首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges 分数型不可兑换代币:概述、评估、市场和挑战
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-11 DOI: 10.1002/nem.2260
Wonseok Choi, Jongsoo Woo, James Won-Ki Hong

Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.

分式不可兑换代币(NFTs)已成为区块链创新的前沿,它将代币化、NFTs 和分式所有权融合在一起,实现了高价值数字资产获取的民主化。在本文中,我们将探讨区块链技术、智能合约、NFT 和代币化的基本概念,为理解部分 NFT 奠定基础。我们研究了主要的ERC标准,包括ERC-20、ERC-721和ERC-1155,这些标准在以太坊区块链上创建和管理分数NFT方面起着关键作用。然后,我们介绍了分数 NFT 的两个主要过程:铸币和重组。我们根据 ERC 标准开发了分数 NFT,并对其耗气量进行了评估。此外,通过对现有平台的全面审查,我们分析了它们的铸币和重组流程以及底层 ERC 标准。我们还研究了监管合规性和安全性等挑战。我们强调了稳健的安全措施和透明度对于在分数 NFT 生态系统中建立信任的重要意义。虽然该领域仍在不断发展,但部分式 NFT 有可能颠覆传统的所有权模式,为各行各业带来变革。我们设想,随着技术的进步和应用的增加,部分式 NFT 将促进更具包容性和去中心化的数字经济。
{"title":"Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges","authors":"Wonseok Choi,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2260","DOIUrl":"10.1002/nem.2260","url":null,"abstract":"<p>Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel eviction policy based on shortest remaining time for software defined networking flow tables 基于软件定义网络流表最短剩余时间的新型驱逐策略
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-21 DOI: 10.1002/nem.2257
Kavi Priya Dhandapani, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen

Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.

软件定义网络是一种现代范式,它将控制平面与数据平面分开,以提高网络的可管理性。数据平面中的流量表内存有限且昂贵,称为 TCAM。不需要的流量规则的存在会导致流量膨胀,使查找操作效率低下。基于 LRU 策略的驱逐方案已在文献中得到广泛研究,该方案会抢占最近使用最少的流规则的生命周期,减少流表的占用率。LRU 在驱逐流量规则时考虑了过去的行为。本文提出了一种新策略,即通过考虑流量规则的未来特性--最短剩余时间(SRT)--来抢占流量规则。避免驱逐使用概率较高的规则,以减轻性能下降。SRT 技术的建模表明,被使用概率较高的流量规则能得到更好的利用。另一方面,LRU 并不能保证被驱逐的流量规则在未来不会被频繁使用,而且事实证明,错误驱逐的流量规则会造成控制器延迟。实验结果表明,对于不同的流量,SRT 将延迟减少了 15%,重新安装次数减少了 25%,抖动减少了 40%。与 LRU 相比,SRT 提高了 22% 的利用率。
{"title":"A novel eviction policy based on shortest remaining time for software defined networking flow tables","authors":"Kavi Priya Dhandapani,&nbsp;Mirnalinee Thanganadar Thangathai,&nbsp;Shahul Hamead Haja Moinudeen","doi":"10.1002/nem.2257","DOIUrl":"10.1002/nem.2257","url":null,"abstract":"<div>\u0000 \u0000 <p>Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138825536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and crypto forensics: Investigating crypto frauds 区块链和加密货币取证:调查加密货币欺诈
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-07 DOI: 10.1002/nem.2255
Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Mano Yadav

In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.

在过去几年中,加密货币因其去中心化的特性、快速安全的交易以及投资和投机的潜力而获得了广泛的认可。但是,加密货币的普及也导致了加密货币欺诈的增加,包括诈骗、网络钓鱼攻击、庞氏骗局和其他犯罪活动。虽然有关加密货币欺诈的文献很少,但深入研究对于识别不同加密货币的各种欺诈行为至关重要。为了填补这一空白,一项研究调查了各种加密货币中与加密货币相关的欺诈行为,并提供了加密取证和区块链取证的分类标准。此外,我们还介绍了一种集成人工智能(AI)和区块链技术的架构,用于调查和防范加密货币欺诈事件。我们使用几种机器学习(ML)分类算法对建议设计的有效性进行了评估。评估结论证实,随机森林(RF)分类器表现最佳,准确率最高,达到 97.5%。一旦 ML 分类器检测到加密货币欺诈,信息就会被安全地存储在跨行星文件系统(IPFS)中;文件的哈希值也会通过智能合约存储在区块链中。执法部门可以利用区块链技术确保对欺诈性加密交易的访问。对拟议的架构进行了带宽利用率测试。尽管区块链和加密取证具有潜在优势,但仍存在一些问题和挑战,包括隐私问题、标准化以及难以识别加密货币之间的欺诈行为。最后,本文讨论了区块链和加密取证在调查加密货币欺诈方面存在的各种问题和挑战。
{"title":"Blockchain and crypto forensics: Investigating crypto frauds","authors":"Udit Agarwal,&nbsp;Vinay Rishiwal,&nbsp;Sudeep Tanwar,&nbsp;Mano Yadav","doi":"10.1002/nem.2255","DOIUrl":"10.1002/nem.2255","url":null,"abstract":"<p>In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network 基于残差的时空注意力卷积神经网络用于检测软件定义网络集成车载 adhoc 网络中的分布式拒绝服务攻击
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-06 DOI: 10.1002/nem.2256
V. Karthik, R. Lakshmi, Salini Abraham, M. Ramkumar

Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.

集成了软件定义网络(SDN)的车载临时网络(VANET)是智能交通的一项重要技术,因为它提高了交通的效率、安全性、可管理性和舒适性。集成了 SDN 的 VANET(SDN-int-VANET)好处多多,但也容易受到分布式拒绝服务(DDoS)等威胁。针对 DDoS 攻击检测(AD)提出了几种方法,但现有的优化方法为增强参数提供了基础。参数选择不正确会导致性能不佳和与数据拟合不良。为了克服这些问题,本稿件介绍了用于检测 SDN-int-VANET 中 DDoS 攻击的基于残差的时空注意力红狐卷积神经网络(RTARF-CNN)。输入数据来自 SDN DDoS 攻击数据集。为恢复冗余和缺失值,应用了开发的随机森林和局部最小二乘法(DRFLLS)。然后,在堆叠收缩自动编码器(St-CAE)的帮助下,从预处理数据中选取重要特征,从而缩短了引入方法的处理时间。所选特征由基于残差的时空注意力卷积神经网络(RTA-CNN)进行分类。RTA-CNN 的权重参数在红狐优化 (RFO) 的帮助下进行了优化,以获得更好的分类效果。引入的方法在PYTHON平台上实现。RTARF-CNN 的准确率达到 99.8%,灵敏度达到 99.5%,精确度达到 99.80%,特异性达到 99.8%。将引入技术的有效性与现有方法进行了比较。
{"title":"Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network","authors":"V. Karthik,&nbsp;R. Lakshmi,&nbsp;Salini Abraham,&nbsp;M. Ramkumar","doi":"10.1002/nem.2256","DOIUrl":"10.1002/nem.2256","url":null,"abstract":"<p>Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review of blockchain integration in remote patient monitoring for E-health 区块链集成在电子卫生远程患者监测中的全面审查
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-14 DOI: 10.1002/nem.2254
Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane

The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the game-changing power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.

物联网(IoT)与区块链技术的集成使电子医疗、供应链、金融服务、智能电网和自动化合同等领域实现了重大的数字化转型。许多电子卫生组织利用区块链和物联网改变游戏规则的力量来改善患者的治疗效果并优化内部运营活动。特别是,它提出了一种在点对点网络中建模和承认信任和数据有效性的分散和进化方法。区块链承诺提供透明和安全的系统,以提供新的业务解决方案,特别是与智能合约结合使用时。在本文中,我们对涉及区块链技术应用于电子健康的文献进行了全面的调查。首先,我们简要介绍区块链的背景及其基本原理。其次,我们回顾了电子医疗背景下区块链的机遇和挑战。然后,我们将结合电子健康讨论区块链中流行的共识算法和智能合约。最后,从远程患者监测的角度,评估了区块链平台在基于物联网的电子健康领域的适用性,包括电子健康记录、电子管理记录和个人健康记录。
{"title":"A comprehensive review of blockchain integration in remote patient monitoring for E-health","authors":"Nedia Badri,&nbsp;Leïla Nasraoui,&nbsp;Leïla Azouz Saïdane","doi":"10.1002/nem.2254","DOIUrl":"10.1002/nem.2254","url":null,"abstract":"<p>The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the <i>game-changing</i> power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology analysis of the Ripple transaction network 瑞波交易网络拓扑分析
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-06 DOI: 10.1002/nem.2253
Anan Jin, Yuhang Ye, Brian Lee, Yuansong Qiao

