Search dblp for Publications

export results for "stream:journals/ijnm:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/ijnm/AgarwalRTY24,
  author       = {Udit Agarwal and
                  Vinay Rishiwal and
                  Sudeep Tanwar and
                  Mano Yadav},
  title        = {Blockchain and crypto forensics: Investigating crypto frauds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2255},
  doi          = {10.1002/NEM.2255},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgarwalRTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArakawaO24,
  author       = {Kengo Arakawa and
                  Eiji Oki},
  title        = {Availability-aware virtual network function placement based on multidimensional
                  universal generating functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2252},
  doi          = {10.1002/NEM.2252},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArakawaO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BadriNS24,
  author       = {Nedia Badri and
                  Le{\"{\i}}la Nasraoui and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {A comprehensive review of blockchain integration in remote patient
                  monitoring for E-health},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2254},
  doi          = {10.1002/NEM.2254},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BadriNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChoiWH24,
  author       = {Wonseok Choi and
                  Jongsoo Woo and
                  James Won{-}Ki Hong},
  title        = {Fractional non-fungible tokens: Overview, evaluation, marketplaces,
                  and challenges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2260},
  doi          = {10.1002/NEM.2260},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChoiWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DhandapaniTM24,
  author       = {Kavi Priya Dhandapani and
                  Mirnalinee Thanganadar Thangathai and
                  Shahul Hamead Haja Moinudeen},
  title        = {A novel eviction policy based on shortest remaining time for software
                  defined networking flow tables},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2257},
  doi          = {10.1002/NEM.2257},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DhandapaniTM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FuWYC24,
  author       = {Shange Fu and
                  Qin Wang and
                  Jiangshan Yu and
                  Shiping Chen},
  title        = {Leveraging Ponzi-like designs in stablecoins},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2277},
  doi          = {10.1002/NEM.2277},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FuWYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HenkerAVSDB24,
  author       = {Robert Henker and
                  Daniel Atzberger and
                  Jan Ole Vollmer and
                  Willy Scheibel and
                  J{\"{u}}rgen D{\"{o}}llner and
                  Markus Bick},
  title        = {Athena: Smart order routing on centralized crypto exchanges using
                  a unified order book},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2266},
  doi          = {10.1002/NEM.2266},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HenkerAVSDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongVJJK24,
  author       = {James Won{-}Ki Hong and
                  Andreas G. Veneris and
                  Hongtaek Ju and
                  Taeyeol Jeong and
                  Changhoon Kang},
  title        = {Innovations in Blockchain for Crypto Assets and Exchanges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2287},
  doi          = {10.1002/NEM.2287},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongVJJK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JinYLQ24,
  author       = {Anan Jin and
                  Yuhang Ye and
                  Brian Lee and
                  Yuansong Qiao},
  title        = {Topology analysis of the Ripple transaction network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2253},
  doi          = {10.1002/NEM.2253},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JinYLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KarthikLAR24,
  author       = {V. Karthik and
                  R. Lakshmi and
                  Salini Abraham and
                  M. Ramkumar},
  title        = {Residual based temporal attention convolutional neural network for
                  detection of distributed denial of service attacks in software defined
                  network integrated vehicular adhoc network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2256},
  doi          = {10.1002/NEM.2256},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KarthikLAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimEPJ24,
  author       = {Aeri Kim and
                  Meryam Essaid and
                  Sejin Park and
                  Hongtaek Ju},
  title        = {Reducing the propagation delay of compact block in Bitcoin network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2262},
  doi          = {10.1002/NEM.2262},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimEPJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KoJWH24,
  author       = {Kyungchan Ko and
                  Taeyeol Jeong and
                  Jongsoo Woo and
                  James Won{-}Ki Hong},
  title        = {Survey on blockchain-based non-fungible tokens: History, technologies,
                  standards, and open challenges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2245},
  doi          = {10.1002/NEM.2245},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KoJWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NisaKAA24,
  author       = {Najmun Nisa and
                  Adnan Shahid Khan and
                  Zeeshan Ahmad and
                  Johari Abdullah},
  title        = {{TPAAD:} Two-phase authentication system for denial of service attack
                  detection and mitigation using machine learning in software-defined
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2258},
  doi          = {10.1002/NEM.2258},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NisaKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/QiuZNJSZH24,
  author       = {Ziyu Qiu and
                  Zhilei Zhou and
                  Brad Niblett and
                  Andrew Johnston and
                  Jeffrey Schwartzentruber and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Assessing the impact of bag-of-words versus word-to-vector embedding
                  methods and dimension reduction on anomaly detection from log files},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2251},
