样式: 排序: IF: - GO 导出 标记为已读
-
CRAMP: Clustering-based RANs association and MEC placement for delay-sensitive applications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-05-09 Saumyaranjan Dash, Asif Uddin Khan, Binayak Kar, Santosh Kumar Swain, Primatar Kuswiradyo, Seifu Birhanu Tadele, Frezer Guteta Wakgra
-
Energy-efficient resource allocation for bidirectional wireless power and information transfer over interference channels J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-05-07 Kisong Lee, Hyun-Ho Choi
-
Nefis: A network coding based flexible device-to-device video streaming scheme J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-05-03 Jun Yin, Jiaxin Wen, Ming Zhu, Yulong Li, Lei Wang
-
Resource allocation in Fog–Cloud Environments: State of the art J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-27 Mohammad Zolghadri, Parvaneh Asghari, Seyed Ebrahim Dashti, Alireza Hedayati
The rapid expansion of omnipresent phenomena, exemplified by the Internet of Things (IoT), necessitates significant consideration of data volume and processing requirements. Cloud servers serve as the ultimate destination for IoT data. However, the centralized nature of cloud-based architecture may lead to communication limitations and reduced response times. By placing servers close to the sources
-
A comprehensive survey of smart contract security: State of the art and research directions J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-26 Guangfu Wu, HaiPing Wang, Xin Lai, Mengmeng Wang, Daojing He, Sammy Chan
-
SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-25 Hao Su, Jianwei Niu, Xuefeng Liu, Mohammed Atiquzzaman
-
Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-24 Muna Al-Hawawreh, M. Shamim Hossain
-
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-24 Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Ahsan Riaz, Mohammed Maray, Muhammad Bilal, Muhammad Khurram Khan
Mobile Edge Computing (MEC) is a modern paradigm that involves moving computing and storage resources closer to the network edge, reducing latency, and enabling innovative, delay-sensitive applications. Within MEC, computation offloading refers to the process of transferring computationally intensive tasks or processes from mobile devices to edge servers, optimizing the performance of mobile applications
-
An efficient mechanism for function scheduling and placement in function as a service edge environment J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-22 Sahar Pilevar Moakhar, Saeid Abrishami
With the advancement of Internet of Things (IoT) applications and the substantial surge in associated traffic, coupled with the rise in demand for low-latency mobile applications, the utilization of remote cloud computing infrastructure has encountered notable challenges. As a solution, edge computing has emerged, decentralizing computational resources closer to data sources. This results in quicker
-
Edge caching and computing of video chunks in multi-tier wireless networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-22 Dongjae Kim, Dong-Wook Seo, Minseok Choi
This paper proposes a video caching and transcoding strategy for delay-constrained content delivery in multi-tier wireless networks. Particularly for multimedia services whose content can be encoded into multiple quality versions and consists of multiple chunks, we present an approach of caching chunks of an identical file separately in different network layers with different qualities. Given this
-
Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-22 Tri Nguyen, Huong Nguyen, Tuan Nguyen Gia
IoT systems are widely used in various applications, including healthcare, agriculture, manufacturing, and smart cities. However, these systems still have limitations, such as lack of security, high latency, energy inefficiency, the inefficiency of bandwidth utilization, and shortage of automaticity. The integration of edge computing and blockchain into IoT has been proposed to address these limitations
-
Flow optimization strategies in data center networks: A survey J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-21 Yong Liu, Tianyi Yu, Qian Meng, Quanze Liu
-
Efficient cloud data center: An adaptive framework for dynamic Virtual Machine Consolidation J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-20 Seyyed Meysam Rozehkhani, Farnaz Mahan, Witold Pedrycz
Cloud computing is a thriving and ever-expanding sector in the industry world. This growth has sparked increased interest from organizations seeking to harness its potential. However, the sheer volume of services and offerings in this field has resulted in a noticeable surge in related data. With the rapid evolution and growing demand, cloud computing resource management faces a fresh set of challenges
-
An ensemble maximal feature subset selection for smartphone based human activity recognition J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-15 S. Reshmi, E. Ramanujam
Smartphone-based Human Activity Recognition (HAR) uses spatiotemporal time series data collected from a smartphone’s in-built accelerometer, gyroscope, and magnetometer sensor. Real-time HAR datasets such as UCI-HAR and UCI-HAPT extract time and frequency domain statistical features for activity recognition from the collected time series signals. Various Machine Learning techniques have been proposed
-
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-09 Youssef Ibrahim, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Vinod Khadkikar, Hatem Zeineldin
-
Optimizing the performance of OpenFlow Protocol over QUIC J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-08 WaiMing Lau, KaKei Wong, Lin Cui
-
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-06 Manpreet Kaur, Vinod Kumar Verma
-
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-04 Nesma Mahmoud, Hatem Abdelkader, Asmaa Aly
-
An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-04-03 Chao Meng, Xiaoyong Yan, Lin Guo, Zhixin Sun, Pan Wang
In duty-cycle wireless sensor networks(WSNs), as nodes are not necessarily synchronized, many asynchronous neighbor discovery algorithms have been proposed over the past several years. However, existing algorithms are not strong enough to support all heterogeneous duty-cycle networks in terms of energy cost and discovery latency. In this article, the authors develop a novel neighbor discovery algorithm
-
An expert system for hybrid edge to cloud computational offloading in heterogeneous MEC–MCC environments J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-27 Sheharyar Khan, Zheng Jiangbin, Muhammad Irfan, Farhan Ullah, Sohrab Khan
-
A Stochastic Computational Graph with Ensemble Learning Model for solving Controller Placement Problem in Software-Defined Wide Area Networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-20 Oladipupo Adekoya, Adel Aneiba
-
SplitStream: Distributed and workload-adaptive video analytics at the edge J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-19 Yu Liang, Sheng Zhang, Jie Wu
Deep learning-based video analytics is computation-intensive. Manufacturers such as Nvidia have launched many embedded deep learning accelerators and are rapidly gaining market share. However, the computing resources of such accelerators are still limited and heterogeneous. Although existing systems aim at optimizing video query tasks from a variety of perspectives, they rarely consider the general
-
Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-15 Lotfi Mhamdi, Mohd Mat Isa
-
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-04 Maedeh Abedini Bagha, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang
-
Throughput and delay analysis of cognitive M2M communications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-02 Soumen Mondal, Luca Davoli, Sanjay Dhar Roy, Sumit Kundu, Gianluigi Ferrari, Riccardo Raheli
-
Discrete-time Markov decision process for performance analysis of virtual machine allocation schemes in C-RAN J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-02 Sana Younes, Maroua Idi, Riadh Robbana
Cloud Radio Access Network (C-RAN) has been proposed as a cloud architecture to provide a common connected resource pool management. It separates the functionalities of the traditional Base Station (BS) into two parts: the Base Band Unit (BBU) and the Remote Radio Head (RRH). BBUs functions are implemented on the Virtual Machines (VMs) in the cloud over commodity hardware, serving User Equipments (UEs)
-
AI-enhanced blockchain technology: A review of advancements and opportunities J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-01 Dalila Ressi, Riccardo Romanello, Carla Piazza, Sabina Rossi
Blockchain technology has rapidly gained popularity, permeating various fields due to its inherent features of security, transparency, and decentralization. Blockchain-based applications, spanning from financial transactions to supply chain management, have revolutionized numerous industries. Concurrently, Artificial Intelligence (AI) techniques have emerged as a powerful tool for efficiently solving
-
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-01 Alessandra Somma, Alessandra De Benedictis, Christiancarmine Esposito, Nicola Mazzocca
In recent years, the emerging Digital Twin (DT) technology is playing a key role in fostering the transition towards the Industry 4.0. DTs, representing virtual replicas of physical objects, products or processes established thanks to a bidirectional continuous flow of information between the physical and the virtual world, are currently adopted in multiple domains such as manufacturing, aerospace
-
ActiveGuardian: An accurate and efficient algorithm for identifying active elephant flows in network traffic J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-24 Bing Xiong, Yongqing Liu, Rui Liu, Jinyuan Zhao, Shiming He, Baokang Zhao, Kun Yang, Keqin Li
Active elephant flows, which indicate the real-time data transmission status, are of primary interest in network management and various applications. However, existing network measurement efforts mainly focus on finding elephant flows, and limited works on identifying active elephant flows suffer from low accuracy and heavy overheads. To address this issue, this paper proposes ActiveGuardian to identify
-
A survey on intelligent management of alerts and incidents in IT services J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-20 Qingyang Yu, Nengwen Zhao, Mingjie Li, Zeyan Li, Honglin Wang, Wenchi Zhang, Kaixin Sui, Dan Pei
Modern service systems are constantly improving with the development of various IT technologies, leading to a boost in system scales and complex dependencies among service components. The large scale and complexity of services make them more prone to failure. To maintain services’ normal and stable operation, alert and incident management (AIM), which analyzes and handles service failures in time,
-
Hardening of network segmentation using automated referential penetration testing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-20 Mohammed Alabbad, Neerja Mhaskar, Ridha Khedri
We study the problem of hardening the security of existing networks. Dynamic and static analysis are two main approaches that are used to address this problem. Dynamic analysis is performed using penetration testing. Penetration testing (short pentesting) simulates attacks on an existing and possibly dynamic network to identify its vulnerabilities without causing it any harm. Static analysis analyzes
-
Firm social management system for supporting IoT users in application environment J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-08 Ying Huang
Internet of Things (IoT) applications connect various services and communication channels to support social user interaction. User management impedes the smooth operation of these networked services by causing interference and delayed responses. The suggested FMS provides a solution by resolving connection- and interference-related problems brought on by application switchovers and social effects.
-
-
Novel blockchain-assisted fault-tolerant roaming authentication protocol for mobility networks without home agent entanglement J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-05 Hadi Ghaemi, Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Zakieh Alizadehsani
In mobility networks, users can receive desired services from foreign agents securely by means of a roaming authentication protocol. During the past decade, scholars have attempted to propose efficient and secure protocols. Nevertheless, careful observation of related works demonstrates that previously-proposed protocols have the following limitations. First, the home agent involvement is required
-
Evaluation of distributed data processing frameworks in hybrid clouds J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-03 Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, M. Ali Babar
Distributed data processing frameworks (e.g., Hadoop, Spark, and Flink) are widely used to distribute data among computing nodes of a cloud. Recently, there have been increasing efforts aimed at evaluating the performance of distributed data processing frameworks hosted in private and public clouds. However, there is a paucity of research on evaluating the performance of these frameworks hosted in
-
HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Juhwan Kim, Jihyeon Yu, Youngwoo Lee, Dan Dongseong Kim, Joobeom Yun
Numerous interconnected small embedded systems, such as Internet of Things (IoT) devices, are pervasive in our daily lives; however, their security lags behind. In particular, firmware vulnerabilities in low-level infrastructure have a more severe impact than application-level vulnerabilities. Fuzzing is the most effective technique for detecting vulnerabilities in firmware, but it encounters several
-
Detection of quality of service degradation on multi-tenant containerized services J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, Felipe V. Ramos, Pietro Tedeschi
Computational services are progressively migrating to container-based solutions due to their faster provision time and lower resource allocation overhead. Service providers rely on container multi-tenancy to share their computing infrastructure and pave their way to profit. Yet, the Quality of Service (QoS) impact due to container multi-tenancy on deployed services is still widely overlooked in the
-
Energy optimized data fusion approach for scalable wireless sensor network using deep learning-based scheme J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Tariq Mahmood, Jianqiang Li, Tanzila Saba, Amjad Rehman, Saqib Ali
-
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-30 Peiying Zhang, Kunkun Yan, Neeraj Kumar, Lizhuang Tan, Mohsen Guizani, Konstantin Igorevich Kostromitin, Jian Wang, Jianyong Zhang
Being a novel network architecture, the Space-air-ground integrated network (SAGIN) offers advantages such as extensive network coverage and seamless ubiquitous access. However, it also encounters the challenge of balancing a growing user demand with limited network service resources. In order to further improve the utilization rate of network resources, a group of virtual network functions can be
-
Exploring Blockchain-driven security in SDN-based IoT networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-29 Ngangbam Indrason, Goutam Saha
The Internet of Things (IoT) is an emerging field of technology with a huge scope of its applicability in various industries and a wide range of societal needs, including medical sciences. However, IoT suffers from many limitations like energy, resource constraints, scalability, security, availability, etc. Software-Defined Networking (SDN) is another similar technology that has many features that
-
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Tao Peng, Wei You, Kejian Guan, Entao Luo, Shaobo Zhang, Guojun Wang, Tian Wang, Youke Wu
The Mobile crowdsensing (MCS) platforms perform optimal task assignments by collecting a large amount of user information to improve system performance and efficiency. However, the collection and analysis of users’ data may jeopardize their privacy. Existing privacy protection methods of task assignment have rarely considered the comprehensive protection of user privacy and focus primarily on single
-
Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad
The world has recently witnessed the devastating impact of a global pandemic, where countless lives were tragically lost due to delayed abnormal disease detection and the lack of seamless coordination among healthcare organizations such as hospitals, medical labs, and pharmacies. Addressing the heterogeneity of healthcare entities and the extensive volume of medical-related data they possess gives
-
Early Prevention and Mitigation of Link Flooding Attacks in Software Defined Networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Shariq Murtuza, Krishna Asawa
Software-Defined Networks (SDNs) are increasingly gaining prominence in the networking domain, enabling programmable control and management of network infrastructure within data centers. This programmability offers the advantage of dynamically adjusting the routing paths depending upon on the network’s requirements and capabilities. Computer networks have been vulnerable to denial of service attacks
-
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-24 Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan
The accelerated development of Internet of Things services surfaced the way for providing uninterrupted and adaptable smart mobility services for mobile clients to communicate without any zone or time constraints. The global mobility network is an appropriate contender to be adopted as a communication platform to offer roaming services for swift data exchange and fast movement of mobile users in smart
-
RL-based HTTP adaptive streaming with edge collaboration in multi-client environment J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-22 Jeongho Kang, Kwangsue Chung
Hypertext Transfer Protocol (HTTP) adaptive streaming aims to achieve high Quality of Experience (QoE) in video streaming. However, when multiple clients stream videos, QoE fairness and overall QoE deteriorate due to the lack of consideration for multi-client environments and dynamically changing network environments. This paper proposes HTTP adaptive streaming based on edge collaboration using Reinforcement
-
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-20 Ali Y. Aldailamy, Abdullah Muhammed, Rohaya Latip, Nor Asilah Wati Abdul Hamid, Waidah Ismail
In social media, a huge number of worldwide data objects are posted every day. The contents of these data objects include text, links, images, audio, and videos which could be small, medium, or large and accessed across the world. Moving these data objects into a single cloud service provider (CSP) is risky and results in four-fold obstacles: vendor lock-in, service availability, cost-ineffective use
-
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-19 Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maintain
-
Compressive sensing of Internet traffic data using relative-error bound tensor-CUR decomposition J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Awnish Kumar, Vijaya V. Saradhi, Venkatesh Tamarapalli
Missing values in the Internet traffic data pose a serious challenge for use in several traffic engineering applications. Compressive sensing is a generic methodology for the reconstruction of missing values in the tensor representation of the data. Existing decomposition techniques for compressive sensing suffer from two limitations; need to know the tensor rank apriori and the usage of alternating
-
mPillBox: An open framework for a smarter pillbox J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Naser AlDuaij
As the medical and technological fields have improved, there is a growing reliance on technology in the medical field. A considerable issue plaguing patients around the world is the management of medication intake for medications that treat chronic or otherwise serious illnesses. As such, many hospitalizations or even deaths are caused by medication errors. Existing solutions that provide smart pillboxes
-
Time-continuous computing offloading algorithm with user fairness guarantee J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Hao Hao, Wei Ding, Wei Zhang
Computing offloading is a potential avenue to reduce transmission delay by moving computing tasks from cloud to edge nodes. Due to the limited computing capacity of edge nodes, performing effective computing offloading strategy is challenging. To simplify the problem, it is often assumed that the timeline is discrete and offloading decisions are only made at the end of each time slot. However, the
-
Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-11 Omar Lajam, Salahadin Mohammed
Network coding technology has opened new avenues for enhancing networking applications. Peer-to-peer (P2P) content distribution stands as a particularly promising application domain where network coding can effectively reduce network load and transmission time. However, the additional complexity introduced by coding operations raises questions about the trade-offs and overall cost–benefit analysis
-
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-30 Xiaobo Yu, Weizhi Meng, Yining Liu, Fei Zhou
Web backdoor attack is an increasingly prevalent network attack that can result in substantial losses for webmasters. During a cyber-attack, system vulnerabilities and web application flaws are usually used to implant a web shell inside victim servers. To mitigate these threats posed by web shells, research has focused on static feature detection, which has been evolved rapidly in recent years. However
-
BLIND: A privacy preserving truth discovery system for mobile crowdsensing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-18 Vincenzo Agate, Pierluca Ferraro, Giuseppe Lo Re, Sajal K. Das
Nowadays, an increasing number of applications exploit users who act as intelligent sensors and can quickly provide high-level information. These users generate valuable data that, if mishandled, could potentially reveal sensitive information. Protecting user privacy is thus of paramount importance for crowdsensing systems. In this paper, we propose BLIND, an innovative open-source truth discovery
-
HiMAQ: Hierarchical multi-agent Q-learning-based throughput and fairness improvement for UAV-Aided IoT networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-22 Eunjin Kim, Junsu Kim, Jae-Hyun Kim, Howon Lee
Recently, various types of Internet of Things (IoT) services have become wide spread, and new types of IoT devices are emerging. However, the significant number of high-rise buildings in urban environments renders it difficult to provide seamless and high-speed network connectivity consistently to these IoT devices via existing terrestrial IoT networks. Therefore, we herein consider unmanned aerial
-
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-22 Ming Zhou, Zhen Yang, Haiyang Yu, Shui Yu
Decentralized federated learning tries to address the single point of failure and privacy issue of federated learning by leveraging committee-based blockchain, which has been extensively studied among academic and industrial fields. The introduction of committees improves the efficiency of decentralized federated learning. However, it also is prone to attacks from Byzantine committee members, which
-
Harnessing federated generative learning for green and sustainable Internet of Things J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-09 Yuanhang Qi, M. Shamim Hossain
The rapid proliferation of devices in the Internet of Things (IoT) has ushered in a transformative era of data-driven connectivity across various domains. However, this exponential growth has raised pressing concerns about environmental sustainability and data privacy. In response to these challenges, this paper introduces One-shot Federated Learning (OSFL), an innovative paradigm that harmonizes sustainability
-
Advances in fronthauling of communication technologies: A review J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-07 Harpreet Kaur, Simranjit Singh, Ranjit Kaur, Rajandeep Singh
A detailed review of cellular generations is done with respect to fronthauling (FH) with the existing and upcoming key communication technologies. The journey of FH from migration to functional split as per the requirements of 5G and beyond is detailed with the standardized communication network technologies. In concern to efficient utilization of frequency spectrum; cost and time, the millimeter-wave
-
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-06 Shah Zeb, Aamir Mahmood, Sunder Ali Khowaja, Kapal Dev, Syed Ali Hassan, Mikael Gidlund, Paolo Bellavista
Industry 5.0 vision, a step toward the next industrial revolution and enhancement to Industry 4.0, conceives the new goals of resilient, sustainable, and human-centric approaches in diverse emerging applications such as factories-of-the-future and digital society. The vision seeks to leverage human intelligence and creativity in nexus with intelligent, efficient, and reliable cognitive collaborating
-
Surgical immunization strategies against lateral movement in Active Directory environments J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-06 David Herranz-Oliveros, Ivan Marsa-Maestre, Jose Manuel Gimenez-Guzman, Marino Tejedor-Romero, Enrique de la Hoz
Lateral movement, in which a cyber attacker progresses through an enterprise network in order to compromise its most valuable assets, is a key stage of any intrusion nowadays. Therefore, being able to mitigate lateral movement, be it by slowing down attacker progress or by limiting its reach, is a top priority for enterprise cyber-defence. Due to the inherent complexity of enterprise networks, it is
-
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-04 Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which include heterogeneous devices, legacy and new connectivity protocols and systems, and distributed networks, sophisticated attacks like ransomware will likely target these systems in the near future. Researchers have focused on studying and addressing ransomware attacks against various platforms in recent years