Issue 2/2024
Content (20 Articles)
Cluster-Based Hybrid Approach for PCI Configuration and Optimization in 5G EN-DC Heterogeneous Networks
Pengzhao Li, Heng Yang, Iksang Kim, Zhenyu Liu, Shanshan Li
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks
Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE
Mathias De Brouwer, Filip De Turck, Femke Ongenae
Optimizing Completion Time of Requests in Serverless Computing
Ajay Sherawat, Shubha Brata Nath, Sourav Kanti Addya
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review
Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks
Sateesh Gorikapudi, Hari Kishan Kondaveeti
SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN
Mustafa Al Samara, Ismail Bennis, Abdelhafid Abouaissa, Pascal Lorenz
Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree
Wei Yang, Yushan Fang, Xiaoming Zhou, Yijia Shen, Wenjie Zhang, Yu Yao
Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
Hichem Sedjelmaci, Nesrine Kaaniche, Kamel Tourki
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints
Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks
Nathan Harris Jr., Sajad Khorsandroo
Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems
Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio de Oliveira Silva
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification
Siamak Azadiabad, Ferhat Khendek
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings
Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment
Imad Eddine Said, Lamri Sayad, Djamil Aissani
An Edge Cloud Based Coordination Platform for Multi-user AR Applications
Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gerő
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach
Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Afaq Muhammad, Wang-Cheol Song
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams
Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian
On Feature Selection Algorithms for Effective Botnet Detection
Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab