default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm25.bht:"
@article{DBLP:journals/ijnm/Alshaer15, author = {Hamada Alshaer}, title = {An overview of network virtualization and cloud network as a service}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {1}, pages = {1--30}, year = {2015}, url = {https://doi.org/10.1002/nem.1882}, doi = {10.1002/NEM.1882}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Alshaer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BaiardiTB15, author = {Fabrizio Baiardi and Federico Tonelli and Alessandro Bertolini}, title = {Iterative selection of countermeasures for intelligent threat agents}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {340--354}, year = {2015}, url = {https://doi.org/10.1002/nem.1899}, doi = {10.1002/NEM.1899}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/BaiardiTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BartosR15, author = {Karel Bartos and Martin Reh{\'{a}}k}, title = {{IFS:} Intelligent flow sampling for network security-an adaptive approach}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {263--282}, year = {2015}, url = {https://doi.org/10.1002/nem.1902}, doi = {10.1002/NEM.1902}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BartosR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BouetLCC15, author = {Mathieu Bouet and J{\'{e}}r{\'{e}}mie Leguay and Th{\'{e}}o Combe and Vania Conan}, title = {Cost-based placement of vDPI functions in {NFV} infrastructures}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {490--506}, year = {2015}, url = {https://doi.org/10.1002/nem.1920}, doi = {10.1002/NEM.1920}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BouetLCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CharalambidesZS15, author = {Marinos Charalambides and Thomas Zinner and Hiroshi Saito and Prasad Calyam and Steven Latr{\'{e}}}, title = {Advances in management of multimedia services}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {4}, pages = {203--204}, year = {2015}, url = {https://doi.org/10.1002/nem.1896}, doi = {10.1002/NEM.1896}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/CharalambidesZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ChungHH15, author = {Jae Yoon Chung and Sangtae Ha and James Won{-}Ki Hong}, title = {A management architecture for client-defined cloud storage services}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {435--453}, year = {2015}, url = {https://doi.org/10.1002/nem.1904}, doi = {10.1002/NEM.1904}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ChungHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DarabkhAK15, author = {Khalid A. Darabkh and Abeer M. Awad and Al{\'{a}} F. Khalifeh}, title = {New video discarding policies for improving {UDP} performance over wired/wireless networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {3}, pages = {181--202}, year = {2015}, url = {https://doi.org/10.1002/nem.1888}, doi = {10.1002/NEM.1888}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DarabkhAK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DechouniotisLAC15, author = {Dimitrios Dechouniotis and Nikolaos Leontiou and Nikolaos Athanasopoulos and Athanasios Christakidis and Spyros G. Denazis}, title = {A control-theoretic approach towards joint admission control and resource allocation of cloud computing services}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {3}, pages = {159--180}, year = {2015}, url = {https://doi.org/10.1002/nem.1889}, doi = {10.1002/NEM.1889}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DechouniotisLAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Erol-Kantarci15, author = {Melike Erol{-}Kantarci}, title = {Cache-at-relay: energy-efficient content placement for next-generation wireless relays}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {454--470}, year = {2015}, url = {https://doi.org/10.1002/nem.1912}, doi = {10.1002/NEM.1912}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Erol-Kantarci15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Farash15, author = {Mohammad Sabzinejad Farash}, title = {Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {1}, pages = {31--51}, year = {2015}, url = {https://doi.org/10.1002/nem.1883}, doi = {10.1002/NEM.1883}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Farash15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/FlaitheartaMS15, author = {Padraig O. Flaithearta and Hugh Melvin and Michael Schukat}, title = {A QoS enabled multimedia WiFi access point}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {4}, pages = {205--222}, year = {2015}, url = {https://doi.org/10.1002/nem.1895}, doi = {10.1002/NEM.1895}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/FlaitheartaMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/FoteinosTPCD15, author = {Vassilis Foteinos and Kostas Tsagkaris and Pierre Peloso and Laurent Ciavaglia and Panagiotis Demestichas}, title = {Energy-aware traffic allocation to optical lightpaths in multilayer core networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {394--417}, year = {2015}, url = {https://doi.org/10.1002/nem.1890}, doi = {10.1002/NEM.1890}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/FoteinosTPCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/GarmehiAPB15, author = {Mehran Garmehi and Morteza Analoui and Mukaddim Pathan and Rajkumar Buyya}, title = {An economic mechanism for request routing and resource allocation in hybrid {CDN-P2P} networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {375--393}, year = {2015}, url = {https://doi.org/10.1002/nem.1891}, doi = {10.1002/NEM.1891}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/GarmehiAPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/IsmailMKN15, author = {Ismahani Binti Ismail and Muhammad Nadzir Marsono and Ban Mohammed Khammas and Sulaiman Mohd Nor}, title = {Incorporating known malware signatures to classify new malware variants in network traffic}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {471--489}, year = {2015}, url = {https://doi.org/10.1002/nem.1913}, doi = {10.1002/NEM.1913}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/IsmailMKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JeongLHYH15, author = {Taeyeol Jeong and Jian Li and Jonghwan Hyun and Jae{-}Hyoung Yoo and James Won{-}Ki Hong}, title = {{LISP} controller: a