network
using graph neural networks for
encrypted traffic classification . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous January 2025 . . . . . . . . . . . . . . ??
Zheng Zhang and
Xiangyu Su and
Ji Wu and
Claudio J. Tessone and
Hao Liao Heterogeneous graph representation
learning via mutual information
estimation for fraud detection . . . . . ??
Pengbiao Zhao and
Yuanjian Zhou and
Salman Ijaz and
Fazlullah Khan and
Jingxue Chen and
Bandar Alshawi and
Zhen Qin and
Md Arafatur Rahman RLL-SWE: a Robust Linked List
Steganography Without Embedding for
intelligence networks in smart
environments . . . . . . . . . . . . . . ??
Yulong Ma and
Yingya Guo and
Ruiyu Yang and
Huan Luo FRRL: a reinforcement learning approach
for link failure recovery in a hybrid
SDN . . . . . . . . . . . . . . . . . . ??
Abed Alanazi and
Abdullah Alqahtani and
Shtwai Alsubai and
Munish Bhatia Blockchain-inspired intelligent
framework for logistic theft control . . ??
José Santos and
Efstratios Reppas and
Tim Wauters and
Bruno Volckaert and
Filip De Turck \em Gwydion: Efficient auto-scaling for
complex containerized applications in
Kubernetes through Reinforcement
Learning . . . . . . . . . . . . . . . . ??
Silvestre Malta and
Pedro Pinto and
Manuel Fernández-Veiga Optimizing 5G network slicing with DRL:
Balancing eMBB, URLLC, and mMTC with
OMA, NOMA, and RSMA . . . . . . . . . . ??
Fahimeh Dabaghi-Zarandi and
Mohammad Mehdi Afkhami and
Mohammad Hossein Ashoori Community Detection method based on
Random walk and Multi objective
Evolutionary algorithm in complex
networks . . . . . . . . . . . . . . . . ??
Yuxin Xia and
Jie Zhang and
Ka Lok Man and
Yuji Dong Handover Authenticated Key Exchange for
Multi-access Edge Computing . . . . . . ??
Rakesh Kumar and
Mayank Swarnkar QuIDS: a Quantum Support Vector
machine-based Intrusion Detection System
for IoT networks . . . . . . . . . . . . ??
Annamaria Ficara and
Hocine Cherifi and
Xiaoyang Liu and
Luiz Fernando Bittencourt and
Maria Fazio Complex networks for Smart environments
management . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous February 2025 . . . . . . . . . . . . . ??
Walid K. Hasan and
Iftekhar Ahmad and
Daryoush Habibi and
Quoc Viet Phung and
Mohammad Al-Fawa'reh and
Kazi Yasin Islam and
Ruba Zaheer and
Haitham Khaled A survey on energy efficient medium
access control for acoustic wireless
communication networks in underwater
environments . . . . . . . . . . . . . . ??
Xiankun Fu and
Li Pan and
Shijun Liu Caching or re-computing: Online cost
optimization for running big data tasks
in IaaS clouds . . . . . . . . . . . . . ??
Dhruv Kalambe and
Divyansh Sharma and
Pushkar Kadam and
Shivangi Surati A comprehensive plane-wise review of
DDoS attacks in SDN: Leveraging
detection and mitigation through machine
learning and deep learning . . . . . . . ??
Lizeth Patricia Aguirre Sanchez and
Yao Shen and
Minyi Guo MDQ: a QoS-Congestion Aware Deep
Reinforcement Learning Approach for
Multi-Path Routing in SDN . . . . . . . ??
Seethalakshmi Perumal and
P. Kola Sujatha and
Krishnaa S. and
Muralitharan Krishnan Clusters in chaos: a deep unsupervised
learning paradigm for network anomaly
detection . . . . . . . . . . . . . . . ??
Hongyan Ran and
Xiaohong Li and
Zhichang Zhang Label-aware learning to enhance
unsupervised cross-domain rumor
detection . . . . . . . . . . . . . . . ??
Rui Meng and
Bingxuan Xu and
Xiaodong Xu and
Mengying Sun and
Bizhu Wang and
Shujun Han and
Suyu Lv and
Ping Zhang A survey of Machine Learning-based
Physical-Layer Authentication in
wireless communications . . . . . . . . ??
Fan Dong and
Henry Leung and
Steve Drew Optimizing federated learning with
weighted aggregation in aerial and space
networks . . . . . . . . . . . . . . . . ??
Yadong Zhang and
Huixiang Zhang and
Yi Yang and
Wen Sun and
Haibin Zhang and
Yaru Fu Adaptive differential privacy in
asynchronous federated learning for
aerial-aided edge computing . . . . . . ??
Maryam Nikpour and
Parisa Behvand Yousefi and
Hadi Jafarzadeh and
Kasra Danesh and
Roya Shomali and
Saeed Asadi and
Ahmad Gholizadeh Lonbar and
Mohsen Ahmadi Intelligent energy management with IoT
framework in smart cities using
intelligent analysis: an application of
machine learning methods for complex
networks and systems . . . . . . . . . . ??
Usman Ahmed and
Zheng Jiangbin and
Sheharyar Khan and
Muhammad Tariq Sadiq Consensus hybrid ensemble machine
learning for intrusion detection with
explainable AI . . . . . . . . . . . . . ??
Babak Farhadi and
Parvaneh Asghari and
Ebrahim Mahdipour and
Hamid Haj Seyyed Javadi A novel community-driven
recommendation-based approach to predict
and select friendships on the social IoT
utilizing deep reinforcement learning ??
Geetika Dhand and
Meena Rao and
Parul Chaudhary and
Kavita Sheoran A secure routing and malicious node
detection in mobile Ad hoc network using
trust value evaluation with improved
XGBoost mechanism . . . . . . . . . . . ??
Borja Molina-Coronado and
Antonio Ruggia and
Usue Mori and
Alessio Merlo and
Alexander Mendiburu and
Jose Miguel-Alonso Light up that Droid! On the
effectiveness of static analysis
features against app obfuscation for
Android malware detection . . . . . . . ??
Mohammad Al-Fawa'reh and
Jumana Abu-khalaf and
Naeem Janjua and
Patryk Szewczyk On and off the manifold: Generation and
Detection of adversarial attacks in IIoT
networks . . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous March 2025 . . . . . . . . . . . . . . . ??
Edan Habler and
Ron Bitton and
Dan Avraham and
Eitan Klevansky and
Dudu Mimran and
Oleg Brodt and
Heiko Lehmann and
Yuval Elovici and
Asaf Shabtai Adversarial machine learning threat
analysis and remediation in Open Radio
Access Network (O-RAN) . . . . . . . . . ??
Yong Liu and
Qian Meng and
Kefei Chen and
Zhonghua Shen ALB-TP: Adaptive Load Balancing based on
Traffic Prediction using GRU-Attention
for Software-Defined DCNs . . . . . . . ??
Debao Wang and
Shaopeng Guan and
Ruikang Sun A novel staged training strategy
leveraging knowledge distillation and
model fusion for heterogeneous federated
learning . . . . . . . . . . . . . . . . ??
Mohamad Arafeh and
Mohamad Wazzeh and
Hani Sami and
Hakima Ould-Slimane and
Chamseddine Talhi and
Azzam Mourad and
Hadi Otrok Efficient privacy-preserving ML for IoT:
Cluster-based split federated learning
scheme for non-IID data . . . . . . . . ??
Waris Ali and
Chao Fang and
Akmal Khan A survey on the state-of-the-art CDN
architectures and future directions . . ??
Peng Wang and
Guang Ling and
Pei Zhao and
Zhi-Hong Guan and
Ming-Feng Ge Dynamically identify important nodes in
the hypergraph based on the ripple
diffusion and ant colony collaboration
model . . . . . . . . . . . . . . . . . ??
Weiwei Jiang and
Yafeng Zhan and
Xin Fang Fuzzy neural network based access
selection in satellite--terrestrial
integrated networks . . . . . . . . . . ??
Xinjie Guan and
Shuyan Zhu and
Xili Wan and
Yaping Wu STARNeT: Multidimensional
spatial-temporal attention recall
network for accurate encrypted traffic
classification . . . . . . . . . . . . . ??
Moemedi Lefoane and
Ibrahim Ghafir and
Sohag Kabir and
Irfan-Ullah Awan Internet of Things botnets: a survey on
Artificial Intelligence based detection
techniques . . . . . . . . . . . . . . . ??
Jiaze Shang and
Tianbo Lu and
Yingjie Cai and
Yanfang Li DRaft: a double-layer structure for Raft
consensus mechanism . . . . . . . . . . ??
Bing Xiong and
Jing Wu and
Guanglong Hu and
Jin Zhang and
Baokang Zhao and
Keqin Li FastTSS: Accelerating tuple space search
for fast packet classification in
virtual SDN switches . . . . . . . . . . ??
Yuping Liu and
Honglong Chen and
Xiang Liu and
Wentao Wei and
Guoqi Ma and
Xiaolong Liu and
Duannan Ye Quality-aware multi-task allocation
based on location importance in mobile
crowdsensing . . . . . . . . . . . . . . ??
Francisco Lopez-Gomez and
Rafa Marin-Lopez and
Oscar Canovas and
Gabriel Lopez-Millan and
Fernando Pereniguez-Garcia SDN-AAA: Towards the standard management
of AAA infrastructures . . . . . . . . . ??
Jiagao Wu and
Yudong Jiang and
Zhouli Fan and
Linfeng Liu GridFL: a 3D-Grid-based Federated
Learning framework . . . . . . . . . . . ??
Pau Ferrer-Cid and
Jose M. Barcelo-Ordinas and
Jorge Garcia-Vidal A review of graph-powered data quality
applications for IoT monitoring sensor
networks . . . . . . . . . . . . . . . . ??
Yali Yuan and
Weiyi Zou and
Guang Cheng MW3F: Improved multi-tab website
fingerprinting attacks with
Transformer-based feature fusion . . . . ??
Joseph Tolley and
Cameron Makin and
Kenneth King and
Carl B. Dietrich Enhanced heartbeat protocol for near
real-time coordinated spectrum sharing
with expanded use cases . . . . . . . . ??
Arash Mahboubi and
Khanh Luong and
Geoff Jarrad and
Seyit Camtepe and
Michael Bewong and
Mohammed Bahutair and
Ganna Pogrebna Lurking in the shadows: Unsupervised
decoding of beaconing communication for
enhanced cyber threat hunting . . . . . ??
Xuan-Ha Nguyen and
Kim-Hung Le nNFST: a single-model approach for
multiclass novelty detection in network
intrusion detection systems . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous April 2025 . . . . . . . . . . . . . . . ??
Jiezhen Tang and
Hui Zhu and
Liqun Chen and
Fengwei Wang and
Hui Li PRISM: PSI and Voronoi diagram based
Automated Exposure Notification with
location privacy . . . . . . . . . . . . ??
Naveed Anjum and
Zohaib Latif and
Hongsong Chen Security and privacy of industrial big
data: Motivation, opportunities, and
challenges . . . . . . . . . . . . . . . ??
Mobasshir Mahbub and
Mir Md. Saym and
Sarwar Jahan and
Anup Kumar Paul and
Alireza Vahid and
Seyyedali Hosseinalipour and
Bobby Barua and
Hen-Geul Yeh and
Raed M. Shubair and
Tarik Taleb A holistic survey of UAV-assisted
wireless communications in the
transition from 5G to 6G:
State-of-the-art intertwined
innovations, challenges, and
opportunities . . . . . . . . . . . . . ??
Arash GhorbanniaDelavar TPMCD: a method to optimizing cost and
throughput for clustering tasks and
hybrid containers in the cloud data
center . . . . . . . . . . . . . . . . . ??
Mengjie Lv and
Hui Dong and
Weibei Fan Efficient fault tolerance and diagnosis
mechanism for Network-on-Chips . . . . . ??
Murat Bakirci Advanced aerial monitoring and vehicle
classification for intelligent
transportation systems with YOLOv8
variants . . . . . . . . . . . . . . . . ??
Guangquan Xu and
Chenghe Dong and
Cong Wang and
Feng Feng BAS-NDN: BlockChain based mobile
producer authentication scheme for Named
Data Networking . . . . . . . . . . . . ??
Chunjing Liu and
Lixiang Ma and
Minfeng Zhang and
Haiyan Long Optimizing cloud resource management
with an IoT-enabled optimized virtual
machine migration scheme for improved
efficiency . . . . . . . . . . . . . . . ??
Juhar Abdella and
Zahir Tari and
Redowan Mahmud MuLPP: a multi-level privacy preserving
for blockchain-based bilateral P2P
energy trading . . . . . . . . . . . . . ??
Niosha Hejazi and
Arash Habibi Lashkari A Comprehensive Survey of Smart
Contracts Vulnerability Detection Tools:
Techniques and Methodologies . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous May 2025 . . . . . . . . . . . . . . . . ??
T. R. Chenthil and
G. C. Jagan and
S. Ranjith and
G. Balachandran Energy-efficient hierarchical dynamic
depth adjustment routing protocol for
UWSN with distributed sink mobility and
semantic self-healing . . . . . . . . . ??
Anjum Mohd Aslam and
Rajat Chaudhary and
Aditya Bhardwaj and
Neeraj Kumar and
Rajkumar Buyya Digital twins-enabled game theoretical
models and techniques for metaverse
Connected and Autonomous Vehicles: a
survey . . . . . . . . . . . . . . . . . ??
Rupa Ch. and
Akhil Babu N. and
N. V. Rishika G. and
M. Navena and
Gautam Srivastava and
Thippa Reddy Gadekallu An expert system for privacy-preserving
vessel detection leveraging optimized
Extended-YOLOv7 and SHA-256 . . . . . . ??
Rashmeet Toor and
Inderveer Chana DAPNEML: Disease-diet associations
prediction in a NEtwork using a machine
learning based approach . . . . . . . . ??
Sarthak and
Anshul Verma and
Pradeepika Verma An optimal three-tier
prioritization-based multiflow
scheduling in cloud-assisted smart
healthcare . . . . . . . . . . . . . . . ??
Rana Zeeshan Ahmad and
Muhammad Rizwan and
Muhammad Jehanzaib Yousuf and
Mohammad Bilal Khan and
Ahmad Almadhor and
Thippa Reddy Gadekallu and
Sidra Abbas Device-to-device communication in 5G
heterogeneous network based on
game-theoretic approaches: a
comprehensive survey . . . . . . . . . . ??
Nguyen Van Son and
Nguyen Thi Hanh and
Trinh The Minh and
Huynh Thi Thanh Binh and
Nguyen Xuan Thang Heuristic and approximate Steiner tree
algorithms for ensuring network
connectivity in mobile wireless sensor
networks . . . . . . . . . . . . . . . . ??
Pankaj Kumar and
Binayak Kar ZBR: Zone-based routing in quantum
networks with efficient entanglement
distribution . . . . . . . . . . . . . . ??
Tsvetan Tsokov and
Hristo Kostadinov Kinitos: Dynamic network-aware
scheduling and descheduling in
Kubernetes clusters with mobile nodes ??
Martina Balbi and
Lance Doherty and
Thomas Watteyne A comprehensive survey on channel
hopping and scheduling enhancements for
TSCH networks . . . . . . . . . . . . . ??
Gang Xu and
Lele Lei and
Yanhui Mao and
Zongpeng Li and
Xiu-Bo Chen and
Kejia Zhang CBRFL: a framework for Committee-based
Byzantine-Resilient Federated Learning ??
Hongfan Mu and
Noura Aljeri and
Azzedine Boukerche Hierarchical multi-scale spatio-temporal
semantic graph convolutional network for
traffic flow forecasting . . . . . . . . ??
Jing Yu and
Yan Xiao and
Lianhua Chi and
Shunli Zhang and
Zongmin Cui Tensor-based ranking-hiding
privacy-preserving scheme for
cloud--fog--edge cooperative
cyber-physical-social systems . . . . . ??
Miguel G. Rodrigues and
Eduardo K. Viegas and
Altair O. Santin and
Fabricio Enembreck A MLOps architecture for near real-time
distributed Stream Learning operation
deployment . . . . . . . . . . . . . . . ??
Ali Aljofey and
Saifullahi Aminu Bello and
Jian Lu and
Chen Xu Comprehensive phishing detection: a
multi-channel approach with variants TCN
fusion leveraging URL and HTML features ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous June 2025 . . . . . . . . . . . . . . . ??
Sukhveer Kaur and
Krishan Kumar and
Naveen Aggarwal Enhancing DDoS defense in SDN using
hierarchical machine learning models . . ??
Lin Qiu and
Kaimin Zhang and
Xingwei Wang and
Bo Yi and
Fei Gao and
Yanpeng Qu and
Min Huang ParallelC-Store: a committee
structure-based reliable parallel
storage mechanism for permissioned
blockchain sharding . . . . . . . . . . ??
Xingsheng Xia and
Jiajia Yan and
Chenhuang Wu and
Chao Meng and
Xiaoyong Yan ASL: an Accurate and Stable Localization
algorithm for multi-hop irregular
networks . . . . . . . . . . . . . . . . ??
Changsong Yang and
Yueling Liu and
Yong Ding and
Hai Liang Secure data migration from fair contract
signing and efficient data integrity
auditing in cloud storage . . . . . . . ??
Umar Ghafoor Fair association and rate maximization
in 6G UAV Aided HS only network and
HetNet . . . . . . . . . . . . . . . . . ??
Quang Truong Vu and
The Minh Trinh and
Thi Hanh Nguyen and
Van Chien Trinh and
Thi Thanh Binh Huynh and
Xuan Thang Nguyen and
Cong Phap Huynh SPARTA-GEMSTONE: a two-phase approach
for efficient node placement in $3$D
WSNs under $Q$-Coverage and
$Q$-Connectivity constraints . . . . . . ??
Saeid Jamshidi and
Ashkan Amirnia and
Amin Nikanjam and
Kawser Wazed Nafi and
Foutse Khomh and
Samira Keivanpour Self-adaptive cyber defense for
sustainable IoT: a DRL-based IDS
optimizing security and energy
efficiency . . . . . . . . . . . . . . . ??
Qingwei Tang and
Wei Sun and
Zhi Liu and
Qiyue Li and
Xiaohui Yuan Multi-agent reinforcement learning based
dynamic self-coordinated topology
optimization for wireless mesh networks ??
Lei Wang and
Jie Sun and
Liang Chen and
Jun Yin On the network coding-based D2D
collaborative recovery scheme for
scalable video broadcasting . . . . . . ??
Andrej Cop and
Blaz Bertalanic and
Carolina Fortuna An overview and solution for
democratizing AI workflows at the
network edge . . . . . . . . . . . . . . ??
Rui Meng and
Song Gao and
Dayu Fan and
Haixiao Gao and
Yining Wang and
Xiaodong Xu and
Bizhu Wang and
Suyu Lv and
Zhidi Zhang and
Mengying Sun and
Shujun Han and
Chen Dong and
Xiaofeng Tao and
Ping Zhang A survey of secure semantic
communications . . . . . . . . . . . . . ??
Feng Li and
Junyi Yang and
Kwok-Yan Lam and
Bowen Shen and
Hao Luo A dynamic spectrum access scheme for
Internet of Things with improved
federated learning . . . . . . . . . . . ??
Rana Zeeshan Ahmad and
Muhammad Rizwan and
Muhammad Jehanzaib Yousuf and
Mohammad Bilal Khan and
Ahmad Almadhor and
Thippa Reddy Gadekallu and
Sidra Abbas Corrigendum to Device-to-device
communication in 5G heterogeneous
network based on game-theoretic
approaches: a comprehensive survey' [J.
Netw. Comput., Volume \bf 238, June
2025, 104152] . . . . . . . . . . . . . ??
Lingling Wang and
Wenjie Zhou and
Linbo Zhai Task offloading strategy of vehicle edge
computing based on reinforcement
learning . . . . . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous July 2025 . . . . . . . . . . . . . . . ??
Van Quan Nguyen and
Viet Hung Nguyen and
Long Thanh Ngo and
Le Minh Nguyen and
Nhien-An Le-Khac Variational Deep Clustering approaches
for anomaly-based cyber-attack detection ??
Ke Xu and
Bing Zhang and
Jingyue Li and
Haitao He and
Rong Ren and
Jiadong Ren DRacv: Detecting and auto-repairing
vulnerabilities in role-based access
control in web application . . . . . . . ??
Vipin Rai and
Pradeep Kumar Mishra and
Shivani Joshi and
Rajiv Kumar and
Avinash Dwivedi and
Amrita Innovative detection of IoT cyber
threats using a GBiTCN-Temformer and
MKOA framework . . . . . . . . . . . . . ??
Yong Chen and
Zhaofeng Xin and
Bingwang Zhang and
Junli Jia A security authentication and key
agreement scheme for railway
space-ground integrated network based on
ideal lattice . . . . . . . . . . . . . ??
Feruz Elmay and
Maha Kadadha and
Rabeb Mizouni and
Shakti Singh and
Azzam Mourad and
Hadi Otrok Predictive safe delivery with machine
learning and digital twins collaboration
for decentralized crowdsourced systems ??
M. Muñoz and
M. Torres and
J. D. Gil and
J. L. Guzmán An Internet of Things platform for
heterogeneous data integration:
Methodology and application examples . . ??
Mehmet Emin Sahin and
Mehmet Demirci HELP4DNS: Leveraging the programmable
data plane for effective and robust
defense against DDoS attacks on DNS . . ??
Haoran Wang and
Jinglin Li and
Peng-Yong Kong and
Wendong Xiao Dynamic charging location determination
for energy level equalization
optimization in wireless rechargeable
sensor networks . . . . . . . . . . . . ??