  doi          = {10.1002/NEM.2251},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/QiuZNJSZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RajyalakshmiL24,
  author       = {Vankadhara Rajyalakshmi and
                  Kuruva Lakshmanna},
  title        = {Detection of car parking space by using Hybrid Deep DenseNet Optimization
                  algorithm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2228},
  doi          = {10.1002/NEM.2228},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/RajyalakshmiL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SinghMV24,
  author       = {Srisht Fateh Singh and
                  Panagiotis Michalopoulos and
                  Andreas G. Veneris},
  title        = {Deeper: {A} shared liquidity decentralized exchange design for low
                  trading volume tokens to enhance average liquidity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2261},
  doi          = {10.1002/NEM.2261},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SinghMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangZ24,
  author       = {Shengyi Yang and
                  Shaoying Zhu},
  title        = {Thinking and exploration of the teaching mode of empirical accounting
                  course based on the Internet of Things and deep learning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2242},
  doi          = {10.1002/NEM.2242},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlomariZAB23,
  author       = {Zakaria Alomari and
                  Mohamed Faten Zhani and
                  Moayad Aloqaily and
                  Ouns Bouachir},
  title        = {Towards optimal synchronization in NFV-based environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2218},
  doi          = {10.1002/NEM.2218},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlomariZAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlzubiASA23,
  author       = {Jafar Ahmad Abed Alzubi and
                  Omar A. Alzubi and
                  Ashish Singh and
                  Tareq Mahmod Alzubi},
  title        = {A blockchain-enabled security management framework for mobile edge
                  computing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2240},
  doi          = {10.1002/NEM.2240},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlzubiASA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AroraKHAI23,
  author       = {Sandeep Kumar Arora and
                  Gulshan Kumar and
                  Mustapha Hedabou and
                  El Mehdi Amhoud and
                  Celestine Iwendi},
  title        = {Blockchain-inspired lightweight trust-based system in vehicular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2226},
  doi          = {10.1002/NEM.2226},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AroraKHAI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BabuRSNK23,
  author       = {Erukala Suresh Babu and
                  Mekala Srinivasa Rao and
                  Gandharba Swain and
                  A. Kousar Nikhath and
                  Rajesh Kaluri},
  title        = {Fog-Sec: Secure end-to-end communication in fog-enabled IoT network
                  using permissioned blockchain system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2248},
  doi          = {10.1002/NEM.2248},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BabuRSNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BhowmikB23,
  author       = {Tanima Bhowmik and
                  Indrajit Banerjee},
  title        = {{EEPPDA} - Edge-enabled efficient privacy-preserving data aggregation
                  in smart healthcare Internet of Things network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2216},
  doi          = {10.1002/NEM.2216},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BhowmikB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Cao23,
  author       = {Xianhong Cao},
  title        = {Dynamic management network system of automobile detection applying
                  edge computing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2231},
  doi          = {10.1002/NEM.2231},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Cao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ContrerasSCF23,
  author       = {Luis M. Contreras and
                  Alberto Solano and
                  Francisco Cano and
                  Jes{\'{u}}s Folgueira},
  title        = {Analysis of network function sharing in Content Delivery Network-as-a-service
                  slicing scenarios},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2221},
  doi          = {10.1002/NEM.2221},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ContrerasSCF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DasN23,
  author       = {Sangjukta Das and
                  Suyel Namasudra},
  title        = {{MACPABE:} Multi-Authority-based {CP-ABE} with efficient attribute
                  revocation for IoT-enabled healthcare infrastructure},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2200},
  doi          = {10.1002/NEM.2200},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DasN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DontaMDM23,
  author       = {Praveen Kumar Donta and
                  Edmundo Monteiro and
                  Chinmaya Kumar Dehury and
                  Ilir Murturi},
  title        = {Learning-driven ubiquitous mobile edge computing: Network management
                  challenges for future generation Internet of Things},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2250},
  doi          = {10.1002/NEM.2250},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DontaMDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/EssaidLJ23,
  author       = {Meryam Essaid and
                  Changhyun Lee and
                  Hongteak Ju},
  title        = {Characterizing the Bitcoin network topology with Node-Probe},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2230},
  doi          = {10.1002/NEM.2230},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/EssaidLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HbaiebK23,
  author       = {Ameni Hbaieb and
                  Mahdi Khemakhem},
  title        = {Optimal network-aware virtual data center embedding},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2223},
  doi          = {10.1002/NEM.2223},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HbaiebK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JKSG23,
  author       = {Jabin Prakash J and
                  Ramesh K and
                  K. Saravanan and
                  Lakshmi Prabha G},
  title        = {Blockchain-based data deduplication using novel content-defined chunking
                  algorithm in cloud environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2249},
  doi          = {10.1002/NEM.2249},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/JKSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JinLHPXW23,
  author       = {Zhiping Jin and
                  Zhibiao Liang and
                  Meirong He and
                  Yao Peng and
                  Hanxiao Xue and
                  Yu Wang},
  title        = {A federated semi-supervised learning approach for network traffic
                  classification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2222},
  doi          = {10.1002/NEM.2222},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JinLHPXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimPLLHCYH23,
  author       = {Heegon Kim and
                  Suhyun Park and
                  Stanislav Lange and
                  Doyoung Lee and
                  DongNyeong Heo and
                  Heeyoul Choi and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Graph neural network-based virtual network function deployment optimization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2217},
  doi          = {10.1002/NEM.2217},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimPLLHCYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KumarKPPC23,
  author       = {Gagan Nandha Kumar and
                  Kostas Katsalis and
                  Panagiotis Papadimitriou and
                  Paul Pop and
                  Georg Carle},
  title        = {SRv6-based Time-Sensitive Networks {(TSN)} with low-overhead rerouting},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2215},
  doi          = {10.1002/NEM.2215},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KumarKPPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiangLSYH23,
  author       = {Dong Liang and
                  Qinrang Liu and
                  Ke Song and
                  Binghao Yan and
                  Tao Hu},
  title        = {Audit-based correction mechanism for malicious statistics information
                  of data plane},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2219},
  doi          = {10.1002/NEM.2219},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiangLSYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MengKCC23,
  author       = {Weizhi Meng and
                  Sokratis K. Katsikas and
                  Jiageng Chen and
                  Chao Chen},
  title        = {Editorial for special issue on security and trust on networked systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2229},
  doi          = {10.1002/NEM.2229},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MengKCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PandeyCYH23,
  author       = {Suman Pandey and
                  Minji Choi and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {RNN-EdgeQL: An auto-scaling and placement approach for {SFC}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2213},
  doi          = {10.1002/NEM.2213},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PandeyCYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RaviKHHK23,
  author       = {Banoth Ravi and
                  Manoj Kumar and
                  Yu{-}Chen Hu and
                  Shamsul Hassan and
                  Bittu Kumar},
  title        = {Stochastic modeling and performance analysis in balancing load and
                  traffic for vehicular ad hoc networks: {A} review},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2224},
  doi          = {10.1002/NEM.2224},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RaviKHHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SamriyaKG23,
  author       = {Jitendra Kumar Samriya and
                  Mohit Kumar and
                  Sukhpal Singh Gill},
  title        = {Secured data offloading using reinforcement learning and Markov decision
                  process in mobile edge computing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2243},
  doi          = {10.1002/NEM.2243},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SamriyaKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShiomotoKRMO23,
  author       = {Kohei Shiomoto and
                  Young{-}Tak Kim and
                  Christian Esteve Rothenberg and
                  Barbara Martini and
                  Eiji Oki},
  title        = {Accelerating network softwarization in the cognitive age},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2241},
  doi          = {10.1002/NEM.2241},
  timestamp    = {Sun, 23 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShiomotoKRMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SinghA23,
  author       = {Shashank Singh and
                  Veena Anand},
  title        = {Load balancing clustering and routing for IoT-enabled wireless sensor
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2244},
  doi          = {10.1002/NEM.2244},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SinghA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SongLBZT23,
  author       = {Wenjun Song and
                  Mengqi Liu and
                  Thar Baker and
                  Qikun Zhang and
                  Yu{-}an Tan},
  title        = {A group key exchange and secure data sharing based on privacy protection
                  for federated learning in edge-cloud collaborative computing environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2225},
  doi          = {10.1002/NEM.2225},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SongLBZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TakaHO23,
  author       = {Haruto Taka and
                  Fujun He and
                  Eiji Oki},
  title        = {Joint service placement and user assignment model in multi-access
                  edge computing networks against base-station failure},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2233},
  doi          = {10.1002/NEM.2233},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/TakaHO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/UmraoY23,
  author       = {Brajesh Kumar Umrao and
                  Dharmendra Kumar Yadav},
  title        = {Placement of virtual network functions for network services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2232},
  doi          = {10.1002/NEM.2232},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/UmraoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuZWM23,
  author       = {Lei Wu and
                  Shengnan Zhao and
                  Xia Wei and
                  Lingzhen Meng},
  title        = {Privacy-preserving and efficient user matching based on attribute
                  encryption in mobile social networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2192},