The Ripple network is one typical blockchain-based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing. This paper presents a comprehensive analysis to the Ripple transaction network, including two subnets formed by the two key functionalities, that is, Ripple Direct Payment Network (RDPN) and Ripple Credit Payment Network (RCPN). The analysis is performed with different network metrics, including clustering coefficient, centrality, and so on. Furthermore, this paper provides an in-depth analysis on the node degrees and edge weights, which reflect the number of transacted accounts of an account and the number of transactions between two accounts. The results show that the network is highly imbalanced and concentrated with a few nodes and edges holding most of the resources. Moreover, RDPN and RCPN show different characteristics in terms of transmitted and received transactions, the senders are more concentrated in RDPN, whereas in RCPN, the receivers are more concentrated.

Ripple 网络是一个典型的基于区块链的去中心化信用网络,它只在参与者之间转移信用,无需实物货币流动即可支持资金转移。在优化网络设计和交易路由的同时,深入了解支付网络的特性至关重要。本文全面分析了瑞波交易网络,包括由两个关键功能形成的两个子网,即瑞波直接支付网络(RDPN)和瑞波信用支付网络(RCPN)。分析采用了不同的网络指标,包括聚类系数、中心度等。此外,本文还深入分析了节点度和边权重,它们反映了一个账户的交易账户数和两个账户之间的交易数量。结果表明,网络高度不平衡且集中,少数节点和边掌握了大部分资源。此外,RDPN 和 RCPN 在发送和接收交易方面表现出不同的特点,在 RDPN 中,发送方更为集中,而在 RCPN 中,接收方更为集中。
{"title":"Topology analysis of the Ripple transaction network","authors":"Anan Jin,&nbsp;Yuhang Ye,&nbsp;Brian Lee,&nbsp;Yuansong Qiao","doi":"10.1002/nem.2253","DOIUrl":"10.1002/nem.2253","url":null,"abstract":"<p>The Ripple network is one typical blockchain-based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing. This paper presents a comprehensive analysis to the Ripple transaction network, including two subnets formed by the two key functionalities, that is, Ripple Direct Payment Network (RDPN) and Ripple Credit Payment Network (RCPN). The analysis is performed with different network metrics, including clustering coefficient, centrality, and so on. Furthermore, this paper provides an in-depth analysis on the node degrees and edge weights, which reflect the number of transacted accounts of an account and the number of transactions between two accounts. The results show that the network is highly imbalanced and concentrated with a few nodes and edges holding most of the resources. Moreover, RDPN and RCPN show different characteristics in terms of transmitted and received transactions, the senders are more concentrated in RDPN, whereas in RCPN, the receivers are more concentrated.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files 评估词袋嵌入法和词到向量嵌入法及降维对日志文件异常检测的影响
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-10-27 DOI: 10.1002/nem.2251
Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood

In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.

在网络安全方面,日志文件是有关计算机服务/系统状态的丰富信息来源。日志文件内容总结过程的自动化是决策的重要辅助工具,特别是考虑到网络/服务运行的全天候性质。我们对八个不同的日志文件进行了基准测试,以评估以下因素的影响:(1) 采用不同的嵌入方法对原始日志文件进行语义描述;(2) 对高维语义空间进行降维;(3) 评估使用不同的无监督学习算法对提供服务状态可视化摘要的影响。基准测试表明:(1) 通过变换器双向编码器表示法(BERT)确定的词到向量嵌入不需要 "微调",就足以与通过词频-反向文档频率(TF-IDF)提供的袋或词嵌入的性能相媲美;(2) 不进行维度缩减的自组织图提供了最有效的异常检测器。
{"title":"Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files","authors":"Ziyu Qiu,&nbsp;Zhilei Zhou,&nbsp;Bradley Niblett,&nbsp;Andrew Johnston,&nbsp;Jeffrey Schwartzentruber,&nbsp;Nur Zincir-Heywood,&nbsp;Malcolm I. Heywood","doi":"10.1002/nem.2251","DOIUrl":"10.1002/nem.2251","url":null,"abstract":"<p>In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2251","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136261798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability-aware virtual network function placement based on multidimensional universal generating functions 基于多维通用生成函数的可用性感知虚拟网络功能布局
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-10-24 DOI: 10.1002/nem.2252
Kengo Arakawa, Eiji Oki

Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.

网络功能虚拟化(NFV)以软件形式实现网络功能,从而能够灵活、高效地提供网络服务。在 NFV 中,网络服务由服务功能链(SFC)实现,SFC 是按适当顺序连接的虚拟网络功能(VNF)链。对于以 SFC 形式提供网络服务的网络运营商来说,可用性和部署成本都是关键问题。本文提出了一种基于每个 VNF 实例的灵活 VNF 放置模型,它能最大限度地降低部署成本,同时满足可能对 SFC 提出的可用性要求。本文使用多维通用生成函数(MUGF)方法(一种多态系统分析方法)来计算服务器上共存多个 VNF 的多态 SFC 系统的可用性。MUGF 方法通过结合应用连续时间马尔可夫链确定的服务器性能来计算整个 SFC 的性能。为了缩短计算 SFC 可用性的时间,我们引入了应用于 MUGF 的算子,并开发了一种可用性计算方法。此外,我们还提出了一种启发式算法,用于在满足可用性要求的同时,以尽可能低的部署成本确定 VNF 的位置。数值结果表明,在所有考察案例中,拟议模型都能以低于传统模型的成本获得 VNF 部署。在 SFC 可用性要求相同的情况下,拟议模型的 VNF 部署成本仅为传统模型的 58.5%-75.0%。
{"title":"Availability-aware virtual network function placement based on multidimensional universal generating functions","authors":"Kengo Arakawa,&nbsp;Eiji Oki","doi":"10.1002/nem.2252","DOIUrl":"10.1002/nem.2252","url":null,"abstract":"<p>Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimal hybrid cascade regional convolutional network for cyberattack detection 一种用于网络攻击检测的最优混合级联区域卷积网络
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-04 DOI: 10.1002/nem.2247
Ali Alqahtani, Surbhi Bhatia Khan

Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information and communication technologies (ICTs) are integrated with urban systems. However, the large number of sensors in a smart city generates a significant amount of delicate data, like medical records, credit card numerics, and location coordinates, which are transported across a network to data centers for analysis and processing. This makes smart cities vulnerable to cyberattacks because of the resource constraints of their technology infrastructure. Applications for smart cities pose many security challenges, such as zero-day attacks resulting from exploiting weaknesses in various protocols. Therefore, this paper proposes an optimal hybrid transit search-cascade regional convolutional neural network (hybrid TS-Cascade R-CNN) to detect cyberattacks. The proposed model combines the hybrid transit-search approach with the cascade regional convolutional neural network to create an optimal solution for cyberattack detection. The cascade regional convolutional network uses a hybrid transit search algorithm to enhance the effectiveness of cyberattack detection. By integrating these two approaches, the system can leverage both global traffic patterns and local indicators to improve the accuracy of attack detection. During the training process, the proposed model recognizes and classifies malicious input even in the presence of sophisticated attacks. Finally, the experimental analysis is carried out for various attacks based on different metrics. The accuracy rate attained by the proposed approach is 99.2%, which is acceptable according to standards.

网络物理系统(CPS)和物联网(IoT)技术通过网络将城市系统连接起来,改善了向居民提供优质服务的能力。为了加强市政服务,信息和通信技术(ict)与城市系统相结合。然而,智慧城市中大量的传感器产生了大量的敏感数据,如医疗记录、信用卡号码和位置坐标,这些数据通过网络传输到数据中心进行分析和处理。由于技术基础设施的资源限制,这使得智慧城市容易受到网络攻击。智慧城市的应用带来了许多安全挑战,例如利用各种协议的弱点导致的零日攻击。因此,本文提出了一种最优混合传输搜索-级联区域卷积神经网络(hybrid TS - cascade R - CNN)来检测网络攻击。该模型将混合传输搜索方法与级联区域卷积神经网络相结合,创建了网络攻击检测的最佳解决方案。级联区域卷积网络采用混合过境搜索算法,提高了网络攻击检测的有效性。将这两种方法结合起来,系统可以同时利用全局流量模式和本地指标,提高攻击检测的准确性。在训练过程中,即使存在复杂的攻击,所提出的模型也能识别和分类恶意输入。最后,对基于不同度量的各种攻击进行了实验分析。该方法的准确率为99.2%,符合标准要求。
{"title":"An optimal hybrid cascade regional convolutional network for cyberattack detection","authors":"Ali Alqahtani,&nbsp;Surbhi Bhatia Khan","doi":"10.1002/nem.2247","DOIUrl":"10.1002/nem.2247","url":null,"abstract":"<p>Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information and communication technologies (ICTs) are integrated with urban systems. However, the large number of sensors in a smart city generates a significant amount of delicate data, like medical records, credit card numerics, and location coordinates, which are transported across a network to data centers for analysis and processing. This makes smart cities vulnerable to cyberattacks because of the resource constraints of their technology infrastructure. Applications for smart cities pose many security challenges, such as zero-day attacks resulting from exploiting weaknesses in various protocols. Therefore, this paper proposes an optimal hybrid transit search-cascade regional convolutional neural network (hybrid TS-Cascade R-CNN) to detect cyberattacks. The proposed model combines the hybrid transit-search approach with the cascade regional convolutional neural network to create an optimal solution for cyberattack detection. The cascade regional convolutional network uses a hybrid transit search algorithm to enhance the effectiveness of cyberattack detection. By integrating these two approaches, the system can leverage both global traffic patterns and local indicators to improve the accuracy of attack detection. During the training process, the proposed model recognizes and classifies malicious input even in the presence of sophisticated attacks. Finally, the experimental analysis is carried out for various attacks based on different metrics. The accuracy rate attained by the proposed approach is 99.2%, which is acceptable according to standards.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43887196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things 学习驱动的泛在移动边缘计算:未来一代物联网的网络管理挑战
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-09-03 DOI: 10.1002/nem.2250
Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury, Ilir Murturi

Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.

This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.

The first paper Ravi et al. proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors

无处不在的边缘计算促进了移动设备附近的高效云服务,使移动边缘计算(MEC)能够通过在移动设备附近和一般物联网领域提供存储和处理能力来更高效地提供服务。然而,与传统的移动云计算相比,由于异构的智能设备、网络基础设施和有限的传输带宽,无处不在的MEC带来了许多复杂的挑战。在边缘基础设施中,处理和管理这些设备生成的大量数据既复杂又具有挑战性。另一方面,时间关键型应用程序有着严格的要求,如超低延迟、能源成本、移动性、资源和安全问题,这些都不容忽视。例如,智能医疗保健或工业网络非常频繁地生成紧急信息(即,通常以毫秒为单位),这些信息需要在传感设备附近以最小的处理延迟进行处理。在这种情况下,未来一代物联网需要稳健和智能的网络管理方法,这些方法可以在很少或根本不需要人工干预的情况下处理系统复杂性(例如,可扩展性和协调性),并为最终用户提供更好的服务。更准确地说,专门为高流量数据下的网络设计的AI/ML方法有助于克服一些管理挑战,例如(i)通过平衡负载和流量来提高性能,(ii)根据需求分配带宽频谱,以及(iii)流量预测。此外,这一需求还开辟了几个新的研究方向,如新的MEC架构、服务提供技术、安全机制、先进的5G或超越通信技术、环境智能和基于AI/ML的解决方案。本期收集了关于未来一代物联网网络及其管理的无处不在的MEC新兴趋势和技术的调查和贡献文章。与机器学习、深度学习、优化、区块链、5G或其他解决方案相关的论文,特别是针对使用MEC环境的特定领域物联网网络管理的论文,是在评估审查过程后收集的。在评估过程中,三至七名专家对提交给本特刊的每份论文进行了审查。最后我们
{"title":"Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things","authors":"Praveen Kumar Donta,&nbsp;Edmundo Monteiro,&nbsp;Chinmaya Kumar Dehury,&nbsp;Ilir Murturi","doi":"10.1002/nem.2250","DOIUrl":"10.1002/nem.2250","url":null,"abstract":"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49500545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1