Last update:
Sat Jan 25 11:26:39 MST 2025
Hermann Maurer Editorial . . . . . . . . . . . . . . . 1 L. C. Jain Editorial . . . . . . . . . . . . . . . 3 Herbert Dawid and Kurt Hornik The dynamics of genetic algorithms in interactive environments . . . . . . . . 5--19 Charles L. Karr Adaptive process control using biological paradigms . . . . . . . . . . 21--44 Kaihei Kuwata and Yuji Kajitani and Masahide Watanabe and Ryu Katayama Chaos simulator as a developing tool and a research environment for applications of chaos engineering . . . . . . . . . . 45--66 Ranjit Bose and Vijayan Sugumaran Knowledge-based approach to domain modeling: organizational process modeling application . . . . . . . . . . 67--89 Dinesh P. Mital and Eam Khwang Teoh and P. N. Suganthan Learning parameters for object recognition by the self-organizing Hopfield network . . . . . . . . . . . . 91--108
L. C. Jain Guest Editorial: Intelligent systems: design and applications. Part 2 . . . . 109 David V. Sánchez A. On the design of a class of neural networks . . . . . . . . . . . . . . . . 111--118 Ferda N. Civelek-Alpaslan and Kathleen M. Swigger A temporal neural network model for constructing connectionist expert system knowledge bases . . . . . . . . . . . . 119--133 Krishna Kottathra and Yianni Attikiouzel A novel multicriteria optimization algorithm for the structure determination of multilayer feedforward neural networks . . . . . . . . . . . . 135--147 Ibikunle Ashiru and Chris Czarnecki and Tom Routen Characteristics of a genetic based approach to path planning for mobile robots . . . . . . . . . . . . . . . . . 149--169 Walter Cedeño and Rao V. Vemuri Genetic algorithms in aquifer management 171--187 John E. Hunt and Denise E. Cooke Learning using an artificial immune system . . . . . . . . . . . . . . . . . 189--212 Larry R. Medsker Microcomputer applications of hybrid intelligent systems . . . . . . . . . . 213--234
Yi Pan and Mounir Hamdi Singular value decomposition on processor arrays with a pipelined bus system . . . . . . . . . . . . . . . . . 235--248 J. M. Kuhlman and M. J. Lyell Development of a user-friendly software planning tool to assess effects of biofilm activity on contaminant reduction in streams . . . . . . . . . . 249--264 Sun-Teck Tan Architecture of a generic instructional planner . . . . . . . . . . . . . . . . 265--274 N. Bourbakis and N. Pereira and S. Mertoguno Hardware design of a letter-driven OCR and document processing system . . . . . 275--294 Jian Tao Wang and Dinesh P. Mital A microcomputer-based prototype for ECG paper record conversion . . . . . . . . 295--307 Gokul Rajaram and V. Rajaraman A probabilistic method for calculating hit ratios in direct mapped caches . . . 309--319 K. Padmanabhan and D. Nedumaran and S. Ananthi Bedside monitor for combined ECG and ultrasound Doppler-echo observations using a microprocessor . . . . . . . . . 321--334
Anonymous Index . . . . . . . . . . . . . . . . . i--vi P. G. O'Donoghue and M. H. Murphy Object modelling and formal specification during real-time system development . . . . . . . . . . . . . . 335--352 Roger Nkambou and Gilles Gauthier Integrating WWW resources in an Intelligent Tutoring System . . . . . . 353--366 Hueyching Janice Jih The impact of learners' pathways on learning performance in multimedia Computer Aided Learning . . . . . . . . 367--380 Daniel J. Helm and Raymond J. D'Amore and Puck-Fai Yan MIDS: a framework for information organization and discovery . . . . . . . 381--394 K. Maly and C. Wild and C. M. Overstreet and H. Abdel-Wahab and A. Gupta and A. Youssef and E. Stoica and R. Talla and A. Prabhu Interactive remote instruction: lessons learned . . . . . . . . . . . . . . . . 395--404 D. Radhakrishnan A microcontroller based pacemaker tester 405--413 Benjamin Singer and George Saon An efficient algorithm for parallel integer multiplication . . . . . . . . . 415--418
Anonymous Guest Editorial: Special issue of JNCA on the digital libraries . . . . . . . . 1--2 Ee-Peng Lim and Ying Lu Integrated queries to existing bibliographic and structured databases 3--24 Shigeo Sugimoto and Akira Maeda and Tetsuo Sakaguchi and Koichi Tabata and Takehisa Fujita Experimental studies on software tools to enhance accessibility to information in digital libraries . . . . . . . . . . 25--44 Alfredo J. Sánchez and John J. Leggett Agent services for users of digital libraries . . . . . . . . . . . . . . . 45--58 Klaus Tochtermann and Thomas Alders and Andreas Seifert DogitaLS1: the Dortmund digital library system . . . . . . . . . . . . . . . . . 59--73 Gene Alloway and Nathan Bos and Kathleen Hamel and Tracy Hammerman and Elisabeth Klann and Joseph Krajcik and David Lyons and Terry Madden and Jon Margerum-Leys and James Reed and Nancy Scala and Elliot Soloway and Ioanna Vekiri and Raven Wallace Creating an inquiry-learning environment using the World Wide Web . . . . . . . . 75--85 John L. Schnase and Deborah L. Kama and Kay L. Tomlinson and José Alfredo Sánchez and Edward L. Cunnius and Nancy R. Morin The Flora of North America digital library: a case study in biodiversity database publishing . . . . . . . . . . 87--103
Gerald Tripp On the design of an ATM interface with facilities for traffic monitoring and generation . . . . . . . . . . . . . . . 105--121 Paul Losleben and Alice S. Tull and Erming Zhou Help-Exchange: an arbitrated system for a help network . . . . . . . . . . . . . 123--134 Richard H. Fowler and Wendy A. L. Fowler and Jorge L. Williams $3$D visualization of WWW semantic content for browsing and query formulation . . . . . . . . . . . . . . 135--149 Daniel R. Bielenberg and Ted Carpenter-Smith Efficacy of story in multimedia training 151--159 B. S. Lee and T. K. Y. Chan and P. C. Leong A `pay-as-you-use' controller for networked laser printers . . . . . . . . 161--169 S. C. Hui and K. Y. Chan and G. Y. Qian Distributed fax message processing system . . . . . . . . . . . . . . . . . 171--190 L. P. Khoo and M. Y. Teo A prototype fuzzy-based classifier system for trajectory planning . . . . . 191--202 Hock C. Chan Visual query languages for entity relationship model databases . . . . . . 203--221
Sumit Ghosh An asynchronous approach to efficient execution of programs on adaptive architectures utilizing FPGAs . . . . . 223--252 Ellen Yu Borkowski and David Henry and Lida L. Larsen and Deborah Mateik Supporting teaching and learning via the Web: transforming hard-copy linear mindsets into Web-flexible creative thinking . . . . . . . . . . . . . . . . 253--265 Jianying Zhou and Dieter Gollmann Evidence and non-repudiation . . . . . . 267--281 Renji Tao and Shihua Chen A variant of the public key cryptosystem FAPKC3 . . . . . . . . . . . . . . . . . 283--303 H. J. Schumacher and Sumit Ghosh A fundamental framework for network security . . . . . . . . . . . . . . . . 305--322
Anonymous Index and Contents to Volume 20 . . . . i--x Holger Bock and Wolfgang Mayerwieser and Karl C. Posch and Reinhard Posch and Volker Schindler An integrated co-processor architecture for a smartcard . . . . . . . . . . . . 323--337 Sandra L. Esler and Michael L. Nelson NASA indexing benchmarks: evaluating text search engines . . . . . . . . . . 339--353 Michal Iglewski and Tomasz Müldner Comparison of formal specification methods and object-oriented paradigms 355--377 Don E. George and E. Salari Real-time pitch extraction of voiced speech . . . . . . . . . . . . . . . . . 379--387 Schubert Foo and Siu Cheung Hui Delivery of video mail on the World Wide Web . . . . . . . . . . . . . . . . . . 389--403 Bernhard Leisch and Peter Schuhmayer An architecture for distributed visualization of technical processes . . 405--420
Guojun Lu and Chester Kang An efficient communication scheme for media on-demand services with hard QoS guarantees . . . . . . . . . . . . . . . 1--15 P. Blenkhorn and D. G. Evans Using speech and touch to enable blind people to access schematic diagrams . . 17--29 Nader Mir-Fakhraei An efficient multicast approach in an ATM switching network for multimedia applications . . . . . . . . . . . . . . 31--39 Ee-Luang Ang and Syin Chan and Bu-Sung Lee Deployment of VCR services on a computer network . . . . . . . . . . . . . . . . 41--52 Mark Ratcliffe and Tim Paul Davies Using MBone technology to support a framework for a remote advisory service 53--68
Imran Khan and Howard C. Card Adaptive information agents using competitive learning . . . . . . . . . . 69--89 N. Vlajic and H. C. Card Categorizing Web pages on the subject of neural networks . . . . . . . . . . . . 91--105 Sherali Zeadally and Weiyou Cui Experiences with multimedia applications over native ATM . . . . . . . . . . . . 107--123 E. C. Tan and A. Wahab and H. W. Yong Interfacing reprogrammable universal remote controller with multimedia PC . . 125--134 C. C. Charlton and P. H. Leng and R. K. Lloyd and R. Turnbull The use of macroprocessing for Web site standardization . . . . . . . . . . . . 135--148 Gerard Parr and Kevin Curran Optimal multimedia transport on the Internet . . . . . . . . . . . . . . . . 149--161
Johnny S. K. Wong and Rishi Nayar and Armin R. Mikler A framework for a World Wide Web-based Data Mining system . . . . . . . . . . . 163--185 P. C. Saxena and Sangita Gupta A performance comparison of token- and tree-based mutual exclusion algorithms on Chordal Rings . . . . . . . . . . . . 187--201 K. V. Chin and S. C. Hui and S. Foo Enhancing the quality of Internet voice communication for Internet telephony systems . . . . . . . . . . . . . . . . 203--218
Anonymous Contents and Index to Volume 21 . . . . i--viii Bor Prihavec and Franc Solina User interface for video observation over the Internet . . . . . . . . . . . 219--237 Nikolas M. Mitrou and Konstantine Kavidopoulos Traffic engineering using a class of M/G/1 models . . . . . . . . . . . . . . 239--271 Nasser-Eddine Rikli An effective model for VBR video with application to an ATM multiplexer . . . 273--285 L. Moreno and R. M. Aguilar and C. A. Martin and J. D. Piñeiro and J. I. Estévez and J. L. Sánchez and J. F. Sigut and V. I. Jiménez Patient-centered computer simulation in hospital management . . . . . . . . . . 287--310
Wei-Chou Chen and Tzung-Pei Hong and Rong Jeng A framework of decision support systems for use on the World Wide Web . . . . . 1--17 Denis Helic and Hermann Maurer and Nick Scherbakov Introducing hypermedia composites to WWW 19--32 Hamesh Chawla and Geoff Dillon and Riccardo Bettati HYDRANET: Network support for scaling of large-scale services . . . . . . . . . . 33--50 Joachim Hasebrook Web-based training, performance and controlling . . . . . . . . . . . . . . 51--64 Claude Ghaoui and M. J. Taylor Special issue on: `Support for Open and Distance Learning on the WWW' . . . . . 65--68
Harri Klapuri and Jarmo Takala and Jukka Saarinen Safety, liveness and real-time in embedded system design . . . . . . . . . 69--89 M. Kumar and S. Venkatesh and K.-Y. Lim and H. Santoso Information access and QoS issues in a mobile computing environment . . . . . . 91--118 K. Hanner and R. Hörmanseder Managing Windows NT$^\reg $ file system permissions --- a security tool to master the complexity of Microsoft Windows NT$^\reg $ file system permissions . . . . . . . . . . . . . . 119--131 Christine Steeples and Peter Goodyear Enabling professional learning in distributed communities of practice: Descriptors for multimedia objects . . . 133--145 Uffe Kock Wiil and Kenneth M. Anderson and Michael Bieber Call for Papers: Special Issue on: Hypermedia Extensibility Mechanisms and Scripting Languages . . . . . . . . . . 147--148
J. E. Gilbert and C. Y. Han Adapting instruction in search of `a significant difference' . . . . . . . . 149--160 Brian M. Slator and Paul Juell and Philip E. McClean and Bernhardt Saini-Eidukat and Donald P. Schwert and Alan R. White and Curt Hill Virtual environments for education . . . 161--174 Guojun Lu Design issues of multimedia information indexing and retrieval systems . . . . . 175--198 Gail J. Ahn and Ravi Sandhu Towards role-based administration in network information services . . . . . . 199--213
Anonymous Index and Contents to Volume 22 . . . . i--viii Hongbo Du and Laurent Wery Micro: a normalization tool for relational database designers . . . . . 215--232 David Mioduser and Rafi Nachmias and Avigail Oren and Orly Lahav Web-based learning environments (WBLE): Current implementation and evolving trends . . . . . . . . . . . . . . . . . 233--247 Rosa María Carro and Estrella Pulido and Pilar Rodríguez Dynamic generation of adaptive Internet-based courses . . . . . . . . . 249--257 Luca Iocchi The Web-OEM approach to Web information extraction . . . . . . . . . . . . . . . 259--269
Wolfgang Hürst User interfaces for telepresentations --- Input devices, interaction concepts and design issues . . . . . . . . . . . 1--15 Wim de Boer and Betty Collis Instructors' choices for a WWW-based course-support environment . . . . . . . 17--26 Chih-Hsiung Tu On-line learning migration: from social learning theory to social presence theory in a CMC environment . . . . . . 27--37 Chih-Hsiung Tu Critical examination of factors affecting interaction on CMC . . . . . . 39--58
Chwei-King Mok and Nader F. Mir An efficient interconnection network for large-scale computer communications applications . . . . . . . . . . . . . . 59--75 Dave Berque and Andrew Hutcheson and David K. Johnson and Larry Jovanovic and Kyle Moore and Carl Singer and Kevin M. Slattery The design of an interface for student note annotation in a networked electronic classroom . . . . . . . . . . 77--91 Colin Pattinson A simulated network management information base . . . . . . . . . . . . 93--107 Gerhard Eschelbeck Active Security --- a proactive approach for computer security systems . . . . . 109--130 Jon Dron and Richard Mitchell and Phil Siviter and Chris Boyne CoFIND --- an experiment in $N$-dimensional collaborative filtering 131--142 Bu-Sung Lee and Chiew-Tong Lau and Nicholas C. H. Vun Power LAN MIB for management of intelligent telecommunication equipment 143--154
Anonymous Preface by the Editor in Chief . . . . . 155 Bert J. Dempsey and Micah Beck Preface to `Developing New Network-based Storage Services for Internet-supported Collaborative Communities' . . . . . . . 157--159 Ivan Tomek Preface to `Virtual Environments' . . . 161--162 John Chung-I Chuang and Marvin A. Sirbu Distributed network storage service with quality-of-service guarantees . . . . . 163--185 Ann Chervenak and Ian Foster and Carl Kesselman and Charles Salisbury and Steven Tuecke The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets 187--200 Bert J. Dempsey Performance analysis of a scaleable design for replicating file collections in wide-area networks . . . . . . . . . 201--218 Laura Slaughter and Gary Marchionini and Gary Geisler Open video: a framework for a test collection . . . . . . . . . . . . . . . 219--245 Anna Cicognani Language and design in text-based virtual worlds . . . . . . . . . . . . . 247--274 Ivan Tomek The design and implementation of a MOO 275--289 Alicia Díaz and Alejandro Fernández A pattern language for virtual environments . . . . . . . . . . . . . . 291--309 Zi\`ed Choukair and Damien Retailleau A QoS model for collaboration through Distributed Virtual Environments . . . . 311--334
Anonymous Index and contents to volume 23 . . . . iii--viii H. Maurer Preface for the special issue `Support for flexible e-Learning on the WWW' . . 335 Claude Ghaoui and M. J. Taylor Support for flexible e-Learning on the WWW: a special issue . . . . . . . . . . 337--338 O. Brand and L. Petrak and D. Sturzebecher and M. Zitterbart Supporting Tele-Teaching: visualization aspects . . . . . . . . . . . . . . . . 339--355 Weigang Wang and Jörg M. Haake and Jessica Rubart and Daniel A. Tietze Hypermedia-based support for cooperative learning of process knowledge . . . . . 357--379 Samuli Pekkola and Mike Robinson and Jonni Korhonen and Saku Hujala and Tero Toivonen Multimedia application to support distance learning and other social interactions in real-time . . . . . . . 381--399 Hans-Peter Dommel and J. J. Garcia-Luna-Aceves A coordination framework and architecture for Internet groupware . . 401--427 Stuart K. MacGlashan and Malcolm J. Taylor MUSiCAL: an object-oriented hypermedia data model for the reuse of museum information for computer-aided learning and the World-Wide Web . . . . . . . . . 429--453 Claude Ghaoui Document icon bar for the support of authoring, learning and navigation on the Web: Usability issues . . . . . . . 455--475
Uffe Kock Wiil and Kenneth M. Anderson Preface to `Hypermedia extensibility mechanisms and scripting languages' . . 1--5 Uffe Kock Wiil A framework for classifying extensibility mechanisms in hypermedia systems . . . . . . . . . . . . . . . . 7--18 Peter J. Nürnberg Extensibility in component-based open hypermedia systems . . . . . . . . . . . 19--38 John Noll and Walt Scacchi Specifying process-oriented hypertext for organizational computing . . . . . . 39--61 Serge Demeyer Extensibility via a meta-level architecture . . . . . . . . . . . . . . 63--74 Kenneth M. Anderson The extensibility mechanisms of the Chimera open hypermedia system . . . . . 75--86
Gail-Joon Ahn and Kwangjo Kim CONUGA: Constrained User-Group Assignment . . . . . . . . . . . . . . . 87--100 Harri Klapuri and Jarmo Takala and Jukka Saarinen Implementing reactive closed-system specifications . . . . . . . . . . . . . 101--123 Guoyi Li and Ian Li-Jin Thng and Lawrence Wai Choong Wong ABR services for overcoming misbehaving sources in a heterogeneous environment 125--149 David Hua Min Tan and Siu Cheung Hui and Chiew Tong Lau Wireless messaging services for mobile users . . . . . . . . . . . . . . . . . 151--166 Igor Djurovic and Srdjan Stankovic and Ioannis Pitas Digital watermarking in the fractional Fourier transformation domain . . . . . 167--173
C. Bouras and A. Philopoulos and Th. Tsiatsos e-Learning through distributed virtual environments . . . . . . . . . . . . . . 175--199 Duen-Ren Liu and Yuh-Jaan Lin and Chung-Min Chen and Ya-Wen Huang Deployment of personalized e-catalogues: an agent-based framework integrated with XML metadata and user models . . . . . . 201--228 W. F. Poon and K. T. Lo Design of a starvation-free storage system for a multicast video-on-demand system using a double-rate batching policy . . . . . . . . . . . . . . . . . 229--247 Ming-Chung Tang and Chun-Nun Chou and Ching-Hui Tang and D. C. Pan and Wei-Kuan Shih Exploiting GSM short message service for ubiquitous accessing . . . . . . . . . . 249--267 Uffe Kock Wiil and David L. Hicks and Peter J. Nürnberg Special Issue on `Structural Computing' 269--271
Anonymous Volume Contents . . . . . . . . . . . . i--viii J. A. Lennon and H. Maurer MUSLI: a hypermedia interface for dynamic, interactive, and symbolic communication . . . . . . . . . . . . . 273--291 J. A. Lennon and H. Maurer Augmenting text and voice conversations with dynamic, interactive abstractions using P2P networking . . . . . . . . . . 293--306 Nawel Sabri and Chantal Taconet A generic tool to federate WAN servers 307--331 Rached N. Zantout and Ahmed A. Guessoum An automatic English--Arabic HTML page translation system . . . . . . . . . . . 333--357
P. C. Saxena and D. R. Choudhury and G. Gabrani and S. Gupta and M. Bhardwaj and M. Chopra A heuristic approach to resource locations in broadband networks . . . . 1--35 M. Kouadio and U. Pooch Technology on social issues of videoconferencing on the Internet: a survey . . . . . . . . . . . . . . . . . 37--56 Yoon-Jung Rhee and Eun-Sil Hyun and Tai-Yun Kim Connection management for QoS service on the Web . . . . . . . . . . . . . . . . 57--68
Heejin Jang and Sangwook Kim Intruder tracing through dynamic extension of a security domain . . . . . 69--91 Chun-I Fan and Chin-Laung Lei An unlinkably divisible and intention attachable ticket scheme for runoff elections . . . . . . . . . . . . . . . 93--107 Waleed E. Farag and Hussein Abdel-Wahab A new paradigm for analysis of MPEG compressed videos . . . . . . . . . . . 109--127 T. Morris and P. Blenkhorn and Farhan Zaidi Blink detection for real-time eye tracking . . . . . . . . . . . . . . . . 129--143 Bu-Sung Lee and Chai-Kiat Yeo and Ruijin Fu Hybrid quality adaptation mechanism for layered multicast over the Internet . . 145--159
Chih-Yung Chang and Shin-Chih Tu Active route-maintenance protocol for signal-based communication path in ad hoc networks . . . . . . . . . . . . . . 161--177 Nischal M. Piratla and Anura P. Jayasumana A neural network based real-time gaze tracker . . . . . . . . . . . . . . . . 179--196 Anita Behle and Michael Kirchhof and Manfred Nagl and Ralf Welter Retrieval of software components using a distributed web system . . . . . . . . . 197--222 Rudolf Hörmanseder and Johann Murauer and Jörg R. Mühlbacher Managing data flow in a DAC supporting security system . . . . . . . . . . . . 223--238
Fawzi Daoud and Takahiko Nomura Preface to `smart spaces' . . . . . . . 239--242 Daphne Economou and William L. Mitchell and Steve R. Pettifer Problem driven CVE technology development . . . . . . . . . . . . . . 243--262 Takahiko Nomura Design of `Ba' for successful Knowledge Management --- how enterprises should design the places of interaction to gain competitive advantage . . . . . . . . . 263--278 Masakatsu Kosuga and Naoki Kirimoto and Tatsuya Yamazaki and Tomonori Nakanishi and Masakazu Masuzaki and Kazuo Hasuike A multimedia service composition scheme for ubiquitous networks . . . . . . . . 279--293 Christopher Maher and Margaret Corbit Creating genetic applications for informal science learning in multi-user virtual environments . . . . . . . . . . 295--308 Tatsuya Yamazaki QoS-based media retrieval for networked digital archives . . . . . . . . . . . . 309--317 Stéphane Lo Presti and Didier Bert and Andrzej Duda TAO: Temporal Algebraic Operators for modeling multimedia presentations . . . 319--342
Hilde van der Togt Publisher's Note . . . . . . . . . . . . 1--2 Uffe K. Wiil and Peter J. Nürnberg and David L. Hicks Structural computing: research directions, systems and issues . . . . . 3--9 Peter J. Nürnberg and Monica M. C. Schraefel Relationships among structural computing and other fields . . . . . . . . . . . . 11--26 David L. Hicks and Uffe K. Wiil Searching for revolution in structural computing . . . . . . . . . . . . . . . 27--45 Kenneth M. Anderson and Susanne A. Sherba and William Van Lepthien Structural templates and transformations: the Themis structural computing environment . . . . . . . . . 47--71 Weigang Wang Visualizing and interacting with hypermedia-based process-centric enterprise models . . . . . . . . . . . 73--93 David E. Millard Discussions at the data border: from generalised hypertext to structural computing . . . . . . . . . . . . . . . 95--114 Uffe K. Wiil and Samir Tata and David L. Hicks Cooperation services in the Construct structural computing environment . . . . 115--137 Manolis Tzagarakis and Dimitris Avramidis and Maria Kyriakopoulou and Monica M. C. Schraefel and Michalis Vaitis and Dimitris Christodoulakis Structuring primitives in the Callimachus component-based open hypermedia system . . . . . . . . . . . 139--162 Anonymous Calendar . . . . . . . . . . . . . . . . ifc--ifc
B. Prabhakaran and Yuguang Tu and Yin Wu Experiences with an object-level scalable web framework . . . . . . . . . 163--196 K. Komathy and V. Ramachandran and P. Vivekanandan Security for XML messaging services --- a component-based approach . . . . . . . 197--211 Gareth Evans and Paul Blenkhorn Architectures of assistive software applications for Windows-based computers 213--228
M. Zaki and M. G. Darwish and G. Osman GBF: a grammar based filter for Internet applications . . . . . . . . . . . . . . 229--257 Nikitas M. Sgouros and Stelios Gerogiannakis Robot teleoperation environments featuring WAP-based wireless devices . . 259--271 C. K. Yeo and B. S. Lee and M. H. Er A framework for multicast video streaming over IP networks . . . . . . . 273--289
Anonymous Index to volume 26 . . . . . . . . . . . III--IV Ching-Lung Chang and Kuo-Sheng Hsu Design and implementation of MP3-music on demand system using streaming technology . . . . . . . . . . . . . . . 291--321 Li Chunlin and Li Layuan Apply agent to build grid service management . . . . . . . . . . . . . . . 323--340
Jasmine Banks and Geoffery Ericksson and Kevin Burrage and Peter Yellowlees and Sean Ivermee and Jennifer Tichon Constructing the hallucinations of psychosis in Virtual Reality . . . . . . 1--11 Wassim Itani and Ayman Kayssi J2ME application-layer end-to-end security for m-commerce . . . . . . . . 13--32 Duen-Ren Liu and Tzyy-Feng Hwang An agent-based approach to flexible commerce in intermediary-centric electronic markets . . . . . . . . . . . 33--48 Asrar Sheikh and Tao Wan and Zaki Alakhdhar A unified approach to analyze multiple access protocols for buffered finite users . . . . . . . . . . . . . . . . . 49--76
Heng Wang and Jie Fang and Hua Wang and Ya-Min Sun TSDLMRA: an efficient multicast routing algorithm based on Tabu search . . . . . 77--90 C. Bouras and Th. Tsiatsos Distributed virtual reality: building a multi-user layer for the EVE Platform 91--111 G. A. Aderounmu Performance comparison of remote procedure calling and mobile agent approach to control and data transfer in distributed computing environment . . . 113--129
A. U. H. Sheikh and T. Wan and S. Z. Alakhdhar and I. Lambadaris and M. Devetsikiotis Performance analysis of buffered R-ALOHA systems using tagged user approach . . . 131--150 Wen-Lin Yang A comparison of two optimal approaches for the MCOP problem . . . . . . . . . . 151--162 Denis Helic and Hermann Maurer and Nick Scerbakov Knowledge transfer processes in a modern WBT system . . . . . . . . . . . . . . . 163--190
Anonymous Index . . . . . . . . . . . . . . . . . III--IV Wei-Bin Lee and Kuan-Chieh Liao Constructing identity-based cryptosystems for discrete logarithm based cryptosystems . . . . . . . . . . 191--199 M. Zaki and Tarek S. Sobh A cooperative agent-based model for active security systems . . . . . . . . 201--220 Sergio A. Velastin and Benny Lo and Jie Sun A flexible communications protocol for a distributed surveillance system . . . . 221--253
Tao Gu and Hung Keng Pung and Da Qing Zhang A service-oriented middleware for building context-aware services . . . . 1--18 M. Khedr and A. Karmouch ACAI: agent-based context-aware infrastructure for spontaneous applications . . . . . . . . . . . . . . 19--44 Ismail Erturk A new method for transferring CAN messages using wireless ATM . . . . . . 45--56 Huamin Chen and Prasant Mohapatra Using service brokers for accessing backend servers for web applications . . 57--74
Anonymous Announcement . . . . . . . . . . . . . . I Anonymous Announcement . . . . . . . . . . . . . . II Anonymous Preface . . . . . . . . . . . . . . . . 75--76 Reginald L. Walker Hierarchical task topology for retrieving information from within a simulated information ecosystem . . . . 77--96 A. Rungsawang and N. Angkawattanawit Learnable topic-specific web crawler . . 97--114 Wataru Sunayama and Masahiko Yachida Panoramic View System for extracting key sentences based on viewpoints and application to a search engine . . . . . 115--127 Mark P. Sinka and David W. Corne The BankSearch web document dataset: investigating unsupervised clustering and category similarity . . . . . . . . 129--146 Xiaozhe Wang and Ajith Abraham and Kate A. Smith Intelligent web traffic mining and analysis . . . . . . . . . . . . . . . . 147--165 Srinivas Mukkamala and Andrew H. Sung and Ajith Abraham Intrusion detection using an ensemble of intelligent paradigms . . . . . . . . . 167--182
Elhadi Shakshuki and Zhonghai Luo and Jing Gong An agent-based approach to security service . . . . . . . . . . . . . . . . 183--208 Ch. Bouras and A. Gkamas and I. Nave and D. Primpas and A. Shani and O. Sheory and K. Stamos and Y. Tzruya Application on demand system over the Internet . . . . . . . . . . . . . . . . 209--232 Tao Gu and Hung Keng Pung and Jian Kang Yao Towards a flexible service discovery . . 233--248
Anonymous Index to Volume 28 . . . . . . . . . . . III--IV D. Di Sorte and G. Reali Pricing and brokering services over interconnected IP networks . . . . . . . 249--283 Christos Bouras and Afrodite Sevasti Service level agreements for DiffServ-based services' provisioning 285--302
Bing-Yi Zhang and Ya-Min Sun Fractional alpha stable network traffic model and its application in QoS routing 1--10 Elizabeth A. Thompson and Eric Harmison and Robert Carper and Robert Martin and Jim Isaacs Robot teleoperation featuring commercially available wireless network cards . . . . . . . . . . . . . . . . . 11--24 Leonardo Bidese de Pinho and Claudio Luis de Amorim Assessing the efficiency of stream reuse techniques in P2P video-on-demand systems . . . . . . . . . . . . . . . . 25--45 N. Zhang and Q. Shi and M. Merabti and R. Askwith Practical and efficient fair document exchange over networks . . . . . . . . . 46--61 T. Morris and V. Chauhan Facial feature tracking for cursor control . . . . . . . . . . . . . . . . 62--80 Anonymous Editorial board . . . . . . . . . . . . CO2
Nikhil Ichalkaranje Editorial . . . . . . . . . . . . . . . 81--82 Yukiko I. Nakano and Toshihiro Murayama and Masashi Okamoto and Daisuke Kawahara and Qing Li and Sadao Kurohashi and Toyoaki Nishida Cards-to-presentation on the web: generating multimedia contents featuring agent animations . . . . . . . . . . . . 83--104 Pierre Urlings and Christos Sioutis and Jeff Tweedale and Nikhil Ichalkaranje and Lakhmi Jain A future framework for interfacing BDI agents in a real-time teaming environment . . . . . . . . . . . . . . 105--123 E. V. Krishnamurthy and V. K. Murthy Distributed agent paradigm for soft and hard computation . . . . . . . . . . . . 124--146 Colin Fyfe and Lakhmi Jain Teams of intelligent agents which learn using artificial immune systems . . . . 147--159 J. Jarvis and R. Rönnquist and D. McFarlane and L. Jain A team-based holonic approach to robotic assembly cell control . . . . . . . . . 160--176 Anders I. Mòrch and Jan A. Dolonen and Jan Eirik B. Nævdal An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system . . . . . . . . . . . 177--199 Weiqin Chen Supporting teachers' intervention in collaborative knowledge building . . . . 200--215 Anonymous Editorial board . . . . . . . . . . . . CO2
A. A. Akintola and G. A. Aderounmu and M. O. Adigun Performance analysis of double buffer technique (DBT) model for mobility support in wireless IP networks . . . . 217--234 Shih-Lin Wu and Sui Fan-Jiang and Zi-Tsan Chou An efficient quality-of-service MAC protocol for infrastructure WLANs . . . 235--261 Hea-Sook Park and Doo-Kwon Baik A study for control of client value using cluster analysis . . . . . . . . . 262--276 Susanne Loidl Towards pervasive learning: WeLearn.Mobile. A CPS package viewer for handhelds . . . . . . . . . . . . . . . 277--293 Peng Liu and Hai Wang and Lunquan Li Real-time data attack isolation for commercial database applications . . . . 294--320 Crescencio Bravo and Miguel Á. Redondo and Manuel Ortega and M. Felisa Verdejo Collaborative distributed environments for learning design tasks by means of modelling and simulation . . . . . . . . 321--342 M. Avvenuti and A. Vecchio Application-level network emulation: the EmuSocket toolkit . . . . . . . . . . . 343--360 Anonymous Editorial board . . . . . . . . . . . . CO2
Ajith Abraham and Kate Smith and Ravi Jain and Lakhmi Jain Network and information security: a computational intelligence approach: Special Issue of Journal of Network and Computer Applications . . . . . . . . . 1--3 Feng-Hsing Wang and Lakhmi C. Jain and Jeng-Shyang Pan VQ-based watermarking scheme with genetic codebook partition . . . . . . . 4--23 Tai-Wen Yue and Suchen Chiang The semipublic encryption for visual cryptography using Q'tron neural networks . . . . . . . . . . . . . . . . 24--41 Gail-Joon Ahn and Badrinath Mohan and Seng-Phil Hong Towards secure information sharing using role-based delegation . . . . . . . . . 42--59 Yihua Liao and V. Rao Vemuri and Alejandro Pasos Adaptive anomaly detection with evolving connectionist systems . . . . . . . . . 60--80 Ajith Abraham and Ravi Jain and Johnson Thomas and Sang Yong Han D-SCIDS: Distributed soft computing intrusion detection system . . . . . . . 81--98 Tansel Özyer and Reda Alhajj and Ken Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening . . . . . . . . . . . . . 99--113 Sandhya Peddabachigari and Ajith Abraham and Crina Grosan and Johnson Thomas Modeling intrusion detection system using hybrid intelligent systems . . . . 114--132 Ali El Kateeb High-speed routers design using data stream distributor unit . . . . . . . . 133--144 Chen Hongsong and Ji Zhenzhou and Hu Mingzeng and Fu Zhongchuan and Jiang Ruixiang Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol . . . . . . . . . . . . . . . . 145--166 Khong Neng Choong and B. M. Ali and V. Prakash and Yoke Chek Yee The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme . . . . . . . . . . . . . 167--185 Hojjat Jafarpour and Nasser Yazdani and Navid Bazzaz-zadeh A scalable group communication mechanism for mobile agents . . . . . . . . . . . 186--208 V. Kalogeraki and D. Zeinalipour-Yazti and D. Gunopulos and A. Delis Distributed middleware architectures for scalable media services . . . . . . . . 209--243 Tainchi Lu and Chinghao Hsu Mobile agents for information retrieval in hybrid simulation environment . . . . 244--264 Hui Guo and Guobin Shen and Zhiguang Wang and Shipeng Li Optimized streaming media proxy and its applications . . . . . . . . . . . . . . 265--281 Lei Guo and Hongfang Yu and Lemin Li Dynamic survivable algorithm for meshed WDM optical networks . . . . . . . . . . 282--295 Jenq-Shiou Leu and Yuan-Po Chi and Wei-Kuan Shih Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS) . . . . . . . . . . . . . . . . 296--307 Lijun Qian and Ning Song and Xiangfang Li Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach . . . . . . . . . . . . . . . . 308--330 Kwang Sik Shin and Jin Ha Jung and Jin Young Cheon and Sang Bang Choi Real-time network monitoring scheme based on SNMP for dynamic information 331--353 Xiaobo Zhou and Jianbin Wei and Cheng-Zhong Xu Quality-of-service differentiation on the Internet: a taxonomy . . . . . . . . 354--383 Suneuy Kim and Chita R. Das An analytical model for interval caching in interactive video servers . . . . . . 384--413 M. Saniee Abadeh and J. Habibi and C. Lucas Intrusion detection using a fuzzy genetics-based learning algorithm . . . 414--428 Anonymous Editorial board . . . . . . . . . . . . CO2
Rongxi He and Bin Lin and Lemin Li Dynamic service-level-agreement aware shared-path protection in WDM mesh networks . . . . . . . . . . . . . . . . 429--444 B. Stephen and L. Petropoulakis The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement 445--465 Wang Liang and Guo Yi-Ping and Fang Ming Web search engine based on DNS . . . . . 466--478 M. Esteve and C. E. Palau and J. Martínez-Nohales and B. Molina A video streaming application for urban traffic management . . . . . . . . . . . 479--498 M. Can Filibeli and Oznur Ozkasap and M. Reha Civanlar Embedded web server-based home appliance networks . . . . . . . . . . . . . . . . 499--514 Xiaobo Zhou and Cheng-Zhong Xu Efficient algorithms of video replication and placement on a cluster of streaming servers . . . . . . . . . . 515--540 Kenneth J. Turner Representing and analysing composed web services using \sc Cress . . . . . . . . 541--562 Bouras Christos and Kounenis Giorgos and Misedakis Ioannis A web content manipulation technique based on page Fragmentation . . . . . . 563--585 Siti Z. Z. Abidin and Min Chen and Phil W. Grant Designing interaction protocols using noughts and crosses type games . . . . . 586--613 Alejandro Quintero and Da Yu Li and Harold Castro A location routing protocol based on smart antennas for ad hoc networks . . . 614--636 Y. Bai and M. R. Ito A new technique for minimizing network loss from users' perspective . . . . . . 637--649 Lei Guo and Jin Cao and Hongfang Yu and Lemin Li A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks . . . . . . . . . . . . . . . . 650--661 Chin-Chen Chang and Chih-Yang Lin and Keng-Chu Lin Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots . . . . . . . . . . . 662--676 Jin Cao and Lei Guo and Hongfang Yu and Lemin Li A novel recursive shared segment protection algorithm in survivable WDM networks . . . . . . . . . . . . . . . . 677--694 Rongping Lin and Sheng Wang and Lemin Li Protections for multicast session in WDM optical networks under reliability constraints . . . . . . . . . . . . . . 695--705 Chan-Ho Min and Sehun Kim On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks . . . . . . . . . 706--727 Gwo-Jong Yu and Chih-Yung Chang and Kuei-Ping Shih and Shih-Chieh Lee Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system . . . . . . . . . 728--749 Kwang-Sik Shin and Jin-Ha Jung and Wan-Oh Yoon and Sang-Bang Choi P2P transfer of partial stream in multimedia multicast . . . . . . . . . . 750--774 Yiqun Xu and Luigi Logrippo and Jacques Sincennes Detecting feature interactions in CPL 775--799 Ibrahim Özçelik and Hüseyin Ekiz Building an interconnection between PROFIBUS and ATM networks . . . . . . . 800--817 Anonymous Editorial board . . . . . . . . . . . . CO2
Xiaobo Zhou and Cheng-Zhong Xu Distributed denial-of-service and intrusion detection . . . . . . . . . . 819--822 Shigang Chen and Yong Tang and Wenliang Du Stateful DDoS attacks and targeted filtering . . . . . . . . . . . . . . . 823--840 Matthias Bossardt and Thomas Dübendorfer and Bernhard Plattner Enhanced Internet security by a distributed traffic control service based on traffic ownership . . . . . . . 841--857 Vasilios A. Siris and Ilias Stavrakis Provider-based deterministic packet marking against distributed DoS attacks 858--876 Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao Information sharing for distributed intrusion detection systems . . . . . . 877--899 Gabriel López and Oscar Cánovas and Antonio F. Gómez and Jesús D. Jiménez and Rafael Marín A network access control approach based on the AAA architecture and authorization attributes . . . . . . . . 900--919 Celia Li and Cungang Yang and Richard Cheung Key management for role hierarchy in distributed systems . . . . . . . . . . 920--936 Bing Wu and Jie Wu and Eduardo B. Fernandez and Mohammad Ilyas and Spyros Magliveras Secure and efficient key management in mobile ad hoc networks . . . . . . . . . 937--954 George D. Magoulas and George Ghinea Intelligence-based adaptation for ubiquitous multimedia communications . . 955--957 Dietmar Jannach and Klaus Leopold Knowledge-based multimedia adaptation for ubiquitous multimedia consumption 958--982 Nicola Cranley and Philip Perry and Liam Murphy Dynamic content-based adaptation of streamed multimedia . . . . . . . . . . 983--1006 M. J. O'Grady and G. M. P. O'Hare and C. Donaghey Delivering adaptivity through context-awareness . . . . . . . . . . . 1007--1033 Vincent Charvillat and Romulus Grigoras Reinforcement learning for dynamic multimedia adaptation . . . . . . . . . 1034--1058 Johan Bollen and Michael L. Nelson and Gary Geisler and Raquel Araujo Usage derived recommendations for a video digital library . . . . . . . . . 1059--1083 Gloria Phillips-Wren and Anders Morch and Jeff Tweedale and Nikhil Ichalkaranje Innovations in agent collaboration, cooperation and Teaming, Part 2 . . . . 1085--1088 J. Tweedale and N. Ichalkaranje and C. Sioutis and B. Jarvis and A. Consoli and G. Phillips-Wren Innovations in multi-agent systems . . . 1089--1115 Lin Padgham and Wei Liu Internet collaboration and service composition as a loose form of teamwork 1116--1135 Antonella Di Stefano and Giuseppe Pappalardo and Corrado Santoro and Emiliano Tramontana A framework for the design and automated implementation of communication aspects in multi-agent systems . . . . . . . . . 1136--1152 Wei Xu and Jiannong Cao and Beihong Jin and Jing Li and Liang Zhang GCS-MA: a group communication system for mobile agents . . . . . . . . . . . . . 1153--1172 Tom Wanyama and Behrouz Homayoun Far A protocol for multi-agent negotiation in a group-choice decision making process . . . . . . . . . . . . . . . . 1173--1195 Gerhard Weiß and Matthias Nickles and Michael Rovatsos and Felix Fischer Specifying the intertwining of cooperation and autonomy in agent-based systems . . . . . . . . . . . . . . . . 1196--1215 Justin Zhan and Stan Matwin and LiWu Chang Privacy-preserving collaborative association rule mining . . . . . . . . 1216--1227 Abdelhamid Ouardani and Samuel Pierre and Hanifa Boucheneb A security protocol for mobile agents based upon the cooperation of sedentary agents . . . . . . . . . . . . . . . . . 1228--1243 Ruth Aguilar-Ponce and Ashok Kumar and J. Luis Tecpanecatl-Xihuitl and Magdy Bayoumi A network of sensor-based framework for automated visual surveillance . . . . . 1244--1271 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xiangjian He Editorial . . . . . . . . . . . . . . . 1273--1274 Shinichi Suzuki and Yasushi Shinjo and Toshio Hirotsu and Kozo Itano and Kazuhiko Kato Capability-based egress network access control by using DNS server . . . . . . 1275--1282 Yanni Wu and Kuo Zhang and Xiaoge Wang and Jinlan Tian Extending metadata with scenarios in adaptive distributed system . . . . . . 1283--1294 M. J. Callaghan and J. Harkin and E. McColgan and T. M. McGinnity and L. P. Maguire Client-server architecture for collaborative remote experimentation . . 1295--1308 Carolyn McGregor and Bruce Kneale and Mark Tracy On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband . . . . . . . . . . . . . . . 1309--1323 Wenjing Jia and Huaifeng Zhang and Xiangjian He Region-based license plate detection . . 1324--1333 Hatice Gunes and Massimo Piccardi Bi-modal emotion recognition from expressive face and body gestures . . . 1334--1345 Junjun Xia and Lin Ni and Y. Miao A new digital implementation of ridgelet transform for images of dyadic length 1346--1355 Donn Morrison and Liyanage C. De Silva Voting ensembles for spoken affect classification . . . . . . . . . . . . . 1356--1365 Ben-Nian Wang and Yang Gao and Zhao-Qian Chen and Jun-Yuan Xie and Shi-Fu Chen A two-layered multi-agent reinforcement learning model and algorithm . . . . . . 1366--1376 Jung-San Lee and Chin-Chen Chang Secure communications for cluster-based ad hoc networks using node identities 1377--1396 Christopher J. Martinez and Wei-Ming Lin and Parimal Patel Optimal XOR hashing for non-uniformly distributed address lookup in computer networks . . . . . . . . . . . . . . . . 1397--1427 Bart Duysburgh and Thijs Lambrecht and Filip De Turck and Bart Dhoedt and Piet Demeester Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks . . . . . . . . . . . 1428--1444 S. A. Al-Talib and B. M. Ali and S. Khatun and S. Subramaniam Improving the multicast state scalability in Internet routers by integrating hash algorithm with recursive unicast . . . . . . . . . . . 1445--1454 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hsu-Yang Kung and Hao-Hsiang Ku and Che-I Wu and Ching-Yu Lin Intelligent and situation-aware pervasive system to support debris-flow disaster prediction and alerting in Taiwan . . . . . . . . . . . . . . . . . 1--18 Mosaab Daoud and Qusay H. Mahmoud Monte Carlo simulation-based algorithms for estimating the reliability of mobile agent-based systems . . . . . . . . . . 19--31 Xiao Qin Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters . . . . . . . . . 32--46 Ming-Tsung Chen and B. M. T. Lin and Shian-Shyong Tseng Multicast routing and wavelength assignment with delay constraints in WDM networks with heterogeneous capabilities 47--65 Tushar M. Raste and D. B. Kulkarni Design and implementation scheme for deploying IPv4 over IPv6 tunnel . . . . 66--72 Anonymous Editorial board . . . . . . . . . . . . CO2
Christos Makris and Athanasios Tsakalidis Trends in peer to peer and service oriented computing . . . . . . . . . . . 73--74 Sinuhe Arroyo and Miguel-Angel Sicilia and José-Manuel López-Cobo Patterns of message interchange in decoupled hypermedia systems . . . . . . 75--92 Serena Pastore The service discovery methods issue: a web services UDDI specification framework integrated in a grid environment . . . . . . . . . . . . . . 93--107 Vassiliki Diamadopoulou and Christos Makris and Yannis Panagis and Evangelos Sakkopoulos Techniques to support Web Service selection and consumption with QoS characteristics . . . . . . . . . . . . 108--130 K. Votis and C. Alexakos and B. Vassiliadis and S. Likothanassis An ontologically principled service-oriented architecture for managing distributed e-government nodes 131--148 S. Sioutas and E. Sakkopoulos and L. Drossos and S. Sirmakessis Balanced distributed web service lookup system . . . . . . . . . . . . . . . . . 149--162 Sampath N. Ranasinghe and Vasilis Friderikos and Hamid Aghvami Dynamic proxy assisted mobility support for third generation peer-to-peer networks . . . . . . . . . . . . . . . . 163--178 Dimitris N. Kanellopoulos and Alkiviadis A. Panagopoulos Exploiting tourism destinations' knowledge in an RDF-based P2P network 179--200 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gwo-Jong Yu and Chih-Yung Chang Congestion control of Bluetooth radio system by piconet restructuring . . . . 201--223 Dhouha Ayed and Chantal Taconet and Guy Bernard and Yolande Berbers CADeComp: Context-aware deployment of component-based applications . . . . . . 224--257 Li Chunlin and Li Layuan Cross-layer optimization policy for QoS scheduling in computational grid . . . . 258--284 Lin Chen and Changjun Jiang and Junjie Li VGITS: ITS based on intervehicle communication networks and grid technology . . . . . . . . . . . . . . . 285--302 Luhua Liao and Lemin Li and Sheng Wang Multicast protection scheme in survivable WDM optical networks . . . . 303--316 James Lembke and Byung Kyu Choi Edge-limited scalable QoS flow set-up 317--337 Ferhat Khendek and Tong Zheng Modeling and analysis of value added services using message sequence charts 338--356 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Javier Varona and Cristina Manresa-Yee and Francisco J. Perales Hands-free vision-based interface for computer accessibility . . . . . . . . . 357--374 Hongjun Liu and Ping Luo and Daoshun Wang A scalable authentication model based on public keys . . . . . . . . . . . . . . 375--386 Wen-Hwa Liao and Yucheng Kao and Chien-Ming Fan Data aggregation in wireless sensor networks using ant colony algorithm . . 387--401 Vidhyacharan Bhaskar and Patrick Lallement Activity routing in a distributed supply chain: Performance evaluation with two inputs . . . . . . . . . . . . . . . . . 402--428 Bing Zheng and Mohammed Atiquzzaman A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers . . . . . . 429--445 K. Komathy and P. Narayanasamy Trust-based evolutionary game model assisting AODV routing against selfishness . . . . . . . . . . . . . . 446--471 Hongjun Liu and Ping Luo and Daoshun Wang A distributed expansible authentication model based on Kerberos . . . . . . . . 472--486 Carles Garrigues and Sergi Robles and Joan Borrell Securing dynamic itineraries for mobile agent applications . . . . . . . . . . . 487--508 Haidar Safa and Mohamad Chouman and Hassan Artail and Marcel Karam A collaborative defense mechanism against SYN flooding attacks in IP networks . . . . . . . . . . . . . . . . 509--534 Prasan Kumar Sahoo and Chih-Yung Chang and Sheng-Wen Chang Novel route maintenance protocols for the Bluetooth ad hoc network with mobility . . . . . . . . . . . . . . . . 535--558 Weili Han and Xingdong Shi and Ronghua Chen Process-context aware matchmaking for web service composition . . . . . . . . 559--576 G. Varaprasad and R. S. D. Wahidabanu and P. Venkataram An efficient resource allocation scheme for multimedia applications in MANET . . 577--584 Eric Gamess and Rina Surós An upper bound model for TCP and UDP throughput in IPv4 and IPv6 . . . . . . 585--602 Yiouli Kritikou and Panagiotis Demestichas and Evgenia Adamopoulou and Konstantinos Demestichas and Michael Theologou and Maria Paradia User Profile Modeling in the context of web-based learning management systems 603--627 Venet Osmani and Sasitharan Balasubramaniam and Dmitri Botvich Human activity recognition in pervasive health-care: Supporting efficient remote collaboration . . . . . . . . . . . . . 628--655 P. Khadivi and S. Samavi and T. D. Todd Multi-constraint QoS routing using a new single mixed metrics . . . . . . . . . . 656--676 Beatriz Prieto and Fernando Tricas and Juan J. Merelo and Antonio Mora and Alberto Prieto Visualizing the evolution of a web-based social network . . . . . . . . . . . . . 677--698 Mouhammd Al-Kasassbeh and Mo Adda Analysis of mobile agents in network fault management . . . . . . . . . . . . 699--711 Janus S. Liang The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach . . . . . . . . 712--734 Xiang-Yang Wang and Pan-Pan Niu and Wei Qi A new adaptive digital audio watermarking based on support vector machine . . . . . . . . . . . . . . . . 735--749 Hussein Abdel-Jaber and Mike Woodward and Fadi Thabtah and Amer Abu-Ali Performance evaluation for DRED discrete-time queueing network analytical model . . . . . . . . . . . . 750--770 Y. C. Yee and K. N. Choong and Andy L. Y. Low and S. W. Tan SIP-based proactive and adaptive mobility management framework for heterogeneous networks . . . . . . . . . 771--792 Juan J. Samper and Pedro A. Castillo and Lourdes Araujo and J. J. Merelo and Óscar Cordón and Fernando Tricas NectaRSS, an intelligent RSS feed reader 793--806 Wen-Hwa Liao and Hsiao-Hsien Wang An asynchronous MAC protocol for wireless sensor networks . . . . . . . . 807--820 Jianjun Zhang and Ling Liu and Lakshmish Ramaswamy and Calton Pu PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks . . . . . . . . . . . . . . . . 821--850 Kazuya Odagiri and Rihito Yaegashi and Masaharu Tadauchi and Naohiro Ishii Secure DACS Scheme . . . . . . . . . . . 851--861 Javed I. Khan and Sajid S. Shaikh Computing in social networks with relationship algebra . . . . . . . . . . 862--878 Ibrahim Ozcelik Interconnection of CAN segments through IEEE 802.16 wireless MAN . . . . . . . . 879--890 Bhuvan Urgaonkar and Prashant Shenoy Cataclysm: Scalable overload policing for Internet applications . . . . . . . 891--920 K. Salah and P. Calyam and M. I. Buhari Assessing readiness of IP networks to support desktop videoconferencing using OPNET . . . . . . . . . . . . . . . . . 921--943 Haibin Cai and Fang Pu and Runcai Huang and Qiying Cao A novel ANN-based service selection model for ubiquitous computing environments . . . . . . . . . . . . . . 944--965 Eleni Georgiou and Marios D. Dikaiakos and Athena Stassopoulou On the properties of spam-advertised URL addresses . . . . . . . . . . . . . . . 966--985 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tzu-Chi Huang and Ce-Kuen Shieh and Yu-Ben Miao Bottleneck Active Node Detouring for capsule-based active network . . . . . . 1--30 Xiaohong Guan and Wei Wang and Xiangliang Zhang Fast intrusion detection based on a non-negative matrix factorization model 31--44 Di Wu and Ye Tian and Kam-Wing Ng Resilient and efficient load balancing in distributed hash tables . . . . . . . 45--60 JungYul Choi and Jaebong Lee and ShinJung Woo and ByoungKwon Shim An engineering approach to the design of a BcN control network . . . . . . . . . 61--77 Pete Davies and Theodore Tryfonas A lightweight web-based vulnerability scanner for small-scale computer network security assessment . . . . . . . . . . 78--95 Hassan Artail and Manal Shihab and Haidar Safa A distributed mobile database implementation on Pocket PC mobile devices communicating over Bluetooth . . 96--115 Konstantinos P. Demestichas and Evgenia F. Adamopoulou and John G. Markoulidakis and Michael E. Theologou Towards Anonymous Mobile Community services . . . . . . . . . . . . . . . . 116--134 Giancarlo Fortino and Carlo Mastroianni and Wilma Russo A hierarchical control protocol for group-oriented playbacks supported by content distribution networks . . . . . 135--157 Meng Yu and Peng Liu and Wanyu Zang The implementation and evaluation of a recovery system for workflows . . . . . 158--183 Wade A. Fagen and João W. Cangussu and Ram Dantu A virtual environment for network testing . . . . . . . . . . . . . . . . 184--214 Chryssa A. Papagianni and Nikolaos D. Tselikas and Evangelos A. Kosmatos and Stauros Papapanagiotou and Iakovos S. Venieris Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections . . . . . . 215--225 Chin-Chen Chang and Jung-San Lee Robust $t$-out-of-$n$ oblivious transfer mechanism based on CRT . . . . . . . . . 226--235 Muhammad N. Marsono and M. Watheq El-Kharashi and Fayez Gebali A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification . . . . . . . . . . . . . 236--257 Hua Wang and Zhao Shi and Shuai Li Multicast routing for delay variation bound using a modified ant colony algorithm . . . . . . . . . . . . . . . 258--272 Yuh-Shyan Chen and Yun-Wei Lin and Chih-Yung Chang An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs . . . . . . . . . . . . 273--292 Francisco Almeida and Vicente Blanco and Carlos Delgado and Francisco de Sande and Adrián Santos IDEWEP: Web service for astronomical parallel image deconvolution . . . . . . 293--313 D. Di Sorte and M. Femminella and G. Reali QoS-enabled multicast for delivering live events in a Digital Cinema scenario 314--344 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Wanlei Zhou and Yang Xiang Network and system security . . . . . . 345--346 Chuan Yue and Haining Wang Profit-aware overload protection in E-commerce Web sites . . . . . . . . . . 347--356 Md Rafiqul Islam and Wanlei Zhou and Minyi Guo and Yang Xiang An innovative analyser for multi-classifier e-mail classification based on grey list analysis . . . . . . 357--366 Wei-Zhou Lu and Wei-Xuan Gu and Shun-Zheng Yu One-way queuing delay measurement and its application on detecting DDoS attack 367--376 Bai Li and Lynn Batten Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks 377--387 Suriadi Suriadi and Ernest Foo and Audun Jòsang A user-centric federated single sign-on system . . . . . . . . . . . . . . . . . 388--401 Deqing Zou and Ligang He and Hai Jin and Xueguang Chen CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment . . . . . 402--411 Jian Cao and Jinjun Chen and Haiyan Zhao and Minglu Li A policy-based authorization model for workflow-enabled dynamic process management . . . . . . . . . . . . . . . 412--422 Wenyu Qu and Masaru Kitsuregawa and Hong Shen and Zhiguang Shan A novel fault-tolerant execution model by using of mobile agents . . . . . . . 423--432 Muhammad Younas and Irfan Awan and Laurence T. Yang Special issue on service oriented computing and advanced network applications . . . . . . . . . . . . . . 433 Agustinus Borgy Waluyo and David Taniar and Wenny Rahayu and Bala Srinivasan Mobile service oriented architectures for NN-queries . . . . . . . . . . . . . 434--447 Arjan Durresi and Vamsi Paruchuri and Leonard Barolli Fast autonomous system traceback . . . . 448--454 D. R. W. Holton and I. Nafea and M. Younas and I. Awan A class-based scheme for E-commerce web servers: Formal specification and performance evaluation . . . . . . . . . 455--460 I. Al-Oqily and A. Karmouch Towards automating overlay network management . . . . . . . . . . . . . . . 461--473 M. Lozano and P. Morillo and J. M. Orduña and V. Cavero and G. Vigueras A new system architecture for crowd simulation . . . . . . . . . . . . . . . 474--482 Yan Zhang and Laurence T. Yang and Jianhua Ma and Jun Zheng Quantitative analysis of location management and QoS in wireless networks 483--489 Mieso K. Denko and Elhadi Shakshuki and Haroon Malik Enhanced cross-layer based middleware for mobile ad hoc networks . . . . . . . 490--499 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mostafa Abd-El-Barr Topological network design: a survey . . 501--509 Byoung-Dai Lee and Jon B. Weissman and Young-Kwang Nam Adaptive middleware supporting scalable performance for high-end network services . . . . . . . . . . . . . . . . 510--524 Chunlin Li and Layuan Li Three-layer control policy for grid resource management . . . . . . . . . . 525--537 Yuh-Jzer Joung and Chu-Jui Yang Email licensing . . . . . . . . . . . . 538--549 Selim Ciraci and Ibrahim Körpeo\ugu and Özgür Ulusoy Reducing query overhead through route learning in unstructured peer-to-peer network . . . . . . . . . . . . . . . . 550--567 Songtao Guo and Gang Feng and Xiaofeng Liao and Qun Liu Novel delay-range-dependent stability analysis of the second-order congestion control algorithm with heterogeneous communication delays . . . . . . . . . . 568--577 Eric Jui-Lin Lu and Yung-Fa Huang and Shu-Chiu Lu ML-Chord: a multi-layered P2P resource sharing model . . . . . . . . . . . . . 578--588 Shi-Jen Lin and Ding-Chyu Liu An incentive-based electronic payment scheme for digital content transactions over the Internet . . . . . . . . . . . 589--598 Thomas E. Carroll and Daniel Grosu A secure and anonymous voter-controlled election scheme . . . . . . . . . . . . 599--606 Y. Tachwali and W. J. Barnes and H. Refai Configurable symbol synchronizers for software-defined radio applications . . 607--615 I-Ching Hsu and Li-Pin Chi and Sheau-Shong Bor A platform for transcoding heterogeneous markup documents using ontology-based metadata . . . . . . . . . . . . . . . . 616--629 Konstantinos Samdanis and Vasilis Friderikos and A. Hamid Aghvami Autonomic hierarchical reconfiguration for wireless access networks . . . . . . 630--641 Li Ou and Xubin He and Jizhong Han An efficient design for fast memory registration in RDMA . . . . . . . . . . 642--651 Jenn-Hwan Tarng and Bing-Wen Chuang and Pei-Chen Liu A relay node deployment method for disconnected wireless sensor networks: Applied in indoor environments . . . . . 652--659 Satish Chand and Bijendra Kumar and Hari Om Video Data Delivery using Slotted Patching . . . . . . . . . . . . . . . . 660--665 Oznur Ozkasap and Mine Caglar and Ali Alagoz Principles and performance analysis of SeCond: a system for epidemic peer-to-peer content distribution . . . 666--683 Lambros Boukas and Georgios Kambourakis and Stefanos Gritzalis Pandora: an SMS-oriented m-informational system for educational realms . . . . . 684--702 Babek Abbasov and Serdar Korukoglu Effective RED: an algorithm to improve RED's performance by reducing packet loss rate . . . . . . . . . . . . . . . 703--709 Zonghua Zhang and Pin-Han Ho Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks . . . . . 710--720 Li Feng and Wei Wang and Lina Zhu and Yi Zhang Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation . . . . . . . . . 721--732 Mohammad Hamed Firooz and Alireza Nasiri Avanaki and Mohammad Reza Pakravan and Keivan Ronasi A fast and reliable multi-sender algorithm for peer-to-peer networks . . 733--740 Tzu-Chi Huang and Sherali Zeadally and Naveen Chilamkurti and Ce-Kuen Shieh Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks . . . . . . . . 741--759 Li Chunlin and Zhong Jin Xiu and Li Layuan Resource scheduling with conflicting objectives in grid environments: Model and evaluation . . . . . . . . . . . . . 760--769 J. H. Abawajy Adaptive hierarchical scheduling policy for enterprise grid computing systems 770--779 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Li Feng and Zili Li and Yi Zhang Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network . . . . . . . . . 781--787 Jiankun Hu and Fengling Han A pixel-based scrambling scheme for digital medical images protection . . . 788--794 C. Bouras and E. Giannaka and Thrasyvoulos Tsiatsos Identifying best practices for supporting broadband growth: Methodology and analysis . . . . . . . . . . . . . . 795--807 Manuel Sánchez and Gabriel López and Óscar Cánovas and Antonio F. Gómez-Skarmeta Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure . . . . . . . . . . . . . 808--823 Mouhammd Al-Kasassbeh and Mo Adda Network fault detection with Wiener filter-based agent . . . . . . . . . . . 824--833 Chao-Tung Yang and Ming-Feng Yang and Wen-Chung Chiang Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids . . 834--845 Sergio Ilarri and Eduardo Mena and Arantza Illarramendi A system based on mobile agents to test mobile computing applications . . . . . 846--865 Kuei-Ping Shih and Hung-Chang Chen and Chien-Min Chou and Bo-Jun Liu On target coverage in wireless heterogeneous sensor networks with multiple sensing units . . . . . . . . . 866--877 Prasan Kumar Sahoo and Jang-Ping Sheu and Yu-Chia Chang Performance evaluation of wireless sensor network with hybrid channel access mechanism . . . . . . . . . . . . 878--888 Dan Wu and Chi Hong Cheong and Man Hon Wong Supporting asynchronous update for distributed data cubes . . . . . . . . . 889--900 Jiaming Li and Chai Kiat Yeo Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks . . . . . . . . . . . . . . . . 901--912 Javed I. Khan and Sajid S. Shaikh A phenotype reputation estimation function and its study of resilience to social attacks . . . . . . . . . . . . . 913--924 Robert L. R. Mattson and Somnath Ghosh HTTP-MPLEX: an enhanced hypertext transfer protocol and its performance evaluation . . . . . . . . . . . . . . . 925--939 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Giancarlo Fortino and Carlo Mastroianni Next generation content networks . . . . 941--942 Jayashree Ravi and Zhifeng Yu and Weisong Shi A survey on dynamic Web content generation and delivery techniques . . . 943--960 Gilles Fedak and Haiwu He and Franck Cappello BitDew: a data management and distribution service with multi-protocol file transfer and metadata abstraction 961--975 Mukaddim Pathan and Rajkumar Buyya Resource discovery and request-redirection for dynamic load sharing in multi-provider peering content delivery networks . . . . . . . 976--990 Jaime Lloret and Miguel Garcia and Diana Bri and Juan R. Diaz Study and performance of a group-based Content Delivery Network . . . . . . . . 991--999 Benjamin Molina and Salvatore F. Pileggi and Manuel Esteve and Carlos E. Palau A negotiation framework for content distribution in mobile transient networks . . . . . . . . . . . . . . . . 1000--1011 James Broberg and Rajkumar Buyya and Zahir Tari MetaCDN: Harnessing `Storage Clouds' for high performance content delivery . . . 1012--1022 Ying-Dar Lin and Chun-Nan Lu and Yuan-Cheng Lai and Wei-Hao Peng and Po-Ching Lin Application classification using packet size distribution and port association 1023--1030 Ling Wang and Yahia Tachwali and Pramode Verma and Anjan Ghosh Impact of bounded delay on throughput in multi-hop networks . . . . . . . . . . . 1031--1038 K. Salah and M. Hamawi Comparative packet-forwarding measurement of three popular operating systems . . . . . . . . . . . . . . . . 1039--1048 Behnoosh Hariri and Shervin Shirmohammadi and Mohammad Reza Pakravan and Mohammad Hossein Alavi An adaptive latency mitigation scheme for massively multiuser virtual environments . . . . . . . . . . . . . . 1049--1063 Yuhui Deng Deconstructing Network Attached Storage systems . . . . . . . . . . . . . . . . 1064--1072 Fang-Yie Leu A novel network mobility handoff scheme using SIP and SCTP for multimedia applications . . . . . . . . . . . . . . 1073--1091 Iván Martínez-Ortiz and José-Luis Sierra and Baltasar Fernández-Manjón and Alfredo Fernández-Valmayor Language engineering techniques for the development of e-learning applications 1092--1105 Chenfeng Vincent Zhou and Christopher Leckie and Shanika Karunasekera Decentralized multi-dimensional alert correlation for collaborative intrusion detection . . . . . . . . . . . . . . . 1106--1123 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Tarique and Kemal E. Tepe and Sasan Adibi and Shervin Erfani Survey of multipath routing protocols for mobile ad hoc networks . . . . . . . 1125--1143 Wen-Hwa Liao and Wen-Ming Yen Power-saving scheduling with a QoS guarantee in a mobile WiMAX system . . . 1144--1152 Neng-Chung Wang and Chao-Yang Lee A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks . . . . . . . . . . . . . . . . 1153--1166 R. Martí and S. Robles and A. Martín-Campillo and J. Cucurull Providing early resource allocation during emergencies: the mobile triage tag . . . . . . . . . . . . . . . . . . 1167--1182 Mohamed K. Watfa and Omar Mirza and Jad Kawtharani BARC: a Battery Aware Reliable Clustering algorithm for sensor networks 1183--1193 Martín López-Nores and Jorge García-Duque and José J. Pazos-Arias and Yolanda Blanco-Fernández and Manuel Ramos-Cabrer and Alberto Gil-Solla and Rebeca P. Díaz-Redondo and Ana Fernández-Vilas KEPPAN: Knowledge exploitation for proactively-planned ad-hoc networks . . 1194--1209 Cuneyt Bayilmis and Ersoy Kelebekler and Ismail Erturk and Celal Ceken and Ibrahim Ozcelik Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application . . . . . . . . 1210--1218 Xuan Dau Hoang and Jiankun Hu and Peter Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference 1219--1228 Chien-Chih Lai and Ren-Guey Lee and Chun-Chieh Hsiao and Hsin-Sheng Liu and Chun-Chang Chen A H-QoS-demand personalized home physiological monitoring system over a wireless multi-hop relay network for mobile home healthcare applications . . 1229--1241 Bruno Van Den Bossche and Bart De Vleeschauwer and Tom Verdickt and Filip De Turck and Bart Dhoedt and Piet Demeester Autonomic microcell assignment in massively distributed online virtual environments . . . . . . . . . . . . . . 1242--1256 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Ta Li and Min-Shiang Hwang An efficient biometrics-based remote user authentication scheme using smart cards . . . . . . . . . . . . . . . . . 1--5 K. Salah and A. Kahtani Performance evaluation comparison of Snort NIDS under Linux and Windows Server . . . . . . . . . . . . . . . . . 6--15 Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis and Elisavet Konstantinou A framework for identity privacy in SIP 16--28 Jianhong Zhang and Chenglian Liu and Yixian Yang An efficient secure proxy verifiably encrypted signature scheme . . . . . . . 29--34 Nader Mohamed and Jameela Al-Jaroodi Self-configured multiple-network-interface socket . . . 35--42 Ming-Wen Tong and Zong-Kai Yang and Qing-Tang Liu A novel model of adaptation decision-taking engine in multimedia adaptation . . . . . . . . . . . . . . . 43--49 Youtao Zhang and Jun Yang and Weijia Li and Linzhang Wang and Lingling Jin An authentication scheme for locating compromised sensor nodes in WSNs . . . . 50--62 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Junqi Zhang and Vijay Varadharajan Wireless sensor network key management survey and taxonomy . . . . . . . . . . 63--75 Weili Han and Min Xu and Weidong Zhao and Guofu Li A trusted decentralized access control framework for the client/server architecture . . . . . . . . . . . . . . 76--83 Matthias Strobbe and Olivier Van Laere and Samuel Dauwe and Bart Dhoedt and Filip De Turck and Piet Demeester and Christof van Nimwegen and Jeroen Vanattenhoven Interest based selection of user generated content for rich communication services . . . . . . . . . . . . . . . . 84--97 Cheng-Fu Chou and William C. Cheng and Leana Golubchik Performance study of online batch-based digital signature schemes . . . . . . . 98--114 Ming Xu and Shuigeng Zhou and Jihong Guan and Xiaohua Hu A path-traceable query routing mechanism for search in unstructured peer-to-peer networks . . . . . . . . . . . . . . . . 115--127 Eduardo Moschetta and Rodolfo S. Antunes and Marinho P. Barcellos Flexible and secure service discovery in ubiquitous computing . . . . . . . . . . 128--140 Jenn-Wei Lin and Wei-Shou Wang An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks . . . . . . . 141--155 Ming-Yang Su Discovery and prevention of attack episodes by frequent episodes mining and finite state machines . . . . . . . . . 156--167 Haidar Safa and Hassan Artail and Mirna Nahhas A cache invalidation strategy for mobile networks . . . . . . . . . . . . . . . . 168--182 Yuh-Jzer Joung and Zhang-Wen Lin On the self-organization of a hybrid peer-to-peer system . . . . . . . . . . 183--202 Anonymous Special Issue of Journal of Network and Computer Applications on ``Dependable Multimedia Communications: Systems, Services, and Applications'' . . . . . . 203 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Khurram Khan and Mohamed Kamel and Xudong Jiang Special issue on: Recent advances and future directions in biometrics personal identification . . . . . . . . . . . . . 205--206 Peng Li and Xin Yang and Kai Cao and Xunqiang Tao and Ruifang Wang and Jie Tian An alignment-free fingerprint cryptosystem based on fuzzy vault scheme 207--220 Eryun Liu and Jimin Liang and Liaojun Pang and Min Xie and Jie Tian Minutiae and modified Biocode fusion for fingerprint-based key generation . . . . 221--235 Chulhan Lee and Jaihie Kim Cancelable fingerprint templates using minutiae-based bit-strings . . . . . . . 236--246 Miao Qi and Yinghua Lu and Ning Du and Yinan Zhang and Chengxi Wang and Jun Kong A novel image hiding approach based on correlation analysis for secure multimodal biometrics . . . . . . . . . 247--257 Kai Cao and Xin Yang and Xunqiang Tao and Peng Li and Yali Zang and Jie Tian Combining features for distorted fingerprint matching . . . . . . . . . . 258--267 Neyire Deniz Sarier Improving the accuracy and storage cost in biometric remote authentication schemes . . . . . . . . . . . . . . . . 268--274 Zhi Liu and Yilong Yin and Hongjun Wang and Shangling Song and Qingli Li Finger vein recognition with manifold learning . . . . . . . . . . . . . . . . 275--282 Dong-Ju Kim and Jeong-Hoon Shin and Kwang-Seok Hong Teeth recognition based on multiple attempts in mobile device . . . . . . . 283--292 David Delgado-Gómez and Federico Sukno and David Aguado and Carlos Santacruz and Antonio Artés-Rodriguez Individual identification using personality traits . . . . . . . . . . . 293--299 Hunny Mehrotra and Banshidhar Majhi and Phalguni Gupta Robust iris indexing scheme using geometric hashing of SIFT keypoints . . 300--313 Jian-Gang Wang and Eric Sung and Wei-Yun Yau Incremental two-dimensional linear discriminant analysis with applications to face recognition . . . . . . . . . . 314--322 Jianzhong Wang and Baoxue Zhang and Shuyan Wang and Miao Qi and Jun Kong An adaptively weighted sub-pattern locality preserving projection for face recognition . . . . . . . . . . . . . . 323--332 Kumiko Yasuda and Daigo Muramatsu and Satoshi Shirato and Takashi Matsumoto Visual-based online signature verification using features extracted from video . . . . . . . . . . . . . . . 333--341 Siraj A. Shaikh and Joseph R. Rabaiotti Characteristic trade-offs in designing large-scale biometric-based identity management systems . . . . . . . . . . . 342--351 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chung-Nan Lee and Yung-Cheng Kao and Ming-Te Tsai A vEB-tree-based architecture for interactive video on demand services in peer-to-peer networks . . . . . . . . . 353--362 Neelofer Tamboli and Mohamed Younis Coverage-aware connectivity restoration in mobile sensor networks . . . . . . . 363--374 Leo Carro-Calvo and Sancho Salcedo-Sanz and Jose A. Portilla-Figueras and E. G. Ortiz-García A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks 375--382 Lei Wang and Ruizhong Wei and Yaping Lin and Bo Wang A clique base node scheduling method for wireless sensor networks . . . . . . . . 383--396 Feng Zhong and Chai Kiat Yeo and Bu Sung Lee Enabling inter-PMIPv6-domain handover with traffic distributors . . . . . . . 397--409 Christos Bouras and Vassilis Poulopoulos and Vassilis Tsogkas Adaptation of RSS feeds based on the user profile and on the end device . . . 410--421 Yuwang Yang and Chunshan Zhong and Yamin Sun and Jingyu Yang Network coding based reliable disjoint and braided multipath routing for sensor networks . . . . . . . . . . . . . . . . 422--432 Arthur Callado and Judith Kelner and Djamel Sadok and Carlos Alberto Kamienski and Stênio Fernandes Better network traffic identification through the independent combination of techniques . . . . . . . . . . . . . . . 433--446 D. González-Ortega and F. J. Díaz-Pernas and M. Martínez-Zarzuela and M. Antón-Rodríguez and J. F. Díez-Higuera and D. Boto-Giralda Real-time hands, face and facial features detection and tracking: Application to cognitive rehabilitation tests monitoring . . . . . . . . . . . . 447--466 Chih-Peng Lin and Jenhui Chen and Hsing-Lung Chen An efficient bandwidth allocation algorithm for real-time VBR stream transmission under IEEE 802.16 wireless networks . . . . . . . . . . . . . . . . 467--476 Javad Akbari Torkestani and Mohammad Reza Meybodi An efficient cluster-based CDMA/TDMA scheme for wireless mobile ad-hoc networks: a learning automata approach 477--490 Abdun Naser Mahmood and Jiankun Hu and Zahir Tari and Christopher Leckie Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic . . . . . . . . . . . . 491--502 Henrique S. L. Pequeno and George A. M. Gomes and Rossana M. C. Andrade and José N. de Souza and Miguel F. de Castro FrameIDTV: a framework for developing interactive applications on digital television environments . . . . . . . . 503--511 Hui Cheng and Xingwei Wang and Shengxiang Yang and Min Huang and Jiannong Cao QoS multicast tree construction in IP/DWDM optical Internet by bio-inspired algorithms . . . . . . . . . . . . . . . 512--522 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jameela Al-Jaroodi and Nader Mohamed Middleware trends for network applications . . . . . . . . . . . . . . 523--524 C. Boldrini and M. Conti and F. Delmastro and A. Passarella Context- and social-aware middleware for opportunistic networks . . . . . . . . . 525--541 Praveen Madiraju and Srilaxmi Malladi and Janaka Balasooriya and Arthi Hariharan and Sushil K. Prasad and Anu Bourgeois A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware . . . 542--555 Jordi Pujol-Ahulló and Pedro García-López Enabling portability in advanced information-centric services over structured peer-to-peer systems . . . . 556--568 Bruno P. S. Rocha and Daniel N. O. Costa and Rande A. Moreira and Cristiano G. Rezende and Antonio A. F. Loureiro and Azzedine Boukerche Adaptive security protocol selection for mobile computing . . . . . . . . . . . . 569--587 Pedro García López and Raúl Gracia Tinedo and Josep M. Banús Alsina Moving routing protocols to the user space in MANET middleware . . . . . . . 588--602 Víctor Manuel Álvarez García and María del Puerto Paule Ruiz and Juan Ramón Pérez Pérez Voice interactive classroom, a service-oriented software architecture for speech-enabled learning . . . . . . 603--610 Yasser Gadallah and Mohamed Adel Serhani and Nader Mohamed Middleware support for service discovery in special operations mobile ad hoc networks . . . . . . . . . . . . . . . . 611--619 Cheng Bo and Zhang Yang and Zhou Peng and Duan Hua and Hu Xiaoxiao and Wang Zheng and Chen Junliang Development of Web-Telecom based hybrid services orchestration and execution middleware over convergence networks . . 620--630 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jason J. Jung and Chung-Ming Ou and Ngoc Thanh Nguyen and Chong Gun Kim Advances on agent-based network management . . . . . . . . . . . . . . . 631--632 Bo Chen Agent-based artificial immune system approach for adaptive damage detection in monitoring networks . . . . . . . . . 633--645 Mary Wu and ChongGun Kim A cost matrix agent for shortest path routing in ad hoc networks . . . . . . . 646--652 Pradeep Ray and N. Parameswaran and Lundy Lewis Distributed autonomic management: an approach and experiment towards managing service-centric networks . . . . . . . . 653--660 S. Venkatesan and C. Chellappan and T. Vengattaraman and P. Dhavachelvan and Anurika Vaish Advanced mobile agent security models for code integrity and malicious availability check . . . . . . . . . . . 661--671 Yao-Tien Wang A dynamic resource management in mobile agent by artificial neural network . . . 672--681 Yue-Shan Chang and Pei-Chun Shih A resource-awareness information extraction architecture on mobile grid environment . . . . . . . . . . . . . . 682--695 Umar Manzoor and Samia Nefti QUIET: a Methodology for Autonomous Software Deployment using Mobile Agents 696--706 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