  doi          = {10.1002/NEM.2192},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuZWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YahyaouiZBA23,
  author       = {Haythem Yahyaoui and
                  Mohamed Faten Zhani and
                  Ouns Bouachir and
                  Moayad Aloqaily},
  title        = {On minimizing flow monitoring costs in large-scale software-defined
                  network networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2220},
  doi          = {10.1002/NEM.2220},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/YahyaouiZBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YaoTCX23,
  author       = {Shixiong Yao and
                  Xingjian Tian and
                  Jiageng Chen and
                  Yi Xiong},
  title        = {Privacy Preserving distributed smart grid system based on Hyperledger
                  Fabric and Wireguard},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2193},
  doi          = {10.1002/NEM.2193},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YaoTCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZengLZZ23,
  author       = {Peng Zeng and
                  Guanjun Lin and
                  Jun Zhang and
                  Ying Zhang},
  title        = {Intelligent detection of vulnerable functions in software through
                  neural embedding-based code analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2198},
  doi          = {10.1002/NEM.2198},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZengLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhouZ23,
  author       = {Aiping Zhou and
                  Ye Zhu},
  title        = {A novel data streaming method for detecting abnormal flows in distributed
                  monitoring systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2227},
  doi          = {10.1002/NEM.2227},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhouZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AkpakwuHA22,
  author       = {Godfrey Anuga Akpakwu and
                  Gerhard P. Hancke and
                  Adnan M. Abu{-}Mahfouz},
  title        = {An optimization-based congestion control for constrained application
                  protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2178},
  doi          = {10.1002/NEM.2178},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AkpakwuHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlharbyM22,
  author       = {Maher Alharby and
                  Aad van Moorsel},
  title        = {Simulating permissionless blockchains: Distribution fitting, tool
                  support, and a case study},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2184},
  doi          = {10.1002/NEM.2184},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlharbyM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AtouiAGY22,
  author       = {Wassim Sellil Atoui and
                  Nour Assy and
                  Walid Gaaloul and
                  Imen Grida Ben Yahia},
  title        = {A model-driven approach for deployment descriptor design in network
                  function virtualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2165},
  doi          = {10.1002/NEM.2165},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AtouiAGY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BastosMNP22,
  author       = {Ian Vilar Bastos and
                  Igor Monteiro Moraes and
                  Thi Mai Trang Nguyen and
                  Guy Pujolle},
  title        = {Content Media Retrieval using Virtual Network Functions in Multi-access
                  Edge Computing architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2208},
  doi          = {10.1002/NEM.2208},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BastosMNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BozkayaOAEC22,
  author       = {Elif Bozkaya and
                  Yusuf {\"{O}}z{\c{c}}evik and
                  Mertkan Akko{\c{c}} and
                  Muhammed Rasit Erol and
                  Berk Canberk},
  title        = {Energy-aware mobility for aerial networks: {A} reinforcement learning
                  approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2185},
  doi          = {10.1002/NEM.2185},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BozkayaOAEC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CaiITV22,
  author       = {Yuxi Cai and
                  Nafis Irtija and
                  Eirini{-}Eleni Tsiropoulou and
                  Andreas G. Veneris},
  title        = {Truthful Decentralized Blockchain Oracles},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2179},
  doi          = {10.1002/NEM.2179},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CaiITV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DharBDD22,
  author       = {Mili Dhar and
                  Bidyut K. Bhattacharyya and
                  Mrinal Kanti Debbarma and
                  Swapan Debbarma},
  title        = {A cost-effective and load-balanced controller placement method in
                  software-defined networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2199},
  doi          = {10.1002/NEM.2199},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DharBDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GeorgeC22,
  author       = {Merlin George and
                  Anu Mary Chacko},
  title        = {MediTrans - Patient-centric interoperability through blockchain},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2187},
  doi          = {10.1002/NEM.2187},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GeorgeC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GhaffariGBC22,
  author       = {Fariba Ghaffari and
                  Komal Gilani and
                  Emmanuel Bertin and
                  No{\"{e}}l Crespi},
  title        = {Identity and access management using distributed ledger technology:
                  {A} survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2180},
  doi          = {10.1002/NEM.2180},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/GhaffariGBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GodorY22,
  author       = {Istv{\'{a}}n G{\'{o}}dor and
                  Imen Grida Ben Yahia},
  title        = {Topics from networks management and operations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2182},
  doi          = {10.1002/NEM.2182},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/GodorY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GuimaraesMMSN22,
  author       = {Almir Pereira Guimar{\~{a}}es and
                  Paulo Maciel and
                  Rivalino Matias Jr. and
                  Bruno Silva and
                  Bruno Nogueira},
  title        = {An analytical approach for optimization of computer network design