Behnam Zahednejad and
Chong-zhi Gao Addressing security requirements in
industrial IoT: a robust three-factor
authentication scheme with enhanced
features . . . . . . . . . . . . . . . . ??
Shufen Niu and
Weiying Kong and
Lihua Chen and
Xusheng Zhou and
Ning Wang Privacy-preserving and Verifiable
Federated Learning with weighted average
aggregation in edge computing . . . . . ??
Meng Yue and
Huayang Yan and
Ruize Han and
Zhijun Wu A DDoS attack detection method based on
IQR and DFFCNN in SDN . . . . . . . . . ??
Mohsen Darchini-Tabrizi and
Amirhossein Roudgar and
Reza Entezari-Maleki and
Leonel Sousa Distributed deep reinforcement learning
for independent task offloading in
Mobile Edge Computing . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous August 2025 . . . . . . . . . . . . . . ??
Yali Yuan and
Runke Li and
Guang Cheng FDGAT-WTA: a dynamic detection model for
web tracking and advertising based on
improved graph attention networks . . . ??
Guangquan Zeng and
Wan Hu and
Yongchao Zhou and
Desheng Zheng and
Xiaoyu Li and
Chuang Shi RCA-SI: a Rapid Consensus Algorithm for
Swarm Intelligence in unstable network
environments . . . . . . . . . . . . . . ??
Bruno Ramos-Cruz and
Javier Andreu-Perez and
Francisco J. Quesada-Real and
Luis Martínez Fuzzychain: an equitable consensus
mechanism for blockchain networks . . . ??
Aoshuang Ye and
Shilin Zhang and
Benxiao Tang and
Jianpeng Ke and
Yiru Zhao and
Tao Peng DeFinder: Error-sensitive testing of
deep neural networks via vulnerability
interpretation . . . . . . . . . . . . . ??
Jamal Alotaibi and
Omar Sami Oubbati and
Mohammed Atiquzzaman and
Fares Alromithy and
Mohammad Rashed Altimania Optimizing disaster response with
UAV-mounted RIS and HAP-enabled edge
computing in 6G networks . . . . . . . . ??
Yong Liu and
Bin Xu and
Tianyi Yu and
Qian Meng and
Ben Wang and
Yimo Shen ARS: Adaptive routing strategies using
AT-GCN for traffic optimization in data
center networks . . . . . . . . . . . . ??
Xing Fang and
Yuanfang Chen and
Zakirul Alam Bhuiyan and
Xiajun He and
Guangxu Bian and
Noel Crespi and
Xiaoyuan Jing Mixer-transformer: Adaptive anomaly
detection with multivariate time series ??
Yu-Xuan Xing and
Jie-Sheng Wang and
Shi-Hui Zhang and
Si-Wen Zhang and
Yun-Hao Zhang and
Xiao-Fei Sui Multi-objective transit algorithm based
on density sorting and cylindrical grid
mechanism for layout optimization of
wireless sensor networks . . . . . . . . ??
Elham Abdollahi Abed and
Shahriar Lotfi and
Jaber Karimpour KLCMD: K\_Length Clustering for Miner
Detection on the blockchain social
networks to increase the information
propagation speed . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous September 2025 . . . . . . . . . . . . . ??
Sam Prince Franklin S. and
Mary Shamala L. and
Thankaraja Raja Sree Decentralized certificate issuance and
verification system using Ethereum
blockchain technology . . . . . . . . . ??
Mian Guo and
Yuehong Chen and
Zhiping Peng and
Qirui Li and
Keqin Li Active RIS-assisted task partitioning
and offloading for industrial edge
computing . . . . . . . . . . . . . . . ??
Hongjian Li and
Wei Rao and
Baojian Hu and
Yu Tian and
Jie Shen Energy-aware elastic scaling algorithm
for microservices in Kubernetes clouds ??
Guiliang Chen and
Jie Huang and
Jiazhou Zeng and
Yu Zhou SAKA: Scalable authentication and key
agreement scheme with configurable key
evolution in edge-fog-multicloud
computing environments . . . . . . . . . ??
Hao Lu and
Jianzhi Shi and
Yang Song and
Xingwei Wang and
Bo Yi and
Pengbo Li and
Yudi Cheng and
Min Huang and
Sajal K. Das PMMJC: a preference-based multi-stage
matching-mechanism for JointCloud
environments . . . . . . . . . . . . . . ??
David Martínez and
Aniol Molero and
Eusebi Calle and
Dolors Canals Ametller and
Albert Jové Large-scale web tracking and cookie
compliance: Evaluating one million
websites under GDPR with AI
categorization . . . . . . . . . . . . . ??
Yingya Guo and
Zebo Huang and
Mingjie Ding and
Bin Lin and
Huan Luo PROM: a persistent routing optimization
method based on supervised learning . . ??
Wei Huang and
Xiaoyun Deng Real-time tracking railway intruders
using multiple-agent cooperated large
language models with edge stream
processing engine . . . . . . . . . . . ??
Luca Leonardi and
Lucia Lo Bello and
Gaetano Patti A runtime admission control for
industrial IoT over Bluetooth Low Energy
mesh networks . . . . . . . . . . . . . ??
M. Freire and
A. Maia and
G. Figueiredo and
C. Prazeres and
W. Lobato and
L. Villas and
C. Sommer and
M. Peixoto Clear data, clear roads: Imputing
missing data for enhanced intersection
flow of connected autonomous vehicles ??
Ruba Nasser and
Ahmed Alagha and
Shakti Singh and
Rabeb Mizouni and
Hadi Otrok and
Jamal Bentahar Poisoning behavioral-based worker
selection in mobile crowdsensing using
generative adversarial networks . . . . ??
