
样式: 排序: IF: - GO 导出 标记为已读
-
DeFinder: Error-sensitive testing of deep neural networks via vulnerability interpretation J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-24
Aoshuang Ye, Shilin Zhang, Benxiao Tang, Jianpeng Ke, Yiru Zhao, Tao PengDNN testing evaluates the vulnerability of neural networks through adversarial test cases. The developers implement minor perturbations to the seed inputs to generate test cases, which are guided by meticulously designed testing criteria. Nevertheless, current coverage-guided testing methods rely on covering model states rather than analyzing the influence of seed inputs on inducing erroneous behaviors
-
Mixer-transformer: Adaptive anomaly detection with multivariate time series J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-22
Xing Fang, Yuanfang Chen, Zakirul Alam Bhuiyan, Xiajun He, Guangxu Bian, Noel Crespi, Xiaoyuan JingAnomaly detection is crucial for maintaining the stability and security of systems. However, anomaly detection systems often generate numerous false positives or irrelevant alerts, which obscure genuine security threats. To both reduce false positives in time series detection and accurately identify the source of anomalies, leveraging artificial intelligence techniques has emerged as a promising solution
-
Optimizing disaster response with UAV-mounted RIS and HAP-enabled edge computing in 6G networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-21
Jamal Alotaibi, Omar Sami Oubbati, Mohammed Atiquzzaman, Fares Alromithy, Mohammad Rashed AltimaniaIn the context of disaster response and recovery within 6th Generation (6G) networks, achieving both low-latency and energy-efficient communication under compromised infrastructure remains a critical challenge. This paper introduces a novel framework that integrates a solar-powered High-Altitude Platform (HAP) with multiple Unmanned Aerial Vehicles (UAVs) equipped with Reconfigurable Intelligent Surfaces
-
ARS: Adaptive routing strategies using AT-GCN for traffic optimization in data center networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-17
Yong Liu, Bin Xu, Tianyi Yu, Qian Meng, Ben Wang, Yimo ShenAs internet services and Internet of Things (IoT) devices rapidly expand, Data Center Networks (DCN) have become essential for supporting online services, cloud computing, and big data analysis. These devices generate massive amounts of data continuously, leading to uneven and sudden network loads that traditional networks struggle to handle. Existing routing strategies often rely on fine-grained routing
-
RCA-SI: A Rapid Consensus Algorithm for Swarm Intelligence in unstable network environments J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-17
Guangquan Zeng, Wan Hu, Yongchao Zhou, Desheng Zheng, Xiaoyu Li, Chuang ShiSwarm intelligence systems are a class of distributed systems in which device nodes utilize distributed algorithms to achieve data consensus and execute complex collective tasks. These systems operate in highly dynamic environments, where unstable network conditions, often induced by environmental complexities, can significantly affect the progress and efficiency of data consensus. To tackle this challenge
-
KLCMD: K_Length Clustering for Miner Detection on the blockchain social networks to increase the information propagation speed J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-15
Elham Abdollahi Abed, Shahriar Lotfi, Jaber KarimpourInformation propagation speed on blockchain social networks depends on activation of users on social network and blockchain network as well. Many researches have been done to increase information propagation speed on social networks. Most of these methods consist of finding influential nodes by different methods to propagate information by these nodes. Some researches have been done to increase information
-
FDGAT-WTA: A dynamic detection model for web tracking and advertising based on improved graph attention networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-14
Yali Yuan, Runke Li, Guang ChengWeb tracking and advertising (WTA) have become pervasive on the Internet, presenting significant challenges to user privacy and data security. Although current defense mechanisms, such as filter list based interceptors and machine learning methods, provide a solution, they do not perform well in complex network environments with missing features, and their large size makes both performance and overhead
-
Fuzzychain: An equitable consensus mechanism for blockchain networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-14
Bruno Ramos-Cruz, Javier Andreu-Perez, Francisco J. Quesada-Real, Luis MartínezBlockchain technology has become a trusted method for establishing secure and transparent transactions through a distributed, encrypted network. The operation of blockchain is governed by consensus algorithms, among which Proof of Stake (PoS) is popular yet has its drawbacks, notably the potential for centralising power in nodes with larger stakes or higher rewards. Our proposed novel solution, Fuzzychain
-
Distributed deep reinforcement learning for independent task offloading in Mobile Edge Computing J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-14
Mohsen Darchini-Tabrizi, Amirhossein Roudgar, Reza Entezari-Maleki, Leonel SousaMobile Edge Computing (MEC) has been identified as an innovative paradigm to improve the performance and efficiency of mobile applications by offloading computation-intensive tasks to nearby edge servers. However, the effective implementation of task offloading in MEC systems faces challenges due to uncertainty, heterogeneity, and dynamicity. Deep Reinforcement Learning (DRL) provides a powerful approach
-
Multi-objective transit algorithm based on density sorting and cylindrical grid mechanism for layout optimization of wireless sensor networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-13
Yu-Xuan Xing, Jie-Sheng Wang, Shi-Hui Zhang, Si-Wen Zhang, Yun-Hao Zhang, Xiao-Fei SuiWireless Sensor Networks (WSNs) are self-organizing distributed network systems composed of numerous sensor nodes. In order to optimize node deployment in WSNs to effectively control energy consumption, improve perception service quality and extend network lifetime, a multi-objective Transit Algorithm (TS) algorithm based on density sorting and cylindrical grid mechanism was proposed for WSN layout
-
Privacy-preserving and Verifiable Federated Learning with weighted average aggregation in edge computing J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-08
Shufen Niu, Weiying Kong, Lihua Chen, Xusheng Zhou, Ning WangIn Federated Learning (FL), clients collaborate with edge and cloud servers to train a global model without sharing raw data. However, cloud servers cannot be fully trusted due to the risk of malicious servers forging aggregation results to compromise model updates. Consequently, secure aggregation of local gradients and verification of the integrity of global parameters are crucial. While existing
-
Addressing security requirements in industrial IoT: A robust three-factor authentication scheme with enhanced features J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-06
Behnam Zahednejad, Chong-zhi GaoAuthentication and Key Agreement (AKA) is a critical component for ensuring access control for legitimate users in the Industrial Internet of Things (IIoT). Traditional three-factor AKA schemes rely on the user’s password, biometric data, and smart card to provide robust security. However, existing schemes often suffer from vulnerabilities, such as password guessing attacks, which can occur if either
-
Dynamic charging location determination for energy level equalization optimization in wireless rechargeable sensor networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-05-05
Haoran Wang, Jinglin Li, Peng-Yong Kong, Wendong XiaoIn wireless rechargeable sensor networks, broadcast charging provides a promising and efficient node energy replenishment approach that allows mobile chargers (MCs) to charge multiple nodes simultaneously. However, MCs usually charge nodes at a fixed location in existing work, which may result in large variability in residual energy levels after charging. Such non-equalization in node energy levels
-
HELP4DNS: Leveraging the programmable data plane for effective and robust defense against DDoS attacks on DNS J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-29
Mehmet Emin Şahin, Mehmet DemirciDNS is a critical component of the Internet infrastructure, and securing it has been an active research domain, with a particular emphasis on countering DDoS attacks. With the rise of programmable data planes, novel defensive strategies taking advantage of their flexibility and line-rate packet processing capabilities have been developed to counter a range of DDoS attacks. This study proposes two novel
-
An Internet of Things platform for heterogeneous data integration: Methodology and application examples J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-26
M. Muñoz, M. Torres, J.D. Gil, J.L. GuzmánThe Internet of Things (IoT) has revolutionized the industrial sector, yet digital transformation in this domain faces challenges due to the lack of standardized methodologies for IoT platform development. Many existing approaches struggle with issues such as data heterogeneity, lack of interoperability, and limited scalability when applied to large-scale industrial environments. In order to address
-
A DDoS attack detection method based on IQR and DFFCNN in SDN J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-25
Meng Yue, Huayang Yan, Ruize Han, Zhijun WuSoftware-Defined Networking (SDN) is an innovative network architecture that enhances network flexibility by decoupling the data plane from the control plane. However, SDN is also faces severe security threats. One of the most damaging threats is the Distributed Denial-of-Service (DDoS) attack, which can disrupt network functionality and adversely affect legitimate users. Current solutions against
-
Predictive safe delivery with machine learning and digital twins collaboration for decentralized crowdsourced systems J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-24
