Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm25.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/Alshaer15,
  author       = {Hamada Alshaer},
  title        = {An overview of network virtualization and cloud network as a service},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {1--30},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1882},
  doi          = {10.1002/NEM.1882},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Alshaer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BaiardiTB15,
  author       = {Fabrizio Baiardi and
                  Federico Tonelli and
                  Alessandro Bertolini},
  title        = {Iterative selection of countermeasures for intelligent threat agents},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {340--354},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1899},
  doi          = {10.1002/NEM.1899},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BaiardiTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BartosR15,
  author       = {Karel Bartos and
                  Martin Reh{\'{a}}k},
  title        = {{IFS:} Intelligent flow sampling for network security-an adaptive
                  approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {263--282},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1902},
  doi          = {10.1002/NEM.1902},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BartosR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BouetLCC15,
  author       = {Mathieu Bouet and
                  J{\'{e}}r{\'{e}}mie Leguay and
                  Th{\'{e}}o Combe and
                  Vania Conan},
  title        = {Cost-based placement of vDPI functions in {NFV} infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {490--506},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1920},
  doi          = {10.1002/NEM.1920},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BouetLCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CharalambidesZS15,
  author       = {Marinos Charalambides and
                  Thomas Zinner and
                  Hiroshi Saito and
                  Prasad Calyam and
                  Steven Latr{\'{e}}},
  title        = {Advances in management of multimedia services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {203--204},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1896},
  doi          = {10.1002/NEM.1896},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/CharalambidesZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChungHH15,
  author       = {Jae Yoon Chung and
                  Sangtae Ha and
                  James Won{-}Ki Hong},
  title        = {A management architecture for client-defined cloud storage services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {435--453},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1904},
  doi          = {10.1002/NEM.1904},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChungHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DarabkhAK15,
  author       = {Khalid A. Darabkh and
                  Abeer M. Awad and
                  Al{\'{a}} F. Khalifeh},
  title        = {New video discarding policies for improving {UDP} performance over
                  wired/wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {181--202},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1888},
  doi          = {10.1002/NEM.1888},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DarabkhAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DechouniotisLAC15,
  author       = {Dimitrios Dechouniotis and
                  Nikolaos Leontiou and
                  Nikolaos Athanasopoulos and
                  Athanasios Christakidis and
                  Spyros G. Denazis},
  title        = {A control-theoretic approach towards joint admission control and resource
                  allocation of cloud computing services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {159--180},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1889},
  doi          = {10.1002/NEM.1889},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DechouniotisLAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Erol-Kantarci15,
  author       = {Melike Erol{-}Kantarci},
  title        = {Cache-at-relay: energy-efficient content placement for next-generation
                  wireless relays},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {454--470},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1912},
  doi          = {10.1002/NEM.1912},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Erol-Kantarci15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Farash15,
  author       = {Mohammad Sabzinejad Farash},
  title        = {Cryptanalysis and improvement of 'an improved authentication with
                  key agreement scheme on elliptic curve cryptosystem for global mobility
                  networks'},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {31--51},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1883},
  doi          = {10.1002/NEM.1883},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Farash15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FlaitheartaMS15,
  author       = {Padraig O. Flaithearta and
                  Hugh Melvin and
                  Michael Schukat},
  title        = {A QoS enabled multimedia WiFi access point},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {205--222},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1895},
  doi          = {10.1002/NEM.1895},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FlaitheartaMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FoteinosTPCD15,
  author       = {Vassilis Foteinos and
                  Kostas Tsagkaris and
                  Pierre Peloso and
                  Laurent Ciavaglia and
                  Panagiotis Demestichas},
  title        = {Energy-aware traffic allocation to optical lightpaths in multilayer
                  core networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {394--417},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1890},
  doi          = {10.1002/NEM.1890},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FoteinosTPCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GarmehiAPB15,
  author       = {Mehran Garmehi and
                  Morteza Analoui and
                  Mukaddim Pathan and
                  Rajkumar Buyya},
  title        = {An economic mechanism for request routing and resource allocation
                  in hybrid {CDN-P2P} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {375--393},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1891},
  doi          = {10.1002/NEM.1891},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GarmehiAPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/IsmailMKN15,
  author       = {Ismahani Binti Ismail and
                  Muhammad Nadzir Marsono and
                  Ban Mohammed Khammas and
                  Sulaiman Mohd Nor},
  title        = {Incorporating known malware signatures to classify new malware variants
                  in network traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {471--489},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1913},
  doi          = {10.1002/NEM.1913},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/IsmailMKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JeongLHYH15,
  author       = {Taeyeol Jeong and
                  Jian Li and
                  Jonghwan Hyun and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {{LISP} controller: a centralized {LISP} management system for {ISP}