Donghyun Lee and
Yongin Jeon and
Yunseong Lee and
Nhu-Ngoc Dao and
Woongsoo Na and
Sungrae Cho Energy and density-based stable election
routing protocol for wireless IoT
network . . . . . . . . . . . . . . . . ??
Xu Zhang and
Hankun Zeng and
Chuan Feng and
Yuxin Xu and
Fan Zhang and
Xiaoxue Gong and
Lei Guo Spectrum-efficient hybrid protection
with dedicated and shared paths in
elastic optical data center networks . . ??
Renpin Yao and
Yang Cao and
Yunhe Cui and
Yi Chen and
Chun Guo and
Guowei Shen CPSketch: a `couple' sketch-based heavy
flow detection method . . . . . . . . . ??
Stefano Berlato and
Umberto Morelli and
Roberto Carbone and
Silvio Ranise A secure and quality of service-aware
solution for the end-to-end protection
of IoT applications . . . . . . . . . . ??
Yifei Duan and
Dan Yang and
Xiaochen Qu and
Le Zhang and
Junsuo Qu and
Lu Chao and
Peilu Gan LightCGS-Net: a novel lightweight road
extraction method for remote sensing
images combining global semantics and
spatial details . . . . . . . . . . . . ??
Cheng Qu and
Shuo Wang and
Haowen Zhang and
YuanYi Ma and
Hang Xiong and
Jing Li SwiftShard: Efficient account allocation
in blockchain sharding system . . . . . ??
Jiawei Wu and
Zelin Zhu Intelligent routing optimization for SDN
based on PPO and GNN . . . . . . . . . . ??
Zhiyu Wang and
Mohammad Goudarzi and
Rajkumar Buyya ReinFog: a Deep Reinforcement Learning
empowered framework for resource
management in edge and cloud computing
environments . . . . . . . . . . . . . . ??
Aaron Connolly and
Hany F. Atlam Effective ensemble learning phishing
detection system using hybrid feature
selection . . . . . . . . . . . . . . . ??
Pooja Khobragade and
Ashok Kumar Turuk A gateway-assisted blockchain-based
authentication scheme for
Internet-of-Things . . . . . . . . . . . ??
Jue Chen and
Yurui Ma and
Wenjing Lv and
Xihe Qiu and
Junhao Wu MOOO-RDQN: a deep reinforcement learning
based method for multi-objective
optimization of controller placement and
traffic monitoring in SDN . . . . . . . ??
Ayah Abdel-Ghani and
Jezia Zakraoui and
Abdulaziz Al-Ali and
Abdelhak Belhi and
Sandy Rahme and
Abdelaziz Bouras Towards understanding the behavior of
image-based network intrusion detection
systems . . . . . . . . . . . . . . . . ??
Zhongshu Mao and
Yiqin Lu and
Zhe Cheng and
Kaiqiong Chen Exploring transferable adversarial
attacks for Deep Learning-based Network
Intrusion Detection . . . . . . . . . . ??
Saihua Cai and
Wenjun Zhao and
Jinfu Chen and
Yige Zhao and
Shengran Wang MTD-FRD: Malicious traffic detection
method based on feature representation
and conditional diffusion model . . . . ??
Sergio Elizalde and
Ali AlSabeh and
Ali Mazloum and
Samia Choueiri and
Elie Kfoury and
Jose Gomez and
Jorge Crichigno A survey on security applications with
SmartNICs: Taxonomy, implementations,
challenges, and future trends . . . . . ??
Rami Darwish and
Mahmoud Abdelsalam and
Sajad Khorsandroo Deep learning based XIoT malware
analysis: a comprehensive survey,
taxonomy, and research challenges . . . ??
Neha Singh and
Mainak Adhikari Integrated probabilistic clustering and
Deep Reinforcement Learning for bias
mitigation and device heterogeneity of
Federated Learning in edge networks . . ??
Roopesh Kumar Polaganga and
Qilian Liang Predictive modeling of RRC inactive
transitions and latency impacts for
energy optimization in live NR SA
networks . . . . . . . . . . . . . . . . ??
Ye Chen and
Yingxu Lai and
Congai Zeng Sybil attack detection and traceability
scheme based on temporal heterogeneous
graph attention networks . . . . . . . . ??
Zainab Abdulsalam and
Shayla Islam and
Mohammad Kamrul Hasan and
Raenu Kolandaisamy and
Md Arafatur Rahman and
Hashim Elshafie and
Huda Saleh Abbas and
Ala Eldin Awouda and
Elankovan A. Sundararajan A new segment routing with NEMO BSP
based distributed mobility management
approach in smart city network . . . . . ??
Ali Mazloum and
Elie Kfoury and
Ali AlSabeh and
Jose Gomez and
Jorge Crichigno Enhancing visibility on a science DMZ
with P4-perfSONAR . . . . . . . . . . . ??
Kiran Illyass and
Zubair Baig and
Naeem Syed Robust and lightweighted mutual
authentication scheme for drone swarm
networks . . . . . . . . . . . . . . . . ??
Penghui Zhang and
Hua Zhang and
Yuqi Dai and
Cheng Zeng and
Jingyu Wang and
Jianxin Liao NTP-INT: Network traffic
prediction-driven in-band network
telemetry for high-load switches . . . . ??
Numan Shafi and
Muhammad Abdullah and
Waheed Iqbal and
Faisal Bukhari CEMA: Cost Effective Multi-Layered
Autoscaling for Microservice based
Applications . . . . . . . . . . . . . . ??
Mohsen Ali Alawami and
Sang-Hoon Choi and
Ki-Woong Park SafeAcc: a lightweight and accurate user
identification scheme using
location-identity learning for indoor
Internet access . . . . . . . . . . . . ??
Luca D'Agati and
Laura García and
Rafael Asorey-Cacheda and
Marco Garofalo and
Francesco Longo and
Antonio-Javier Garcia-Sanchez and
Joan Garcia-Haro and
Antonio Puliafito and
Giovanni Merlino Seamless remote roaming activation in
LoRaWAN via an API-driven gateway bridge
service . . . . . . . . . . . . . . . . ??
Nguyen Duy Tan and
Thi-Thu-Huong Le Machine learning-based IoT: Developing
an energy-efficient and balanced
clustering routing protocol (EEB-CR) for
WSNs . . . . . . . . . . . . . . . . . . ??
Weihong Zhou and
Ruiyu Yang and
Yingya Guo and
Huan Luo Network traffic feature representation
with contrastive learning for traffic
engineering in hybrid software defined
networks . . . . . . . . . . . . . . . . ??
Mohammad Hossein Farahnakiyan and
Rasool Esmaeilyfard and
Reza Javidan A proactive privacy-preserving framework
for mobile trajectory sharing . . . . . ??
Yuyu Chen and
Anyang Gu and
Lin Cui and
Longxin Lin MTEAL: Network routing optimization of
SD-WAN traffic engineering integrating
multi-dimensional QoS metrics . . . . . ??
Minghui Li and
Jingfeng Xue and
Yong Wang and
Tianwei Lei and
Zixiao Kong Fine-grained access control with
decentralized delegation for
collaborative healthcare systems . . . . ??
Ilyes Ahmim and
Feriel Bouakkaz and
Abderrezak Rachedi and
Nassira Ghoualmi-Zine LASeR: Lightweight and secure remote
user authentication protocol for
Internet of Drones . . . . . . . . . . . ??
Vitawat Sittakul and
Iacovos Ioannou and
Prabagarane Nagaradjane and
Vasos Vassiliou Intelligent congestion control in 5G
URLLC Software-Defined Networks using
adaptive resource management via
Reinforced Dueling Deep Q-Networks . . . ??
Sushma S. A. and
Madhunisha E. and
Sourav Kanti Addya and
Saifur Rahman and
Shantanu Pal and
Chandan Karmakar Delay-aware partial task offloading
using multicriteria decision model in
IoT-fog-cloud networks . . . . . . . . . ??
Delong Liu and
Shichao Li and
Tianyi Shi and
Zhu Meng and
Guanyu Chen and
Zhicheng Zhao OpenDriver: an open-road driver state
detection benchmark . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous October 2025 . . . . . . . . . . . . . . ??
Rufino Cabrera and
Jon Montalban and
Orlando Landrove and
Erick Jimenez and
Eneko Iradier and
Pablo Angueira and
Sung-Ik Park and
Sunhyoung Kwon and
Namho Hur An enhanced RAN for future converged
audiovisual services: the bcNode . . . . ??
Widhi Yahya and
Yuan-Cheng Lai and
Ying-Dar Lin and
Mahdin Rohmatillah and
Binayak Kar Optimizing ratio-based task offloading
in two-tier edge computing: Multi-agent
weighted action TD3 approach . . . . . . ??
Xavier Martínez-Luaña and
Rebeca P. Díaz-Redondo and
Manuel Fernández-Veiga Privacy-aware Berrut Approximated Coded
Computing for Federated Learning . . . . ??
Marco Siino and
Fabrizio Giuliano and
Ilenia Tinnirello Integrating Large Language Models into
network testbeds: a novel approach for
automated experimentation and
optimization . . . . . . . . . . . . . . ??
ZiWen Dou and
Jun Tian and
HaiQuan Sang and
MingMing Zhang Real-time high-resolution
hardware-software co-design neural
architecture search for unmanned mobile
platforms . . . . . . . . . . . . . . . ??
Shansong Huang and
Raad Raad and
Faisel Tubbal and
Nidhal Odeh An ARP-integrated enhancement of AODV
for wormhole attack detection in mobile
ad hoc networks . . . . . . . . . . . . ??
Yong Peng and
Miao Zhang and
Zhi Zhou and
Hao Huang Joint container orchestrating and
request routing for serverless edge
computing-based simulation applications ??
Linbo Zhai and
Meiyu Jin and
Ping Zhao and
Jiande Sun and
Chuanfen Feng and
Zhiquan Liu and
Linfeng Wei and
Xiaochuan Li and
Youlei Zhang and
Jie Liu Computation bits maximization in
multi-UAV-assisted-multi-vehicle edge
computing system . . . . . . . . . . . . ??
Devi Priya V. S. and
Sibi Chakkaravarthy Sethuraman and
Muhammad Khurram Khan Blockchain-based Deep Learning Models
for Intrusion Detection in Industrial
Control Systems: Frameworks and Open
Issues . . . . . . . . . . . . . . . . . ??
Iure Fé and
Tuan Anh Nguyen and
Eunmi Choi and
Dugki Min and
Jae-Woo Lee and
Vandirleya Barbosa and
André Soares and
Paulo A. L. Rego and
Alessandro Mei and
Francisco Airton Silva Energy-efficient performance
optimization in Kubernetes microservices
using Generalized Stochastic Petri Net ??
Matta Krishna Kumari and
Nikhil Tripathi Adaptive NDN caching: Leveraging dynamic
behaviour for enhanced efficiency . . . ??
Radwa Ahmed Osman Energy-efficient IoT-based tracking and
management system for patients with
cognitive diseases . . . . . . . . . . . ??
Hengyu Li and
Hongjian Li Enhanced energy efficiency in
UAV-assisted Mobile Edge Computing
through improved hybrid nature-inspired
algorithm for task offloading . . . . . ??
Fernando Román-García and
Juan Hernández-Serrano and
Oscar Esparza NoRDEx: a decentralized optimistic
non-repudiation protocol for data
exchanges . . . . . . . . . . . . . . . ??
Vullikanti Vivek and
Bharadwaj Veeravalli ARMBoost+: Empowering stacking,
ensemble, and boosting models for
network intrusion detection with dynamic
rule repository . . . . . . . . . . . . ??
Yong Chen and
Jiaojiao Yuan and
Huaju Liu and
Zhaofeng Xin Spectrum allocation method for
millimeter-wave train-ground
communication in high-speed rail based
on multi-agent attention . . . . . . . . ??
Righa Tandon and
Neeraj Sharma \em DBASC: Decentralized
blockchain-based architecture with
integration of smart contracts for
secure communication in VANETs . . . . . ??
Geng-Li Zhou and
Steven S. W. Lee and
Ren-Hung Hwang and
Yin-Dar Lin and
Yuan-Cheng Lai Performance modelling and optimal stage
assignment for multistage P4 switches ??
Tuba Arif and
David Camacho and
Jong Hyuk Park Unveiling cybersecurity mysteries: a
comprehensive survey on digital
forensics trends, threats, and solutions
in network security . . . . . . . . . . ??
Arieb Ashraf Sofi and
Ajaz Hussain Mir and
Zamrooda Jabeen Bitcoin attacks: a comprehensive study ??
André Perdigão and
José Quevedo and
Rui L. Aguiar 5G slicing under the hood: an in-depth
analysis of 5G RAN features and
configurations . . . . . . . . . . . . . ??
Menglin Zhou and
Bingbing Zheng and
Li Pan and
Shijun Liu Balancing function performance and
cluster load in serverless computing: a
reinforcement learning solution . . . . ??
Yufeng Wang and
Hao Xu and
Jianhua Ma and
Qun jin MTRC: a self-supervised network
intrusion detection framework based on
multiple Transformers enabled data
reconstruction with contrastive learning ??
Jinglin Li and
Haoran Wang and
Sen Zhang and
Peng-Yong Kong and
Wendong Xiao Reinforcement learning based mobile
charging sequence scheduling algorithm
for optimal stochastic event detection
in wireless rechargeable sensor networks ??
Marius Becherer and
Omar K. Hussain and
Frank den Hartog and
Yu Zhang and
Michael Zipperle A realistic trust model evaluation
platform for the Social Internet of
Things (REACT-SIoT) . . . . . . . . . . ??
Md Zahangir Alam and
Mohamed Lassaad Ammari and
Abbas Jamalipour and
Paul Fortier Energy-efficient optimal relay design
for wireless sensor network in
underground mines . . . . . . . . . . . ??
Md Razon Hossain and
Alistair Barros and
Colin Fidge From cloud to edge: dynamic placement
optimization of business processes in
IIoT networks . . . . . . . . . . . . . ??
Simon Dahdal and
Sara Cavicchi and
Alessandro Gilli and
Filippo Poltronieri and
Mauro Tortonesi and
Niranjan Suri and
Cesare Stefanelli RoamML distributed continual learning:
Adaptive and flexible data-driven
response for disaster recovery
operations . . . . . . . . . . . . . . . ??
Ali Nikoutadbir and
Sajjad Torabi and
Sadegh Bolouki Secure event-triggered control for
vehicle platooning against dual
deception attacks . . . . . . . . . . . ??
Maram Helmy and
Mohamed S. Hassan and
Mahmoud H. Ismail and
Usman Tariq Autoformer-based mobility and
handoff-aware prediction for QoE
enhancement in adaptive video streaming
in 4G/5G networks . . . . . . . . . . . ??
Wei Wei and
Jie Huang and
Qinghui Zhang and
Tao Ma and
Peng Li Hybrid connectivity-oriented efficient
shielding for robustness enhancement in
large-scale networks . . . . . . . . . . ??
Lifan Pan and
Hao Guo and
Wanxin Li C-PFL: a committee-based personalized
federated learning framework . . . . . . ??
Wenrui Jiang and
Yongjian Liao and
Qishan Gao and
Han Xu and
Hongwei Wang Secure and efficient data collaboration
in cloud computing: Flexible delegation
via hierarchical attribute-based
signature . . . . . . . . . . . . . . . ??
Zhiyuan Li and
Yujie Jin ST-MemA: Leveraging Swin Transformer and
memory-enhanced LSTM for encrypted
traffic classification . . . . . . . . . ??
Khizar Hameed and
Faiqa Maqsood and
Zhenfei Wang Artificial intelligence-enhanced
zero-knowledge proofs for
privacy-preserving digital forensics in
cloud environments . . . . . . . . . . . ??
Xijian Luo and
Jun Xie and
Liqin Xiong and
Yaqun Liu and
Yuan He Fault-tolerant $3$-D topology
construction of UAV-BSs for full
coverage of users with different QoS
demands . . . . . . . . . . . . . . . . ??
Kaixi Wang and
Yunhe Cui and
Guowei Shen and
Chun Guo and
Yi Chen and
Qing Qian PRAETOR: Packet flow graph and dynamic
spatio-temporal graph neural
network-based flow table overflow attack
detection method . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . ??
Anonymous November 2025 . . . . . . . . . . . . . ??