Feruz Elmay, Maha Kadadha, Rabeb Mizouni, Shakti Singh, Azzam Mourad, Hadi OtrokCrowdsourced last-mile delivery leverages workers willing to complete delivery tasks posted by requesters for incentives through dedicated platforms. While this is effective and affordable, crowdsourced delivery faces significant challenges, including the workforce’s uncertain availability and capability to deliver packages safely, inadequate package monitoring, and a lack of trust among the participants
-
A security authentication and key agreement scheme for railway space-ground integrated network based on ideal lattice J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-21
Yong Chen, Zhaofeng Xin, Bingwang Zhang, Junli JiaAt present, the Global System for Mobile Communications- Railway (GSM-R) is widely used in high-speed railway, but it is a 2G narrowband system that cannot meet the needs of intelligent development of high-speed railways. In the future, space-ground integrated railway communication network will gradually become an inevitable trend of railway development. Aiming at the problems of identity non-mutual
-
DRacv: Detecting and auto-repairing vulnerabilities in role-based access control in web application J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-20
Ke Xu, Bing Zhang, Jingyue Li, Haitao He, Rong Ren, Jiadong RenTraditional methods for analyzing Broken Access Control (BAC) vulnerabilities have limitations regarding low coverage of access control rules, high false positive rate (FPR). Additionally, state-of-the-art strategies for repairing BAC vulnerabilities utilizing statement-level replacement as a repair method may introduce new logical errors. To address these challenges, we propose a novel approach called
-
Variational Deep Clustering approaches for anomaly-based cyber-attack detection J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-19
Van Quan Nguyen, Viet Hung Nguyen, Long Thanh Ngo, Le Minh Nguyen, Nhien-An Le-KhacDetecting network anomalies is a critical cybersecurity task, yet existing methods struggle with high-dimensional data and limited interpretability in latent space. These challenges hinder precise differentiation between normal and anomalous activities due to (i) the chaotic distribution of normal samples, (ii) the absence of constraints to optimize the normal region’s hypervolume leading to high false
-
Task offloading strategy of vehicle edge computing based on reinforcement learning J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-17
Lingling Wang, Wenjie Zhou, Linbo ZhaiThe rapid development of edge computing has an impact on the Internet of Vehicles (IoV). However, the high-speed mobility of vehicles makes the task offloading delay unstable and unreliable. Hence, this paper studies the task offloading problem to provide stable computing, communication and storage services for user vehicles in vehicle networks. The offloading problem is formulated to minimize cost
-
Innovative detection of IoT cyber threats using a GBiTCN-Temformer and MKOA framework J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-11
Vipin Rai, Pradeep Kumar Mishra, Shivani Joshi, Rajiv Kumar, Avinash Dwivedi, AmritaIn the digital era, the Internet of Things (IoT) platform is progressively utilized in several applications due to its versatility, adaptability, and accessibility. Despite that, the lack of security protocols, improper device updates, and unauthorized access exposes the IoT environment to diverse cyber threats, which affect network security and user confidentiality. To enhance cybersecurity, various
-
An overview and solution for democratizing AI workflows at the network edge J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-11
Andrej Čop, Blaž Bertalanič, Carolina FortunaWith the process of democratization of the network edge, hardware and software for networks are becoming available to the public, overcoming the confines of traditional cloud providers and network operators. This trend, coupled with the increasing importance of AI in 6G and beyond cellular networks, presents opportunities for innovative AI applications and systems at the network edge. While AI models
-
Corrigendum to ‘Device-to-device communication in 5G heterogeneous network based on game-theoretic approaches: A comprehensive survey’ [J. Netw. Comput., Volume 238, June 2025, 104152] J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-10
Rana Zeeshan Ahmad, Muhammad Rizwan, Muhammad Jehanzaib Yousuf, Mohammad Bilal Khan, Ahmad Almadhor, Thippa Reddy Gadekallu, Sidra Abbas -
A dynamic spectrum access scheme for Internet of Things with improved federated learning J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-10
Feng Li, Junyi Yang, Kwok-Yan Lam, Bowen Shen, Hao LuoThe traditional spectrum management paradigm is no longer sufficient to meet the increasingly urgent demand for efficient utilization of spectrum resources by Internet of Things (IoT) devices. Dynamic spectrum access, as an emerging solution, allows devices to intelligently select appropriate spectrum resources based on real-time demands and environmental changes. In this paper, we propose a dynamic
-
A survey of secure semantic communications J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-06
Rui Meng, Song Gao, Dayu Fan, Haixiao Gao, Yining Wang, Xiaodong Xu, Bizhu Wang, Suyu Lv, Zhidi Zhang, Mengying Sun, Shujun Han, Chen Dong, Xiaofeng Tao, Ping ZhangSemantic communication (SemCom) is regarded as a promising and revolutionary technology in 6G, aiming to transcend the constraints of “Shannon’s trap” by filtering out redundant information and extracting the core of effective data. Compared to traditional communication paradigms, SemCom offers several notable advantages, such as reducing the burden on data transmission, enhancing network management
-
On the network coding-based D2D collaborative recovery scheme for scalable video broadcasting J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-05
Lei Wang, Jie Sun, Liang Chen, Jun YinThis paper examines the collaborative recovery issue for the scalable video broadcasting (SVB) system, where two proximate user nodes are able to maintain a local out-of-band device-to-device (D2D) pair to cooperatively recover their lost broadcasted packets. Traditional error protection methods, such as Forward Error Correction (FEC) and error concealment, often require the source node to dynamically
-
Enhancing DDoS defense in SDN using hierarchical machine learning models J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-04-03
Sukhveer Kaur, Krishan Kumar, Naveen AggarwalSoftware Defined Networking (SDN) enhances network management by decoupling the control plane from the data plane, centralizing control in a software-based controller. While this architecture simplifies network administration, it also introduces vulnerabilities, particularly to Distributed Denial of Service (DDoS) attacks that can overwhelm the central controller and disrupt network operations. Current
-
ParallelC-Store: A committee structure-based reliable parallel storage mechanism for permissioned blockchain sharding J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-30
Lin Qiu, Kaimin Zhang, Xingwei Wang, Bo Yi, Fei Gao, Yanpeng Qu, Min HuangThe storage performance of blockchain suffers from serious limitations due to its employed full-replication strategy, especially in large-scale network services such as Jointcloud computing and big data processing. To address this challenge, some storage partitioning mechanisms integrating Erasure Coding with Byzantine Fault Tolerant (BFT) consensus protocol are developed, like BFT-Store and PartitionChain
-
Fair association and rate maximization in 6G UAV Aided HS only network and HetNet J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-27
Umar GhafoorAdvancements in technology are driving the demand for high-speed, real-time interactive applications with requirements for faster data rates, reduced latency, and expanded network capacity to deliver immersive user experiences. Additionally, the increasing connectivity needs surpass the capabilities of fifth-generation (5G) networks. Sixth-generation (6G) networks are emerging to address these demands
-
Multi-agent reinforcement learning based dynamic self-coordinated topology optimization for wireless mesh networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-27
Qingwei Tang, Wei Sun, Zhi Liu, Qiyue Li, Xiaohui YuanWireless mesh network (WMN) technology enhances wireless communication coverage and increases end-to-end (E2E) delay. The delay in WMNs is influenced by various mesh topologies, which are shaped by transmission power factors. Due to the dynamic nature of WMNs, conventional offline topology optimization methods are ineffective. This paper presents a reinforcement learning (RL)-based dynamic collaborative
-
Self-adaptive cyber defense for sustainable IoT: A DRL-based IDS optimizing security and energy efficiency J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-25
Saeid Jamshidi, Ashkan Amirnia, Amin Nikanjam, Kawser Wazed Nafi, Foutse Khomh, Samira KeivanpourThe Internet of Things (IoT) has revolutionized industries by creating a vast, interconnected ecosystem. Still, the rapid deployment of IoT devices has introduced severe security risks, including DDoS, DoS GoldenEye, DoS Hulk attacks, and Port scanning. Traditional Machine Learning (ML)-based Intrusion Detection Systems (IDS) often operate passively, detecting threats without taking action, and are
-
SPARTA-GEMSTONE: A two-phase approach for efficient node placement in 3D WSNs under [formula omitted]-Coverage and [formula omitted]-Connectivity constraints J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-25
Quang Truong Vu, The Minh Trinh, Thi Hanh Nguyen, Van Chien Trinh, Thi Thanh Binh Huynh, Xuan Thang Nguyen, Cong Phap HuynhWireless sensor networks (WSNs) face challenges in achieving robust target coverage and connectivity, particularly when varying priorities for targets are modeled with Q-Coverage and Q-Connectivity constraints. However, existing studies often neglect minimizing the number of nodes under these constraints in 3D environments or focus on sensor-to-sensor connections, which are less suitable for target-oriented
-
ASL: An Accurate and Stable Localization algorithm for multi-hop irregular networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-24
Xingsheng Xia, Jiajia Yan, Chenhuang Wu, Chao Meng, Xiaoyong YanAccurate geographical information about nodes is essential in wireless multi-hop networks. Most existing localization algorithms focus on locating nodes in regular network environments, posing challenges for irregular multi-hop networks. To mitigate the impact of irregularities on localization, we propose an Accurate and Stable Localization algorithm (ASL). ASL first infers a hop threshold based on
