Journal of Network and Computer Applications
IF
6.28
Papers
3,276
Papers 3,201
1 page of 321 pages (3,201 results)
Newest
#1Irian Leyva-Pupo (UPC: Universitat Politècnica de Catalunya)H-Index: 4
#2Cristina Cervello-Pastor (UPC: Universitat Politècnica de Catalunya)H-Index: 14
Abstract null null This study attempts to solve the placement and chaining problem of 5G User Plane Functions (UPFs) in a Multi-access Edge Computing (MEC) ecosystem. The problem is formalized as a multi-objective Integer Linear Programming (ILP) model targeted at optimizing provisioning costs and quality of service. Our model takes into account several aspects of the system such as UPF-specific considerations, the Service Function Chain (SFC) requests topology (single and multiple branches), Vi...
Source
#1Debanjan Roy Chowdhury (IITG: Indian Institute of Technology Guwahati)
#2Sukumar Nandi (IITG: Indian Institute of Technology Guwahati)H-Index: 26
Last. Diganta Goswami (IITG: Indian Institute of Technology Guwahati)H-Index: 7
view all 3 authors...
Abstract null null Video traffic over Internet of vehicles is increasing day by day to provide passengers on-board infotainment services. A video streaming service over Internet of vehicles involves design challenges of vehicular gateway selection, and vehicle to vehicle collaboration. Vehicular gateway selection is challenging due to high vehicle mobility and time-varying link conditions. Existing works on vehicular gateway selection focus on either service cost minimization, or quality of expe...
Source
#1Fanghui Sun (HIT: Harbin Institute of Technology)H-Index: 1
#2Shen Wang (HIT: Harbin Institute of Technology)H-Index: 1
Last. Hongli Zhang (HIT: Harbin Institute of Technology)H-Index: 20
view all 3 authors...
Abstract null null Reverse analyzing of unknown protocol behaviors keeps being a tough nut in Protocol Reverse Engineering (PRE), which infers specifications of unknown protocols by observable information, especially when only transmitted messages are available. This paper proposes a novel protocol state machine model Stochastic Protocol finite-state Transducer (SPT) to describe the message interaction rules between communicating terminals in a probabilistic way attempting to simulate behavior r...
Source
#1Wei Bingjie (HAUST: Henan University of Science and Technology)
#2Lin Wang (HAUST: Henan University of Science and Technology)H-Index: 4
Last. Qingtao Wu (HAUST: Henan University of Science and Technology)H-Index: 12
view all 6 authors...
Abstract null null The cache-enabled network architecture is very promising to improve the efficiency of content distribution and reduce the network congestion. In this paper, we propose a maximizing weighted throughput (MWT) algorithm for joint request forwarding, cache placement and flow control to dynamically optimize network performance. Specifically, a dual queue system that includes requests and data is established to retrieve the global content demands and traffic congestion information. ...
Source
Source
#1Mallikarjun Reddy Dorsala (NITW: National Institute of Technology Warangal)H-Index: 2
#2V.N. Sastry (IDRBT: Institute for Development and Research in Banking Technology)H-Index: 2
Last. Sudhakar Chapram (NITW: National Institute of Technology Warangal)H-Index: 1
view all 3 authors...
Abstract null null Blockchain is a disruptive technology applied by academia and industry in a broad spectrum of applications ranging from cryptocurrency, financial services, IoT, 5G, risk management to public and social services. On the other hand, cloud computing is spearheading the Internet revolution and rapidly becomes the hottest topic in IT. However, cloud computing inherently suffers from centralization, lack of transparency and trust. Blockchain, with its innovative features like decent...
Source
#1Ruhma Tahir (University of Essex)H-Index: 6
#2Shahzaib Tahir (University of the Sciences)H-Index: 6
Last. Ali SajjadH-Index: 8
view all 6 authors...
Abstract null null The Integrated Circuit Metric (ICMetric) technology is a novel trust basis that uses the system features to create an identification of a device. The ICMetric of the device is used for the provision of security services, thereby addressing the issue of trust associated with device identity. The ICMetric technology can be adapted to function with varying environments; however, the short length and low entropy of the ICMetric key pose a major threat to applications based on ICMe...
Source
#1Jiaojiao Jiang (UNSW: UNSW Sydney)H-Index: 10
#2Jean-Guy Schneider (Deakin University)H-Index: 19
Last. Chengfei Liu (Swinburne University of Technology)
view all 6 authors...
Abstract null null Automatically discovering message formats of unknown service or system protocols from network traces has become important for a variety of applications, such as emulating the behavior of an unknown protocol in service virtualization, or enabling deep packet inspection in network security. Among existing schemes, the keyword extraction based approaches have been shown to be effective. Inspired by the template structure of protocol messages, recent works leverage the positions o...
Source
#1Abdellah Houmz (Mohammed V University)H-Index: 2
#2Ghita MezzourH-Index: 8
Last. Houda Benbrahim (Mohammed V University)H-Index: 9
view all 5 authors...
Abstract null null Network scanning is one of the first steps in gathering information about a target before launching attacks. It is used to scan for vulnerable devices and exposed services in order to exploit them. Such exploits can result in data breaches or network disruption, which can be very costly for organizations. There are many factors, including technical and non-technical, affecting the volume of scanning activities. In this paper, we study the impact of vulnerability disclosure on ...
Source
#1Abdurrashid Ibrahim Sanka (City University of Hong Kong)H-Index: 2
#2Ray C. C. Cheung (City University of Hong Kong)H-Index: 21
Abstract null null Blockchain is an inspiring emerging technology that takes much attention from various researchers and companies. The technology offers various benefits such as data security, autonomy, immutability, transparency, and auditability. Hence, blockchain is getting large adoptions for various applications besides cryptocurrencies. Despite these benefits, scalability is a big challenge to blockchain impeding its mainstream adoption. This paper gives a systematic review of blockchain ...
Source
12345678910
Top fields of study
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.