centralized {LISP} management system for {ISP} networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {507--525}, year = {2015}, url = {https://doi.org/10.1002/nem.1921}, doi = {10.1002/NEM.1921}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/JeongLHYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KantarciFCM15, author = {Burak Kantarci and Luca Foschini and Antonio Corradi and Hussein T. Mouftah}, title = {Design of energy-efficient cloud systems via network and resource virtualization}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {2}, pages = {75--94}, year = {2015}, url = {https://doi.org/10.1002/nem.1838}, doi = {10.1002/NEM.1838}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/KantarciFCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiYAWW15, author = {Fuliang Li and Jiahai Yang and Changqing An and Jianping Wu and Xingwei Wang}, title = {Towards centralized and semi-automatic {VLAN} management}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {1}, pages = {52--73}, year = {2015}, url = {https://doi.org/10.1002/nem.1884}, doi = {10.1002/NEM.1884}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/LiYAWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MammelaM15, author = {Olli M{\"{a}}mmel{\"{a}} and Petteri Mannersalo}, title = {User-centric versus network-centric load balancing: How to provide good QoE for gold users}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {4}, pages = {242--259}, year = {2015}, url = {https://doi.org/10.1002/nem.1893}, doi = {10.1002/NEM.1893}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MammelaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MavromoustakisM15, author = {Constandinos X. Mavromoustakis and George Mastorakis and Athina Bourdena and Evangelos Pallis}, title = {Energy-efficient management using a traffic-oriented routing scheme for cognitive radio networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {6}, pages = {418--434}, year = {2015}, url = {https://doi.org/10.1002/nem.1897}, doi = {10.1002/NEM.1897}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MavromoustakisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MayzaudSBCS15, author = {Anth{\'{e}}a Mayzaud and Anuj Sehgal and Remi Badonnel and Isabelle Chrisment and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder}, title = {Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {320--339}, year = {2015}, url = {https://doi.org/10.1002/nem.1898}, doi = {10.1002/NEM.1898}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MayzaudSBCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MazelCFFO15, author = {Johan Mazel and Pedro Casas and Romain Fontugne and Kensuke Fukuda and Philippe Owezarski}, title = {Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {283--305}, year = {2015}, url = {https://doi.org/10.1002/nem.1903}, doi = {10.1002/NEM.1903}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MazelCFFO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Rubio-LoyolaPCM15, author = {Javier Rubio{-}Loyola and Gregorio Toscano Pulido and Marinos Charalambides and Marisol Maga{\~{n}}a{-}Aguilar and Joan Serrat{-}Fern{\'{a}}ndez and George Pavlou and Hiram Galeana{-}Zapi{\'{e}}n}, title = {Business-driven policy optimization for service management}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {2}, pages = {113--140}, year = {2015}, url = {https://doi.org/10.1002/nem.1886}, doi = {10.1002/NEM.1886}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/Rubio-LoyolaPCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SperottoHDSR15, author = {Anna Sperotto and Rick Hofstede and Alberto Dainotti and Corinna Schmitt and Gabi Dreo Rodosek}, title = {Special issue on measure, detect and mitigate-challenges and trends in network security}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {261--262}, year = {2015}, url = {https://doi.org/10.1002/nem.1905}, doi = {10.1002/NEM.1905}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/SperottoHDSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/VelanCCD15, author = {Petr Velan and Milan Cerm{\'{a}}k and Pavel Celeda and Martin Drasar}, title = {A survey of methods for encrypted traffic classification and analysis}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {355--374}, year = {2015}, url = {https://doi.org/10.1002/nem.1901}, doi = {10.1002/NEM.1901}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/VelanCCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/VuleticVK15, author = {Pavle V. Vuletic and Jovana J. Vuleta{-}Radoicic and Dimitrios Kalogeras}, title = {Federated trouble ticket system for service management support in loosely coupled multi-domain environments}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {2}, pages = {95--112}, year = {2015}, url = {https://doi.org/10.1002/nem.1885}, doi = {10.1002/NEM.1885}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/VuleticVK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WamserBSZKT15, author = {Florian Wamser and Andreas Blenk and Michael Seufert and Thomas Zinner and Wolfgang Kellerer and Phuoc Tran{-}Gia}, title = {Modelling and performance analysis of application-aware resource management}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {4}, pages = {223--241}, year = {2015}, url = {https://doi.org/10.1002/nem.1894}, doi = {10.1002/NEM.1894}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/WamserBSZKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WangLCM15, author = {Xiaonan Wang and Deguang Le and Hongbin Cheng and Yi Mu}, title = {An IPv6-based mobility framework for urban vehicular networks}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {3}, pages = {141--158}, year = {2015}, url = {https://doi.org/10.1002/nem.1887}, doi = {10.1002/NEM.1887}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/WangLCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhangMZTLTM15, author = {Yang Zhang and Hesham Mekky and Zhi{-}Li Zhang and Ruben Torres and Sung{-}Ju Lee and Alok Tongaonkar and Marco Mellia}, title = {Detecting malicious activities with user-agent-based profiles}, journal = {Int. J. Netw. Manag.}, volume = {25}, number = {5}, pages = {306--319}, year = {2015}, url = {https://doi.org/10.1002/nem.1900}, doi = {10.1002/NEM.1900}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ZhangMZTLTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.