S. Subashini and V. Kavitha A survey on security issues in service delivery models of cloud computing . . . 1--11 Dai-Rui Lin and Chih-I Wang and D. J. Guan Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function 12--19 Sireesha Muppala and Xiaobo Zhou Coordinated session-based admission control with statistical learning for multi-tier Internet applications . . . . 20--29 Neeraj Kumar and Manoj Kumar and R. B. Patel Capacity and interference aware link scheduling with channel assignment in wireless mesh networks . . . . . . . . . 30--38 Marcela Mejia and Néstor Peña and Jose L. Muñoz and Oscar Esparza and Marco A. Alzate A game theoretic trust model for on-line distributed evolution of cooperation in MANETs . . . . . . . . . . . . . . . . . 39--51 Sanaa Sharafeddine and Rakan Maddah A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications . . . . . . . . . . . . . . 52--61 Sanaa Sharafeddine Capacity assignment in multiservice packet networks with soft maximum waiting time guarantees . . . . . . . . 62--72 Xiong Li and Jian-Wei Niu and Jian Ma and Wen-Dong Wang and Cheng-Lian Liu Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards 73--79 Biming Tian and Song Han and Jiankun Hu and Tharam Dillon A mutual-healing key distribution scheme in wireless sensor networks . . . . . . 80--88 Christos Bouras and Eri Giannaka and Thrasyvoulos Tsiatsos A dynamic management scheme for DVEs . . 89--101 Hyuck Han and Hyungsoo Jung and Hyeonsang Eom and H. Y. Yeom An efficient skyline framework for matchmaking applications . . . . . . . . 102--115 Song Wang and Jinli Cao and Jiankun Hu A frequency domain subspace blind channel estimation method for trailing zero OFDM systems . . . . . . . . . . . 116--120 Chih-Lin Hu and Chien-An Cho User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks . . . 121--136 Istemi Ekin Akkus and Öznur Özkasap and M. Reha Civanlar Peer-to-peer multipoint video conferencing with layered video . . . . 137--150 Joel J. P. C. Rodrigues and Orlando R. E. Pereira and Paulo A. C. S. Neves Biofeedback data visualization for body sensor networks . . . . . . . . . . . . 151--158 Atif Bin Mansoor and Hassan Masood and Mustafa Mumtaz and Shoab A. Khan A feature level multimodal approach for palmprint identification using directional subband energies . . . . . . 159--171 Mingyu Lim and Bart Kevelham and Niels Nijdam and Nadia Magnenat-Thalmann Rapid development of distributed applications using high-level communication support . . . . . . . . . 172--182 Xiaohong Huang and Maode Ma A performance model for differentiated service over single-hop passive star coupled WDM optical networks . . . . . . 183--193 Aristides Mpitziopoulos and Charalampos Konstantopoulos and Damianos Gavalas and Grammati Pantziou A pervasive assistive environment for visually impaired people using wireless sensor network infrastructure . . . . . 194--206 Ameneh Daeinabi and Akbar Ghaffar Pour Rahbar and Ahmad Khademzadeh VWCA: an efficient clustering algorithm in vehicular ad hoc networks . . . . . . 207--222 Pejman Goudarzi Improving rate allocation for ephemeral traffic using a second-order algorithm 223--231 Tzu-Chi Huang Universal connection architecture for interactive applications to achieve distributed computing . . . . . . . . . 232--251 Song Fu and Cheng-Zhong Xu and Haiying Shen Randomized load balancing strategies with churn resilience in peer-to-peer networks . . . . . . . . . . . . . . . . 252--261 Bo Zhang and Fangguo Zhang An efficient public key encryption with conjunctive-subset keywords search . . . 262--267 Jesús Ibáñez and Carlos Delgado-Mata Lessons from research on interaction with virtual environments . . . . . . . 268--281 Fahim Sufi and Ibrahim Khalil Faster person identification using compressed ECG in time critical wireless telecardiology applications . . . . . . 282--293 Antonio Ruiz-Martínez and Juan Sánchez-Montesinos and Daniel Sánchez-Martínez A mobile network operator-independent mobile signature service . . . . . . . . 294--311 Wenjia Niu and Gang Li and Zhijun Zhao and Hui Tang and Zhongzhi Shi Multi-granularity context model for dynamic Web service composition . . . . 312--326 Hadi Goudarzi and Amir Hesam Salavati and Mohammad Reza Pakravan An ant-based rate allocation algorithm for media streaming in peer to peer networks: Extension to multiple sessions and dynamic networks . . . . . . . . . . 327--340 Marc Liberatore and Bikas Gurung and Brian Neil Levine and Matthew Wright Empirical tests of anonymous voice over IP . . . . . . . . . . . . . . . . . . . 341--350 Patrik Moravek and Dan Komosny and Radim Burget and Jaroslav Sveda and Tomas Handl and Lucie Jarosova Study and performance of localization methods in IP based networks: Vivaldi algorithm . . . . . . . . . . . . . . . 351--367 E. Costa-Montenegro and J. C. Burguillo-Rial and F. Gil-Castiñeira and F. J. González-Castaño Implementation and analysis of the BitTorrent protocol with a multi-agent model . . . . . . . . . . . . . . . . . 368--383 Elisavet Konstantinou Efficient cluster-based group key agreement protocols for wireless ad hoc networks . . . . . . . . . . . . . . . . 384--393 Jung Yul Choi and Shin Jung Woo and Byoung Kwon Shim Reliable service provisioning in converged multimedia network environment 394--401 Prajakta Kulkarni and Yusuf Ozturk mPHASiS: Mobile patient healthcare and sensor information system . . . . . . . 402--417 William R. Claycomb and Dongwan Shin A novel node level security policy framework for wireless sensor networks 418--428 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jonathan Loo Special issue on: Efficient and robust security and services of wireless mesh networks . . . . . . . . . . . . . . . . 429--431 Frank A. Zdarsky and Sebastian Robitzsch and Albert Banchs Security analysis of wireless mesh backhauls for mobile networks . . . . . 432--442 Shanshan Jiang and Yuan Xue Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks . . . . . . . . . 443--454 Zorana Bankovic and David Fraga and José Manuel Moya and Juan Carlos Vallejo and Pedro Malagón and Álvaro Araujo and Juan-Mariano de Goyeneche and Elena Romero and Javier Blesa and Daniel Villanueva and Octavio Nieto-Taladriz Improving security in WMNs with reputation systems and self-organizing maps . . . . . . . . . . . . . . . . . . 455--463 Ching-Fang Hsu and Guo-Hua Cui and Qi Cheng and Jing Chen A novel linear multi-secret sharing scheme for group communication in wireless mesh networks . . . . . . . . . 464--468 Yiliang Han and Xiaolin Gui and Xuguang Wu and Xiaoyuan Yang Proxy encryption based secure multicast in wireless mesh networks . . . . . . . 469--477 Okechukwu E. Muogilim and Kok-Keong Loo and Richard Comley Wireless mesh network security: a traffic engineering management approach 478--491 Raquel Lacuesta and Jaime Lloret and Miguel Garcia and Lourdes Peñalver Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks . . . . . . . . . . . . . . . . 492--505 Rafael Lopes Gomes and Waldir Moreira Junior and Eduardo Cerqueira and Antônio Jorge Abelém Using fuzzy link cost and dynamic choice of link quality metrics to achieve QoS and QoE in wireless mesh networks . . . 506--516 Altaf Mukati A survey of memory error correcting techniques for improved reliability . . 517--522 Lucas D. P. Mendes and Joel J. P. C. Rodrigues A survey on cross-layer solutions for wireless sensor networks . . . . . . . . 523--534 Tingting Chen and Ankur Bansal and Sheng Zhong A reputation system for wireless mesh networks using network coding . . . . . 535--541 Pere Montolio-Aranda and Joaquin Garcia-Alfaro and David Megías Improved flooding of broadcast messages using extended multipoint relaying . . . 542--550 Duong Nguyen Binh Ta and Suiping Zhou and Wentong Cai and Xueyan Tang and Rassul Ayani Multi-objective zone mapping in large-scale distributed virtual environments . . . . . . . . . . . . . . 551--561 Niels Sluijs and Frédéric Iterbeke and Tim Wauters and Filip De Turck and Bart Dhoedt and Piet Demeester Cooperative caching versus proactive replication for location dependent request patterns . . . . . . . . . . . . 562--574 Mohammad Bsoul and Ahmad Al-Khasawneh and Emad Eddien Abdallah and Yousef Kilani Enhanced Fast Spread Replication strategy for Data Grid . . . . . . . . . 575--580 Xiaohong Huang and Maode Ma A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks . . . . . . 581--588 Cynthia Villalba and Franco Zambonelli Towards nature-inspired pervasive service ecosystems: Concepts and simulation experiences . . . . . . . . . 589--602 Jianyong Chen and Huawang Zeng and Cunying Hu and Zhen Ji Optimization between security and delay of quality-of-service . . . . . . . . . 603--608 Sandeep K. Sood and Anil K. Sarje and Kuldip Singh A secure dynamic identity based authentication protocol for multi-server architecture . . . . . . . . . . . . . . 609--618 Hai Dong and Farookh Khadeer Hussain and Elizabeth Chang A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment . . . . . 619--631 Fang-Yie Leu and Ilsun You and Yao-Tien Huang A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks . . . . . . . . . . . 632--643 Mohamed Saad Joint admission and power control for quality-of-service in the wireless downlink . . . . . . . . . . . . . . . . 644--652 Q. Shi and N. Zhang and M. Merabti and R. Askwith Achieving autonomous fair exchange in ubiquitous network settings . . . . . . 653--667 Anabela Moreira Bernardino and Eugénia Moreira Bernardino and Juan Manuel Sanchez-Perez and Juan Antonio Gomez-Pulido and Miguel Angel Vega-Rodriguez Solving ring loading problems using bio-inspired algorithms . . . . . . . . 668--685 Zoran Milicevic and Zoran Bojkovic H.264/AVC standard: a proposal for selective intra- and optimized inter-prediction . . . . . . . . . . . . 686--691 Yebin Chen and Ying Li and Jiankun Wang On the wide diameter of directed double-loop networks . . . . . . . . . . 692--696 Fatna Belqasmi and Roch Glitho and Rachida Dssouli An overlay network for autonomous information discovery in the post-composition registries of ambient networks . . . . . . . . . . . . . . . . 697--707 Huo Zhihong and Zheng Yuan and Xu Chang A robust fault-tolerant control strategy for networked control systems . . . . . 708--714 Yusuf Sani and Mohamed Othman A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks . . . . . . . . . . . 715--721 Ming-Yang Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification . . . . . 722--730 Naser Movahhedinia and Behrouz Shahgholi Ghahfarokhi Performance analysis of Bluetooth asynchronous connection-less service . . 731--738 Chunlin Li and Layuan Li Two-level market solution for services composition optimization in mobile grid 739--749 Li Yu and Maode Ma and Weidong Hu and Zibo Shi and Yantai Shu Design of parameter tunable robust controller for active queue management based on $ H_\infty $ control theory . . 750--764 Jinchang Lu and Maode Ma Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system . . . 765--773 Li Chunlin and Li Layuan Context aware service provisioning in mobile grid . . . . . . . . . . . . . . 774--782 Congduc Pham and Abdallah Makhoul and Rachid Saadi Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications 783--795 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Quan Z. Sheng and Sherali Zeadally and Aikaterini Mitrokotsa and Zakaria Maamar RFID technology, systems, and applications . . . . . . . . . . . . . . 797--798 Wen Yao and Chao-Hsien Chu and Zang Li Leveraging complex event processing for smart hospitals using RFID . . . . . . . 799--810 Yi-Wei Ma and Han-Chieh Chao and Jiann-Liang Chen and Cheng-Yen Wu Load-balancing mechanism for the RFID middleware applications over grid networking . . . . . . . . . . . . . . . 811--820 Filippo Gandino and Renato Ferrero and Bartolomeo Montrucchio and Maurizio Rebaudengo Probabilistic DCS: an RFID reader-to-reader anti-collision protocol 821--832 Pedro Peris-Lopez and Agustin Orfila and Julio C. Hernandez-Castro and Jan C. A. van der Lubbe Flaws on RFID grouping-proofs. Guidelines for future sound protocols 833--845 Francesco Rizzo and Marcello Barboni and Lorenzo Faggion and Graziano Azzalin and Marco Sironi Improved security for commercial container transports using an innovative active RFID system . . . . . . . . . . . 846--852 Roberto Di Pietro and Refik Molva An optimal probabilistic solution for information confinement, privacy, and security in RFID systems . . . . . . . . 853--863 M. V. Bueno-Delgado and J. Vales-Alonso On the optimal frame-length configuration on real passive RFID systems . . . . . . . . . . . . . . . . 864--876 G. P. Hancke Design of a secure distance-bounding channel for RFID . . . . . . . . . . . . 877--887 Hanning Chen and Yunlong Zhu and Kunyuan Hu and Tao Ku RFID network planning using a multi-swarm optimizer . . . . . . . . . 888--901 Apostolia Papapostolou and Hakima Chaouchi RFID-assisted indoor localization and the impact of interference on its performance . . . . . . . . . . . . . . 902--913 Wei-Shinn Ku and Kazuya Sakai and Min-Te Sun The optimal $k$-covering tag deployment for RFID-based localization . . . . . . 914--924 Pilar Manzanares-Lopez and Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja and Juan Carlos Sanchez-Aarnoutse An efficient distributed discovery service for EPCglobal network in nested package scenarios . . . . . . . . . . . 925--937 Huanjia Yang and Lili Yang and Shuang-Hua Yang Hybrid ZigBee RFID sensor network for humanitarian logistics centre management 938--948 Worapot Jakkhupan and Somjit Arch-int and Yuefeng Li Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: a proof-of-concept approach . . . . . . . . . . . . . . . . 949--957 Taewoo Nam and Keunhyuk Yeom Business-aware framework for supporting RFID-enabled applications in EPC Network 958--971 Leonardo A. Amaral and Fabiano P. Hessel and Eduardo A. Bezerra and Jerônimo C. Corrêa and Oliver B. Longhi and Thiago F. O. Dias eCloudRFID --- a mobile software framework architecture for pervasive RFID-based applications . . . . . . . . 972--979 Pablo Najera and Javier Lopez and Rodrigo Roman Real-time location and inpatient care systems based on passive RFID . . . . . 980--989 Chuong C. Vo and Naveen Chilamkurti and Seng W. Loke and Torab Torabi Radio-Mama: an RFID based business process framework for asset management 990--997 Maria Chaudhry and Ali Hammad Akbar and Qanita Ahmad and Imran Sarwar SOARware$^1$: Treading through the crossroads of RFID middleware and SOA paradigm . . . . . . . . . . . . . . . . 998--1014 Damith C. Ranasinghe and Mark Harrison and Kary Främling and Duncan McFarlane Enabling through life product-instance management: Solutions and challenges . . 1015--1031 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Keqiu Li and Laurence T. Yang and Xuemin Lin Advanced topics in cloud computing . . . 1033--1034 Gang Chen and Yongwei Wu and Jia Liu and Guangwen Yang and Weimin Zheng Optimization of sub-query processing in distributed data integration systems . . 1035--1042 Z. Zhou and L. T. Yang and S. Bhiri and L. Shu and N. Xiong and M. Hauswirth Verifying mediated service interactions considering expected behaviours . . . . 1043--1053 Yuqing Zhu and Jianmin Wang and Chaokun Wang Ripple: a publish/subscribe service for multidata item updates propagation in the cloud . . . . . . . . . . . . . . . 1054--1067 Xiangzhen Kong and Chuang Lin and Yixin Jiang and Wei Yan and Xiaowen Chu Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction . . . . . . . . . . . . . . . 1068--1077 Weidong Shi and Yang Lu and Zhu Li and Jonathan Engelsma SHARC: a scalable $3$D graphics virtual appliance delivery framework in cloud 1078--1087 Hai Jin and Wei Gao and Song Wu and Xuanhua Shi and Xiaoxin Wu and Fan Zhou Optimizing the live migration of virtual machine by CPU scheduling . . . . . . . 1088--1096 Ashley Chonka and Yang Xiang and Wanlei Zhou and Alessio Bonti Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks . . . . . . . . . . . . . . . . 1097--1107 Yanming Shen and Keqiu Li and Junfeng Xu and Lu Li Layered video multicast with a P2P cooperation approach . . . . . . . . . . 1108--1112 Flavio Lombardi and Roberto Di Pietro Secure virtualization for cloud computing . . . . . . . . . . . . . . . 1113--1122 Fouzi Semchedine and Louiza Bouallouche-Medjkoune and Djamil A\"\issani Task assignment policies in distributed server systems: a survey . . . . . . . . 1123--1130 Tien-Ho Chen and Yen-Chiu Chen and Wei-Kuan Shih and Hsin-Wen Wei An efficient anonymous authentication protocol for mobile pay-TV . . . . . . . 1131--1137 Jian Wang and Yanheng Liu and Yu Jiao Building a trusted route in a mobile ad hoc network considering communication reliability and path length . . . . . . 1138--1149 J. Hu and I. Khalil and S. Han and A. Mahmood Seamless integration of dependability and security concepts in SOA: a feedback control system based framework and taxonomy . . . . . . . . . . . . . . . . 1150--1159 Hyun Sung Kim Location-based authentication protocol for first cognitive radio networking standard . . . . . . . . . . . . . . . . 1160--1167 David G. Rosado and Eduardo Fernández-Medina and Javier López and Mario Piattini Systematic design of secure Mobile Grid systems . . . . . . . . . . . . . . . . 1168--1183 Fatemeh Amiri and MohammadMahdi Rezaei Yousefi and Caro Lucas and Azadeh Shakery and Nasser Yazdani Mutual information-based feature selection for intrusion detection systems . . . . . . . . . . . . . . . . 1184--1199 Rafael Duque and Crescencio Bravo and Manuel Ortega A model-based framework to automate the analysis of users' activity in collaborative systems . . . . . . . . . 1200--1209 Meirong Liu and Timo Koskela and Zhonghong Ou and Jiehan Zhou and Jukka Riekki and Mika Ylianttila Super-peer-based coordinated service provision . . . . . . . . . . . . . . . 1210--1224 Jaime Chen and Manuel Díaz and Luis Llopis and Bartolomé Rubio and José M. Troya A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection . . . . . . . . . . . . . . . 1225--1239 Mahmut Tenruh Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN . . . 1240--1251 Sheikh Tahir Bakhsh and Halabi Hasbullah and Sabeen Tahir Dynamic Congestion Control through backup relay in Bluetooth scatternet . . 1252--1262 Xingwei Liu and Xuming Fang and Xu Chen and Xuesong Peng A bidding model and cooperative game-based vertical handoff decision algorithm . . . . . . . . . . . . . . . 1263--1271 Qi Lu and Maode Ma Group mobility support in mobile WiMAX networks . . . . . . . . . . . . . . . . 1272--1282 Jesús Ibáñez Minimalist approach to show emotions via a flock of smileys . . . . . . . . . . . 1283--1291 Chun-Ying Huang and Shang-Pin Ma and Kuan-Ta Chen Using one-time passwords to prevent password phishing attacks . . . . . . . 1292--1301 Miao Xie and Song Han and Biming Tian and Sazia Parvin Anomaly detection in wireless sensor networks: a survey . . . . . . . . . . . 1302--1325 Sinan Senol and Kemal Leblebicioglu and Ece G. Schmidt INtERCEDE: an algorithmic approach to networked control system design . . . . 1326--1341 Rafael Teigão and Carlos Maziero and Altair Santin Applying a usage control model in an operating system kernel . . . . . . . . 1342--1352 Songtao Guo and Chuangyin Dang and Xiaofeng Liao Joint opportunistic power and rate allocation for wireless ad hoc networks: an adaptive particle swarm optimization approach . . . . . . . . . . . . . . . . 1353--1365 Justin Dean and Andrew Harrison and Robert N. Lass and Joe Macker and David Millar and Ian Taylor Client/server messaging protocols in serverless environments . . . . . . . . 1366--1379 Y. Challal and A. Ouadjaout and N. Lasla and M. Bagaa and A. Hadjidj Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks . . . . . . 1380--1397 Wenfeng Li and Weiming Shen Swarm behavior control of mobile multi-robots with wireless sensor networks . . . . . . . . . . . . . . . . 1398--1407 R. O. Ocaya A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server . . . . . . . . . . . . . . . . . 1408--1415 Wenjun Xu and Zude Zhou and D. T. Pham and C. Ji and M. Yang and Quan Liu Hybrid congestion control for high-speed networks . . . . . . . . . . . . . . . . 1416--1428 Javad Akbari Torkestani and Mohammad Reza Meybodi A link stability-based multicast routing protocol for wireless mobile ad hoc networks . . . . . . . . . . . . . . . . 1429--1440 André Vicente Calvinho and Rui Gustavo Crespo Email FI identification and resolution with model checking . . . . . . . . . . 1441--1446 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Han-Chieh Chao and Jean-Pierre Seifert and Shiguo Lian and Liang Zhou Dependable multimedia communications: Systems, services, and applications . . 1447--1448 Rongbo Zhu Intelligent rate control for supporting real-time traffic in WLAN mesh networks 1449--1458 Po-Yi Shih and Po-Chuan Lin and Jhing-Fa Wang and Yuan-Ning Lin Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification . . . . . . . . . . . . . 1459--1467 Der-Jiunn Deng PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks 1468--1473 Philip Leroux and Steven Latré and Nicolas Staelens and Piet Demeester and Filip De Turck Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service 1474--1488 Wen Ji and Min Chen and Xiaohu Ge and Peng Li and Yiqiang Chen A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle . . . . . . . . . . 1489--1497 Sanjay K. Dhurandher and Sudip Misra and Puneet Pruthi and Shubham Singhal and Saurabh Aggarwal and Isaac Woungang Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks 1498--1508 I.-Ju Liao and Tin-Yu Wu and Jen-Wen Ding and Wei-Tsong Lee A novel $3$D streaming protocol supported multi-mode display . . . . . . 1509--1517 Rashid Mehmood and Raad Alturki and Sherali Zeadally Multimedia applications over metropolitan area networks (MANs) . . . 1518--1529 Sudip Misra and Ankur Jain Policy controlled self-configuration in unattended wireless sensor networks . . 1530--1544 Chia-Hui Wang and Yu-Shun Liu A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie--Hellman and dynamic key changes 1545--1556 Guangjie Liu and Junwen Wang and Shiguo Lian and Zhiquan Wang A passive image authentication scheme for detecting region-duplication forgery with rotation . . . . . . . . . . . . . 1557--1565 Yeong-Sheng Chen and Yuan-Wei Lee and Jong Hyuk Park Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks . . . . . . . . . . . . 1566--1571 Kevin J. Ma and Radim Bartos and Swapnil Bhatia A survey of schemes for Internet-based video delivery . . . . . . . . . . . . . 1572--1586 Neyre Tekbiyik and Elif Uysal-Biyikoglu Energy efficient wireless unicast routing alternatives for machine-to-machine networks . . . . . . 1587--1614 Ching-Hao Mao and Hahn-Ming Lee and Che-Fu Yeh Adaptive e-mails intention finding system based on words social networks 1615--1622 Jun Yang and Bin Dai and Benxiong Huang and Shui Yu Orthogonal feedback scheme for network coding . . . . . . . . . . . . . . . . . 1623--1633 Jordán Pascual Espada and Oscar Sanjuán Martínez and Juan Manuel Cueva Lovelle and B. Cristina Pelayo G-Bustelo and Manuel Álvarez Álvarez and Alejandro González García Modeling architecture for collaborative virtual objects based on services . . . 1634--1647 Ting Chen and Xiao-song Zhang and Hua Li and Xiong-da Li and Yue Wu Fast quarantining of proactive worms in unstructured P2P networks . . . . . . . 1648--1659 Anindya Tahsin Prodhan and Rajkumar Das and Humayun Kabir and Gholamali C. Shoja TTL based routing in opportunistic networks . . . . . . . . . . . . . . . . 1660--1670 Imad Jawhar and Nader Mohamed and Dharma P. Agrawal Linear wireless sensor networks: Classification and applications . . . . 1671--1682 Stenio Fernandes and Judith Kelner and Djamel Sadok An adaptive-predictive architecture for video streaming servers . . . . . . . . 1683--1694 Liqiang Zhang and Yu-Jen Cheng and Xiaobo Zhou Enhanced statistics-based rate adaptation for 802.11 wireless networks 1695--1706 Martin Kuehnhausen and Victor S. Frost Application of the Java Message Service in mobile monitoring environments . . . 1707--1716 Zac Sadan and David G. Schwartz Social network analysis of web links to eliminate false positives in collaborative anti-spam systems . . . . 1717--1723 Chien-Lung Hsu and Han-Yu Lin New identity-based key-insulated convertible multi-authenticated encryption scheme . . . . . . . . . . . 1724--1731 Tao Qin and Xiaohong Guan and Wei Li and Pinghui Wang and Qiuzhen Huang Monitoring abnormal network traffic based on blind source separation approach . . . . . . . . . . . . . . . . 1732--1742 Hwa-Chun Ma and Prasan Kumar Sahoo and Yen-Wen Chen Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks . . . . . . . . 1743--1756 Wenjia Niu and Gang Li and Hui Tang and Xu Zhou and Zhongzhi Shi CARSA: a context-aware reasoning-based service agent model for AI planning of web service composition . . . . . . . . 1757--1770 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jiming Chen and David K. Y. Yau Control and optimization over wireless networks . . . . . . . . . . . . . . . . 1771--1772 Ning Weng and I-Hung Li and Lucas Vespa Information quality model and optimization for 802.15.4-based wireless sensor networks . . . . . . . . . . . . 1773--1783 Rabun Kosar and Ilir Bojaxhiu and Ertan Onur and Cem Ersoy Lifetime extension for surveillance wireless sensor networks with intelligent redeployment . . . . . . . . 1784--1793 Wahabou Abdou and Adrien Henriet and Christelle Bloch and Dominique Dhoutaut and Damien Charlet and François Spies Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks . . . . . . . . . 1794--1804 Dang Tu Nguyen and Wook Choi and Minh Thiep Ha and Hyunseung Choo Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks . . . . . . . . 1805--1817 Wenjia Liu and Bo Chen Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks . . . . . . . . . . 1818--1826 Qing Chen and Zubair Md. Fadlullah and Xiaodong Lin and Nei Kato A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) . . . . . . . . . . . . . . . . 1827--1835 Bader Al-Manthari and Nidal Nasser and Najah Abu Ali and Hossam Hassanein Congestion prevention in broadband wireless access systems: an economic approach . . . . . . . . . . . . . . . . 1836--1847 Jihoon Ryoo and Hwangnam Kim Multi-sector multi-range control for self-organizing wireless networks . . . 1848--1860 Zhaoming Lu and Yan Yang and Xiangming Wen and Ying Ju and Wei Zheng A cross-layer resource allocation scheme for ICIC in LTE-Advanced . . . . . . . . 1861--1868 M. Jahanshahi and M. Dehghan and M. R. Meybodi A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks . . . . . . . . . . . . . 1869--1882 Juan Rodríguez-Covili and Sergio F. Ochoa and José A. Pino and Roc Messeguer and Esunly Medina and Dolors Royo A communication infrastructure to ease the development of mobile collaborative applications . . . . . . . . . . . . . . 1883--1893 Bin Li and Zheng Zhou and Dejian Li and Weixia Zou A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors . . . . . . . . . . . . . . . . 1894--1902 Kyusuk Han and Youngjoon Seo and Sungjune Yoon and James J. (Jong Hyuk) Park and Taeshik Shon Providing security vertical handoff in SARAH for heterogeneous networks . . . . 1903--1907 Muhammad Ayaz and Imran Baig and Azween Abdullah and Ibrahima Faye A survey on routing techniques in underwater wireless sensor networks . . 1908--1927 Sarogini Grace Pease and Lin Guan and Iain Phillips and Alan Grigg Cross-layer signalling and middleware: a survey for inelastic soft real-time applications in MANETs . . . . . . . . . 1928--1941 David Antolino Rivas and José M. Barceló-Ordinas and Manel Guerrero Zapata and Julián D. Morillo-Pozo Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation . . . . . . . . . . . . . . 1942--1955 Muhammad Azhar Iqbal and Bin Dai and Benxiong Huang and A. Hassan and Shui Yu Survey of network coding-aware routing protocols in wireless networks . . . . . 1956--1970 M. Bakhouya and J. Gaber and P. Lorenz An adaptive approach for information dissemination in Vehicular Ad hoc Networks . . . . . . . . . . . . . . . . 1971--1978 Lu Leng and Jiashu Zhang Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security . . . . . . . . 1979--1989 Jeremiah D. Deng and Martin K. Purvis Multi-core application performance optimization using a constrained tandem queueing model . . . . . . . . . . . . . 1990--1996 Pedro M. Wightman and Miguel A. Labrador A family of simple distributed minimum connected dominating set-based topology construction algorithms . . . . . . . . 1997--2010 Sanjay Kumar Biswash and Chiranjeev Kumar An efficient metric-based (EM-B) location management scheme for wireless cellular networks . . . . . . . . . . . 2011--2026 Tzu-Chi Huang and Kuo-Chih Chu Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network 2027--2041 Maziar Ahmad Sharbafi and Mohammad Javad Yazdanpanah IDFC: a new approach to control bifurcation in TCP/RED . . . . . . . . . 2042--2050 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Contents list continued . . . . . . . . II Weiming Shen and Yinsheng Li and Anne James Collaborative computing and applications 1--2 Hugo Paredes and F. Mario Martins Social interaction regulation in virtual web environments using the Social Theatres model . . . . . . . . . . . . . 3--19 Weizhan Zhang and Qinghua Zheng and Haifei Li and Feng Tian An overlay multicast protocol for live streaming and delay-guaranteed interactive media . . . . . . . . . . . 20--28 Min Liu and Shijun Xu and Siyi Sun An agent-assisted QoS-based routing algorithm for wireless sensor networks 29--36 Tossaporn Srisooksai and Kamol Keamarungsi and Poonlap Lamsrichan and Kiyomichi Araki Practical data compression in wireless sensor networks: a survey . . . . . . . 37--59 Junzhou Luo and Xiaogang Wang and Ming Yang An interval centroid based spread spectrum watermarking scheme for multi-flow traceback . . . . . . . . . . 60--71 Kyuyong Shin and Douglas S. Reeves Winnowing: Protecting P2P systems against pollution through cooperative index filtering . . . . . . . . . . . . 72--84 Guoqiang Gao and Ruixuan Li and Kunmei Wen and Xiwu Gu Proactive replication for rare objects in unstructured peer-to-peer networks 85--96 Kwanghoon Kim A model-driven workflow fragmentation framework for collaborative workflow architectures and systems . . . . . . . 97--110 Junpeng Du and Shikai Jing and Jihong Liu Creating shared design thinking process for collaborative design . . . . . . . . 111--120 Yunjiao Xue and Hamada H. Ghenniwa and Weiming Shen Frame-based ontological view for semantic integration . . . . . . . . . . 121--131 Hongbo Sun and Wenhui Fan and Weiming Shen and Tianyuan Xiao Ontology-based interoperation model of collaborative product development . . . 132--144 Juan Rodríguez-Covili and Sergio F. Ochoa and José A. Pino High level MANET protocol: Enhancing the communication support for mobile collaborative work . . . . . . . . . . . 145--155 Yuqing Sun and Dickson K. W. Chiu and Bin Gong and Xiangxu Meng and Peng Zhang Scheduling mobile collaborating workforce for multiple urgent events . . 156--163 Fabrício Enembreck and Jean-Paul André Barth\`es Distributed constraint optimization with MULBS: a case study on collaborative meeting scheduling . . . . . . . . . . . 164--175 Mar Pérez-Sanagustín and Gustavo Ramirez-Gonzalez and Davinia Hernández-Leo and Mario Muñoz-Organero and Patricia Santos and Josep Blat and Carlos Delgado Kloos Discovering the campus together: a mobile and computer-based learning experience . . . . . . . . . . . . . . . 176--188 Adriana S. Vivacqua and Marcos R. S. Borges Taking advantage of collective knowledge in emergency response systems . . . . . 189--198 Amir Talaei-Khoei and Pradeep Ray and Nandan Parameshwaran and Lundy Lewis A framework for awareness maintenance 199--210 Jameela Al-Jaroodi and Nader Mohamed Service-oriented middleware: a survey 211--220 Rajashekhar C. Biradar and Sunilkumar S. Manvi Review of multicast routing mechanisms in mobile ad hoc networks . . . . . . . 221--239 Xianhui Che and Barry Ip Packet-level traffic analysis of online games from the genre characteristics perspective . . . . . . . . . . . . . . 240--252 Kok-Lim Alvin Yau and Peter Komisarczuk and Paul D. Teal Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues . . . . . . . . . . . . . . . . . 253--267 Mawloud Omar and Yacine Challal and Abdelmadjid Bouabdallah Certification-based trust models in mobile ad hoc networks: a survey and taxonomy . . . . . . . . . . . . . . . . 268--286 Eleftherios Stergiou and John Garofalakis Performance estimation of banyan semi layer networks with drop resolution mechanism . . . . . . . . . . . . . . . 287--294 Ibrahim Al-Surmi and Mohamed Othman and Borhanuddin Mohd Ali Mobility management for IP-based next generation mobile networks: Review, challenge and perspective . . . . . . . 295--315 Feng Zhong and Chai Kiat Yeo and Bu Sung Lee Adaptive load balancing algorithm for multiple homing mobile nodes . . . . . . 316--327 Marinho P. Barcellos and Rodolfo S. Antunes and Hisham H. Muhammad and Ruthiano S. Munaretti Beyond network simulators: Fostering novel distributed applications and protocols through extendible design . . 328--339 Fagen Li and Muhammad Khurram Khan and Khaled Alghathbar and Tsuyoshi Takagi Identity-based online/offline signcryption for low power devices . . . 340--347 Walid Saad and Zaher Dawy and Sanaa Sharafeddine A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks . . . . . . . . . . . 348--356 Jing Nie IPv6 based relay gateway protocol in hybrid networks . . . . . . . . . . . . 357--364 Dhiah Al-Shammary and Ibrahim Khalil Redundancy-aware SOAP messages compression and aggregation for enhanced performance . . . . . . . . . . . . . . 365--381 Eduardo Cañete and Jaime Chen and R. Marcos Luque and Bartolomé Rubio NeuralSens: a neural network based framework to allow dynamic adaptation in wireless sensor and actor networks . . . 382--393 Mohammad Javad Rostami and Azadeh Alsadat Emrani Zarandi and Seyed Mohamad Hoseininasab MSDP with ACO: a maximal SRLG disjoint routing algorithm based on ant colony optimization . . . . . . . . . . . . . . 394--402 Ronald Beaubrun and Jhon-Fredy Llano-Ruiz and Benoit Poirier and Alejandro Quintero A middleware architecture for disseminating delay-constrained information in wireless sensor networks 403--411 Jasma Balasangameshwara and Nedunchezhian Raju A hybrid policy for fault tolerant load balancing in grid computing environments 412--422 Tzu-Chi Huang Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing . . . . . . . . . . . 423--446 Chao-Tsun Chang Hash caching mechanism in source-based routing for wireless ad hoc networks . . 447--458 Sajjad Zare and Akbar Ghaffarpour Rahbar An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON . . . . . . . . . 459--468 Jun Huang and Xiaohong Huang and Yan Ma Routing with multiple quality-of-services constraints: an approximation perspective . . . . . . . 469--479 Serif Bahtiyar and Mehmet Ufuk Çaglayan Extracting trust information from security system of a service . . . . . . 480--490 Jorge Blasco and Julio Cesar Hernandez-Castro and José María de Fuentes and Benjamín Ramos A framework for avoiding steganography usage over HTTP . . . . . . . . . . . . 491--501 Bing Hu and Kwan L. Yeung and Zhaoyang Zhang Load-balanced three-stage switch . . . . 502--509 Ioannis Krikidis and John S. Thompson MIMO two-way relay channel with superposition coding and imperfect channel estimation . . . . . . . . . . . 510--516 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mesut Günes and Yan Zhang In memory of Mieso Denko . . . . . . . . 517 Ming-Tuo Zhou and Hiroshi Harada Cognitive maritime wireless mesh/ad hoc networks . . . . . . . . . . . . . . . . 518--526 Theofanis P. Lambrou and Christos G. Panayiotou A testbed for coverage control using mixed wireless sensor networks . . . . . 527--537 Joachim Fischer and Jens-Peter Redlich and Jochen Zschau and Claus Milkereit and Matteo Picozzi and Kevin Fleming and Mihal Brumbulli and Björn Lichtblau and Ingmar Eveslage A wireless mesh sensing network for early warning . . . . . . . . . . . . . 538--547 Evangelos Theodoridis and Ioannis Chatzigiannakis and Stefan Dulman Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation 548--561 Iván Corredor and José F. Martínez and Miguel S. Familiar and Lourdes López Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services . . . . . . . . . . . . . . . . 562--576 Bo Yang and Manohar Mareboyana Similarity search in sensor networks using semantic-based caching . . . . . . 577--583 Mari Carmen Domingo An overview of the Internet of Things for people with disabilities . . . . . . 584--596 Sajjad Rizvi and Hassaan Khaliq Qureshi and Syed Ali Khayam and Veselin Rakocevic and Muttukrishnan Rajarajan A1: an energy efficient topology control algorithm for connected area coverage in wireless sensor networks . . . . . . . . 597--605 Malabika Sengupta and Swapan Kumar Mondal and Debashis Saha A comparison of wavelength reservation protocols for WDM optical networks . . . 606--618 Chuan Zhu and Chunlin Zheng and Lei Shu and Guangjie Han A survey on coverage and connectivity issues in wireless sensor networks . . . 619--632 Jingyu Wang and Jianxin Liao and Tonghong Li OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer . . . . . . . . . . 633--643 Sanaa Sharafeddine and Ibrahim Al-Kassem and Zaher Dawy A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices . . . . . . . . 644--656 Wenjie Zhang and Chai Kiat Yeo Throughput and delay scaling laws for mobile overlaid wireless networks . . . 657--667 Hoda Hassan and Mohamed Eltoweissy CORM: a reference model for future computer networks . . . . . . . . . . . 668--680 Nicola Cordeschi and Tatiana Patriarca and Enzo Baccarelli Stochastic traffic engineering for real-time applications over wireless networks . . . . . . . . . . . . . . . . 681--694 Francisco Jurado and Miguel A. Redondo and Manuel Ortega Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice 695--712 Golnaz Vakili and Siavash Khorsandi Coordination of cooperation policies in a peer-to-peer system using swarm-based RL . . . . . . . . . . . . . . . . . . . 713--722 Radim Burget and Dan Komosny and Kathiravelu Ganeshan Topology aware feedback transmission for real-time control protocol . . . . . . . 723--730 Mahboobeh Sedighizad and Babak Seyfe and Keivan Navaie MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time . . . . . . . . 731--742 Yi-hua Zhu and Hui Xu and Kai-kai Chi and Hua Hu Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN . . . . . . . . . . . . . . . . . . 743--752 Carlos T. Calafate and Giancarlo Fortino and Sascha Fritsch and Janio Monteiro and Juan-Carlos Cano and Pietro Manzoni An efficient and robust content delivery solution for IEEE 802.11p vehicular environments . . . . . . . . . . . . . . 753--762 Xiong Li and Yongping Xiong and Jian Ma and Wendong Wang An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards . . . . . . . . . . . . . . 763--769 Min-Feng Wang and Meng-Feng Tsai and Sie-Long Jheng and Cheng-Hsien Tang Social feature-based enterprise email classification without examining email contents . . . . . . . . . . . . . . . . 770--777 Waltenegus Dargie A medium access control protocol that supports a seamless handover in wireless sensor networks . . . . . . . . . . . . 778--786 Rajesh Karunamurthy and Ferhat Khendek and Roch H. Glitho A novel architecture for Web service composition . . . . . . . . . . . . . . 787--802 Georgios Kastaniotis and Elias Maragos and Christos Douligeris and Dimitris K. Despotis Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies . . . . . 803--817 Wen-Hwa Liao and Hung-Chun Yang A power-saving data storage scheme for wireless sensor networks . . . . . . . . 818--825 Gildas Avoine and Xavier Carpent and Benjamin Martin Privacy-friendly synchronized ultralightweight authentication protocols in the storm . . . . . . . . . 826--843 Muhammad Imran and Mohamed Younis and Abas Md Said and Halabi Hasbullah Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks . . . . . . . 844--856 Mohit P. Tahiliani and K. C. Shet and T. G. Basavaraju CARED: Cautious Adaptive RED gateways for TCP/IP networks . . . . . . . . . . 857--864 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Laurence T. Yang and Guojun Wang Special issue on trusted computing and communications . . . . . . . . . . . . . 865--866 Yanli Yu and Keqiu Li and Wanlei Zhou and Ping Li Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures . . . . . . . . . . . . 867--880 Lei Jiang and Lixin Ding and Jianxun Liu and Jinjun Chen Reputation rating modeling for open environment lack of communication by using online social cognition . . . . . 881--891 Weizhong Qiang and Aleksandr Konstantinov and Deqing Zou and Laurence T. Yang A standards-based interoperable single sign-on framework in ARC Grid middleware 892--904 Zhongtian Jia and Xiaodong Lin and Seng-Hua Tan and Lixiang Li and Yixian Yang Public key distribution scheme for delay tolerant networks based on two-channel cryptography . . . . . . . . . . . . . . 905--913 Fei Wang and Furong Wang and Benxiong Huang and Laurence T. Yang SONR: a reliable reputation system of self-organized network . . . . . . . . . 914--926 Qin Liu and Guojun Wang and Jie Wu Secure and privacy preserving keyword searching for cloud storage services . . 927--933 Félix Gómez Mármol and Gregorio Martínez Pérez TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks . . . . . . . 934--941 Mohammad-Amin Kharraz and Hamid Sarbazi-Azad and Albert Y. Zomaya On-demand multicast routing protocol with efficient route discovery . . . . . 942--950 Huanyu Zhao and Xin Yang and Xiaolin Li An incentive mechanism to reinforce truthful reports in reputation systems 951--961 Laiping Zhao and Yizhi Ren and Mingchu Li and Kouichi Sakurai Flexible service selection with user-specific QoS support in service-oriented architecture . . . . . 962--973 Liang Gu and Guangdong Bai and Yao Guo and Xiangqun Chen and Hong Mei Security model oriented attestation on dynamically reconfigurable component-based systems . . . . . . . . 974--981 Min Choi and Jong Hyuk Park and Seungho Lim and Young-Sik Jeong Achieving reliable system performance by fast recovery of branch miss prediction 982--991 Yu Wang and Yang Xiang and Wanlei Zhou and Shunzheng Yu Generating regular expression signatures for network traffic classification in trusted network management . . . . . . . 992--1000 Jin-Hee Cho and Ananthram Swami and Ing-Ray Chen Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks . . . . . . . 1001--1012 Ousmane Diallo and Joel J. P. C. Rodrigues and Mbaye Sene Real-time data management on wireless sensor networks: a survey . . . . . . . 1013--1021 Wen Tao Zhu and Jianying Zhou and Robert H. Deng and Feng Bao Detecting node replication attacks in wireless sensor networks: a survey . . . 1022--1034 Jihao Yin and Yifei Wang and Jiankun Hu Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration . . . . . . 1035--1051 Panho Lee and Anura P. Jayasumana and H. M. N. Dilum Bandara and Sanghun Lim and V. Chandrasekar A peer-to-peer collaboration framework for multi-sensor data fusion . . . . . . 1052--1066 Chao-Yang Lee and Shou-Jen Lin and Chen-Wei Lee and Chu-Sing Yang An efficient continuous tracking system in real-time surveillance application 1067--1073 Rajashekhar C. Biradar and Sunilkumar S. Manvi Neighbor supported reliable multipath multicast routing in MANETs . . . . . . 1074--1085 Jesús Gallardo and Crescencio Bravo and Miguel A. Redondo A model-driven development method for collaborative modeling tools . . . . . . 1086--1105 S. Suraprasert and J. Fakcharoenphol Comparison of recovery schemes to maximize restorable throughput in multicast networks . . . . . . . . . . . 1106--1115 Bettahally N. Keshavamurthy and Durga Toshniwal and Bhavani K. Eshwar Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams . . 1116--1129 Abderrahmane Baadache and Ali Belmehdi Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks . . . . . . . . . . . . . . . . 1130--1139 M. C. Batistatos and G. V. Tsoulos and G. E. Athanasiadou Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges . . . . . . . . . . . . . 1140--1150 Zubair A. Baig Multi-agent systems for protecting critical infrastructures: a survey . . . 1151--1161 Abhik Banerjee and Chuan Heng Foh and Chai Kiat Yeo and Bu Sung Lee Performance improvements for network-wide broadcast with instantaneous network information . . . 1162--1174 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alfredo Cuzzocrea Intelligent algorithms for data-centric sensor networks . . . . . . . . . . . . 1175--1176 Aris Papadopoulos and Alfredo Navarra and Julie A. McCann and Cristina M. Pinotti VIBE: an energy efficient routing protocol for dense and mobile sensor networks . . . . . . . . . . . . . . . . 1177--1190 Mark Roantree and Jie Shi and Paolo Cappellari and Martin F. O'Connor and Michael Whelan and Niall Moyna Data transformation and query management in personal health sensor networks . . . 1191--1202 Paolo Bellavista and Giuseppe Cardone and Antonio Corradi and Luca Foschini The Future Internet convergence of IMS and ubiquitous smart environments: an IMS-based solution for energy efficiency 1203--1209 Alfredo Cuzzocrea and Alexis Papadimitriou and Dimitrios Katsaros and Yannis Manolopoulos Edge betweenness centrality: a novel algorithm for QoS-based topology control over wireless sensor networks . . . . . 1210--1217 Gianluca Moro and Gabriele Monti W-Grid: a scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks . . . . . . 1218--1234 R. Madhusudhan and R. C. Mittal Dynamic ID-based remote user password authentication schemes using smart cards: a review . . . . . . . . . . . . 1235--1248 Jan von Mulert and Ian Welch and Winston K. G. Seah Security threats and solutions in MANETs: a case study using AODV and SAODV . . . . . . . . . . . . . . . . . 1249--1259 Chien-Fu Cheng and Kuo-Tang Tsai Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks . . . . . . . . . . . . . . . . 1260--1276 Dong Kun Noh and Junbeom Hur Using a dynamic backbone for efficient data delivery in solar-powered WSNs . . 1277--1284 Longxiang Gao and Ming Li and Alessio Bonti and Wanlei Zhou and Shui Yu $M$-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models . . . . . . . 1285--1296 Najme Mansouri and Gholam Hosein Dastghaibyfard A dynamic replica management strategy in data grid . . . . . . . . . . . . . . . 1297--1303 Kenneth J. Turner and Koon Leai Larry Tan Rigorous development of composite grid services . . . . . . . . . . . . . . . . 1304--1316 Mustapha Reda Senouci and Abdelhamid Mellouk and Hadj Senouci and Amar Aissani Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols . . . . . . . 1317--1328 Hassen A. Mogaibel and Mohamed Othman and Shamala Subramaniam and Nor Asilah Wati Abdul Hamid On-demand channel reservation scheme for common traffic in wireless mesh networks 1329--1351 Elizabeth A. Thompson and Nathan Clem and Isaac Renninger and Timothy Loos Software-defined GPS receiver on USRP-platform . . . . . . . . . . . . . 1352--1360 Ameen M. Alkharasani and Mohamed Othman M$^2$I$^2$ tswTCM: a new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks 1361--1366 Miao Zhou and Yi Mu and Willy Susilo and Jun Yan and Liju Dong Privacy enhanced data outsourcing in the cloud . . . . . . . . . . . . . . . . . 1367--1373 Bettahally N. Keshavamurthy and Durga Toshniwal and Bhavani K. Eshwar Corrigendum to ``Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams'' [J. Network Comput. Appl. \bf 35 (3) (2012) 1116--1129] . . . . . . . 1374 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Paolo Bellavista and Chi-Ming Chen and Hossam Hassanein Special issue on service delivery management in broadband networks . . . . 1375--1376 Djamal-Eddine Meddour and Alaeddine Abdallah and Toufik Ahmed and Raouf Boutaba A cross layer architecture for multicast and unicast video transmission in mobile broadband networks . . . . . . . . . . . 1377--1391 Cristiano Bonato Both and Clarissa Cassales Marquezan and Rafael Kunst and Lisandro Zambenedetti Granville and Juergen Rochol A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles . . . . . . . . . 1392--1401 Giuseppe Aceto and Alessio Botta and Antonio Pescapé and Maurizio D'Arienzo Unified architecture for network measurement: the case of available bandwidth . . . . . . . . . . . . . . . 1402--1414 Werner Sandmann Delays in a series of queues with correlated service times . . . . . . . . 1415--1423 Kaouther Abrougui and Azzedine Boukerche and Hussam Ramadan Performance evaluation of an efficient fault tolerant service discovery protocol for vehicular networks . . . . 1424--1435 Nassima Hadid and Alexandre Guitton and Michel Misson Exploiting a meeting channel to interconnect mobile robots . . . . . . . 1436--1445 Christos Bouras and Vassilis Poulopoulos Enhancing meta-portals using dynamic user context personalization techniques 1446--1453 Ahmed A. Mosa and Aisha H. Abdalla and Rashid A. Saeed Evaluation of MANEMO route optimization schemes . . . . . . . . . . . . . . . . 1454--1472 A. Ruiz-Martínez A survey on solutions and main free tools for privacy enhancing Web communications . . . . . . . . . . . . . 1473--1492 Mohammad Masdari and Mehdi Maleknasab and Moazam Bidaki A survey and taxonomy of name systems in mobile ad hoc networks . . . . . . . . . 1493--1507 Adamu Murtala Zungeru and Li-Minn Ang and Kah Phooi Seng Classical and swarm intelligence based routing protocols for wireless sensor networks: a survey and comparison . . . 1508--1536 Liang Liu and Xiao-Lin Qin and Gui-Neng Zheng Reliable spatial window aggregation query processing algorithm in wireless sensor networks . . . . . . . . . . . . 1537--1547 Kranthi K. Mamidisetty and Michael J. Ferrara and Shivakumar Sastry Systematic selection of cluster heads for data collection . . . . . . . . . . 1548--1558 Rosen Ivanov Real-time GPS track simplification algorithm for outdoor navigation of visually impaired . . . . . . . . . . . 1559--1567 Yun He and Zhongyang Xiong and Yufang Zhang and Xiaolin Tan and Zhixing Li Modeling and analysis of multi-channel P2P VoD systems . . . . . . . . . . . . 1568--1578 Patrick Battistello and Joaquin Garcia-Alfaro and Cyril Delétré Transaction-based authentication and key agreement protocol for inter-domain VoIP 1579--1597 Samia A. Ali and Khaled M. Shaaban and Islam M. Alkabbany Distributed patching for mobile wireless sensor networks . . . . . . . . . . . . 1598--1605 Jipeng Zhou and Liyang Peng and Yuhui Deng and Jianzhu Lu An on-demand routing protocol for improving channel use efficiency in multichannel ad hoc networks . . . . . . 1606--1614 Seiven Leu and Ruay-Shiung Chang A weight-value algorithm for finding connected dominating sets in a MANET . . 1615--1619 Bert Vankeirsbilck and Dieter Verslype and Nicolas Staelens and Pieter Simoens and Chris Develder and Bart Dhoedt and Filip De Turck and Piet Demeester Automatic fine-grained area detection for thin client systems . . . . . . . . 1620--1632 Javad Akbari Torkestani Mobility prediction in mobile wireless networks . . . . . . . . . . . . . . . . 1633--1645 Ashok Kumar Das and Pranay Sharma and Santanu Chatterjee and Jamuna Kanta Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks . . . . . . . . 1646--1656 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Peer Azmat Shah and Muhammad Yousaf and Amir Qayyum and Halabi B. Hasbullah Performance comparison of end-to-end mobility management protocols for TCP 1657--1673 Allen L. Ramaboli and Olabisi E. Falowo and Anthony H. Chan Bandwidth aggregation in heterogeneous wireless networks: a survey of current approaches and issues . . . . . . . . . 1674--1690 Sazia Parvin and Farookh Khadeer Hussain and Omar Khadeer Hussain and Song Han and Biming Tian and Elizabeth Chang Cognitive radio network security: a survey . . . . . . . . . . . . . . . . . 1691--1708 Shajulin Benedict Energy-aware performance analysis methodologies for HPC architectures --- an exploratory study . . . . . . . . . . 1709--1719 Tarek Moulahi and Salem Nasri and Hervé Guyennet Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc . . . . . . 1720--1727 JungYul Choi and Min-Gon Kim and Hongkyu Jeong and Hong-Shik Park Power-saving mechanisms for energy efficient IEEE 802.16e/m . . . . . . . . 1728--1739 Jihao Yin and Chongyang Fu and Jiankun Hu Using incremental subspace and contour template for object tracking . . . . . . 1740--1748 Hamid Shokrzadeh and Siavash Khorsandi and Abolfazl Toroghi Haghighat Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks . . . . . . . . . . . . 1749--1761 Kwangcheol Shin and Kyungjun Kim and Soontae Kim Traffic management strategy for delay-tolerant networks . . . . . . . . 1762--1770 M. S. Kakkasageri and S. S. Manvi Multiagent driven dynamic clustering of vehicles in VANETs . . . . . . . . . . . 1771--1780 Alexandre Aguiar Amaral and Bruno Bogaz Zarpelão and Leonardo de Souza Mendes and Joel José Puga Coelho Rodrigues and Mario Lemes Proença Junior Inference of network anomaly propagation using spatio-temporal correlation . . . 1781--1792 Q. Shi and N. Zhang and D. Llewellyn-Jones Efficient autonomous signature exchange on ubiquitous networks . . . . . . . . . 1793--1806 Victoria Ying Zhang and Albert Kai-sun Wong Kernel-based particle filtering for indoor tracking in WLANs . . . . . . . . 1807--1817 Mourad Amad and Ahmed Meddahi and Djamil A\"\issani and Zonghua Zhang HPM: a novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity . . . . 1818--1830 Sandeep K. Sood A combined approach to ensure data security in cloud computing . . . . . . 1831--1838 Zuowen Tan A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments . . . . . . . . . 1839--1846 Bo Dong and Qinghua Zheng and Feng Tian and Kuo-Ming Chao and Rui Ma and Rachid Anane An optimized approach for storing and accessing small files on cloud storage 1847--1862 Rafael Antonello and Stenio Fernandes and Carlos Kamienski and Djamel Sadok and Judith Kelner and István Gódor and Géza Szabó and Tord Westholm Deep packet inspection tools and techniques in commodity platforms: Challenges and trends . . . . . . . . . 1863--1878 Mari Carmen Domingo An overview of the Internet of underwater things . . . . . . . . . . . 1879--1890 Javier Barrachina and Piedad Garrido and Manuel Fogue and Francisco J. Martinez and Juan-Carlos Cano and Carlos T. Calafate and Pietro Manzoni VEACON: a Vehicular Accident Ontology designed to improve safety on the roads 1891--1900 Adamu Murtala Zungeru and Li-Minn Ang and Kah Phooi Seng Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks 1901--1917 Mohamed Bakillah and Mir Abolfazl Mostafavi and Steve H. L. Liang and Alexander Zipf Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases . . . . . . . . . . . . . . . 1918--1933 G. Fortino and A. Guerrieri and G. M. P. O'Hare and A. Ruzzelli A flexible building management framework based on wireless sensor and actuator networks . . . . . . . . . . . . . . . . 1934--1952 Linfeng Liu and Ruchuan Wang and Fu Xiao Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes . . . 1953--1963 Gurpreet Singh and Neeraj Kumar and Anil Kumar Verma Ant colony algorithms in MANETs: a review . . . . . . . . . . . . . . . . . 1964--1972 S. Sudha and N. Ammasaigounden An aggregate marker for bandwidth fairness in DiffServ . . . . . . . . . . 1973--1978 Li Li and Qing-Shan Jia and Hengtao Wang and Ruixi Yuan and Xiaohong Guan A systematic method for network topology reconfiguration with limited link additions . . . . . . . . . . . . . . . 1979--1989 Chih-Lin Hu and Tzu-Han Kuo A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems . . . . . . 1990--2002 Miguel Franklin de Castro and Levi Bayde Ribeiro and Camila Helena Souza Oliveira An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing 2003--2015 Mohammad H. Hajiesmaili and Ahmad Khonsari and Ali Sehati and Mohammad Sadegh Talebi Content-aware rate allocation for efficient video streaming via dynamic network utility maximization . . . . . . 2016--2027 Javad Akbari Torkestani A distributed resource discovery algorithm for P2P grids . . . . . . . . 2028--2036 D. Gregor and S. L. Toral and T. Ariza and F. Barrero An ontology-based semantic service for cooperative urban equipments . . . . . . 2037--2050 Qingyang Song and Zhaolong Ning and Shiqiang Wang and Abbas Jamalipour Link stability estimation based on link connectivity changes in mobile ad-hoc networks . . . . . . . . . . . . . . . . 2051--2058 Süleyman Kardas and Serkan Çelik and Muhammet Yildiz and Albert Levi PUF-enhanced offline RFID security and privacy . . . . . . . . . . . . . . . . 2059--2067 Khalid A. Darabkh and Shereen S. Ismail and Mohammad Al-Shurman and Iyad F. Jafar and Eman Alkhader and Mamoun F. Al-Mistarihi Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks . . . . . 2068--2080 Yi Xie and J. Hu and S. Tang and X. Huang A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network 2081--2091 Yuan-Cheng Lai and Yen-Hung Chen A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks . . 2092--2104 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdelkrim Hadjidj and Marion Souil and Abdelmadjid Bouabdallah and Yacine Challal and Henry Owen Wireless sensor networks for rehabilitation applications: Challenges and opportunities . . . . . . . . . . . 1--15 Hung-Jen Liao and Chun-Hung Richard Lin and Ying-Chih Lin and Kuang-Yuan Tung Intrusion detection system: a comprehensive review . . . . . . . . . . 16--24 Ahmed Patel and Mona Taghavi and Kaveh Bakhtiyari and Joaquim Celestino Júnior An intrusion detection and prevention system in cloud computing: a systematic review . . . . . . . . . . . . . . . . . 25--41 Chirag Modi and Dhiren Patel and Bhavesh Borisaniya and Hiren Patel and Avi Patel and Muttukrishnan Rajarajan A survey of intrusion detection techniques in Cloud . . . . . . . . . . 42--57 Fadoua Mhiri and Kaouthar Sethom and Ridha Bouallegue A survey on interference management techniques in femtocell self-organizing networks . . . . . . . . . . . . . . . . 58--65 Md. Mahedi Hassan and Poo Kuan Hoong Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain . . . . 66--76 Rodrigo Palucci Pantoni and Dennis Brandão A gradient based routing scheme for street lighting wireless sensor networks 77--90 D. Satish Kumar and N. Nagarajan Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks . . . . . . . . . . . . . 91--102 Christos Emmanouilidis and Remous-Aris Koutsiamanis and Aimilia Tasidou Mobile guides: Taxonomy of architectures, context awareness, technologies and applications . . . . . 103--125 Saleem-ullah Lar and Xiaofeng Liao An initiative for a classified bibliography on TCP/IP congestion control . . . . . . . . . . . . . . . . 126--133 A. J. Dinusha Rathnayaka and Vidyasagar M. Potdar Wireless Sensor Network transport protocol: a critical review . . . . . . 134--146 Slimane Bah and Roch Glitho and Rachida Dssouli A SIP servlets-based framework for service provisioning in stand-alone MANETs . . . . . . . . . . . . . . . . . 147--155 Seung-Wan Han and In-Seon Jeong and Seung-Ho Kang Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks . . . . . . . . . 156--166 Junjie Xiong and Yangfan Zhou and Michael R. Lyu and Evan F. Y. Young MDiag: Mobility-assisted diagnosis for wireless sensor networks . . . . . . . . 167--177 Wen Tao Zhu Towards secure and communication-efficient broadcast encryption systems . . . . . . . . . . . 178--186 Bing Hu and Kwan L. Yeung and Zhaoyang Zhang An efficient single-iteration single-bit request scheduling algorithm for input-queued switches . . . . . . . . . 187--194 Kemal Akkaya and Izzet F. Senturk and Shanthi Vemulapalli Handling large-scale node failures in mobile sensor/robot networks . . . . . . 195--210 Zhan-feng Wang and Ming Chen and Chang-you Xing and Jing Feng and Xiang-lin Wei and Hua-li Bai Multi-manifold model of the Internet delay space . . . . . . . . . . . . . . 211--218 Jeroen Famaey and Frédéric Iterbeke and Tim Wauters and Filip De Turck Towards a predictive cache replacement strategy for multimedia content . . . . 219--227 Huan Dai and Zhao-min Zhu and Xiao-Feng Gu Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network . . . . . . . . 228--234 Adeela Waqar and Asad Raza and Haider Abbas and Muhammad Khurram Khan A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata . . . . . . . 235--248 Pekka Jäppinen and Renata Guarneri and Luis M. Correia An applications perspective into the Future Internet . . . . . . . . . . . . 249--254 Isabel de la Torre-Díez and Saúl Álvaro-Muñoz and Miguel López-Coronado and Joel Rodrigues Development and performance evaluation of a new RSS tool for a Web-based system: RSS\_PROYECT . . . . . . . . . . 255--261 Marjan Naderan and Mehdi Dehghan and Hossein Pedram Sensing task assignment via sensor selection for maximum target coverage in WSNs . . . . . . . . . . . . . . . . . . 262--273 Reinaldo B. Braga and Igor A. Chaves and Carina T. de Oliveira and Rossana M. C. Andrade and José Neuman de Souza and Hervé Martin and Bruno Schulze RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments . . . 274--283 Lo-Yao Yeh and Chun-Chuan Yang and Jee-Gong Chang and Yi-Lang Tsai A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs 284--292 Minwoo Kim and Karam Park and Won W. Ro Benefits of using parallelized non-progressive network coding . . . . . 293--305 Ting Yang and Yugeng Sun and Javid Taheri and Albert Y. Zomaya DLS: a dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks . . . . . . 306--315 Kaiping Xue and Changsha Ma and Peilin Hong and Rong Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks . . . . . . 316--323 Rafiqul Islam and Jemal Abawajy A multi-tier phishing detection and filtering approach . . . . . . . . . . . 324--335 Vishnu Monn Baskaran and Yoong Choon Chang and Jonathan Loo and KokSheik Wong Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing . . . . . . . . . . . . . . 336--352 Mingfu Li and Yueh-Lin Wu and Chia-Rong Chang Available bandwidth estimation for the network paths with multiple tight links and bursty traffic . . . . . . . . . . . 353--367 Fadi M. Al-Turjman and Hossam S. Hassanein and Mohamad Ibnkahla Quantifying connectivity in wireless sensor networks with grid-based deployments . . . . . . . . . . . . . . 368--377 Xun Yi and Eiji Okamoto Practical Internet voting system . . . . 378--387 Yuehua Wang and Zhong Zhou and Ling Liu and Wei Wu Replica-aided load balancing in overlay networks . . . . . . . . . . . . . . . . 388--401 D. Rosaci and G. M. L. Sarné Cloning mechanisms to improve agent performances . . . . . . . . . . . . . . 402--408 M. Hooshmand and S. M. R. Soroushmehr and P. Khadivi and S. Samavi and S. Shirani Visual sensor network lifetime maximization by prioritized scheduling of nodes . . . . . . . . . . . . . . . . 409--419 Weigang Hou and Lei Guo and Xiaoxue Gong Survivable power efficiency oriented integrated grooming in green networks 420--428 Jesús L. Alvaro and Beatriz Barros A new cloud computing architecture for music composition . . . . . . . . . . . 429--443 I-Hsuan Peng and Yen-Wen Chen Energy consumption bounds analysis and its applications for grid based wireless sensor networks . . . . . . . . . . . . 444--451 K. Salah and M. Hamawi Performance of IP-forwarding of Linux hosts with multiple network interfaces 452--465 Imran Baig and Muhammad Ayaz and Varun Jeoti On the peak-to-average power ratio reduction in mobile WiMAX: a discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system 466--475 Mary Looney and Oliver Gough A provision aware proportional fair sharing three colour marker . . . . . . 476--483 Maria-Victoria Belmonte and Manuel Díaz and Jose-Luis Pérez-de-la-Cruz and Ana Reyna COINS: COalitions and INcentiveS for effective Peer-to-Peer downloads . . . . 484--497 Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Yaoyu Zhang An novel three-party authenticated key exchange protocol using one-time key . . 498--503 Eugénia Moreira Bernardino and Anabela Moreira Bernardino and Juan Manuel Sánchez-Pérez and Juan Antonio Gómez Pulido and Miguel A. Vega Rodríguez Swarm optimisation algorithms applied to large balanced communication networks 504--522 Haythem Bany Salameh and Osamah S. Badarneh Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks . . . . . . . . 523--532 Ting-Yi Chang and Yan-Ru Ke A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system . . . . . . . . . . . . . . . . . 533--542 Sepideh Adabi and Ali Movaghar and Amir Masoud Rahmani and Hamid Beigy Market-based grid resource allocation using new negotiation model . . . . . . 543--565 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Bingdong Li and Jeff Springer and George Bebis and Mehmet Hadi Gunes A survey of network flow applications 567--581 Shams Qazi and Raad Raad and Yi Mu and Willy Susilo Securing DSR against wormhole attacks in multirate ad hoc networks . . . . . . . 582--592 Ahmed Hassan Mohammed and Bin Dai and Benxiong Huang and Muhammad Azhar and Guan Xu and Peng Qin and Shui Yu A survey and tutorial of wireless relay network protocols based on network coding . . . . . . . . . . . . . . . . . 593--610 Xiaobing He and Michael Niedermeier and Hermann de Meer Dynamic key management in wireless sensor networks: a survey . . . . . . . 611--622 Sudhanshu Tyagi and Neeraj Kumar A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks 623--645 Rafiqul Islam and Ronghua Tian and Lynn M. Batten and Steve Versteeg Classification of malware based on integrated static and dynamic features 646--656 Kun Huang and Gaogang Xie and Rui Li and Shuai Xiong Fast and deterministic hash table lookup using discriminative Bloom filters . . . 657--666 Chiapin Wang Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach . . . . . . . . . . . . . . . . 667--676 Eyüp S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro Windows Mobile LiveSD Forensics . . . . 677--684 Sardar Muhammad Bilal and Carlos Jesus Bernardos and Carmen Guerrero Position-based routing in vehicular networks: a survey . . . . . . . . . . . 685--697 M. Kretschmer and P. Batroff and G. Ghinea Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies . . . . . . 698--710 Najme Mansouri and Gholam Hosein Dastghaibyfard and Ehsan Mansouri Combination of data replication and scheduling algorithm for improving data availability in Data Grids . . . . . . . 711--722 D. C. Vasiliadis and G. E. Rizos and C. Vassilakis Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively $2$-class priority routing traffic . . . . . . . . . . . . . . . . 723--737 Shiliang Luo and Xu Lu and Lianglun Cheng TSOIA: an efficient node selection algorithm facing the uncertain process for Internet of Things . . . . . . . . . 738--743 Gimer Cervera and Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs . . . 744--755 Kuang-Yow Lian and Sung-Jung Hsiao and Wen-Tsai Sung Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks . . . . . . . . . . . . . . . . 756--767 Po-Ching Lin and Jia-Hau Lee Re-examining the performance bottleneck in a NIDS with detailed profiling . . . 768--780 Yan Yang and Yulong Zhang and Alex Hai Wang and Meng Yu and Wanyu Zang and Peng Liu and Sushil Jajodia Quantitative survivability evaluation of three virtual machine-based server architectures . . . . . . . . . . . . . 781--790 C. Xu and C. Du and G. F. Zhao and S. Yu A novel model for user clicks identification based on hidden semi-Markov . . . . . . . . . . . . . . 791--798 Jian An and Xiaolin Gui and Wendong Zhang and Jinhua Jiang and Jianwei Yang Research on social relations cognitive model of mobile nodes in Internet of Things . . . . . . . . . . . . . . . . . 799--810 Yanheng Liu and Longxiang Suo and Dayang Sun and Aimin Wang A virtual square grid-based coverage algorithm of redundant node for wireless sensor network . . . . . . . . . . . . . 811--817 Peng Xiao and Zhigang Hu and Dongbo Liu and Guofeng Yan and Xilong Qu Virtual machine power measuring technique with bounded error in cloud environments . . . . . . . . . . . . . . 818--828 Gaik-Yee Chan and Chien-Sing Lee and Swee-Huay Heng Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks . . . . 829--842 Yuhuai Peng and Yao Yu and Lei Guo and Dingde Jiang and Qiming Gai An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks . . . . . . . . . . . . . . . . 843--857 Shahram Jamali and Seyyed Nasser Seyyed Hashemi and Amir Masoud Eftekhari Moghadam On the use of a full information feedback to stabilize RED . . . . . . . 858--869 Abraham Martín-Campillo and Jon Crowcroft and Eiko Yoneki and Ramon Martí Evaluating opportunistic networks in disaster scenarios . . . . . . . . . . . 870--880 Mahesh Kumar and Shishir Kumar AGRIB-BHF: a sustainable and fault tolerant aggregation . . . . . . . . . . 881--886 Mahmoud Al-shugran and Osman Ghazali and Suhaidi Hassan and Kashif Nisar and A. Suki M. Arif A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network . . . . . . . . . 887--897 Laisen Nie and Dingde Jiang and Lei Guo A power laws-based reconstruction approach to end-to-end network traffic 898--907 Enver Ever and Orhan Gemikonakli and Altan Kocyigit and Eser Gemikonakli A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues . . . . . . . 908--926 Hu Xiong and Zhong Chen and Fagen Li New identity-based three-party authenticated key agreement protocol with provable security . . . . . . . . . 927--932 Kashif Nisar and Angela Amphawan and Suhaidi Hassan and Nurul I. Sarkar A comprehensive survey on scheduler for VoIP over WLAN . . . . . . . . . . . . . 933--948 Mohamed K. Watfa and Haitham Al-Hassanieh and Samir Salmen A novel solution to the energy hole problem in sensor networks . . . . . . . 949--958 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and Russel Hsing and Min Chen and Bingli Jiao and Binod Vaidya Guest Editorial on Vehicular Networking Protocols . . . . . . . . . . . . . . . 959--960 António Fonseca and Teresa Vazão Applicability of position-based routing for VANET in highways and urban environment . . . . . . . . . . . . . . 961--973 Rajashree Nair and Ben Soh and Naveen Chilamkurti and James J. (Jong Hyuk) Park Structure-free message aggregation and routing in traffic information system (SMART) . . . . . . . . . . . . . . . . 974--980 Salim Bitam and Abdelhamid Mellouk Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks . . . . . . . 981--991 Zhenxia Zhang and Azzedine Boukerche and Hussam Ramadan Design and evaluation of a fast MAC layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks . . . . . . . . . . . . . . . . 992--1000 Angelos Antonopoulos and Charalabos Skianis and Christos Verikoukis Network coding-based cooperative ARQ scheme for VANETs . . . . . . . . . . . 1001--1007 Navid Tadayon and Sasan Khoshroo and Elaheh Askari and Honggang Wang and Howard Michel Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis . . . . 1008--1017 Youxiang Wang and Jianquan Wang and Lu Zhaobiao and Xingang Liu Performance improvement of QO-STBC over time-selective channel for wireless network . . . . . . . . . . . . . . . . 1018--1026 Jaime Lloret and Alejandro Canovas and Angel Catalá and Miguel Garcia Group-based protocol and mobility model for VANETs to offer Internet access . . 1027--1038 Md. Humayun Kabir and Mohammad Mukhtaruzzaman and Mohammed Atiquzzaman Efficient route optimization scheme for nested-NEMO . . . . . . . . . . . . . . 1039--1049 Liren Zhang and Abderrahmane Lakas and Hesham El-Sayed and Ezedin Barka Mobility analysis in vehicular ad hoc network (VANET) . . . . . . . . . . . . 1050--1056 Yejun Liu and Qingyang Song and Rui Ma and Bing Li and Bo Gong Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network . . 1057--1069 Jian-Zhen Luo and Shun-Zheng Yu Position-based automatic reverse engineering of network protocols . . . . 1070--1077 Masoud Zarifneshat and Pejman Khadivi Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models 1078--1090 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ebrahim Mahdipour and Amir Masoud Rahmani and Saeed Setayeshi Importance sampling for Jackson networks with customer impatience until the end of service . . . . . . . . . . . . . . . 1091--1101 C. Dumez and M. Bakhouya and J. Gaber and M. Wack and P. Lorenz Model-driven approach supporting formal verification for web service composition protocols . . . . . . . . . . . . . . . 1102--1115 Nader Mohamed and Jameela Al-Jaroodi and Abdulla Eid A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud . . . . . . . . . . . . . . . 1116--1130 Ammar Haider and Iqbal Gondal and Joarder Kamruzzaman Social-connectivity-aware vertical handover for heterogeneous wireless networks . . . . . . . . . . . . . . . . 1131--1139 A. Cagatay Talay and D. Turgay Altilar Self adaptive routing for dynamic spectrum access in cognitive radio networks . . . . . . . . . . . . . . . . 1140--1151 Jasone Astorga and Marina Aguado and Nerea Toledo and Marivi Higuero A high performance link layer mobility management strategy for professional private broadband networks . . . . . . . 1152--1163 Chien-Chao Tseng and Chia-Liang Lin and Li-Hsing Yen and Jyun-Yan Liu and Cheng-Yuan Ho Can: a context-aware NAT traversal scheme . . . . . . . . . . . . . . . . . 1164--1173 D. D. Geeta and N. Nalini and Rajashekhar C. Biradar Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach . . . . . . . . . . 1174--1185 Chao-Yang Lee and Liang-Cheng Shiu and Fu-Tian Lin and Chu-Sing Yang Distributed topology control algorithm on broadcasting in wireless sensor network . . . . . . . . . . . . . . . . 1186--1195 El-Sayed M. El-Alfy and Syed N. Mujahid and Shokri Z. Selim A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks . . 1196--1207 Ying-Dar Lin and Cheng-Yuan Ho and Yuan-Cheng Lai and Tzu-Hsiung Du and Shun-Lee Chang Booting, browsing and streaming time profiling, and bottleneck analysis on Android-based systems . . . . . . . . . 1208--1218 Anwar Saif and Mohamed Othman SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks . . . . . . . . . . . . . . . . 1219--1229 Muhammad Hamad Alizai and Hanno Wirtz and Bernhard Kirchen and Klaus Wehrle Portable wireless-networking protocol evaluation . . . . . . . . . . . . . . . 1230--1242 Mohammad Masdari and Sadegh Mohammadzadeh Bazarchi and Moazam Bidaki Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks . . . . . . . . . . . . . . . . 1243--1260 Aishwarya Bakshi and Amir Talaei-Khoei and Pradeep Ray Adaptive policy framework: a systematic review . . . . . . . . . . . . . . . . . 1261--1271 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and Russel Hsing and Min Chen and Bingli Jiao and Binod Vaidya Guest editorial on vehicular communications and applications . . . . 1273--1274 C. Campolo and H. A. Cozzetti and A. Molinaro and R. Scopigno Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks . . . . . . . . . . . . 1275--1286 Yazhi Liu and Jianwei Niu and Jian Ma and Lei Shu and Takahiro Hara and Wendong Wang The insights of message delivery delay in VANETs with a bidirectional traffic model . . . . . . . . . . . . . . . . . 1287--1294 R. Bauza and J. Gozalvez Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications . . . 1295--1307 Nitin Maslekar and Joseph Mouzna and Mounir Boussedjra and Houda Labiod CATS: an adaptive traffic signal system based on car-to-car communication . . . 1308--1315 Kai Lin Research on adaptive target tracking in vehicle sensor networks . . . . . . . . 1316--1323 Nerea Toledo and Jean Marie Bonnin and Marivi Higuero Performance evaluation of user applications in the ITS scenario: an analytical assessment of the NeMHIP . . 1324--1336 Carlos Gañán and Jose L. Muñoz and Oscar Esparza and Jorge Mata-Díaz and Juan Hernández-Serrano and Juanjo Alins COACH: COllaborative certificate stAtus CHecking mechanism for VANETs . . . . . 1337--1351 Bidi Ying and Dimitrios Makrakis and Hussein T. Mouftah Privacy preserving broadcast message authentication protocol for VANETs . . . 1352--1364 Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao An enhanced smart card based remote user password authentication scheme . . . . . 1365--1371 Hai Van Luu and Xueyan Tang Constructing rings overlay for robust data collection in wireless sensor networks . . . . . . . . . . . . . . . . 1372--1386 Ting Chen and Xiao-song Zhang and Hong-yuan Li and Dong Wang and Yue Wu Propagation modeling of active P2P worms based on ternary matrix . . . . . . . . 1387--1394 Sulma Rashid and Abdul Hanan Abdullah and Qaisar Ayub and M. Soperi Mohd Zahid Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network . . . . . . . . . . . . . . . . 1395--1402 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Weiming Shen and Weidong Li Collaboration technologies and applications . . . . . . . . . . . . . . 1403--1404 Steven Latré and Jeroen Famaey and John Strassner and Filip De Turck Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation 1405--1417 Yuanhao Xu and Guofu Yin and Yong Nie and Zhengwei He and Xiaolin Dai Research on an active knowledge push service based on collaborative intent capture . . . . . . . . . . . . . . . . 1418--1430 Tao Wu and Xiaobing Pei and Yongzhong Lu and Changqing Chen and Liang Gao A distributed collaborative product design environment based on semantic norm model and role-based access control 1431--1440 Amy J. C. Trappey and Charles V. Trappey and Chun-Yi Wu and Chin Yuan Fan and Yi-Liang Lin Intelligent patent recommendation system for innovative design collaboration . . 1441--1450 Diego Carvalho Soares and Flávia Maria Santoro and Fernanda Araujo Baião Discovering collaborative knowledge-intensive processes through e-mail mining . . . . . . . . . . . . . 1451--1465 Pedro Antunes and David Simões and Luis Carriço and José A. Pino An end-user approach to business process modeling . . . . . . . . . . . . . . . . 1466--1479 Rahat Iqbal and Nazaraf Shah and Anne James and Tomasz Cichowicz Integration, optimization and usability of enterprise applications . . . . . . . 1480--1488 Leijie Fu and Pingyu Jiang and Wei Cao Modeling and performance analysis of product development process network . . 1489--1502 Ta-Ping Lu and Amy J. C. Trappey and Yi-Kuang Chen and Yu-Da Chang Collaborative design and analysis of supply chain network management key processes model . . . . . . . . . . . . 1503--1511 Yuan Cheng and Fazhi He and Xiantao Cai and Dejun Zhang A group Undo/Redo method in $3$D collaborative modeling systems with performance evaluation . . . . . . . . . 1512--1522 Jiancheng Shi and Jianhua Liu and Ruxin Ning and Weiwei Hou A collisions evaluation method in virtual environment for collaborative assembly . . . . . . . . . . . . . . . . 1523--1530 Bin Guo and Daqing Zhang and Zhu Wang and Zhiwen Yu and Xingshe Zhou Opportunistic IoT: Exploring the harmonious interaction between human and the Internet of Things . . . . . . . . . 1531--1539 Yang Yang and Xinyu Li and Liang Gao and Xinyu Shao A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming . . . . . . . . . 1540--1550 Jesús Gallardo and Ana I. Molina and Crescencio Bravo and Miguel A. Redondo A model-driven and task-oriented method for the development of collaborative systems . . . . . . . . . . . . . . . . 1551--1565 María Blanca Ibáñez and José J. García Rueda and David Maroto and Carlos Delgado Kloos Collaborative learning in multi-user virtual environments . . . . . . . . . . 1566--1576 Weiming Shen and Weidong Li Collaboration computing technologies and applications . . . . . . . . . . . . . . 1577--1578 Dujuan Gu and Xiaohan Liu and Gang Qin and Shuangjian Yan and Ze luo and Baoping Yan VNET6: IPv6 virtual network for the collaboration between applications and networks . . . . . . . . . . . . . . . . 1579--1588 Anbazhagan Rajesh and Rangaswamy Nakkeeran Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks . . . . . 1589--1598 Yuanyuan Pan and Jianqing Li Cooperative pseudonym change scheme based on the number of neighbors in VANETs . . . . . . . . . . . . . . . . . 1599--1609 Dami\`a Castell\`a and Francesc Giné and Francesc Solsona and Josep Lluis Lérida Analyzing locality over a P2P computing architecture . . . . . . . . . . . . . . 1610--1619 Josep Rius and Fernando Cores and Francesc Solsona Cooperative scheduling mechanism for large-scale peer-to-peer computing systems . . . . . . . . . . . . . . . . 1620--1631 Sheng-Cheng Yeh and Ming-Yang Su and Hui-Hui Chen and Chun-Yuen Lin An efficient and secure approach for a cloud collaborative editing . . . . . . 1632--1641 Hongchen Wu and Xinjun Wang and Zhaohui Peng and Qingzhong Li Div-clustering: Exploring active users for social collaborative recommendation 1642--1650 Ho Leung Li and Vincent T. Y. Ng Discovering associations between news and contents in social network sites with the D-Miner service framework . . . 1651--1659 Xiaogang Wang and Ming Yang and Junzhou Luo A novel sequential watermark detection model for efficient traceback of secret network attack flows . . . . . . . . . . 1660--1670 Jian Jiang and Wei Li and Junzhou Luo and Jing Tan A network accountability based verification mechanism for detecting inter-domain routing path inconsistency 1671--1683 JunPing Wang and Qiliang Zhu and Yan Ma An agent-based hybrid service delivery for coordinating Internet of Things and 3rd party service providers . . . . . . 1684--1695 Wenfeng Li and Ye Zhong and Xun Wang and Yulian Cao Resource virtualization and service selection in cloud logistics . . . . . . 1696--1704 Mojtaba Seyedzadegan and Mohamed Othman and Borhanuddin Mohd Ali and Shamala Subramaniam Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks . . . . . . . . . . . . . 1705--1723 Wu-Hsiao Hsu and Yuh-Pyng Shieh Virtual network mapping algorithm in the cloud infrastructure . . . . . . . . . . 1724--1734 Juan Felipe Botero and Miguel Molina and Xavier Hesselbach-Serra and José Roberto Amazonas A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems . . . . . . . . . . . . . . 1735--1752 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hyuk Lim and James Chang Wu Yu and Binod Vaidya Advances in multimedia services over emerging wireless networks . . . . . . . 1 Pradipta De and Nilanjan Banerjee and Swades De Exploiting multiple description coding for intermediate recovery in wireless mesh networks . . . . . . . . . . . . . 2--11 Paulo A. Neves and Joel J. P. C. Rodrigues and Min Chen and Athanasios V. Vasilakos A multi-channel architecture for IPv6-enabled wireless sensor and actuator networks featuring PnP support 12--24 Soocheol Lee and Seungmin Rho and Jong Hyuk Park Multimedia contents adaptation by modality conversion with user preference in wireless network . . . . . . . . . . 25--32 Hayoung Yoon and JongWon Kim and Robert Hsieh Peer-assisted video on-demand streaming system in practical WiFi-based mobile opportunistic networks . . . . . . . . . 33--44 Maria Ganzha and Marcin Paprzycki Agent-oriented computing for distributed systems and networks . . . . . . . . . . 45--46 Dongsoo Kim and Eric Noel and K. Wendy Tang Expanded Borel Cayley Graphs (Ex-BCGs): a novel communication topology for multi-agent systems . . . . . . . . . . 47--61 Shashank Srivastava and G. C. Nandi Self-reliant mobile code: a new direction of agent security . . . . . . 62--75 Antonín Komenda and Peter Novák and Michal Pechoucek Domain-independent multi-agent plan repair . . . . . . . . . . . . . . . . . 76--88 Sepideh Adabi and Ali Movaghar and Amir Masoud Rahmani and Hamid Beigy and Hengameh Dastmalchy-Tabrizi A new fuzzy negotiation protocol for grid resource allocation . . . . . . . . 89--126 Giancarlo Fortino and Wilma Russo and Marino Vaccaro An agent-based approach for the design and analysis of content delivery networks . . . . . . . . . . . . . . . . 127--145 Álvaro Carrera and Carlos A. Iglesias and Javier García-Algarra and Dusan Kolarík A real-life application of multi-agent systems for fault diagnosis in the provision of an Internet business service . . . . . . . . . . . . . . . . 146--154 Wenjia Niu and Gang Li and Endong Tong and Xinghua Yang and Liang Chang and Zhongzhi Shi and Song Ci Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization . . . . . . . 155--169 Jaime Galán-Jiménez and Alfonso Gazo-Cervero Using bio-inspired algorithms for energy levels assessment in energy efficient wired communication networks . . . . . . 171--185 Jiguo Yu and Qingbo Zhang and Dongxiao Yu and Congcong Chen and Guanghui Wang Domatic partition in homogeneous wireless sensor networks . . . . . . . . 186--193 Demetris Hoplaros and Zahir Tari and Ibrahim Khalil Data summarization for network traffic monitoring . . . . . . . . . . . . . . . 194--205 Chi-Tao Chiang and Hung-Chang Chen and Wen-Hwa Liao and Kuei-Ping Shih A decentralized minislot scheduling protocol (DMSP) in TDMA-based wireless mesh networks . . . . . . . . . . . . . 206--215 Abbas Ali Rezaee and Mohammad Hossein Yaghmaee and Amir Masoud Rahmani and Amir Hossein Mohajerzadeh HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks 216--228 Chih-Min Chao and Tzu-Ying Hsiao Design of structure-free and energy-balanced data aggregation in wireless sensor networks . . . . . . . . 229--239 Sajjad Zare and Akbar Ghaffarpour Rahbar Congestion control in IPTV over PON using Digital Fountain forward error correction . . . . . . . . . . . . . . . 240--252 Feng Li and Li Wang and Weidang Lu Potential bargaining for resource allocation in cognitive relay transmission . . . . . . . . . . . . . . 253--258 Yuhuai Peng and Qingyang Song and Yao Yu and Fei Wang Fault-tolerant routing mechanism based on network coding in wireless mesh networks . . . . . . . . . . . . . . . . 259--272 Yuemei Xu and Yang Li and Tao Lin and Zihou Wang and Wenjia Niu and Hui Tang and Song Ci A novel cache size optimization scheme based on manifold learning in Content Centric Networking . . . . . . . . . . . 273--281 Jacques M. Bahi and Xiaole Fang and Christophe Guyeux and Qianxue Wang Suitability of chaotic iterations schemes using XORshift for security applications . . . . . . . . . . . . . . 282--292 Conor Cameron and Ibrahim Khalil and Zahir Tari An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content . . . . . . . 293--314 Wei Zheng and Tao Su and Haijun Zhang and Wei Li and Xiaoli Chu and Xiangming Wen Distributed power optimization for spectrum-sharing femtocell networks: a fictitious game approach . . . . . . . . 315--322 Guilin Li and Longjiang Guo and Xing Gao and Minghong Liao Bloom filter based processing algorithms for the multi-dimensional event query in wireless sensor networks . . . . . . . . 323--333 Jianwei Niu and Wenfang Song and Mohammed Atiquzzaman Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications . . . . . . . . . . 334--347 Binh Viet Phan and Eric Pardede Active XML (AXML) research: Survey on the representation, system architecture, data exchange mechanism and query evaluation . . . . . . . . . . . . . . . 348--364 Harjit Pal Singh and Sarabjeet Singh and J. Singh and S. A. Khan VoIP: State of art for global connectivity --- a critical review . . . 365--379 Saif Al-Sultan and Moath M. Al-Doori and Ali H. Al-Bayatti and Hussien Zedan A comprehensive survey on vehicular Ad Hoc network . . . . . . . . . . . . . . 380--392 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ilsun You and Marek R. Ogiela and A. Min Tjoa and Dongwan Shin Advanced technologies for homeland defense and security . . . . . . . . . . 1--2 Leszek T. Lilien and Lotfi ben Othmane and Pelin Angin and Andrew DeCarlo and Raed M. Salih and Bharat Bhargava A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks . . . . . . . . . . 3--15 Dongjin Choi and Byeongkyu Ko and Heesun Kim and Pankoo Kim Text analysis for detecting terrorism-related articles on the web 16--21 Aniello Castiglione and Roberto De Prisco and Alfredo De Santis and Ugo Fiore and Francesco Palmieri A botnet-based command and control approach relying on swarm intelligence 22--33 Lidia Ogiela and Marek R. Ogiela Cognitive systems and bio-inspired computing in homeland security . . . . . 34--42 Seung-Hyun Seo and Aditi Gupta and Asmaa Mohamed Sallam and Elisa Bertino and Kangbin Yim Detecting mobile malware threats to homeland security through static analysis . . . . . . . . . . . . . . . . 43--53 Kerem Irgan and Cem Ünsalan and Sebnem Baydere Low-cost prioritization of image blocks in wireless sensor networks for border surveillance . . . . . . . . . . . . . . 54--64 Luigi Catuogno and Hans Löhr and Marcel Winandy and Ahmad-Reza Sadeghi A trusted versioning file system for passive mobile storage devices . . . . . 65--75 Zang Li and Chao-Hsien Chu and Wen Yao A semantic authorization model for pervasive healthcare . . . . . . . . . . 76--87 Hsing-Chung Chen A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment . . . 88--98 Jong-Yeon Park and Dong-Guk Han and Okyeon Yi and JeongNyeo Kim An improved side channel attack using event information of subtraction . . . . 99--105 Subir Halder and Sipra Das Bit Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes . . . . . . . . . . . . . . . . . 106--124 Sheng Gao and Jianfeng Ma and Cong Sun and Xinghua Li Balancing trajectory privacy and data utility using a personalized anonymization model . . . . . . . . . . 125--134 Gaya K. Jayasinghe and J. Shane Culpepper and Peter Bertok Efficient and effective realtime prediction of drive-by download attacks 135--149 Hai Van Luu and Xueyan Tang An efficient algorithm for scheduling sensor data collection through multi-path routing structures . . . . . 150--162 Mohammad Doraghinejad and Hossein Nezamabadi-pour and Ali Mahani Channel assignment in multi-radio wireless mesh networks using an improved gravitational search algorithm . . . . . 163--171 Messaoud Doudou and Djamel Djenouri and Nadjib Badache and Abdelmadjid Bouabdallah Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: a review and taxonomy 172--184 Wenjing Guo and Wei Zhang A survey on intelligent routing protocols in wireless sensor networks 185--201 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hélder Pereira Borges and José Neuman de Souza and Bruno Schulze and Antonio Roberto Mury Automatic services instantiation based on a process specification . . . . . . . 1--16 Ali Mohammed Alsahag and Borhanuddin Mohd Ali and Nor Kamariah Noordin and Hafizal Mohamad Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin . . . 17--25 Ding-Jie Huang and Wei-Chung Teng A defense against clock skew replication attacks in wireless sensor networks . . 26--37 Endong Tong and Wenjia Niu and Gang Li and Ding Tang and Liang Chang and Zhongzhi Shi and Song Ci Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks . . . . . . . . . . . . 38--51 Feng-Ming Yang and Wei-Mei Chen and Jean-Lien C. Wu A dynamic strategy for packet scheduling and bandwidth allocation based on channel quality in IEEE 802.16e OFDMA system . . . . . . . . . . . . . . . . . 52--60 Zhaolong Ning and Qingyang Song and Yang Huang and Lei Guo A channel estimation based opportunistic scheduling scheme in wireless bidirectional networks . . . . . . . . . 61--69 Haidar Safa and Wassim El-Hajj and Hanan Zoubian A robust topology control solution for the sink placement problem in WSNs . . . 70--82 Yuxin Meng and Lam-For Kwok Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection . . . . . . 83--92 Smitha Shivshankar and Abbas Jamalipour Spatio-temporal multicast grouping for content-based routing in vehicular networks: a distributed approach . . . . 93--103 Huailiang Tan and Lianjun Huang and Zaihong He and Youyou Lu and Xubin He DMVL: an I/O bandwidth dynamic allocation method for virtual networks 104--116 Ali Moussaoui and Fouzi Semchedine and Abdallah Boukerram A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks . . . . . . . . . . . . . . . . 117--125 Abderrahim Benslimane and Abderrezak Rachedi Rate adaptation scheme for IEEE 802.11-based MANETs . . . . . . . . . . 126--139 V. R. Budyal and S. S. Manvi ANFIS and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks . . . . . . . . . . . . . . 140--151 Wiem Tounsi and Nora Cuppens-Boulahia and Joaquin Garcia-Alfaro and Yannick Chevalier and Frédéric Cuppens KEDGEN2: a key establishment and derivation protocol for EPC Gen2 RFID systems . . . . . . . . . . . . . . . . 152--166 Aukrit Chadagorn and Ibrahim Khalil and Conor Cameron and Zahir Tari PileCast: Multiple bit rate live video streaming over BitTorrent . . . . . . . 167--178 Osama Al-Haj Hassan and Thamer Al-Rousan and Anas Abu Taleb and Adi Maaita An efficient and scalable ranking technique for mashups involving RSS data sources . . . . . . . . . . . . . . . . 179--190 Ousmane Diallo and Joel J. P. C. Rodrigues and Mbaye Sene and Jaime Lloret Simulation framework for real-time database on WSNs . . . . . . . . . . . . 191--201 Tien-Wen Sung and Chu-Sing Yang Voronoi-based coverage improvement approach for wireless directional sensor networks . . . . . . . . . . . . . . . . 202--213 Carlo Mastroianni and Giuseppe Papuzzo A self-organizing P2P framework for collective service discovery . . . . . . 214--222 Younghyun Kim and Haneul Ko and Sangheon Pack and Jong-Hyouk Lee and Seok-Joo Koh and Heeyoung Jung Performance analysis of distributed mapping system in ID/locator separation architectures . . . . . . . . . . . . . 223--232 J. R. Gisbert and C. Palau and M. Uriarte and G. Prieto and J. A. Palazón and M. Esteve and O. López and J. Correas and M. C. Lucas-Estañ and P. Giménez and A. Moyano and L. Collantes and J. Gozálvez and B. Molina and O. Lázaro and A. González Integrated system for control and monitoring industrial wireless networks for labor risk prevention . . . . . . . 233--252 Alper Rifat Ulucinar and Ibrahim Korpeoglu and Ezhan Karasan Effects of physical channel separation on application flows in a multi-radio multi-hop wireless mesh network: an experimental study on BilMesh testbed 253--265 Mahantesh N. Birje and Sunilkumar S. Manvi and Sajal K. Das Reliable resources brokering scheme in wireless grids based on non-cooperative bargaining game . . . . . . . . . . . . 266--279 Shilei Lu and Shunzheng Yu A fuzzy $k$-coverage approach for RFID network planning using plant growth simulation algorithm . . . . . . . . . . 280--291 Jenn Tang Designing an Anti-swindle Mahjong Leisure Prototype System using RFID and ontology theory . . . . . . . . . . . . 292--301 Qaisar Ayub and Sulma Rashid and M. Soperi Mohd Zahid and Abdul Hanan Abdullah Contact quality based forwarding strategy for delay tolerant network . . 302--309 Xuxun Liu and Desi He Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks . . . . . . 310--318 Damianos Gavalas and Charalampos Konstantopoulos and Konstantinos Mastakas and Grammati Pantziou Mobile recommender systems in tourism 319--333 M. S. Kakkasageri and S. S. Manvi Information management in vehicular ad hoc networks: a review . . . . . . . . . 334--350 Hero Modares and Amirhossein Moravejosharieh and Jaime Lloret and Rosli Salleh A survey of secure protocols in Mobile IPv6 . . . . . . . . . . . . . . . . . . 351--368 Muhammad Nouman Durrani and Jawwad A. Shamsi Volunteer computing: requirements, challenges, and solutions . . . . . . . 369--380 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jine Tang and ZhangBing Zhou and Jianwei Niu and Qun Wang An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things . . . . . . . . . . . 1--11 Francisco Fraile and Juan Carlos Guerri Simple models of the content duration and the popularity of television content 12--20 Haiyang Hu and Yizhi Ren and Xu Xu and Liguo Huang and Hua Hu Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments . . . . . . . . . . . . . . 21--30 Vijay Varadharajan and Udaya Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation . . . . . . . 31--45 Leili Farzinvash and Mehdi Dehghan Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networks . . . . . . . . . 46--60 Peng-Yeng Yin and Ray-I. Chang and Chih-Chiang Chao and Yen-Ting Chu Niched ant colony optimization with colony guides for QoS multicast routing 61--72 Mohsen Arab and Mohsen Afsharchi Community detection in social networks using hybrid merging of sub-communities 73--84 Mohamed Ahmed Elfaki and Hamidah Ibrahim and Ali Mamat and Mohamed Othman and Haidar Safa Collaborative caching priority for processing requests in MANETs . . . . . 85--96 Jianwei Wang and Chen Jiang and Jianfei Qian Robustness of Internet under targeted attack: a cascading failure perspective 97--104 Sehoon Park and Qichen Chen and Hyuck Han and Heon Y. Yeom Design and evaluation of mobile offloading system for web-centric devices . . . . . . . . . . . . . . . . 105--115 Peng Zhao and Xinyu Yang and Wei Yu and Chiyong Dong and Shusen Yang and Sulabh Bhattarai Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks . . . . . . . . . . . . . . . . 116--125 Yang Xia and Chai Kiat Yeo Mobile Internet access over intermittent network connectivity . . . . . . . . . . 126--138 Zhen-Yu Wu and Ju-Chuan Wu and Sung-Chiang Lin and Charlotte Wang An electronic voting mechanism for fighting bribery and coercion . . . . . 139--150 Samar Abdelaziz and Mustafa ElNainay Metric-based taxonomy of routing protocols for cognitive radio ad hoc networks . . . . . . . . . . . . . . . . 151--163 Onur Yilmaz and Orhan Dagdeviren and Kayhan Erciyes Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks . . . . . 164--178 Darren Quick and Kim-Kwang Raymond Choo Google Drive: Forensic analysis of data remnants . . . . . . . . . . . . . . . . 179--193
Laleh Arshadi and Amir Hossein Jahangir Benford's law behavior of Internet traffic . . . . . . . . . . . . . . . . 194--205
Lingfang Zeng and Yang Wang Optimization on content service with local search in cloud of clouds . . . . 206--215 Ke Li and Sheng Wang and Shizhong Xu and Xiong Wang and Haojun Huang and Jin Ren and Bo Zhai Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demand . . . . . . . . . . . . . . . . . 216--226 Hyun-Ho Choi and Ki-Ho Lee and Jung-Ryun Lee Energy-delay tradeoff analysis of user state transition mechanism for mobile web services . . . . . . . . . . . . . . 227--233 Xinjie Guan and Baek-Young Choi Push or pull? Toward optimal content delivery using cloud storage . . . . . . 234--243 Francisco Macia-Perez and Iren Lorenzo-Fonseca and Jose Vicente Berna-Martinez A formal framework for modelling complex network management systems . . . . . . . 255--269 Carlos Abreu and Manuel Ricardo and P. M. Mendes Energy-aware routing for biomedical wireless sensor networks . . . . . . . . 270--278 R. I. Ciobanu and D. G. Reina and C. Dobre and S. L. Toral and P. Johnson JDER: a history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration 279--291 Dingde Jiang and Zhengzheng Xu and Peng Zhang and Ting Zhu A transform domain-based anomaly detection approach to network-wide traffic . . . . . . . . . . . . . . . . 292--306 N. Hoque and Monowar H. Bhuyan and R. C. Baishya and D. K. Bhattacharyya and J. K. Kalita Network attacks: Taxonomy, tools and systems . . . . . . . . . . . . . . . . 307--324 Md Whaiduzzaman and Mehdi Sookhak and Abdullah Gani and Rajkumar Buyya A survey on vehicular cloud computing 325--344 Saeid Abolfazli and Zohreh Sanaei and Abdullah Gani and Feng Xia and Laurence T. Yang Rich Mobile Applications: Genesis, taxonomy, and open issues . . . . . . . 345--362 Baraa T. Sharef and Raed A. Alsaqour and Mahamod Ismail Vehicular communication ad hoc routing protocols: a survey . . . . . . . . . . 363--396 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dhiah Al-Shammary and Ibrahim Khalil and Zahir Tari A distributed aggregation and fast fractal clustering approach for SOAP traffic . . . . . . . . . . . . . . . . 1--14 Tao Qin and Xiaohong Guan and Wei Li and Pinghui Wang and Min Zhu A new connection degree calculation and measurement method for large scale network monitoring . . . . . . . . . . . 15--26 Gurkan Tuna and Bilel Nefzi and Gianpaolo Conte Unmanned aerial vehicle-aided communications system for disaster recovery . . . . . . . . . . . . . . . . 27--36 Lijun Gao and Maode Ma and Yantai Shu and Yuhua Wei An ultralightweight RFID authentication protocol with CRC and permutation . . . 37--46 Tin-Yu Wu and Wei-Tsong Lee and Nadra Guizani and Tzu-Ming Wang Incentive mechanism for P2P file sharing based on social network and game theory 47--55 Ricardo Anacleto and Lino Figueiredo and Ana Almeida and Paulo Novais Mobile application to provide personalized sightseeing tours . . . . . 56--64 J. J. Castro-Schez and M. A. Redondo and F. Jurado and J. Albusac Experience applying language processing techniques to develop educational software that allow active learning methodologies by advising students . . . 65--79 Ahmed Mohammed Abbas and Azuraliza Abu Bakar and Mohd Zakree Ahmad Fast dynamic clustering SOAP messages based compression and aggregation model for enhanced performance of Web services 80--88 Bhaskar Sardar and Debashis Saha and Mahbub Hassan A novel enhancement of TCP for on-board IP networks with wireless cellular connectivity . . . . . . . . . . . . . . 89--100 Wei Liu and Wei Du and Jing Chen and Wei Wang and GuoSun Zeng Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters . . . . . . . . . . 101--113 Jinzhu Wang and Jianxin Liao and Tonghong Li and Jing Wang and Jingyu Wang and Qi Qi Probe-based end-to-end overload control for networks of SIP servers . . . . . . 114--125 Giannis Haralabopoulos and Ioannis Anagnostopoulos Real time enhanced random sampling of online social networks . . . . . . . . . 126--134 Saleh Alghamdi and Ron van Schyndel and Ibrahim Khalil Accurate positioning using long range active RFID technology to assist visually impaired people . . . . . . . . 135--147 Yacine Atif and Liren Zhang Network resource management in support of QoS in ubiquitous learning . . . . . 148--156 Xiaoyuan Li and Dexiang Wang and Janise McNair and Jianmin Chen Dynamic spectrum access with packet size adaptation and residual energy balancing for energy-constrained cognitive radio sensor networks . . . . . . . . . . . . 157--166 Muhammad Hamad Alizai and Klaus Wehrle Probabilistic location-free addressing in wireless networks . . . . . . . . . . 167--181 Sergio Pastrana and Agustin Orfila and Juan E. Tapiador and Pedro Peris-Lopez Randomized Anagram revisited . . . . . . 182--196 Tahir Ahmad and Usman Younis Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs . . . 197--205 Tim Verbelen and Pieter Simoens and Filip De Turck and Bart Dhoedt Adaptive deployment and configuration for mobile augmented reality in the cloudlet . . . . . . . . . . . . . . . . 206--216 M. A. Raayatpanah and H. Salehi Fathabadi and B. H. Khalaj and S. Khodayifar and P. M. Pardalos Bounds on end-to-end statistical delay and jitter in multiple multicast coded packet networks . . . . . . . . . . . . 217--227 Bert Vankeirsbilck and Pieter Simoens and Filip De Turck and Piet Demeester and Bart Dhoedt Network latency hiding in thin client systems through server-centric speculative display updating . . . . . . 228--239 Radu-Ioan Ciobanu and Ciprian Dobre and Mihai Dascalu and Stefan Trausan-Matu and Valentin Cristea SENSE: a collaborative selfish node detection and incentive mechanism for opportunistic networks . . . . . . . . . 240--249 Thang Tran and Maike Kuhnert and Christian Wietfeld Cloud voice service as over-the-top solution for seamless voice call continuity in a heterogeneous network environment . . . . . . . . . . . . . . 250--262 Yusen Li and Wentong Cai Update schedules for improving consistency in multi-server distributed virtual environments . . . . . . . . . . 263--273 Fan Li and Jinsheng Sun and Moshe Zukerman and Zhengfei Liu and Qin Xu and Sammy Chan and Guanrong Chen and King-Tim Ko A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes 274--299 Govind P. Gupta and Manoj Misra and Kumkum Garg Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks . . . . . . 300--311 Mehrnaz Moudi and Mohamed Othman A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network . . . . . . . . 312--318 Álvaro Rubio-Largo and Miguel A. Vega-Rodríguez and David L. González-Álvarez Performance assessment of multiobjective approaches in optical Traffic Grooming 319--350 Li Yi and Huachun Zhou and Daochao Huang and Hongke Zhang An analytical study of distributed mobility management schemes with a flow duration based model . . . . . . . . . . 351--357 Lingfang Zeng and Bharadwaj Veeravalli and Qingsong Wei Space4time: Optimization latency-sensitive content service in cloud . . . . . . . . . . . . . . . . . 358--368 Satoshi Utsumi and Salahuddin Muhammad Salim Zabir A new high-performance TCP friendly congestion control over wireless networks . . . . . . . . . . . . . . . . 369--378 Qingyang Song and Zhaolong Ning and Yang Huang and Lei Guo and Xiaobing Lu Joint power control and spectrum access in cognitive radio networks . . . . . . 379--388 Nima Jafari Navimipour and Amir Masoud Rahmani and Ahmad Habibizad Navin and Mehdi Hosseinzadeh Resource discovery mechanisms in grid systems: a survey . . . . . . . . . . . 389--410 Ying Li and Radim Bartos A survey of protocols for Intermittently Connected Delay-Tolerant Wireless Sensor Networks . . . . . . . . . . . . . . . . 411--423 Sunilkumar S. Manvi and Gopal Krishna Shyam Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey . . . . . . . . . . . . . . . . 424--440 Ssu-Hsuan Lu and Kuan-Ching Li and Kuan-Chou Lai and Yeh-Ching Chung Effectiveness of a replica mechanism to improve availability with Arrangement Graph-Based Overlay . . . . . . . . . . 441--450 Abderrazak Abdaoui and Tarek M. El-Fouly TOSSIM and distributed binary consensus algorithm in wireless sensor networks 451--458 R. Q. Shaddad and A. B. Mohammad and S. A. Al-Gailani and A. M. Al-hetar and M. A. Elmagzoub A survey on access technologies for broadband optical and wireless networks 459--472 Ayesha Binte Ashfaq and Sajjad Rizvi and Mobin Javed and Syed Ali Khayam and Muhammad Qasim Ali and Ehab Al-Shaer Information theoretic feature space slicing for statistical anomaly detection . . . . . . . . . . . . . . . 473--487 Ratnadip Adhikari A meticulous study of various medium access control protocols for wireless sensor networks . . . . . . . . . . . . 488--504 Jesús Friginal and Juan-Carlos Ruiz and David de Andrés and Antonio Bustos Ambient noise in wireless mesh networks: Evaluation and proposal of an adaptive algorithm to mitigate link removal . . . 505--516 Shazana Md Zin and Nor Badrul Anuar and Miss Laiha Mat Kiah and Al-Sakib Khan Pathan Routing protocol design for secure WSN: Review and open research issues . . . . 517--530 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jinyuan Jia and Wei Wang and Xiaojun Hei An efficient caching algorithm for peer-to-peer $3$D streaming in distributed virtual environments . . . . 1--11 Qin Xu and Jinsheng Sun A simple active queue management based on the prediction of the packet arrival rate . . . . . . . . . . . . . . . . . . 12--20 Mehdi Naderi Soorki and Habib Rostami Label switched protocol routing with guaranteed bandwidth and end to end path delay in MPLS networks . . . . . . . . . 21--38 Víctor Mateu and Francesc Sebé and Magda Valls Constructing credential-based E-voting systems from offline E-coin protocols 39--44 Poria Pirozmand and Guowei Wu and Behrouz Jedari and Feng Xia Human mobility in opportunistic networks: Characteristics, models and prediction methods . . . . . . . . . . . 45--58 Abbas Mehdizadeh and Fazirulhisyam Hashim and Mohamed Othman Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks . . . . . . . 59--69 Guangjie Han and Jia Chao and Chenyu Zhang and Lei Shu and Qingwu Li The impacts of mobility models on DV-hop based localization in Mobile Wireless Sensor Networks . . . . . . . . . . . . 70--79 Hadi Shakibian and Nasrollah Moghadam Charkari In-cluster vector evaluated particle swarm optimization for distributed regression in WSNs . . . . . . . . . . . 80--91 Nadine Akkari and Ghadah Aldabbagh and Michel Nahas and John Cioffi Dynamic Clustering Protocol for coordinated tethering over cellular networks . . . . . . . . . . . . . . . . 92--101 Shahaboddin Shamshirband and Nor Badrul Anuar and Miss Laiha Mat Kiah and Vala Ali Rohani and Dalibor Petkovi\'c and Sanjay Misra and Abdul Nasir Khan Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks . . . . . . . . 102--117 Jordán Pascual Espada and Ronald R. Yager and Bin Guo Internet of Things: Smart things network and communication . . . . . . . . . . . 118--119 Zheng Yan and Peng Zhang and Athanasios V. Vasilakos A survey on trust management for Internet of Things . . . . . . . . . . . 120--134 Wei Xie and Lei Xie and Chen Zhang and Qiang Wang and Jian Xu and Quan Zhang and Chaojing Tang RFID seeking: Finding a lost tag rather than only detecting its missing . . . . 135--142 Lianbo Ma and Kunyuan Hu and Yunlong Zhu and Hanning Chen Cooperative artificial bee colony algorithm for multi-objective RFID network planning . . . . . . . . . . . . 143--162 Hicham Lakhlef and Hakim Mabed and Julien Bourgeois Optimization of the logical topology for mobile MEMS networks . . . . . . . . . . 163--177 Guillermo Cueva-Fernandez and Jordán Pascual Espada and Vicente García-Díaz and Cristian González García and Nestor Garcia-Fernandez Vitruvius: an expert system for vehicle sensor tracking and managing application generation . . . . . . . . . . . . . . . 178--188 Jiajun Sun and Huadong Ma Heterogeneous-belief based incentive schemes for crowd sensing in mobile social networks . . . . . . . . . . . . 189--196 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Yasir Saleem and Mubashir Husain Rehmani Primary radio user activity models for cognitive radio networks: a survey . . . 1--16 Dong Ma and Maode Ma Network selection and resource allocation for multicast in HetNets . . 17--26 Gongqi Lin and Sieteng Soh and Kwan-Wu Chin and Mihai Lazarescu Energy Aware Two Disjoint Paths Routing 27--41 Zheng Xu and Yunhuai Liu and Lin Mei and Chuanping Hu and Lan Chen Generating temporal semantic context of concepts using web search engines . . . 42--55 JuiHsi Fu and PoChing Lin and SingLing Lee Detecting spamming activities in a campus network using incremental learning . . . . . . . . . . . . . . . . 56--65 Mohamed A. Alrshah and Mohamed Othman and Borhanuddin Ali and Zurina Mohd Hanapi Comparative study of high-speed Linux TCP variants over high-BDP networks . . 66--75 Xiaoping Wu and GuoYing Wang and Dan Dai and Mengjun Tong Accurate acoustic energy-based localization with beacon position uncertainty in wireless sensor networks 76--83 Abdullah Gani and Golam Mokatder Nayeem and Muhammad Shiraz and Mehdi Sookhak and Md Whaiduzzaman and Suleman Khan A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing . . . . . . . . . 84--102 Eduardo da Silva and Luiz Carlos P. Albini Middleware proposals for mobile ad hoc networks . . . . . . . . . . . . . . . . 103--120 Mehdi Sookhak and Hamid Talebian and Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan A review on remote data auditing in single cloud server: Taxonomy and open issues . . . . . . . . . . . . . . . . . 121--141 Hui-Shyong Yeo and Xiao-Shen Phang and Hoon-Jae Lee and Hyotaek Lim Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices . . 142--156 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Reza Jabbarpour and Rafidah Md Noor and Rashid Hafeez Khokhar and Chih-Heng Ke Cross-layer congestion control model for urban vehicular environments . . . . . . 1--16 Jiyan Wu and Bo Cheng and Yanlei Shang and Jun Huang and Junliang Chen A novel scheduling approach to concurrent multipath transmission of high definition video in overlay networks . . . . . . . . . . . . . . . . 17--29 Amr El Mougy and Aymen Kamoun and Mohamed Ibnkahla and Sa\"\id Tazi and Khalil Drira A context and application-aware framework for resource management in dynamic collaborative wireless M2M networks . . . . . . . . . . . . . . . . 30--45 Anindya Iqbal and Manzur Murshed On demand-driven movement strategy for moving beacons in sensor localization 46--62 Guo-Song Tian and Yu-Chu Tian and Colin Fidge Precise relative clock synchronization for distributed control using TSC registers . . . . . . . . . . . . . . . 63--71 Víctor Fernández and Juan Manuel Orduña and Pedro Morillo Server implementations for improving the performance of CAR systems based on mobile phones . . . . . . . . . . . . . 72--82 Khairul Azami Sidek and Vu Mai and Ibrahim Khalil Data mining in mobile ECG based biometric identification . . . . . . . . 83--91 Guoxing Jiang and Jun Chen and Yanqing Shen Delivery ratio- and buffered time-constrained: Multicasting for Delay Tolerant Networks . . . . . . . . . . . 92--105 Ying-Dar Lin and Ekarat Rattagan and Yuan-Cheng Lai and Li-Pin Chang and Yun-Chien Yo and Cheng-Yuan Ho and Shun-Lee Chang Calibrating parameters and formulas for process-level energy consumption profiling in smartphones . . . . . . . . 106--119 Wenjia Niu and Gang Li and Endong Tong and Quan Z. Sheng and Qian Li and Yue Hu and Athanasios V. Vasilakos and Li Guo A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network . . . . . . . . . . . . . 120--133 Hassina Nacer and Djamil Aissani Semantic web services: Standards, applications, challenges and solutions 134--151 Weiwei Fang and Zhulin An and Lei Shu and Qingyu Liu and Yongjun Xu and Yuan An Achieving optimal admission control with dynamic scheduling in energy constrained network systems . . . . . . . . . . . . 152--160 Jiyan Wu and Yanlei Shang and Chau Yuen and Bo Cheng and Junliang Chen TRADER: a reliable transmission scheme to video conferencing applications over the Internet . . . . . . . . . . . . . . 161--171 Changqing Ji and Zhiyang Li and Wenyu Qu and Yujie Xu and Yuanyuan Li Scalable nearest neighbor query processing based on Inverted Grid Index 172--182 Shaahin Madani and Ibrahim Khalil Garbled Routing (GR): a generic framework towards unification of anonymous communication systems . . . . 183--195 Pooia Lalbakhsh and Bahram Zaeri and Yi-Ping Phoebe Chen Using Dead Ants to improve the robustness and adaptability of AntNet routing algorithm . . . . . . . . . . . 196--211 Sudip Misra and P. Venkata Krishna and V. Saritha and Harshit Agarwal and Aditya Ahuja Learning automata-based multi-constrained fault-tolerance approach for effective energy management in smart grid communication network . . 212--219 Israat Tanzeena Haque A sensor based indoor localization through fingerprinting . . . . . . . . . 220--229 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and Toufik Ahmed and Raouf Boutaba and Reaz Ahmed Efficient content delivery scheme for layered video streaming in large-scale networks . . . . . . . . . . . . . . . . 1--14 Jenhui Chen and Zhuxiu Yuan and Lei Wang An apropos signal report and adaptive period (ASAP) scheme for fast handover in the fourth-generation wireless networks . . . . . . . . . . . . . . . . 15--26 An Huang and Bing Hu The optimal joint sequence design in the feedback-based two-stage switch . . . . 27--34 Jun Huang and Guoquan Liu and Qiang Duan On modeling and optimization for composite network-Cloud service provisioning . . . . . . . . . . . . . . 35--43 Junaid Qadir and Adeel Baig and Asad Ali and Quratulain Shafi Multicasting in cognitive radio networks: Algorithms, techniques and protocols . . . . . . . . . . . . . . . 44--61 Vandana Kushwaha and Ratneshwer Gupta Congestion control for high-speed wired network: a systematic literature review 62--78 Kok-Lim Alvin Yau and Nordin Ramli and Wahidah Hashim and Hafizal Mohamad Clustering algorithms for Cognitive Radio networks: a survey . . . . . . . . 79--95 Mohammad Iftekhar Husain and Steven Y. Ko and Steve Uurtamo and Atri Rudra and Ramalingam Sridhar Bidirectional data verification for cloud storage . . . . . . . . . . . . . 96--107 Saurabh Kumar Garg and Adel Nadjaran Toosi and Srinivasa K. Gopalaiyengar and Rajkumar Buyya SLA-based virtual machine management for heterogeneous workloads in a cloud datacenter . . . . . . . . . . . . . . . 108--120 Yan Zhu and Di Ma and Changjun Hu and Gail-Joon Ahn and Hongxin Hu Secure and efficient random functions with variable-length output . . . . . . 121--133 Le Sun and Hai Dong and Farookh Khadeer Hussain and Omar Khadeer Hussain and Elizabeth Chang Cloud service selection: State-of-the-art and future research directions . . . . . . . . . . . . . . . 134--150 Gurpreet Singh and Neeraj Kumar and Anil Kumar Verma ANTALG: an Innovative ACO based Routing Algorithm for MANETs . . . . . . . . . . 151--167 Fatima Zohra Benhamida and Yacine Challal and Mouloud Koudil Adaptive failure detection in low power lossy wireless sensor networks . . . . . 168--180 Julio Dondo and Felix Villanueva and David Garcia and David Vallejo and Carlos Glez-Morcillo and Juan Carlos Lopez Distributed FPGA-based architecture to support indoor localisation and orientation services . . . . . . . . . . 181--190 Rawya Rizk and Walaa Saber and Hany Harb Conditional clustered matrix factorization based network coordinate system . . . . . . . . . . . . . . . . . 191--202 Masoume Jabbarifar and Michel Dagenais LIANA: Live incremental time synchronization of traces for distributed systems analysis . . . . . . 203--214 Yosra Ben Saied and Alexis Olivereau and Djamal Zeghlache and Maryline Laurent A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications . . . . . 215--227 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ivanilton Polato and Reginaldo Ré and Alfredo Goldman and Fabio Kon A comprehensive view of Hadoop research --- a systematic literature review . . . 1--25 Hosein Mohamadi and Shaharuddin Salleh and Mohd Norsyarizad Razali Heuristic methods to maximize network lifetime in directional sensor networks with adjustable sensing ranges . . . . . 26--35 Farzaneh R. Armaghani and Iqbal Gondal and Joarder Kamruzzaman and David G. Green Sensor selection for tracking multiple groups of targets . . . . . . . . . . . 36--47 Congduc Pham Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: a comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillance . . . . . . . . . . . . . . 48--59 Haidar Safa and Marcel Karam and Bassam Moussa PHAODV: Power aware heterogeneous routing protocol for MANETs . . . . . . 60--71 Ning Liu and Xiaoping Li and Weiming Shen Multi-granularity resource virtualization and sharing strategies in cloud manufacturing . . . . . . . . . . 72--82 Tarek Khalifa and Atef Abdrabou and Khaled Bashir Shaban and Maazen Alsabaan and Kshirasagar Naik Transport layer performance analysis and optimization for smart metering infrastructure . . . . . . . . . . . . . 83--93 Jing Qin and Hongwei Duan and Huawei Zhao and Jiankun Hu A new Lagrange solution to the privacy-preserving general geometric intersection problem . . . . . . . . . . 94--99 Omessaad Hamdi and Mohamed Aymen Chalouf and Dramane Ouattara and Francine Krief eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues . . . . . 100--112 Vesal Hakami and Mehdi Dehghan Efficient broadcasting in slow fading wireless ad-hoc networks . . . . . . . . 113--123 Ing-Chau Chang and Eric Jui-Lin Lu and Shiuan-Yin Huang and Yi-Hui Chen An RDF-based P2P overlay network supporting range and wildcard queries 124--138 Kh Mahmudul Alam and Joarder Kamruzzaman and Gour Karmakar and Manzur Murshed Dynamic adjustment of sensing range for event coverage in wireless sensor networks . . . . . . . . . . . . . . . . 139--153 Seytkamal Medetov and Mohamed Bakhouya and Jaafar Gaber and Khalid Zinedine and Maxime Wack and Pascal Lorenz A decentralized approach for information dissemination in Vehicular Ad hoc Networks . . . . . . . . . . . . . . . . 154--165 Muhammad Zubair Farooqi and Salma Malik Tabassum and Mubashir Husain Rehmani and Yasir Saleem A survey on network coding: From traditional wireless networks to emerging cognitive radio networks . . . 166--181 Cüneyt Sevgi and Altan Koçyigit Optimal deployment in randomly deployed heterogeneous WSNs: a connected coverage approach . . . . . . . . . . . . . . . . 182--197 M. Mehdi Afsar and Mohammad-H. Tayarani-N Clustering in sensor networks: a literature survey . . . . . . . . . . . 198--226 Panayiotis G. Andreou and Demetrios Zeinalipour-Yazti and George S. Samaras and Panos K. Chrysanthis A network-aware framework for energy-efficient data acquisition in wireless sensor networks . . . . . . . . 227--240 David H. S. Lima and Andre L. L. Aquino and Heitor S. Ramos and Eliana S. Almeida and Joel J. P. C. Rodrigues OASys: an opportunistic and agile system to detect free on-street parking using intelligent boards embedded in surveillance cameras . . . . . . . . . . 241--249 Abderrahim Benslimane and Jiankun Hu and Xuemin (Sherman) Shen Special issue on ``Quality of service in wireless and mobile networking'' . . . . 250--251 Meng-Shiuan Pan and Ping-Lin Liu Low latency scheduling for convergecast in ZigBee tree-based wireless sensor networks . . . . . . . . . . . . . . . . 252--263 Neeraj Kumar and Sudhanshu Tyagi and Der-Jiunn Deng LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks 264--279 Adnan Shahid and Saleem Aslam and Hyung Seok Kim and Kyung-Geun Lee Distributed joint resource and power allocation in self-organized femtocell networks: a potential game approach . . 280--292 Miloud Bagaa and Mohamed Younis and Adlen Ksentini and Nadjib Badache Reliable multi-channel scheduling for timely dissemination of aggregated data in wireless sensor networks . . . . . . 293--304 Peijian Ju and Wei Song and A-Long Jin and Dizhi Zhou Performance analysis and enhancement for a cooperative wireless diversity network with spatially random mobile helpers . . 305--314 Ruichun Tang and Yuanzhen Yue and Xiangqian Ding and Yue Qiu Credibility-based cloud media resource allocation algorithm . . . . . . . . . . 315--321 Li Jun Zhang and Samuel Pierre An enhanced fast handover with seamless mobility support for next-generation wireless networks . . . . . . . . . . . 322--335 K. Ivesic and L. Skorin-Kapov and M. Matijasevic Cross-layer QoE-driven admission control and resource allocation for adaptive multimedia services in LTE . . . . . . . 336--351 Sonia Ben Rejeb and Nidal Nasser and Sami Tabbane A novel resource allocation scheme for LTE network in the presence of mobility 352--361 Nourch\`ene Bradai and Lamia Chaari Fourati and Lotfi Kamoun Investigation and performance analysis of MAC protocols for WBAN networks . . . 362--373 Jacques M. Bahi and Christophe Guyeux and Mourad Hakem and Abdallah Makhoul Epidemiological approach for data survivability in unattended wireless sensor networks . . . . . . . . . . . . 374--383 Zhi Liu and Jingyun Feng and Yusheng Ji and Yongbing Zhang EAF: Energy-aware adaptive free viewpoint video wireless transmission 384--394 Abderrezak Rachedi and Hakim Badis and Abderrahim Benslimane How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks . . . . . . 395--406 Tao Huang and Baoliu Ye and Song Guo and Sanglu Lu Delay minimization by exploring full-duplex capacity and relay-based cooperative scheduling in WLANs . . . . 407--417 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ali Moussaoui and Abdallah Boukeream A survey of routing protocols based on link-stability in mobile ad hoc networks 1--10 T. Daniel Wallace and Khalim Amjad Meerja and Abdallah Shami On-demand scheduling for concurrent multipath transfer using the stream control transmission protocol . . . . . 11--22 G. Campobello and O. Giordano and A. Segreto and S. Serrano Comparison of local lossless compression algorithms for Wireless Sensor Networks 23--31 Raed Alsaqour and Maha Abdelhaq and Rashid Saeed and Mueen Uddin and Ola Alsukour and Mohammed Al-Hubaishi and Tariq Alahdal Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic . . . . . . . . . . . 32--46 Muhammad Shiraz and Mehdi Sookhak and Abdullah Gani and Syed Adeel Ali Shah A Study on the Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing . . . . . . . . . 47--60 Anna Maria Vegni and Enrico Natalizio Forwarder smart selection protocol for limitation of broadcast storm problem 61--71 Xiaobo Ma and Junjie Zhang and Zhenhua Li and Jianfeng Li and Jing Tao and Xiaohong Guan and John C. S. Lui and Don Towsley Accurate DNS query characteristics estimation via active probing . . . . . 72--84 Jaime Garcia-Reinoso and Norberto Fernández and Ivan Vidal and Jesús Arias Fisteus Scalable data replication in content-centric networking based on alias names . . . . . . . . . . . . . . 85--98 Rafael Weingärtner and Gabriel Beims Bräscher and Carlos Becker Westphall Cloud resource management: a survey on forecasting and profiling models . . . . 99--106 Hela Mliki and Lamia Chaari and Lotfi Kamoun A comprehensive survey on Carrier Ethernet Congestion Management mechanism 107--130 Angela Sara Cacciapuoti and Marcello Caleffi and Luigi Paura and Md Arafatur Rahman Channel availability for mobile cognitive radio networks . . . . . . . . 131--136 Lutful Karim and N. Nasser and Q. H. Mahmoud and Alagan Anpalagan and T. E. Salti Range-free localization approach for M2M communication system using mobile anchor nodes . . . . . . . . . . . . . . . . . 137--146 Subir Halder and Sipra Das Bit Design of an Archimedes' spiral based node deployment scheme targeting enhancement of network lifetime in wireless sensor networks . . . . . . . . 147--167 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Massimo Vecchio and Roberto López-Valcarce Improving area coverage of wireless sensor networks via controllable mobile nodes: a greedy approach . . . . . . . . 1--13 Ruiying Li and Jingfu Wang and Haitao Liao and Ning Huang A new method for reliability allocation of avionics connected via an airborne network . . . . . . . . . . . . . . . . 14--21 Alejandro Ruiz-Rivera and Kwan-Wu Chin and Sieteng Soh A novel framework to mitigate the negative impacts of green techniques on BGP . . . . . . . . . . . . . . . . . . 22--34 Wei Li and Wei Zhang Coverage hole and boundary nodes detection in wireless sensor networks 35--43 Adnan Akhunzada and Mehdi Sookhak and Nor Badrul Anuar and Abdullah Gani and Ejaz Ahmed and Muhammad Shiraz and Steven Furnell and Amir Hayat and Muhammad Khurram Khan Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions . . . . . . . . . . . 44--57 Muhammad Ashad Kabir and Jun Han and Bonghee Hong Reader level filtering for efficient query processing in RFID middleware . . 58--70 Bin Liao and Jiong Yu and Tao Zhang and Guo Binglei and Sun Hua and Changtian Ying Energy-efficient algorithms for distributed storage system based on block storage structure reconfiguration 71--86 Chien-Fu Cheng and Kuo-Tang Tsai A recursive Byzantine-resilient protocol 87--98 Jieyao Liu and Ejaz Ahmed and Muhammad Shiraz and Abdullah Gani and Rajkumar Buyya and Ahsan Qureshi Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions . . . . . . . . . 99--117 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xianfu Meng and Yanli Wang and Yue Gong Perspective of space and time based replica population organizing strategy in unstructured peer-to-peer networks 1--14 Jia Hao Kong and Li-Minn Ang and Kah Phooi Seng A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments . . . 15--50 Peiyan Yuan and Ping Liu Data fusion prolongs the lifetime of mobile sensing networks . . . . . . . . 51--59 Faiza Nawaz and Varun Jeoti NFRA-C, neighbor friendly reader to reader anti-collision protocol with counters for dense reader environments 60--67 Xiaonan Wang and Deguang Le and Yufeng Yao and Conghua Xie Location-based mobility support for 6LoWPAN wireless sensor networks . . . . 68--77 Ying Zhang and Houkuan Huang and Hui He and Jing Teng and Zhuxiao Wang Efficient distributed semantic based data and service unified discovery with one-dimensional semantic space . . . . . 78--87 Amir Masoud Rahmani and Zeinab Fadaie and Anthony T. Chronopoulos Data placement using Dewey Encoding in a hierarchical data grid . . . . . . . . . 88--98 Hendrik Moens and Filip De Turck Shared resource network-aware impact determination algorithms for service workflow deployment with partial cloud offloading . . . . . . . . . . . . . . . 99--111 Qazi Mamoon Ashraf and Mohamed Hadi Habaebi Autonomic schemes for threat mitigation in Internet of Things . . . . . . . . . 112--127 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Babak Daghighi and Miss Laiha Mat Kiah and Shahaboddin Shamshirband and Muhammad Habib Ur Rehman Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges . . . . . . . 1--14 Yasir Saleem and Mubashir Husain Rehmani and Sherali Zeadally Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges . . . . . . . 15--31 Laisen Nie and Dingde Jiang and Lei Guo A convex optimization-based traffic matrix estimation approach in IP-over-WDM backbone networks . . . . . 32--38 Lingfang Zeng and Bharadwaj Veeravalli and Albert Y. Zomaya An integrated task computation and data management scheduling strategy for workflow applications in cloud environments . . . . . . . . . . . . . . 39--48 Lorena González-Manzano and Agustin Orfila An efficient confidentiality-preserving Proof of Ownership for deduplication . . 49--59 Jonathan Loo and Mahdi Aiash Special issue on information-centric network architecture, protocols, algorithms and applications . . . . . . 60--63 Jonathan Loo and Mahdi Aiash Challenges and solutions for secure information centric networks: a case study of the NetInf architecture . . . . 64--72 Mahdi Aiash and Jonathan Loo An integrated authentication and authorization approach for the network of information architecture . . . . . . 73--79 Mingwei Xu and Zhongxing Ming and Chunmei Xia and Jia Ji and Dan Li and Dan Wang SIONA: a Service and Information Oriented Network Architecture . . . . . 80--91 Charilaos Stais and George Xylomenos and Alexios Voulimeneas A reliable multicast transport protocol for information-centric networks . . . . 92--100 Dabin Kim and Sung-Won Lee and Young-Bae Ko and Jae-Hoon Kim Cache capacity-aware content centric networking under flash crowds . . . . . 101--113 Paulo Mendes Combining data naming and context awareness for pervasive networks . . . . 114--125 Bander A. Alzahrani and Martin J. Reed and Janne Riihijärvi and Vassilios G. Vassilakis Scalability of information centric networking using mediated topology management . . . . . . . . . . . . . . . 126--133 Xiuquan Qiao and Guoshun Nan and Yue Peng and Lei Guo and Jingwen Chen and Yunlei Sun and Junliang Chen NDNBrowser: an extended web browser for named data networking . . . . . . . . . 134--147 Marica Amadeo and Claudia Campolo and Antonella Molinaro Forwarding strategies in named data wireless ad hoc networks: Design and evaluation . . . . . . . . . . . . . . . 148--158 S. Eum and Y. Shoji and M. Murata and N. Nishinaga Design and implementation of ICN-enabled IEEE 802.11 access points as nano data centers . . . . . . . . . . . . . . . . 159--167 Lingwei Zhang and Yuhui Deng and Weiheng Zhu and Jipeng Zhou and Frank Wang Skewly replicating hot data to construct a power-efficient storage cluster . . . 168--179 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jack Fernando Bravo-Torres and Martín López-Nores and Yolanda Blanco-Fernández and José Juan Pazos-Arias and Manuel Ramos-Cabrer and Alberto Gil-Solla An improved virtualization layer to support distribution of multimedia contents in pervasive social applications . . . . . . . . . . . . . . 1--17 Víctor Berrocal-Plaza and Miguel A. Vega-Rodríguez and Juan M. Sánchez-Pérez Optimizing the mobility management task in networks of four world capital cities 18--28 M. Sajid Mushtaq and Scott Fowler and Abdelhamid Mellouk and Brice Augustin QoE/QoS-aware LTE downlink scheduler for VoIP with power saving . . . . . . . . . 29--46 Kun Huang and Gaogang Xie and Yanbiao Li and Dafang Zhang Memory-efficient IP lookup using trie merging for scalable virtual routers . . 47--58 Yu Liu and Bin Guo and Chi Zhou and Yu Cheng Network-coded cooperative information recovery in cellular/802.11 mobile Networks . . . . . . . . . . . . . . . . 59--67 Linfeng Liu and Ningshen Zhang and Ye Liu Topology control models and solutions for signal irregularity in mobile underwater wireless sensor networks . . 68--90 Rajesh Anbazhagan and Nakkeeran Rangaswamy Investigations on enhanced power saving mechanism for IEEE 802.16m network with heterogeneous traffic . . . . . . . . . 91--101 Behnam Dezfouli and Marjan Radi and Shukor Abd Razak and Tan Hwee-Pink and Kamalrulnizam Abu Bakar Modeling low-power wireless communications . . . . . . . . . . . . . 102--126 Mohammed Atiquzzaman Editorial . . . . . . . . . . . . . . . 127--129 Cüneyt Sevgi and Altan Koçyigit Corrigendum to ``Optimal deployment in randomly deployed heterogeneous WSNs: a connected coverage approach'' [J. Netw. Comput. Appl. \bf 46, (2014), 182--197] 130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Athanasios V. Vasilakos and Zhe Li and Gwendal Simon and Wei You Information centric network: Research challenges and opportunities . . . . . . 1--10 Raja Wasim Ahmad and Abdullah Gani and Siti Hafizah Ab. Hamid and Muhammad Shiraz and Abdullah Yousafzai and Feng Xia A survey on virtual machine migration and server consolidation frameworks for cloud data centers . . . . . . . . . . . 11--25 Ying-Dar Lin and Minh-Tuan Thai and Chih-Chiang Wang and Yuan-Cheng Lai Two-tier project and job scheduling for SaaS cloud service providers . . . . . . 26--36 Elizabeth A. Thompson and Charles McIntosh and James Isaacs and Eric Harmison and Ross Sneary Robot communication link using 802.11n or 900 MHz OFDM . . . . . . . . . . . . 37--51 Ejaz Ahmed and Abdullah Gani and Mehdi Sookhak and Siti Hafizah Ab Hamid and Feng Xia Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges . . . . . . . . . . . . 52--68 Guodong Sun and Lin Zhao and Zhibo Chen and Guofu Qiao Effective link interference model in topology control of wireless ad hoc and sensor networks . . . . . . . . . . . . 69--78 Hao Ji and Lei Xie and Chuyu Wang and Yafeng Yin and Sanglu Lu CrowdSensing: a crowd-sourcing based indoor navigation using RFID-based delay tolerant network . . . . . . . . . . . . 79--89 Ming Tao and Shuqiang Huang and Yang Li and Min Yan and Yuyu Zhou SA-PSO based optimizing reader deployment in large-scale RFID Systems 90--100 Ali Ghaffari Congestion control mechanisms in wireless sensor networks: a survey . . . 101--115 Riham S. Y. Elhabyan and Mustapha C. E. Yagoub Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network . . . . . . . . 116--128 Tien Van Do and Nam H. Do and Ádám Horváth and Jinting Wang Modelling opportunistic spectrum renting in mobile cellular networks . . . . . . 129--138 Wei Jiang and Yue Ma and Xia Zhang and Xupeng Wang and Zili Shao Adaptive security management of real-time storage applications over NAND based storage systems . . . . . . . . . 139--153 Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan and Rajkumar Buyya and Samee U. Khan Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges . . . . . . . . . . 154--172 Athar Ali Khan and Mubashir Husain Rehmani and Yasir Saleem Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions . . . . . 173--190 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Ebrahimzadeh and Akbar Ghaffarpour Rahbar and Behrooz Alizadeh QoS aware green routing and wavelength assignment in core WDM networks . . . . 1--13 Engin Arslan and Murat Yuksel and Mehmet Hadi Gunes Training network administrators in a game-like environment . . . . . . . . . 14--23 Sérgio Figueiredo and Seil Jeon and Diogo Gomes and Rui L. Aguiar D3M: Multicast listener mobility support mechanisms over distributed mobility anchoring architectures . . . . . . . . 24--38 Sudeep Tanwar and Neeraj Kumar and Joel J. P. C. Rodrigues A systematic review on heterogeneous routing protocols for wireless sensor network . . . . . . . . . . . . . . . . 39--56 Yong Wang and Yun Xia and Jie Hou and Shi-meng Gao and Xiao Nie and Qi Wang A fast privacy-preserving framework for continuous location-based queries in road networks . . . . . . . . . . . . . 57--73 S. Arunkumar and M. Srivatsa and M. Rajarajan A review paper on preserving privacy in mobile environments . . . . . . . . . . 74--90 Abdelali Boushaba and Adil Benabbou and Rachid Benabbou and Azeddine Zahi and Mohammed Oumsis Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs . . . . . . . . 91--102 Jingyuan Wang and Jiangtao Wen and Chao Li and Zhang Xiong and Yuxing Han DC-Vegas: a delay-based TCP congestion control algorithm for datacenter applications . . . . . . . . . . . . . . 103--114 Valentina Caputi and Antonio Garrido Student-oriented planning of e-learning contents for Moodle . . . . . . . . . . 115--127 Chao-Liang Liu and Cheng-Jung Tsai and Ting-Yi Chang and Wang-Jui Tsai and Po-Kai Zhong Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone . . . . . . . . . . . . . . 128--139 Zhongbao Zhang and Sen Su and Yikai Lin and Xiang Cheng and Kai Shuang and Peng Xu Adaptive multi-objective artificial immune system based virtual network embedding . . . . . . . . . . . . . . . 140--155 Zhiting Lin and XiuLong Wu Analyzing and modeling mobility for infrastructure-less communication . . . 156--163 Sara Modarres Razavi and Di Yuan and Fredrik Gunnarsson and Johan Moe On dynamic signaling congestion mitigation by overlapping tracking area lists . . . . . . . . . . . . . . . . . 164--172 Xiumin Wang and Chau Yuen and Xiaoming Chen and Naveed Ul Hassan and Yiming Ouyang Cost-aware demand scheduling for delay tolerant applications . . . . . . . . . 173--182 Mario Collotta FLBA: a fuzzy algorithm for load balancing in IEEE 802.11 networks . . . 183--192 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Imad Abdeljaouad and Ahmed Karmouch Monitoring IPTV quality of experience in overlay networks using utility functions 1--10 Yujie Liu and Yong Li and Yue Wang and Jian Yuan Optimal scheduling for multi-flow update in Software-Defined Networks . . . . . . 11--19 Saman Homayounnejad and Alireza Bagheri An efficient distributed max-flow algorithm for Wireless Sensor Networks 20--32 Tarek AlSkaif and Manel Guerrero Zapata and Boris Bellalta Game theory for energy efficiency in Wireless Sensor Networks: Latest trends 33--61 Leovigildo Sánchez-Casado and Gabriel Maciá-Fernández and Pedro García-Teodoro and Nils Aschenbruck Identification of contamination zones for sinkhole detection in MANETs . . . . 62--77 Maleeha Najam and Usman Younis and Raihan ur Rasool Speculative parallel pattern matching using stride-$k$ DFA for deep packet inspection . . . . . . . . . . . . . . . 78--87 Normalia Samian and Zuriati Ahmad Zukarnain and Winston K. G. Seah and Azizol Abdullah and Zurina Mohd Hanapi Cooperation stimulation mechanisms for wireless multihop networks: a survey . . 88--106 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Apostolos Malatras State-of-the-art survey on P2P overlay networks in pervasive computing environments . . . . . . . . . . . . . . 1--23 Aqsa Malik and Junaid Qadir and Basharat Ahmad and Kok-Lim Alvin Yau and Ubaid Ullah QoS in IEEE 802.11-based wireless networks: a contemporary review . . . . 24--46 Yaguang Lin and Xiaoming Wang and Lichen Zhang and Peng Li and Dan Zhang and Sen Liu The impact of node velocity diversity on mobile opportunistic network performance 47--58 Yingjie Wang and Guisheng Yin and Zhipeng Cai and Yuxin Dong and Hongbin Dong A trust-based probabilistic recommendation model for social networks 59--67 Diego F. Ramírez and Sandra Céspedes Routing in Neighborhood Area Networks: a survey in the context of AMI communications . . . . . . . . . . . . . 68--80 S. Liao and J. Sun and Y. Chen and Y. Wang and P. Zhang Distributed power control for wireless networks via the alternating direction method of multipliers . . . . . . . . . 81--88 Alireza Shameli-Sendi and Michel Dagenais ORCEF: Online response cost evaluation framework for intrusion response system 89--107 Zia-ur Rehman and Omar Khadeer Hussain and Farookh Khadeer Hussain User-side cloud service management: State-of-the-art and future directions 108--122 Shazana Md Zin and Nor Badrul Anuar and Miss Laiha Mat Kiah and Ismail Ahmedy Survey of secure multipath routing protocols for WSNs . . . . . . . . . . . 123--153 Kai Wang and Jun Li FREME: a pattern partition based engine for fast and scalable regular expression matching in practice . . . . . . . . . . 154--169 Dingqi Yang and Daqing Zhang and Longbiao Chen and Bingqing Qu NationTelescope: Monitoring and visualizing large-scale collective behavior in LBSNs . . . . . . . . . . . 170--180 Mohamed A. Alrshah and Mohamed Othman and Borhanuddin Ali and Zurina Mohd Hanapi Agile-SD: a Linux-based TCP congestion control algorithm for supporting high-speed and short-distance networks 181--190 Katja Cetinski and Matjaz B. Juric AME-WPC: Advanced model for efficient workload prediction in the cloud . . . . 191--201 Sudip Misra and Samaresh Bera and Tamoghna Ojha and Liang Zhou ENTICE: Agent-based energy trading with incomplete information in the smart grid 202--212 Vlasios Kasapakis and Damianos Gavalas Pervasive gaming: Status, trends and design principles . . . . . . . . . . . 213--236 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Karami ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network 1--18 Zhaolong Ning and Qingyang Song and Lei Guo and Xiangjie Kong A novel adaptive spectrum allocation scheme for multi-channel multi-radio wireless mesh networks . . . . . . . . . 19--27 Minhaj Ahmad Khan A survey of computation offloading strategies for performance improvement of applications running on mobile devices . . . . . . . . . . . . . . . . 28--40 Sergio Ricciardi and Francesco Palmieri and Aniello Castiglione and Davide Careglio Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks . . . . . 41--47 Ibrahim Abdullahi and Suki Arif and Suhaidi Hassan Survey on caching approaches in Information Centric Networking . . . . . 48--59 T. Hamrouni and C. Hamdeni and F. Ben Charrada Impact of the distribution quality of file replicas on replication strategies 60--76 M. S. S. Khan and Anup Kumar and Bin Xie and Prasanna K. Sahoo Network tomography application in mobile ad-hoc network using stitching algorithm 77--87 Giannis Haralabopoulos and Ioannis Anagnostopoulos and Sherali Zeadally Lifespan and propagation of information in On-line Social Networks: a case study based on Reddit . . . . . . . . . . . . 88--100 Esa Kerttula A novel federated strong mobile signature service --- the Finnish case 101--114 Maria Carla Calzarossa and Daniele Tessera Modeling and predicting temporal patterns of web content changes . . . . 115--123 Michael Till Beck and Andreas Fischer and Juan Felipe Botero and Claudia Linnhoff-Popien and Hermann de Meer Distributed and scalable embedding of virtual networks . . . . . . . . . . . . 124--136 Mohd Izuan Hafez Ninggal and Jemal H. Abawajy Utility-aware social network graph anonymization . . . . . . . . . . . . . 137--148 Sheng-Shih Wang and Chun-Chih Li and Hsieh-Wei Lin and Kuei-Ping Shih A passive self-configuration MAC protocol for supporting network management in IEEE 802.11-based multi-hop mobile ad hoc networks . . . . 149--157 Chi Chen and Xiaojie Zhu and Peisong Shen and Jing Yu and Hong Zou and Jiankun Hu SOLS: a scheme for outsourced location based service . . . . . . . . . . . . . 158--165 Keyvan RahimiZadeh and Morteza AnaLoui and Peyman Kabiri and Bahman Javadi Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads . . . . . . . . 166--187 Veerabhadra R. Chandakanna and Valli K. Vatsavayi A sliding window based Self-Learning and Adaptive Load Balancer . . . . . . . . . 188--205 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and Abderrahim Benslimane and Kamal D. Singh Dynamic anchor points selection for mobility management in Software Defined Networks . . . . . . . . . . . . . . . . 1--11 Erdun Zhao and Liansheng Tan A PCA based optimization approach for IP traffic matrix estimation . . . . . . . 12--20 Younghoon Kim and Ikjun Yeom and Jun Bi and Yusung Kim Scalable and efficient file sharing in information-centric networking . . . . . 21--32 Gürkan Gür Energy-aware cache management at the wireless network edge for information-centric operation . . . . . 33--42 Qin Xu and Fan Li and Jinsheng Sun and Moshe Zukerman A new TCP/AQM system analysis . . . . . 43--60 Shin-Jer Yang and Yi-Ru Chen Design adaptive task allocation scheduler to improve MapReduce performance in heterogeneous clouds . . 61--70 Rup Kumar Deka and Kausthav Pratim Kalita and D. K. Bhattacharya and Jugal K. Kalita Network defense: Approach's, methods and techniques . . . . . . . . . . . . . . . 71--84 Suchetana Chakraborty and Sandip Chakraborty and Sukumar Nandi and Sushanta Karmakar Fault resilience in sensor networks: Distributed node-disjoint multi-path multi-sink forwarding . . . . . . . . . 85--101 Maristella Ribas and C. G. Furtado and José Neuman de Souza and Giovanni Cordeiro Barroso and Antão Moura and Alberto S. Lima and Flávio R. C. Sousa A Petri net-based decision-making framework for assessing cloud services adoption: the use of spot instances for cost reduction . . . . . . . . . . . . . 102--118 Wei Li and Jorge Portilla and Félix Moreno and Guixuan Liang and Teresa Riesgo Multiple feature points representation in target localization of wireless visual sensor networks . . . . . . . . . 119--128 Jiaoyan Chen and Bang Wang and Wenyu Liu Constructing perimeter barrier coverage with bistatic radar sensors . . . . . . 129--141 Amir Hossein Mohajerzadeh and Mohammad Hossein Yaghmaee and Afsane Zahmatkesh Efficient data collecting and target parameter estimation in wireless sensor networks . . . . . . . . . . . . . . . . 142--155 Yuhwa Suh and Kiyoung Kim and Aran Kim and Yongtae Shin A study on impact of wired access networks for green Internet . . . . . . 156--168 Mohammad Khanjary and Masoud Sabaei and Mohammad Reza Meybodi Critical density for coverage and connectivity in two-dimensional fixed-orientation directional sensor networks using continuum percolation . . 169--181 Dingde Jiang and Zhengzheng Xu and Wenqin Wang and Yuanting Wang and Yang Han A collaborative multi-hop routing algorithm for maximum achievable rate 182--191 Haythem Bany Salameh Spread spectrum-based coordination design for spectrum-agile wireless ad hoc networks . . . . . . . . . . . . . . 192--201 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhe Guo and Zheng Yan A Weighted Semi-Distributed Routing Algorithm for LEO satellite networks . . 1--11 Francesco Carrabs and Raffaele Cerulli and Ciriaco D'Ambrosio and Andrea Raiconi A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints . . . . . . . . . . . . . . 12--22 Osama M. Hussain Rehman and Hadj Bourdoucen and Mohamed Ould-Khaoua Forward link quality estimation in VANETs for sender-oriented alert messages broadcast . . . . . . . . . . . 23--41 Raja Wasim Ahmad and Abdullah Gani and Siti Hafizah Ab. Hamid and Feng Xia and Muhammad Shiraz A Review on mobile application energy profiling: Taxonomy, state-of-the-art, and open research issues . . . . . . . . 42--59 B. Coll-Perales and J. Gozalvez and M. Sepulcre Empirical models of the communications performance of Multi-hop Cellular Networks using D2D . . . . . . . . . . . 60--72 Bassam J. Mohd and Thaier Hayajneh and Athanasios V. Vasilakos A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues . . . . . . . . . 73--93 Jianwei Niu and Danning Wang and Mohammed Atiquzzaman Copy limited flooding over opportunistic networks . . . . . . . . . . . . . . . . 94--107 Fatima Lamia Haddi and Mahfoud Bencha\"\iba A survey of incentive mechanisms in static and mobile P2P systems . . . . . 108--118 Ihab Ahmed Najm and Mahamod Ismail and Jaime Lloret and Kayhan Zrar Ghafoor and B. B. Zaidan and Abd Al-razak Tareq Rahem Improvement of SCTP congestion control in the LTE-A network . . . . . . . . . . 119--129 Amjad Hajjar and Jawad Khalife and Jesús Díaz-Verdejo Network traffic application identification based on message size analysis . . . . . . . . . . . . . . . . 130--143 Sheharbano Khattak and Zaafar Ahmed and Affan A. Syed and Syed Ali Khayam BotFlex: a community-driven tool for botnet detection . . . . . . . . . . . . 144--154 Guijuan Wang and Jiguo Yu and Dongxiao Yu and Haitao Yu and Li Feng and Pan liu DS--MAC: an energy efficient demand sleep MAC protocol with low latency for wireless sensor networks . . . . . . . . 155--164 Alireza Shameli-Sendi and Makan Pourzandi and Mohamed Fekih-Ahmed and Mohamed Cheriet Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing . . . . . . . . . . . . . . . 165--179 Fang-Yie Leu and Chin-Yu Liu and Jung-Chun Liu and Fuu-Cheng Jiang and Heru Susanto S-PMIPv6: an intra-LMA model for IPv6 mobility . . . . . . . . . . . . . . . . 180--191 Jaime Lloret and Kayhan Zrar Ghafoor and Danda B. Rawat and Youssef Nasser Green network protocols and algorithms 192--193 Ruiqi Ding and Cristina Hava Muntean and Gabriel-Miro Muntean Energy-efficient device-differentiated cooperative adaptive multimedia delivery solution in wireless networks . . . . . 194--207 Zuhal Can and Murat Demirbas Smartphone-based data collection from wireless sensor networks in an urban environment . . . . . . . . . . . . . . 208--216 Miguel Rodríguez-Pérez and Sergio Herrería-Alonso and Manuel Fernández-Veiga and Cándido López-García An ant colonization routing algorithm to minimize network power consumption . . . 217--226 Mahmoud Sami and Nor Kamariah Noordin and Fazirulhysiam Hashim and Shamala Subramaniam and Ayyoub Akbari-Moghanjoughi An Energy-Aware Cross-Layer Cooperative MAC Protocol for Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . 227--240 Chengming Li and Wenjing Liu and Lei Wang and Mingchu Li and Koji Okamura Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking . . . . . . . 241--254 Seyed Iman PourEmami and Bahador Bakhshi On the trade-off between power-efficiency and blocking probability in fault-tolerant WDM networks . . . . . . . . . . . . . . . . 255--266 Anas Daghistani and Abderrahman Ben Khalifa and Ahmad Showail and Basem Shihada Green partial packet recovery in wireless sensor networks . . . . . . . . 267--279 Chih-Heng Ke and Chong-Yi Yang and Jiann-Liang Chen and Kayhan Zrar Ghafoor and Jaime Lloret Frame-based mapping mechanism for energy-efficient MPEG-4 video transmission over IEEE 802.11e networks with better quality of delivery . . . . 280--286 M. Bakhouya and J. Gaber and P. Lorenz Energy evaluation of AID protocol in Mobile Ad Hoc Networks . . . . . . . . . 287--293 Mohammad Reza Jabbarpour and Rafidah Md Noor and Rashid Hafeez Khokhar Green vehicle traffic routing system using ant-based algorithm . . . . . . . 294--308 Muhammad Faheem and Muhammad Zahid Abbas and Gurkan Tuna and Vehbi Cagri Gungor EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks . . . 309--326 Gangyong Jia and Guangjie Han and Jinfang Jiang and Joel J. P. C. Rodrigues PARS: a scheduling of periodically active rank to optimize power efficiency for main memory . . . . . . . . . . . . 327--336 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhang Bing Zhou and Wendong Xiao and Jucheng Yang and Faming Gong Special issue on green networking, computing, and software systems . . . . 1--3 Jinfang Jiang and Guangjie Han and Hui Guo and Lei Shu and Joel J. P. C. Rodrigues Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks . . 4--13 Qing Zhao and Congcong Xiong and Ce Yu and Chuanlei Zhang and Xi Zhao A new energy-aware task scheduling method for data-intensive applications in the cloud . . . . . . . . . . . . . . 14--27 Xiao Xue and Shufang Wang and Baoyun Lu Manufacturing service composition method based on networked collaboration mode 28--38 Yanwen Wang and Hainan Chen and Xiaoling Wu and Lei Shu An energy-efficient SDN based sleep scheduling algorithm for WSNs . . . . . 39--45 Keke Gai and Meikang Qiu and Hui Zhao and Lixin Tao and Ziliang Zong Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing . . . . . . . . . . . . . . . 46--54 Chao Tong and Yu Lian and Jianwei Niu and Zhongyu Xie and Yang Zhang A novel green algorithm for sampling complex networks . . . . . . . . . . . . 55--62 Yonghua Xiong and Shaoyun Wan and Jinhua She and Min Wu and Yong He and Keyuan Jiang An energy-optimization-based method of task scheduling for a cloud video surveillance center . . . . . . . . . . 63--73 Ana C. Riekstin and Guilherme C. Januário and Bruno B. Rodrigues and Viviane T. Nascimento and Tereza C. M. B. Carvalho and Catalin Meirosu Orchestration of energy efficiency capabilities in networks . . . . . . . . 74--87 Weidong Fang and Chuanlei Zhang and Zhidong Shi and Qing Zhao and Lianhai Shan BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks . . . . . . . . . . . . . . . . 88--94 Martina Marjanovi\'c and Lea Skorin-Kapov and Kresimir Pripuzi\'c and Aleksandar Antoni\'c and Ivana Podnar Zarko Energy-aware and quality-driven sensor management for green mobile crowd sensing . . . . . . . . . . . . . . . . 95--108 Teng Long and Wenhui Zhang Termination analysis with recursive calling graphs . . . . . . . . . . . . . 109--116 Chen Xiao and Lifeng Wang and Mengjiao Zhu and Wendong Wang A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft . . . . . . . . . . . . . . . . 117--125 Liping Zhang and Shanyu Tang and Shaohui Zhu An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks . . . . . . . . . . . . . 126--133 Piotr Cholda and Piotr Jaglarz Optimization/simulation-based risk mitigation in resilient green communication networks . . . . . . . . . 134--157 Mingfu Li and Jingping Bi and Zhongcheng Li Improving consolidation of virtual machine based on virtual switching overhead estimation . . . . . . . . . . 158--167 Karn Yongsiriwit and Nour Assy and Walid Gaaloul A semantic framework for configurable business process as a service in the cloud . . . . . . . . . . . . . . . . . 168--184 Debdeep Paul and Wen-De Zhong and Sanjay K. Bose Energy efficiency aware load distribution and electricity cost volatility control for cloud service providers . . . . . . . . . . . . . . . 185--197 Zheli Liu and Xiaofeng Chen and Jun Yang and Chunfu Jia and Ilsun You New order preserving encryption model for outsourced databases in cloud environments . . . . . . . . . . . . . . 198--207 Antonio Celesti and Maria Fazio and Massimo Villari and Antonio Puliafito Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems . . . . . . 208--218 Yunchuan Sun and Cheng Lu and Rongfang Bie and Junsheng Zhang Semantic relation computing theory and its application . . . . . . . . . . . . 219--229 Miguel Castro and Antonio J. Jara and Antonio F. Skarmeta Enabling end-to-end CoAP-based communications for the Web of Things . . 230--236 Juan López-de-Armentia and Diego Casado-Mansilla and Diego López-de-Ipiña Making social networks a means to save energy . . . . . . . . . . . . . . . . . 237--246 Ming Yu and Nirwan Ansari Smart grid communications: Modeling and validation . . . . . . . . . . . . . . . 247--249 D. A. Sbordone and L. Martirano and M. C. Falvo and L. Chiavaroli and B. Di Pietra and I. Bertini and A. Genovese Reactive power control for an energy storage system: a real implementation in a Micro-Grid . . . . . . . . . . . . . . 250--263 Ziyuan Cai and Ming Yu and Michael Steurer and Hui Li and Yizhou Dong A network model for the real-time communications of a smart grid prototype 264--273 Dhananjay Bhor and Kavinkadhirselvan Angappan and Krishna M. Sivalingam Network and power-grid co-simulation framework for Smart Grid wide-area monitoring networks . . . . . . . . . . 274--284 Martin Wolkerstorfer and Bernhard Schweighofer and Hannes Wegleiter and Driton Statovci and Herbert Schwaiger and Walter Lackner Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids . . . . . . . . . . . 285--300 Cristina Alcaraz and Javier Lopez and Stephen Wolthusen Policy enforcement system for secure interoperable control in distributed Smart Grid systems . . . . . . . . . . . 301--314 Yuan Zhang and Navid Rahbari-Asr and Mo-Yuen Chow A robust distributed system incremental cost estimation algorithm for smart grid economic dispatch with communications information losses . . . . . . . . . . . 315--324 Ping Yi and Ting Zhu and Qingquan Zhang and Yue Wu and Li Pan Puppet attack: a denial of service attack in advanced metering infrastructure network . . . . . . . . . 325--332 Mungyu Bae and Kangho Kim and Hwangnam Kim Preserving privacy and efficiency in data communication and aggregation for AMI network . . . . . . . . . . . . . . 333--344 Raphael Amoah and Seyit Camtepe and Ernest Foo Formal modelling and analysis of DNP3 secure authentication . . . . . . . . . 345--360 Jemal H. Abawajy and Albert Y. Zomaya and Ivan Stojmenovic Network computing and applications for Big Data analytics . . . . . . . . . . . 361 Wei Xu and Jianshan Sun and Jian Ma and Wei Du A personalized information recommendation system for R&D project opportunity finding in big data contexts 362--369 Amineh Amini and Hadi Saboohi and Tutut Herawan and Teh Ying Wah MuDi-Stream: a multi density clustering algorithm for evolving data stream . . . 370--385 R. S. Villaça and R. Pasquini and L. B. de Paula and M. F. Magalhães HCube: Routing and similarity search in Data Centers . . . . . . . . . . . . . . 386--398 Khaleel Mershad and Hassan Artail and Mazen Saghir and Hazem Hajj and Mariette Awad A mathematical model to analyze the utilization of a cloud datacenter middleware . . . . . . . . . . . . . . . 399--415 Maumita Bhattacharya and Rafiqul Islam and Jemal Abawajy Evolutionary optimization: a big data perspective . . . . . . . . . . . . . . 416--426 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Barbara Carminati and Elena Ferrari and Ngoc Hong Tran Trustworthy and effective person-to-person payments over multi-hop MANETs . . . . . . . . . . . . . . . . . 1--18 Mohiuddin Ahmed and Abdun Naser Mahmood and Jiankun Hu A survey of network anomaly detection techniques . . . . . . . . . . . . . . . 19--31 Martin Garriga and Cristian Mateos and Andres Flores and Alejandra Cechich and Alejandro Zunino RESTful service composition at a glance: a survey . . . . . . . . . . . . . . . . 32--53 Mina Nabi and Maria Toeroe and Ferhat Khendek Availability in the cloud: State of the art . . . . . . . . . . . . . . . . . . 54--67 Hazim Jarrah and Nurul I. Sarkar and Jairo Gutierrez Comparison-based system-level fault diagnosis protocols for mobile ad-hoc networks: a survey . . . . . . . . . . . 68--81 Subir Halder and Amrita Ghosal A survey on mobility-assisted localization techniques in wireless sensor networks . . . . . . . . . . . . 82--94 Victor Prokhorenko and Kim-Kwang Raymond Choo and Helen Ashman Web application protection techniques: a taxonomy . . . . . . . . . . . . . . . . 95--112 Jose Moura and David Hutchison Review and analysis of networking challenges in cloud computing . . . . . 113--129
Pritish Vijayanand Ghate and Hemanta Kumar Pati Collaborative distributed communication in heterogeneous environments: a comprehensive survey . . . . . . . . . . 1--20 Alekha Kumar Mishra and Ashok Kumar Turuk A comparative analysis of node replica detection schemes in wireless sensor networks . . . . . . . . . . . . . . . . 21--32 Xiaonan Wang and Hongbin Chen and Deguang Le A novel IPv6 address configuration for a 6LoWPAN-based WBAN . . . . . . . . . . . 33--45 Petro P. Ernest and Olabisi E. Falowo and H. Anthony Chan Design and performance evaluation of distributed mobility management schemes for network mobility . . . . . . . . . . 46--58 Mojtaba Alizadeh and Saeid Abolfazli and Mazdak Zamani and Sabariah Baharun and Kouichi Sakurai Authentication in mobile cloud computing: a survey . . . . . . . . . . 59--80 Mehdi Nazari Cheraghlou and Ahmad Khadem-Zadeh and Majid Haghparast A survey of fault tolerance architecture in cloud computing . . . . . . . . . . . 81--92 Yu Xiang and Zhaoguang Xuan and Meng Tang and Jun Zhang and Ming Sun $3$D space detection and coverage of wireless sensor network based on spatial correlation . . . . . . . . . . . . . . 93--101 Cuicui Lv and Qiang Wang and Wenjie Yan and Yi Shen Energy-balanced compressive data gathering in Wireless Sensor Networks 102--114 Omar Cheikhrouhou Secure Group Communication in Wireless Sensor Networks: a survey . . . . . . . 115--132 Shruti Lall and B. T. J. Maharaj and P. A. Jansen van Vuuren Null-frequency jamming of a proactive routing protocol in wireless mesh networks . . . . . . . . . . . . . . . . 133--141 Atslands R. Rocha and Flávia C. Delicato and Luci Pirmez and Danielo G. Gomes and José Neuman de Souza A fully-decentralized semantic mechanism for autonomous wireless sensor nodes . . 142--160 Krishan Kumar and Arun Prakash and Rajeev Tripathi Spectrum handoff in cognitive radio networks: a classification and comprehensive survey . . . . . . . . . . 161--188 Shun-Neng Yang and Shu-Wei Ho and Yi-Bing Lin and Chai-Hien Gan A multi-RAT bandwidth aggregation mechanism with software-defined networking . . . . . . . . . . . . . . . 189--198 Adnan Akhunzada and Abdullah Gani and Nor Badrul Anuar and Ahmed Abdelaziz and Muhammad Khurram Khan and Amir Hayat and Samee U. Khan Secure and dependable software defined networks . . . . . . . . . . . . . . . . 199--221 Tao Zhang and Jianxing Wang and Jiawei Huang and Yi Huang and Jianer Chen and Yi Pan Adaptive marking threshold method for delay-sensitive TCP in data center network . . . . . . . . . . . . . . . . 222--234 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Prosanta Gope and Tzonelih Hwang An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks . . . . . . . . . . . 1--8 Soo-Yeon Ji and Bong-Keun Jeong and Seonho Choi and Dong Hyun Jeong A multi-level intrusion detection method for abnormal network behaviors . . . . . 9--17 Usman Shaukat and Ejaz Ahmed and Zahid Anwar and Feng Xia Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges . . . 18--40 Athul Prasad and Andreas Maeder and Konstantinos Samdanis and Andreas Kunz and Genadi Velev Enabling group communication for public safety in LTE-Advanced networks . . . . 41--52 Zakira Inayat and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Shahid Anwar Intrusion response systems: Foundations, design, and challenges . . . . . . . . . 53--74 Heena Rathore and Venkataramana Badarla and George K. J. Sociopsychological trust model for Wireless Sensor Networks . . . . . . . . 75--87 Feng Tian and Kuo-Ming Chao and Zuren Feng and Keyi Xing and Nazaraf Shah Using a wireless visual sensor network to harmonically navigate multiple low-cost wheelchairs in an indoor environment . . . . . . . . . . . . . . 88--99 Peiyan Yuan and Ping Liu and Shaojie Tang RIM: Relative-importance based data forwarding in people-centric networks 100--111 Hui Xia and Jia Yu and Cheng-liang Tian and Zhen-kuan Pan and Edwin Sha Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks . . . . . . . . . . . . . . . . 112--127 Chengwen Luo and Hande Hong and Long Cheng and Mun Choon Chan and Jianqiang Li and Zhong Ming Accuracy-aware wireless indoor localization: Feasibility and applications . . . . . . . . . . . . . . 128--136 Sultan Alneyadi and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy A survey on data leakage prevention systems . . . . . . . . . . . . . . . . 137--152 Mawloud Omar and Hamida Boufaghes and Lydia Mammeri and Amel Taalba and Abdelkamel Tari Secure and reliable certificate chains recovery protocol for mobile ad hoc networks . . . . . . . . . . . . . . . . 153--162 Peiyan Yuan and Lilin Fan and Ping Liu and Shaojie Tang Recent progress in routing protocols of mobile opportunistic networks: a clear taxonomy, analysis and evaluation . . . 163--170 Seyed Yahya Vaezpour and Rui Zhang and Kui Wu and Jianping Wang and Gholamali C. Shoja A new approach to mitigating security risks of phone clone co-location over mobile clouds . . . . . . . . . . . . . 171--184 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Divya Saxena and Vaskar Raychoudhury Radient: Scalable, memory efficient name lookup algorithm for named data networking . . . . . . . . . . . . . . . 1--13 Daniel-Ioan Curiac Towards wireless sensor, actuator and robot networks: Conceptual framework, challenges and perspectives . . . . . . 14--23 Mengmeng Ge and Kim-Kwang Raymond Choo and Huai Wu and Yong Yu Survey on key revocation mechanisms in wireless sensor networks . . . . . . . . 24--38 Meng Han and Mingyuan Yan and Zhipeng Cai and Yingshu Li An exploration of broader influence maximization in timeliness networks with opportunistic selection . . . . . . . . 39--49 Wen-Hwa Liao and Ssu-Chi Kuai and Chen Liu Efficient scheduling algorithm for multiple mobile subscriber stations with unsolicited grant service in an IEEE 802.16e network . . . . . . . . . . . . 50--55 Hasan Abdulwahid and Bin Dai and Benxiong Huang and Zijing Chen Scheduled-links multicast routing protocol in MANETs . . . . . . . . . . . 56--67 Wazir Zada Khan and Md. Shohrab Hossain and Mohammed Y. Aalsalem and N. M. Saad and Mohammed Atiquzzaman A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs . . . . . . . . . . . . 68--85 Amrita Ghosal and Subir Halder Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks . . . . . . . . . 86--97 S. Avallone and G. Di Stasi Design and implementation of WiMesh: a tool for the performance evaluation of multi-radio wireless mesh networks . . . 98--109 Hao Zhu and Xiangke Liao and Cees de Laat and Paola Grosso Joint flow routing-scheduling for energy efficient software defined data center networks: a prototype of energy-aware network management platform . . . . . . 110--124 Debao Wei and Libao Deng and Peng Zhang and Liyan Qiao and Xiyuan Peng A page-granularity wear-leveling (PGWL) strategy for NAND flash memory-based sink nodes in wireless sensor networks 125--139 Álvaro López García and Enol Fernández del Castillo Efficient image deployment in cloud environments . . . . . . . . . . . . . . 140--149 Osamah Ibrahiem Abdullaziz and Vik Tor Goh and Huo-Chong Ling and KokSheik Wong AIPISteg: an active IP identification based steganographic method . . . . . . 150--158 Emanuel F. Coutinho and Paulo A. L. Rego and Danielo G. Gomes and José N. de Souza Physics and microeconomics-based metrics for evaluating cloud computing elasticity . . . . . . . . . . . . . . . 159--172 Diego Kreutz and Oleksandr Malichevskyy and Eduardo Feitosa and Hugo Cunha and Rodrigo da Rosa Righi and Douglas D. J. de Macedo A cyber-resilient architecture for critical security services . . . . . . . 173--189 Javier Suarez and Jose Quevedo and Ivan Vidal and Daniel Corujo and Jaime Garcia-Reinoso and Rui L. Aguiar A secure IoT management architecture based on Information-Centric Networking 190--204 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gilberto Fernandes, Jr. and Luiz F. Carvalho and Joel J. P. C. Rodrigues and Mario Lemes Proença, Jr. Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization . . . . . . . . 1--11 Syam Kumar Pasupuleti and Subramanian Ramalingam and Rajkumar Buyya An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing . . . 12--22 Jiangtao Zhang and Hejiao Huang and Xuan Wang Resource provision algorithms in cloud computing: a survey . . . . . . . . . . 23--42 Elias Chavarria-Reyes and Etimad Fadel and Suleiman Almasri and M. G. Abbas Malik Reducing the energy consumption at the user equipment through multi-stream cross-carrier-aware discontinuous reception (DRX) in LTE-advanced systems 43--61 Enrico Gregori and Alessandro Improta and Luciano Lenzini and Valerio Luconi and Nilo Redini and Alessio Vecchio Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks . . . . . . . . . . . 62--75 Waqar Asif and Hassaan Khaliq Qureshi and Muttukrishnan Rajarajan and Marios Lestas Combined Banzhaf & Diversity Index (CBDI) for critical node detection . . . . . . 76--88 Lien-Wu Chen Cooperative energy-efficient localization with node lifetime extension in mobile long-thin networks 89--97 Debdeep Paul and Wen-De Zhong and Sanjay K. Bose Energy efficient cloud service pricing: a two-timescale optimization approach 98--112 Michel Barbeau and Gimer Cervera and Joaquin Garcia-Alfaro and Evangelos Kranakis Channel selection using a multiple radio model . . . . . . . . . . . . . . . . . 113--123 Márcio Melo and Susana Sargento and Jorge Carapinha Optimal virtual network migration: a step closer for seamless resource mobility . . . . . . . . . . . . . . . . 124--136 Yongrui Qin and Quan Z. Sheng and Nickolas J. G. Falkner and Schahram Dustdar and Hua Wang and Athanasios V. Vasilakos When things matter: a survey on data-centric Internet of Things . . . . 137--153 Mustapha Reda Senouci and Abdelhamid Mellouk and Nadjib Aitsaadi and Latifa Oukhellou Fusion-based surveillance WSN deployment using Dempster--Shafer theory . . . . . 154--166 Yan Liu and Shun-Zheng Yu Network coding-based multisource content delivery in Content Centric Networking 167--175 Atiq Ur Rahman and Abdulrahman Alharby and Halabi Hasbullah and Khalid Almuzaini Corona based deployment strategies in wireless sensor network: a survey . . . 176--193 Cheng Zhan and Fuyuan Xiao Coding based wireless broadcast scheduling in real time applications . . 194--203 Lingzhi Li and Zhe Yang and Jin Wang and Shukui Zhang and Yanqin Zhu Network coding with crowdsourcing-based trajectory estimation for vehicular networks . . . . . . . . . . . . . . . . 204--215 Fabio Rafael Segundo and Eraldo Silveira e Silva and Jean-Marie Farines A DTN routing strategy based on neural networks for urban bus transportation system . . . . . . . . . . . . . . . . . 216--228 Bahareh Alami Milani and Nima Jafari Navimipour A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions . . . . . . . . . . . . . . . 229--238 Hashim A. Hashim and B. O. Ayinde and M. A. Abido Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm . . . . . . . . . . 239--248 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Haitao Zhao and Jibo Wei and Nurul I. Sarkar and Shengchun Huang E-MAC: an evolutionary solution for collision avoidance in wireless ad hoc networks . . . . . . . . . . . . . . . . 1--11 Mahir Kaya and Altan Koçyigit and P. Erhan Eren An adaptive mobile cloud computing framework using a call graph based model 12--35 Jungwon Lee and Miran Shim and Hyesook Lim Name prefix matching using bloom filter pre-searching for content centric network . . . . . . . . . . . . . . . . 36--47 Rahma Chaabouni and Marc Sánchez-Artigas and Pedro García-López and Lluís P\`amies-Ju\`arez The power of swarming in personal clouds under bandwidth budget . . . . . . . . . 48--71 Jihun Seo and Keuchul Cho and Wooseong Cho and Gisu Park and Kijun Han A discovery scheme based on carrier sensing in self-organizing Bluetooth Low Energy networks . . . . . . . . . . . . 72--83 Wilson M. Tan and Stephen A. Jarvis Heuristic solutions to the target identifiability problem in directional sensor networks . . . . . . . . . . . . 84--102 Deepak Kumar Patel and Devashree Tripathy and C. R. Tripathy Survey of load balancing techniques for Grid . . . . . . . . . . . . . . . . . . 103--119 Ying Qu and Bryan Ng and Winston Seah A survey of routing and channel assignment in multi-channel multi-radio WMNs . . . . . . . . . . . . . . . . . . 120--130 Fida Gillani and Ehab Al-Shaer and Basil AsSadhan Economic metric to improve spam detectors . . . . . . . . . . . . . . . 131--143 Gopal Kirshna Shyam and Sunilkumar S. Manvi Virtual resource prediction in cloud environment: a Bayesian approach . . . . 144--154 Mahmoud Khasawneh and Saed Alrabaee and Anjali Agarwal and Nishith Goel and Marzia Zaman Power trading in cognitive radio networks . . . . . . . . . . . . . . . . 155--166 Chenhao Qu and Rodrigo N. Calheiros and Rajkumar Buyya A reliable and cost-efficient auto-scaling system for web applications using heterogeneous spot instances . . . 167--180 Mohammed Atiquzzaman Editorial: 2015 Best Paper Awards . . . A1--A3 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gianluigi Folino and Pietro Sabatino Ensemble based collaborative and distributed intrusion detection systems: a survey . . . . . . . . . . . . . . . . 1--16 Neenu Garg and Seema Bawa Comparative analysis of cloud data integrity auditing protocols . . . . . . 17--32 Abayomi Moradeyo Otebolaku and Maria Teresa Andrade User context recognition using smartphone sensors and classification models . . . . . . . . . . . . . . . . . 33--51 Shiyi Li and Qiang Cao and Shenggang Wan and Lu Qian and Changsheng Xie HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems . . . . . . . . . . . . . . . . 52--63 Mohammad Masdari and Sima ValiKardan and Zahra Shahi and Sonay Imani Azar Towards workflow scheduling in cloud computing: a comprehensive analysis . . 64--82 Pawan Kumar Verma and Rajesh Verma and Arun Prakash and Ashish Agrawal and Kshirasagar Naik and Rajeev Tripathi and Maazen Alsabaan and Tarek Khalifa and Tamer Abdelkader and Abdulhakim Abogharaf Machine-to-Machine (M2M) communications: a survey . . . . . . . . . . . . . . . . 83--105 Mohammad Masdari and Sayyid Shahab Nabavi and Vafa Ahmadi An overview of virtual machine placement schemes in cloud computing . . . . . . . 106--127 Fuu-Cheng Jiang and Ilsun You and Fang-Yi Leu Approaching green sensor field using queue-based optimization technique . . . 128--136 Jurairat Phuttharak and Seng W. Loke Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis . . . . . . . . . . . 137--150 Yatish K. Joshi and Mohamed Younis Restoring connectivity in a resource constrained WSN . . . . . . . . . . . . 151--165 Justin Grana and David Wolpert and Joshua Neil and Dongping Xie and Tanmoy Bhattacharya and Russell Bent A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks . . . . . . . . . . . . 166--179 Amna Qureshi and David Megías and Helena Rif\`a-Pous PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting . . . . . . . . . . . . . 180--197 David Airehrour and Jairo Gutierrez and Sayan Kumar Ray Secure routing for Internet of Things: a survey . . . . . . . . . . . . . . . . . 198--213 Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Muhammad Shiraz and Iftikhar Ahmad Network forensics: Review, taxonomy, and open challenges . . . . . . . . . . . . 214--235 Suvendu Kumar Mohapatra and Prasan Kumar Sahoo and Shih-Lin Wu Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks . . . . . . . . 236--249 Li Chunlin and Yan Xin and Li LaYuan Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud . . . . . . . . . . . . . . . . . 250--261 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Rahim Masoudi and Ali Ghaffari Software defined networks: a survey . . 1--25 Suchetana Chakraborty and Sandip Chakraborty and Sukumar Nandi and Sushanta Karmakar Impact of redundant sensor deployment over data gathering performance: a model based approach . . . . . . . . . . . . . 26--42 Xuxun Liu A novel transmission range adjustment strategy for energy hole avoiding in wireless sensor networks . . . . . . . . 43--52 Huda Saleh Abbas and Mark A. Gregory The next generation of passive optical networks: a review . . . . . . . . . . . 53--74 Mathias Pelka and Horst Hellbrück Survey of challenges and towards a unified architecture for location systems . . . . . . . . . . . . . . . . 75--85 Peter Bartalos and Yi Wei and M. Brian Blake and Haluk Damgacioglu and Iman Saleh and Nurcin Celik Modeling energy-aware web services and application . . . . . . . . . . . . . . 86--98 Manuel Díaz and Cristian Martín and Bartolomé Rubio State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing . . . . . . . 99--117 Eisa Zarepour and Abdul Alim Abd Karim and Ajay Sharma and Mahbub Hassan and Aruna Seneviratne Characterizing power saving for device-to-device browser cache cooperation . . . . . . . . . . . . . . 118--127 Sobin CC and Vaskar Raychoudhury and Gustavo Marfia and Ankita Singla A survey of routing and data dissemination in Delay Tolerant Networks 128--146 Opeyemi Osanaiye and Kim-Kwang Raymond Choo and Mqhele Dlodlo Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework . . . . . . . . . . . . . . . 147--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Nauman Ahad and Junaid Qadir and Nasir Ahsan Neural networks in wireless networks: Techniques, applications and guidelines 1--27 Maxim Claeys and Daphné Tuncer and Jeroen Famaey and Marinos Charalambides and Steven Latré and George Pavlou and Filip De Turck Hybrid multi-tenant cache management for virtualized ISP networks . . . . . . . . 28--41 Anum Ali and Ghalib A. Shah and Junaid Arshad Energy efficient techniques for M2M communication: a survey . . . . . . . . 42--55 Zhiming Wang and Xiaoping Zeng and Xue Liu and Man Xu and Ya Wen and Li Chen TCP congestion control algorithm for heterogeneous Internet . . . . . . . . . 56--64 Yunhe Cui and Lianshan Yan and Saifei Li and Huanlai Xing and Wei Pan and Jian Zhu and Xiaoyang Zheng SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks . . 65--79 Han-Peng Jiang and David Chuck and Wei-Mei Chen Energy-aware data center networks . . . 80--89 Aisha Abdallah and Mohd Aizaini Maarof and Anazida Zainal Fraud detection system: a survey . . . . 90--113 Tran The Son and Hoa Le-Minh and Nauman Aslam MSAR: a metric self-adaptive routing model for Mobile Ad Hoc Networks . . . . 114--125 Wenjuan Li and Weizhi Meng and Lam For Kwok A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures . . . . . . . . . . 126--139 Yang Qin and Weihong Yang and Yibin Ye and Yao Shi Analysis for TCP in data center networks: Outcast and Incast . . . . . . 140--150 Wenbin Hu and Zhenyu Qiu and Huan Wang and Liping Yan A Real-time scheduling algorithm for on-demand wireless XML data broadcasting 151--163 Bijoy Chand Chatterjee and Waya Fadini and Eiji Oki A spectrum allocation scheme based on first-last-exact fit policy for elastic optical networks . . . . . . . . . . . . 164--172 Syed Hamid Hussain Madni and Muhammad Shafie Abd Latiff and Yahaya Coulibaly and Shafi'i Muhammad Abdulhamid Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities . . . . . . 173--200 Weizhi Meng and Wang Hao Lee and S. R. Murali and S. P. T. Krishnan JuiceCaster: Towards automatic juice filming attacks on smartphones . . . . . 201--212 P. V. Bindu and P. Santhi Thilagam Mining social networks for anomalies: Methods and challenges . . . . . . . . . 213--229 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alex F. R. Trajano and Marcial P. Fernandez Two-phase load balancing of In-Memory Key-Value Storages using Network Functions Virtualization (NFV) . . . . . 1--13 Xavier Hesselbach and Jos\`e Roberto Amazonas and Santi Villanueva and Juan Felipe Botero Coordinated node and link mapping VNE using a new paths algebra strategy . . . 14--26 T. Panigrahi and Meenakshi Panda and G. Panda Fault tolerant distributed estimation in wireless sensor networks . . . . . . . . 27--39 Cezar Plesca and Vincent Charvillat and Wei Tsang Ooi Multimedia prefetching with optimal Markovian policies . . . . . . . . . . . 40--53 Sally E. El Khawaga and Ahmed I. Saleh and Hesham A. Ali An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks . . . . . . . . . 54--76 Ado Adamou Abba Ari and Blaise Omer Yenke and Nabila Labraoui and Irepran Damakoa and Abdelhak Gueroui A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach . . . . . . . . . . . . . . . . 77--97 Rafael L. Gomes and Luiz F. Bittencourt and Edmundo R. M. Madeira and Eduardo Cerqueira and Mario Gerla A combined energy-bandwidth approach to allocate resilient virtual software defined networks . . . . . . . . . . . . 98--106 Du Yuanfeng and Yang Dongkai and Yang Huilin and Xiu Chundi Flexible indoor localization and tracking system based on mobile phone 107--116 V. K. Mohan Raj and R. Shriram Power management in virtualized datacenter --- a survey . . . . . . . . 117--133 Francisco Moyano and Carmen Fernandez-Gago and Javier Lopez A model-driven approach for engineering trust and reputation into software services . . . . . . . . . . . . . . . . 134--151 Cuong T. Do and Nguyen H. Tran and Eui-Nam Huh and Choong Seon Hong and Dusit Niyato and Zhu Han Dynamics of service selection and provider pricing game in heterogeneous cloud market . . . . . . . . . . . . . . 152--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marcelo Caggiani Luizelli and Leonardo Richter Bays and Luciana Salete Buriol and Marinho Pilla Barcellos and Luciano Paschoal Gaspary How physical network topologies affect virtual network embedding quality: a characterization study based on ISP and datacenter networks . . . . . . . . . . 1--16 Ali Mohammad Saghiri and Mohammad Reza Meybodi An approach for designing cognitive engines in cognitive peer-to-peer networks . . . . . . . . . . . . . . . . 17--40 Jianwei Niu and Lei Wang and Xiting Liu and Shui Yu FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems 41--50 Tekenate E. Amah and Maznah Kamat and Waldir Moreira and Kamalrulnizam Abu Bakar and Satria Mandala and Marcos A. Batista Towards next-generation routing protocols for pocket switched networks 51--88 Xiaoming Liu and Yadong Zhou and Chengchen Hu and Xiaohong Guan MIRACLE: a multiple independent random walks community parallel detection algorithm for big graphs . . . . . . . . 89--101 Carlos Barba-Jimenez and Raul Ramirez-Velarde and Andrei Tchernykh and Ramón Rodríguez-Dagnino and Juan Nolazco-Flores and Raul Perez-Cazares Cloud based Video-on-Demand service model ensuring quality of service and scalability . . . . . . . . . . . . . . 102--113 Fatih Senel and Mohamed Younis Novel relay node placement algorithms for establishing connected topologies 114--130 Juan Antonio Cordero Multi-path TCP performance evaluation in dual-homed (wired/wireless) devices . . 131--139 Muhammad Anan and Ala Al-Fuqaha and Nidal Nasser and Ting-Yu Mu and Husnain Bustam Empowering networking research and experimentation through Software-Defined Networking . . . . . . . . . . . . . . . 140--155 Fuliang Li and Jiahai Yang and Xingwei Wang and Tian Pan and Changqing An and Jianping Wu Characteristics analysis at prefix granularity: a case study in an IPv6 network . . . . . . . . . . . . . . . . 156--170 Jian Peng and Kim-Kwang Raymond Choo and Helen Ashman Bit-level $n$-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles . . . . . . . . . . . . . . . . 171--182 Lin Xue and Suman Kumar and Cheng Cui and Praveenkumar Kondikoppa and Chui-Hui Chiu and Seung-Jong Park Towards fair and low latency next generation high speed networks: AFCD queuing . . . . . . . . . . . . . . . . 183--193 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mahdi Nasrullah Al-Ameen and Matthew Wright iPersea: Towards improving the Sybil-resilience of social DHT . . . . . 1--10 Minhaj Ahmad Khan A survey of security issues for cloud computing . . . . . . . . . . . . . . . 11--29 Hang Shen and Guangwei Bai Routing in wireless multimedia sensor networks: a survey and challenges ahead 30--49 Melike Yigit and V. Cagri Gungor and Etimad Fadel and Laila Nassef and Nadine Akkari and Ian F. Akyildiz Channel-aware routing and priority-aware multi-channel scheduling for WSN-based smart grid applications . . . . . . . . 50--58 L. González-Manzano and José M. de Fuentes and Sergio Pastrana and Pedro Peris-Lopez and Luis Hernández-Encinas PAgIoT --- Privacy-preserving Aggregation protocol for Internet of Things . . . . . . . . . . . . . . . . . 59--71 Nusrat Zerin Zenia and Mohammed Aseeri and Muhammad R. Ahmed and Zamshed I. Chowdhury and M. Shamim Kaiser Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: a survey . . . 72--85 Alireza Sadeghi Milani and Nima Jafari Navimipour Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends . . 86--98 Pimmy Gandotra and Rakesh Kumar Jha Device-to-Device Communication in Cellular Networks: a Survey . . . . . . 99--117 Rodrigo R. Esch and Fábio Protti and Valmir C. Barbosa Adaptive event sensing in networks of autonomous mobile agents . . . . . . . . 118--129 Mahda Noura and Rosdiadee Nordin A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks . . . . . 130--150 Aisha Siddiqa and Ibrahim Abaker Targio Hashem and Ibrar Yaqoob and Mohsen Marjani and Shahabuddin Shamshirband and Abdullah Gani and Fariza Nasaruddin A survey of big data management: Taxonomy and state-of-the-art . . . . . 151--166 Jingyuan Wang and Jiangtao Wen and Jun Zhang and Zhang Xiong and Yuxing Han TCP-FIT: an improved TCP algorithm for heterogeneous networks . . . . . . . . . 167--180 Manel Seddiki and Mahfoud Bencha\"\iba 2P-Lookup: Popularity and Proximity based P2P Lookup mechanism over MANETs 181--193 João Santos and Joel J. P. C. Rodrigues and Bruno M. C. Silva and João Casal and Kashif Saleem and Victor Denisov An IoT-based mobile gateway for intelligent personal assistants on mobile health environments . . . . . . . 194--204 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohamed Attia and Hichem Sedjelmaci and Sidi Mohammed Senouci and El-Hassane Aglzim Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture . . . . . . . . . . . . . . 1--13 Jian Peng and Kim-Kwang Raymond Choo and Helen Ashman User profiling in intrusion detection: a review . . . . . . . . . . . . . . . . . 14--27 Kishor Singh and Sangman Moh Routing protocols in cognitive radio ad hoc networks: a comprehensive review . . 28--37 Rana Azzam and Rabeb Mizouni and Hadi Otrok and Anis Ouali and Shakti Singh GRS: a Group-Based Recruitment System for Mobile Crowd Sensing . . . . . . . . 38--50 M. R. M. Assis and L. F. Bittencourt A survey on cloud federation architectures: Identifying functional and non-functional properties . . . . . 51--71 Sakib Md. Bin Malek and Md. Muntakim Sadik and Ashikur Rahman On balanced $k$-coverage in visual sensor networks . . . . . . . . . . . . 72--86 Shilpa Shashikant Chaudhari and Rajashekhar C. Biradar Traffic and mobility aware resource prediction using cognitive agent in mobile ad hoc networks . . . . . . . . . 87--103 Tie Qiu and Yuan Lv and Feng Xia and Ning Chen and Jiafu Wan and Amr Tolba ERGID: an efficient routing protocol for emergency response Internet of Things 104--112 Hassen A. Mogaibel and Mohamed Othman and Shamala Subramaniam and Nor Asilah Wati Abdul Hamid Review of channel assignment approaches in multi-radio multi-channel wireless mesh network . . . . . . . . . . . . . . 113--139 Jingyu Feng and Guangyue Lu and Honggang Wang and Xuanhong Wang Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks . . . . 140--149 C. Hamdeni and T. Hamrouni and F. Ben Charrada Data popularity measurements in distributed systems: Survey and design directions . . . . . . . . . . . . . . . 150--161 Xiaochen Hao and Weijing Liu and Ning Yao and Dehua Geng and Xida Li Distributed topology construction algorithm to improve link quality and energy efficiency for wireless sensor networks . . . . . . . . . . . . . . . . 162--170 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xian Li and Qiuling Tang and Changyin Sun The impact of node position on outage performance of RF energy powered wireless sensor communication links in overlaid deployment scenario . . . . . . 1--11 Ubaid Ullah Khan and Naqqash Dilshad and Mubashir Husain Rehmani and Tariq Umer Fairness in Cognitive Radio Networks: Models, measurement methods, applications, and future research directions . . . . . . . . . . . . . . . 12--26 Mehrnaz Moudi and Mohamed Othman and Kweh Yeah Lun and Amir Rizaan Abdul Rahiman $x$-Folded TM: an efficient topology for interconnection networks . . . . . . . . 27--34 M. Kaliappan and Susan Augustine and B. Paramasivan Enhancing energy efficiency and load balancing in mobile ad hoc network using dynamic genetic algorithms . . . . . . . 35--43 Song Han and Xinbin Li and Zhixin Liu and Xinping Guan Hierarchical-game-based algorithm for downlink joint subchannel and power allocation in OFDMA femtocell networks 44--56 Aimad Karkouch and Hajar Mousannif and Hassan Al Moatassime and Thomas Noel Data quality in Internet of Things: a state-of-the-art survey . . . . . . . . 57--81 Guidan Yao and Zhigang Jin and Yishan Su An environment-friendly spectrum decision strategy for underwater acoustic networks . . . . . . . . . . . 82--93 K. Ivesic and L. Skorin-Kapov and M. Matijasevic Corrigendum to: ``Cross-layer QoE-driven admission control and resource allocation for adaptive multimedia services in LTE'' [J. Netw. Comput. Appl. \bf 46 (2014) 336--351] . . . . . 94--97 Tien Van Do and Nam H. Do and Ádám Horváth and Jinting Wang Corrigendum to ``Modelling opportunistic spectrum renting in mobile cellular networks'' [J. Netw. Comput. Appl. 52 (2015) 129--138] . . . . . . . . . . . . 98 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Feng Lin and Gang Wang and Junhai Zhou and Shiwen Zhang and Xin Yao High-performance IPv6 address lookup in GPU-accelerated software routers . . . . 1--10 Yanchao Zhao and Wenzhong Li and Sanglu Lu Navigation-driven handoff minimization in wireless networks . . . . . . . . . . 11--20 Lin Tang and Hui Cao and Li Zheng and Ningjian Huang Uncertainty-aware RFID network planning for target detection and target location 21--30 Kirill Kogan and Alejandro López-Ortiz and Sergey I. Nikolenko and Gabriel Scalosub and Michael Segal Large profits or fast gains: a dilemma in maximizing throughput with applications to network processors . . . 31--43 Chen Lyu and Shi-Feng Sun and Yuanyuan Zhang and Amit Pande and Haining Lu and Dawu Gu Privacy-preserving data sharing scheme over cloud for social applications . . . 44--55 Manas Khatua and Sudip Misra Exploiting anomalous slots for multiple channel access in IEEE 802.11 networks 56--65 Yogesh Sharma and Bahman Javadi and Weisheng Si and Daniel Sun Reliability and energy efficiency in cloud computing systems: Survey and taxonomy . . . . . . . . . . . . . . . . 66--85 Daniel Ricardo dos Santos and Roberto Marinho and Gustavo Roecker Schmitt and Carla Merkle Westphall and Carlos Becker Westphall A framework and risk assessment approaches for risk-based access control in the cloud . . . . . . . . . . . . . . 86--97 Salman Iqbal and Miss Laiha Mat Kiah and Babak Dhaghighi and Muzammil Hussain and Suleman Khan and Muhammad Khurram Khan and Kim-Kwang Raymond Choo On cloud security attacks: a taxonomy and intrusion detection and prevention as a service . . . . . . . . . . . . . . 98--120 Miguel Sepulcre and Javier Gozalvez and Baldomero Coll-Perales Multipath QoS-driven routing protocol for industrial wireless networks . . . . 121--132 Michael Emmanuel and Ramesh Rayudu Communication technologies for smart grid applications: a survey . . . . . . 133--148 Chun-Cheng Lin and Teng-Huei Chen and Hui-Hsin Chin Adaptive router node placement with gateway positions and QoS constraints in dynamic wireless mesh networks . . . . . 149--164 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hafsa Zannat and Taslima Akter and Mashrura Tasnim and Ashikur Rahman The coverage problem in visual sensor networks: a target oriented approach . . 1--15 Dimitrios Zorbas and Luigi Di Puglia Pugliese and Tahiry Razafindralambo and Francesca Guerriero Optimal drone placement and cost-efficient target coverage . . . . . 16--31 Yousri Daldoul and Djamal-Eddine Meddour and Toufik Ahmed and Raouf Boutaba Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11 32--46 Ranesh Kumar Naha and Mohamed Othman Cost-aware service brokering and performance sentient load balancing algorithms in the cloud . . . . . . . . 47--57 Mohd Faizal Ab Razak and Nor Badrul Anuar and Rosli Salleh and Ahmad Firdaus The rise of ``malware'': Bibliometric analysis of malware study . . . . . . . 58--76 Pawan Kumar Verma and Rajesh Verma and Arun Prakash and Rajeev Tripathi and Kshirasagar Naik A novel hybrid medium access control protocol for inter-M2M communications 77--88 Qiaoyun Zhang and Guilin Chen and Liang Zhao and Chih-Yung Chang Piconet construction and restructuring mechanisms for interference avoiding in Bluetooth PANs . . . . . . . . . . . . . 89--100 Ricardo Marco Alaez and Jose M. Alcaraz Calero and Fatna Belqasmi and May El-Barachi and Mohamad Badra and Omar Alfandi Towards an open source architecture for multi-operator LTE core networks . . . . 101--109 M. D'Arienzo and S. P. Romano GOSPF: an energy efficient implementation of the OSPF routing protocol . . . . . . . . . . . . . . . . 110--127 Ozgur Ates and Selcuk Keskin and Taskin Kocak High throughput graphics processing unit based Fano decoder . . . . . . . . . . . 128--137 Deval Bhamare and Raj Jain and Mohammed Samaka and Aiman Erbad A survey on service function chaining 138--155 Jin B. Hong and Dong Seong Kim Towards scalable security analysis using multi-layered security models . . . . . 156--168 Satoshi Utsumi and Salahuddin Muhammad Salim Zabir and Sumet Prabhavat A new explicit congestion notification scheme for satellite IP networks . . . . 169--180 Charalampos Konstantopoulos and Grammati Pantziou and Ioannis E. Venetis and Damianos Gavalas Efficient event handling in Wireless Sensor and Actor Networks: an on-line computation approach . . . . . . . . . . 181--199 Saurabh Singh and Young-Sik Jeong and Jong Hyuk Park A survey on cloud computing security: Issues, threats, and solutions . . . . . 200--222 Yaser Mansouri and Rajkumar Buyya To move or not to move: Cost optimization in a dual cloud-based storage architecture . . . . . . . . . . 223--235 Sana Habib and Junaid Qadir and Anwaar Ali and Durdana Habib and Ming Li and Arjuna Sathiaseelan The past, present, and future of transport-layer multipath . . . . . . . 236--258 Nor Bakiah Abd Warif and Ainuddin Wahid Abdul Wahab and Mohd Yamani Idna Idris and Roziana Ramli and Rosli Salleh and Shahaboddin Shamshirband and Kim-Kwang Raymond Choo Copy--move forgery detection: Survey, challenges and future directions . . . . 259--278 Waqar Asif and Marios Lestas and Hassaan Khaliq Qureshi and Muttukrishnan Rajarajan Optimization based spectral partitioning for node criticality assessment . . . . 279--292 Paulo Bartolomeu and Muhammad Alam and Joaquim Ferreira and José Fonseca Survey on low power real-time wireless MAC protocols . . . . . . . . . . . . . 293--316 Abid Khan and Farhana Jabeen and Farah Naz and Sabah Suhail and Mansoor Ahmed and Sarfraz Nawaz Buyer seller watermarking protocols issues and challenges --- a survey . . . 317--334 Junaid Shuja and Abdullah Gani and Muhammad Habib ur Rehman and Ejaz Ahmed and Sajjad A. Madani and Muhammad Khurram Khan and Kwangman Ko Towards native code offloading based MCC frameworks for multimedia applications: a survey . . . . . . . . . . . . . . . . 335--354 Minjae Park and Hyun Ahn and Kwanghoon Pio Kim Workflow-supported social networks: Discovery, analyses, and system . . . . 355--373 Xun Shao and Masahiro Jibiki and Yuuichi Teranishi and Nozomu Nishinaga A virtual replica node-based flash crowds alleviation method for sensor overlay networks . . . . . . . . . . . . 374--384 Nusrat Nowsheen and Gour Karmakar and Joarder Kamruzzaman PRADD: a path reliability-aware data delivery protocol for underwater acoustic sensor networks . . . . . . . . 385--397 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos and Ian Herwono Survey of approaches and features for the identification of HTTP-based botnet traffic . . . . . . . . . . . . . . . . 1--15 Laisen Nie and Dingde Jiang and Lei Guo and Shui Yu Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks . . . . . . . . . . . 16--22 Nazmus S. Nafi and Khandakar Ahmed and Mark A. Gregory and Manoj Datta A survey of smart grid architectures, applications, benefits and standardization . . . . . . . . . . . . 23--36 Qi Jiang and Jianfeng Ma and Fushan Wei and Youliang Tian and Jian Shen and Yuanyuan Yang An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks . . . . 37--48 Parisa Goudarzi and Hadi Tabatabaee Malazi and Mahmood Ahmadi Khorramshahr: a scalable peer to peer architecture for port warehouse management system . . . . . . . . . . . 49--59 Chun-Nan Lu and Chun-Ying Huang and Ying-Dar Lin and Yuan-Cheng Lai High performance traffic classification based on message size sequence and distribution . . . . . . . . . . . . . . 60--74 Ehsan Ahvar and Nafiseh Daneshgar-Moghaddam and Antonio M. Ortiz and Gyu Myoung Lee and Noel Crespi On analyzing user location discovery methods in smart homes: a taxonomy and survey . . . . . . . . . . . . . . . . . 75--86 Ren-Hung Hwang and Yu-Ling Hsueh and Jang-Jiin Wu and Fu-Hui Huang SocialHide: a generic distributed framework for location privacy protection . . . . . . . . . . . . . . . 87--100 Divya Saxena and Vaskar Raychoudhury N-FIB: Scalable, memory efficient name-based forwarding . . . . . . . . . 101--109 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dimitris Tsolkas and Eirini Liotou and Nikos Passas and Lazaros Merakos A survey on parametric QoE estimation for popular services . . . . . . . . . . 1--17 Preeti Mishra and Emmanuel S. Pilli and Vijay Varadharajan and Udaya Tupakula Intrusion detection techniques in cloud environment: a survey . . . . . . . . . 18--47 Gyanappa A. Walikar and Rajashekar C. Biradar A survey on hybrid routing mechanisms in mobile ad hoc networks . . . . . . . . . 48--63 Baogui Huang and Jiguo Yu and Xiuzhen Cheng and Honglong Chen and Hang Liu SINR based shortest link scheduling with oblivious power control in wireless networks . . . . . . . . . . . . . . . . 64--72 Fariba Aznoli and Nima Jafari Navimipour Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions . . . . . . . 73--86 Misbah Liaqat and Victor Chang and Abdullah Gani and Siti Hafizah Ab Hamid and Muhammad Toseef and Umar Shoaib and Rana Liaqat Ali Federated cloud resource management: Review and discussion . . . . . . . . . 87--105 Fahimeh Dabaghi and Zeinab Movahedi and Rami Langar A survey on green routing protocols using sleep-scheduling in wired networks 106--122 Long Cheng and Jianwei Niu and Linghe Kong and Chengwen Luo and Yu Gu and Wenbo He and Sajal K. Das Compressive sensing based data quality improvement for crowd-sensing applications . . . . . . . . . . . . . . 123--134 Wenjuan Li and Weizhi Meng and Lam-For Kwok and Horace H. S. Ip Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model 135--145 Chen Lin and Zhidong Shen and Qian Chen and Frederick T. Sheldon A data integrity verification scheme in mobile cloud computing . . . . . . . . . 146--151 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tshiamo Sigwele and Atm S. Alam and Prashant Pillai and Yim F. Hu Energy-efficient cloud radio access networks by cloud based workload consolidation for 5G . . . . . . . . . . 1--8 Pimmy Gandotra and Rakesh Kumar Jha and Sanjeev Jain A survey on device-to-device (D2D) communication: Architecture and security issues . . . . . . . . . . . . . . . . . 9--29 Giuseppina Garofalo and Andrea Giordano and Patrizia Piro and Giandomenico Spezzano and Andrea Vinci A distributed real-time approach for mitigating CSO and flooding in urban drainage systems . . . . . . . . . . . . 30--42 Ehsan Arianyan and Hassan Taheri and Vahid Khoshdel Novel fuzzy multi objective DVFS-aware consolidation heuristics for energy and SLA efficient resource management in cloud data centers . . . . . . . . . . . 43--61 Xiumin Wang and Xiaoming Chen and Chau Yuen and Weiwei Wu and Meng Zhang and Cheng Zhan Delay-cost tradeoff for virtual machine migration in cloud data centers . . . . 62--72 Gulshan Kumar and Mritunjay Kumar Rai An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs . . . . . . . . . . . 73--82 Fábio D. Rossi and Miguel G. Xavier and César A. F. De Rose and Rodrigo N. Calheiros and Rajkumar Buyya E-eco: Performance-aware energy-efficient cloud data center orchestration . . . . . . . . . . . . . 83--96 Arani Bhattacharya and Pradipta De A survey of adaptation techniques in computation offloading . . . . . . . . . 97--115 Cuiyu Kong and I.-Hsuan Peng Tradeoff design of radio resource scheduling for power and spectrum utilizations in LTE uplink systems . . . 116--124 Ying-Dar Lin and Yuan-Cheng Lai and Hung-Yi Teng and Chun-Chieh Liao and Yi-Chih Kao Scalable multicasting with multiple shared trees in software defined networking . . . . . . . . . . . . . . . 125--133 Abdulbaghi Ghaderzadeh and Mehdi Kargahi and Midia Reshadi InFreD: Intelligent Free Rider Detection in collaborative distributed systems . . 134--145 Miguel López-Benítez and Timothy D. Drysdale and Simon Hadfield and Mohamed Ismaeel Maricar Prototype for multidisciplinary research in the context of the Internet of Things 146--161 Weizhi Meng and Wenjuan Li and Yang Xiang and Kim-Kwang Raymond Choo A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks . . . . 162--169 Md Akbar Hossain and Nurul I. Sarkar and Jairo Gutierrez and William Liu Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model . . . . . . . . . . 170--179 Sara Ayoubi and Chadi Assi and Yiheng Chen and Tarek Khalifa and Khaled Bashir Shaban Restoration methods for cloud multicast virtual networks . . . . . . . . . . . . 180--190 Waqar Ahmed and Osman Hasan and Usman Pervez and Junaid Qadir Reliability modeling and analysis of communication networks . . . . . . . . . 191--215 Amrita Ghosal and Subir Halder and Stefano Chessa Secure key design approaches using entropy harvesting in wireless sensor network: a survey . . . . . . . . . . . 216--230 Mina Mirhosseini and Fatemeh Barani and Hossein Nezamabadi-pour QQIGSA: a quadrivalent quantum-inspired GSA and its application in optimal adaptive design of wireless sensor networks . . . . . . . . . . . . . . . . 231--241 Mukhtiar Ahmed and Mazleena Salleh and M. Ibrahim Channa Routing protocols based on node mobility for Underwater Wireless Sensor Network (UWSN): a survey . . . . . . . . . . . . 242--252 Qing Li and Yong Jiang and Pengfei Duan and Mingwei Xu and Xi Xiao Quokka: Latency-Aware Middlebox Scheduling with dynamic resource allocation . . . . . . . . . . . . . . . 253--266 Thaha Muhammed and Riaz Ahmed Shaikh An analysis of fault detection strategies in wireless sensor networks 267--287 Sheng Wen and Jiaojiao Jiang and Bo Liu and Yang Xiang and Wanlei Zhou Using epidemic betweenness to measure the influence of users in complex networks . . . . . . . . . . . . . . . . 288--299 Chien-Fu Cheng and Lung-Hao Li Data gathering problem with the data importance consideration in Underwater Wireless Sensor Networks . . . . . . . . 300--312 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Habib ur Rehman and Chee Sun Liew and Teh Ying Wah and Muhammad Khurram Khan Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions . . . . . . . . . . 1--24 Shahriar kaisar and Joarder Kamruzzaman and Gour Karmakar and Iqbal Gondal Decentralized content sharing among tourists in visiting hotspots . . . . . 25--40 Kayode Sakariyah Adewole and Nor Badrul Anuar and Amirrudin Kamsin and Kasturi Dewi Varathan and Syed Abdul Razak Malicious accounts: Dark of the social networks . . . . . . . . . . . . . . . . 41--67 Annie Ibrahim Rana and Brendan Jennings Semantic aware processing of user defined inference rules to manage home networks . . . . . . . . . . . . . . . . 68--87 Ashish Singh and Kakali Chatterjee Cloud security issues and challenges: a survey . . . . . . . . . . . . . . . . . 88--115 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ting Lu and Guohua Liu and Wei Li and Shan Chang and Wenjing Guo Distributed sampling rate allocation for data quality maximization in rechargeable sensor networks . . . . . . 1--9 Prasan Kumar Sahoo and Jang-Ping Sheu Design and analysis of collision free MAC for wireless sensor networks with or without data retransmission . . . . . . 10--21 L. Manunza and S. Marseglia and S. P. Romano Kerberos: a real-time fraud detection system for IMS-enabled VoIP networks . . 22--34 Chunhong Liu and Chuanchang Liu and Yanlei Shang and Shiping Chen and Bo Cheng and Junliang Chen An adaptive prediction approach based on workload pattern discrimination in the cloud . . . . . . . . . . . . . . . . . 35--44 Fan Deng and Li-Yong Zhang Elimination of policy conflict to improve the PDP evaluation performance 45--57 N. Busom and R. Petrlic and F. Sebé and C. Sorge and M. Valls A privacy-preserving reputation system with user rewards . . . . . . . . . . . 58--66 Habib Mostafaei and Antonio Montieri and Valerio Persico and Antonio Pescapé A sleep scheduling approach based on learning automata for WSN partial coverage . . . . . . . . . . . . . . . . 67--78 Mohammad Masdari Markov chain-based evaluation of the certificate status validations in hybrid MANETs . . . . . . . . . . . . . . . . . 79--89 Jihong Wang and Wenxiao Shi Joint multicast routing and channel assignment for multi-radio multi-channel wireless mesh networks with hybrid traffic . . . . . . . . . . . . . . . . 90--108 Maryam Barshan and Hendrik Moens and Bruno Volckaert and Filip De Turck Design and evaluation of a dual dynamic adaptive reservation approach in media production networks . . . . . . . . . . 109--122 Maicon Melo Alves and Luci Pirmez and Silvana Rossetto and Flavia C. Delicato and Claudio M. de Farias and Paulo F. Pires and Igor L. dos Santos and Albert Y. Zomaya Damage prediction for wind turbines using wireless sensor and actuator networks . . . . . . . . . . . . . . . . 123--140 Chengwen Luo and Long Cheng and Hande Hong and Kartik Sankaran and Mun Choon Chan and Jianqiang Li and Zhong Ming From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing . . . . . . . . . 141--151 Ahmed AlEroud and Izzat Alsmadi Identifying cyber-attacks on software defined networks: an inference-based intrusion detection approach . . . . . . 152--164 Chao-Tung Yang and Jung-Chun Liu and Shuo-Tsung Chen and Kuan-Lung Huang Virtual machine management system based on the power saving algorithm in cloud 165--180 Saritha Arunkumar and Berker Soyluoglu and Murat Sensoy and Mudhakar Srivatsa and Muttukrishnan Rajarajan Location attestation and access control for mobile devices using GeoXACML . . . 181--188 Mehdi Boulaiche and Louiza Bouallouche-Medjkoune HSecGR: Highly Secure Geographic Routing 189--199 Murat Karakus and Arjan Durresi Quality of Service (QoS) in Software Defined Networking (SDN): a survey . . . 200--218 Mohammad Goudarzi and Mehran Zamani and Abolfazl Toroghi Haghighat A fast hybrid multi-site computation offloading for mobile cloud computing 219--231 Alessandro Morelli and Mauro Tortonesi and Cesare Stefanelli and Niranjan Suri Information-Centric Networking in next-generation communications scenarios 232--250 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marco Cogoni and Giovanni Busonera and Paolo Anedda and Gianluigi Zanetti Transition to congestion in communication/computation networks for near-optimal and sub-optimal resource management via Monte Carlo simulations 1--11 Swati Sharma and Alefiya Hussain and Huzur Saran Towards repeatability & verifiability in networking experiments: a stochastic framework . . . . . . . . . . . . . . . 12--23 Asrin Vakili and Nima Jafari Navimipour Comprehensive and systematic review of the service composition mechanisms in the cloud environments . . . . . . . . . 24--36 Yu Xin and Zhi-Qiang Xie and Jing Yang A load balance oriented cost efficient scheduling method for parallel tasks . . 37--46 Shantanu Pal Evaluating the impact of network loads and message size on mobile opportunistic networks in challenged environments . . 47--58 Giancarlo Fortino and Giuseppe Di Fatta and Sergio F. Ochoa and Carlos E. Palau Engineering future interoperable and open IoT systems . . . . . . . . . . . . 59--61 Georgios Exarchakos and Ilker Oztelcan and Dimitris Sarakiotis and Antonio Liotta plexi: Adaptive re-scheduling web-service of time synchronized low-power wireless networks . . . . . . 62--73 G. Aloi and G. Caliciuri and G. Fortino and R. Gravina and P. Pace and W. Russo and C. Savaglio Enabling IoT interoperability through opportunistic smartphone-based mobile gateways . . . . . . . . . . . . . . . . 74--84 Pal Varga and Fredrik Blomstedt and Luis Lino Ferreira and Jens Eliasson and Mats Johansson and Jerker Delsing and Iker Martínez de Soria Making system of systems interoperable --- The core components of the arrowhead framework . . . . . . . . . . . . . . . 85--95 Michael P. Andersen and Gabe Fierro and David E. Culler Enabling synergy in IoT: Platform to service and beyond . . . . . . . . . . . 96--110 Maria Ganzha and Marcin Paprzycki and Wieslaw Pawlowski and Pawel Szmeja and Katarzyna Wasielewska Semantic interoperability in the Internet of Things: an overview from the INTER-IoT perspective . . . . . . . . . 111--124 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
