Search dblp for Publications

export results for "toc:db/journals/jnca/jnca66.bht:"

 download as .bib file

@article{DBLP:journals/jnca/AirehrourGR16,
  author       = {David Airehrour and
                  Jairo A. Guti{\'{e}}rrez and
                  Sayan Kumar Ray},
  title        = {Secure routing for internet of things: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {198--213},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.006},
  doi          = {10.1016/J.JNCA.2016.03.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AirehrourGR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChunlinXL16,
  author       = {Chunlin Li and
                  Yan Xin and
                  Layuan Li},
  title        = {Flexible service provisioning based on context constraint for enhancing
                  user experience in service oriented mobile cloud},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {250--261},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.003},
  doi          = {10.1016/J.JNCA.2016.03.003},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChunlinXL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/FolinoS16,
  author       = {Gianluigi Folino and
                  Pietro Sabatino},
  title        = {Ensemble based collaborative and distributed intrusion detection systems:
                  {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {1--16},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.011},
  doi          = {10.1016/J.JNCA.2016.03.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/FolinoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GargB16,
  author       = {Neenu Garg and
                  Seema Bawa},
  title        = {Comparative analysis of cloud data integrity auditing protocols},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {17--32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.010},
  doi          = {10.1016/J.JNCA.2016.03.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GargB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GranaWNXBB16,
  author       = {Justin Grana and
                  David H. Wolpert and
                  Joshua Neil and
                  Dongping Xie and
                  Tanmoy Bhattacharya and
                  Russell Bent},
  title        = {A likelihood ratio anomaly detector for identifying within-perimeter
                  computer network attacks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {166--179},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.008},
  doi          = {10.1016/J.JNCA.2016.03.008},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/GranaWNXBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiangYL16,
  author       = {Fuu{-}Cheng Jiang and
                  Ilsun You and
                  Fang{-}Yie Leu},
  title        = {Approaching green sensor field using queue-based optimization technique},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {128--136},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.11.010},
  doi          = {10.1016/J.JNCA.2015.11.010},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JiangYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JoshiY16,
  author       = {Yatish K. Joshi and
                  Mohamed F. Younis},
  title        = {Restoring connectivity in a resource constrained {WSN}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {151--165},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.009},
  doi          = {10.1016/J.JNCA.2016.03.009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JoshiY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanGWSA16,
  author       = {Suleman Khan and
                  Abdullah Gani and
                  Ainuddin Wahid Abdul Wahab and
                  Muhammad Shiraz and
                  Iftikhar Ahmad},
  title        = {Network forensics: Review, taxonomy, and open challenges},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {214--235},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.005},
  doi          = {10.1016/J.JNCA.2016.03.005},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanGWSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiCWQX16,
  author       = {Shiyi Li and
                  Qiang Cao and
                  Shenggang Wan and
                  Lu Qian and
                  Changsheng Xie},
  title        = {{HRSPC:} a hybrid redundancy scheme via exploring computational locality
                  to support fast recovery and high reliability in distributed storage
                  systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {52--63},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.12.012},
  doi          = {10.1016/J.JNCA.2015.12.012},
  timestamp    = {Fri, 23 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiCWQX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MasdariNA16,
  author       = {Mohammad Masdari and
                  Sayyid Shahab Nabavi and
                  Vafa Ahmadi},
  title        = {An overview of virtual machine placement schemes in cloud computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {106--127},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.01.011},
  doi          = {10.1016/J.JNCA.2016.01.011},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MasdariNA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MasdariVSA16,
  author       = {Mohammad Masdari and
                  Sima ValiKardan and
                  Zahra Shahi and
                  Sonay Imani Azar},
  title        = {Towards workflow scheduling in cloud computing: {A} comprehensive
                  analysis},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {64--82},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.01.018},
  doi          = {10.1016/J.JNCA.2016.01.018},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MasdariVSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MohapatraSW16,
  author       = {Suvendu Kumar Mohapatra and
                  Prasan Kumar Sahoo and
                  Shih{-}Lin Wu},
  title        = {Big data analytic architecture for intruder detection in heterogeneous
                  wireless sensor networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {236--249},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.004},
  doi          = {10.1016/J.JNCA.2016.03.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/MohapatraSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/OtebolakuA16,
  author       = {Abayomi Moradeyo Otebolaku and
                  Maria Teresa Andrade},
  title        = {User context recognition using smartphone sensors and classification
                  models},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {33--51},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.013},
  doi          = {10.1016/J.JNCA.2016.03.013},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/OtebolakuA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PhuttharakL16,
  author       = {Jurairat Phuttharak and
                  Seng W. Loke},
  title        = {Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy
                  usage and response analysis},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {137--150},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.015},
  doi          = {10.1016/J.JNCA.2016.03.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/PhuttharakL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QureshiMR16,
  author       = {Amna Qureshi and
                  David Meg{\'{\i}}as and
                  Helena Rif{\`{a}}{-}Pous},
  title        = {{PSUM:} Peer-to-peer multimedia content distribution using collusion-resistant
                  fingerprinting},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {180--197},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.03.007},
  doi          = {10.1016/J.JNCA.2016.03.007},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/QureshiMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/VermaVPANTAKAA16,
  author       = {Pawan Kumar Verma and
                  Rajesh Verma and
                  Arun Prakash and
                  Ashish Agrawal and
                  Kshirasagar Naik and
                  Rajeev Tripathi and
                  Maazen Alsabaan and
                  Tarek Khalifa and
                  Tamer Abdelkader and
                  Abdulhakim Abogharaf},
  title        = {Machine-to-Machine {(M2M)} communications: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {66},
  pages        = {83--105},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.02.016},
  doi          = {10.1016/J.JNCA.2016.02.016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/VermaVPANTAKAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics