You are currently on the new version of our website. Access the old version .

Network, Volume 5, Issue 1

March 2025 - 8 articles

Cover Story: Machine learning (ML) is widely applied across cyber-physical systems, decision sciences, and data products, influencing areas such as smart grids, autonomous vehicles, medical treatment, and network security. Its manifestations have evolved from statistical models to deep learning and large language models, with tree-based models remaining popular for their versatility and interpretability. Ensuring the trustworthiness of ML is critical, requiring explainability, fairness, and robustness to adversarial attacks. ML models face threats such as data poisoning and evasion attacks, prompting research into strengthening their resilience. The proposed adversarial training approach leverages genetic algorithms (GAs) to optimize accuracy and robustness, demonstrating effectiveness in mitigating attacks and enhancing model reliability. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (8)

  • Article
  • Open Access
1 Citations
2,120 Views
36 Pages

11 March 2025

The security of a network is based on the foundation of confidentiality, integrity, and availability, often referred to as the CIA triad. The privacy of data over a network, maintained by confidentiality, has long been one of the major issues in netw...

  • Article
  • Open Access
3,444 Views
20 Pages

Network Tower Sharing Analysis in Greece: A Structure–Conduct–Performance Approach

  • Vasileios Argyroulis,
  • Antonios Kargas and
  • Dimitris Varoutas

20 February 2025

The paper intends to contribute to readers’ comprehension of the Greek telecommunications market, focusing on the strategic decisions associated with network tower-sharing analysis in Greece. The Greek telecommunications industry is described f...

  • Article
  • Open Access
5 Citations
1,914 Views
24 Pages

Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol

  • Mohammad Emran Hashimyar,
  • Mahdi Aiash,
  • Ali Khoshkholghi and
  • Giacomo Nalli

17 February 2025

The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, includi...

  • Article
  • Open Access
4 Citations
3,201 Views
25 Pages

17 February 2025

Machine learning (ML) promises advances in automation and threat detection for the future generations of communication networks. However, new threats are introduced, as adversaries target ML systems with malicious data. Adversarial attacks on tree-ba...

  • Article
  • Open Access
2 Citations
2,274 Views
21 Pages

14 February 2025

The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and...

  • Article
  • Open Access
1,718 Views
22 Pages

29 January 2025

Sequential decision-making in dynamic and interconnected environments is a cornerstone of numerous applications, ranging from communication networks and finance to distributed blockchain systems and IoT frameworks. The multi-armed bandit (MAB) proble...

  • Article
  • Open Access
5 Citations
2,992 Views
24 Pages

10 January 2025

In a global context where reducing the carbon footprint has become an urgent necessity, this article presents a hybrid CNN-LSTM prediction model to estimate CO2 emission rates of Paris road traffic using spatio-temporal data. Our hybrid prediction mo...

  • Review
  • Open Access
27 Citations
14,876 Views
45 Pages

6 January 2025

Artificial intelligence (AI) transforms communication networks by enabling more efficient data management, enhanced security, and optimized performance across diverse environments, from dense urban 5G/6G networks to expansive IoT and cloud-based syst...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Network - ISSN 2673-8732