-
Secure data migration from fair contract signing and efficient data integrity auditing in cloud storage J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-24
Changsong Yang, Yueling Liu, Yong Ding, Hai LiangWith the rapid development of cloud storage, a growing number of data owners prefer to outsource their large-scale data to the remote cloud data centers, thus effectively avoiding the heavy burden of storing the massive data by themselves in local. Due to the promising market prospect, plenty of companies invest cloud storage and offer data storage services, which equipped with different access speed
-
Kinitos: Dynamic network-aware scheduling and descheduling in Kubernetes clusters with mobile nodes J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-20
Tsvetan Tsokov, Hristo KostadinovThe current Cloud/Edge/Fog platforms, available in practice, do not support dynamic management of computational and network resources in clusters with moveable and constraint nodes, like in applications such as: connected vehicles, Internet of Things (IoT), spacecraft computing, etc. This leads to increased total response time and low QoS for the long-living applications composed of many inter-dependent
-
Comprehensive phishing detection: A multi-channel approach with variants TCN fusion leveraging URL and HTML features J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-17
Ali Aljofey, Saifullahi Aminu Bello, Jian Lu, Chen XuPhishing represents a major threat to the financial and privacy security of Internet users, and often serves as a precursor to cyberattacks. While many deep learning-based methods focus on analyzing URLs to detect phishing due to their simplicity and efficiency, they face challenges. Hidden phishing websites may employ tactics like concealing URL addresses, deceiving deep learning models, and attackers
-
A MLOps architecture for near real-time distributed Stream Learning operation deployment J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-17
Miguel G. Rodrigues, Eduardo K. Viegas, Altair O. Santin, Fabricio EnembreckTraditional architectures for implementing Machine Learning Operations (MLOps) usually struggle to cope with the demands of Stream Learning (SL) environments, where deployed models must be incrementally updated at scale and in near real-time to handle a constantly evolving data stream. This paper proposes a new distributed architecture adapted for deploying and updating SL models under the MLOps framework
-
CBRFL: A framework for Committee-based Byzantine-Resilient Federated Learning J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-15
Gang Xu, Lele Lei, Yanhui Mao, Zongpeng Li, Xiu-Bo Chen, Kejia ZhangFederated Learning (FL), a decentralized machine learning paradigm, has gained attention for enabling collaborative model training without sharing raw data. However, traditional FL architectures rely on a central server, creating trust issues, single points of failure, and vulnerabilities to Byzantine attacks due to the lack of effective gradient validation. In this paper, we introduce the Committee-Based
-
Tensor-based ranking-hiding privacy-preserving scheme for cloud-fog-edge cooperative cyber–physical-social systems J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-13
Jing Yu, Yan Xiao, Lianhua Chi, Shunli Zhang, Zongmin CuiUsers living in Cyber-Physical-Social Systems (CPSS) generate massive amounts of data every day. The CPSS data may imply some reliable rules that can help CPSS better provide highly reliable services to humans. Nevertheless, the high-level reliable rules are very difficult to be mined and formalized. Therefore, we propose a Cloud-Fog-Edge Cooperative Reliable CPSS (CFECRC) framework for possibly adding
-
Hierarchical multi-scale spatio-temporal semantic graph convolutional network for traffic flow forecasting J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-13
Hongfan Mu, Noura Aljeri, Azzedine BoukercheAccurate traffic flow forecasting is essential for various traffic applications, such as real-time traffic signal control, demand prediction, and route guidance. However, the increasing complexity and non-linearity of big data in the traffic domain pose a challenge for accurate forecasting, necessitating powerful models. This paper proposes a Spatio-temporal model for traffic flow prediction based
-
A comprehensive survey on channel hopping and scheduling enhancements for TSCH networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-08
Martina Balbi, Lance Doherty, Thomas WatteyneTime-Synchronized Channel Hopping (TSCH) is playing an essential role in enabling reliable and energy-efficient communication in low-power wireless applications, thanks to its scheduling and adaptive channel hopping capabilities. Advancements in these areas are vital for further improving TSCH networks performance. Enhanced scheduling algorithms can reduce energy consumption and increase network capacity
-
ZBR: Zone-based routing in quantum networks with efficient entanglement distribution J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-08
Pankaj Kumar, Binayak KarThe quantum network aims to establish connections among multiple quantum nodes, supporting various innovative applications. Many of these applications necessitate the sharing of entangled pairs among communicating parties. However, the inherent nature of entanglement leads to an exponential decrease as the distance between quantum nodes increases. This phenomenon makes it challenging for entangled
-
Heuristic and approximate Steiner tree algorithms for ensuring network connectivity in mobile wireless sensor networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-06
Nguyen Van Son, Nguyen Thi Hanh, Trinh The Minh, Huynh Thi Thanh Binh, Nguyen Xuan ThangConnectivity problems are among the most challenging issues in Mobile Wireless Sensor Networks (MWSNs). Ensuring connectivity in such networks means finding network configurations in which all mobile sensors can connect to a base station during data gathering events. This paper considers MWSNs in which a minimal number of relay nodes need to be placed in order to maintain connectivity. Two algorithms
-
Device-to-device communication in 5G heterogeneous network based on game-theoretic approaches: A comprehensive survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-03
Rana Zeeshan Ahmad, Muhammad Rizwan, Muhammad Jehanzaib Yousuf, Mohammad Bilal Khan, Ahmad Almadhor, Thippa Reddy Gadekallu, Sidra AbbasIn the evolution of Fifth-Generation (5G) oriented wireless communication technology, the conventional wireless communication performance indicators, including network capacity, spectrum efficiency, and Quality of Services (QoS), need to be continuously improved to optimize the utilization of the wireless spectrum. As a key candidate technology for 5G, Device-to-Device (D2D) communication improves
-
Digital twins-enabled game theoretical models and techniques for metaverse Connected and Autonomous Vehicles: A survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-03-01
Anjum Mohd Aslam, Rajat Chaudhary, Aditya Bhardwaj, Neeraj Kumar, Rajkumar BuyyaThe popularity of information and communication technology in automobiles has led to the next generation of smart vehicles known as Connected and Autonomous Vehicles (CAVs). The advent of the CAVs has rapidly emerged as an essential component of Intelligent Transportation Systems (ITS) due to the usage of advanced technologies for autonomous navigation, sensing, and improved vehicle safety. Moreover
-
An optimal three-tier prioritization-based multiflow scheduling in cloud-assisted smart healthcare J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-25
Sarthak, Anshul Verma, Pradeepika VermaInternet of Things is significantly advancing the development of modern interconnected networks. Coordinated with cloud computing, this technology becomes even more powerful, cost-effective, and reliable. These advancements are rapidly being integrated into modern healthcare through innovations such as smart ambulances, remote monitoring systems, and smart hospitals, enhancing tracking, analysis, and
-
-
DAPNEML: Disease-diet associations prediction in a NEtwork using a machine learning based approach J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-19
Rashmeet Toor, Inderveer ChanaGeneric notions about associations between certain diseases and diets are quite popular, but there are many evidences of other unknown disease-diet associations in literature that need to be fully explored. Such associations are currently being studied by medical researchers through meta-analysis or other prospective studies limiting it to a certain population or area. This study aims to use a combined
-
An expert system for privacy-preserving vessel detection leveraging optimized Extended-YOLOv7 and SHA-256 J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-18
Rupa Ch., Akhil Babu N., N.V. Rishika G., M. Navena, Gautam Srivastava, Thippa Reddy GadekalluMaritime data security plays a crucial role in in Navy and Coastal Areas, where the detection of vessels is sensitive as well as boundless and demands privacy preservation and accurate identification. While manual identification of vessels can be challenging, advancements in Cryptographic hash functions, Deep Learning technology, and image processing have simplified the task. However, existing techniques
-
Energy-efficient hierarchical dynamic depth adjustment routing protocol for UWSN with distributed sink mobility and semantic self-healing J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-18
T.R. Chenthil, G.C. Jagan, S. Ranjith, G. BalachandranUnderwater Wireless Sensor Networks (UWSNs) play a pivotal role in marine exploration and monitoring, yet face significant challenges in maintaining energy efficiency and dynamic adaptability. This paper introduces the Energy-efficient Hierarchical Dynamic Depth Adjustment Routing Protocol (EHDDAHRP) for UWSNs. EHDDAHRP integrates innovative features, including Distributed Sink Mobility and Semantic
-
A Comprehensive Survey of Smart Contracts Vulnerability Detection Tools: Techniques and Methodologies J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-18
Niosha Hejazi, Arash Habibi LashkariThe widespread use of blockchain technology has highlighted smart contracts as crucial components in digital transactions. However, their susceptibility to vulnerabilities poses significant challenges to security and dependability. This survey presents a comprehensive evaluation of 256 smart contracts analysis tools, categorized by methodologies such as fuzzing, machine learning, symbolic execution
-
MuLPP: A multi-level privacy preserving for blockchain-based bilateral P2P energy trading J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-17
Juhar Abdella, Zahir Tari, Redowan MahmudChallenges pertaining to user anonymity and data privacy are among the major concerns in blockchain-based bilateral Peer-to-Peer Energy Trading (P2P-ET). However, existing solutions focus only on user anonymity and are severely exposed to fake energy offers that can lead to denial-of-service attacks. Moreover, the off-chain communication mechanism used for private energy negotiation is computationally
-
PRISM: PSI and Voronoi diagram based Automated Exposure Notification with location privacy J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-13
Jiezhen Tang, Hui Zhu, Liqun Chen, Fengwei Wang, Hui LiAutomated Exposure Notification techniques have been developed as pervasive risk assessment tools in public crisis management, particularly for the containment of infectious diseases. However, the widely adopted Bluetooth Low Energy or location-based AEN techniques face challenges in simultaneously providing fined-grained, real-time, and location privacy-preserving detection and notification. Therefore
-
BAS-NDN: BlockChain based mobile producer authentication scheme for Named Data Networking J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-11
Guangquan Xu, Chenghe Dong, Cong Wang, Feng FengNamed Data Network (NDN) is a content-centric, name-based communication architecture, with a push-based communication model naturally supports consumer mobility. However, the management of producer prefix authentication during mobility is challenging due to NDN’s name-based mechanism, which facilitates direct interaction between producers and the forwarding plane. The current solutions fail to balance
-
Efficient fault tolerance and diagnosis mechanism for Network-on-Chips J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-11
Mengjie Lv, Hui Dong, Weibei FanThe Network-on-Chip (NoC) integrates all components within a System-on-Chip (SoC), positioning itself as the SoC’s most critical element. The interconnection network, which forms the foundational topology of the NoC, significantly impacts its performance. As network scale and complexity increase, the inevitability of faults emerges, underscoring the crucial need for robust fault tolerance. In this
-
Optimizing cloud resource management with an IoT-enabled optimized virtual machine migration scheme for improved efficiency J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-10
Chunjing Liu, Lixiang Ma, Minfeng Zhang, Haiyan LongCloud computing manages many resources and alterations to meet the demands made by consumers at multiple locations and in numerous applications. Cloud computing presents a significant obstacle to efficient resource usage and balance of loads due to the dynamic nature of consumer requirements and tasks. The inflexibility of conventional methods guarantees inadequate outcomes and waste of resources.
-
TPMCD: A method to optimizing cost and throughput for clustering tasks and hybrid containers in the cloud data center J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-08
Arash GhorbanniaDelavarThe regulatory of task classification or clustering and hybrid containers in cloud data centers has a lower overhead of cost compared to virtual machines, also it has a direct impact on the load balance, accessibility of virtual machines, and increase of efficiency. Therefore, additional resources with high computing power usage are one of the important issues. In the proposed method merging the index
-
Security and privacy of industrial big data: Motivation, opportunities, and challenges J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-07
Naveed Anjum, Zohaib Latif, Hongsong ChenWith the rapid growth of the Industrial Internet of Things (IIoT), an abundance of data is generated, and various data acquisition, analytics, and storage mechanisms are developed intelligently for smart industrial productions. Big heterogeneous data of IIoT suffers from security and privacy issues, which are the main hurdles for smooth industrial operations and pose a serious concern to the widespread
-
Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2025-02-07
Arash Mahboubi, Khanh Luong, Geoff Jarrad, Seyit Camtepe, Michael Bewong, Mohammed Bahutair, Ganna PogrebnaThe escalating prevalence of Advanced Persistent Threats (APTs) necessitates the development of more robust solutions capable of effectively thwarting these attacks by monitoring system activities across individual hosts. Existing cloud-native security applications utilize a combination of rule-based and machine learning-based detection techniques to protect digital assets. However, these approaches