You are currently viewing a new version of our website. To view the old version click .

Network, Volume 2, Issue 4

December 2022 - 10 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story: The rapid growth in the IoT network is associated with significant security threats. Network scanning can be used to identify these threats and provide countermeasures in IoT devices. It is necessary to know the status of the communication environment and the reason why network scanning failed. This paper aims to estimate the cause of a failure/delay in network scanning over wireless networks in IoT devices connected to IP networks where a scan packet or its response may sometimes be dropped or delayed. The correct estimation of the cause of a failure/delay in the network scan is achievable using a multimodel-based cause estimator. View this paper

Articles (10)

  • Tutorial
  • Open Access
3 Citations
3,539 Views
37 Pages

Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial

  • Radheshyam Singh,
  • José Soler,
  • Tidiane Sylla,
  • Leo Mendiboure and
  • Marion Berbineau

1 December 2022

This paper provides a detailed tutorial to develop a sandbox to emulate coexistence scenarios for road and railway services in terms of sharing telecommunication infrastructure using software-defined network (SDN) capabilities. This paper provides de...

  • Feature Paper
  • Article
  • Open Access
6 Citations
4,564 Views
27 Pages

18 November 2022

Predicting workload demands can help to achieve elastic scaling by optimizing data center configuration, such that increasing/decreasing data center resources provides an accurate and efficient configuration. Predicting workload and optimizing data c...

  • Article
  • Open Access
7 Citations
4,806 Views
15 Pages

4 November 2022

Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their u...

  • Feature Paper
  • Article
  • Open Access
4 Citations
3,363 Views
22 Pages

2 November 2022

Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and rans...

  • Article
  • Open Access
11 Citations
10,886 Views
23 Pages

An Efficient Information Retrieval System Using Evolutionary Algorithms

  • Doaa N. Mhawi,
  • Haider W. Oleiwi,
  • Nagham H. Saeed and
  • Heba L. Al-Taie

28 October 2022

When it comes to web search, information retrieval (IR) represents a critical technique as web pages have been increasingly growing. However, web users face major problems; unrelated user query retrieved documents (i.e., low precision), a lack of rel...

  • Feature Paper
  • Article
  • Open Access
2,034 Views
15 Pages

An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications

  • Maria Papathanasaki,
  • Panagiotis Fountas and
  • Kostas Kolomvatsos

25 October 2022

The ever-increasing demand for services of end-users in the Internet of Things (IoT) often causes great congestion in the nodes dedicated to serving their requests. Such nodes are usually placed at the edge of the network, becoming the intermediates...

  • Article
  • Open Access
3 Citations
2,992 Views
23 Pages

18 October 2022

Voice over IP is quickly becoming the industry standard voice communication service. While using an IP-based method of communication has many advantages, it also comes with a new set of challenges; voice networks are now accessible to a multitude of...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,801 Views
26 Pages

A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network

  • Babatunde Ojetunde,
  • Naoto Egashira,
  • Kenta Suzuki,
  • Takuya Kurihara,
  • Kazuto Yano and
  • Yoshinori Suzuki

12 October 2022

The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the b...

  • Article
  • Open Access
2 Citations
2,864 Views
19 Pages

8 October 2022

Quality of experience (QoE) metrics can be used to assess user perception and satisfaction in data services applications delivered over the Internet. End-to-end metrics are formed because QoE is dependent on both the users’ perception and the s...

  • Feature Paper
  • Article
  • Open Access
15 Citations
3,554 Views
21 Pages

26 September 2022

In the event of a major disaster, base stations in the disaster area will cease to function, making it impossible to obtain life-saving information. Therefore, it is necessary to provide a wireless communication infrastructure as soon as possible. To...