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {507--525},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1921},
  doi          = {10.1002/NEM.1921},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JeongLHYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KantarciFCM15,
  author       = {Burak Kantarci and
                  Luca Foschini and
                  Antonio Corradi and
                  Hussein T. Mouftah},
  title        = {Design of energy-efficient cloud systems via network and resource
                  virtualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {75--94},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1838},
  doi          = {10.1002/NEM.1838},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KantarciFCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiYAWW15,
  author       = {Fuliang Li and
                  Jiahai Yang and
                  Changqing An and
                  Jianping Wu and
                  Xingwei Wang},
  title        = {Towards centralized and semi-automatic {VLAN} management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {52--73},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1884},
  doi          = {10.1002/NEM.1884},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiYAWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MammelaM15,
  author       = {Olli M{\"{a}}mmel{\"{a}} and
                  Petteri Mannersalo},
  title        = {User-centric versus network-centric load balancing: How to provide
                  good QoE for gold users},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {242--259},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1893},
  doi          = {10.1002/NEM.1893},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MammelaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MavromoustakisM15,
  author       = {Constandinos X. Mavromoustakis and
                  George Mastorakis and
                  Athina Bourdena and
                  Evangelos Pallis},
  title        = {Energy-efficient management using a traffic-oriented routing scheme
                  for cognitive radio networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {418--434},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1897},
  doi          = {10.1002/NEM.1897},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MavromoustakisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MayzaudSBCS15,
  author       = {Anth{\'{e}}a Mayzaud and
                  Anuj Sehgal and
                  Remi Badonnel and
                  Isabelle Chrisment and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Mitigation of topological inconsistency attacks in RPL-based low-power
                  lossy networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {320--339},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1898},
  doi          = {10.1002/NEM.1898},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MayzaudSBCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MazelCFFO15,
  author       = {Johan Mazel and
                  Pedro Casas and
                  Romain Fontugne and
                  Kensuke Fukuda and
                  Philippe Owezarski},
  title        = {Hunting attacks in the dark: clustering and correlation analysis for
                  unsupervised anomaly detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {283--305},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1903},
  doi          = {10.1002/NEM.1903},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MazelCFFO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Rubio-LoyolaPCM15,
  author       = {Javier Rubio{-}Loyola and
                  Gregorio Toscano Pulido and
                  Marinos Charalambides and
                  Marisol Maga{\~{n}}a{-}Aguilar and
                  Joan Serrat{-}Fern{\'{a}}ndez and
                  George Pavlou and
                  Hiram Galeana{-}Zapi{\'{e}}n},
  title        = {Business-driven policy optimization for service management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {113--140},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1886},
  doi          = {10.1002/NEM.1886},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Rubio-LoyolaPCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SperottoHDSR15,
  author       = {Anna Sperotto and
                  Rick Hofstede and
                  Alberto Dainotti and
                  Corinna Schmitt and
                  Gabi Dreo Rodosek},
  title        = {Special issue on measure, detect and mitigate-challenges and trends
                  in network security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {261--262},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1905},
  doi          = {10.1002/NEM.1905},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SperottoHDSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VelanCCD15,
  author       = {Petr Velan and
                  Milan Cerm{\'{a}}k and
                  Pavel Celeda and
                  Martin Drasar},
  title        = {A survey of methods for encrypted traffic classification and analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {355--374},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1901},
  doi          = {10.1002/NEM.1901},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VelanCCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VuleticVK15,
  author       = {Pavle V. Vuletic and
                  Jovana J. Vuleta{-}Radoicic and
                  Dimitrios Kalogeras},
  title        = {Federated trouble ticket system for service management support in
                  loosely coupled multi-domain environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {95--112},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1885},
  doi          = {10.1002/NEM.1885},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VuleticVK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WamserBSZKT15,
  author       = {Florian Wamser and
                  Andreas Blenk and
                  Michael Seufert and
                  Thomas Zinner and
                  Wolfgang Kellerer and
                  Phuoc Tran{-}Gia},
  title        = {Modelling and performance analysis of application-aware resource management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {223--241},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1894},
  doi          = {10.1002/NEM.1894},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/WamserBSZKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangLCM15,
  author       = {Xiaonan Wang and
                  Deguang Le and
                  Hongbin Cheng and
                  Yi Mu},
  title        = {An IPv6-based mobility framework for urban vehicular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {141--158},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1887},
  doi          = {10.1002/NEM.1887},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangLCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangMZTLTM15,
  author       = {Yang Zhang and
                  Hesham Mekky and
                  Zhi{-}Li Zhang and
                  Ruben Torres and
                  Sung{-}Ju Lee and
                  Alok Tongaonkar and
                  Marco Mellia},
  title        = {Detecting malicious activities with user-agent-based profiles},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {306--319},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1900},
  doi          = {10.1002/NEM.1900},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangMZTLTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics