scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2016"


Journal ArticleDOI
TL;DR: This paper presents an in-depth analysis of four major categories of anomaly detection techniques which include classification, statistical, information theory and clustering and evaluates effectiveness of different categories of techniques.

992 citations


Journal ArticleDOI
TL;DR: A comprehensive study of wireless sensor networks' deployment in urban areas and discusses the merits and demerits of WSN architectures in urban environments.

594 citations


Journal ArticleDOI
TL;DR: A survey of integration components: Cloud platforms, Cloud infrastructures and IoT Middleware is presented and some integration proposals and data analytics techniques are surveyed as well as different challenges and open research issues are pointed out.

574 citations


Journal ArticleDOI
TL;DR: This paper proposes a dynamic energy-aware cloudlet-based mobile cloud computing model (DECM) focusing on solving the additional energy consumptions during the wireless communications by leveraging dynamic cloudlets (DCL)-based model.

453 citations


Journal ArticleDOI
TL;DR: There are issues and challenges that hinder the performance of FDSs, such as concept drift, supports real time detection, skewed distribution, large amount of data etc, which are provided in this survey paper.

403 citations


Journal ArticleDOI
TL;DR: This survey presents a comprehensive overview of the security issues for different factors affecting cloud computing, and encompasses the requirements for better security management and suggests 3-tier security architecture.

340 citations


Journal ArticleDOI
TL;DR: The main techniques and state-of-the-art research efforts in IoT from data-centric perspectives are reviewed, including data stream processing, data storage models, complex event processing, and searching in IoT.

289 citations


Journal ArticleDOI
TL;DR: This survey analyzes existing routing protocols and mechanisms to secure routing communications in IoT, as well as the open research issues and analyzes the open challenges and strategies for future research work for a better secure IoT routing.

253 citations


Journal ArticleDOI
TL;DR: This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends.

253 citations


Journal ArticleDOI
TL;DR: A closer look at the current SFC architecture and a survey of the recent developments in SFC including its relevance with NFV to help determine the future research directions and the standardization efforts of SFC are provided.

251 citations


Journal ArticleDOI
TL;DR: Techniques for enhancing DQ in IoT are presented with a special focus on data cleaning techniques which are reviewed and compared using an extended taxonomy to outline their characteristics and their fitness for use for IoT.

Journal ArticleDOI
TL;DR: An extensive survey on device-to-device (D2D) communication has been presented, including the plus points it offers; the key open issues associated with it like peer discovery, resource allocation etc, demanding special attention of the research community; some of its integrant technologies like millimeter wave D2D (mmWave), ultra dense networks (UDNs), cognitive D2d, handover procedure in D2 D and its numerous use cases.

Journal ArticleDOI
TL;DR: This article provides a complete survey and analyses of the existing state of the art VM placement schemes proposed in the literature for the cloud computing and data centers and classifies them based on the type of the placement algorithm and assesses their capabilities and objectives.

Journal ArticleDOI
TL;DR: Data plane, control plane and application plane as the three planes of SDN and the interfaces between them such as OpenFlow are investigated and the challenges and the latest technologies in relation to SDN are examined.

Journal ArticleDOI
TL;DR: A comprehensive survey and analysis of state of the art workflow scheduling schemes for scheduling simple and scientific workflows in the cloud computing and provides a classification of the proposed schemes based on the type of scheduling algorithm applied in each scheme.

Journal ArticleDOI
TL;DR: A systematic literature review of the existing load balancing techniques proposed so far and the advantages and disadvantages associated with several load balancing algorithms have been discussed and the important challenges of these algorithms are addressed so that more efficientload balancing techniques can be developed in future.

Journal ArticleDOI
TL;DR: A novel IoT-based mobile gateway solution for mobile health (m-Health) scenarios that autonomously collects information about the user/patient location, heart rate, and possible fall detection and forwards the collected information to a caretaker IPA, in real time, which will manage a set of actions and alarms appropriately.

Journal ArticleDOI
TL;DR: This research work presents taxonomy of cloud security attacks and potential mitigation strategies with the aim of providing an in-depth understanding of security requirements in the cloud environment and highlights the importance of intrusion detection and prevention as a service.

Journal ArticleDOI
TL;DR: This paper presents a comprehensive review of M2M communication technology in terms of its system model architecture proposed by different standards developing organizations, mainly includes 3GPP, ETSI, and oneM2M.

Journal ArticleDOI
TL;DR: A survey of security issues in terms of security threats and their remediations is presented and a parametric comparison of the threats being faced by cloud platforms is performed.

Journal ArticleDOI
TL;DR: The common CMFD workflow of feature extraction and matching process using block or keypoint-based approaches is characterized, and the types of copied regions are categorized.

Journal ArticleDOI
TL;DR: A comprehensive survey of the various state-of-the-art approaches for interference management in D2D communication enabled in cellular networks found that the existing approaches do not satisfy 5G requirements.

Journal ArticleDOI
TL;DR: This survey aims to investigate feasible techniques of managing big data by emphasizing on storage, pre-processing, processing and security and develops a taxonomy to identify the problems and proposals made to alleviate these problems.

Journal ArticleDOI
TL;DR: An untraceable two-factor authentication scheme based on elliptic curve cryptography (ECC) for WSNs that makes up for the missing security features necessary for real-life applications while maintaining the desired features of the original scheme.

Journal ArticleDOI
TL;DR: It is perceived that different schemes and algorithms did not consider some essential parameters and enhancement is requisite to improve the performance of the existing schemes to trigger new and innovative methods of handling the problems of resource scheduling in the cloud.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed trigger of attack detection mechanism can quickly initiate the attack detection with less than one second and accurately trace the attack source and release the occupied resources of switches.

Journal ArticleDOI
TL;DR: The resource provision algorithms are surveyed from a point view of top-do-down according to their objectives and VM placement phase and several tightly related topics, i.e., virtual machine migration, forecast methods, stability and availability are discussed.

Journal ArticleDOI
TL;DR: A detailed classification and comprehensive survey of existing spectrum handoff schemes for cognitive radio networks is presented and various research issues and challenges are presented which require the attention of the researchers.

Journal ArticleDOI
TL;DR: This survey aims to give particular attention to OpenFlow-based SDN and present an up-to-date view to existing security challenges and countermeasures in the literature and attempts to simulate more research attention to these issues in future OpenFlow and SDN development.

Journal ArticleDOI
TL;DR: The relation between message replication and individual or group communication semantics of DTN routing protocols considering both social-based and opportunistic message forwarding techniques are studied and an in-depth coverage of data dissemination protocols in DTN is introduced which can be adapted to content-centric networking domains.