R. Asorey-Cacheda and A.-J. Garcia-Sanchez and F. Garcia-Sanchez and J. Garcia-Haro A survey on non-linear optimization problems in wireless sensor networks . . 1--20 Gianluca Franchino and Giorgio Buttazzo A power-aware MAC layer protocol for real-time communication in wireless embedded systems . . . . . . . . . . . . 21--34 Liang Zhu and Changqiao Xu and Jianfeng Guan and Hongke Zhang SEM--PPA: a semantical pattern and preference-aware service mining method for personalized point of interest recommendation . . . . . . . . . . . . . 35--46 Juan J. Pérez-Solano and Santiago Felici-Castell Improving time synchronization in Wireless Sensor Networks using Bayesian Inference . . . . . . . . . . . . . . . 47--55 Wenting Shen and Jia Yu and Hui Xia and Hanlin Zhang and Xiuqing Lu and Rong Hao Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium . . . . 56--64 Alaa Awad and Amr Mohamed and Carla-Fabiana Chiasserini and Tarek Elfouly Distributed in-network processing and resource optimization over mobile-health systems . . . . . . . . . . . . . . . . 65--76 Hyunbum Kim and Heekuck Oh and Paolo Bellavista and Jalel Ben-Othman Constructing event-driven partial barriers with resilience in wireless mobile sensor networks . . . . . . . . . 77--92 Maryam Amiri and Leyli Mohammad-Khanli Survey on prediction models of applications for resources provisioning in cloud . . . . . . . . . . . . . . . . 93--113 Furui Zhan and Nianmin Yao and Zhenguo Gao and Guozhen Tan A novel key generation method for wireless sensor networks based on system of equations . . . . . . . . . . . . . . 114--127 Hang Shen and Guangwei Bai and Mei Yang and Zhonghui Wang Protecting trajectory privacy: a user-centric analysis . . . . . . . . . 128--139 Sanjib K. Deka and Nityananda Sarma Opportunity prediction at MAC-layer sensing for ad-hoc cognitive radio networks . . . . . . . . . . . . . . . . 140--151 Hamid Reza Arkian and Abolfazl Diyanat and Atefe Pourkhalili MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications . . . . . . . . . . . . . . 152--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amir Rahimzadeh Ilkhechi and Ibrahim Korpeoglu and Ugur Güdükbay and Özgür Ulusoy PETAL: a fully distributed location service for wireless ad hoc networks . . 1--11 Mengmeng Ge and Jin B. Hong and Walter Guttmann and Dong Seong Kim A framework for automating security analysis of the Internet of Things . . . 12--27 Mariluz Congosto and Pablo Basanta-Val and Luis Sanchez-Fernandez T-Hoarder: a framework to process Twitter data streams . . . . . . . . . . 28--39 Palvinder Singh Mann and Satvir Singh Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks . . . . . . . . 40--52 Chang Ruan and Jianxin Wang and Wanchun Jiang and Jiawei Huang and Geyong Min and Yi Pan FSQCN: Fast and simple quantized congestion notification in data center Ethernet . . . . . . . . . . . . . . . . 53--62 Yue Qiu and Maode Ma and Xilei Wang A proxy signature-based handover authentication scheme for LTE wireless networks . . . . . . . . . . . . . . . . 63--71 Nadine Abbas and Hazem Hajj and Zaher Dawy and Karim Jahed and Sanaa Sharafeddine An optimized approach to video traffic splitting in heterogeneous wireless networks with energy and QoE considerations . . . . . . . . . . . . . 72--88 Jun Huang and Liqian Xu and Qiang Duan and Cong-cong Xing and Jiangtao Luo and Shui Yu Modeling and performance analysis for multimedia data flows scheduling in software defined networks . . . . . . . 89--100 Jonghoon Park and Cheoleun Moon and Ikjun Yeom and Yusung Kim Cardinality estimation using collective interference for large-scale RFID systems . . . . . . . . . . . . . . . . 101--110 Samira Chouikhi and In\`es El Korbi and Yacine Ghamri-Doudane and Leila Azouz Saidane Centralized connectivity restoration in multichannel wireless sensor networks 111--123 Anum Ali and Ghalib A. Shah and Muhammad Omer Farooq and Usman Ghani Technologies and challenges in developing machine-to-machine applications: a survey . . . . . . . . . 124--139 Ada Gogu and Dritan Nace and Enrico Natalizio and Yacine Challal Using dynamic programming to solve the Wireless Sensor Network Configuration Problem . . . . . . . . . . . . . . . . 140--154 Adel Nadjaran Toosi and Chenhao Qu and Marcos Dias de Assunção and Rajkumar Buyya Renewable-aware geographical load balancing of web applications for sustainable data centers . . . . . . . . 155--168 Zina Chkirbene and Sebti Foufou and Ridha Hamila and Zahir Tari and Albert Y. Zomaya LaCoDa: Layered connected topology for massive data centers . . . . . . . . . . 169--180 Abderrazak Abdaoui and Tarek M. El Fouly and Mohamed H. Ahmed Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring . . . . . . 181--189 Israel Leyva-Mayorga and Vicent Pla and Jorge Martinez-Bauset and Mario E. Rivero-Angeles A hybrid method for the QoS analysis and parameter optimization in time-critical random access wireless sensor networks 190--203 Yunchuan Sun and Xinpei Yu and Rongfang Bie and Houbing Song Discovering time-dependent shortest path on traffic graph for drivers towards green driving . . . . . . . . . . . . . 204--212 Yu Liu and Changjie Zhang and Bo Li and Jianwei Niu DeMS: a hybrid scheme of task scheduling and load balancing in computing clusters 213--220 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Neenu Garg and Seema Bawa RITS--MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing 1--13 Ingrid Nunes and Frederico Schardong and Alberto Schaeffer-Filho BDI2DoS: an application using collaborating BDI agents to combat DDoS attacks . . . . . . . . . . . . . . . . 14--24 Bruno Bogaz Zarpelão and Rodrigo Sanches Miani and Cláudio Toshio Kawakani and Sean Carlisto de Alvarenga A survey of intrusion detection in Internet of Things . . . . . . . . . . . 25--37 Muhammad Baqer Mollah and Md. Abul Kalam Azad and Athanasios Vasilakos Security and privacy challenges in mobile cloud computing: Survey and way ahead . . . . . . . . . . . . . . . . . 38--54 Gürkan Solmaz and Damla Turgut Tracking pedestrians and emergent events in disaster areas . . . . . . . . . . . 55--67 Mahfuzur Rahman and Peter Graham Compatibility-based static VM placement minimizing interference . . . . . . . . 68--81 Babak Pourpeighambar and Mehdi Dehghan and Masoud Sabaei Multi-agent learning based routing for delay minimization in Cognitive Radio Networks . . . . . . . . . . . . . . . . 82--92 Imad Jawhar and Nader Mohamed and Jameela Al-Jaroodi and Dharma P. Agrawal and Sheng Zhang Communication and networking of UAV-based systems: Classification and associated architectures . . . . . . . . 93--108 Mohammed I. Alghamdi and Xunfei Jiang and Ji Zhang and Jifu Zhang and Minghua Jiang and Xiao Qin Towards two-phase scheduling of real-time applications in distributed systems . . . . . . . . . . . . . . . . 109--117 Binglei Guo and Jiong Yu and Bin Liao and Dexian Yang and Liang Lu A green framework for DBMS based on energy-aware query optimization and energy-efficient query processing . . . 118--130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Wei Tsai and Priyanka Rawat and Ming-Chao Chiang Intelligent systems for heterogeneous networks . . . . . . . . . . . . . . . . 1--3 Heejun Roh and Cheoulhoon Jung and Kyunghwi Kim and Sangheon Pack and Wonjun Lee Joint flow and virtual machine placement in hybrid cloud data centers . . . . . . 4--13 Bart Spinnewyn and Ruben Mennes and Juan Felipe Botero and Steven Latré Resilient application placement for geo-distributed cloud networks . . . . . 14--31 S. Kirthica and Rajeswari Sridhar CIT: a Cloud Inter-operation Toolkit to enhance elasticity and tolerate shut down of external clouds . . . . . . . . 32--46 Aiqin Hou and Chase Q. Wu and Dingyi Fang and Yongqiang Wang and Meng Wang Bandwidth scheduling for big data transfer using multiple fixed node-disjoint paths . . . . . . . . . . 47--55 Jianfeng Guan and Zhiwei Yan and Su Yao and Changqiao Xu and Hongke Zhang GBC-based caching function group selection algorithm for SINET . . . . . 56--63 Guangjie Han and Chenyu Zhang and Jinfang Jiang and Xuan Yang and Mohsen Guizani Mobile anchor nodes path planning algorithms using network-density-based clustering in wireless sensor networks 64--75 Junfeng Wang and Yiming Miao and Ping Zhou and M. Shamim Hossain and Sk Md Mizanur Rahman A software defined network routing in wireless multihop network . . . . . . . 76--83 Samir S. Soliman and Bongyong Song Fifth generation (5G) cellular and the network for tomorrow: cognitive and cooperative approach for energy savings 84--93 Vishal Sharma and Kathiravan Srinivasan and Han-Chieh Chao and Kai-Lung Hua and Wen-Huang Cheng Intelligent deployment of UAVs in 5G heterogeneous communication environment for improved coverage . . . . . . . . . 94--105 Chih-Cheng Tseng and Hwang--Cheng Wang and Kuo-Chang Ting and Chih-Chieh Wang and Fang-Chang Kuo Fast game-based handoff mechanism with load balancing for LTE/LTE-A heterogeneous networks . . . . . . . . . 106--115 Chen Chen and Tie Qiu and Jinna Hu and Zhiyuan Ren and Yang Zhou and Arun Kumar Sangaiah A congestion avoidance game for information exchange on intersections in heterogeneous vehicular networks . . . . 116--126 Haneul Ko and Sangheon Pack and Jong-Hyouk Lee and Alexandru Petrescu DLM: Delayed Location Management in network mobility (NEMO)-based public transportation systems . . . . . . . . . 127--133 Hyun-Ho Choi and Jung-Ryun Lee A flocking-inspired algorithm for fair resource allocation in vehicle-mounted mobile relays . . . . . . . . . . . . . 134--142 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zheng Yan and Jun Liu and Laurence T. Yang Special issue on pervasive social networking . . . . . . . . . . . . . . . 1--2 Chang Liu and Liehuang Zhu and Jinjun Chen Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud . . . . . . 3--14 Feng Lu and Weikang Zhang and Liwen Shao and Xunfei Jiang and Peng Xu and Hai Jin Scalable influence maximization under independent cascade model . . . . . . . 15--23 Darren Quick and Kim-Kwang Raymond Choo Pervasive social networking forensics: Intelligence and evidence from mobile device extracts . . . . . . . . . . . . 24--33 Gang Sun and Yuxia Xie and Dan Liao and Hongfang Yu and Victor Chang User-defined privacy location-sharing system in mobile online social networks 34--45 Zheng Yan and Wangyang Shi CloudFile: a cloud data access control system based on mobile social trust . . 46--58 Wenyin Yang and Guojun Wang and Md Zakirul Alam Bhuiyan and Kim-Kwang Raymond Choo Hypergraph partitioning for social networks based on information entropy modularity . . . . . . . . . . . . . . . 59--71 Yue Zhang and Bin Song and Peng Zhang Social behavior study under pervasive social networking based on decentralized deep reinforcement learning . . . . . . 72--81 Zufan Zhang and Lisha Wang and Dan Liu and Yu Zhang Peer discovery for D2D communications based on social attribute and service attribute . . . . . . . . . . . . . . . 82--91 Yadong Zhou and Beibei Zhang and Xiaoxiao Sun and Qinghua Zheng and Ting Liu Analyzing and modeling dynamics of information diffusion in microblogging social network . . . . . . . . . . . . . 92--102 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Masdari and Safiyyeh Ahmadzadeh A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems . . . . . . 1--19 Bing Xiong and Kun Yang and Jinyuan Zhao and Keqin Li Robust dynamic network traffic partitioning against malicious attacks 20--31 Franciscus X. A. Wibowo and Mark A. Gregory and Khandakar Ahmed and Karina M. Gomez Multi-domain Software Defined Networking: Research status and challenges . . . . . . . . . . . . . . . 32--45 Ping Song and Yi Liu and Chi Liu and Depei Qian ParaFlow: Fine-grained parallel SDN controller for large-scale networks . . 46--59 Sisi Xiong and Yanjun Yao and Michael Berry and Hairong Qi and Qing Cao Frequent traffic flow identification through probabilistic Bloom filter and its GPU-based acceleration . . . . . . . 60--72 Rodolfo S. Antunes and Matheus B. Lehmann and Rodrigo B. Mansilha and Luciano P. Gaspary and Marinho P. Barcellos NDNrel: a mechanism based on relations among objects to improve the performance of NDN . . . . . . . . . . . . . . . . . 73--86 B. Ducourthial and S. Mottelet and A. Busson Improving fairness between close Wi-Fi access points . . . . . . . . . . . . . 87--99 Chunlin Li and Jing Zhang and Youlong Luo Real-time scheduling based on optimized topology and communication traffic in distributed real-time computation platform of storm . . . . . . . . . . . 100--115 Muhammad Faran Majeed and Matthew N. Dailey and Riaz Khan and Apinun Tunpan Pre-caching: a proactive scheme for caching video traffic in named data mesh networks . . . . . . . . . . . . . . . . 116--130 Reza Farrahi Moghaddam and Vahid Asghari and Fereydoun Farrahi Moghaddam and Yves Lemieux and Mohamed Cheriet A Monte-Carlo approach to lifespan failure performance analysis of the network fabric in modular data centers 131--146 Saeed Kargar and Leyli Mohammad-Khanli Fractal: an advanced multidimensional range query lookup protocol on nested rings for distributed systems . . . . . 147--168 Animesh Roy and Soumit Bose and Tamaghna Acharya and Sipra DasBit Social-based energy-aware multicasting in delay tolerant networks . . . . . . . 169--184 W. Haider and J. Hu and J. Slay and B. P. Turnbull and Y. Xie Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling . . . . . . . . . . 185--192 David Nuñez and Isaac Agudo and Javier Lopez Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation . . . . . . . . 193--209 Peng Liu and Biao Xu and Guojun Dai and Zhen Jiang and Jie Wu MDP: Minimum delay hot-spot parking . . 210--222 I. B. Arun and T. G. Venkatesh Design and performance analysis of a MAC protocol for wireless LANs supporting multipacket reception . . . . . . . . . 223--236 Mohammed Atiquzzaman Editorial: New Editors 2017 . . . . . . A1--A5 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
De-gan Zhang and Si Liu and Ting Zhang and Zhao Liang Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education . . . . . . . . . . . . 1--9 Fadele Ayotunde Alaba and Mazliza Othman and Ibrahim Abaker Targio Hashem and Faiz Alotaibi Internet of Things security: a survey 10--28 Melchizedek Alipio and Nestor Michael Tiglao and Antonio Grilo and Fawaz Bokhari and Umair Chaudhry and Shavez Qureshi Cache-based transport protocols in wireless sensor networks: a survey and future directions . . . . . . . . . . . 29--49 Einollah Jafarnejad Ghomi and Amir Masoud Rahmani and Nooruldeen Nasih Qader Load-balancing algorithms in cloud computing: a survey . . . . . . . . . . 50--71 Ahmed I. Saleh and Khaled M. Abo-Al-Ez and Ahmed A. Abdullah A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference . . . . . . . . . . . . . . . 72--98 Sumair Khan and Babar Nazir and Iftikhar Ahmed Khan and Shahaboddin Shamshirband and Anthony T. Chronopoulos Load balancing in grid computing: Taxonomy, trends and opportunities . . . 99--111 Eunsam Kim and Jonathan C. L. Liu An integrated prefetching/caching scheme in multimedia servers . . . . . . . . . 112--123 Ruiying Li and Meinan Li and Haitao Liao and Ning Huang An efficient method for evaluating the end-to-end transmission time reliability of a switched Ethernet . . . . . . . . . 124--133 Carlos Abreu and Francisco Miranda and P. M. Mendes Smart context-aware QoS-based admission control for biomedical wireless sensor networks . . . . . . . . . . . . . . . . 134--145 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Victor Chang and Verena Kantere and Muthu Ramanchadran Emerging services for Internet of Things 1--2 Gang Sun and Victor Chang and Muthu Ramachandran and Zhili Sun and Gangmin Li and Hongfang Yu and Dan Liao Efficient location privacy algorithm for Internet of Things (IoT) services and applications . . . . . . . . . . . . . . 3--13 Faisal Fayyaz Qureshi and Rahat Iqbal and Muhammad Nabeel Asghar Energy efficient wireless communication technique based on Cognitive Radio for Internet of Things . . . . . . . . . . . 14--25 Yang Yang and Xianghan Zheng and Chunming Tang Lightweight distributed secure data management system for health Internet of Things . . . . . . . . . . . . . . . . . 26--37 Muneer Bani Yassein and Shadi Aljawarneh and Esra'a Masa'deh A new elastic trickle timer algorithm for Internet of Things . . . . . . . . . 38--47 Chen Chen and Honghui Zhao and Tie Qiu and Mingcheng Hu and Hui Han and Zhiyuan Ren An efficient power saving polling scheme in the Internet of Energy . . . . . . . 48--61 Pradeep Kumar and Rajkumar Saini and Partha Pratim Roy and Debi Prosad Dogra A bio-signal based framework to secure mobile devices . . . . . . . . . . . . . 62--71 Fan Wu and Lili Xu and Saru Kumari and Xiong Li and Jian Shen and Kim-Kwang Raymond Choo and Mohammad Wazid and Ashok Kumar Das An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment . . . . . . . . . . . . . . . 72--85 Cong Zhang and Chin-Feng Lai and Ying-Hsun Lai and Zhen-Wei Wu and Han-Chieh Chao An inferential real-time falling posture reconstruction for Internet of Healthcare Things . . . . . . . . . . . 86--95 Thar Baker and Muhammad Asim and Hissam Tawfik and Bandar Aldawsari and Rajkumar Buyya An energy-aware service composition algorithm for multiple cloud-based IoT applications . . . . . . . . . . . . . . 96--108 Md Fasiul Alam and Serafeim Katsikas and Olga Beltramello and Stathes Hadjiefthymiades Augmented and virtual reality based monitoring and safety system: a prototype IoT platform . . . . . . . . . 109--119 Xuan Thang Nguyen and Huu Tam Tran and Harun Baraki and Kurt Geihs Optimization of non-functional properties in Internet of Things applications . . . . . . . . . . . . . . 120--129 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Cristian Cleder Machado and Juliano Araujo Wickboldt and Lisandro Zambenedetti Granville and Alberto Schaeffer-Filho ARKHAM: an Advanced Refinement toolkit for Handling Service Level Agreements in Software-Defined Networking . . . . . . 1--16 Ahmad H. Dehwah and Shahrazed Elmetennani and Christian Claudel UD-WCMA: an energy estimation and forecast scheme for solar powered wireless sensor networks . . . . . . . . 17--25 Thiago P. B. Vieira and Danilo F. Tenório and João Paulo C. L. da Costa and Edison P. de Freitas and Giovanni Del Galdo and Rafael T. de Sousa Júnior Model order selection and eigen similarity based framework for detection and identification of network attacks 26--41 Javad Zarrin and Rui L. Aguiar and João Paulo Barraca HARD: Hybrid Adaptive Resource Discovery for Jungle Computing . . . . . . . . . . 42--73 Ju Hyoung Mun and Hyesook Lim Cache sharing using bloom filters in named data networking . . . . . . . . . 74--82 Tin-Yu Wu and Nadra Guizani and Jhih-Siang Huang Live migration improvements by related dirty memory prediction in cloud computing . . . . . . . . . . . . . . . 83--89 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Erwin Adi and Zubair Baig and Philip Hingston Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services . . . . . . . . . . . . . . . . 1--13 Trung V. Phan and Nguyen Khac Bao and Minho Park Distributed-SOM: a novel performance bottleneck handler for large-sized software-defined networks under flooding attacks . . . . . . . . . . . . . . . . 14--25 Shigen Shen and Haiping Ma and En Fan and Keli Hu and Shui Yu and Jianhua Liu and Qiying Cao A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion . . . . . . . . . . . . . . . 26--35 Mohammad Masdari and Safiyyeh Ahmadzadeh and Moazam Bidaki Key management in wireless Body Area Network: Challenges and issues . . . . . 36--51 Vireshwar Kumar and Jung-Min (Jerry) Park and Kaigui Bian Transmitter authentication using hierarchical modulation in dynamic spectrum sharing . . . . . . . . . . . . 52--60 Souad Ghazouani and Yahya Slimani A survey on cloud service description 61--74 Jing Zhang and Li Xu and Shuming Zhou and Geyong Min and Yang Xiang and Jia Hu Crossed Cube Ring: a $k$-connected virtual backbone for wireless sensor networks . . . . . . . . . . . . . . . . 75--88 Malik Muhammad Qirtas and Yasir Faheem and Mubashir Husain Rehmani Throwboxes in delay tolerant networks: a survey of placement strategies, buffering capacity, and mobility models 89--103 Angelos Michalas and Aggeliki Sgora and Dimitrios D. Vergados An integrated MIH-FPMIPv6 mobility management approach for evolved-packet system architectures . . . . . . . . . . 104--119 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Sabu M. Thampi and Jaime Lloret Mauri and Robin Doss Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives . . . . . . . . . . 1--2 Sarang C. Dhongdi and Pritish Nahar and Rishabh Sethunathan and Lucy J. Gudino and K. R. Anupama Cross-layer protocol stack development for three-dimensional underwater Acoustic Sensor Network . . . . . . . . 3--19 Priyatosh Mandal Performance comparison of TDMA variants for underwater acoustic sensor networks 20--30 Nadeem Javaid and Sheraz Hussain and Ashfaq Ahmad and Muhammad Imran and Abid Khan and Mohsen Guizani Region based cooperative routing in underwater wireless sensor networks . . 31--41 Shalli Rani and Syed Hassan Ahmed and Jyoteesh Malhotra and Rajneesh Talwar Energy efficient chain based routing protocol for underwater wireless sensor networks . . . . . . . . . . . . . . . . 42--50 Guangjie Han and Li Liu and Na Bao and Jinfang Jiang and Wenbo Zhang and Joel J. P. C. Rodrigues AREP: an asymmetric link-based reverse routing protocol for underwater acoustic sensor networks . . . . . . . . . . . . 51--58 Jingjing Wang and Wei Shi and Lingwei Xu and Liya Zhou and Qiuna Niu and Ju liu Design of optical-acoustic hybrid underwater wireless sensor network . . . 59--67 Weifeng Sun and Chi Zhou and Tie Qiu and Yuqing Liu An efficient communication scheme for solving merge conflicts in maritime transportation . . . . . . . . . . . . . 68--76 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mustapha Boushaba and Abdelhakim Hafid and Michel Gendreau Node stability-based routing in Wireless Mesh Networks . . . . . . . . . . . . . 1--12 Albert Sunny and Sumankumar Panchal and Nikhil Vidhani and Subhashini Krishnasamy and S. V. R. Anand and Malati Hegde and Joy Kuri and Anurag Kumar A generic controller for managing TCP transfers in IEEE 802.11 infrastructure WLANs . . . . . . . . . . . . . . . . . 13--26 Chi-Sheng Huang and Meng-Feng Tsai and Po-Hsuan Huang and Li-Ding Su and Kuei-Sheng Lee Distributed asteroid discovery system for large astronomical data . . . . . . 27--37 Farid Lalem and Ahc\`ene Bounceur and Madani Bezoui and Massinissa Saoudi and Reinhardt Euler and Tahar Kechadi and Marc Sevaux LPCN: Least polar-angle connected node algorithm to find a polygon hull in a connected Euclidean graph . . . . . . . 38--50 M. Ahmad and M. Azam and M. Naeem and M. Iqbal and A. Anpalagan and M. Haneef Resource management in D2D communication: an optimization perspective . . . . . . . . . . . . . . 51--75 Chaofan Ma and Wei Liang and Meng Zheng Delay constrained relay node placement in two-tiered wireless sensor networks: a set-covering-based algorithm . . . . . 76--90 Jeyasekar A. and Kasmir Raja S. V. and Annie Uthra R. Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks . . . . . . . . . . . . . . . . 91--109 Chengming Luo and Wei Li and Xinnan Fan and Hai Yang and Jianjun Ni and Xuewu Zhang and Gaifang Xin and Pengfei Shi Positioning technology of mobile vehicle using self-repairing heterogeneous sensor networks . . . . . . . . . . . . 110--122 Chao Bu and Xingwei Wang and Hui Cheng and Min Huang and Keqin Li and Sajal K. Das Enabling Adaptive Routing Service Customization via the integration of SDN and NFV . . . . . . . . . . . . . . . . 123--136 Sugi Lee and Younghoon Kim and Ikjun Yeom and Yusung Kim Active request management in stateful forwarding networks . . . . . . . . . . 137--149 Mohammad Sharif and Abolghasem Sadeghi-Niaraki Ubiquitous sensor network simulation and emulation environments: a survey . . . . 150--181 Pieter-Jan Maenhaut and Hendrik Moens and Bruno Volckaert and Veerle Ongenae and Filip De Turck A dynamic Tenant-Defined Storage system for efficient resource management in cloud applications . . . . . . . . . . . 182--196 Bo Yi and Xingwei Wang and Min Huang Design and evaluation of schemes for provisioning service function chain with function scalability . . . . . . . . . . 197--214 Yao-Chung Fan and Huan Chen and Fang-Yie Leu and Ilsun You Enabling in-network aggregation by diffusion units for urban scale M2M networks . . . . . . . . . . . . . . . . 215--227 Akiya Kamimura and Kohji Tomita A self-organizing network coordination framework enabling collision-free and congestion-less wireless sensor networks 228--244 Muhammad Asif Khan and Wael Cherif and Fethi Filali and Ridha Hamila Wi-Fi Direct Research --- Current Status and Future Perspectives . . . . . . . . 245--258 Shahid Anwar and Zakira Inayat and Mohamad Fadli Zolkipli and Jasni Mohamad Zain and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Victor Chang Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey . . . . . . . . . . 259--279 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Reza Ghebleh and Ali Ghaffari Retracted: A Comprehensive survey on 5G: the prospect of future communications 1--32 Bin Dai and Guan Xu and Bengxiong Huang and Peng Qin and Yang Xu Enabling network innovation in data center networks with software defined networking: a survey . . . . . . . . . . 33--49 Faheem Zafar and Abid Khan and Saba Suhail and Idrees Ahmed and Khizar Hameed and Hayat Mohammad Khan and Farhana Jabeen and Adeel Anjum Trustworthy data: a survey, taxonomy and future trends of secure provenance schemes . . . . . . . . . . . . . . . . 50--68 Arijit Nath and Nityananda Sarma A distributed solution for cooperative spectrum sensing scheduling in multi-band cognitive radio networks . . 69--77 Stefano Petrangeli and Tingyao Wu and Tim Wauters and Rafael Huysegems and Tom Bostoen and Filip De Turck A machine learning-based framework for preventing video freezes in HTTP adaptive streaming . . . . . . . . . . . 78--92 Warley Junior and Adriano França and Kelvin Dias and José N. de Souza Supporting mobility-aware computational offloading in mobile cloud environment 93--108 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Waqas Rehan and Stefan Fischer and Maaz Rehan and Mubashir Husain Rehmani A comprehensive survey on multichannel routing in wireless sensor networks . . 1--25 Mohammad Sadegh Aslanpour and Mostafa Ghobaei-Arani and Adel Nadjaran Toosi Auto-scaling web applications in clouds: a cost-aware approach . . . . . . . . . 26--41 Antonio Marotta and Enrica Zola and Fabio D'Andreagiovanni and Andreas Kassler A fast robust optimization-based heuristic for the deployment of green virtual network functions . . . . . . . 42--53 Garima Chopra and Rakesh Kumar Jha and Sanjeev Jain A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions . . . 54--78 Leonard Heilig and Rajkumar Buyya and Stefan Voß Location-aware brokering for consumers in multi-cloud computing environments 79--93 Daniel Yokoyama and Bruno Schulze and Henrique Kloh and Matheus Bandini and Vinod Rebello Affinity aware scheduling model of cluster nodes in private clouds . . . . 94--104 Tingwei Zhu and Dan Feng and Fang Wang and Yu Hua and Qingyu Shi and Yanwen Xie and Yong Wan A congestion-aware and robust multicast protocol in SDN-based data center networks . . . . . . . . . . . . . . . . 105--117 Mohammed Atiquzzaman Editorial: 2016 Best Paper Awards . . . A1--A4 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chih-Min Chao and Yun-Ting Ling and Cheng-Hong Jiang Number of channels adjustment for cognitive radio networks . . . . . . . . 1--13 M. De Benedetti and F. D'Urso and G. Fortino and F. Messina and G. Pappalardo and C. Santoro A fault-tolerant self-organizing flocking approach for UAV aerial survey 14--30 Amir Khorsandi Koohanestani and Amin Ghalami Osgouei and Hossein Saidi and Ali Fanian An analytical model for delay bound of OpenFlow based SDN using network calculus . . . . . . . . . . . . . . . . 31--38 Pimmy Gandotra and Rakesh Kumar Jha A survey on green communication and security challenges in 5G wireless communication networks . . . . . . . . . 39--61 Abolfazl Diyanat and Ahmad Khonsari and Hosein Shafiei Preservation of temporal privacy in body sensor networks . . . . . . . . . . . . 62--71 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdusy Syarif and Abdelhafid Abouaissa and Pascal Lorenz Operator calculus approach for route optimizing and enhancing wireless sensor network . . . . . . . . . . . . . . . . 1--10 Jorge Maestre Vidal and Ana Lucila Sandoval Orozco and Luis Javier García Villalba Alert correlation framework for malware detection by anomaly-based packet payload analysis . . . . . . . . . . . . 11--22 Behrouz Pourghebleh and Nima Jafari Navimipour Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research . . . . . . . . . . 23--34 Rekha Nachiappan and Bahman Javadi and Rodrigo N. Calheiros and Kenan M. Matawie Cloud storage reliability for Big Data applications: a state of the art survey 35--47 Mussab Alaa and A. A. Zaidan and B. B. Zaidan and Mohammed Talal and M. L. M. Kiah A review of smart home applications based on Internet of Things . . . . . . 48--65 Suleman Khan and Muhammad Shiraz and Laleh Boroumand and Abdullah Gani and Muhammad Khurram Khan Towards port-knocking authentication methods for mobile cloud computing . . . 66--78 Vishal Sharma and Fei Song and Ilsun You and Mohammed Atiquzzaman Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles 79--95 Diego V. Queiroz and Marcelo S. Alencar and Ruan D. Gomes and Iguatemi E. Fonseca and Cesar Benavente-Peces Survey and systematic mapping of industrial Wireless Sensor Networks . . 96--125 Satish Kumar and Arnab Sarkar and Arijit Sur A resource allocation framework for adaptive video streaming over LTE . . . 126--139 Stephen S. Oyewobi and Gerhard P. Hancke A survey of cognitive radio handoff schemes, challenges and issues for industrial wireless sensor networks (CR-IWSN) . . . . . . . . . . . . . . . 140--156 Shaufikah Shukri and Latifah Munirah Kamarudin Device free localization technology for human detection and counting with RF sensor networks: a review . . . . . . . 157--174 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chaoyue Niu and Minping Zhou and Zhenzhe Zheng and Fan Wu and Guihai Chen ERA: Towards privacy preservation and verifiability for online ad exchanges 1--10 Hassan Jamil Syed and Abdullah Gani and Raja Wasim Ahmad and Muhammad Khurram Khan and Abdelmuttlib Ibrahim Abdalla Ahmed Cloud monitoring: a review, taxonomy, and open research issues . . . . . . . . 11--26 Pengfei Hu and Sahraoui Dhelim and Huansheng Ning and Tie Qiu Survey on fog computing: architecture, key technologies, applications and open issues . . . . . . . . . . . . . . . . . 27--42 Avnish Thakur and Major Singh Goraya A taxonomic survey on load balancing in cloud . . . . . . . . . . . . . . . . . 43--57 Hussein Khayou and Bakr Sarakbi A validation model for non-lexical routing protocols . . . . . . . . . . . 58--64 Md Hasanul Ferdaus and Manzur Murshed and Rodrigo N. Calheiros and Rajkumar Buyya An algorithm for network and data-aware placement of multi-tier applications in cloud data centers . . . . . . . . . . . 65--83 Zakaria Gheid and Yacine Challal and Xun Yi and Abdelouahid Derhab Efficient and privacy-aware multi-party classification protocol for human activity recognition . . . . . . . . . . 84--96 Tarun Kulshrestha and Divya Saxena and Rajdeep Niyogi and Vaskar Raychoudhury and Manoj Misra SmartITS: Smartphone-based identification and tracking using seamless indoor-outdoor localization . . 97--113 Surajit Basak and Tamaghna Acharya Cross layer optimization for outage minimizing routing in cognitive radio ad hoc networks with primary users' outage protection . . . . . . . . . . . . . . . 114--124 Peiyan Yuan and Mingyang Song and Xiaoyan Zhao Effective and efficient collection of control messages for opportunistic routing algorithms . . . . . . . . . . . 125--130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
YiPeng Wang and Xiaochun Yun and Yongzheng Zhang and Liwei Chen and Guangjun Wu A nonparametric approach to the automated protocol fingerprint inference 1--9 Gulshan Kumar and Mritunjay Kumar Rai and Rahul Saha Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks 10--16 Luis Miguel Torres and Eduardo Magaña and Daniel Morató and Santiago Garcia-Jimenez and Mikel Izal TBDClust: Time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers 17--27 Ying Qu and Bryan Ng and Michael Homer A goodput distribution model for planning IEEE 802.11 WBNs in built environments . . . . . . . . . . . . . . 28--46 Seokseong Jeon and Jae-Pil Jeong and Young-Joo Suh and Chansu Yu and Dongsoo Han Selective AP probing for indoor positioning in a large and AP-dense environment . . . . . . . . . . . . . . 47--57 Adrián Sánchez-Carmona and Carlos Borrego and Sergi Robles and Gerard Garcia-Vandellós Two birds, one stone: Using mobility behavioral profiles both as destinations and as a routing tool . . . . . . . . . 58--72 Fatima Tul Zuhra and Kamalrulnizam Abu Bakar and Adnan Ahmed and Mohsin Ali Tunio Routing protocols in wireless body sensor networks: a comprehensive survey 73--97 Sarogini Grace Pease and Paul P. Conway and Andrew A. West Hybrid ToF and RSSI real-time semantic tracking with an adaptive industrial Internet of Things architecture . . . . 98--109 Yu Xin and Ya-Di Wang and Zhi-Qiang Xie and Jing Yang A cooperative scheduling method based on the device load feedback for multiple tasks scheduling . . . . . . . . . . . . 110--119 M. C. Lucas-Estañ and J. Gozalvez Distributed radio resource allocation for device-to-device communications underlaying cellular networks . . . . . 120--130 Indu I. and Rubesh Anand P. M. and Vidhyacharan Bhaskar Encrypted token based authentication with adapted SAML technology for cloud web services . . . . . . . . . . . . . . 131--145 Giulio Aliberti and Roberto Di Pietro and Stefano Guarino Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results . . . . . . . . . . . 146--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Atiquzzaman 100 Volumes of JNCA . . . . . . . . . . iii--iv Cong Wang and Maode Ma and Zenghua Zhao Design of a novel dynamic trust model for spectrum management in WRANs of TV white space . . . . . . . . . . . . . . 1--10 A. B. M. Alim Al Islam and Tusher Chakraborty and Taslim Arefin Khan and Mahabub Zoraf and Chowdhury Sayeed Hyder Towards defending eavesdropping on NFC 11--23 Tassos Dimitriou and Ioannis Krontiris Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications . . . . . . . 24--34 Sandhya and Yash Sinha and K. Haribabu A survey: Hybrid SDN . . . . . . . . . . 35--55 Iria Estévez-Ayres and Jesús Arias Fisteus and Carlos Delgado-Kloos Lostrego: a distributed stream-based infrastructure for the real-time gathering and analysis of heterogeneous educational data . . . . . . . . . . . . 56--68 Mohammed Hashem and Shrief I. Barakat and Mahmoud A. AttaAlla Enhanced tree routing protocols for multi-hop and multi-channel cognitive radio network (EMM--TRP) . . . . . . . . 69--79 Sidra Aslam and Saif ul Islam and Abid Khan and Mansoor Ahmed and Adnan Akhundzada and Muhammad Khurram Khan Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges . . . . . . . . . . . . . . . 80--94 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Thank You Reviewers . . . . . . . . . . iii--ix Nanda Kumar Thanigaivelan and Ethiopia Nigussie and Antti Hakkala and Seppo Virtanen and Jouni Isoaho CoDRA: Context-based dynamically reconfigurable access control system for Android . . . . . . . . . . . . . . . . 1--17 Faheem Ullah and Matthew Edwards and Rajiv Ramdhany and Ruzanna Chitchyan and M. Ali Babar and Awais Rashid Data exfiltration: a review of external attack vectors and countermeasures . . . 18--54 Mohamed Amine Ferrag and Leandros Maglaras and Antonios Argyriou and Dimitrios Kosmanos and Helge Janicke Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes . . . . . . . . . . . . . . . . 55--82 Yao Shen and Wei Yang and Liusheng Huang Concealed in web surfing: Behavior-based covert channels in HTTP . . . . . . . . 83--95 Philip Parsch and Alejandro Masrur On reliable communication in transmit-only networks for home automation . . . . . . . . . . . . . . . 96--110 Lei Wang and Jianwei Niu and Houbing Song and Mohammed Atiquzzaman SentiRelated: a cross-domain sentiment classification algorithm for short texts through sentiment related index . . . . 111--119 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jin Cao and Maode Ma and Hui Li and Yulong Fu and Xuefeng Liu EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks . . . . . . . . . . . 1--16 Kumar Ravi and Yogesh Khandelwal and Boora Shiva Krishna and Vadlamani Ravi Analytics in/for cloud --- an interdependence: a review . . . . . . . 17--37 Vishal Sharma and Ilsun You and Fang-Yie Leu and Mohammed Atiquzzaman Secure and efficient protocol for fast handover in 5G mobile Xhaul networks . . 38--57 Naina Emmanuel and Abid Khan and Masoom Alam and Tanveer Khan and Muhammad Khurram Khan Structures and data preserving homomorphic signatures . . . . . . . . . 58--70 Usama Mir and Zeeshan Ahmed Bhatti Time triggered handoff schemes in cognitive radio networks: a survey . . . 71--85
Anonymous Editorial Board . . . . . . . . . . . . i--i Marcos Dias de Assunção and Alexandre da Silva Veith and Rajkumar Buyya Distributed data stream processing and edge computing: a survey on resource elasticity and future directions . . . . 1--17 Furui Zhan and Nianmin Yao and Zhenguo Gao and Haitao Yu Efficient key generation leveraging wireless channel reciprocity for MANETs 18--28 Haneet Kour and Rakesh Kumar Jha and Sanjeev Jain A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues . . . . . . . . . . 29--57 Sadip Midya and Asmita Roy and Koushik Majumder and Santanu Phadikar Multi-objective optimization technique for resource allocation and task scheduling in vehicular cloud architecture: a hybrid adaptive nature inspired approach . . . . . . . . . . . 58--84 Veerabhadra Rao Chandakanna REHDFS: a random read/write enhanced HDFS . . . . . . . . . . . . . . . . . . 85--100 Yuan Zhang and Lin Cui and Wei Wang and Yuxiang Zhang A survey on software defined networking with multiple controllers . . . . . . . 101--118 Laizhong Cui and Huaixiong Hu and Shui Yu and Qiao Yan and Zhong Ming and Zhenkun Wen and Nan Lu DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks . . . . . . . . . . . . 119--130 Giuseppe Aceto and Domenico Ciuonzo and Antonio Montieri and Antonio Pescapé Multi-classification approaches for classifying mobile app traffic . . . . . 131--145 Yan Huang and Zhipeng Cai and Anu G. Bourgeois Search locations safely and accurately: a location privacy protection algorithm with accurate service . . . . . . . . . 146--156 Sameh Zakhary and Abderrahim Benslimane On location-privacy in opportunistic mobile networks, a survey . . . . . . . 157--170 Jungang Lou and Yunliang Jiang and Qing Shen and Ruiqin Wang Failure prediction by relevance vector regression with improved quantum-inspired gravitational search 171--177 Lu Zhou and Quanlong Wang and Xin Sun and Piotr Kulicki and Arcangelo Castiglione Quantum technique for access control in cloud computing II: Encryption and key distribution . . . . . . . . . . . . . . 178--184 Changsong Yang and Xiaofeng Chen and Yang Xiang Blockchain-based publicly verifiable data deletion scheme for cloud storage 185--193 Xiong Li and Jianwei Niu and Saru Kumari and Fan Wu and Arun Kumar Sangaiah and Kim-Kwang Raymond Choo A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments . . . . 194--204 Guangjie Han and Wenhui Que and Gangyong Jia and Wenbo Zhang Resource-utilization-aware energy efficient server consolidation algorithm for green computing in IIOT . . . . . . 205--214 Qinying Lin and Houbing Song and Xiaolin Gui and Xiaoping Wang and Saiyu Su A shortest path routing algorithm for unmanned aerial systems based on grid position . . . . . . . . . . . . . . . . 215--224 Bin Cao and Jianwei Zhao and Zhihan Lv and Xin Liu and Xinyuan Kang and Shan Yang Deployment optimization for $3$D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism . . . . . . . . 225--238 Weishan Zhang and Gaowa Wulan and Jia Zhai and Liang Xu and Dehai Zhao and Xin Liu and Su Yang and Jiehan Zhou An intelligent power distribution service architecture using cloud computing and deep learning techniques 239--248 Muzzamil Noor and Haider Abbas and Waleed Bin Shahid Countering cyber threats for industrial applications: an automated approach for malware evasion detection and analysis 249--261 Keke Gai and Meikang Qiu and Xiaotong Sun A survey on FinTech . . . . . . . . . . 262--273 Deze Zeng and Shiyan Zhang and Lin Gu and Shui Yu and Zhangjie Fu Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system 274--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Amrita Bose Paul and Santosh Biswas and Sukumar Nandi and Sandip Chakraborty MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing . . . 1--20 Mahdi Zareei and A. K. M. Muzahidul Islam and Cesar Vargas-Rosales and Nafees Mansoor and Shidrokh Goudarzi and Mubashir Husain Rehmani Mobility-aware medium access control protocols for wireless sensor networks: A survey . . . . . . . . . . . . . . . . 21--37 Shuo Yu and Jiaying Liu and Zhuo Yang and Zhen Chen and Huizhen Jiang and Amr Tolba and Feng Xia PAVE: Personalized Academic Venue recommendation Exploiting co-publication networks . . . . . . . . . . . . . . . . 38--47 Jai Sukh Paul Singh and Mritunjay Kumar Rai CROP: Cognitive radio ROuting Protocol for link quality channel diverse cognitive networks . . . . . . . . . . . 48--60 Zainab AlSaeed and Imtiaz Ahmad and Iftekhar Hussain Multicasting in software defined networks: A comprehensive survey . . . . 61--77 Wenjie Ruan and Quan Z. Sheng and Lina Yao and Xue Li and Nickolas J. G. Falkner and Lei Yang Device-free human localization and tracking with UHF passive RFID tags: A data-driven approach . . . . . . . . . . 78--96 Anmin Fu and Yuhan Li and Shui Yu and Yan Yu and Gongxuan Zhang DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems . . . . . . . . . . . . . . . . 97--106 Alejandro Cánovas and Miran Taha and Jaime Lloret and Jesús Tomás Smart resource allocation for improving QoE in IP Multimedia Subsystems . . . . 107--116 Zeinab Rezaeifar and Jian Wang and Heekuck Oh A trust-based method for mitigating cache poisoning in Name Data Networking 117--132 Ruhul Amin and S. K. Hafizul Islam and Neeraj Kumar and Kim-Kwang Raymond Choo An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks 133--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mahmoud Bahnasy and Halima Elbiaze and Bochra Boughzala Zero-queue Ethernet congestion control protocol based on available bandwidth estimation . . . . . . . . . . . . . . . 1--20 Maryam Amiri and Leyli Mohammad-Khanli and Raffaela Mirandola A sequential pattern mining model for application workload prediction in cloud environment . . . . . . . . . . . . . . 21--62 Ivan Vidal and Jaime Garcia-Reinoso and Ignacio Soto and Francisco Valera and Diego Lopez SCoT: A secure content-oriented transport . . . . . . . . . . . . . . . 63--78 Naresh Kumar Reddy Beechu and Vasantha Moodabettu Harishchandra and Nithin Kumar Yernad Balachandra An energy-efficient fault-aware core mapping in mesh-based network on chip systems . . . . . . . . . . . . . . . . 79--87 Jorge Blasco and Thomas M. Chen and Igor Muttik and Markus Roggenbach Detection of app collusion potential using logic programming . . . . . . . . 88--104 Gao Liu and Zheng Yan and Witold Pedrycz Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey . . . . . . . . . . . 105--122 André Naz and Beno\^\it Piranda and Julien Bourgeois and Seth Copen Goldstein A time synchronization protocol for large-scale distributed embedded systems with low-precision clocks and neighbor-to-neighbor communications . . 123--142
Anonymous Editorial Board . . . . . . . . . . . . ii--ii G. Nardini and G. Stea and A. Virdis and A. Frangioni and L. Galli and D. Sabella and G. M. Dell'Aera Practical feasibility, scalability and effectiveness of coordinated scheduling algorithms in cellular networks towards 5G . . . . . . . . . . . . . . . . . . . 1--16 Sancheng Peng and Yongmei Zhou and Lihong Cao and Shui Yu and Jianwei Niu and Weijia Jia Influence analysis in social networks: A survey . . . . . . . . . . . . . . . . . 17--32 Shahid Md. Asif Iqbal and Asaduzzaman Adaptive forwarding strategies to reduce redundant Interests and Data in named data networks . . . . . . . . . . . . . 33--47 Lalatendu Muduli and Devi Prasad Mishra and Prasanta K. Jana Application of wireless sensor network for environmental monitoring in underground coal mines: A systematic review . . . . . . . . . . . . . . . . . 48--67 Koushik A. M. and Elizabeth Bentley and Fei Hu and Sunil Kumar A hardware testbed for learning-based spectrum handoff in cognitive radio networks . . . . . . . . . . . . . . . . 68--77 Flora Amato and Nicola Mazzocca and Francesco Moscato Model driven design and evaluation of security level in orchestrated cloud services . . . . . . . . . . . . . . . . 78--89 Li Yang and Ziyi Han and Zhengan Huang and Jianfeng Ma A remotely keyed file encryption scheme under mobile cloud computing . . . . . . 90--99 Tong Li and Zhengan Huang and Ping Li and Zheli Liu and Chunfu Jia Outsourced privacy-preserving classification service over encrypted data . . . . . . . . . . . . . . . . . . 100--110 Xiaohui Jin and Baojiang Cui and Dong Li and Zishuai Cheng and Congxian Yin An improved payload-based anomaly detector for web applications . . . . . 111--116 Jian Shen and Ziyuan Gui and Sai Ji and Jun Shen and Haowen Tan and Yi Tang Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks . . . . 117--123
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Nourhene Ellouze and Slim Rekhis and Noureddine Boudriga and Mohamed Allouche Powerless Security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform . . . . . . . . . . . . . . . . 1--21 Jaume Segura-Garcia and Santiago Felici-Castell and Miguel Garcia-Pineda Performance evaluation of different techniques to estimate subjective quality in live video streaming applications over LTE-Advance mobile networks . . . . . . . . . . . . . . . . 22--37 Shima Pakdaman Tirani and Avid Avokh On the performance of sink placement in WSNs considering energy-balanced compressive sensing-based data aggregation . . . . . . . . . . . . . . 38--55 José V. V. Sobral and Joel J. P. C. Rodrigues and Ricardo A. L. Rabelo and José C. Lima Filho and Natanael Sousa and Harilton S. Araujo and Raimir Holanda Filho A framework for enhancing the performance of Internet of Things applications based on RFID and WSNs . . 56--68 Yu-an Tan and Yuan Xue and Chen Liang and Jun Zheng and Quanxin Zhang and Jiamin Zheng and Yuanzhang Li A root privilege management scheme with revocable authorization for Android devices . . . . . . . . . . . . . . . . 69--82 Guangquan Xu and Jia Liu and Yanrong Lu and Xianjiao Zeng and Yao Zhang and Xiaoming Li A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks . . 83--92 Mukesh Kumar Giluka and Thomas Valerrian Pasca and Tathagat Priyadarshi and Bheemarjuna Reddy Tamma Enhanced class based dynamic priority scheduling to support uplink IoT traffic in LTE-A networks . . . . . . . . . . . 93--112 Jian Xu and Laiwen Wei and Yu Zhang and Andi Wang and Fucai Zhou and Chong-zhi Gao Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures . . . . . . . . . . . . . . . 113--124 Giuseppe Aceto and Valerio Persico and Antonio Pescapé The role of Information and Communication Technologies in healthcare: taxonomies, perspectives, and challenges . . . . . . . . . . . . . 125--154
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ahsan Saleem and Abid Khan and Furqan Shahid and M. Masoom Alam and Muhammad Khurram Khan Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits . . . . . . . . . . . . 1--19 Pingping Dong and Wenjun Yang and Wensheng Tang and Jiawei Huang and Haodong Wang and Yi Pan and Jianxin Wang Reducing transport latency for short flows with multipath TCP . . . . . . . . 20--36 Praveen Kumar P and Syam Kumar P and Alphonse P. J. A. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions . . . . . . . . . . . 37--52 Wassila Lalouani and Mohamed Younis and Nadjib Badache Interconnecting isolated network segments through intermittent links . . 53--63 Jiuxin Cao and Shuai Xu and Xuelin Zhu and Renjun Lv and Bo Liu Effective fine-grained location prediction based on user check-in pattern in LBSNs . . . . . . . . . . . . 64--75 José Francisco Colom and David Gil and Higinio Mora and Bruno Volckaert and Antonio Manuel Jimeno Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures . . 76--86 Muhammad Aqib Javed and Muhammad Shahzad Younis and Siddique Latif and Junaid Qadir and Adeel Baig Community detection in networks: A multidisciplinary review . . . . . . . . 87--111 Zechao Liu and Zoe L. Jiang and Xuan Wang and S. M. Yiu Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating . . . . . 112--123 Christian Esposito Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations . . . . . . 124--136
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Minh-Tuan Thai and Ying-Dar Lin and Po-Ching Lin and Yuan-Cheng Lai Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches . . . . . . . . . . . . . . 1--10 Souvik Basu and Ayanesh Biswas and Siuli Roy and Sipra DasBit Wise-PRoPHET: A Watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN . . . . . . . 11--23 Muhammad Ehatisham-ul-Haq and Muhammad Awais Azam and Usman Naeem and Yasar Amin and Jonathan Loo Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing 24--35 Yuan Rao and Cheng Deng and Gang Zhao and Yan Qiao and Lei-yang Fu and Xing Shao and Ru-chuan Wang Self-adaptive implicit contention window adjustment mechanism for QoS optimization in wireless sensor networks 36--52 Mauro A. A. da Cruz and Joel J. P. C. Rodrigues and Arun Kumar Sangaiah and Jalal Al-Muhtadi and Valery Korotaev Performance evaluation of IoT middleware 53--65 Ester López and Leandro Navarro Coordinated detection of forwarding faults in Wireless Community Networks 66--77 Xuangou Wu and Panlong Yang and Shaojie Tang and Xiao Zheng and Xiaolin Wang Privacy-aware data publishing against sparse estimation attack . . . . . . . . 78--88 G. Deepa and P. Santhi Thilagam and Amit Praseed and Alwyn R. Pais DetLogic: A black-box approach for detecting logic vulnerabilities in web applications . . . . . . . . . . . . . . 89--109
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mostafa Noshy and Abdelhameed Ibrahim and Hesham Arafat Ali Optimization of live virtual machine migration in cloud computing: A survey and future directions . . . . . . . . . 1--10 Umber Sheikh and Abid Khan and Bilal Ahmed and Abdul Waheed and Abdul Hameed Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges . . . . . . . . . . . 11--26 Arsany Guirguis and Mohammed Karmoose and Karim Habak and Mustafa El-Nainay and Moustafa Youssef Cooperation-based multi-hop routing protocol for cognitive radio networks 27--42 Qiang Yang and Wei Li and Jose Neuman de Souza and Albert Y. Zomaya Resilient virtual communication networks using multi-commodity flow based local optimal mapping . . . . . . . . . . . . 43--51 Vahideh Hayyolalam and Ali Asghar Pourhaji Kazem A systematic literature review on QoS-aware service composition and selection in cloud environment . . . . . 52--74 Choon Beng Tan and Mohd Hanafi Ahmad Hijazi and Yuto Lim and Abdullah Gani A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends . . . . . . 75--86 Fahri Wisnu Murti and Rahmat Faddli Siregar and Soo Young Shin SU-MIMO based uplink non-orthogonal multiple access for 5G . . . . . . . . . 87--96 Jin Li and Aniello Castiglione and Changyu Dong Special issue on security in cloud computing . . . . . . . . . . . . . . . 97--98 Agnieszka Jakóbik and Francesco Palmieri and Joanna Kolodziej Stackelberg games for modeling defense scenarios against cloud security threats 99--107 Dan Liao and Hui Li and Gang Sun and Ming Zhang and Victor Chang Location and trajectory privacy preservation in 5G-Enabled vehicle social network services . . . . . . . . 108--118
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Suman Bhattacharjee and Siuli Roy and Sipra DasBit DPDRM: A decentralized post-disaster resource management scheme using energy efficient smart phone based DTN . . . . 1--16 Hongtao Zhang and Ying Chen and Zihua Yang Hierarchical cache-aided transmission cooperation in 5G user-centric network: Performance analysis and design insights 17--27 Aohan Li and Guangjie Han A fairness-based MAC protocol for 5G Cognitive Radio Ad Hoc Networks . . . . 28--34 José Luis García-Dorado and Javier Ramos and Miguel Rodríguez and Javier Aracil DNS weighted footprints for web browsing analytics . . . . . . . . . . . . . . . 35--48 Sunny Behal and Krishan Kumar and Monika Sachdeva D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events . . . . . . . . 49--63 Chih-Cheng Tseng and Jyun-Yao Shih Two-stage coalition formation and radio resource allocation with Nash bargaining solution for inband underlaid D2D communications in 5G networks . . . . . 64--76 Farkhana Muchtar and Abdul Hanan Abdullah and Suhaidi Hassan and Farhan Masud Energy conservation strategies in Host Centric Networking based MANET: A review 77--98 Raaid Alubady and Suhaidi Hassan and Adib Habbal Pending interest table control management in Named Data Network . . . . 99--116 Guangliang Xu and Wei Yang and Liusheng Huang Hybrid covert channel in LTE-A: Modeling and analysis . . . . . . . . . . . . . . 117--126
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Faran Ahmed and Muhammad Naeem and Waleed Ejaz and Muhammad Iqbal and Alagan Anpalagan Resource management in cellular base stations powered by renewable energy sources . . . . . . . . . . . . . . . . 1--17 Rung-Shiang Cheng and Chung-Ming Huang and Sheng-Yuan Pan WiFi offloading using the device-to-device (D2D) communication paradigm based on the Software Defined Network (SDN) architecture . . . . . . . 18--28 Ziwen Sun and Yuhui Liu and Li Tao Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization . . . . . . . . . . . . . . 29--40 Ali Benzerbadj and Bouabdellah Kechar and Ahc\`ene Bounceur and Mohammad Hammoudeh Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links . . . . 41--52 Ravneet Kaur and Sarbjeet Singh and Harish Kumar Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches . . . . . . . . . . 53--88 Jin Li and Xiaofeng Chen and Sherman S. M. Chow and Qiong Huang and Duncan S. Wong and Zheli Liu Multi-authority fine-grained access control with accountability and its application in cloud . . . . . . . . . . 89--96 Karanpreet Singh and Paramvir Singh and Krishan Kumar User behavior analytics-based classification of application layer HTTP-GET flood attacks . . . . . . . . . 97--114 Mao Yang and Bo Li and Zhicheng Bai and Zhongjiang Yan SGMA: Semi-granted multiple access for non-orthogonal multiple access (NOMA) in 5G networking . . . . . . . . . . . . . 115--125 Ch. Md. Rakin Haider and Anindya Iqbal and Atif Hasan Rahman and M. Sohel Rahman An ensemble learning based approach for impression fraud detection in mobile advertising . . . . . . . . . . . . . . 126--141
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Xiong Wang and Qian Zhang and Jing Ren and Shizhong Xu and Sheng Wang and Shui Yu Toward efficient parallel routing optimization for large-scale SDN networks using GPGPU . . . . . . . . . . 1--13 Wei Jiang and Wanchun Jiang and Weiping Wang and Haodong Wang and Yi Pan and Jianxin Wang A fine-grained rule partition algorithm in cloud data centers . . . . . . . . . 14--25 Md. Arafatur Rahman and A. Taufiq Asyhari and Md Zakirul Alam Bhuiyan and Qusay Medhat Salih and Kamal Zuhairi Bin Zamli L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks . . . . . . . . 26--35 Giuseppe Aceto and Alessio Botta and Pietro Marchetta and Valerio Persico and Antonio Pescapé A comprehensive survey on Internet outages . . . . . . . . . . . . . . . . 36--63 Wenhong Tian and Majun He and Wenxia Guo and Wenqiang Huang and Xiaoyu Shi and Mingsheng Shang and Adel Nadjaran Toosi and Rajkumar Buyya On minimizing total energy consumption in the scheduling of virtual machine reservations . . . . . . . . . . . . . . 64--74 Xiaohong Huang and Tingting Yuan and Yan Zhang Utility-optimized bandwidth and power allocation for non-orthogonal multiple access in software defined 5G networks 75--86 Mohammed Y. Aalsalem and Wazir Zada Khan and Wajeb Gharibi and Muhammad Khurram Khan and Quratulain Arshad Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges . . . 87--97 Chih-Min Chao and Hsiang-Yuan Fu Supporting fast and fair rendezvous for cognitive radio networks . . . . . . . . 98--108 Yang Qin and Weihong Yang and Xiao Ai and Lingjian Chen Fault tolerant storage and data access optimization in data center networks . . 109--118 Ahmed Fahmin and Yuan-Cheng Lai and Md. Shohrab Hossain and Ying-Dar Lin Performance modeling and comparison of NFV integrated with SDN: Under or aside? 119--129
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Saad Saleh and Junaid Qadir and Muhammad U. Ilyas Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research 1--28 Alejandro Santoyo-González and Cristina Cervelló-Pastor Latency-aware cost optimization of the service infrastructure placement in 5G networks . . . . . . . . . . . . . . . . 29--37 Hsueh-Wen Tseng and Ting-Ting Yang and Wan-Chi Chang and Yu-Xiang Lan An efficient error prevention and recovery scheme for multicast traffic in data center networks . . . . . . . . . . 38--47 Jianfeng Guan and Zhijun Wei and Ilsun You GRBC-based Network Security Functions placement scheme in SDS for 5G security 48--56 Riham Elhabyan and Wei Shi and Marc St-Hilaire A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks . . . . . . . . . . . . 57--69 Michael Robinson and Kevin Jones and Helge Janicke and Leandros Maglaras An introduction to cyber peacekeeping 70--87 Wei-Che Chien and Chin-Feng Lai and Hsin-Hung Cho and Han-Chieh Chao A SDN-SFC-based service-oriented load balancing for the IoT applications . . . 88--97 Ya-Ju Yu and Ai-Chun Pang and Ming-Yu Yeh Video encoding adaptation for QoE maximization over 5G cellular networks 98--107 Haiyang Hu and Zhongjin Li and Hua Hu and Jie Chen and Jidong Ge and Chuanyi Li and Victor Chang Multi-objective scheduling for scientific workflow in multicloud environment . . . . . . . . . . . . . . 108--122 Amar Kaswan and Abhinav Tomar and Prasanta K. Jana An efficient scheduling scheme for mobile charger in on-demand wireless rechargeable sensor networks . . . . . . 123--134
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mohammad Etemad and Alptekin Küpçü Verifiable database outsourcing supporting join . . . . . . . . . . . . 1--19 Badiul Alam and Zhe Jin and Wun-She Yap and Bok-Min Goi An alignment-free cancelable fingerprint template for bio-cryptosystems . . . . . 20--32 Walaa N. Ismail and Mohammad Mehedi Hassan and Hessah A. Alsalamah and Giancarlo Fortino Mining productive-periodic frequent patterns in tele-health systems . . . . 33--47 Salvatore Cuomo and Raffaele Farina and Francesco Piccialli An inverse Bayesian scheme for the denoising of ECG signals . . . . . . . . 48--58 Shaymaa Akraa and Anh Pham Tran Tam and Haifeng Shen and Youhong Tang and Ben Zhong Tang and Jimmy Li and Sandy Walker A smartphone-based point-of-care quantitative urinalysis device for chronic kidney disease patients . . . . 59--69 Talal H. Noor and Sherali Zeadally and Abdullah Alfazi and Quan Z. Sheng Mobile cloud computing: Challenges and future research directions . . . . . . . 70--85 Majdi Rawashdeh and Mohammed Gh. Al Zamil and M. Shamim Hossain and Samer Samarah and Syed Umar Amin and Ghulam Muhammad Reliable service delivery in Tele-health care systems . . . . . . . . . . . . . . 86--93 Han-Chuan Hsieh and Jiann-Liang Chen and Abderrahim Benslimane 5G Virtualized Multi-access Edge Computing Platform for IoT Applications 94--102
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Otkrist Gupta and Ramesh Raskar Distributed learning of deep neural network over multiple agents . . . . . . 1--8 Donghao Zhou and Zheng Yan and Yulong Fu and Zhen Yao A survey on network data collection . . 9--23 Sanjay Kumar Biswash and Dushantha Nalin K. Jayakody Performance based user-centric dynamic mode switching and mobility management scheme for $5$G networks . . . . . . . . 24--34 Chun-Cheng Lin and Hui-Hsin Chin and Wei-Bo Chen Balancing latency and cost in software-defined vehicular networks using genetic algorithm . . . . . . . . 35--41 Chao Lin and Debiao He and Xinyi Huang and Kim-Kwang Raymond Choo and Athanasios V. Vasilakos BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 . . . . 42--52 Jia-Ming Liang and Po-Yen Chang and Jen-Jee Chen and Chien-Feng Huang and Yu-Chee Tseng Energy-efficient DRX scheduling for D2D communication in $5$G networks . . . . . 53--64 Mariacarla Staffa and Luigi Sgaglione and Giovanni Mazzeo and Luigi Coppolino and Salvatore D'Antonio and Luigi Romano and Erol Gelenbe and Oana Stan and Sergiu Carpov and Evangelos Grivas and Paolo Campegiani and Luigi Castaldo and Konstantinos Votis and Vassilis Koutkias and Ioannis Komnios An OpenNCP-based Solution for Secure eHealth Data Exchange . . . . . . . . . 65--85 Sergio Herrería-Alonso and Miguel Rodríguez-Pérez and Manuel Fernández-Veiga and Cándido López-García An optimal dynamic sleeping control policy for single base stations in green cellular networks . . . . . . . . . . . 86--94
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Weizhi Meng and Yu Wang and Duncan S. Wong and Sheng Wen and Yang Xiang TouchWB: Touch behavioral user authentication based on web browsing on smartphones . . . . . . . . . . . . . . 1--9 Yin Zhang and Raffaele Gravina and Huimin Lu and Massimo Villari and Giancarlo Fortino PEA: Parallel electrocardiogram-based authentication for smart healthcare systems . . . . . . . . . . . . . . . . 10--16 Domenico Calcaterra and Giuseppe Di Modica and Orazio Tomarchio and Placido Romeo A clinical decision support system to increase appropriateness of diagnostic imaging prescriptions . . . . . . . . . 17--29 Jamal Abdul Nasir and Shahid Hussain and Chuangyin Dang An Integrated Planning Approach Towards Home Health Care, Telehealth and Patients Group Based Care . . . . . . . 30--41 Hanane Lamaazi and Nabil Benamar OF--EC: a novel energy consumption aware objective function for RPL based on fuzzy logic. . . . . . . . . . . . . . . 42--58 Rodrigo S. Couto and Hugo Sadok and Pedro Cruz and Felipe F. da Silva and Tatiana Sciammarella and Miguel Elias M. Campista and Lu\'ìs Henrique M. K. Costa and Pedro B. Velloso and Marcelo G. Rubinstein Building an IaaS cloud with droplets: a collaborative experience with OpenStack 59--71 Yang Yang and Songtao Guo and Guiyan Liu and Yuanyuan Yang Two-layer compressive sensing based video encoding and decoding framework for WMSN . . . . . . . . . . . . . . . . 72--85 Yan Li and Shifang Dai and Weiwei Wu Cooperative video caching scheme over software defined passive optical network 86--100
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ishfaq Bashir Sofi and Akhil Gupta A survey on energy efficient $5$G green network with a planned multi-tier architecture . . . . . . . . . . . . . . 1--28 Musab Isah and Steven Simpson and Chris Edwards An Improved LISP Mobile Node Architecture . . . . . . . . . . . . . . 29--43 Nicholas Capurso and Bo Mei and Tianyi Song and Xiuzhen Cheng and Jiguo Yu A survey on key fields of context awareness for mobile devices . . . . . . 44--60 Nicolas Tsiftes and Thiemo Voigt Velox VM: a safe execution environment for resource-constrained IoT applications . . . . . . . . . . . . . . 61--73 Jenny I. Glitza and Frerk Müller-von Aschwege and Marco Eichelberg and Nils Reiss and Thomas Schmidt and Christina Feldmann and Regina Wendl and Jan D. Schmitto and Andreas Hein Advanced telemonitoring of Left Ventricular Assist Device patients for the early detection of thrombosis . . . 74--82 Karunanithy Kalaivanan and Velusamy Bhanumathi Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks . . 83--101 Anmin Fu and Shuai Li and Shui Yu and Yuqing Zhang and Yinxia Sun Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server . . . . . . . . . . . . . . . . . 102--112 Upasana Sarmah and D. K. Bhattacharyya and J. K. Kalita A survey of detection methods for XSS attacks . . . . . . . . . . . . . . . . 113--143 Chen Liang and Yu-an Tan and Xiaosong Zhang and Xianmin Wang and Jun Zheng and Quanxin Zhang Building packet length covert channel over mobile VoIP traffics . . . . . . . 144--153
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ivanoe De Falco and Antonio Della Cioppa and Tomas Koutny and Michal Krcma and Umberto Scafuri and Ernesto Tarantino Genetic Programming-based induction of a glucose-dynamics model for telemedicine 1--13 Armando Céspedes-Mota and Gerardo Castañón and Alberto F. Martínez-Herrera and Leopoldo Eduardo Cárdenas-Barrón and Ana María Sarmiento Differential evolution algorithm applied to wireless sensor distribution on different geometric shapes with area and energy optimization . . . . . . . . . . 14--23 Samet Tonyali and Ruben Munoz and Kemal Akkaya and Utku Ozgur A realistic performance evaluation of privacy-preserving protocols for smart grid AMI networks . . . . . . . . . . . 24--41 Habib Mostafaei and Michael Menth Software-defined wireless sensor networks: a survey . . . . . . . . . . . 42--56 Jianhui Lv and Xingwei Wang and Qingyi Zhang and Min Huang LAPGN: Accomplishing information consistency under OSPF in General Networks (an extension) . . . . . . . . 57--69 S. A. R. Shah and Wenji Wu and Qiming Lu and Liang Zhang and Sajith Sasidharan and Phil DeMar and Chin Guok and John Macauley and Eric Pouyoul and Jin Kim and Seo-Young Noh AmoebaNet: an SDN-enabled network service for big data science . . . . . . 70--82 Fei Gu and Jianwei Niu and Zhiping Qi and Mohammed Atiquzzaman Partitioning and offloading in smart mobile devices for mobile cloud computing: State of the art and future directions . . . . . . . . . . . . . . . 83--96 Xili Wan and Xinjie Guan and Tianjing Wang and Guangwei Bai and Baek-Yong Choi Application deployment using Microservice and Docker containers: Framework and optimization . . . . . . . 97--109 Yongnan Zhang and Yonghua Zhou Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing . . . . . . . . . . . . . . . 110--120
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Abhinav Jain and Sandeep Kumar FriendShare: a secure and reliable framework for file sharing on network 1--16 A. Bagula and M. Mandava and H. Bagula A framework for healthcare support in the rural and low income areas of the developing world . . . . . . . . . . . . 17--29 Nima Moradianzadeh and Pooya Moradian Zadeh and Ziad Kobti and Sarah Hansen and Kathryn Pfaff Using social network analysis to model palliative care . . . . . . . . . . . . 30--41 Abishi Chowdhury and Shital A. Raut A survey study on Internet of Things resource management . . . . . . . . . . 42--60 Parvaneh Asghari and Amir Masoud Rahmani and Hamid Haj Seyyed Javadi Service composition approaches in IoT: a systematic review . . . . . . . . . . . 61--77 Amol Vasudeva and Manu Sood Survey on sybil attack defense mechanisms in wireless ad hoc networks 78--118 Han-Peng Jiang and Wei-Mei Chen Self-adaptive resource allocation for energy-aware virtual machine placement in dynamic computing cloud . . . . . . . 119--129 K. Bilal and A. Erbad and M. Hefeeda QoE-aware distributed cloud-based live streaming of multisourced multiview videos . . . . . . . . . . . . . . . . . 130--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Maha Saadeh and Azzam Sleit and Khair Eddin Sabri and Wesam Almobaideen Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities . . . . . . 1--19 Dapeng Qu and Xingwei Wang and Min Huang and Keqin Li and Sajal K. Das and Sijin Wu A cache-aware social-based QoS routing scheme in Information Centric Networks 20--32 Dyson Pereira Junior and Emilio Carlos Gomes Wille FB-APSP: a new efficient algorithm for computing all-pairs shortest-paths . . . 33--43 Ahmed H. Anwar and George Atia and Mina Guirguis Adaptive topologies against jamming attacks in wireless networks: a game-theoretic approach . . . . . . . . 44--58 Longbiao Chen and Dingqi Yang and Daqing Zhang and Cheng Wang and Jonathan Li and Thi-Mai-Trang Nguyen Deep mobile traffic forecast and complementary base station clustering for C-RAN optimization . . . . . . . . . 59--69 Ranida Hamidouche and Zibouda Aliouat and Abdelhak Mourad Gueroui and Ado Adamou Abba Ari and Lemia Louail Classical and bio-inspired mobility in sensor networks for IoT applications . . 70--88 Waqas Rehan and Stefan Fischer and Maaz Rehan Anatomizing the robustness of multichannel MAC protocols for WSNs: an evaluation under MAC oriented design issues impacting QoS . . . . . . . . . . 89--118 M. Amarlingam and Pradeep Kumar Mishra and P. Rajalakshmi and Sumohana S. Channappayya and C. S. Sastry Novel Light Weight Compressed Data Aggregation using sparse measurements for IoT networks . . . . . . . . . . . . 119--134 Behnam Dezfouli and Immanuel Amirtharaj and Chia-Chi (Chelsey) Li EMPIOT: an energy measurement platform for wireless IoT devices . . . . . . . . 135--148 Teodora Sanislav and Sherali Zeadally and George Dan Mois and Silviu Corneliu Folea Wireless energy harvesting: Empirical results and practical considerations for Internet of Things . . . . . . . . . . . 149--158
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Lei Zhou and Anmin Fu and Shui Yu and Mang Su and Boyu Kuang Data integrity verification of the outsourced big data in the cloud environment: a survey . . . . . . . . . 1--15 Xu Lu and Jun Liu and Wei Qi and Qingyun Dai Multiple-target tracking based on compressed sensing in the Internet of Things . . . . . . . . . . . . . . . . . 16--23 Deepak Singh and Bryan Ng and Yuan-Cheng Lai and Ying-Dar Lin and Winston K. G. Seah Modelling Software-Defined Networking: Software and hardware switches . . . . . 24--36 De-gan Zhang and Ting Zhang and Yue Dong and Xiao-huan Liu and Yu-ya Cui and De-xin Zhao Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning . . . . . . 37--49 Yinghui Zhang and Jin Li and Dong Zheng and Ping Li and Yangguang Tian Privacy-preserving communication and power injection over vehicle networks and $5$G smart grid slice . . . . . . . 50--60 Youcef Imine and Ahmed Lounis and Abdelmadjid Bouabdallah Revocable attribute-based access control in multi-authority systems . . . . . . . 61--76 Diogo Menezes Ferrazani Mattos and Otto Carlos Muniz Bandeira Duarte and Guy Pujolle A lightweight protocol for consistent policy update on software-defined networking with multiple controllers . . 77--87 Chuan Xu and Wenqiang Jin and Xinheng Wang and Guofeng Zhao and Shui Yu MC-VAP: a multi-connection virtual access point for high performance software-defined wireless networks . . . 88--98 Vinícius F. S. Mota and Thiago H. Silva and Daniel F. Macedo and Yacine Ghamri-Doudane and José M. S. Nogueira Towards scalable mobile crowdsensing through device-to-device communication 99--106 Debasis Das and Rajiv Misra Improvised dynamic network connectivity model for Vehicular Ad-Hoc Networks (VANETs) . . . . . . . . . . . . . . . . 107--114 Franco Cicirelli and Agostino Forestiero and Andrea Giordano and Carlo Mastroianni Parallelization of space-aware applications: Modeling and performance analysis . . . . . . . . . . . . . . . . 115--127 Mahmood Javadi and Habib Mostafaei and Morshed U. Chowdhurry and Jemal H. Abawajy Learning automaton based topology control protocol for extending wireless sensor networks lifetime . . . . . . . . 128--136 Reza Ghebleh and Ali Ghaffari Retraction notice to ``A comprehensive survey on $5$G: the prospect of future communications'' [J. Netw. Comput. Appl. 94 (2017) 1--32] . . . . . . . . . . . . 137--137
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Qikun Zhang and Yong Gan and Lu Liu and Xianmin Wang and Xiangyang Luo and Yuanzhang Li An authenticated asymmetric group key agreement based on attribute encryption 1--10 Md. Ahsan Habib and Sajeeb Saha and Md. Abdur Razzaque and Md. Mamun-or-Rashid and Giancarlo Fortino and Mohammad Mehedi Hassan Starfish routing for sensor networks with mobile sink . . . . . . . . . . . . 11--22 Chenglong Shao and Heejun Roh and Wonjun Lee Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives . . . . . . . . . 23--31 Antesar M. Shabut and M. Shamim Kaiser and Keshav P. Dahal and Wenbing Chen A multidimensional trust evaluation model for MANETs . . . . . . . . . . . . 32--41 Farah Khedim and Nabila Labraoui and Ado Adamou Abba Ari A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks . . 42--56 Roberto Di Pietro and Gabriele Oligeri GopJam: Key-less jamming mitigation via gossiping . . . . . . . . . . . . . . . 57--68 Dimitrios Sikeridis and Eirini Eleni Tsiropoulou and Michael Devetsikiotis and Symeon Papavassiliou Wireless powered Public Safety IoT: a UAV-assisted adaptive-learning approach towards energy efficiency . . . . . . . 69--79 Sara Kassan and Jaafar Gaber and Pascal Lorenz Game theory based distributed clustering approach to maximize wireless sensors network lifetime . . . . . . . . . . . . 80--88 Yinghui Zhang and Robert H. Deng and Gang Han and Dong Zheng Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things . . . . . 89--100 Jiangang Shu and Ximeng Liu and Yinghui Zhang and Xiaohua Jia and Robert H. Deng Dual-side privacy-preserving task matching for spatial crowdsourcing . . . 101--111 Mohammad Wazid and Ashok Kumar Das and Athanasios V. Vasilakos Authenticated key management protocol for cloud-assisted body area sensor networks . . . . . . . . . . . . . . . . 112--126
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Imen Mahjri and Amine Dhraief and Abdelfettah Belghith and Sofien Gannouni and Issam Mabrouki and Maram AlAjlan Collision risk assessment in Flying Ad Hoc aerial wireless networks . . . . . . 1--13 Daniel Morato and Eduardo Berrueta and Eduardo Magaña and Mikel Izal Ransomware early detection by the analysis of file sharing traffic . . . . 14--32 Dina Shehada and Chan Yeob Yeun and M. Jamal Zemerly and Mahmoud Al-Qutayri and Yousof Al-Hammadi and Jiankun Hu A new adaptive trust and reputation model for Mobile Agent Systems . . . . . 33--43 Abdullah Al Zishan and Imtiaz Karim and Sudipta Saha Shubha and Ashikur Rahman Maximizing heterogeneous coverage in over and under provisioned visual sensor networks . . . . . . . . . . . . . . . . 44--62 Qi Liao and Ting Li and Benjamin A. Blakely Anomaly analysis and visualization for dynamic networks through spatiotemporal graph segmentations . . . . . . . . . . 63--79 Ruben Ricart-Sanchez and Pedro Malagon and Pablo Salva-Garcia and Enrique Chirivella Perez and Qi Wang and Jose M. Alcaraz Calero Towards an FPGA-Accelerated programmable data path for edge-to-core communications in $5$G networks . . . . 80--93 Waheed Iqbal and Abdelkarim Erradi and Arif Mahmood Dynamic workload patterns prediction for proactive auto-scaling of web applications . . . . . . . . . . . . . . 94--107 Jianwei Zhang and Xinchang Zhang and Meng Sun and Chunling Yang Maximizing streaming efficiency of multiple streams in peer-to-peer networks . . . . . . . . . . . . . . . . 108--120 Khaled Hejja and Xavier Hesselbach Online power aware coordinated virtual network embedding with $5$G delay constraint . . . . . . . . . . . . . . . 121--136 Satoshi Utsumi and Salahuddin Muhammad Salim Zabir and Yuto Usuki and Seisho Takeda and Norio Shiratori and Yasushi Kato and Jeyeon Kim A new analytical model of TCP Hybla for satellite IP networks . . . . . . . . . 137--147 Xiaolong Xu and Shucun Fu and Lianyong Qi and Xuyun Zhang and Qingxiang Liu and Qiang He and Shancang Li An IoT-Oriented data placement method with privacy preservation in cloud environment . . . . . . . . . . . . . . 148--157 Shuyue Chen and Chin-Tau Lea Constraint-based scheduling algorithm with the non-adjacency requirement for multi-flow AWG switches . . . . . . . . 158--168 Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Michele Maasberg and Kim-Kwang Raymond Choo Multimedia big data computing and Internet of Things applications: a taxonomy and process model . . . . . . . 169--195
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Anonymous Thank You Reviewers . . . . . . . . . . iii--xii I. Val and A. Etxabe and R. Torrego and P. M. Rodriguez and C. Cruces and V. Diez and M. Mendicute and A. Arriola Design, analysis and implementation of a time-bounded spectrum handoff algorithm for real-time industrial wireless sensor and actuator networks . . . . . . . . . 1--16 Seema Kharb and Anita Singhrova Fuzzy based priority aware scheduling technique for dense industrial IoT networks . . . . . . . . . . . . . . . . 17--27 V. Indu and Sabu M. Thampi A nature --- inspired approach based on Forest Fire model for modeling rumor propagation in social networks . . . . . 28--41 Srikant Manas Kala and Vanlin Sathya and M. Pavan Kumar Reddy and Betty Lala and Bheemarjuna Reddy Tamma A socio-inspired CALM approach to channel assignment performance prediction and WMN capacity estimation 42--66 Vishal Sharma and Jianfeng Guan and Jiyoon Kim and Soonhyun Kwon and Ilsun You and Francesco Palmieri and Mario Collotta MIH-SPFP: MIH-base secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks . . . . . . . . . . . 67--81 Zhitao Guan and Yue Zhang and Longfei Wu and Jun Wu and Jing Li and Yinglong Ma and Jingjing Hu APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT . . . . . . . . . . . . 82--92 Jinfang Jiang and Guangjie Han and Hao Wang and Mohsen Guizani A survey on location privacy protection in Wireless Sensor Networks . . . . . . 93--114 Anil Kumar Rangisetti and Bheemarjuna Reddy Tamma Interference and QoS aware cell switch-off strategy for software defined LTE HetNets . . . . . . . . . . . . . . 115--129 Chao Bu and Xingwei Wang and Hui Cheng and Min Huang and Keqin Li Routing as a service (RaaS): an open framework for customizing routing services . . . . . . . . . . . . . . . . 130--145 Alper Bereketli and Muharrem Tümçakir and Burcu Yeni P-AUV: Position aware routing and medium access for ad hoc AUV networks . . . . . 146--154 Kostas Kolomvatsos Time-optimized management of mobile IoT nodes for pervasive applications . . . . 155--167 Zhuhua Liao and Zengde Teng and Jian Zhang and Yizhi Liu and Hao Xiao and Aiping Yi A Semantic Concast service for data discovery, aggregation and processing on NDN . . . . . . . . . . . . . . . . . . 168--178 Garima Chopra and Rakesh Kumar Jha and Sanjeev Jain RBA: Region Based Algorithm for secure harvesting in Ultra Dense Network . . . 179--189 Zhen Liu and Ruoyu Wang and Nathalie Japkowicz and Yongming Cai and Deyu Tang and Xianfa Cai Mobile app traffic flow feature extraction and selection for improving classification robustness . . . . . . . 190--208 Shuhua Deng and Xing Gao and Zebin Lu and Zhengfa Li and Xieping Gao DoS vulnerabilities and mitigation strategies in software-defined networks 209--219 Xiuquan Qiao and Pei Ren and Junliang Chen and Wei Tan and M. Brian Blake and Wangli Xu Session persistence for dynamic web applications in Named Data Networking 220--235 Weijie Han and Jingfeng Xue and Yong Wang and Zhenyan Liu and Zixiao Kong MalInsight: a systematic profiling based malware detection framework . . . . . . 236--250 Imran Makhdoom and Mehran Abolhasan and Haider Abbas and Wei Ni Blockchain's adoption in IoT: the challenges, and a way forward . . . . . 251--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ming Tao and Wenhong Wei and Shuqiang Huang Location-based trustworthy services recommendation in cooperative-communication-enabled Internet of Vehicles . . . . . . . . . . 1--11 Ahmed Aziz and Karan Singh and Walid Osamy and Ahmed M. Khedr Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications . . . . . . . . 12--28 Xiaosong Zhang and Liehuang Zhu and Xianmin Wang and Changyou Zhang and Hongfei Zhu and Yu-an Tan A packet-reordering covert channel over VoLTE voice and video traffics . . . . . 29--38 Tong Li and Chongzhi Gao and Liaoliang Jiang and Witold Pedrycz and Jian Shen Publicly verifiable privacy-preserving aggregation and its application in IoT 39--44 Qi Feng and Debiao He and Sherali Zeadally and Muhammad Khurram Khan and Neeraj Kumar A survey on privacy protection in blockchain system . . . . . . . . . . . 45--58 Seema Kharb and Anita Singhrova A survey on network formation and scheduling algorithms for time slotted channel hopping in industrial networks 59--87 Huaqing Lin and Zheng Yan and Yulong Fu Adaptive security-related data collection with context awareness . . . 88--103 EmadelDin A. Mazied and Mustafa Y. ElNainay and Mohammad J. Abdel-Rahman and Scott F. Midkiff and Mohamed R. M. Rizk and Hesham A. Rakha and Allen B. MacKenzie The wireless control plane: an overview and directions for future research . . . 104--122 Karim Akilal and Hachem Slimani and Mawloud Omar A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric . . . . . . . . . . 123--132 Cleverton Vicentini and Altair Santin and Eduardo Viegas and Vilmar Abreu SDN-based and multitenant-aware resource provisioning mechanism for cloud-based big data streaming . . . . . . . . . . . 133--149 Abderazek Seba and Nadia Nouali-Taboudjemat and Nadjib Badache and Hamida Seba A review on security challenges of wireless communications in disaster emergency response and crisis management situations . . . . . . . . . . . . . . . 150--161 Fatemeh Shabestari and Amir Masoud Rahmani and Nima Jafari Navimipour and Sam Jabbehdari A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop . . 162--177
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Rahmat Faddli Siregar and Fahri Wisnu Murti and Soo Young Shin Bit allocation approach of spatial modulation for multi-user scenario . . . 1--8 Sanaa Kawther Ghalem and Bouabdellah Kechar and Ahc\`ene Bounceur and Reinhardt Euler A probabilistic multivariate copula-based technique for faulty node diagnosis in wireless sensor networks 9--25 Francesc Wilhelmi and Sergio Barrachina-Muñoz and Boris Bellalta and Cristina Cano and Anders Jonsson and Gergely Neu Potential and pitfalls of Multi-Armed Bandits for decentralized Spatial Reuse in WLANs . . . . . . . . . . . . . . . . 26--42 Licheng Wang and Xiaoying Shen and Jing Li and Jun Shao and Yixian Yang Cryptographic primitives in blockchains 43--58 Hui Tian and Fulin Nan and Chin-Chen Chang and Yongfeng Huang and Jing Lu and Yongqian Du Privacy-preserving public auditing for secure data storage in fog-to-cloud computing . . . . . . . . . . . . . . . 59--69 Orhan Dagdeviren and Vahid Khalilpour Akram and Ali Farzan A Distributed Evolutionary algorithm for detecting minimum vertex cuts for wireless ad hoc and sensor networks . . 70--81 Kiran Ahuja and Arun Khosla Network selection criterion for ubiquitous communication provisioning in smart cities for smart energy system . . 82--91 Li Yang and Yifang Zhi and Teng Wei and Shui Yu and Jianfeng Ma Inference attack in Android activity based on program fingerprint . . . . . . 92--106 Mehmet Fatih Tuysuz and Murat Ucan and Ramona Trestian A real-time power monitoring and energy-efficient network/interface selection tool for Android smartphones 107--121 Xiuwen Sun and Hao Li and Dan Zhao and Xingxing Lu and Kaiyu Hou and Chengchen Hu COIN: a fast packet inspection method over compressed traffic . . . . . . . . 122--134
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Salah-Eddine Belouanas and Kim-Loan Thai and Prométhée Spathis and Marcelo Dias de Amorim Mobility-assisted offloading in centrally-coordinated cellular networks 1--10 Lingling Xu and Jin Li and Xiaofeng Chen and Wanhua Li and Shaohua Tang and Hao-Tian Wu Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things . . . . . . . . . . . . . . . 11--20 Haomiao Yang and Xiaofen Wang and Chun Yang and Xin Cong and You Zhang Securing content-centric networks with content-based encryption . . . . . . . . 21--32 Nour Moustafa and Jiankun Hu and Jill Slay A holistic review of Network Anomaly Detection Systems: a comprehensive survey . . . . . . . . . . . . . . . . . 33--55 Wenjuan Li and Weizhi Meng and Zhiyuan Tan and Yang Xiang Design of multi-view based email classification for IoT systems via semi-supervised learning . . . . . . . . 56--63 Mainak Adhikari and Sudarshan Nandy and Tarachand Amgoth Meta heuristic-based task deployment mechanism for load balancing in IaaS cloud . . . . . . . . . . . . . . . . . 64--77 Helder M. N. S. Oliveira and Nelson L. S. da Fonseca Routing, spectrum and core assignment algorithms for protection of space division multiplexing elastic optical networks . . . . . . . . . . . . . . . . 78--89 Aparna Kumari and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar and Reza M. Parizi and Kim-Kwang Raymond Choo Fog data analytics: a taxonomy and process model . . . . . . . . . . . . . 90--104 Hanan Elazhary Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions . . . . . . . . . . . . . . . 105--140
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Qingchen Zhang and Changchuan Bai and Zhikui Chen and Peng Li and Shuo Wang and He Gao Smart Chinese medicine for hypertension treatment with a deep learning model . . 1--8 Shahriar Kaisar and Joarder Kamruzzaman and Gour Karmakar A dynamic content distribution scheme for decentralized sharing in tourist hotspots . . . . . . . . . . . . . . . . 9--24 Voundi Koe Arthur Sandor and Yaping Lin and Xiehua Li and Feng Lin and Shiwen Zhang Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage . . . . . . . . . . . 25--36 Siguang Chen and Shujun Zhang and Xiaoyao Zheng and Xiukai Ruan Layered adaptive compression design for efficient data collection in industrial wireless sensor networks . . . . . . . . 37--45 Yanling Shao and Chunlin Li and Zhao Fu and Leyue Jia and Youlong Luo Cost-effective replication management and scheduling in edge computing . . . . 46--61 Haichun Zhao and Xuanxia Yao and Xuefeng Zheng and Tie Qiu and Huansheng Ning User stateless privacy-preserving TPA auditing scheme for cloud storage . . . 62--70 Mittal K. Pedhadiya and Rakesh Kumar Jha and Hetal G. Bhatt Device to device communication: a survey 71--89
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Gang Liu and Wei Quan and Nan Cheng and Hongke Zhang and Shui Yu Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things . . . . . . . . . . . . . . . . . 1--13 Firas D. Ahmed and Mazlina Abdul Majid Towards agent-based Petri net decision making modelling for cloud service composition: a literature survey . . . . 14--38 Hamza Ben-Ammar and Yassine Hadjadj-Aoul and Gerardo Rubino and Soraya Ait-Chellouche On the performance analysis of distributed caching systems using a customizable Markov chain model . . . . 39--51 Menatalla Abououf and Rabeb Mizouni and Shakti Singh and Hadi Otrok and Anis Ouali Multi-worker multi-task selection framework in mobile crowd sourcing . . . 52--62 Pasquale Imputato and Stefano Avallone Enhancing the fidelity of network emulation through direct access to device buffers . . . . . . . . . . . . . 63--75 Yuan-Cheng Lai and Ahsan Ali and Md. Shohrab Hossain and Ying-Dar Lin Performance modeling and analysis of TCP and UDP flows over software defined networks . . . . . . . . . . . . . . . . 76--88 Rahul Kumar Verma and K. K. Pattanaik and Sourabh Bharti and Divya Saxena In-network context inference in IoT sensory environment for efficient network resource utilization . . . . . . 89--103 Antonio Celesti and Antoine Bagula and Ivanoe De Falco and Pedro Brandão and Giovanna Sannino Emerging Networked Computer Applications for Telemedicine . . . . . . . . . . . . 104--106
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Chunlin Li and Jianhang Tang and Youlong Luo Dynamic multi-user computation offloading for wireless powered mobile edge computing . . . . . . . . . . . . . 1--15 Yuxin Liu and Anfeng Liu and Ning Zhang and Xiao Liu and Ming Ma and Yanling Hu DDC: Dynamic duty cycle for improving delay and energy efficiency in wireless sensor networks . . . . . . . . . . . . 16--27 Wander Queiroz and Miriam A. M. Capretz and Mario Dantas An approach for SDN traffic monitoring based on big data techniques . . . . . . 28--39 Tusher Chakraborty and Novia Nurain and Suraiya Tairin and Taslim Arefin Khan and Jannatun Noor and Md. Rezwanul Islam and A. B. M. Alim Al Islam A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks . . . . . 40--54 Minghao Zhao and Chengyu Hu and Xiangfu Song and Chuan Zhao Towards dependable and trustworthy outsourced computing: a comprehensive survey and tutorial . . . . . . . . . . 55--65 Bidi Ying and Amiya Nayak Lightweight remote user authentication protocol for multi-server $5$G networks using self-certified public key cryptography . . . . . . . . . . . . . . 66--74 Jiawei Huang and Shuping Li and Rui Han and Jianxin Wang Receiver-driven fair congestion control for TCP outcast in data center networks 75--88 Rishikesh Sahay and Weizhi Meng and Christian D. Jensen The application of Software Defined Networking on securing computer networks: a survey . . . . . . . . . . . 89--108 Muchtar Farkhana and Abdullah Abdul Hanan and Hassan Suhaidi and Khader Ahamad Tajudin and Zamli Kamal Zuhairi Energy conservation of content routing through wireless broadcast control in NDN based MANET: a review . . . . . . . 109--132
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jinyoung Han and Daejin Choi and Taejoong Chung and Chen-Nee Chuah and Hyun-chul Kim and Ted Taekyoung Kwon Predicting content consumption from content-to-content relationships . . . . 1--9 P. Thulasiraman and T. Haakensen and A. Callanan Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation . . . . 10--21 Ruan D. Gomes and Cesar Benavente-Peces and Iguatemi E. Fonseca and Marcelo S. Alencar Adaptive and Beacon-based multi-channel protocol for Industrial Wireless Sensor Networks . . . . . . . . . . . . . . . . 22--39 Wenyuan Han and Weijiang Liu and Kaiye Zhang and Zhiyang Li and Zhaobin Liu A protocol for detecting missing target tags in RFID systems . . . . . . . . . . 40--48 Sharleen Joy Y. Go and Cedric Angelo M. Festin and Wilson M. Tan An SDN-based framework for improving the performance of underprovisioned IP Video Surveillance networks . . . . . . . . . 49--74 Shi Dong and Raj Jain Flow online identification method for the encrypted Skype . . . . . . . . . . 75--85 Xiangjie Kong and Yajie Shi and Shuo Yu and Jiaying Liu and Feng Xia Academic social networks: Modeling analysis, mining and applications . . . 86--103 Nouman Ashraf and Muhammad Faizan and Waqar Asif and Hassaan Khaliq Qureshi and Adnan Iqbal and Marios Lestas Energy management in harvesting enabled sensing nodes: Prediction and control 104--117 Abhishek Gupta and Alagan Anpalagan and Glaucio H. S. Carvalho and Ahmed S. Khwaja and Ling Guan and Isaac Woungang RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: a survey . . . 118--148
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Masoume Jabbarifar and Alireza Shameli-Sendi and Bettina Kemme A scalable network-aware framework for cloud monitoring orchestration . . . . . 1--14 Shanshan Wang and Zhenxiang Chen and Qiben Yan and Bo Yang and Lizhi Peng and Zhongtian Jia A mobile malware detection method using behavior features in network traffic . . 15--25 Md. Tareq Mahmud and Md. Obaidur Rahman and Mohammad Mehedi Hassan and Ahmad Almogren and Mengchu Zhou An Efficient Cooperative Medium Access Control Protocol for Wireless IoT networks in Smart World System . . . . . 26--38 Muluneh Mekonnen Tulu and Ronghui Hou and Talha Younas Vital nodes extracting method based on user's behavior in $5$G mobile social networks . . . . . . . . . . . . . . . . 39--50 Kehua Guo and Rui Cao and Xiaoyan Kui and Jianhua Ma and Jian Kang and Tao Chi LCC: Towards efficient label completion and correction for supervised medical image learning in smart diagnosis . . . 51--59 Mohammed Abdullahi and Md Asri Ngadi and Salihu Idi Dishing and Shafi'i Muhammad Abdulhamid and Barroon Isma'eel Ahmad An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment . . . . . . . . . . . . . . 60--74 Xiaolong Xu and Yuancheng Li and Tao Huang and Yuan Xue and Kai Peng and Lianyong Qi and Wanchun Dou An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks . . 75--85 Alexandre B. Barreto and Paulo C. G. Costa Cyber-ARGUS --- a mission assurance framework . . . . . . . . . . . . . . . 86--108 Jiawei Li and Hongbin Luo and Shan Zhang and Hongyi Li and Fei Yan Design and implementation of efficient control for incoming inter-domain traffic with Information-Centric Networking . . . . . . . . . . . . . . . 109--125
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Tong Wang and Leszek Lilien Opportunistic topology control for ad hoc wireless network survivability enhancement based on LIMOS model . . . . 1--12 Lichuan Ma and Qingqi Pei and Yong Xiang and Lina Yao and Shui Yu A reliable reputation computation framework for online items in E-commerce 13--25 Huiying Hou and Jia Yu and Rong Hao Cloud storage auditing with deduplication supporting different security levels according to data popularity . . . . . . . . . . . . . . . 26--39 Kai Guo and Mingcong Yang and Yongbing Zhang and Xiaohua Jia Efficient resource assignment in mobile edge computing: a dynamic congestion-aware offloading approach . . 40--51 JiLiang Li and WeiGuo Zhang and Vivek Dabra and Kim-Kwang Raymond Choo and Saru Kumari and Dieter Hogrefe AEP-PPA: an anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities . . . . . . . . 52--61 Yongxin Liu and Jianqiang Li and Zhong Ming and Houbing Song and Xiaoxiong Weng and Jian Wang Domain-specific data mining for residents' transit pattern retrieval from incomplete information . . . . . . 62--71 Su Peng and Fucai Zhou and Jin Li and Qiang Wang and Zifeng Xu Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas . . . . . . . . . . . 72--88 Gang Sun and Siyu Sun and Jian Sun and Hongfang Yu and Xiaojiang Du and Mohsen Guizani Security and privacy preservation in fog-based crowd sensing on the Internet of Vehicles . . . . . . . . . . . . . . 89--99 Azadeh Zamanifar and Eslam Nazemi RETRACTED: An approach for predicting health status in IoT health care . . . . 100--113
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Xuxin Zhang and Honglong Chen and Kai Lin and Zhibo Wang and Jiguo Yu and Leyi Shi RMTS: a robust clock synchronization scheme for wireless sensor networks . . 1--10 Tian Wang and Yuzhu Liang and Weijia Jia and Muhammad Arif and Anfeng Liu and Mande Xie Coupling resource management based on fog computing in smart city systems . . 11--19 Muhammad Toaha Raza Khan and Syed Hassan Ahmed and Yalew Zelalem Jembre and Dongkyun Kim An energy-efficient data collection protocol with AUV path planning in the Internet of Underwater Things . . . . . 20--31 Gonzalo De La Torre Parra and Paul Rad and Kim-Kwang Raymond Choo Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenge's and opportunities 32--46 Yingya Guo and Zhiliang Wang and Han Zhang and Xia Yin and Xingang Shi and Jianping Wu Joint optimization of tasks placement and routing to minimize Coflow Completion Time . . . . . . . . . . . . 47--61 Thomas McGhin and Kim-Kwang Raymond Choo and Charles Zhechao Liu and Debiao He Blockchain in healthcare applications: Research challenges and opportunities 62--75 Asmaa Elsaeidy and Kumudu S. Munasinghe and Dharmendra Sharma and Abbas Jamalipour Intrusion detection in smart cities using Restricted Boltzmann Machines . . 76--83 Rúben Vales and José Moura and Rui Marinheiro Energy-aware and adaptive fog storage mechanism with data replication ruled by spatio-temporal content popularity . . . 84--96 Adib Habbal and Swetha Indudhar Goudar and Suhaidi Hassan A Context-aware Radio Access Technology selection mechanism in $5$G mobile network for smart city applications . . 97--107 Giovanni Pau and Alessandro Bazzi and Miguel Elias M. Campista and Ali Balador Towards $5$G and beyond for the Internet of UAVs, vehicles, smartphones, Sensors and Smart Objects . . . . . . . . . . . 108--109
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Xin Jin and Fei Gu and Jianwei Niu and Shui Yu and Zhenchao Ouyang HRCal: an effective calibration system for heart rate detection during exercising . . . . . . . . . . . . . . . 1--10 Feng Wang and Wenjun Jiang and Guojun Wang and Song Guo Influence maximization by leveraging the crowdsensing data in information diffusion network . . . . . . . . . . . 11--21 Deepak Singh and Bryan Ng and Yuan-Cheng Lai and Ying-Dar Lin and Winston K. G. Seah Analytical Modelling of Software and Hardware Switches with Internal Buffer in Software-Defined Networks . . . . . . 22--37 Carlos Guimarães and José Quevedo and Rui Ferreira and Daniel Corujo and Rui L. Aguiar Exploring interoperability assessment for Future Internet Architecture's roll out . . . . . . . . . . . . . . . . . . 38--56 Xiaoping Wu and Xuefen Zhu and Shenghui Wang and Lufeng Mo Cooperative motion parameter estimation using RSS measurements in robotic sensor networks . . . . . . . . . . . . . . . . 57--70 Celyn Birkinshaw and Elpida Rouka and Vassilios G. Vassilakis Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks . . . . . . . . . . . . . . . . 71--85 Kashif Bilal and Emna Baccour and Aiman Erbad and Amr Mohamed and Mohsen Guizani Collaborative joint caching and transcoding in mobile edge networks . . 86--99 Ripon Patgiri and Sabuzima Nayak and Samir Kumar Borgohain rDBF: a $r$-Dimensional Bloom Filter for massive scale membership query . . . . . 100--113 Marco Antonio Sotelo Monge and Andrés Herranz González and Borja Lorenzo Fernández and Diego Maestre Vidal and Guillermo Rius Garc\'ìa and Jorge Maestre Vidal Traffic-flow analysis for source-side DDoS recognition on $5$G environments 114--131 Murat Karakus and Arjan Durresi An economic framework for analysis of network architectures: SDN and MPLS cases . . . . . . . . . . . . . . . . . 132--146
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mian Ahmad Jan and Wenjing Zhang and Muhammad Usman and Zhiyuan Tan and Fazlullah Khan and Entao Luo SmartEdge: an end-to-end encryption framework for an edge-enabled smart city application . . . . . . . . . . . . . . 1--10 Xiuwen Fu and Haiqing Yao and Octavian Postolache and Yongsheng Yang Message forwarding for WSN-Assisted Opportunistic Network in disaster scenarios . . . . . . . . . . . . . . . 11--24 A. I. C. Mohideen and M. Rajiullah and R. Secchi and G. Fairhurst and A. Brunstrom and F. Weinrank Evaluating the impact of transport mechanisms on web performance for effective web access . . . . . . . . . . 25--34 Mainak Adhikari and Satish Narayana Srirama Multi-objective accelerated particle swarm optimization with a container-based scheduling for Internet-of-Things in cloud environment 35--61 Muhammad Usman Younus and Saif ul Islam and Ihsan Ali and Suleman Khan and Muhammad Khurram Khan A survey on software defined networking enabled smart buildings: Architecture challenges and use cases . . . . . . . . 62--77 Rudraksh Shrivastava and Konstantinos Samdanis and Vincenzo Sciancalepore Towards service-oriented soft spectrum slicing for $5$G TDD networks . . . . . 78--90 Jin Li and Francesco Palmieri and Qiben Yan Special issue on advances in security and privacy in IoT . . . . . . . . . . . 91--92 Ayesha Altaf and Haider Abbas and Faiza Iqbal and Abdelouahid Derhab Trust models of Internet of Smart Things: a survey, open issues, and future directions . . . . . . . . . . . 93--111 Guolin Sun and Daniel Ayepah-Mensah and Li Lu and Wei Jiang and Guisong Liu Delay-aware content distribution via cell clustering and content placement for multiple tenants . . . . . . . . . . 112--126 Beakal Gizachew Assefa and Öznur Özkasap A survey of energy efficiency in SDN: Software-base methods and optimization models . . . . . . . . . . . . . . . . . 127--143
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Esraa M. Ghourab and Mohamed Azab and Ahmed Mansour Spatiotemporal diversification by moving-target defense through benign employment of false-data injection for dynamic, secure cognitive radio network 1--14 Jun Young Kim and Wen Hu and Dilip Sarkar and Sanjay Jha Long-term secure management of large scale Internet of Things applications 15--26 Sourav Mondal and Goutam Das and Elaine Wong Cost-optimal cloudlet placement frameworks over fiber-wireless access networks for low-latency applications 27--38 Abdullah Aydeger and Nico Saputro and Kemal Akkaya and Selcuk Uluagac SDN-enabled recovery for Smart Grid teleprotection applications in post-disaster scenarios . . . . . . . . 39--50 Abishi Chowdhury and Shital A. Raut and Husnu S. Narman DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management . . . . . . 51--65 Abhishek Gupta and Alagan Anpalagan and Glaucio H. S. Carvalho and Ahmed S. Khwaja and Ling Guan and Isaac Woungang Retraction notice to Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: a survey [J. Netw. Comput. Appl. \bf 132 (2019) 118--148] . . . . . . . . . . . . 66--66
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mohammed Atiquzzaman Editorial: New editors 2019 . . . . . . iii--v Vladimir Rocha and Anarosa Alves Franco Brandão A scalable multiagent architecture for monitoring IoT devices . . . . . . . . . 1--14 Xiaowu Liu and Jiguo Yu and Weifeng Lv and Dongxiao Yu and Yinglong Wang and Yu Wu Network security situation: From awareness to awareness-control . . . . . 15--30 Md. Farhad Hossain and Ayman Uddin Mahin and Topojit Debnath and Farjana Binte Mosharrof and Khondoker Ziaul Islam Recent research in cloud radio access network (C-RAN) for $5$G cellular systems --- a survey . . . . . . . . . . 31--48 Reyhaneh Rabaninejad and Mahmoud Ahmadian Attari and Maryam Rajabzadeh Asaar and Mohammad Reza Aref Comments on a lightweight cloud auditing scheme: Security analysis and improvement . . . . . . . . . . . . . . 49--56 Shantanu Pal and Michael Hitchens and Vijay Varadharajan and Tahiry Rabehaja Policy-based access control for constrained healthcare resources in the context of the Internet of Things . . . 57--74
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Partha Pratim Ray and Dinesh Dash and Debashis De Edge computing for Internet of Things: a survey, e-healthcare case study and future direction . . . . . . . . . . . . 1--22 Yue Li and Yongmin Zhang and Lin Cai Optimal location of supplementary node in UAV surveillance system . . . . . . . 23--39 Jirui Li and Xiaoyong Li and Xianglong Cheng and Jie Yuan and Rui Zhang A trustworthiness-enhanced reliable forwarding scheme in mobile Internet of Things . . . . . . . . . . . . . . . . . 40--53 Yali Zeng and Li Xu and Xu Yang and Xun Yi and Ibrahim Khalil Privacy-preserving aggregation for cooperative spectrum sensing . . . . . . 54--64 Prasanta Majumdar and Tanmay De An alternative minimum cost route setup algorithm in a large EON for long-haul traffic under dynamic traffic grooming 65--86
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Asad Arfeen and Krzysztof Pawlikowski and Don McNickle and Andreas Willig The role of the Weibull distribution in modelling traffic in Internet access and backbone core networks . . . . . . . . . 1--22 Surbhi Saraswat and Vishal Agarwal and Hari Prabhat Gupta and Rahul Mishra and Ashish Gupta and Tanima Dutta Challenges and solutions in Software Defined Networking: a survey . . . . . . 23--58 Md Osman Gani and Taskina Fayezeen and Richard J. Povinelli and Roger O. Smith and Muhammad Arif and Ahmed J. Kattan and Sheikh Iqbal Ahamed A light weight smartphone based human activity recognition system with high accuracy . . . . . . . . . . . . . . . . 59--72 Yanbing Liu and Xiaowei Qin and Ting Zhu and Xiaohui Chen and Guo Wei Improve MPTCP with SDN: From the perspective of resource pooling . . . . 73--85 Long Luo and Hongfang Yu and Shouxi Luo and Zilong Ye and Xiaojiang Du and Mohsen Guizani Scalable explicit path control in software-defined networks . . . . . . . 86--103 Shouxi Luo and Hongfang Yu and Long Luo and Lemin Li Customizable network update planning in SDN . . . . . . . . . . . . . . . . . . 104--115
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mohammed Atiquzzaman Editorial: 2018 best paper awards . . . iii--iii Ankita Atrey and Gregory Van Seghbroeck and Higinio Mora and Filip De Turck and Bruno Volckaert SpeCH: a scalable framework for data placement of data-intensive services in geo-distributed clouds . . . . . . . . . 1--14 Xuyang Jing and Jingjing Zhao and Qinghua Zheng and Zheng Yan and Witold Pedrycz A reversible sketch-based method for detecting and mitigating amplification attacks . . . . . . . . . . . . . . . . 15--24 Erfan Mozaffari Ahrar and Mohammad Nassiri and Fabrice Theoleyre Multipath aware scheduling for high reliability and fault tolerance in low power industrial networks . . . . . . . 25--36 Omar Abdel Wahab and Nadjia Kara and Claes Edstrom and Yves Lemieux MAPLE: a Machine Learning Approach for Efficient Placement and Adjustment of Virtual Network Functions . . . . . . . 37--50 Xincheng Tan and Yi Xie and Haishou Ma and Shunzheng Yu and Jiankun Hu Recognizing the content types of network traffic based on a hybrid DNN-HMM model 51--62 Soroush Karimian-Aliabadi and Danilo Ardagna and Reza Entezari-Maleki and Eugenio Gianniti and Ali Movaghar Analytical composite performance models for Big Data applications . . . . . . . 63--75 Mostafa Ghobaei-Arani and Reihaneh Khorsand and Mohammadreza Ramezanpour An autonomous resource provisioning framework for massively multiplayer online games in cloud environment . . . 76--97 Shie-Yuan Wang and Chia-Ming Wu and Yi-Bing Lin and Ching-Chun Huang High-speed data-plane packet aggregation and disaggregation by P4 switches . . . 98--110 Fakhrosadat Fanian and Marjan Kuchaki Rafsanjani Cluster-based routing protocols in wireless sensor networks: a survey based on methodology . . . . . . . . . . . . . 111--142
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mohit Kumar and S. C. Sharma and Anubhav Goel and S. P. Singh A comprehensive survey for scheduling techniques in cloud computing . . . . . 1--33 Mahadev A. Gawas and Sweta S. Govekar A novel selective cross layer based routing scheme using ACO method for vehicular networks . . . . . . . . . . . 34--46 Mani Shekhar Gupta and Krishan Kumar Progression on spectrum sensing for cognitive radio networks: a survey, classification, challenges and future research issues . . . . . . . . . . . . 47--76 Meiguang Liu and Lei Zhang and Panlong Yang and Liangfu Lu and Liangyi Gong Wi-Run: Device-free step estimation system with commodity Wi-Fi . . . . . . 77--88 Alexis Huf and Frank Siqueira Composition of heterogeneous web services: a systematic review . . . . . 89--110 Abhishek Singh and Ashish Payal and Sourabh Bharti A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues . . . . . . . . . . . . . . . . . 111--151 Chunlin Li and YaPing Wang and Yi Chen and Youlong Luo Energy-efficient fault-tolerant replica management policy with deadline and budget constraints in edge-cloud environment . . . . . . . . . . . . . . 152--166 Shailendra Rathore and Byung Wook Kwon and Jong Hyuk Park BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network . . . . . . . . . . . . . . 167--177 Khalid Hasan and Kamanashis Biswas and Khandakar Ahmed and Nazmus S. Nafi and Md Saiful Islam A comprehensive review of wireless body area network . . . . . . . . . . . . . . 178--198
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jiun Terng Liew and Fazirulhisyam Hashim and Aduwati Sali and Mohd Fadlee A. Rasid and Abbas Jamalipour Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks . . . . . . . . . 1--12 Shubhani Aggarwal and Rajat Chaudhary and Gagangeet Singh Aujla and Neeraj Kumar and Kim-Kwang Raymond Choo and Albert Y. Zomaya Blockchain for smart communities: Applications challenges and opportunities . . . . . . . . . . . . . 13--48 Hailong Huang and Andrey V. Savkin and Ming Ding and Mohamed Ali Kaafar Optimized deployment of drone base station to improve user experience in cellular networks . . . . . . . . . . . 49--58 Deepsubhra Guha Roy and Puja Das and Debashis De and Rajkumar Buyya QoS-aware secure transaction framework for Internet of Things using blockchain mechanism . . . . . . . . . . . . . . . 59--78 Sowmya Ravidas and Alexios Lekidis and Federica Paci and Nicola Zannone Access control in Internet-of-Things: a survey . . . . . . . . . . . . . . . . . 79--101 Ching-Hao Chang and Ying-Dar Lin and Yu-Kuen Lai and Yuan-Cheng Lai A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms . . . . . . . . . . 102--117 Sonam Maurya and Vinod Kumar Jain and Debanjan Roy Chowdhury Delay aware energy efficient reliable routing for data transmission in heterogeneous mobile sink wireless sensor network . . . . . . . . . . . . . 118--137 Ayoub Benayache and Azeddine Bilami and Sami Barkat and Pascal Lorenz and Hafnaoui Taleb MsM: a microservice middleware for smart WSN-based IoT application . . . . . . . 138--154 Naveen Kumar and Abdul Aleem and Ashutosh Kumar Singh and Shashank Srivastava NBP: Namespace-based privacy to counter timing-based attack in named data networking . . . . . . . . . . . . . . . 155--170 Harkiran Kaur and Sandeep K. Sood Fog-assisted IoT-enabled scalable network infrastructure for wildfire surveillance . . . . . . . . . . . . . . 171--183
M. Mehdi Afsar and Mohamed Younis A load-balanced cross-layer design for energy-harvesting sensor networks . . . Ashar Ahmad and Muhammad Saad and Aziz Mohaisen Secure and transparent audit logs with BlockAudit . . . . . . . . . . . . . . . Abdelmuttlib Ibrahim Abdalla Ahmed and Siti Hafizah Ab Hamid and Abdullah Gani and Suleman Khan and Muhammad Khurram Khan Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges . . . . . . . . . . Melchizedek Alipio and Nestor Michael Tiglao and Fawaz Bokhari and Salman Khalid TCP incast solutions in data center networks: a classification and survey Anonymous Editorial Board . . . . . . . . . . . .
Anonymous Editorial Board . . . . . . . . . . . . Anonymous Publisher's note . . . . . . . . . . . . Narmeen Zakaria Bawany and Jawwad A. Shamsi SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks . . . . . Sheng Feng and Shigen Shen and Longjun Huang and Adam C. Champion and Shui Yu and Chengdong Wu and Yunzhou Zhang Three-dimensional robot localization using cameras in wireless multimedia sensor networks . . . . . . . . . . . . Anatoliy Gorbenko and Alexander Romanovsky and Olga Tarasyuk Fault tolerant Internet computing: Benchmarking and modelling trade-offs between availability, latency and consistency . . . . . . . . . . . . . . Mohammad Goudarzi and Marimuthu Palaniswami and Rajkumar Buyya A fog-driven dynamic resource allocation technique in ultra dense femtocell networks . . . . . . . . . . . . . . . . Mordechai Guri and Rami Puzis and Kim-Kwang Raymond Choo and Sergey Rubinshtein and Gabi Kedma and Yuval Elovici Using malware for the greater good: Mitigating data leakage . . . . . . . . Ana Serrano Mamolar and Pablo Salvá-Garc\'ìa and Enrique Chirivella-Perez and Zeeshan Pervez and Jose M. Alcaraz Calero and Qi Wang Autonomic protection of multi-tenant $5$G mobile networks against UDP flooding DDoS attacks . . . . . . . . . Ivan Marsa-Maestre and Jose Manuel Gimenez-Guzman and David Orden and Enrique de la Hoz and Mark Klein REACT: reactive resilience for critical infrastructures using graph-coloring techniques . . . . . . . . . . . . . . . Cem Mergenci and Ibrahim Korpeoglu Generic resource allocation metrics and methods for heterogeneous cloud infrastructures . . . . . . . . . . . . Partha Sarathi Paul and Bishakh Chandra Ghosh and Hridoy Sankar Dutta and Kingshuk De and Arka Prava Basu and Prithviraj Pramanik and Sujoy Saha and Sandip Chakraborty and Niloy Ganguly and Subrata Nandi CRIMP: Here crisis mapping goes offline Mustapha Reda Senouci and Abdelhamid Mellouk A robust uncertainty-aware cluster-based deployment approach for WSNs: Coverage, connectivity, and lifespan . . . . . . . Shigen Shen and Haiping Zhou and Sheng Feng and Longjun Huang and Jianhua Liu and Shui Yu and Qiying Cao HSIRD: a model for characterizing dynamics of malware diffusion in heterogeneous WSNs . . . . . . . . . . . Xincheng Tan and Yi Xie and Haishou Ma and Shunzheng Yu and Jiankun Hu Corrigendum to ``Recognizing the content types of network traffic based on a hybrid DNN-HMM model'' [J. Netw. Comput. Appl. \bf 142 (2019) 51--62] . . . . . . Fulvio Valenza and Serena Spinoso and Riccardo Sisto Formally specifying and checking policies and anomalies in service function chaining . . . . . . . . . . . Yanjun Yan and Guangjie Han and Huihui Xu A survey on secure routing protocols for satellite network . . . . . . . . . . . Bo Yang and Bo Li and Zhongjiang Yan and Der-Jiunn Deng and Mao Yang Performance analysis of multi-channel MAC with single transceiver for the next generation WLAN . . . . . . . . . . . . Azadeh Zamanifar and Eslam Nazemi Retraction notice to ``An approach for predicting health status in IoT health care'' [YJNCA \bf 134 (2019) 100--113] Chuanji Zhang and Harshvardhan P. Joshi and George F. Riley and Steven A. Wright Towards a virtual network function research agenda: a systematic literature review of VNF design considerations . .
Anonymous 1 December 2019 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Masoud Asghari and Saleh Yousefi and Dusit Niyato Pricing strategies of IoT wide area network service providers with complementary services included . . . . ?? Jamila Manan and Atiq Ahmed and Ihsan Ullah and Le\"\ila Merghem-Boulahia and Dominique Ga\"\iti Distributed intrusion detection scheme for next generation networks . . . . . . ?? Maryam Imani and Gholam Ali Montazer A survey of emotion recognition methods with emphasis on E-Learning environments ?? Sedef Demirci and Seref Sagiroglu Optimal placement of virtual network functions in software defined networks: a survey . . . . . . . . . . . . . . . . ?? Hamed Alimohammadi and Mahmood Ahmadi Clustering-based many-field packet classification in Software-Defined Networking . . . . . . . . . . . . . . . ?? Shubhra Jain and K. K. Pattanaik and Anupam Shukla QWRP: Query-driven virtual wheel based routing protocol for wireless sensor networks with mobile sink . . . . . . . ?? Yinbo Yu and Jianfeng Yang and Chengcheng Guo and Hong Zheng and Jiancheng He Joint optimization of service request routing and instance placement in the microservice system . . . . . . . . . . ?? Phi Le Nguyen and Kien Nguyen and Huy Vu and Yusheng Ji TELPAC: a time and energy efficient protocol for locating and patching coverage holes in WSNs . . . . . . . . . ?? Hua Dai and Xuelong Dai and Xun Yi and Geng Yang and Haiping Huang Semantic-aware multi-keyword ranked search scheme over encrypted cloud data ?? Gauhar Ali and Naveed Ahmad and Yue Cao and Qazi Ejaz Ali and Fazal Azim and Haitham Cruickshank BCON: Blockchain based access CONtrol across multiple conflict of interest domains . . . . . . . . . . . . . . . . ??
Anonymous 15 December 2019 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Amar Abane and Mehammed Daoui and Samia Bouzefrane and Paul Muhlethaler A Lightweight Forwarding Strategy for Named Data Networking in Low-end IoT . . ?? Simon Yusuf Enoch and Jin B. Hong and Dong Seong Kim Security modelling and assessment of modern networks using time independent Graphical Security Models . . . . . . . ?? Lahlou Laaziz and Nadjia Kara and Rafi Rabipour and Claes Edstrom and Yves Lemieux FASTSCALE: a fast and scalable evolutionary algorithm for the joint placement and chaining of virtualized services . . . . . . . . . . . . . . . . ?? Souhila Benmakrelouf and Nadjia Kara and Hanine Tout and Rafi Rabipour and Claes Edstrom Resource needs prediction in virtualized systems: Generic proactive and self-adaptive solution . . . . . . . . . ?? Francesco Palmieri Network anomaly detection based on logistic regression of nonlinear chaotic invariants . . . . . . . . . . . . . . . ?? Christos Anagnostopoulos and Kostas Kolomvatsos An intelligent, time-optimized monitoring scheme for edge nodes . . . . ?? Anandarup Mukherjee and Sudip Misra and Narendra Singh Raghuwanshi A survey of unmanned aerial sensing solutions in precision agriculture . . . ?? El Arbi Abdellaoui Alaoui and Hanane Zekkori and Said Agoujil Hybrid delay tolerant network routing protocol for heterogeneous networks . . ?? Shaonan Li and Wenyu Qu and Chunfeng Liu and Tie Qiu and Zhao Zhao Survey on high reliability wireless communication for underwater sensor networks . . . . . . . . . . . . . . . . ??
Anonymous 1 January 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous Thank You Reviewers . . . . . . . . . . ?? Dapeng Wu and Bingxu Liu and Qing Yang and Ruyan Wang Social-aware cooperative caching mechanism in mobile social networks . . ?? Fei Gu and Jianwei Niu and Landu Jiang and Xue Liu and Mohammed Atiquzzaman Survey of the low power wide area network technologies . . . . . . . . . . ?? David A. Monge and Elina Pacini and Cristian Mateos and Enrique Alba and Carlos García Garino CMI: an online multi-objective genetic autoscaler for scientific and engineering workflows in cloud infrastructures with unreliable virtual machines . . . . . . . . . . . . . . . . ?? Qiuyun Lyu and Yizhen Qi and Xiaochen Zhang and Huaping Liu and Qiuhua Wang and Ning Zheng SBAC: a secure blockchain-based access control framework for information-centric networking . . . . . ?? Amritraj Singh and Kelly Click and Reza M. Parizi and Qi Zhang and Ali Dehghantanha and Kim-Kwang Raymond Choo Sidechain technologies in blockchain networks: an examination and state-of-the-art review . . . . . . . . ?? Mayssa Ghribi and Aref Meddeb Survey and taxonomy of MAC, routing and cross layer protocols using wake-up radio . . . . . . . . . . . . . . . . . ?? Jaiprakash Nagar and S. K. Chaturvedi and Sieteng Soh An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region ?? Nusrat J. Shoumy and Li-Minn Ang and Kah Phooi Seng and D. M. Motiur Rahaman and Tanveer Zia Multimodal big data affective analytics: a comprehensive survey using text, audio, visual and physiological signals ?? Hong Zhong and Zhanfei Li and Jie Cui and Yue Sun and Lu Liu Efficient dynamic multi-keyword fuzzy search over encrypted cloud data . . . . ?? Jayasree Sengupta and Sushmita Ruj and Sipra Das Bit A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT . . . . . . . . . . . . ??
Anonymous 15 January 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Xiong Wang and Yukun Yang and Hanyu Liu and Jing Ren and Shizhong Xu and Sheng Wang and Shui Yu Efficient measurement of round-trip link delays in software-defined networks . . ?? Mohammad Alauthman and Nauman Aslam and Mouhammd Al-Kasassbeh and Suleman Khan and Ahmad Al-Qerem and Kim-Kwang Raymond Choo An efficient reinforcement learning-based Botnet detection approach ?? Ahmed S. Ali and Korany R. Mahmoud and Khaled M. Naguib Optimal caching policy for wireless content delivery in D2D networks . . . . ?? Alejandro Canovas and Albert Rego and Oscar Romero and Jaime Lloret A robust multimedia traffic SDN-Based management system using patterns and models of QoE estimation with BRNN . . . ?? Ayaz Ali Khan and Muhammad Zakarya and Rahim Khan and Izaz Ur Rahman and Mukhtaj Khan and Atta ur Rehman Khan An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters . . . . ?? Mohamed Ali Kandi and Hicham Lakhlef and Abdelmadjid Bouabdallah and Yacine Challal A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things ?? Muhammad Asif Khan and Ridha Hamila and Nasser Ahmed Al-Emadi and Serkan Kiranyaz and Moncef Gabbouj Real-time throughput prediction for cognitive Wi-Fi networks . . . . . . . . ?? Mohammad Wazid and Ashok Kumar Das and Vivekananda Bhat K. and Athanasios V. Vasilakos LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment ?? Yan Chen and Yanjing Sun and Nannan Lu and Bin Wang Channel-reserved medium access control for edge computing based IoT . . . . . . ??
Anonymous 1 February 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Stela Kucek and Maria Leitner An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments . . . . . . ?? Haijun Geng and Han Zhang and Xingang Shi and Zhiliang Wang and Xia Yin Efficient computation of loop-free alternates . . . . . . . . . . . . . . . ?? Jingjing Guo and Chunlin Li and Yi Chen and Youlong Luo On-demand resource provision based on load estimation and service expenditure in edge cloud environment . . . . . . . ?? Mahdi Rabbani and Yong Li Wang and Reza Khoshkangini and Hamed Jelodar and Ruxin Zhao and Peng Hu A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing . . . . . ?? Guangjie Han and Haofei Guan and Zeren Zhou and Zhifan Li and Sammy Chan and Wenbo Zhang CTRA: a complex terrain region-avoidance charging algorithm in Smart World . . . ??
Anonymous 15 February 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Akbar Majidi and Nazila Jahanbakhsh and Xiaofeng Gao and Jiaqi Zheng and Guihai Chen ECN$^+$: a marking-aware optimization for ECN threshold via per-port in Data Center Networks . . . . . . . . . . . . ?? Farkhana Muchtar and Abdul Hanan Abdullah and Mosleh Al-Adhaileh and Kamal Zuhairi Zamli Energy conservation strategies in Named Data Networking based MANET using congestion control: a review . . . . . . ?? Chunlin Li and Jianhang Tang and Tao Ma and Xihao Yang and Youlong Luo Load balance based workflow job scheduling algorithm in distributed cloud . . . . . . . . . . . . . . . . . ?? Mehdi Nobakht and Yulei Sui and Aruna Seneviratne and Wen Hu PGFit: Static permission analysis of health and fitness apps in IoT programming frameworks . . . . . . . . . ?? Ru Wang and Muhammad Imran and Kashif Saleem A microservice recommendation mechanism based on mobile architecture . . . . . . ??
Anonymous 1 March 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Leonardo Richter Bays and Luciano Paschoal Gaspary Reality shock in virtual network embedding: Flexibilizing demands for dealing with multiple operational requirements in SDNs . . . . . . . . . . ?? Daniel Gibert and Carles Mateu and Jordi Planes The rise of machine learning for detection and classification of malware: Research developments, trends and challenges . . . . . . . . . . . . . . . ?? Weihong Wu and Jiang Liu and Tao Huang The source-multicast: a sender-initiated multicast member management mechanism in SRv6 networks . . . . . . . . . . . . . ?? Morteza Rahimi and Maryam Songhorabadi and Mostafa Haghi Kashani Fog-based smart homes: a systematic review . . . . . . . . . . . . . . . . . ?? Liang Yang and Bryan Ng and Winston K. G. Seah and Deepak Singh Performance evaluation of equivalent forwarding sets in software defined networking . . . . . . . . . . . . . . . ?? Xiuwen Sun and Hao Li and Dan Zhao and Xingxing Lu and Kaiyu Hou and Chengchen Hu Corrigendum to ``COIN: a fast packet inspection method over compressed traffic'' [J. Netw. Comput. Appl. \bf 127 (2019) 122--134] . . . . . . . . . . ??
Anonymous 15 March 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ye Wang and Qingbao Li and Zhifeng Chen and Ping Zhang and Guimin Zhang A Survey of Exploitation Techniques and Defenses for Program Data Attacks . . . ?? Zeli Wang and Weiqi Dai and Kim-Kwang Raymond Choo and Hai Jin and Deqing Zou FSFC: an input filter-based secure framework for smart contract . . . . . . ?? Lang Fang and Xiaoning Zhang and Keshav Sood and Yunqing Wang and Shui Yu Reliability-aware virtual network function placement in carrier networks ?? Muhammad Fahad Khan and Kok-Lim Alvin Yau and Rafidah MD. Noor and Muhammad Ali Imran Survey and taxonomy of clustering algorithms in 5G . . . . . . . . . . . . ?? Ali Mohsenzadeh and Amir Jalaly Bidgoly and Yaghoub Farjami A novel reward and penalty trust evaluation model based on confidence interval using Petri Net . . . . . . . . ?? Hamid Tahaei and Firdaus Afifi and Adeleh Asemi and Faiz Zaki and Nor Badrul Anuar The rise of traffic classification in IoT networks: a survey . . . . . . . . . ??
Anonymous 1 April 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Abdulaziz Al-Darrab and Ibrahim Al-Darrab and Ali Rushdi Software-Defined Networking load distribution technique for an Internet service provider . . . . . . . . . . . . ?? Bodhi Chakraborty and Shekhar Verma and Krishna Pratap Singh Temporal Differential Privacy in Wireless Sensor Networks . . . . . . . . ?? Bo Yi and Xingwei Wang and Min Huang and Yong Zhao Novel resource allocation mechanism for SDN-based data center networks . . . . . ?? Yulong Fu and Hanlu Chen and Qinghua Zheng and Zheng Yan and Raimo Kantola and Xuyang Jing and Jin Cao and Hui Li An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks . . . . . . . . . . . . . . . . ?? Luning Liu and Zhaoming Lu and Luhan Wang and Xin Chen and Xiangming Wen Large-volume data dissemination for cellular-assisted automated driving with edge intelligence . . . . . . . . . . . ??
Anonymous 15 April 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Zhenchun Wei and Chengkai Xia and Xiaohui Yuan and Renhao Sun and Zengwei Lyu and Lei Shi and Jianjun Ji The path planning scheme for joint charging and data collection in WRSNs: a multi-objective optimization method . . ?? Zohaib Latif and Kashif Sharif and Fan Li and Md Monjurul Karim and Sujit Biswas and Yu Wang A comprehensive survey of interface protocols for software defined networks ?? Yang Xiao and Qingqi Pei and Lina Yao and Shui Yu and Lei Bai and Xianzhi Wang An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness . . . . . . . . . . . ?? Abbas Yazdinejad and Reza M. Parizi and Ali Bohlooli and Ali Dehghantanha and Kim-Kwang Raymond Choo A high-performance framework for a network programmable packet processor using P4 and FPGA . . . . . . . . . . . ?? Waqas Rehan and Stefan Fischer and Maaz Rehan and Yasser Mawad and Shahzad Saleem QCM2R: a QoS-aware cross-layered multichannel multisink routing protocol for stream based wireless sensor networks . . . . . . . . . . . . . . . . ?? Md Zakirul Alam Bhuiyan and Guojun Wang and Zhong Fan Smart world systems, applications, and technologies . . . . . . . . . . . . . . ??
Anonymous 1 May 2020 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Guolin Sun and Kun Xiong and Gordon Owusu Boateng and Guisong Liu and Wei Jiang Resource slicing and customization in RAN with dueling deep Q-Network . . . . ?? Stefano Rovetta and Grazyna Suchacka and Francesco Masulli Bot recognition in a Web store: an approach based on unsupervised learning ?? Haroon Elahi and Guojun Wang and Jianer Chen Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in Android smartphones . . ?? Rentao Gu and Zeyuan Yang and Yuefeng Ji Machine learning for intelligent optical networks: a comprehensive survey . . . . ?? Mu Wang and Changqiao Xu and Xingyan Chen and Lujie Zhong and Gabriel-Miro Muntean Decentralized asynchronous optimization for dynamic adaptive multimedia streaming over information centric networking . . . . . . . . . . . . . . . ?? Sahar Aldhaheri and Daniyal Alghazzawi and Li Cheng and Ahmed Barnawi and Bandar A. Alzahrani Artificial Immune Systems approaches to secure the Internet of Things: a systematic review of the literature and recommendations for future research . . ??
Anonymous 15 May 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Marufa Yeasmin Mukta and Md Arafatur Rahman and A. Taufiq Asyhari and Md Zakirul Alam Bhuiyan IoT for energy efficient green highway lighting systems: Challenges and issues ?? Mingchuan Zhang and Bowei Hao and Fei Song and Meiyi Yang and Junlong Zhu and Qingtao Wu Smart collaborative video caching for energy efficiency in cognitive Content Centric Networks . . . . . . . . . . . . ?? Pan Zhou and Xinshu He and Shouxi Luo and Hongfang Yu and Gang Sun JPAS: Job-progress-aware flow scheduling for deep learning clusters . . . . . . . ?? Ivo Sousa and Maria Paula Queluz and António Rodrigues A survey on QoE-oriented wireless resources scheduling . . . . . . . . . . ?? Mazen Juma and Azza Abdel Monem and Khaled Shaalan Hybrid End-to-End VPN Security Approach for Smart IoT Objects . . . . . . . . . ??
Anonymous 1 June 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Judy C. Guevara and Ricardo da S. Torres and Nelson L. S. da Fonseca On the classification of fog computing applications: a machine learning perspective . . . . . . . . . . . . . . ?? Brieuc Berruet and Oumaya Baala and Alexandre Caminada and Valery Guillet An evaluation method of channel state information fingerprinting for single gateway indoor localization . . . . . . ?? Imane El Mensoum and Omar Abdul Wahab and Nadjia Kara and Claes Edstrom MuSC: a multi-stage service chains embedding approach . . . . . . . . . . . ?? Juan Camilo Correa Chica and Jenny Cuatindioy Imbachi and Juan Felipe Botero Vega Security in SDN: a comprehensive survey ?? Tiago C. S. Xavier and Igor L. Santos and Flavia C. Delicato and Paulo F. Pires and Marcelo P. Alves and Tiago S. Calmon and Ana C. Oliveira and Claudio L. Amorim Collaborative resource allocation for Cloud of Things systems . . . . . . . . ??
Anonymous 15 June 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Misbah Shafi and Rakesh Kumar Jha and Manish Sabraj A survey on security issues of 5G NR: Perspective of artificial dust and artificial rain . . . . . . . . . . . . ?? Waleed Ejaz and Shree K. Sharma and Salman Saadat and Muhammad Naeem and Alagan Anpalagan and N. A. Chughtai A comprehensive survey on resource allocation for CRAN in 5G and beyond networks . . . . . . . . . . . . . . . . ?? Satish Narayana Srirama and Mainak Adhikari and Souvik Paul Application deployment using containers with auto-scaling for microservices in cloud environment . . . . . . . . . . . ?? PanJun Sun Security and privacy protection in cloud computing: Discussions and challenges ?? Kai Lin and Honglong Chen and Xin Ai and Vladimir Shakhov and Lina Ni and Jiguo Yu and Yanjun Li EUMD: Efficient slot utilization based missing tag detection with unknown tags ?? Khaled Riad and Teng Huang and Lishan Ke A dynamic and hierarchical access control for IoT in multi-authority cloud storage . . . . . . . . . . . . . . . . ??
Anonymous 1 July 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Yajie Wang and Yu-an Tan and Wenjiao Zhang and Yuhang Zhao and Xiaohui Kuang An adversarial attack on DNN-based black-box object detectors . . . . . . . ?? Di Xiao and Min Li and Mengdi Wang and Jia Liang and Ran Liu Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks . . ?? Inam ul Haq and Jian Wang and Youwen Zhu Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks . . . . . . ?? Noé Torres-Cruz and Mario E. Rivero-Angeles and Gerardo Rubino and Ricardo Menchaca-Mendez and Rolando Menchaca-Mendez and David Ramirez A comprehensive analytical framework for VoD services in hybrid CDN-P2P systems ?? Shi Dong and Raj Jain Retraction notice to ``Flow online identification method for the encrypted Skype'' [YJNCA (2019) 75--85] . . . . . ?? Syeda Manjia Tahsien and Hadis Karimipour and Petros Spachos Machine learning based solutions for security of Internet of Things (IoT): a survey . . . . . . . . . . . . . . . . . ?? Wenjuan Li and Weizhi Meng and Man Ho Au Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments . . . . . . . . . . . . . . ?? Yilei Wang and Guoyu Yang and Tao Li and Fengyin Li and Youliang Tian and Xiaomei Yu Belief and fairness: a secure two-party protocol toward the view of entropy for IoT devices . . . . . . . . . . . . . . ?? Xiongwen Pang and Yanqiang Zhou and Pengcheng Li and Weiwei Lin and Wentai Wu and James Z. Wang A novel syntax-aware automatic graphics code generation with attention-based deep neural network . . . . . . . . . . ??
Anonymous 15 July 2020 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Fernando Zanferrari Morais and Cristiano André da Costa and Antonio Marcos Alberti and Cristiano Bonato Both and Rodrigo da Rosa Righi When SDN meets C-RAN: a survey exploring multi-point coordination, interference, and performance . . . . . . . . . . . . ?? Dipanwita Thakur and Manas Khatua Multi-domain virtual network embedding with dynamic flow migration in software-defined networks . . . . . . . ?? Cheng Guo and Xueru Jiang and Kim-Kwang Raymond Choo and Yingmo Jie R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity . . . . . ?? Yali Zeng and Li Xu and Xu Yang and Xun Yi and Ibrahim Khalil Lightweight privacy preservation for secondary users in cognitive radio networks . . . . . . . . . . . . . . . . ?? Nazanin Zahed Benisi and Mehdi Aminian and Bahman Javadi Blockchain-based decentralized storage networks: a survey . . . . . . . . . . . ?? Teng Huang and Qixiang Zhang and Jiabao Liu and Ruitao Hou and Xianmin Wang and Ya Li Adversarial attacks on deep-learning-based SAR image target recognition . . . . . . . . . . . . . . ?? Yize Yang and Hongyong Yang and Fei Liu Group motion of autonomous vehicles with anti-disturbance protection . . . . . . ?? Xiao Zhang and Lijia Xie and Wang Yao Spatio-temporal heterogeneous bandwidth allocation mechanism against DDoS attack ?? Xueshuo Xie and Zongming Jin and Jiming Wang and Lei Yang and Ye Lu and Tao Li Confidence guided anomaly detection model for anti-concept drift in dynamic logs . . . . . . . . . . . . . . . . . . ??
Anonymous 1 August 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Gonzalo De La Torre Parra and Paul Rad and Kim-Kwang Raymond Choo and Nicole Beebe Detecting Internet of Things attacks using distributed deep learning . . . . ?? Rosario G. Garroppo and Maria Grazia Scutell\`a and Fabio D'Andreagiovanni Robust green Wireless Local Area Networks: a matheuristic approach . . . ?? Ali Raza and Sanghwan Lee A priority based greedy path assignment mechanism in OpenFlow based datacenter networks . . . . . . . . . . . . . . . . ?? Wafa'a Kassab and Khalid A. Darabkh A--Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations . . . . . . . . . . . . ?? Jun Cai and Zhongwei Huang and Jianzhen Luo and Yan Liu and Huimin Zhao and Liping Liao Composing and deploying parallelized service function chains . . . . . . . . ?? Tariq Benmansour and Toufik Ahmed and Samira Moussaoui and Zouina Doukha Performance analyses of the IEEE 802.15.6 Wireless Body Area Network with heterogeneous traffic . . . . . . . . . ?? Arunima Ghosh and Shashank Gupta and Amit Dua and Neeraj Kumar Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects . . . . ??
Anonymous 15 August 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Mauro Conti and Pallavi Kaliyar and Chhagan Lal A robust multicast communication protocol for Low power and Lossy networks . . . . . . . . . . . . . . . . ?? Ming Chen and Shunkang Zhang and Hai Deng and Bing Chen and Changyou Xing and Bo Xu Automatic deployment and control of network services in NFV environments . . ?? Yu Tian and Baoqi Huang and Bing Jia and Long Zhao Optimizing AP and Beacon Placement in WiFi and BLE hybrid localization . . . . ?? Abd Ullah Khan and Ghulam Abbas and Ziaul Haq Abbas and Muhammad Waqas and Ahmad Kamal Hassan Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT . . ?? Shreya Ghosh and Soumya K. Ghosh and Rajkumar Buyya MARIO: a spatio-temporal data mining framework on Google Cloud to explore mobility dynamics from taxi trajectories ?? Christos Anagnostopoulos Edge-centric inferential modeling and analytics . . . . . . . . . . . . . . . ?? Lixia Xie and Ying Ding and Hongyu Yang and Ze Hu Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection . . . . . . . . . ?? Zhendong Wu and Jingjing Wang and Liqin Hu and Zhang Zhang and Han Wu A network intrusion detection method based on semantic re-encoding and deep learning . . . . . . . . . . . . . . . . ??
Anonymous 1 September 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Eder Leão Fernandes and Elisa Rojas and Joaquin Alvarez-Horcajo and Zolt\`an Lajos Kis and Davide Sanvito and Nicola Bonelli and Carmelo Cascone and Christian Esteve Rothenberg The road to BOFUSS: the basic OpenFlow userspace software switch . . . . . . . ?? Faizan Murtaza and Adnan Akhunzada and Saif ul Islam and Jalil Boudjadar and Rajkumar Buyya QoS-aware service provisioning in fog computing . . . . . . . . . . . . . . . ?? Shie-Yuan Wang and Jun-Yi Li and Yi-Bing Lin Aggregating and disaggregating packets with various sizes of payload in P4 switches at 100 Gbps line rate . . . . . ?? J. E. Giti and A. Sakzad and B. Srinivasan and J. Kamruzzaman and R. Gaire Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone . . . . . . . . . . . . . ?? Steven M. Hernandez and Eyuphan Bulut Using perceived direction information for anchorless relative indoor localization . . . . . . . . . . . . . . ?? Gustavo Zurita and Amit K. Shukla and José A. Pino and José M. Merigó and Valeria Lobos-Ossandón and Pranab K. Muhuri A bibliometric overview of the \booktitleJournal of Network and Computer Applications between 1997 and 2019 . . . . . . . . . . . . . . . . . . ?? Chunlin Li and Mingyang Song and Shaofeng Du and Xiaohai Wang and Min Zhang and Youlong Luo Adaptive priority-based cache replacement and prediction-based cache prefetching in edge computing environment . . . . . . . . . . . . . . ?? Wenjuan Li and Jiao Tan and Weizhi Meng and Yu Wang A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation . . . . . . . . . ?? Shunzhi Jiang and Dengpan Ye and Jiaqing Huang and Yueyun Shang and Zhuoyuan Zheng SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application . . . . . . ??
Anonymous 15 September 2020 . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Dinh C. Nguyen and Pubudu N. Pathirana and Ming Ding and Aruna Seneviratne Blockchain for 5G and beyond networks: a state of the art survey . . . . . . . . ?? Nur Nasuha Daud and Siti Hafizah Ab Hamid and Muntadher Saadoon and Firdaus Sahran and Nor Badrul Anuar Applications of link prediction in social networks: a review . . . . . . . ?? Bander Alzahrani and Omar Sami Oubbati and Ahmed Barnawi and Mohammed Atiquzzaman and Daniyal Alghazzawi UAV assistance paradigm: State-of-the-art in applications and challenges . . . . . . . . . . . . . . . ?? Mokhtar Sellami and Haithem Mezni and Mohand Said Hacid On the use of big data frameworks for big service composition . . . . . . . . ?? Miguel Rodríguez-Pérez and Sergio Herrería-Alonso and Raúl F. Rodríguez-Rubio and José Carlos López-Ardao Leveraging energy saving capabilities of current EEE interfaces via pre-coalescing . . . . . . . . . . . . . ?? Marcio Roberto Miranda Assis and Luiz Fernando Bittencourt MultiCloud Tournament: a cloud federation approach to prevent Free-Riders by encouraging resource sharing . . . . . . . . . . . . . . . . ?? Yang Liu and Debiao He and Mohammad S. Obaidat and Neeraj Kumar and Muhammad Khurram Khan and Kim-Kwang Raymond Choo Blockchain-based identity management systems: a review . . . . . . . . . . . ?? Xiaoguo Li and Tao Xiang and Peng Wang Achieving forward unforgeability in keyword-field-free conjunctive search ?? Zhongjiang Yao and Jingguo Ge and Yulei Wu and Xiaosheng Lin and Runkang He and Yuxiang Ma Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models . . . . . . . . . . . . . ?? Kehua Guo and Haifu Guo and Sheng Ren and Jian Zhang and Xi Li Towards efficient motion-blurred public security video super-resolution based on back-projection networks . . . . . . . . ??
Anonymous 1 October 2020 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Huan Fei and Fu Xiao and Haiping Huang and Lijuan Sun Indoor static localization based on Fresnel zones model using COTS Wi-Fi . . ?? Sapna and K. K. Pattanaik and Aditya Trivedi A dynamic distributed boundary node detection algorithm for management zone delineation in Precision Agriculture . . ?? Jiancheng Chi and Yu Li and Jing Huang and Jing Liu and Yingwei Jin and Chen Chen and Tie Qiu A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things . . . . . . . . . . . ?? Ahmad Shabani and Bijan Alizadeh PODEM: a low-cost property-based design modification for detecting Hardware Trojans in resource-constraint IoT devices . . . . . . . . . . . . . . . . ?? Zawar Hussain and Quan Z. Sheng and Wei Emma Zhang A review and categorization of techniques on device-free human activity recognition . . . . . . . . . . . . . . ?? Ke Ma and Geng Yang and Yang Xiang RCBAC: a risk-aware content-based access control model for large-scale text data ?? Yaser Mansouri and Victor Prokhorenko and M. Ali Babar An automated implementation of hybrid cloud for performance evaluation of distributed databases . . . . . . . . . ?? Mohammad Alkhalaileh and Rodrigo N. Calheiros and Quang Vinh Nguyen and Bahman Javadi Data-intensive application scheduling on Mobile Edge Cloud Computing . . . . . . ?? Li Jin and Dong Changyu and Palmieric Francesco Special issue on advanced techniques for security and privacy of Internet-of-Things with machine learning ?? Xu Ma and Cunmei Ji and Xiaoyu Zhang and Jianfeng Wang and Jin Li and Kuan-Ching Li and Xiaofeng Chen Secure multiparty learning from the aggregation of locally trained models ?? Yahye Abukar Ahmed and Baris Koçer and Shamsul Huda and Bander Ali Saleh Al-rimy and Mohammad Mehedi Hassan A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection ??
Anonymous 15 October 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Si Chen and Anmin Fu and Jian Shen and Shui Yu and Huaqun Wang and Huaijiang Sun RNN-DP: a new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection . . . . . . . . . . . . . . . ?? Shashwat Kumar and Sai Vineeth Doddala and A. Antony Franklin and Jiong Jin RAN-aware adaptive video caching in multi-access edge computing networks . . ?? Salva Daneshgadeh Çakmakçi and Thomas Kemmerich and Tarem Ahmed and Nazife Baykal Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm . . . . . . . . . . . ?? Mobasshir Mahbub Progressive researches on IoT security: an exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics . . . . . . . . . . . . . ?? Akanksha Srivastava and Mani Shekhar Gupta and Gurjit Kaur Energy efficient transmission trends towards future green cognitive radio networks (5G): Progress, taxonomy and open challenges . . . . . . . . . . . . ?? Iqbal H. Sarker and A. S. M. Kayes ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services . . . ?? Wai-Xi Liu and Jun Cai and Yu Wang and Qing Chun Chen and Jia-Qi Zeng Fine-grained flow classification using deep learning for software defined data center networks . . . . . . . . . . . . ?? Atis Elsts and Niall Twomey and Ryan McConville and Ian Craddock Energy-efficient activity recognition framework using wearable accelerometers ?? Abhishek Sharma and Pankhuri Vanjani and Nikhil Paliwal and Chathuranga M. Wijerathna Basnayaka and Dushantha Nalin K. Jayakody and Hwang-Cheng Wang and P. Muthuchidambaranathan Communication and networking technologies for UAVs: a survey . . . . ?? Peppino Fazio and Miralem Mehic and Miroslav Voznak A deep stochastical and predictive analysis of users mobility based on Auto-Regressive processes and pairing functions . . . . . . . . . . . . . . . ??
Anonymous 1 November 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Rafael Fayos-Jordan and Santiago Felici-Castell and Jaume Segura-Garcia and Jesus Lopez-Ballester and Maximo Cobos Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications . . . . . . . . . ?? Muluneh Mekonnen Tulu and Mbazingwa E. Mkiramweni and Ronghui Hou and Sultan Feisso and Talha Younas Influential nodes selection to enhance data dissemination in mobile social networks: a survey . . . . . . . . . . . ?? Jose Moura and David Hutchison Fog computing systems: State of the art, research issues and future trends, with a focus on resilience . . . . . . . . . ?? Daniel Merling and Steffen Lindner and Michael Menth P4-based implementation of BIER and BIER-FRR for scalable and resilient multicast . . . . . . . . . . . . . . . ?? Guolin Sun and Daniel Ayepah-Mensah and Rong Xu and Gordon Owusu Boateng and Guisong Liu End-to-end CNN-based dueling deep Q-Network for autonomous cell activation in Cloud-RANs . . . . . . . . . . . . . ?? Hai Lin and Sherali Zeadally and Zhihong Chen and Houda Labiod and Lusheng Wang A survey on computation offloading modeling for edge computing . . . . . . ?? Song Yang and Fan Li and Stojan Trajanovski and Xiaoming Fu Traffic routing in stochastic network function virtualization networks . . . . ?? Wen-Kang Jia and Xufang Wang Flow aggregation for large-scale SDNs with scattered address space allocation ?? R. Yugha and S. Chithra A survey on technologies and security protocols: Reference for future generation IoT . . . . . . . . . . . . . ?? Sunanda Gamage and Jagath Samarabandu Deep learning methods in network intrusion detection: a survey and an objective comparison . . . . . . . . . . ??
Anonymous 15 November 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ahmed S. Almasoud and Farookh Khadeer Hussain and Omar K. Hussain Smart contracts for blockchain-based reputation systems: a systematic literature review . . . . . . . . . . . ?? Lei Cui and Youyang Qu and Longxiang Gao and Gang Xie and Shui Yu Detecting false data attacks using machine learning techniques in smart grid: a survey . . . . . . . . . . . . . ?? Kübra Uludag and Sinan Emre Tasçi and Omer Korçak Sequential bargaining based incentive mechanism for collaborative Internet access . . . . . . . . . . . . . . . . . ?? Ahmed Alagha and Shakti Singh and Hadi Otrok and Rabeb Mizouni RFLS --- Resilient Fault-proof Localization System in IoT and Crowd-based Sensing Applications . . . . ?? Somayeh Rahmani and Vahid Khajehvand and Mohsen Torabian Kullback--Leibler distance criterion consolidation in cloud . . . . . . . . . ?? F. Orts and G. Ortega and E. F. Combarro and E. M. Garzón A review on reversible quantum adders ?? Baris Yamansavascilar and Ahmet Cihat Baktir and Atay Ozgovde and Cem Ersoy Fault tolerance in SDN data plane considering network and application based metrics . . . . . . . . . . . . . ?? Dilli P. Sharma and Simon Yusuf Enoch and Jin-Hee Cho and Terrence J. Moore and Frederica F. Nelson and Hyuk Lim and Dong Seong Kim Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense . . . . . . . . . . . . . ?? Balázs Sonkoly and Dávid Haja and Balázs Németh and Márk Szalay and János Czentye and Róbert Szabó and Rehmat Ullah and Byung-Seo Kim and László Toka Scalable edge cloud platforms for IoT services . . . . . . . . . . . . . . . . ?? Guangli Zhu and Zhuangzhuang Pan and Qiaoyun Wang and Shunxiang Zhang and Kuan-Ching Li Building multi-subtopic Bi-level network for micro-blog hot topic based on feature Co-Occurrence and semantic community division . . . . . . . . . . . ??
Anonymous 1 December 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Yan Pan and Shining Li and Yu Zhang and Ting Zhu CDA: Coordinating data dissemination and aggregation in heterogeneous IoT networks using CTC . . . . . . . . . . . ?? Mostafa Abdollahi and Farshad Eshghi and Manoochehr Kelarestaghi and Mozafar Bag-Mohammadi Opportunistic routing metrics: a timely one-stop tutorial survey . . . . . . . . ?? Md Akbar Hossain and Sayan Kumar Ray and Jaswinder Lota SmartDR: a device-to-device communication for post-disaster recovery ?? Nesrine Kaaniche and Maryline Laurent and Sana Belguith Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey . . . . . . ?? Narges Yousefnezhad and Avleen Malhi and Kary Främling Security in product lifecycle of IoT devices: a survey . . . . . . . . . . . ?? Shu Yang and Lu Bai and Laizhong Cui and Zhongxing Ming and Yulei Wu and Shui Yu and Hongfei Shen and Yi Pan An efficient pipeline processing scheme for programming Protocol-independent Packet Processors . . . . . . . . . . . ?? Juan Gutiérrez-Aguado and Raúl Peña-Ortiz and Miguel García-Pineda and Jose M. Claver Cloud-based elastic architecture for distributed video encoding: Evaluating H.265, VP9, and AV1 . . . . . . . . . . ?? Ying-Dar Lin and Yu-Kuen Lai and Quan Tien Bui and Yuan-Cheng Lai ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines . . . . . ?? N. Mansouri and Behnam Mohammad Hasani Zade and Mohammad Masoud Javidi A multi-objective optimized replication using fuzzy based self-defense algorithm for cloud computing . . . . . . . . . . ?? Khizra Asaf and Rana Asif Rehman and Byung-Seo Kim Blockchain technology in Named Data Networks: a detailed survey . . . . . . ?? Yongkai Fan and Jianrong Bai and Xia Lei and Yuqing Zhang and Bin Zhang and Kuan-Ching Li and Gang Tan Privacy preserving based logistic regression on big data . . . . . . . . . ??
Anonymous 15 December 2020 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Shaoyong Guo and Fengning Wang and Neng Zhang and Feng Qi and Xuesong Qiu Master-slave chain based trusted cross-domain authentication mechanism in IoT . . . . . . . . . . . . . . . . . . ?? Raihan ur Rasool and Hua Wang and Usman Ashraf and Khandakar Ahmed and Zahid Anwar and Wajid Rafique A survey of link flooding attacks in software defined network ecosystems . . ?? Fei Chen and Zhe Xiao and Laizhong Cui and Qiuzhen Lin and Jianqiang Li and Shui Yu Blockchain for Internet of Things applications: a review and open issues ?? Md Jalil Piran and Quoc-Viet Pham and S. M. Riazul Islam and Sukhee Cho and Byungjun Bae and Doug Young Suh and Zhu Han Multimedia communication over cognitive radio networks from QoS/QoE perspective: a comprehensive survey . . . . . . . . . ?? Ying Li and Jianbo Li and Manzoor Ahmed A three-stage incentive formation for optimally pricing social data offloading ?? Yun-Wei Lin and Tai-Hsiang Yen and Cheng-Han Chou and Yi-Bing Lin and Wen-Shu Lai Investigating Asian Parti-colored bats using the BatTalk Internet of Things approach . . . . . . . . . . . . . . . . ?? Suyel Namasudra and Suraj Sharma and Ganesh Chandra Deka and Pascal Lorenz DNA computing and table based data accessing in the cloud environment . . . ?? Emna Baccour and Aiman Erbad and Amr Mohamed and Mohsen Guizani and Mounir Hamdi Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication . . . . . . . . . . . . . ?? Khalid A. Darabkh and Oswa M. Amro and Raed T. Al-Zubi and Haythem Bany Salameh and Ramzi Saifan JavaSim-IBFD-CRNs: Novel Java simulator for in-band full-duplex cognitive radio networks over Internet of Things environment . . . . . . . . . . . . . . ?? Zheng Yan and Willy Susilo and Elisa Bertino and Jun Zhang and Laurence T. Yang AI-driven data security and privacy . . ??
Anonymous 1 January 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous Thank You Reviewers . . . . . . . . . . ?? Nguyen Khoi Tran and M. Ali Babar and Jonathan Boan Integrating blockchain and Internet of Things systems: a systematic review on objectives and designs . . . . . . . . . ?? Dana Yang and Seohee Yoo and Inshil Doh and Kijoon Chae Selective blockchain system for secure and efficient D2D communication . . . . ?? Khalid A. Darabkh and Oswa M. Amro and Raed T. Al-Zubi and Haythem Bany Salameh Yet efficient routing protocols for half- and full-duplex cognitive radio Ad-Hoc Networks over IoT environment . . ?? Zhishu Shen and Tiehua Zhang and Atsushi Tagami and Jiong Jin When RSSI encounters deep learning: an area localization scheme for pervasive sensing systems . . . . . . . . . . . . ?? Bentian Li and Dechang Pi and Yunxia Lin and Lin Cui DNC: a Deep Neural Network-based Clustering-oriented Network Embedding Algorithm . . . . . . . . . . . . . . . ?? Arvin Ghotbou and Mohammad Khansari VE-CoAP: a constrained application layer protocol for IoT video transmission . . ?? Sakshi Popli and Rakesh Kumar Jha and Sanjeev Jain Adaptive Small Cell position algorithm (ASPA) for green farming using NB-IoT ?? PanJun Sun A Trust Game Model of Service Cooperation in Cloud Computing . . . . . ?? Wenbo Zhang and Xin Wang and Guangjie Han and Yan Peng and Mohsen Guizani and Jingyi Sun A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks . . . . . . . . . . . . . . . . ?? Xingrui Fei and Yi Xie and Shensheng Tang and Jiankun Hu Identifying click-requests for the network-side through traffic behavior ?? A. S. Albahri and Jwan K. Alwan and Zahraa K. Taha and Sura F. Ismail and Rula A. Hamid and A. A. Zaidan and O. S. Albahri and B. B. Zaidan and A. H. Alamoodi and M. A. Alsalem IoT-based telemedicine for disease prevention and health promotion: State-of-the-Art . . . . . . . . . . . . ?? Ying Zhang and Cui-Hua Zhang and Xuyang Shao User preference-aware navigation for mobile robot in domestic via defined virtual area . . . . . . . . . . . . . . ?? Ayaz Ali Khan and Muhammad Zakarya and Izaz Ur Rahman and Rahim Khan and Rajkumar Buyya HeporCloud: an energy and performance efficient resource orchestrator for hybrid heterogeneous cloud computing environments . . . . . . . . . . . . . . ?? Gianni D'Angelo and Francesco Palmieri Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction . . . . . . . . . . ?? Norberto Garcia and Tomas Alcaniz and Aurora González-Vidal and Jorge Bernal Bernabe and Diego Rivera and Antonio Skarmeta Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence . . . . . . . . ?? Yang-Wai Chow and Willy Susilo and Jianfeng Wang and Richard Buckland and Joonsang Baek and Jongkil Kim and Nan Li Utilizing QR codes to verify the visual fidelity of image datasets for machine learning . . . . . . . . . . . . . . . . ??
Anonymous 15 January 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ruijie Zhu and Aretor Samuel and Peisen Wang and Shihua Li and Bounsou Kham Oun and Lulu Li and Pei Lv and Mingliang Xu and Shui Yu Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic . . . ?? Ali Akbar Sadri and Amir Masoud Rahmani and Morteza Saberikamarposhti and Mehdi Hosseinzadeh Fog data management: a vision, challenges, and future directions . . . ?? Mosab Hamdan and Entisar Hassan and Ahmed Abdelaziz and Abdallah Elhigazi and Bushra Mohammed and Suleman Khan and Athanasios V. Vasilakos and M. N. Marsono A comprehensive survey of load balancing techniques in software-defined network ?? João Paulo A. Maranhão and João Paulo C. L. da Costa and Elnaz Javidi and César A. Borges de Andrade and Rafael T. de Sousa Tensor based framework for Distributed Denial of Service attack detection . . . ?? Juan A. Fraire and Olivier De Jonck\`ere and Scott C. Burleigh Routing in the Space Internet: a contact graph routing tutorial . . . . . . . . . ?? Pietro Colombo and Elena Ferrari and Engin Deniz Tümer Regulating data sharing across MQTT environments . . . . . . . . . . . . . . ?? Saira Beg and Adeel Anjum and Mansoor Ahmad and Shahid Hussain and Ghufran Ahmad and Suleman Khan and Kim-Kwang Raymond Choo A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS) . . . . . . . . . . . . . ?? Azade Fotouhi and Ming Ding and Mahbub Hassan DroneCells: Improving spectral efficiency using drone-mounted flying base stations . . . . . . . . . . . . . ?? Xiaoshuai Zhang and Chao Liu and Kok Keong Chai and Stefan Poslad A privacy-preserving consensus mechanism for an electric vehicle charging scheme ?? Zhongyu Ma and Jie Cao and Qun Guo and Xiangwei Li and Hongfeng Ma QoS-oriented joint optimization of concurrent scheduling and power control in millimeter wave mesh backhaul network ?? Yifei Lu and Xu Ma and Zhengzhi Xu FAMD: a Flow-Aware Marking and Delay-based TCP algorithm for datacenter networks . . . . . . . . . . . . . . . . ?? Carlo K. da S. Rodrigues and Vladimir Rocha Enhancing BitTorrent for efficient interactive video-on-demand streaming over MANETs . . . . . . . . . . . . . . ?? Azana Hafizah Mohd Aman and Wan Haslina Hassan and Shilan Sameen and Zainab Senan Attarbashi and Mojtaba Alizadeh and Liza Abdul Latiff IoMT amid COVID-19 pandemic: Application, architecture, technology, and security . . . . . . . . . . . . . . ?? Savio Sciancalepore and Saeif Alhazbi and Roberto Di Pietro Receivers location privacy in avionic crowdsourced networks: Issues and countermeasures . . . . . . . . . . . . ?? Pan Jun Sun Corrigendum to ``A trust game model of service cooperation in cloud computing'' [J. Netw. Comput. Appl. \bf 173 (20) 2020 102864] . . . . . . . . . . . . . . ??
Anonymous 1 February 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Muhammad Khalid and Kezhi Wang and Nauman Aslam and Yue Cao and Naveed Ahmad and Muhammad Khurram Khan From smart parking towards autonomous valet parking: a survey, challenges and future works . . . . . . . . . . . . . . ?? José Santos and Tim Wauters and Bruno Volckaert and Filip De Turck Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks . . . . . . . . . . . . . ?? Adil Israr and Qiang Yang and Wei Li and Albert Y. Zomaya Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives . . . . . . ?? Yang Yang and Songtao Guo and Guiyan Liu and Lin Yi Fine granularity resource allocation of virtual data center with consideration of virtual switches . . . . . . . . . . ?? Piotr Borylo and Gianluca Davoli and Michal Rzepka and Artur Lason and Walter Cerroni Unified and standalone monitoring module for NFV/SDN infrastructures . . . . . . ?? Fernando Boronat and Mario Montagud and Pau Salvador and Javier Pastor Wersync: a web platform for synchronized social viewing enabling interaction and collaboration . . . . . . . . . . . . . ?? Will Serrano The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities . . . . . . . . . . . . . . ?? Mian Ahmad Jan and Jinjin Cai and Xiang-Chuan Gao and Fazlullah Khan and Spyridon Mastorakis and Muhammad Usman and Mamoun Alazab and Paul Watters Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions . . . . . . . . . . . . . . . ?? Wilson S. Melo and Luiz V. G. Tarelho and Bruno A. Rodrigues and Alysson N. Bessani and Luiz F. R. C. Carmo Field surveillance of fuel dispensers using IoT-based metering and blockchains ??
Anonymous 15 February 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Tomas Hernandez-Quintanilla and Eduardo Magaña and Daniel Morató and Mikel Izal On the reduction of authoritative DNS cache timeouts: Detection and implications for user privacy . . . . . ?? Neda Maleki and Amir Masoud Rahmani and Mauro Conti SPO: a Secure and Performance-aware Optimization for MapReduce Scheduling ?? Cheng Xu and Xinxin Wang and Shihong Duan and Jiawang Wan Spatial-temporal constrained particle filter for cooperative target tracking ?? Liang Yang and Bryan Ng and Winston K. G. Seah and Lindsay Groves and Deepak Singh A survey on network forwarding in Software-Defined Networking . . . . . . ?? Kostas Kolomvatsos Proactive tasks management for Pervasive Computing Applications . . . . . . . . . ?? Jie Xu and Jingyu Wang and Qi Qi and Jianxin Liao and Haifeng Sun and Zhu Han and Tonghong Li Network-aware task selection to reduce multi-application makespan in cloud . . ?? Yuexin Xiang and Wei Ren and Tiantian Li and Xianghan Zheng and Tianqing Zhu and Kim-Kwang Raymond Choo A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks . . . . ?? Leandro Loffi and Carla Merkle Westphall and Lukas Derner Grüdtner and Carlos Becker Westphall Mutual authentication with multi-factor in IoT--Fog--Cloud environment . . . . . ?? Ahsan Manzoor and An Braeken and Salil S. Kanhere and Mika Ylianttila and Madhsanka Liyanage Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain . . . . . . . . . . ?? Lijun Sun and Qian Yang and Xiao Chen and Zhenxiang Chen RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks . . . ??
Anonymous 1 March 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Víctor Berrocal-Plaza and Miguel A. Vega-Rodríguez Analysis and comparison of mobility management strategies in public land mobile networks from a multiobjective perspective . . . . . . . . . . . . . . ?? Pranav Nerurkar and Dhiren Patel and Yann Busnel and Romaric Ludinard and Saru Kumari and Muhammad Khurram Khan Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009--2020) ?? Tharaka Hewa and Mika Ylianttila and Madhusanka Liyanage Survey on blockchain based smart contracts: Applications, opportunities and challenges . . . . . . . . . . . . . ?? Wai-xi Liu and Jun Cai and Qing Chun Chen and Yu Wang DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks ?? Ahmed Alagha and Rabeb Mizouni and Shakti Singh and Hadi Otrok and Anis Ouali SDRS: a stable data-based recruitment system in IoT crowdsensing for localization tasks . . . . . . . . . . . ?? Marcos V. O. Assis and Luiz F. Carvalho and Jaime Lloret and Mario L. Proença A GRU deep learning system against attacks in software defined networks . . ?? Bo Yi and Xingwei Wang and Min Huang Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism . . . . . ?? Yang Xiao and Qingqi Pei and Tingting Xiao and Lina Yao and Huan Liu MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks . . . ?? Chunlin Li and Lei Zhu and Weigang Li and Youlong Luo Joint edge caching and dynamic service migration in SDN based mobile edge computing . . . . . . . . . . . . . . . ?? Bahar Farahani and Farshad Firouzi and Markus Luecking The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions ??
Anonymous 15 March 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Yihong Chen and Quanyuan Feng and Xiaolin Jia and Huayue Chen Modeling and analyzing RFID Generation-2 under unreliable channels . . . . . . . ?? Liqing Qiu and Xiangbo Tian and Jianyi Zhang and Chunmei Gu and Shiqi Sai LIDDE: a differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks . . . . . . . . . . . . ?? Wendi Feng and Chuanchang Liu and Bo Cheng and Junliang Chen Secure and cost-effective controller deployment in multi-domain SDN with Baguette . . . . . . . . . . . . . . . . ?? Ali Shakarami and Ali Shahidinejad and Mostafa Ghobaei-Arani An autonomous computation offloading strategy in Mobile Edge Computing: a deep learning-based hybrid approach . . ?? Mehdi Sookhak and Mohammad Reza Jabbarpour and Nader Sohrabi Safa and F. Richard Yu Blockchain and smart contract for access control in healthcare: a survey, issues and challenges, and open issues . . . . ?? B. V. Natesha and Ram Mohana Reddy Guddeti Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment . . . . . . . . . ?? Miao Hu and Xianzhuo Luo and Jiawen Chen and Young Choon Lee and Yipeng Zhou and Di Wu Virtual reality: a survey of enabling technologies and its applications in IoT ?? Hamed Aboutorab and Omar K. Hussain and Morteza Saberi and Farookh Khadeer Hussain and Elizabeth Chang A survey on the suitability of risk identification techniques in the current networked environment . . . . . . . . . ?? Mokhtar Mohammadi and Tarik A. Rashid and Sarkhel H. Taher Karim and Adil Hussain Mohammed Aldalwie and Quan Thanh Tho and Moazam Bidaki and Amir Masoud Rahmani and Mehdi Hosseinzadeh A comprehensive survey and taxonomy of the SVM-based intrusion detection systems . . . . . . . . . . . . . . . . ?? Md. Shahin Alom Shuvo and Md. Azad Rahaman Munna and Sujan Sarker and Tamal Adhikary and Md. Abdur Razzaque and Mohammad Mehedi Hassan and Gianluca Aloi and Giancarlo Fortino Energy-efficient scheduling of small cells in 5G: a meta-heuristic approach ??
Anonymous 1 April 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ankush Manocha and Munish Bhatia and Gulshan Kumar Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma ?? Jie Jia and Jian Chen and Yansha Deng and Xingwei Wang and Abdol-Hamid Aghvami Reliability optimization for industrial WSNs with FD relays and multiple parallel connections . . . . . . . . . . ?? Yating Yang and Tian Song and Weijia Yuan and Jianping An Towards reliable and efficient data retrieving in ICN-based satellite networks . . . . . . . . . . . . . . . . ?? Mahender Kumar and Satish Chand MedHypChain: a patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic . . . . . . . . . . . ?? Hazim Hanif and Mohd Hairul Nizam Md Nasir and Mohd Faizal Ab Razak and Ahmad Firdaus and Nor Badrul Anuar The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches . . . . . . . . . . . . . . . ?? Muhammad Saad and Joongheon Kim and DaeHun Nyang and David Mohaisen Contra-*: Mechanisms for countering spam attacks on blockchain's memory pools . . ??
Anonymous 15 April 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Raafat O. Aburukba and Taha Landolsi and Dalia Omer A heuristic scheduling approach for fog--cloud computing environment with stationary IoT devices . . . . . . . . . ?? Mir Salim Ul Islam and Ashok Kumar and Yu-Chen Hu Context-aware scheduling in Fog computing: a survey, taxonomy, challenges and future directions . . . . ?? Chunlin Li and Jun Liu and Bo Lu and Youlong Luo Cost-aware automatic scaling and workload-aware replica management for edge-cloud environment . . . . . . . . . ?? Xiaojie Liu and Xingwei Wang and Jie Jia and Min Huang A distributed deployment algorithm for communication coverage in wireless robotic networks . . . . . . . . . . . . ?? Enes Erdin and Mumin Cebe and Kemal Akkaya and Eyuphan Bulut and Selcuk Uluagac A scalable private Bitcoin payment channel network with privacy guarantees ?? Samaneh Sadegh and Kamran Zamanifar and Piotr Kasprzak and Ramin Yahyapour A two-phase virtual machine placement policy for data-intensive applications in cloud . . . . . . . . . . . . . . . . ?? Ali Dorri and Fengji Luo and Samuel Karumba and Salil Kanhere and Raja Jurdak and Zhao Yang Dong Temporary immutability: a removable blockchain solution for prosumer-side energy trading . . . . . . . . . . . . . ?? Aleksandro Montanha and Airton M. Polidorio and María del Carmen Romero-Ternero New signal location method based on signal-range data for proximity tracing tools . . . . . . . . . . . . . . . . . ??
Anonymous 1 May 2021 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Umer Majeed and Latif U. Khan and Ibrar Yaqoob and S. M. Ahsan Kazmi and Khaled Salah and Choong Seon Hong Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges . . . . . . . . . . . ?? Zahra Eghbali and Mina Zolfy Lighvan A hierarchical approach for accelerating IoT data management process based on SDN principles . . . . . . . . . . . . . . . ?? Junaid Shuja and Kashif Bilal and Waleed Alasmary and Hassan Sinky and Eisa Alanazi Applying machine learning techniques for caching in next-generation edge networks: a comprehensive survey . . . . ?? Simone Bolettieri and Raffaele Bruno and Enzo Mingozzi Application-aware resource allocation and data management for MEC-assisted IoT service providers . . . . . . . . . . . ?? Shivam Saxena and Bharat Bhushan and Mohd Abdul Ahad Blockchain based solutions to secure IoT: Background, integration trends and a way forward . . . . . . . . . . . . . ?? Jonghyun Kim and Pratik K. Biswas and Stephan Bohacek and Sharon J. Mackey and Siamak Samoohi and Mitesh P. Patel Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks . . . . . . . . . . . . . . . . ??
Anonymous 15 May 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Le Tian and Serena Santi and Amina Seferagi\'c and Julong Lan and Jeroen Famaey Wi-Fi HaLow for the Internet of Things: an up-to-date survey on IEEE 802.11ah research . . . . . . . . . . . . . . . . ?? Tao Ren and Jianwei Niu and Jiahe Cui and Zhenchao Ouyang and Xuefeng Liu An application of multi-objective reinforcement learning for efficient model-free control of canals deployed with IoT networks . . . . . . . . . . . ?? Md Sadek Ferdous and Mohammad Jabed Morshed Chowdhury and Mohammad A. Hoque A survey of consensus algorithms in public blockchain systems for crypto-currencies . . . . . . . . . . . ?? Prashanth Podili and Kotaro Kataoka TRAQR: Trust aware End-to-End QoS routing in multi-domain SDN using Blockchain . . . . . . . . . . . . . . . ?? Sheng Feng and Haiyan Shi and Longjun Huang and Shigen Shen and Shui Yu and Hua Peng and Chengdong Wu Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot . . . . . . . . . . . . . . . . . ??
Anonymous 1 June 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Giuseppe Aceto and Domenico Ciuonzo and Antonio Montieri and Antonio Pescapé DISTILLER: Encrypted traffic classification via multimodal multitask deep learning . . . . . . . . . . . . . ?? Quanjun Zhao and Songtao Guo and Guiyan Liu Cost\_EACP: Cost-effective adaptive controller provisioning in software defined DCNs . . . . . . . . . . . . . . ?? Shumaila Javaid and Zhenqiang Wu and Zara Hamid and Sherali Zeadally and Hamza Fahim Temperature-aware routing protocol for Intrabody Nanonetworks . . . . . . . . . ?? LanLan Rui and Menglei Zhang and Zhipeng Gao and Xuesong Qiu and Zhili Wang and Ao Xiong Service migration in multi-access edge computing: a joint state adaptation and reinforcement learning mechanism . . . . ?? S. Jayalekshmi and R. Leela Velusamy GSA-RPI: GSA based Rendezvous Point Identification in a two-level cluster based LR-WPAN for uncovering the optimal trajectory of Mobile Data Collection Agent . . . . . . . . . . . . . . . . . ?? Mohamed Mohamadi and Badis Djamaa and Mustapha Reda Senouci and Abdelhamid Mellouk FAN: Fast and Active Network Formation in IEEE 802.15.4 TSCH Networks . . . . . ?? Ajit Muzumdar and Chirag Modi and Madhu G. M. and C. Vyjayanthi A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts ??
Anonymous 1 July 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Bilal Abu-Salih Domain-specific knowledge graphs: a survey . . . . . . . . . . . . . . . . . ?? Xinqian Liu and Jiadong Ren and Haitao He and Bing Zhang and Chen Song and Yunxue Wang A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel . . . . . . . . . ?? Stella Ho and Youyang Qu and Bruce Gu and Longxiang Gao and Jianxin Li and Yong Xiang DP-GAN: Differentially private consecutive data publishing using generative adversarial nets . . . . . . ?? Zahra Makki Nayeri and Toktam Ghafarian and Bahman Javadi Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey . . . . . . . . . . . ?? Leyi Shi and Xiaoyu Li and Zhenbo Gao and Pengfei Duan and Na Liu and Honglong Chen Worm computing: a blockchain-based resource sharing and cybersecurity framework . . . . . . . . . . . . . . . ??
Anonymous 15 July 2021 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? LanLan Rui and Menglei Zhang and Zhipeng Gao and Xuesong Qiu and Zhili Wang and Ao Xiong Corrigendum to ``Service migration in multi-access edge computing: a joint state adaptation and reinforcement learning mechanism'' [J. Netw. Comput. Appl. \bf 183--184 (2021) 103058] . . . ?? Pangun Park and Hossein S. Ghadikolaei and Carlo Fischione Proactive fault-tolerant wireless mesh networks for mission-critical control systems . . . . . . . . . . . . . . . . ?? Qingtao Wu and Qianyu Wang and Mingchuan Zhang and Ruijuan Zheng and Junlong Zhu and Jiankun Hu Learned Bloom-filter for the efficient name lookup in Information-Centric Networking . . . . . . . . . . . . . . . ?? Nabajyoti Mazumdar and Saugata Roy and Amitava Nag and Sukumar Nandi An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network . . . . . . . . . . . . . ?? Ahmad Zareie and Rizos Sakellariou Minimizing the spread of misinformation in online social networks: a survey . . ??
Anonymous 1 August 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Meghna Raj and Shashank Gupta and Vinay Chamola and Anubhav Elhence and Tanya Garg and Mohammed Atiquzzaman and Dusit Niyato A survey on the role of Internet of Things for adopting and promoting Agriculture 4.0 . . . . . . . . . . . . ?? Nisha Ahuja and Gaurav Singal and Debajyoti Mukhopadhyay and Neeraj Kumar Automated DDOS attack detection in software defined networking . . . . . . ?? Ismael Amezcua Valdovinos and Jesús Arturo Pérez-Díaz and Kim-Kwang Raymond Choo and Juan Felipe Botero Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions . . . . ?? Sang-Woong Lee and Haval Mohammed sidqi and Mokhtar Mohammadi and Shima Rashidi and Amir Masoud Rahmani and Mohammad Masdari and Mehdi Hosseinzadeh Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review . . . ??
Anonymous 15 August 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Meena Pundir and Jasminder Kaur Sandhu A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision . . . . . . . . . . . . . ?? Xuerui Wang and Zheng Yan and Rui Zhang and Peng Zhang Attacks and defenses in user authentication systems: a survey . . . . ?? Xu Zhao and Guangqiu Huang and Ling Gao and Maozhen Li and Quanli Gao Low load DIDS task scheduling based on $Q$-learning in edge computing environment . . . . . . . . . . . . . . ??
Anonymous 1 September 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Xin Jian and Langyun Wu and Keping Yu and Moayad Aloqaily and Jalel Ben-Othman Energy-efficient user association with load-balancing for cooperative IIoT network within B5G era . . . . . . . . . ?? Yingya Guo and Weipeng Wang and Han Zhang and Wenzhong Guo and Zhiliang Wang and Ying Tian and Xia Yin and Jianping Wu Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning . . . . . . . . . . . . . . . . ?? Zhiwei Zhang and Lin Cui and Jia Wu Exploring an edge convolution and normalization based approach for link prediction in complex networks . . . . . ?? Rizwana Shahzadi and Mudassar Ali and Humayun Zubair Khan and Muhammad Naeem UAV assisted 5G and beyond wireless networks: a survey . . . . . . . . . . . ?? Tommaso Zoppi and Andrea Ceccarelli Prepare for trouble and make it double! Supervised--unsupervised stacking for anomaly-based intrusion detection . . . ?? Hoang Minh Do and Mark A. Gregory and Shuo Li SDN-based wireless mobile backhaul architecture: Review and challenges . . ?? Yuan Liu and Rentao Gu and Zeyuan Yang and Yuefeng Ji Hierarchical community discovery for multi-stage IP bearer network upgradation . . . . . . . . . . . . . . ??
Anonymous 15 September 2021 . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Mohammad Sadegh Yousefpoor and Efat Yousefpoor and Hamid Barati and Ali Barati and Ali Movaghar and Mehdi Hosseinzadeh Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review . . . . . . . . . . ?? Tanveer Khan and Antonis Michalas and Adnan Akhunzada Fake news outbreak 2021: Can we stop the viral spread? . . . . . . . . . . . . . ?? Jiajing Wu and Jieli Liu and Yijing Zhao and Zibin Zheng Analysis of cryptocurrency transactions from a network perspective: an overview ?? Hai T. Nguyen and Tien V. Do and Csaba Rotter Optimizing the resource usage of actor-based systems . . . . . . . . . . ?? Elie Zaraket and Nour Mohammad Murad and Samar Syed Yazdani and Lala Rajaoarisoa and Blaise Ravelo An overview on low energy wake-up radio technology: Active and passive circuits associated with MAC and routing protocols . . . . . . . . . . . . . . . ?? Ahmad Salah AlAhmad and Hasan Kahtan and Yehia Ibrahim Alzoubi and Omar Ali and Ashraf Jaradat Mobile cloud computing models security issues: a systematic review . . . . . . ?? Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio Hernandez-Castro Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains . . . . . . . . . . . . . . . . ?? Hui Yang and Kaixuan Zhan and Bowen Bao and Qiuyan Yao and Jie Zhang and Mohamed Cheriet Automatic guarantee scheme for intent-driven network slicing and reconfiguration . . . . . . . . . . . . ?? Yunhe Cui and Qing Qian and Chun Guo and Guowei Shen and Youliang Tian and Huanlai Xing and Lianshan Yan Towards DDoS detection mechanisms in Software-Defined Networking . . . . . . ??
Anonymous 1 October 2021 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Quoc-Viet Pham and Dinh C. Nguyen and Seyedali Mirjalili and Dinh Thai Hoang and Diep N. Nguyen and Pubudu N. Pathirana and Won-Joo Hwang Swarm intelligence for next-generation networks: Recent advances and applications . . . . . . . . . . . . . . ?? Yan Huang and Wei Li and Jinbao Wang and Zhipeng Cai and Anu G. Bourgeois Privacy protection among three antithetic-parties for context-aware services . . . . . . . . . . . . . . . . ?? Imen Jemili and Dhouha Ghrab and Abdelfettah Belghith and Mohamed Mosbah and Saad Al-Ahmadi Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks . . . . . . . . . . . . ?? Maha Kadadha and Hadi Otrok and Shakti Singh and Rabeb Mizouni and Anis Ouali Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing . . . . . . . . . . . . . ?? Ahmad Zairi Zaidi and Chun Yong Chong and Zhe Jin and Rajendran Parthiban and Ali Safaa Sadiq Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities . . . . . . ?? Anand M. Baswade and Mohith Reddy and Antony Franklin A. and Bheemarjuna Reddy Tamma and Vanlin Sathya Performance analysis of spatially distributed LTE-U/NR-U and Wi-Fi networks: an analytical model for coexistence study . . . . . . . . . . . ?? Longbiao Chen and Zhihan Jiang and Dingqi Yang and Cheng Wang and Thi-Mai-Trang Nguyen Fog radio access network optimization for 5G leveraging user mobility and traffic data . . . . . . . . . . . . . . ?? Chunlin Li and Yong Zhang and Mingyang Song and Xin Yan and Youlong Luo An optimized content caching strategy for video stream in edge-cloud environment . . . . . . . . . . . . . . ?? Mahmoud Said ElSayed and Nhien-An Le-Khac and Marwan Ali Albahar and Anca Jurcut A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique . . . ?? Vincenzo Agate and Alessandra De Paola and Pierluca Ferraro and Giuseppe Lo Re and Marco Morana SecureBallot: a secure open source e-Voting system . . . . . . . . . . . . ??
Anonymous 15 October 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Jannatun Noor and Saiful Islam Salim and A. B. M. Alim Al Islam Strategizing secured image storing and efficient image retrieval through a new cloud framework . . . . . . . . . . . . ?? Ahmed Yaser Fahad Alsahlani and Alexandru Popa LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment . . . . . . . . ?? Sen Liu and Jiawei Huang and Wenchao Jiang and Jianxin Wang Reducing traffic burstiness for MPTCP in data center networks . . . . . . . . . . ?? Fillipe Santos and Andre L. L. Aquino and Edmundo R. M. Madeira and Raquel S. Cabral Temporal complex networks modeling applied to vehicular ad-hoc networks . . ?? EL Hocine Bouzidi and Abdelkader Outtagarts and Rami Langar and Raouf Boutaba Deep Q-Network and Traffic Prediction based Routing Optimization in Software Defined Networks . . . . . . . . . . . . ?? Shwet Ketu and Pramod Kumar Mishra Internet of Healthcare Things: a contemporary survey . . . . . . . . . . ?? Changsong Yang and Feng Zhao and Xiaoling Tao and Yong Wang Publicly verifiable outsourced data migration scheme supporting efficient integrity checking . . . . . . . . . . . ?? Mostafa Haghi Kashani and Mona Madanipour and Mohammad Nikravan and Parvaneh Asghari and Ebrahim Mahdipour A systematic review of IoT in healthcare: Applications, techniques, and trends . . . . . . . . . . . . . . . ?? Qiumei Cheng and Chunming Wu and Haifeng Zhou and Dezhang Kong and Dong Zhang and Junchi Xing and Wei Ruan Machine learning based malicious payload identification in software-defined networking . . . . . . . . . . . . . . . ??
Anonymous 1 November 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Liqun Yang and You Zhai and Zhoujun Li Deep learning for online AC False Data Injection Attack detection in smart grids: an approach using LSTM-Autoencoder . . . . . . . . . . . . ?? Prabhakar Krishnan and Subhasri Duttagupta and Rajkumar Buyya OpenPATH: Application aware high-performance software-defined switching framework . . . . . . . . . . ?? Junyan Guo and Ye Du and Yahang Zhang and Meihong Li A provably secure ECC-based access and handover authentication protocol for space information networks . . . . . . . ?? Hao Hao and Changqiao Xu and Shujie Yang and Lujie Zhong and Gabriel-Miro Muntean Multicast-aware optimization for resource allocation with edge computing and caching . . . . . . . . . . . . . . ?? Yuning Jiang and Yacine Atif A selective ensemble model for cognitive cybersecurity analysis . . . . . . . . . ?? Huu-Khoi Bui and Ying-Dar Lin and Ren-Hung Hwang and Po-Ching Lin and Van-Linh Nguyen and Yuan-Cheng Lai CREME: a toolchain of automatic dataset collection for machine learning in intrusion detection . . . . . . . . . . ?? Israat Haque and Dipon Saha SoftIoT: a resource-aware SDN/NFV-based IoT network . . . . . . . . . . . . . . ?? Xiaobei Yan and Maode Ma A lightweight and secure handover authentication scheme for 5G network using neighbour base stations . . . . . ??
Anonymous 15 November 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Kaylani Bochie and Mateus S. Gilbert and Luana Gantert and Mariana S. M. Barbosa and Dianne S. V. Medeiros and Miguel Elias M. Campista A survey on deep learning for challenged networks: Applications and trends . . . ?? Selma Yahia and Yassine Meraihi and Amar Ramdane-Cherif and Asma Benmessaoud Gabis and Dalila Acheli and Hongyu Guan A Survey of Channel Modeling Techniques for Visible Light Communications . . . . ?? Majda Omer Elbasheer and Abdulaziz Aldegheishem and Jaime Lloret and Nabil Alrajeh A QoS-Based routing algorithm over software defined networks . . . . . . . ?? Shie-Yuan Wang and Jui-En Chang and Cheng-Da Lin Design, implementation, and performance evaluation of a drone wakeup and data collection system for smart meters . . . ?? Muralitharan Krishnan and Yongdo Lim Reinforcement learning-based dynamic routing using mobile sink for data collection in WSNs and IoT applications ?? Xi Liu and Jian Cen and Huanzhong Hu and Zongwei Yu and Yuanxin Huang A radio map self-updating algorithm based on mobile crowd sensing . . . . . ??
Anonymous 1 December 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Abdellah Houmz and Ghita Mezzour and Karim Zkik and Mounir Ghogho and Houda Benbrahim Detecting the impact of software vulnerability on attacks: a case study of network telescope scans . . . . . . . ?? Hongyan Zhang and Limei Lin and Li Xu and Xiaoding Wang Graph partition based privacy-preserving scheme in social networks . . . . . . . ?? Abdurrashid Ibrahim Sanka and Ray C. C. Cheung A systematic review of blockchain scalability: Issues, solutions, analysis and future research . . . . . . . . . . ?? Josué Castañeda and Saul E. Pomares Hernández and Sami Yangui and Julio C. Pérez Sansalvador and Lil M. Rodr\'ìguez Henr\'ìquez and Khalil Drira VNF-based network service consistent reconfiguration in multi-domain federations: a distributed approach . . ?? Ruhma Tahir and Shahzaib Tahir and Hasan Tahir and Klaus McDonald-Maier and Gareth Howells and Ali Sajjad A novel ICMetric public key framework for secure communication . . . . . . . . ?? Anjula Mehto and Shashikala Tapaswi and K. K. Pattanaik Multi-objective particle swarm optimization based rendezvous point selection for the energy and delay efficient networked wireless sensor data acquisition . . . . . . . . . . . . . . ??
Anonymous 15 December 2021 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Kai Lei and Junlin Huang and Xiaodong Li and Yu Li and Ye Zhang and Bo Bai and Fan Zhang and Gong Zhang and Jingjie Jiang HOPASS: a two-layer control framework for bandwidth and delay guarantee in datacenters . . . . . . . . . . . . . . ?? Fan Zhang and Yazhe Tang and Danfeng Shan and Huanzhao Wang and Chengchen Hu RICH: Strategy-proof and efficient coflow scheduling in non-cooperative environments . . . . . . . . . . . . . . ?? Jiaojiao Jiang and Jean-Guy Schneider and Steve Versteeg and Jun Han and MD Arafat Hossain and Chengfei Liu R-gram: Inferring message formats of service protocols with relative positional $n$-grams . . . . . . . . . . ?? Bingjie Wei and Lin Wang and Junlong Zhu and Mingchuan Zhang and Ling Xing and Qingtao Wu Flow control oriented forwarding and caching in cache-enabled networks . . . ?? Mallikarjun Reddy Dorsala and V. N. Sastry and Sudhakar Chapram Blockchain-based solutions for cloud computing: a survey . . . . . . . . . . ?? U. S. P. Srinivas Aditya and Roshan Singh and Pranav Kumar Singh and Anshuman Kalla A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions . . . . . . . . . . . ?? Nabila Sabrin Sworna and A. K. M. Muzahidul Islam and Swakkhar Shatabda and Salekul Islam Towards development of IoT-ML driven healthcare systems: a survey . . . . . . ??
Anonymous January 2022 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous Thank You Reviewers . . . . . . . . . . ?? Debanjan Roy Chowdhury and Sukumar Nandi and Diganta Goswami Video streaming over IoV using IP multicast . . . . . . . . . . . . . . . ?? Fanghui Sun and Shen Wang and Hongli Zhang A progressive learning method on unknown protocol behaviors . . . . . . . . . . . ?? Irian Leyva-Pupo and Cristina Cervelló-Pastor Efficient solutions to the placement and chaining problem of User Plane Functions in 5G networks . . . . . . . . . . . . . ?? Khizar Hameed and Saurabh Garg and Muhammad Bilal Amin and Byeong Kang and Abid Khan A context-aware information-based clone node attack detection scheme in Internet of Things . . . . . . . . . . . . . . . ?? Gunjan Verma and Kelvin Marcus and Kevin S. Chan Optimizing the quality of information of networked machine learning agents . . . ??
Anonymous February 2022 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Sana Benhamaid and Abdelmadjid Bouabdallah and Hicham Lakhlef Recent advances in energy management for Green-IoT: an up-to-date and comprehensive survey . . . . . . . . . . ?? Xiaoqing Zhang and Fei Yang and Yue Hu and Zhao Tian and Wei Liu and Yifa Li and Wei She RANet: Network intrusion detection with group-gating convolutional neural network . . . . . . . . . . . . . . . . ?? Waleed Bin Shahid and Baber Aslam and Haider Abbas and Saad Bin Khalid and Hammad Afzal An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling . . . ?? Shie-Yuan Wang and Jen-Chieh Chang Design and implementation of an intrusion detection system by using Extended BPF in the Linux kernel . . . . ?? Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Xiaowei Li and Yang Xu A robust authentication scheme for remote diagnosis and maintenance in 5G V2N . . . . . . . . . . . . . . . . . . ?? Lanlan Rui and Siqi Yang and Zhipeng Gao and Wenjing Li and Xuesong Qiu and Luoming Meng Smart network maintenance in edge cloud computing environment: an allocation mechanism based on comprehensive reputation and regional prediction model ?? Abir El Azzaoui and Pradip Kumar Sharma and Jong Hyuk Park Blockchain-based delegated Quantum Cloud architecture for medical big data security . . . . . . . . . . . . . . . . ?? Kazi Yasin Islam and Iftekhar Ahmad and Daryoush Habibi and Adnan Waqar A survey on energy efficiency in underwater wireless communications . . . ?? Faheem Ullah and M. Ali Babar On the scalability of Big Data Cyber Security Analytics systems . . . . . . . ??
Anonymous March 2022 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Tuan Anh Nguyen and Minjune Kim and Jangse Lee and Dugki Min and Jae-Woo Lee and Dongseong Kim Performability evaluation of switch-over Moving Target Defence mechanisms in a Software Defined Networking using stochastic reward nets . . . . . . . . . ?? Kiki Adhinugraha and Wenny Rahayu and Takahiro Hara and David Taniar Measuring fault tolerance in IoT mesh networks using Voronoi diagram . . . . . ?? Yimin Liu and Xiangyang Luo and Meng Zhang and Zhiyuan Tao and Fenlin Liu Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio . . . . . . . . . . . . . . . . . ?? Micha\l Kalewski and Jerzy Brzezi\'nski Uniform and regular reliable broadcast protocols facilitating concurrent message dissemination for mobile ad hoc networks with the network liveness property . . . . . . . . . . . . . . . . ?? Yadong Zhou and Hao Li and Kaiyue Chen and Tian Pan and Kun Qian and Kai Zheng and Bin Liu and Peng Zhang and Yazhe Tang and Chengchen Hu Raze policy conflicts in SDN . . . . . . ?? Bin Liang and Mark A. Gregory and Shuo Li Multi-access Edge Computing fundamentals, services, enablers and challenges: a complete survey . . . . . ?? Shuaib K. Memon and Nurul I. Sarkar and Adnan Al-Anbuky and Md Akbar Hossain Preemptive admission control mechanism for strict QoS guarantee to life-saving emergency traffic in wireless LANs . . . ?? Himanshu Gauttam and K. K. Pattanaik and Saumya Bhadauria and Divya Saxena and Sapna A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm . . . . . . . . . . . . . . . . ??
Anonymous April 2022 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Sanjay Kumar Biswash Device and network driven cellular networks architecture and mobility management technique for fog computing-based mobile communication system . . . . . . . . . . . . . . . . . ?? Abu Jahid and Mohammed H. Alsharif and Trevor J. Hall A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction . . . . . . . . . ?? Jong Wook Kim and Kennedy Edemacu and Beakcheol Jang Privacy-preserving mechanisms for location privacy in mobile crowdsensing: a survey . . . . . . . . . . . . . . . . ?? Sophia Auer and Sophia Nagler and Somnath Mazumdar and Raghava Rao Mukkamala Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a case study . . . . . . . . . . . . . . . ?? Farrukh Mehmood and Naveed Khan Baloch and Fawad Hussain and Waqar Amin and M. Shamim Hossain and Yousaf Bin Zikria and Heejung Yu An efficient and cost effective application mapping for network-on-chip using Andean condor algorithm . . . . . ?? Shah Zeb and Aamir Mahmood and Syed Ali Hassan and MD. Jalil Piran and Mikael Gidlund and Mohsen Guizani Industrial digital twins at the nexus of NextG wireless networks and computational intelligence: a survey . . ?? Lorenzo Valerio and Franco Maria Nardini and Andrea Passarella and Raffaele Perego Dynamic hard pruning of Neural Networks at the edge of the Internet . . . . . . ?? Fares Mezrag and Salim Bitam and Abdelhamid Mellouk An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks . . . . . . . . . . . . ?? Quang Tung Thai and Namseok Ko and Sung Hyuk Byun and Sun-Me Kim Design and implementation of NDN-based Ethereum blockchain . . . . . . . . . . ?? Meriem Achir and Abdelkrim Abdelli and Lynda Mokdad and Jalel Benothman Service discovery and selection in IoT: a survey and a taxonomy . . . . . . . . ??
Anonymous May 2022 . . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Venkatarami Reddy Chintapalli and Madhura Adeppady and Bheemarjuna Reddy Tamma and Antony Franklin A. \pkgRESTRAIN: a dynamic and cost-efficient resource management scheme for addressing performance interference in NFV-based systems . . . ?? Sadoon Azizi and Mohammad Shojafar and Jemal Abawajy and Rajkumar Buyya Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: a semi-greedy approach . . . . ?? Raihan Ur Rasool and Hafiz Farooq Ahmad and Wajid Rafique and Adnan Qayyum and Junaid Qadir Security and privacy of internet of medical things: a contemporary review in the age of surveillance, botnets, and adversarial ML . . . . . . . . . . . . . ?? S. M. Asiful Huda and Sangman Moh Survey on computation offloading in UAV-Enabled mobile edge computing . . . ?? Domenico Cotroneo and Luigi De Simone and Roberto Natella \pkgThorFI: a Novel Approach for Network Fault Injection as a Service . . . . . . ?? Shashwat Kumar and Lalit Bhagat and Antony Franklin A. and Jiong Jin Multi-neural network based tiled 360${}^\circ $ video caching with Mobile Edge Computing . . . . . . . . . . . . . ?? Qian Li and Cong Zeng and Wei Xu and Yunpeng Xiao A social rumor and anti-rumor game diffusion model based on sparse representation and tensor completion . . ?? Mostafa Ayoubi Mobarhan and Mohammed Salamah REPS-AKA3: a secure authentication and re- authentication protocol for LTE networks . . . . . . . . . . . . . . . . ?? Guangxian Liang and Xiaopeng Yao and Yue Gu and Hejiao Huang and Chonglin Gu Multi-Batches Revenue Maximization for competitive products over online social network . . . . . . . . . . . . . . . . ?? Yang Wang and Xiong Wang and Shizhong Xu and Ci He and Yasheng Zheng and Jing Ren and Shui Yu \pkgFlexMon: a flexible and fine-grained traffic monitor for programmable networks . . . . . . . . . . . . . . . . ?? Mert Nakip and Erdem Çakan and Volkan Rodoplu and Cüneyt Güzelis Dynamic Automatic Forecaster Selection via Artificial Neural Network Based Emulation to Enable Massive Access for the Internet of Things . . . . . . . . . ??
Anonymous June 2022 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Reza Honarvar and Alireza Zolghadrasli and Mehdi Monemi Context-oriented performance evaluation of network selection algorithms in 5G heterogeneous networks . . . . . . . . . ?? Ahmed Salim and Walid Osamy and Ahmed Aziz and Ahmed M. Khedr SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs . . . . . . . . . . . . . . . ?? Jie Sun and Yi Zhang and Feng Liu and Huandong Wang and Xiaojian Xu and Yong Li A survey on the placement of virtual network functions . . . . . . . . . . . ?? Wei Wei and Qi Wang and Weidong Yang and Yashuang Mu Efficient stochastic scheduling for highly complex resource placement in edge clouds . . . . . . . . . . . . . . ?? Radhika Chapaneri and Seema Shah Enhanced detection of imbalanced malicious network traffic with regularized Generative Adversarial Networks . . . . . . . . . . . . . . . . ?? Chuan Feng and Pengchao Han and Xu Zhang and Bowen Yang and Yejun Liu and Lei Guo Computation offloading in mobile edge computing networks: a survey . . . . . . ?? Chadni Islam and M. Ali Babar and Roland Croft and Helge Janicke SmartValidator: a framework for automatic identification and classification of cyber threat data . . ?? Nadeem Ahmed and Regio A. Michelin and Wanli Xue and Guntur Dharma Putra and Sushmita Ruj and Salil S. Kanhere and Sanjay Jha DIMY: Enabling privacy-preserving contact tracing . . . . . . . . . . . . ?? B. Mohammad Hasani Zade and N. Mansouri and M. M. Javidi A two-stage scheduler based on New Caledonian Crow Learning Algorithm and reinforcement learning strategy for cloud environment . . . . . . . . . . . ?? Marta Catillo and Antonio Pecchia and Umberto Villano No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation . . . . . . . . . ??
Anonymous July 2022 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Nan Wang and Blesson Varghese Context-aware distribution of fog applications using deep reinforcement learning . . . . . . . . . . . . . . . . ?? Madhusanka Liyanage and Quoc-Viet Pham and Kapal Dev and Sweta Bhattacharya and Praveen Kumar Reddy Maddikunta and Thippa Reddy Gadekallu and Gokul Yenduri A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks . . . . . . . . . . . . ?? Shantanu Pal and Ali Dorri and Raja Jurdak Blockchain for IoT access control: Recent trends and future research directions . . . . . . . . . . . . . . . ?? Mauro Conti and Gulshan Kumar and Pranav Nerurkar and Rahul Saha and Luigi Vigneri A survey on security challenges and solutions in the IOTA . . . . . . . . . ?? Xingjia Li and Li Pan and Shijun Liu A survey of resource provisioning problem in cloud brokers . . . . . . . . ?? Pooja Gupta and Volkan Dedeoglu and Salil S. Kanhere and Raja Jurdak TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces . . . . . . . . . ?? Soo-Yeon Ji and Bong Keun Jeong and Charles Kamhoua and Nandi Leslie and Dong Hyun Jeong Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables . . . . . . . . ?? Tianheng Li and Xiaofan He and Siming Jiang and Juan Liu A survey of privacy-preserving offloading methods in mobile-edge computing . . . . . . . . . . . . . . . ?? Huda Althumali and Mohamed Othman and Nor Kamariah Noordin and Zurina Mohd Hanapi Priority-based load-adaptive preamble separation random access for QoS-differentiated services in 5G networks . . . . . . . . . . . . . . . . ?? Luigi Coppolino and Salvatore D'Antonio and Giovanni Mazzeo and Luigi Romano and Luigi Sgaglione \pkgPriSIEM: Enabling privacy-preserving Managed Security Services . . . . . . . ?? Asterios Mpatziakas and Anastasios Drosou and Stavros Papadopoulos and Dimitiris Tzovaras IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization . . . . . . ?? Long Luo and Klaus-Tycho Foerster and Stefan Schmid and Hongfang Yu Optimizing multicast flows in high-bandwidth reconfigurable datacenter networks . . . . . . . . . . . . . . . . ?? Mattia Fogli and Carlo Giannelli and Cesare Stefanelli Software-Defined Networking in wireless ad hoc scenarios: Objectives and control architectures . . . . . . . . . . . . . ?? J. Kok Konjaang and John Murphy and Liam Murphy Energy-efficient virtual-machine mapping algorithm (EViMA) for workflow tasks with deadlines in a cloud environment ??
Anonymous August 2022 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Chu-Fu Wang and Yih-Kai Lin and Jun-Cheng Chen A cooperative image object recognition framework and task offloading optimization in edge computing . . . . . ?? Tahseen Khan and Wenhong Tian and Guangyao Zhou and Shashikant Ilager and Mingming Gong and Rajkumar Buyya Machine learning (ML)-centric resource management in cloud computing: a review and future directions . . . . . . . . . ?? Taejune Park and Kilho Lee Supporting ultra-low latency mixed-criticality communication using hardware-based data plane architecture ?? Sara Lahlou and Youness Moukafih and Anass Sebbar and Karim Zkik and Mohammed Boulmalf and Mounir Ghogho TD-RA policy-enforcement framework for an SDN-based IoT architecture . . . . . ?? Mansoureh Abbasi-Verki and Saleh Yousefi and Hashem Kalbkhani Socially-aware and energy-efficient resource allocation and power control for D2D multicast content distribution ?? Mohammad Nikravan and Mostafa Haghi Kashani A review on trust management in fog/edge computing: Techniques, trends, and challenges . . . . . . . . . . . . . . . ?? Ashish Kumar and Rahul Saha and Mauro Conti and Gulshan Kumar and William J. Buchanan and Tai Hoon Kim A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions . . . . . . . . . . . . . . ?? Dipanwita Thakur and Suparna Biswas An Integration of feature extraction and Guided Regularized Random Forest feature selection for Smartphone based Human Activity Recognition . . . . . . . . . . ?? Gerald K. Ijemaru and Li Minn Ang and Kah Phooi Seng Transformation from IoT to IoV for waste management in smart cities . . . . . . . ?? Muhammad Morshed Alam and Sangman Moh Joint topology control and routing in a UAV swarm for crowd surveillance . . . . ?? Umar Ghafoor and Mudassar Ali and Humayun Zubair Khan and Adil Masood Siddiqui and Muhammad Naeem NOMA and future 5G and B5G wireless networks: a paradigm . . . . . . . . . . ??
Anonymous September 2022 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ansa Shermin S. and Sarang C. Dhongdi Review of Underwater Mobile Sensor Network for ocean phenomena monitoring ?? Pau Ferrer-Cid and Jose M. Barcelo-Ordinas and Jorge Garcia-Vidal Data reconstruction applications for IoT air pollution sensor networks using graph signal processing . . . . . . . . ?? Mamta Agiwal and Anil Agiwal and Mukesh Kumar Maheshwari and Shapna Muralidharan Split PO for paging in B5G networks . . ?? Shakoor Vakilian and Ali Fanian and Hossein Falsafain and T. Aaron Gulliver Node cooperation for workload offloading in a fog computing network via multi-objective optimization . . . . . . ?? Dinesh Soni and Neetesh Kumar Machine learning techniques in emerging cloud computing integrated paradigms: a survey and taxonomy . . . . . . . . . . ?? Prasanta Kumar Roy and Prashant Sahu and Ansuman Bhattacharya FastHand: a fast handover authentication protocol for densely deployed small-cell networks . . . . . . . . . . . . . . . . ?? Samira Bokhari and Sofiane Hamrioui and Meziane Aider Cybersecurity strategy under uncertainties for an IoE environment . . ?? Mattia G. Campana and Franca Delmastro On-device modeling of user's social context and familiar places from smartphone-embedded sensor data . . . . ?? Peiying Zhang and Peng Gan and Neeraj Kumar and Chunxiao Jiang and Fanglin Liu and Lei Zhang Survivable virtual network embedding algorithm considering multiple node failure in IIoT environment . . . . . . ?? Haoran Ni and Zehua Guo and Changlin Li and Songshi Dou and Chao Yao and Thar Baker Network Coding-based Resilient Routing for Maintaining Data Security and Availability in Software-Defined Networks . . . . . . . . . . . . . . . . ?? Xiaoping Wu and Yunlong Li and Yana Shen and Xuefen Zhu Efficient solutions for target localization in asynchronous MIMO networks . . . . . . . . . . . . . . . . ?? Shamim Taimoor and Lilatul Ferdouse and Waleed Ejaz Holistic resource management in UAV-assisted wireless networks: an optimization perspective . . . . . . . . ?? Hamza Baniata and Attila Kertesz PriFoB: a Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification . . . . . . . . . . . . . . ?? Noe M. Yungaicela-Naula and Cesar Vargas-Rosales and Jesús Arturo Pérez-Díaz and Diego Fernando Carrera A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning . . . ?? Ihsan Mert Ozcelik and Cem Ersoy ALVS: Adaptive Live Video Streaming using deep reinforcement learning . . . ?? Kamalesh Karmakar and Somrita Banerjee and Rajib K. Das and Sunirmal Khatua Utilization aware and network I/O intensive virtual machine placement policies for cloud data center . . . . . ?? Anal Paul and Aneesh Kumar Mishra and Shivam Shreevastava and Anoop Kumar Tiwari Deep Reinforcement Learning based reliable spectrum sensing under SSDF attacks in Cognitive Radio networks . . ?? Nazma Akther and Kingshuk Dhar and Shahid Md. Asif Iqbal and Mohammed Nurul Huda and Asaduzzaman \em Interest forwarding strategy in Named \em Data Networks (\em NDN) using Thompson Sampling . . . . . . . . . . . ?? Min Li and Di Xiao and Hui Huang and Bo Zhang Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system . . . . . ?? Qiang Zou and Yifeng Zhu and Yujuan Tan and Wei Chen Diagnosing the coexistence of Poissonity and self-similarity in memory workloads ?? Nan Wang and Tong Liu and Jinzhen Wang and Qing Liu and Shakeel Alibhai and Xubin He Locality-based transfer learning on compression autoencoder for efficient scientific data lossy compression . . . ??
Anonymous October 2022 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Fauzia Irram and Mudassar Ali and Muhammad Naeem and Shahid Mumtaz Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions . . . . . . . . . . . ?? Jong Wook Kim and Beakcheol Jang Deep learning-based privacy-preserving framework for synthetic trajectory generation . . . . . . . . . . . . . . . ?? Minghui Wu and Dawei Sun and Yijing Cui and Shang Gao and Xunyun Liu and Rajkumar Buyya A state lossless scheduling strategy in distributed stream computing systems . . ?? Nguyen Khoi Tran and M. Ali Babar and Andrew Walters A framework for automating deployment and evaluation of blockchain networks ?? Qianyu Long and Kostas Kolomvatsos and Christos Anagnostopoulos Knowledge reuse in edge computing environments . . . . . . . . . . . . . . ?? Praveen Kumar Reddy Maddikunta and Quoc-Viet Pham and Dinh C. Nguyen and Thien Huynh-The and Ons Aouedi and Gokul Yenduri and Sweta Bhattacharya and Thippa Reddy Gadekallu Incentive techniques for the Internet of Things: a survey . . . . . . . . . . . . ?? Changue Jung and Suhwan Kim and Younghoon Kim and Ikjun Yeom Virtualizing GPU direct packet I/O on commodity Ethernet to accelerate GPU-NFV ?? Ahmed Elshrkasi and Kaharudin Dimyati and Khairol Amali Bin Ahmad and Mohamed Faidz bin Mohamed Said Enhancement of cellular networks via an improved clustering technique with D2D communication for mission-critical applications . . . . . . . . . . . . . . ?? Hisham Al-Ward and Chee Keong Tan and Wern Han Lim Caching transient data in Information-Centric Internet-of-Things (IC-IoT) networks: a survey . . . . . . ?? Fahimeh Dabaghi-Zarandi and Parsa KamaliPour Community detection in complex network based on an improved random algorithm using local and global network information . . . . . . . . . . . . . . ??
Anonymous November 2022 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Heng Ye and Jiqiang Liu and Hao Zhen and Wenbin Jiang and Bin Wang and Wei Wang VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios . . . . . . . ?? Syed M. Raza and Boyun Jang and Huigyu Yang and Moonseong Kim and Hyunseung Choo Improved GAN with fact forcing for mobility prediction . . . . . . . . . . ?? Ruiyun Yu and Ann Move Oguti and Dennis Reagan Ochora and Shuchen Li Towards a privacy-preserving smart contract-based data aggregation and quality-driven incentive mechanism for mobile crowdsensing . . . . . . . . . . ?? Mustafa Ibrahim Khaleel PPR-RM: Performance-to-Power Ratio, Reliability and Makespan-aware scientific workflow scheduling based on a coalitional game in the cloud . . . . ?? Yuxian Liu and Fagui Liu and Hao-Tian Wu and Jingfeng Yang and Kaihong Zheng and Lingling Xu and Xingfu Yan and Jiankun Hu RPTD: Reliability-enhanced Privacy-preserving Truth Discovery for Mobile Crowdsensing . . . . . . . . . . ?? Gonzalo Munilla Garrido and Johannes Sedlmeir and Ömer Uluda\ug and Ilias Soto Alaoui and Andre Luckow and Florian Matthes Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: a systematic literature review . . . . . . ?? Khalid A. Darabkh and Muna Al-Akhras and Jumana N. Zomot and Mohammed Atiquzzaman RPL routing protocol over IoT: a comprehensive survey, recent advances, insights, bibliometric analysis, recommendations, and future directions ?? Muhammad Morshed Alam and Muhammad Yeasir Arafat and Sangman Moh and Jian Shen Topology control algorithms in multi-unmanned aerial vehicle networks: an extensive survey . . . . . . . . . . ?? Ying Pan and Na Lyu and Chungang Yang GOR: Group-oblivious multicast routing in airborne tactical networks under uncertainty . . . . . . . . . . . . . . ?? Gengbiao Shen and Qing Li and Wanxin Shi and Yong Jiang and Pei Zhang and Liang Gu and Mingwei Xu Modeling and optimization of the data plane in the SDN-based DCN by queuing theory . . . . . . . . . . . . . . . . . ?? Gaoyang Shan and Byeong-hee Roh A slotted random request scheme for connectionless data transmission in bluetooth low energy 5.0 . . . . . . . . ?? Bharat Dwivedi and Debarati Sen and Sandip Chakraborty A survey of longitudinal changes in cellular network architecture: the good, the bad, and the ugly . . . . . . . . . ?? Ansif Arooj and Muhammad Shoaib Farooq and Tariq Umer Unfolding the blockchain era: Timeline, evolution, types and real-world applications . . . . . . . . . . . . . . ?? A. Zeynivand and A. Javadpour and S. Bolouki and A. K. Sangaiah and F. Ja'fari and P. Pinto and W. Zhang Traffic flow control using multi-agent reinforcement learning . . . . . . . . . ?? Xinyin Xiang and Jin Cao and Weiguo Fan Decentralized authentication and access control protocol for blockchain-based e-health systems . . . . . . . . . . . . ?? Mehrnoosh Monshizadeh and Vikramajeet Khatri and Raimo Kantola and Zheng Yan A deep density based and self-determining clustering approach to label unknown traffic . . . . . . . . . ??
Anonymous December 2022 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Sang-Hoon Choi and Ki-Woong Park \em iContainer: Consecutive checkpointing with rapid resilience for immortal container-based services . . . ?? Jaehyun Nam and Seung Ho Na and Seungwon Shin and Taejune Park Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection ?? Guangyao Zhou and Ruiming Wen and Wenhong Tian and Rajkumar Buyya Deep reinforcement learning-based algorithms selectors for the resource scheduling in hierarchical Cloud computing . . . . . . . . . . . . . . . ?? Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche PIMA: a Privacy-preserving Identity management system based on an unlinkable MAlleable signature . . . . . . . . . . ?? Usman Saleh Toro and Basem M. ElHalawany and Aslan B. Wong and Lu Wang and Kaishun Wu Backscatter communication-based wireless sensing (BBWS): Performance enhancement and future applications . . . . . . . . ?? Marcello Cinque and Raffaele Della Corte and Antonio Pecchia Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs . . . . ?? Vishesh Kumar Tanwar and Balasubramanian Raman and Rama Bhargava \em Crypt-OR: a privacy-preserving distributed cloud computing framework for object-removal in the encrypted images . . . . . . . . . . . . . . . . . ?? Shie-Yuan Wang and Hsin-Yin Fu Design, implementation, and performance evaluation of an earliest-deadline-first packet scheduling scheme in P4 hardware switches . . . . . . . . . . . . . . . . ??
Anonymous January 2023 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous Reviewer Thankyou . . . . . . . . . . . ?? Sarah Qahtan and Khaironi Yatim and Hazura Zulzalil and Mohd Hafeez Osman and A. A. Zaidan and H. A. Alsattar Review of Healthcare Industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution . . . . . . . . . . . . . . . . ?? Shiyong Li and Huan Liu and Wenzhe Li and Wei Sun Optimal cross-layer resource allocation in fog computing: a market-based framework . . . . . . . . . . . . . . . ?? Erfan Arvan and Mahshad Koohi Habibi Dehkordi and Saeed Jalili Secured location-aware mobility-enabled RPL . . . . . . . . . . . . . . . . . . ?? Zhuofan Liao and Siwei Cheng RVC: a reputation and voting based blockchain consensus mechanism for edge computing-enabled IoT systems . . . . . ?? Mohammad Kamrul Hasan and AKM Ahasan Habib and Zarina Shukur and Fazil Ibrahim and Shayla Islam and Md Abdur Razzaque Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations . . . . . . . . . . . . ?? Ankit Gangwal and Haripriya Ravali Gangavalli and Apoorva Thirupathi A survey of Layer-two blockchain protocols . . . . . . . . . . . . . . . ?? Nitul Dutta A bargain game theory assisted interest packet forwarding strategy for information centric network . . . . . . ?? Evrim Guler and Murat Karakus and Furkan Ayaz Genetic algorithm enabled virtual multicast tree embedding in Software-Defined Networks . . . . . . . ?? Prosper Zanu Sotenga and Karim Djouani and Anish Matthew Kurien A virtual gateway media access placement approach for large-scale Internet of Things . . . . . . . . . . . . . . . . . ??
Anonymous January 2023 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Can Zhang and Liehuang Zhu and Chang Xu and Zijian Zhang and Rongxing Lu EBDL: Effective blockchain-based covert storage channel with dynamic labels . . ?? Da-ming Yu and Zhen Zhang and Yu-hui Deng and Long-xin Lin and Teng-jiao He and Guang-liang He Flexible, highly scalable and cost-effective network structures for data centers . . . . . . . . . . . . . . ?? Panagiotis Bountakas and Christos Xenakis HELPHED: Hybrid Ensemble Learning PHishing Email Detection . . . . . . . . ??
Anonymous February 2023 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Hidaya Liazid and Mohamed Lehsaini and Abdelkrim Liazid Data transmission reduction using prediction and aggregation techniques in IoT-based wireless sensor networks . . . ?? Yadong Zhou and Bowen Hu and Junjie Zhang and Liyuan Sun and Xingyu Zhu and Ting Liu Detecting suspicious transactions in a virtual-currency-enabled online social network . . . . . . . . . . . . . . . . ?? Maryam Songhorabadi and Morteza Rahimi and AmirMehdi MoghadamFarid and Mostafa Haghi Kashani Fog computing approaches in IoT-enabled smart cities . . . . . . . . . . . . . . ?? Imdad Ullah and Salil S. Kanhere and Roksana Boreli Privacy-preserving targeted mobile advertising: a blockchain-based framework for mobile ads . . . . . . . . ?? The-Vinh Nguyen and Ngoc Phi Nguyen and Cheonshik Kim and Nhu-Ngoc Dao Intelligent aerial video streaming: Achievements and challenges . . . . . . ?? Mustafa Al Samara and Ismail Bennis and Abdelhafid Abouaissa and Pascal Lorenz Complete outlier detection and classification framework for WSNs based on OPTICS . . . . . . . . . . . . . . . ?? Linhao Cong and Jia Yu and Xinrui Ge Privacy preserving subgraph isomorphism query for dynamic graph database . . . . ??
Anonymous March 2023 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Murad Ali Khan and Naeem Iqbal and Imran and Harun Jamil and Do-Hyeun Kim An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection . . . . . . . . . . . . . . . ?? Andrea Petroni and Francesca Cuomo and Gaetano Scarano and Pietro Francia and Marcello Pediconi and Stefania Colonnese MUSE: MUlti-lead Sub-beat ECG for remote AI based atrial fibrillation detection ?? Amin Shahraki and Torsten Ohlenforst and Felix Kreyß When machine learning meets Network Management and Orchestration in edge-based networking paradigms . . . . ?? Ahmed Elsheikh and Ahmed S. Ibrahim and Mahmoud H. Ismail Sequence-to-sequence learning for link-scheduling in D2D communication networks . . . . . . . . . . . . . . . . ?? Pedro Miguel Sánchez Sánchez and José Mar\'ìa Jorquera Valero and Alberto Huertas Celdrán and Gérôme Bovet and Manuel Gil Pérez and Gregorio Mart\'ìnez Pérez A methodology to identify identical single-board computers based on hardware behavior fingerprinting . . . . . . . . ?? Mohammad Yahya Akhlaqi and Zurina Binti Mohd Hanapi Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions . . . ?? Frederik Hauser and Marco Häberle and Daniel Merling and Steffen Lindner and Vladimir Gurevich and Florian Zeiger and Reinhard Frank and Michael Menth A survey on data plane programming with P4: Fundamentals, advances, and applied research . . . . . . . . . . . . . . . . ?? Damiano Di Francesco Maesa and Andrea Lisi and Paolo Mori and Laura Ricci and Gianluca Boschi Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge . . . . . . ?? Tao Yi and Xingshu Chen and Yi Zhu and Weijing Ge and Zhenhui Han Review on the application of deep learning in network attack detection . . ?? Samira Afzal and Vanessa Testoni and Christian Esteve Rothenberg and Prakash Kolan and Imed Bouazizi A holistic survey of multipath wireless video streaming . . . . . . . . . . . . ?? Mohamad Amar Irsyad Mohd Aminuddin and Zarul Fitri Zaaba and Azman Samsudin and Faiz Zaki and Nor Badrul Anuar The rise of website fingerprinting on Tor: Analysis on techniques and assumptions . . . . . . . . . . . . . . ?? Gianni D'Angelo and Francesco Palmieri A co-evolutionary genetic algorithm for robust and balanced controller placement in software-defined networks . . . . . . ?? Andrea Tesei and Domenico Lattuca and Marco Luise and Paolo Pagano and Joaquim Ferreira and Paulo C. Bartolomeu A transparent distributed ledger-based certificate revocation scheme for VANETs ?? Nguyen Thi Hanh and Huynh Thi Thanh Binh and Vu Quang Truong and Nguyen Phuc Tan and Huynh Cong Phap Node placement optimization under Q-Coverage and Q-Connectivity constraints in wireless sensor networks ??
Anonymous April 2023 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Ángel G. Andrade and Alexis Anzaldo Accelerated resource allocation based on experience retention for B5G networks ?? Omer Gulec and Emre Sahin Red Deer Algorithm based nano-sensor node clustering for IoNT . . . . . . . . ?? Poornima M. R. and Vimala H. S. and Shreyas J. Holistic survey on energy aware routing techniques for IoT applications . . . . ?? Yaping Wu and Xili Wan and Xinjie Guan and Tingxiang Ji and Feng Ye PGTCN: a novel password-guessing model based on temporal convolution network ?? Elmustafa Sayed Ali and Rashid A. Saeed and Ibrahim Khider Eltahir and Othman O. Khalifa A systematic review on energy efficiency in the Internet of Underwater Things (IoUT): Recent approaches and research gaps . . . . . . . . . . . . . . . . . . ?? Nhu-Ngoc Dao and Ngo Hoang Tu and Tran Thien Thanh and Vo Nguyen Quoc Bao and Woongsoo Na and Sungrae Cho Neglected infrastructures for 6G-Underwater communications: How mature are they? . . . . . . . . . . . . . . . ?? Lamia Alkwai and Abdelfettah Belghith and Achraf Gazdar and Saad AlAhmadi Awareness of user mobility in Named Data Networking for IoT traffic under the push communication mode . . . . . . . . ?? Mariusz Sepczuk Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach . . . . . . . . . . . . ?? Hirozumi Yamaguchi Book Review: \booktitleWireless and Mobile Networking, Mahbub Hassan. CRC Press (2022) . . . . . . . . . . . . . . ?? Pyry Veijalainen and Themistoklis Charalambous and Risto Wichman Feasibility of Bluetooth Low Energy for motion capturing with Inertial Measurement Units . . . . . . . . . . . ?? Dan Tang and Dongshuo Zhang and Zheng Qin and Qiuwei Yang and Sheng Xiao SFTO-Guard: Real-time detection and mitigation system for slow-rate flow table overflow attacks . . . . . . . . . ?? Huda Abualola and Rabeb Mizouni and Hadi Otrok and Shakti Singh and Hassan Barada A matching game-based crowdsourcing framework for last-mile delivery: Ground-vehicles and unmanned-aerial vehicles . . . . . . . . . . . . . . . . ?? Minsu Kim and Kwangsue Chung HTTP adaptive streaming scheme based on reinforcement learning with edge computing assistance . . . . . . . . . . ?? Peirong Li and Wei Ou and Haozhe Liang and Wenbao Han and Qionglu Zhang and Guang Zeng A zero trust and blockchain-based defense model for smart electric vehicle chargers . . . . . . . . . . . . . . . . ?? Sami Abdellatif and Okba Tibermacine and Walid Bechkit and Abdelmalik Bachir Heterogeneous IoT/LTE ProSe virtual infrastructure for disaster situations ?? Xiaodong Zang and Jian Gong and Maoli Wang and Peng Gao and Guowei Zhang IP traffic behavior characterization via semantic mining . . . . . . . . . . . . ?? Hassan Jalil Hadi and Yue Cao and Khaleeq Un Nisa and Abdul Majid Jamil and Qiang Ni A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs . . . . . . . . . ??
Anonymous May 2023 . . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Lala Rajaoarisoa and Nacer Kouider M'Sirdi and Moamar Sayed-Mouchaweh and Laurent Clavier Decentralized fault-tolerant controller based on cooperative smart-wireless sensors in large-scale buildings . . . . ?? Guowen Wu and Lanlan Xie and Hong Zhang and Jianhua Wang and Shigen Shen and Shui Yu STSIR: an individual-group game-based model for disclosing virus spread in Social Internet of Things . . . . . . . ?? Ruijie Ou and Gordon Owusu Boateng and Daniel Ayepah-Mensah and Guolin Sun and Guisong Liu Stackelberg game-based dynamic resource trading for network slicing in 5G networks . . . . . . . . . . . . . . . . ?? Somayeh Yeganeh and Amin Babazadeh Sangar and Sadoon Azizi A novel $Q$-learning-based hybrid algorithm for the optimal offloading and scheduling in mobile edge computing environments . . . . . . . . . . . . . . ?? Xingjia Li and Li Pan and Shijun Liu An online service provisioning strategy for container-based cloud brokers . . . ?? Maryam Mohammadzad and Jaber Karimpour Using rootkits hiding techniques to conceal honeypot functionality . . . . . ?? Sumitra and Meetha V. Shenoy HFedDI: a novel privacy preserving horizontal federated learning based scheme for IoT device identification . . ?? Wei Yao and Han Shi and Hai Zhao Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment . . . . . . . . . . . . ?? Madhusanka Liyanage and An Braeken and Shahriar Shahabuddin and Pasika Ranaweera Open RAN security: Challenges and opportunities . . . . . . . . . . . . . ??
Anonymous June 2023 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Binayak Kar and Ying-Dar Lin and Yuan-Cheng Lai Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems . . . . . . . . . . . ?? Xiuwen Sun and Da Mo and Di Wu and Chunhui Ye and Qingying Yu and Jie Cui and Hong Zhong Efficient regular expression matching over hybrid dictionary-based compressed data . . . . . . . . . . . . . . . . . . ?? Andrew J and Deva Priya Isravel and K. Martin Sagayam and Bharat Bhushan and Yuichi Sei and Jennifer Eunice Blockchain for healthcare systems: Architecture, security challenges, trends and future directions . . . . . . ?? Azad Jalalian and Saleh Yousefi and Thomas Kunz Network slicing in virtualized 5G Core with VNF sharing . . . . . . . . . . . . ?? Abhishek Narwaria and Arka Prokash Mazumdar Software-Defined Wireless Sensor Network: a Comprehensive Survey . . . . ?? Mudhafar Nuaimi and Lamia Chaari Fourati and Bassem Ben Hamed Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: a systematic comprehensive review . . . . . . . . . . ?? Gustavo Diel and Charles Christian Miers and Maurício Aronne Pillon and Guilherme Piêgas Koslovski RSCAT: Towards zero touch congestion control based on actor--critic reinforcement learning and software-defined networking . . . . . . ?? Luca Bedogni and Federico Montori Joint privacy and data quality aware reward in opportunistic Mobile Crowdsensing systems . . . . . . . . . . ?? Uchechukwu Awada and Jiankang Zhang and Sheng Chen and Shuangzhi Li and Shouyi Yang EdgeDrones: Co-scheduling of drones for multi-location aerial computing missions ?? Ana Larrañaga and M. Carmen Lucas-Estañ and Sandra Lagén and Zoraze Ali and Imanol Martinez and Javier Gozalvez An open-source implementation and validation of 5G NR configured grant for URLLC in ns-3 5G LENA: a scheduling case study in industry 4.0 scenarios . . . . ?? Adarsh Kumar and Neelu Jyothi Ahuja and Monika Thapliyal and Sarthika Dutt and Tanesh Kumar and Diego Augusto De Jesus Pacheco and Charalambos Konstantinou and Kim-Kwang Raymond Choo Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions . . . . . . ?? Sana Sharif and Sherali Zeadally and Waleed Ejaz Space--aerial--ground--sea integrated networks: Resource optimization and challenges in 6G . . . . . . . . . . . . ??
Anonymous July 2023 . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Gokulnath Thandavarayan and Miguel Sepulcre and Javier Gozalvez and Baldomero Coll-Perales Scalable cooperative perception for connected and automated driving . . . . ?? Collin Connors and Dilip Sarkar Survey of prominent blockchain development platforms . . . . . . . . . ?? Shreshth Tuli and Fatemeh Mirhakimi and Samodha Pallewatta and Syed Zawad and Giuliano Casale and Bahman Javadi and Feng Yan and Rajkumar Buyya and Nicholas R. Jennings AI augmented Edge and Fog computing: Trends and challenges . . . . . . . . . ?? Oluwatosin Ahmed Amodu and Umar Ali Bukar and Raja Azlina Raja Mahmood and Chedia Jarray and Mohamed Othman Age of Information minimization in UAV-aided data collection for WSN and IoT applications: a systematic review ?? Mahmoud M. Salim and Hussein A. Elsayed and Mohamed S. Abdalzaher A survey on essential challenges in relay-aided D2D communication for next-generation cellular networks . . . ?? Dapeng Qu and Jun Wu and Jiankun Zhang and Chengxi Gao and Haiying Shen and Keqin Li Efficient congestion control scheme based on caching strategy in NDN . . . . ?? Yifei Lu and Changjiang Cui and Xu Ma and Zeqi Ruan A $^3$DCT: a cubic acceleration TCP for data center networks . . . . . . . . . . ?? Junna Zhang and Jiawei Chen and Xiang Bao and Chunhong Liu and Peiyan Yuan and Xinglin Zhang and Shangguang Wang Dependent task offloading mechanism for cloud-edge-device collaboration . . . . ?? Isra M. Ali and Noureddine Lasla and Mohamed M. Abdallah and Aiman Erbad SRP: an Efficient Runtime Protection Framework for Blockchain-based Smart Contracts . . . . . . . . . . . . . . . ?? Diego Hortelano and Ignacio de Miguel and Ramón J. Durán Barroso and Juan Carlos Aguado and Noem\'ì Merayo and Lidia Ruiz and Adrian Asensio and Xavi Masip-Bruin and Patricia Fernández and Rubén M. Lorenzo and Evaristo J. Abril A comprehensive survey on reinforcement-learning-based computation offloading techniques in Edge Computing Systems . . . . . . . . . . . . . . . . ?? Kaddour Messaoudi and Omar Sami Oubbati and Abderrezak Rachedi and Abderrahmane Lakas and Tahar Bendouma and Noureddine Chaib A survey of UAV-based data collection: Challenges, solutions and future perspectives . . . . . . . . . . . . . . ?? Xiaojun Cheng and Xuyang Jing and Zheng Yan and Xian Li and Pu Wang and Wei Wu ALSketch: an adaptive learning-based sketch for accurate network measurement under dynamic traffic distribution . . . ?? Xiaohan Tu and Chuanhao Zhang and Siping Liu and Cheng Xu and Renfa Li Point cloud segmentation of overhead contact systems with deep learning in high-speed rails . . . . . . . . . . . . ??
Anonymous August 2023 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Aitor Belenguer and Jose A. Pascual and Javier Navaridas GöwFed: a novel federated network intrusion detection system . . . . . . . ?? Jiang Shao and Minglin Li and Xinyi Li and Guowei Liu and Sen Liu and Bin Liu and Yang Xu RaceCC: a rapidly converging explicit congestion control for datacenter networks . . . . . . . . . . . . . . . . ?? Ying Wang and Fengjun Shang and Jianjun Lei Energy-efficient and delay-guaranteed routing algorithm for software-defined wireless sensor networks: a cooperative deep reinforcement learning approach . . ?? Thomas Lavaur and Jonathan Detchart and Jérôme Lacan and Caroline P. C. Chanel Modular zk-rollup on-demand . . . . . . ?? Saeed Banaeian Far and Azadeh Imani Rad and Seyed Mojtaba Hosseini Bamakan and Maryam Rajabzadeh Asaar Toward Metaverse of everything: Opportunities, challenges, and future directions of the next generation of visual/virtual communications . . . . . ?? Abu Jahid and Mohammed H. Alsharif and Trevor J. Hall The convergence of blockchain, IoT and 6G: Potential, opportunities, challenges and research roadmap . . . . . . . . . . ?? Roberto G. Pacheco and Rodrigo S. Couto and Osvaldo Simeone On the impact of deep neural network calibration on adaptive edge offloading for image classification . . . . . . . . ?? Daniel Chaves Temp and Paulo Silas Severo de Souza and Arthur Francisco Lorenzon and Marcelo Caggiani Luizelli and Fábio Diniz Rossi Mobility-Aware Registry Migration for Containerized Applications on Edge Computing Infrastructures . . . . . . . ?? Huihui Ma and Du Xu An INT-based TCP window modulator for congestion control in data center networks . . . . . . . . . . . . . . . . ?? Mingru Dong and Haibin Li and Yongtao Hu and Haocai Huang Learning automaton-based energy-efficient and fault-tolerant topology evolution algorithm for underwater acoustic sensor network . . . ?? Yi Li and Jinsong Wang and Hongwei Zhang A survey of state-of-the-art sharding blockchains: Models, components, and attack surfaces . . . . . . . . . . . . ?? Ioannis Dimolitsas and Dimitrios Dechouniotis and Symeon Papavassiliou Time-efficient distributed virtual network embedding for round-trip delay minimization . . . . . . . . . . . . . . ?? Chunghyun Lee and Junsuk Oh and Woongsoo Na and Jongha Yoon and Wonjong Noh and Sungrae Cho Directional-antenna-based spatial and energy-efficient semi-distributed spectrum sensing in cognitive Internet-of-Things networks . . . . . . ?? Ammar Hassan and Imran Makhdoom and Waseem Iqbal and Awais Ahmad and Asad Raza From trust to truth: Advancements in mitigating the Blockchain Oracle problem ?? Rakib Ul Haque and A. S. M. Touhidul Hasan and Apubra Daria and Abdur Rasool and Hui Chen and Qingshan Jiang and Yuqing Zhang A novel secure and distributed architecture for privacy-preserving healthcare system . . . . . . . . . . . ?? Zhongwei Huang and Dagang Li and Jun Cai and Hua Lu Collective reinforcement learning based resource allocation for digital twin service in 6G networks . . . . . . . . . ?? Jin Wang and Shuying Rao and Ying Liu and Pradip Kumar Sharma and Jinbin Hu Load balancing for heterogeneous traffic in datacenter networks . . . . . . . . . ?? Mahbubun Nahar and A. H. M. Kamal and Gahangir Hossain Protecting health data in the cloud through steganography: a table-driven, blind method using neural networks and bit-shuffling algorithm . . . . . . . . ?? Jorge Eduardo Rivadeneira and Jorge Sá Silva and Ricardo Colomo-Palacios and André Rodrigues and Fernando Boavida User-centric privacy preserving models for a new era of the Internet of Things ?? Abolfazl Sajadi and Ahmad Shabani and Bijan Alizadeh DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices . . . . . . . . . . . . . . ?? Hua Qin and Weimin Chen and Ni Li and Tao Wang and Hao Chen and Gelan Yang and Yang Peng CPS: Cross-interface network Partitioning and Scheduling towards QoS-aware data flow delivery in multimedia IoT . . . . . . . . . . . . . ?? Luca Verderame and Antonio Ruggia and Alessio Merlo PARIOT: Anti-repackaging for IoT firmware integrity . . . . . . . . . . . ?? Mohammed Atiquzzaman Editorial: 2021 Best Paper Awards . . . ??
Anonymous September 2023 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Luis de Pedro and Adrian Mihai Rosu and Jorge E. López de Vergara Server load estimation by Burr distribution mixture analysis of TCP SYN response time . . . . . . . . . . . . . ?? Changbo Tian and Shuyuan Zhao and Zhenyu Cheng AntCom: an effective and efficient anti-tracking system with dynamic and asymmetric communication channel . . . . ?? Ji Huang and Yinghao Lu and Zhenlong Xiao and Xin Wang A novel distributed multi-slot TDMA-based MAC protocol for LED-based UOWC networks . . . . . . . . . . . . . ?? Pascal Maniriho and Abdun Naser Mahmood and Mohammad Jabed Morshed Chowdhury API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques ?? Alejandro Llorens-Carrodeguas and Cristina Cervelló-Pastor and Francisco Valera DQN-based intelligent controller for multiple edge domains . . . . . . . . . ?? Khalid M. Hosny and Ahmed I. Awad and Marwa M. Khashaba and Mostafa M. Fouda and Mohsen Guizani and Ehab R. Mohamed Enhanced multi-objective gorilla troops optimizer for real-time multi-user dependent tasks offloading in edge-cloud computing . . . . . . . . . . . . . . . ?? Jie Sun and Tianyu Wo and Xudong Liu and Tianjiao Ma and Xudong Mou and Jinghong Lan and Nan Zhang and Jianwei Niu Scalable inter-domain network virtualization . . . . . . . . . . . . . ?? Juan Wang and Wenzhe Yi and Mengda Yang and Jiaci Ma and Shengzhi Zhang and Shirong Hao Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain . . . . . . . . . . . . . . . ?? Wojciech Niewolski and Tomasz W. Nowak and Mariusz Sepczuk and Zbigniew Kotulski Security architecture for authorized anonymous communication in 5G MEC . . . ?? Junwei Liang and Muhammad Sadiq and Geng Yang and Dongsheng Cheng BAC-CRL: Blockchain-Assisted Coded Caching Certificate Revocation List for Authentication in VANETs . . . . . . . . ?? Bo Yin and Yihu Liu and Binyao Xu and Hang Chen and Sai Tang TTAF: a two-tier task assignment framework for cooperative unit-based crowdsourcing systems . . . . . . . . . ?? Zhuofan Liao and Xiangyu Zhang and Shiming He and Qiang Tang PMP: a partition-match parallel mechanism for DNN inference acceleration in cloud-edge collaborative environments ??
Anonymous October 2023 . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Asma Bechkit and Ali Melit One-shot models for local core network placement and traffic optimization in self deployable networks . . . . . . . . ?? Bolin Song and Xiaoyu Wang and Peng Sun and Azzedine Boukerche Robust COVID-19 vaccination control in a multi-city dynamic transmission network: a novel reinforcement learning-based approach . . . . . . . . . . . . . . . . ?? Vamshi Sunku Mohan and Sriram Sankaran and Priyadarsi Nanda and Krishnashree Achuthan Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain . . . . . ?? Mobasshir Mahbub and Raed M. Shubair Contemporary advances in multi-access edge computing: a survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions . . ?? Ziyi Hu and Yue Cao and Xinyu Li and Yongdong Zhu and Muhammad Khalid and Naveed Ahmad Autonomous valet parking optimization with two-step reservation and pricing strategy . . . . . . . . . . . . . . . . ?? Alberto García Pérez and Antonio López Martínez and Manuel Gil Pérez Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management . . . . . . . . . . . . . . . ?? Krzysztof Ostrowski and Krzysztof Ma\lecki and Piotr Dziurza\'nski and Amit Kumar Singh Mobility-aware fog computing in dynamic networks with mobile nodes: a survey . . ?? Chenjing Tian and Haotong Cao and Jun Xie and Sahil Garg and Joel J. P. C. Rodrigues and M. Shamim Hossain MADDPG-empowered slice reconfiguration approach for 5G multi-tier system . . . ?? Kaixi Wang and Yunhe Cui and Qing Qian and Yi Chen and Chun Guo and Guowei Shen USAGE: Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method . . . . . . . . . . . . ?? Waqar Amin and Fawad Hussain and Sheraz Anjum and Sharoon Saleem and Naveed Khan Baloch and Yousaf Bin Zikria and Heejung Yu Efficient application mapping approach based on grey wolf optimization for network on chip . . . . . . . . . . . . ?? Linyao Zheng and Meiqin Liu and Senlin Zhang An end-to-end sensor scheduling method based on D3QN for underwater passive tracking in UWSNs . . . . . . . . . . . ??
Anonymous November 2023 . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Hongjian Zeng and Yonghua Xiong and Jinhua She An evolutionary multi-task assignment method adapting to travel convenience in mobile crowdsensing . . . . . . . . . . ?? Badra Souhila Guendouzi and Samir Ouchani and Hiba EL Assaad and Madeleine EL Zaher A systematic review of federated learning: Challenges, aggregation methods, and development tools . . . . . ?? Mebanjop Kharjana and Fabiola Hazel Pohrmen and Subhas Chandra Sahana and Goutam Saha Blockchain-based key management system in Named Data Networking: a survey . . . ?? Haoyu Yin and Yingjian Liu and Yue Li and Zhongwen Guo and Yu Wang Defeating deep learning based de-anonymization attacks with adversarial example . . . . . . . . . . ?? Niclas Ilg and Paul Duplys and Dominik Sisejkovic and Michael Menth A survey of contemporary open-source honeypots, frameworks, and tools . . . . ?? Hoang V. Vo and Hanh P. Du and Hoa N. Nguyen AI-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis . . . . . . . . . . . . . . . . ?? Linna Wei and Wenlong Huang and Wei Zhao and Xuangou Wu and Xiao Zheng Boundary node detection in wireless networks with uneven node distribution on open surfaces . . . . . . . . . . . . ?? Bin Yu and He Zhao and Tong Zhou and Nianzu Sheng and Xiaofeng Li and Jinlin Xu OverShard: Scaling blockchain by full sharding with overlapping network and virtual accounts . . . . . . . . . . . . ?? Hamza Kheddar and Yassine Himeur and Ali Ismail Awad Deep transfer learning for intrusion detection in industrial control networks: a comprehensive review . . . . ?? Yingya Guo and Yufei Peng and Run Hao and Xiang Tang Capturing spatial-temporal correlations with Attention based Graph Convolutional Network for network traffic prediction ?? Zarrin Tasnim Sworna and Zahra Mousavi and Muhammad Ali Babar NLP methods in host-based intrusion detection systems: a systematic review and future directions . . . . . . . . . ??
Guangxuan He and Chunlin Li and Yong Shu and Youlong Luo Fine-grained access control policy in blockchain-enabled edge computing . . . ?? Peiying Zhang and Zhihu Luo and Neeraj Kumar and Mohsen Guizani and Hongxia Zhang and Jian Wang CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks . . . . . . ?? Anitha P. and H. S. Vimala and Shreyas J. Comprehensive review on congestion detection, alleviation, and control for IoT networks . . . . . . . . . . . . . . ?? Fatma Foad Ashrif and Elankovan A. Sundararajan and Rami Ahmad and Mohammad Kamrul Hasan and Elaheh Yadegaridehkordi Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction . . . . . . . . . . . . ?? Shaik Sharmila and Ch Aparna Tracing footprints of anti-forensics and assuring secured data transmission in the cloud using an effective ECCDH and Kalman Filter . . . . . . . . . . . . . ?? Angel Cañete and Mercedes Amor and Lidia Fuentes HADES: an NFV solution for energy-efficient placement and resource allocation in heterogeneous infrastructures . . . . . . . . . . . . ?? Jean Nestor M. Dahj and Kingsley A. Ogudo and Leandro Boonzaaier A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks . . . . . . ?? Pranjal Kumar Nandi and Md. Rejaul Islam Reaj and Sujan Sarker and Md. Abdur Razzaque and Md. Mamun-or-Rashid and Palash Roy Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things . . . . . . . . . . . ?? Shunmugapriya Ramanathan and Abhishek Bhattacharyya and Koteswararao Kondepu and Andrea Fumagalli Enabling containerized Central Unit live migration in 5G radio access network: an experimental study . . . . . . . . . . . ?? Ruijin Wang and Jinshan Lai and Xiong Li and Donglin He and Muhammad Khurram Khan RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things . . . . . . . . . . . . . . . . . ?? Wu Chen and Jiayi Zhu and Jiajia Liu and Hongzhi Guo A fast coordination approach for large-scale drone swarm . . . . . . . . ?? Ali Nauman and Haya Mesfer Alshahrani and Nadhem Nemri and Kamal M. Othman and Nojood O. Aljehane and Mashael Maashi and Ashit Kumar Dutta and Mohammed Assiri and Wali Ullah Khan Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning . . . . . . . . . . . . . . . . ?? Dénes László Fekete and Attila Kiss Trust-minimized optimistic cross-rollup arbitrary message bridge . . . . . . . . ?? Miguel Rodríguez-Pérez and Sergio Herrería-Alonso and J. Carlos López-Ardao and Raúl F. Rodríguez-Rubio End-to-end active queue management with Named-Data Networking . . . . . . . . . ?? Sachin Kadam and Kaustubh S. Bhargao and Gaurav S. Kasbekar Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station . . . . . . . . . . . . . . . . ?? S. Periyanayagi and S. P. Raja and S. Vairachilai Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks . . . . . . ?? Ala Altaweel and Sidra Aslam and Ibrahim Kamel Security attacks in Opportunistic Mobile Networks: a systematic literature review ?? Songyut Phoemphon and Nutthanon Leelathakul and Chakchai So-In An enhanced node segmentation and distance estimation scheme with a reduced search space boundary and improved PSO for obstacle-aware wireless sensor network localization . . . . . . ?? Shahid Latif and Wadii Boulila and Anis Koubaa and Zhuo Zou and Jawad Ahmad DTL-IDS: an optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm . . . . . ?? Rongji Liao and Yuan Zhang and Jinyao Yan and Yang Cai and Narisu Tao STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning . . . . . . . . . ?? Mustafa Ibrahim Khaleel Region-aware dynamic job scheduling and resource efficiency for load balancing based on adaptive chaotic sparrow search optimization and coalitional game in cloud computing environments . . . . . . ?? Shie-Yuan Wang and Cheng-Da Lin Using deep reinforcement learning to train and periodically re-train a data-collecting drone based on real-life measurements . . . . . . . . . . . . . . ?? Cristiano Costa Argemon Vieira and Luiz Fernando Bittencourt and Thiago Augusto Lopes Genez and Maycon Leone M. Peixoto and Edmundo Roberto Mauro Madeira RAaaS: Resource Allocation as a Service in multiple cloud providers . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous Reviewer Thankyou . . . . . . . . . . . ?? Anonymous January 2024 . . . . . . . . . . . . . . ??
Mohammed Alabbad and Neerja Mhaskar and Ridha Khedri Two formal design solutions for the generalization of network segmentation ?? Puneet Kumar and Behnam Dezfouli quicSDN: Transitioning from TCP to QUIC for southbound communication in software-defined networks . . . . . . . ?? Zihang Zhen and Xiaoding Wang and Hui Lin and Sahil Garg and Prabhat Kumar and M. Shamim Hossain A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems . . . . . . . . . ?? Sabir Saheel and Anik Alvi and Aninda Roy Ani and Tarem Ahmed and Mohammad Faisal Uddin Semi-supervised, neural network based approaches to face mask and anomaly detection in surveillance networks . . . ?? Gabriel F. C. de Queiroz and José F. de Rezende and Valmir C. Barbosa A flexible algorithm to offload DAG applications for edge computing . . . . ?? Yuxiao Qi and Li Pan and Shijun Liu An online bi-objective scheduling algorithm for service provisioning in cloud computing . . . . . . . . . . . . ?? Shahmir Khan Mohammed and Shakti Singh and Rabeb Mizouni and Hadi Otrok TRACE: Transformer-based continuous tracking framework using IoT and MCS . . ?? Mohammed Shurrab and Dunia Mahboobeh and Rabeb Mizouni and Shakti Singh and Hadi Otrok Overcoming cold start and sensor bias: a deep learning-based framework for IoT-enabled monitoring applications . . ?? Hongwei Zhang and Wei Fan and Jinsong Wang Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges . . . . . . . . . . . . . ?? Wanqi Yang and Pengfei Chen and Guangba Yu and Haibin Zhang and Huxing Zhang Network shortcut in data plane of service mesh with eBPF . . . . . . . . . ?? Ali El Kamel Using FlowVisor and evolutionary algorithms to improve the switch migration in SDN . . . . . . . . . . . . ?? David Herranz-Oliveros and Ivan Marsa-Maestre and Jose Manuel Gimenez-Guzman and Marino Tejedor-Romero and Enrique de la Hoz Surgical immunization strategies against lateral movement in Active Directory environments . . . . . . . . . . . . . . ?? Yuanhang Qi and M. Shamim Hossain Harnessing federated generative learning for green and sustainable Internet of Things . . . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous February 2024 . . . . . . . . . . . . . ??
Shah Zeb and Aamir Mahmood and Sunder Ali Khowaja and Kapal Dev and Syed Ali Hassan and Mikael Gidlund and Paolo Bellavista Towards defining Industry 5.0 vision with intelligent and softwarized wireless network architectures and services: a survey . . . . . . . . . . . ?? Harpreet Kaur and Simranjit Singh and Ranjit Kaur and Rajandeep Singh Advances in fronthauling of communication technologies: a review . . ?? Muna Al-Hawawreh and Mamoun Alazab and Mohamed Amine Ferrag and M. Shamim Hossain Securing the Industrial Internet of Things against ransomware attacks: a comprehensive analysis of the emerging threat landscape and detection mechanisms . . . . . . . . . . . . . . . ?? Vincenzo Agate and Pierluca Ferraro and Giuseppe Lo Re and Sajal K. Das BLIND: a privacy preserving truth discovery system for mobile crowdsensing ?? Eunjin Kim and Junsu Kim and Jae-Hyun Kim and Howon Lee HiMAQ: Hierarchical multi-agent Q-learning-based throughput and fairness improvement for UAV-Aided IoT networks ?? Ming Zhou and Zhen Yang and Haiyang Yu and Shui Yu VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain . . . . . . . ?? Xiaobo Yu and Weizhi Meng and Yining Liu and Fei Zhou TridentShell: an enhanced covert and scalable backdoor injection attack on web applications . . . . . . . . . . . . ?? Naser AlDuaij mPillBox: an open framework for a smarter pillbox . . . . . . . . . . . . ?? Omar Lajam and Salahadin Mohammed Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions . . . . . . . . . . . . . . . ?? Hao Hao and Wei Ding and Wei Zhang Time-continuous computing offloading algorithm with user fairness guarantee ?? Muhammad Adil and Houbing Song and Muhammad Khurram Khan and Ahmed Farouk and Zhanpeng Jin 5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions . . . . . . . . . . . . . . . ?? Jeongho Kang and Kwangsue Chung RL-based HTTP adaptive streaming with edge collaboration in multi-client environment . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous March 2024 . . . . . . . . . . . . . . . ??
Ali Y. Aldailamy and Abdullah Muhammed and Rohaya Latip and Nor Asilah Wati Abdul Hamid and Waidah Ismail Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud . . . . . . . . . . . . . . ?? Peiying Zhang and Kunkun Yan and Neeraj Kumar and Lizhuang Tan and Mohsen Guizani and Konstantin Igorevich Kostromitin and Jian Wang and Jianyong Zhang A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks . . ?? Awnish Kumar and Vijaya V. Saradhi and Venkatesh Tamarapalli Compressive sensing of Internet traffic data using relative-error bound tensor-CUR decomposition . . . . . . . . ?? Dipanwita Sadhukhan and Sangram Ray and Mou Dasgupta and Muhammad Khurram Khan Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network . . ?? Shariq Murtuza and Krishna Asawa Early Prevention and Mitigation of Link Flooding Attacks in Software Defined Networks . . . . . . . . . . . . . . . . ?? Abeer Z. Al-Marridi and Amr Mohamed and Aiman Erbad Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning . . . . . . . . . ?? Juhwan Kim and Jihyeon Yu and Youngwoo Lee and Dan Dongseong Kim and Joobeom Yun HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling . . . . . . . . . . . . . . . . ?? Tao Peng and Wei You and Kejian Guan and Entao Luo and Shaobo Zhang and Guojun Wang and Tian Wang and Youke Wu Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing . . . ?? Faheem Ullah and Shagun Dhingra and Xiaoyu Xia and M. Ali Babar Evaluation of distributed data processing frameworks in hybrid clouds ?? Ngangbam Indrason and Goutam Saha Exploring Blockchain-driven security in SDN-based IoT networks . . . . . . . . . ?? Pedro Horchulhack and Eduardo K. Viegas and Altair O. Santin and Felipe V. Ramos and Pietro Tedeschi Detection of quality of service degradation on multi-tenant containerized services . . . . . . . . . ?? Ying Huang Firm social management system for supporting IoT users in application environment . . . . . . . . . . . . . . ?? Tariq Mahmood and Jianqiang Li and Tanzila Saba and Amjad Rehman and Saqib Ali Energy optimized data fusion approach for scalable wireless sensor network using deep learning-based scheme . . . . ?? Qingyang Yu and Nengwen Zhao and Mingjie Li and Zeyan Li and Honglin Wang and Wenchi Zhang and Kaixin Sui and Dan Pei A survey on intelligent management of alerts and incidents in IT services . . ?? Hadi Ghaemi and Dariush Abbasinezhad-Mood and Arezou Ostad-Sharif and Zakieh Alizadehsani Novel blockchain-assisted fault-tolerant roaming authentication protocol for mobility networks without home agent entanglement . . . . . . . . . . . . . . ?? Mohammed Alabbad and Neerja Mhaskar and Ridha Khedri Hardening of network segmentation using automated referential penetration testing . . . . . . . . . . . . . . . . ?? Bing Xiong and Yongqing Liu and Rui Liu and Jinyuan Zhao and Shiming He and Baokang Zhao and Kun Yang and Keqin Li ActiveGuardian: an accurate and efficient algorithm for identifying active elephant flows in network traffic ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous April 2024 . . . . . . . . . . . . . . . ??
Maedeh Abedini Bagha and Kambiz Majidzadeh and Mohammad Masdari and Yousef Farhang ELA-RCP: an energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks . . . . . . . . . . . . . . . . ?? Soumen Mondal and Luca Davoli and Sanjay Dhar Roy and Sumit Kundu and Gianluigi Ferrari and Riccardo Raheli Throughput and delay analysis of cognitive M2M communications . . . . . . ?? Alessandra Somma and Alessandra De Benedictis and Christiancarmine Esposito and Nicola Mazzocca The convergence of Digital Twins and Distributed Ledger Technologies: a systematic literature review and an architectural proposal . . . . . . . . . ?? Dalila Ressi and Riccardo Romanello and Carla Piazza and Sabina Rossi AI-enhanced blockchain technology: a review of advancements and opportunities ?? Sana Younes and Maroua Idi and Riadh Robbana Discrete-time Markov decision process for performance analysis of virtual machine allocation schemes in C-RAN . . ?? Yu Liang and Sheng Zhang and Jie Wu SplitStream: Distributed and workload-adaptive video analytics at the edge . . . . . . . . . . . . . . . . . . ?? Sheharyar Khan and Zheng Jiangbin and Muhammad Irfan and Farhan Ullah and Sohrab Khan An expert system for hybrid edge to cloud computational offloading in heterogeneous MEC-MCC environments . . . ?? Lotfi Mhamdi and Mohd Mat Isa Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation . . . . . . . . . . . ?? Oladipupo Adekoya and Adel Aneiba A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous May 2024 . . . . . . . . . . . . . . . . ??
Chao Meng and Xiaoyong Yan and Lin Guo and Zhixin Sun and Pan Wang An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks . . . . . . . . ?? Nesma Mahmoud and Hatem Abdelkader and Asmaa Aly BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS ?? Youssef Ibrahim and Rabeb Mizouni and Hadi Otrok and Shakti Singh and Vinod Khadkikar and Hatem Zeineldin Blockchain based crowdsourcing framework for vehicle-to-vehicle charging . . . . ?? Manpreet Kaur and Vinod Kumar Verma Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused Internet of Things . . . . . . . . . . . . . . . . . ?? WaiMing Lau and KaKei Wong and Lin Cui Optimizing the performance of OpenFlow Protocol over QUIC . . . . . . . . . . . ?? S. Reshmi and E. Ramanujam An ensemble maximal feature subset selection for smartphone based human activity recognition . . . . . . . . . . ?? Guangfu Wu and HaiPing Wang and Xin Lai and Mengmeng Wang and Daojing He and Sammy Chan A comprehensive survey of smart contract security: State of the art and research directions . . . . . . . . . . . . . . . ?? Yong Liu and Tianyi Yu and Qian Meng and Quanze Liu Flow optimization strategies in data center networks: a survey . . . . . . . ?? Tri Nguyen and Huong Nguyen and Tuan Nguyen Gia Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications . . . . . . . . . . . . . . ?? Seyyed Meysam Rozehkhani and Farnaz Mahan and Witold Pedrycz Efficient cloud data center: an adaptive framework for dynamic Virtual Machine Consolidation . . . . . . . . . . . . . ?? Ehzaz Mustafa and Junaid Shuja and Faisal Rehman and Ahsan Riaz and Mohammed Maray and Muhammad Bilal and Muhammad Khurram Khan Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues ?? Muna Al-Hawawreh and M. Shamim Hossain Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework . . . . . . . . . . . . ?? Dongjae Kim and Dong-Wook Seo and Minseok Choi Edge caching and computing of video chunks in multi-tier wireless networks ?? Sahar Pilevar Moakhar and Saeid Abrishami An efficient mechanism for function scheduling and placement in function as a service edge environment . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous June 2024 . . . . . . . . . . . . . . . ??
Hao Su and Jianwei Niu and Xuefeng Liu and Mohammed Atiquzzaman SafeCoder: a machine-learning-based encoding system to embed safety identification information into QR codes ?? Kisong Lee and Hyun-Ho Choi Energy-efficient resource allocation for bidirectional wireless power and information transfer over interference channels . . . . . . . . . . . . . . . . ?? Mohammad Zolghadri and Parvaneh Asghari and Seyed Ebrahim Dashti and Alireza Hedayati Resource allocation in Fog-Cloud Environments: State of the art . . . . . ?? Jun Yin and Jiaxin Wen and Ming Zhu and Yulong Li and Lei Wang Nefis: a network coding based flexible device-to-device video streaming scheme ?? Saumyaranjan Dash and Asif Uddin Khan and Binayak Kar and Santosh Kumar Swain and Primatar Kuswiradyo and Seifu Birhanu Tadele and Frezer Guteta Wakgra CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications . . . . . . . . . . . . . . ?? Razvan Bocu and Maksim Iavich Enhanced detection of low-rate DDoS attack patterns using machine learning models . . . . . . . . . . . . . . . . . ?? Chun-Cheng Lin and Der-Jiunn Deng and Li-Tsung Hsieh and Pei-Tzu Pan Optimal deployment of private 5G multi-access edge computing systems at smart factories: Using hybrid crow search algorithm . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous July 2024 . . . . . . . . . . . . . . . ??
Hongyan Liu and Xi Sun and Xiang Chen and Qun Huang and Dong Zhang and Haifeng Zhou and Chunming Wu and Xuan Liu and Muhammad Khurram Khan \sf Terra: Low-latency and reliable event collection in network measurement ?? Dalhatu Muhammed and Ehsan Ahvar and Shohreh Ahvar and Maria Trocan and Marie-José Montpetit and Reza Ehsani Artificial Intelligence of Things (AIoT) for smart agriculture: a review of architectures, technologies and solutions . . . . . . . . . . . . . . . ?? Syeda Zeenat Marshoodulla and Goutam Saha A survey of data mining methodologies in the environment of IoT and its variants ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous August 2024 . . . . . . . . . . . . . . ??
Sami Nadif and Essaid Sabir and Halima Elbiaze and Abdelkrim Haqiq Green grant-free power allocation for ultra-dense Internet of Things: a mean-field perspective . . . . . . . . . ?? Jie Ma and Wei Su and Yikun Li and Yuan Yuan and Ziqing Zhang Synchronizing real-time and high-precision LDoS defense of learning model-based in AIoT with programmable data plane, SDN . . . . . . . . . . . . ?? Sana Younes and Maroua Idi Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network ?? Antonio Matencio Escolar and Qi Wang and Jose Maria Alcaraz Calero Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments . . . . . . . . ?? Tao Ju and Linjuan Li and Shuai Liu and Yu Zhang A multi-UAV assisted task offloading and path optimization for mobile edge computing via multi-agent deep reinforcement learning . . . . . . . . . ?? Wendi Feng and Ke Liu and Shuo Sun and Bo Cheng and Wei Zhang Seraph: Towards secure and efficient multi-controller authentication with $ (t, n) $-threshold signature in multi-domain SDWAN . . . . . . . . . . . ?? Lien-Wu Chen and Hsing-Fu Tseng and Chun-Yu Cho and Ming-Fong Tsai Hybrid kitchen safety guarding with stove fire recognition based on the Internet of Things . . . . . . . . . . . ?? Asad Ali and Ying-Dar Lin and Jian Liu and Chin-Tser Huang The universal federator: a third-party authentication solution to federated cloud, edge, and fog . . . . . . . . . . ?? Van Tong and Sami Souihi and Hai Anh Tran and Abdelhamid Mellouk Troubleshooting solution for traffic congestion control . . . . . . . . . . . ?? D. Manivannan Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things . . . ?? Giuseppe Aceto and Fabio Giampaolo and Ciro Guida and Stefano Izzo and Antonio Pescap\`e and Francesco Piccialli and Edoardo Prezioso Synthetic and privacy-preserving traffic trace generation using generative AI models for training Network Intrusion Detection Systems . . . . . . . . . . . ?? Mingjie Ding and Yingya Guo and Zebo Huang and Bin Lin and Huan Luo GROM: a generalized routing optimization method with graph neural network and deep reinforcement learning . . . . . . ?? Hua Qin and Ni Li and Tao Wang and Gelan Yang and Yang Peng CDT: Cross-interface Data Transfer scheme for bandwidth-efficient LoRa communications in energy harvesting multi-hop wireless networks . . . . . . ?? Ying-Dar Lin and Hao-Xuan Huang and Didik Sudyana and Yuan-Cheng Lai AI for AI-based intrusion detection as a service: Reinforcement learning to configure models, tasks, and capacities ?? Javad Mohajerani and Mokhtar Mohammadi Ghanatghestani and Malihe Hashemipour MCTE-RPL: a multi-context trust-based efficient RPL for IoT . . . . . . . . . ?? Xu Zhao and Yichuan Wu and Tianhao Zhao and Feiyu Wang and Maozhen Li Federated deep reinforcement learning for task offloading and resource allocation in mobile edge computing-assisted vehicular networks ?? Weitao Yang and Li Pan and Shijun Liu Caching or not: an online cost optimization algorithm for geodistributed data analysis in cloud environments . . . . . . . . . . . . . . ?? Anmol Kumar and Mayank Agarwal Quick service during DDoS attacks in the container-based cloud environment . . . ?? Junyong Tang and Hui Li and Jiankang Zhang and Kangqian Guan and Qiqi Shan and Xiangyang Liang A robust PID and RLS controller for TCP/AQM system . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous September 2024 . . . . . . . . . . . . . ??
B. Padmavathi and Vanaja Selvaraj Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking . . . . . . . . . . ?? Namkyung Yoon and Hwangnam Kim Detecting DDoS based on attention mechanism for Software-Defined Networks ?? Noureddine Mouhoub and Maria Moloney and Damien Magoni Metarouting with automatic tunneling in multilayer networks . . . . . . . . . . ?? El-hacen Diallo and Mohameden Dieye and Omar Dib and Pierre Valiorgue An agnostic and secure interoperability protocol for seamless asset movement . . ?? Mohand Yazid Saidi and Issam Abdeldjalil Ikhelef and Shuopeng Li and Ken Chen Constrained routing in multi-partite graph to solve VNF placement and chaining problem . . . . . . . . . . . . ?? Diana Hawashin and Mohamed Nemer and Senay A. Gebreab and Khaled Salah and Raja Jayaraman and Muhammad Khurram Khan and Ernesto Damiani Blockchain applications in UAV industry: Review, opportunities, and challenges ?? Emna Baccour and Aiman Erbad and Amr Mohamed and Mounir Hamdi and Mohsen Guizani Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems ?? Orlando Landrove and Rufino Cabrera and Eneko Iradier and Erick Jimenez and Pablo Angueira and Jon Montalban Broadcast/multicast delivery integration in B5G/6G environments . . . . . . . . . ?? Man Li and Huachun Zhou and Shuangxing Deng Parallel path selection mechanism for DDoS attack detection . . . . . . . . . ?? Seyedeh Soheila Shaabanzadeh and Marc Carrascosa-Zamacois and Juan Sánchez-González and Costas Michaelides and Boris Bellalta Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques . . . . . . . . . . . . . . . ?? Yue Li and Yingjian Liu and Haoyu Yin and Zhongwen Guo and Yu Wang RECAR: Robust and efficient collision-avoiding routing for $3$D underwater named data networking . . . . ?? Riya Goyal and Abhinav Tomar Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks . . . . . . . . . . . . . . . . ?? Zainab H. Ali and Nora El-Rashidy and Mostafa A. Elhosseini and Sarah M. Ayyad SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET ?? Muhammad Tahir Abbas and Karl-Johan Grinnemo and Guillaume Ferré and Philippe Laurent and Stefan Alfredsson and Mohammad Rajiullah and Johan Eklund Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things . . . . . . . . . . . . . . . . . ?? Quang Tuan Do and Thien Duc Hua and Anh-Tien Tran and Dongwook Won and Geeranuch Woraphonbenjakul and Wonjong Noh and Sungrae Cho Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network ?? Sekione Reward Jeremiah and Haotian Chen and Stefanos Gritzalis and Jong Hyuk Park Leveraging application permissions and network traffic attributes for Android ransomware detection . . . . . . . . . . ?? Jong Wook Kim and Beakcheol Jang Privacy-preserving generation and publication of synthetic trajectory microdata: a comprehensive survey . . . ?? Yakoub Mordjana and Badis Djamaa and Mustapha Reda Senouci and Aymen Herzallah A Contextual Multi-Armed Bandit approach for NDN forwarding . . . . . . . . . . . ?? Ala Altaweel and Sidra Aslam and Ibrahim Kamel JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks ?? K. G. Raghavendra Narayan and Rakesh Ganesula and Tamminaina Sai Somasekhar and Srijanee Mookherji and Vanga Odelu and Rajendra Prasath and Alavalapati Goutham Reddy Attenuating majority attack class bias using hybrid deep learning based IDS framework . . . . . . . . . . . . . . . ?? Yingze Liu and Yuanbo Guo CL-AP$^2$: a composite learning approach to attack prediction via attack portraying . . . . . . . . . . . . . . . ?? Lázaro Bustio-Martínez and Vitali Herrera-Semenets and Juan Luis García-Mendoza and Miguel Ángel Álvarez-Carmona and Jorge Ángel González-Ordiano and Luis Zúñiga-Morales and J. Emilio Quiróz-Ibarra and Pedro Antonio Santander-Molina and Jan van den Berg Uncovering phishing attacks using principles of persuasion analysis . . . ?? Libin Yang and Wei Lou On designing a profitable system model to harmonize the tripartite dissension in content delivery applications . . . . ?? Muhammad Abdullah and Humayun Zubair Khan and Umair Fakhar and Ahmad Naeem Akhtar and Shuja Ansari Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks . . . . . . . . . . . . . . . . ?? Guangchen Chen and Benjie Shi and Yinhui Zhang and Zifen He and Pengcheng Zhang CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake . . . . . . . . . . . . . . . . . . ?? Rikhi Ram Jagat and Dilip Singh Sisodia and Pradeep Singh Exploiting web content semantic features to detect web robots from weblogs . . . ?? Sulyman Age Abdulkareem and Chuan Heng Foh and François Carrez and Klaus Moessner A lightweight SEL for attack detection in IoT/IIoT networks . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous October 2024 . . . . . . . . . . . . . . ??
Jitesh Pradhan and Ashish Singh and Abhinav Kumar and Muhammad Khurram Khan Skin lesion classification using modified deep and multi-directional invariant handcrafted features . . . . . ?? Panjun Sun and Yi Wan and Zongda Wu and Zhaoxi Fang A survey on security issues in IoT operating systems . . . . . . . . . . . ?? Yi-Xiang Wang and Yu-Ling Hsueh A low-storage synchronization framework for blockchain systems . . . . . . . . . ?? Taejune Park and Myoungsung You and Jinwoo Kim and Seungsoo Lee \em Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC . . . . . . . . ?? Michael Frey and Thomas Evans and Angela Folz and Mary Gregg and Jeanne Quimby and Jacob D. Rezac Anomalous state detection in radio access networks: a proof-of-concept . . ?? Yingya Guo and Mingjie Ding and Weihong Zhou and Bin Lin and Cen Chen and Huan Luo MATE: a multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks . . . . . . . . . . . . . . . . ?? Devi D. and Godfrey Winster S. HRMF-DRP: a next-generation solution for overcoming provisioning challenges in cloud environments . . . . . . . . . . . ?? Subhra Priyadarshini Biswal and Sanjeev Patel A bandwidth delay product based modified Veno for high-speed networks: BDP-Veno ?? Zeli Wang and Weiqi Dai and Ming Li and Kim-Kwang Raymond Choo and Deqing Zou DFier: a directed vulnerability verifier for Ethereum smart contracts . . . . . . ?? Nguyen Thi My Binh and Huynh Thi Thanh Binh and Ho Viet Duc Luong and Nguyen Tien Long and Trinh Van Chien An efficient exact method with polynomial time-complexity to achieve $k$-strong barrier coverage in heterogeneous wireless multimedia sensor networks . . . . . . . . . . . . . . . . ?? Alain Bertrand Bomgni and Garrik Brel Jagho Mdemaya and Miguel Landry Foko Sindjoung and Mthulisi Velempini and Celine Cabrelle Tchuenko Djoko and Jean Frederic Myoupo CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks . . . . . . . . ?? Mohamad Wazzeh and Mohamad Arafeh and Hani Sami and Hakima Ould-Slimane and Chamseddine Talhi and Azzam Mourad and Hadi Otrok CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication . . . . . . . . . . . . . ?? Rong Zheng and Xiaoqin Feng and Fengyuan Ren Designing transport scheme of $3$D naked-eye system . . . . . . . . . . . . ?? Mahdi Alkaeed and Adnan Qayyum and Junaid Qadir Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: a survey . . . . . . ?? Zu-Sheng Tan and Eric W. K. See-To and Kwan-Yeung Lee and Hong-Ning Dai and Man-Leung Wong Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities . . . . . . . . . . . . . . . ?? Ruijin Wang and Jinbo Wang and Xiong Li and Jinshan Lai and Fengli Zhang and Xikai Pei and Muhammad Khurram Khan CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning . . . . . . . . . . . ?? Lingling Zi and Xin Cong A blockchain transaction mechanism in the delay tolerant network . . . . . . . ?? Yilin Li and Peiying Zhang and Neeraj Kumar and Mohsen Guizani and Jian Wang and Konstantin Igorevich Kostromitin and Yi Wang and Lizhuang Tan Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning . . . . . . . . . . . . . . . . ?? Onur Sahin and Vanlin Sathya Network quality prediction in a designated area using GPS data . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous November 2024 . . . . . . . . . . . . . ??
Samane Sharif and Mohammad Hossein Yaghmaee Moghaddam and Seyed Amin Hosseini Seno A hybrid bi-level management framework for caching and communication in Edge--AI enabled IoT . . . . . . . . . . ?? Mengjie Lv and Xuanli Liu and Hui Dong and Weibei Fan An expandable and cost-effective data center network . . . . . . . . . . . . . ?? Ji Wan and Kai Hu and Jie Li and Yichen Guo and Hao Su and Shenzhang Li and Yafei Ye Zebra: a cluster-aware blockchain consensus algorithm . . . . . . . . . . ?? Arash Mahboubi and Khanh Luong and Hamed Aboutorab and Hang Thanh Bui and Geoff Jarrad and Mohammed Bahutair and Seyit Camtepe and Ganna Pogrebna and Ejaz Ahmed and Bazara Barry and Hannah Gately Evolving techniques in cyber threat hunting: a systematic review . . . . . . ?? Baoshan Lu and Junli Fang and Junxiu Liu and Xuemin Hong Energy efficient multi-user task offloading through active RIS with hybrid TDMA--NOMA transmission . . . . . ?? Quang Truong Vu and Phuc Tan Nguyen and Thi Hanh Nguyen and Thi Thanh Binh Huynh and Van Chien Trinh and Mikael Gidlund Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search ?? Cong Wang and Tong Zhou and Maode Ma and Yuwen Xiong and Xiankun Zhang and Chao Liu An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks . . . . . . . . . . . . . ?? Guoqing Tian and Li Pan and Shijun Liu An online cost optimization approach for edge resource provisioning in cloud gaming . . . . . . . . . . . . . . . . . ?? Xiaolei Yang and Zhixin Xia and Junhui Song and Yongshan Liu Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters . . . . . . . . . . . . . . . ?? Muhammad Numan and Fazli Subhan and Mohd Nor Akmal Khalid and Wazir Zada Khan and Hiroyuki Iida Clone node detection in static wireless sensor networks: a hybrid approach . . . ?? Shivani Jamwal and José Cano and Gyu Myoung Lee and Nguyen H. Tran and Nguyen Truong A survey on Ethereum pseudonymity: Techniques, challenges, and future directions . . . . . . . . . . . . . . . ?? Xiaoyan Wei and Zheng Yan and Xueqin Liang A survey on fuzz testing technologies for industrial control protocols . . . . ?? Yash Sharma and Anshul Arora PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques . . . . . . . ?? Tao Lin and Yang Chen and Hao Yang and Yuan Zhang and Bo Jiang and Jinyao Yan DeCa360: Deadline-aware edge caching for two-tier 360$^\circ $ video streaming ?? Xueshu Hong and Xingkong Ma and Shaoyong Li and Yiqing Cai and Bo Liu SSBM: a spatially separated boxes-based multi-tab website fingerprinting model ?? Pedro R. X. do Carmo and Diego de Freitas Bezerra and Assis T. Oliveira Filho and Eduardo Freitas and Miguel L. P. C. Silva and Marrone Dantas and Beatriz Oliveira and Judith Kelner and Djamel F. H. Sadok and Ricardo Souza Living on the edge: a survey of Digital Twin-Assisted Task Offloading in safety-critical environments . . . . . . ?? Ponjit Borgohain and Hiten Choudhury An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario . . . . . . . . . . . . . . . . ?? Héctor Martinez and Francisco J. Rodriguez-Lozano and Fernando León-García and Jose M. Palomares and Joaquín Olivares Distributed Fog computing system for weapon detection and face recognition ?? Juan Eloy Espozo-Espinoza and Manuel Fernández-Veiga and Francisco Troncoso-Pastoriza Generalized hierarchical coded caching ?? Sungbin Park and Changbae Seo and Xueqiang Wang and Yeonjoon Lee and Seung-Hyun Seo Exclusively in-store: Acoustic location authentication for stationary business devices . . . . . . . . . . . . . . . . ?? Tahani Aladwani and Christos Anagnostopoulos and Kostas Kolomvatsos Node and relevant data selection in distributed predictive analytics: a query-centric approach . . . . . . . . . ?? Amirmohammad Karamzadeh and Alireza Shameli-Sendi Reducing cold start delay in serverless computing using lightweight virtual machines . . . . . . . . . . . . . . . . ?? Van-Tam Hoang and Yared Abera Ergu and Van-Linh Nguyen and Rong-Guey Chang Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: a survey ?? Anita Panwar and Satyasai Jagannath Nanda Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network . . . . . . . . ?? Bo Yin and Zeshu Ai and Jun Lu and Ying Feng A cooperative task assignment framework with minimum cooperation cost in crowdsourcing systems . . . . . . . . . ?? Moez Krichen and Mohamed S. Abdalzaher Performance enhancement of artificial intelligence: a survey . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous December 2024 . . . . . . . . . . . . . ??
Asmitha K. A. and Vinod P. and Rafidha Rehiman K. A. and Neeraj Raveendran and Mauro Conti Android malware defense through a hybrid multi-modal approach . . . . . . . . . . ?? Zhengqiu Weng and Weinuo Zhang and Tiantian Zhu and Zhenhao Dou and Haofei Sun and Zhanxiang Ye and Ye Tian RT-APT: a real-time APT anomaly detection method for large-scale provenance graph . . . . . . . . . . . . ?? Shinu M. Rajagopal and Supriya M. and Rajkumar Buyya Leveraging blockchain and federated learning in Edge--Fog--Cloud computing environments for intelligent decision-making with ECG data in IoT . . ?? Jiaqi Chen and Shuhang Han and Donghai Tian and Changzhen Hu IMUNE: a novel evolutionary algorithm for influence maximization in UAV networks . . . . . . . . . . . . . . . . ?? Mingyang Zhao and Chengtai Liu and Sifeng Zhu Joint optimization scheme for task offloading and resource allocation based on MO-MFEA algorithm in intelligent transportation scenarios . . . . . . . . ?? Muhammad Sajjad Akbar and Zawar Hussain and Muhammad Ikram and Quan Z. Sheng and Subhas Chandra Mukhopadhyay On challenges of sixth-generation (6G) wireless networks: a comprehensive survey of requirements, applications, and security issues . . . . . . . . . . ?? Mohammed Talal and Salem Garfan and Rami Qays and Dragan Pamucar and Dursun Delen and Witold Pedrycz and Amneh Alamleh and Abdullah Alamoodi and B. B. Zaidan and Vladimir Simic A comprehensive systematic review on machine learning application in the 5G-RAN architecture: Issues, challenges, and future directions . . . . . . . . . ?? Mina Emami Khansari and Saeed Sharifian A deep reinforcement learning approach towards distributed Function as a Service (FaaS) based edge application orchestration in cloud--edge continuum ?? Yong Liu and Yuanhang Ge and Qian Meng and Quanze Liu Controller load optimization strategies in Software-Defined Networking: a survey ?? Saeed Banaeian Far and Seyed Mojtaba Hosseini Bamakan Third layer blockchains are being rapidly developed: Addressing state-of-the-art paradigms and future horizons . . . . . . . . . . . . . . . . ?? Goshgar Ismayilov and Can Özturan PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis ?? Hao Peng and Yifan Zhao and Dandan Zhao and Bo Zhang and Cheng Qian and Ming Zhong and Jianmin Han and Xiaoyang Liu and Wei Wang Robustness of multilayer interdependent higher-order network . . . . . . . . . . ?? Andjela Jovanovic and Luka Jovanovic and Miodrag Zivkovic and Nebojsa Bacanin and Vladimir Simic and Dragan Pamucar and Milos Antonijevic Particle swarm optimization tuned multi-headed long short-term memory networks approach for fuel prices forecasting . . . . . . . . . . . . . . ?? Farkhondeh Kiaee and Ehsan Arianyan Joint VM and container consolidation with auto-encoder based contribution extraction of decision criteria in Edge--Cloud environment . . . . . . . . ?? Hassan Jalil Hadi and Yue Cao and Sifan Li and Naveed Ahmad and Mohammed Ali Alshara FCG-MFD: Benchmark function call graph-based dataset for malware family detection . . . . . . . . . . . . . . . ?? Senthil Kumar Jagatheesaperumal and Ijaz Ahmad and Marko Höyhtyä and Suleman Khan and Andrei Gurtov Deep learning frameworks for cognitive radio networks: Review and open research challenges . . . . . . . . . . . . . . . ?? Abeer Iftikhar and Kashif Naseer Qureshi and Faisal Bashir Hussain and Muhammad Shiraz and Mehdi Sookhak A blockchain based secure authentication technique for ensuring user privacy in edge based smart city networks . . . . . ?? Zhiyuan Li and Hongyi Zhao and Jingyu Zhao and Yuqi Jiang and Fanliang Bu SAT-Net: a staggered attention network using graph neural networks for encrypted traffic classification . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous January 2025 . . . . . . . . . . . . . . ??
Zheng Zhang and Xiangyu Su and Ji Wu and Claudio J. Tessone and Hao Liao Heterogeneous graph representation learning via mutual information estimation for fraud detection . . . . . ?? Pengbiao Zhao and Yuanjian Zhou and Salman Ijaz and Fazlullah Khan and Jingxue Chen and Bandar Alshawi and Zhen Qin and Md Arafatur Rahman RLL-SWE: a Robust Linked List Steganography Without Embedding for intelligence networks in smart environments . . . . . . . . . . . . . . ?? Yulong Ma and Yingya Guo and Ruiyu Yang and Huan Luo FRRL: a reinforcement learning approach for link failure recovery in a hybrid SDN . . . . . . . . . . . . . . . . . . ?? Abed Alanazi and Abdullah Alqahtani and Shtwai Alsubai and Munish Bhatia Blockchain-inspired intelligent framework for logistic theft control . . ?? José Santos and Efstratios Reppas and Tim Wauters and Bruno Volckaert and Filip De Turck \em Gwydion: Efficient auto-scaling for complex containerized applications in Kubernetes through Reinforcement Learning . . . . . . . . . . . . . . . . ?? Silvestre Malta and Pedro Pinto and Manuel Fernández-Veiga Optimizing 5G network slicing with DRL: Balancing eMBB, URLLC, and mMTC with OMA, NOMA, and RSMA . . . . . . . . . . ?? Fahimeh Dabaghi-Zarandi and Mohammad Mehdi Afkhami and Mohammad Hossein Ashoori Community Detection method based on Random walk and Multi objective Evolutionary algorithm in complex networks . . . . . . . . . . . . . . . . ?? Yuxin Xia and Jie Zhang and Ka Lok Man and Yuji Dong Handover Authenticated Key Exchange for Multi-access Edge Computing . . . . . . ?? Rakesh Kumar and Mayank Swarnkar QuIDS: a Quantum Support Vector machine-based Intrusion Detection System for IoT networks . . . . . . . . . . . . ?? Annamaria Ficara and Hocine Cherifi and Xiaoyang Liu and Luiz Fernando Bittencourt and Maria Fazio Complex networks for Smart environments management . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous February 2025 . . . . . . . . . . . . . ??
Walid K. Hasan and Iftekhar Ahmad and Daryoush Habibi and Quoc Viet Phung and Mohammad Al-Fawa'reh and Kazi Yasin Islam and Ruba Zaheer and Haitham Khaled A survey on energy efficient medium access control for acoustic wireless communication networks in underwater environments . . . . . . . . . . . . . . ?? Xiankun Fu and Li Pan and Shijun Liu Caching or re-computing: Online cost optimization for running big data tasks in IaaS clouds . . . . . . . . . . . . . ?? Dhruv Kalambe and Divyansh Sharma and Pushkar Kadam and Shivangi Surati A comprehensive plane-wise review of DDoS attacks in SDN: Leveraging detection and mitigation through machine learning and deep learning . . . . . . . ?? Lizeth Patricia Aguirre Sanchez and Yao Shen and Minyi Guo MDQ: a QoS-Congestion Aware Deep Reinforcement Learning Approach for Multi-Path Routing in SDN . . . . . . . ?? Seethalakshmi Perumal and P. Kola Sujatha and Krishnaa S. and Muralitharan Krishnan Clusters in chaos: a deep unsupervised learning paradigm for network anomaly detection . . . . . . . . . . . . . . . ?? Hongyan Ran and Xiaohong Li and Zhichang Zhang Label-aware learning to enhance unsupervised cross-domain rumor detection . . . . . . . . . . . . . . . ?? Rui Meng and Bingxuan Xu and Xiaodong Xu and Mengying Sun and Bizhu Wang and Shujun Han and Suyu Lv and Ping Zhang A survey of Machine Learning-based Physical-Layer Authentication in wireless communications . . . . . . . . ?? Fan Dong and Henry Leung and Steve Drew Optimizing federated learning with weighted aggregation in aerial and space networks . . . . . . . . . . . . . . . . ?? Yadong Zhang and Huixiang Zhang and Yi Yang and Wen Sun and Haibin Zhang and Yaru Fu Adaptive differential privacy in asynchronous federated learning for aerial-aided edge computing . . . . . . ?? Maryam Nikpour and Parisa Behvand Yousefi and Hadi Jafarzadeh and Kasra Danesh and Roya Shomali and Saeed Asadi and Ahmad Gholizadeh Lonbar and Mohsen Ahmadi Intelligent energy management with IoT framework in smart cities using intelligent analysis: an application of machine learning methods for complex networks and systems . . . . . . . . . . ?? Usman Ahmed and Zheng Jiangbin and Sheharyar Khan and Muhammad Tariq Sadiq Consensus hybrid ensemble machine learning for intrusion detection with explainable AI . . . . . . . . . . . . . ?? Babak Farhadi and Parvaneh Asghari and Ebrahim Mahdipour and Hamid Haj Seyyed Javadi A novel community-driven recommendation-based approach to predict and select friendships on the social IoT utilizing deep reinforcement learning ?? Geetika Dhand and Meena Rao and Parul Chaudhary and Kavita Sheoran A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism . . . . . . . . . . . ?? Borja Molina-Coronado and Antonio Ruggia and Usue Mori and Alessio Merlo and Alexander Mendiburu and Jose Miguel-Alonso Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection . . . . . . . ?? Mohammad Al-Fawa'reh and Jumana Abu-khalaf and Naeem Janjua and Patryk Szewczyk On and off the manifold: Generation and Detection of adversarial attacks in IIoT networks . . . . . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . ?? Anonymous March 2025 . . . . . . . . . . . . . . . ??