Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 239, Issue CFeb 2024
Bibliometrics
Skip Table Of Content Section
Research Articles
research-article
Evaluation of TCP Congestion Control Algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario
Abstract

Much work has been done in recent years comparing TCP variants in many scenarios, including the satellite one. Some of these studies were carried out with the ns-2 and ns-3 simulators, which may give a good idea of the behavior of these TCP ...

research-article
Towards learning-based energy-efficient online coordinated virtual network embedding framework
Abstract

Network virtualization is a highly effective technology for resource sharing within data centers, enabling the coexistence of multiple heterogeneous virtual networks in a shared substrate network, thus achieving resource multiplexing. The ...

research-article
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers
Abstract

Modern technology advancements such as Software Defined Networking (SDN) have been employed in distinct scenarios such as cloud computing and wireless networks, and have made network administration simpler since it gives greater flexibility in ...

research-article
Graph neural network based robust anomaly detection at service level in SDN driven microservice system
Abstract

Software-Defined Network (SDN) has been widely employed in data center networks to host various software systems such as microservice systems. A microservice system is constructed by a microservice architecture composed of dozens of services ...

research-article
Unavailability-aware allocation of backup resources considering failures of virtual and physical machines
Abstract

Cloud service providers widely use virtual machines and bring various benefits for customers and themselves. The unavailability of virtual machines is a crucial performance indicator for cloud service quality. However, no previous works studied ...

research-article
Energy-efficient non-anchor channel allocation in NB-IoT cellular networks
Abstract

In Narrowband Internet of Things (NB-IoT), a base station can provide multiple non-anchor channels to release the burden of anchor channels. NB-IoT devices can use non-anchor channels to execute data transmission to save energy. However, we ...

research-article
Walking on two legs: Joint service placement and computation configuration for provisioning containerized services at edges
Abstract

With the development of edge computing and container virtualization, provisioning containerized services at network edges is proposed for high responsiveness and low wide area network (WAN) traffic. However, realizing its full potential faces ...

research-article
Programmable device deployment for efficient network function offloading
Abstract

Network functions (NFs) play an important role in ensuring network security and performance. To improve the NF throughput performance, an emerging method is to offload NFs on programmable devices, bringing orders-of-magnitude improvements. A ...

research-article
Beyond Wi-Fi 7: Spatial reuse through multi-AP coordination
Abstract

Wi-Fi 7, based on the IEEE 802.11be amendment, is designed to increase the maximum achievable throughput, expand the range of operating frequencies, and improve latency and jitter in worst-case scenario. In the context of the discussions to shape ...

research-article
Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection
Abstract

Programmable data planes offer precise control over the low-level processing steps applied to network packets, serving as a valuable tool for analysing malicious flows in the field of intrusion detection. Albeit with limitations on physical ...

Review Article
review-article
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
Abstract

Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of electronic devices deployed across a diverse array of sectors and industries in recent years. Novel concepts have been introduced to captivate the interest of investors, ...

Survey Articles
article
Connecting Internet of Drones and Urban Computing: Methods, protocols and applications
Abstract

This comprehensive survey explores the connection between the Internet of Drones (IoD) and Urban Computing (UC). Drones offer substantial benefits across diverse urban applications encompassing public safety, transportation management, delivery ...

article
Ransomware early detection: A survey
Abstract

In recent years, ransomware attacks have exploded globally, and it has become one of the most significant cyber threats to digital infrastructure. Such attacks have been targeting ranging from individuals to critical infrastructure or large ...

article
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges
Abstract

The advent of pervasive computing and ambient intelligence has opened up new possibilities for the development of intelligent systems that can adapt to the needs of their users. This paper provides a comprehensive survey of recent advancements in ...

article
Interference management in 5G and beyond networks: A comprehensive survey
Abstract

During the last decade, wireless data services have had an incredible impact on people’s lives in ways we could never have imagined. The number of mobile devices has increased exponentially and data traffic has almost doubled every year. ...

Special Issue on Performance evaluation of smart methods and services for wireless ad hoc networks
research-article
Decentralized and collaborative machine learning framework for IoT
Abstract

Decentralized machine learning has recently been proposed as a potential solution to the security issues of the canonical federated learning approach. In this paper, we propose a decentralized and collaborative machine learning framework ...

Highlights

  • This paper introduces an algorithm for resource-limited devices in IoT deployments.
  • Two incremental learning mechanisms are proposed: a full ILVQ and a hybrid approach.
  • Two sharing protocols are proposed: a random and a performance-...

Comments