                  considering the integration of the communication and power infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2161},
  doi          = {10.1002/NEM.2161},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GuimaraesMMSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HoyeWTV22,
  author       = {Laurens Van Hoye and
                  Tim Wauters and
                  Filip De Turck and
                  Bruno Volckaert},
  title        = {A secure cross-organizational container deployment approach to enable
                  ad hoc collaborations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2194},
  doi          = {10.1002/NEM.2194},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HoyeWTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangGS22,
  author       = {Xiaoying Huang and
                  Zhichuan Guo and
                  Mangu Song},
  title        = {{FGLB:} {A} fine-grained hardware intra-server load balancer based
                  on 100 {G} {FPGA} SmartNIC},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2211},
  doi          = {10.1002/NEM.2211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KagadeJ22,
  author       = {Ranjeet B. Kagade and
                  Santhosh Jayagopalan},
  title        = {Optimization assisted deep learning based intrusion detection system
                  in wireless sensor network with two-tier trust evaluation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2196},
  doi          = {10.1002/NEM.2196},
  timestamp    = {Wed, 14 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KagadeJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KalanCS22,
  author       = {Reza Shokri Kalan and
                  Stuart Clayman and
                  M{\"{u}}ge Sayit},
  title        = {vDANE: Using virtualization for improving video quality with Server
                  and Network Assisted {DASH}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2209},
  doi          = {10.1002/NEM.2209},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KalanCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KaurGS22,
  author       = {Kiranpreet Kaur and
                  Fabrice Guillemin and
                  Fran{\c{c}}oise Sailhan},
  title        = {Container placement and migration strategies for cloud, fog, and edge
                  data centers: {A} survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2212},
  doi          = {10.1002/NEM.2212},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KaurGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KobayashiYOF22,
  author       = {Satoru Kobayashi and
                  Yuya Yamashiro and
                  Kazuki Otomo and
                  Kensuke Fukuda},
  title        = {amulog: {A} general log analysis framework for comparison and combination
                  of diverse template generation methods},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2195},
  doi          = {10.1002/NEM.2195},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KobayashiYOF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KumarBJP22,
  author       = {Akhilesh Kumar and
                  Shashwati Banerjea and
                  Rishabh Jain and
                  Mayank Pandey},
  title        = {Software-defined content delivery network at the edge for adaptive
                  video streaming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2210},
  doi          = {10.1002/NEM.2210},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KumarBJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LahmadiBL22,
  author       = {Abdelkader Lahmadi and
                  Emmanuel Bertin and
                  Ruidong Li},
  title        = {{BRAINS} 2020 special issue: Blockchain research and applications
                  for innovative networks and services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2189},
  doi          = {10.1002/NEM.2189},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LahmadiBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MartinsRSS22,
  author       = {Pedro Martins and
                  Andr{\'{e}} B. Reis and
                  Paulo Salvador and
                  Susana Sargento},
  title        = {A privacy-focused approach for anomaly detection in IoT networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2154},
  doi          = {10.1002/NEM.2154},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MartinsRSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NawrockiSW22,
  author       = {Marcin Nawrocki and
                  Thomas C. Schmidt and
                  Matthias W{\"{a}}hlisch},
  title        = {Industrial control protocols in the Internet core: Dismantling operational
                  practices},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2158},
  doi          = {10.1002/NEM.2158},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NawrockiSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OliveiraBNS22,
  author       = {Gustavo H. C. de Oliveira and
                  Agnaldo de Souza Batista and
                  Michele Nogueira and
                  Aldri L. dos Santos},
  title        = {An access control for IoT based on network community perception and
                  social trust against Sybil attacks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2181},
  doi          = {10.1002/NEM.2181},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/OliveiraBNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PedrosoS22,
  author       = {Carlos Pedroso and
                  Aldri Santos},
  title        = {Dissemination control in dynamic data clustering for dense IIoT against
                  false data injection attack},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2201},
  doi          = {10.1002/NEM.2201},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PedrosoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PekarDSR22,
  author       = {Adri{\'{a}}n Pek{\'{a}}r and
                  Alejandra Duque{-}Torres and
                  Winston K. G. Seah and
                  Oscar Maur{\'{\i}}cio Caicedo Rend{\'{o}}n},
  title        = {Towards threshold-agnostic heavy-hitter classification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2188},
  doi          = {10.1002/NEM.2188},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PekarDSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PetersenT22,
  author       = {Erick Petersen and
                  Marco Antonio To},
  title        = {DockSDN: {A} hybrid container-based software-defined networking emulation
                  tool},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2166},
  doi          = {10.1002/NEM.2166},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PetersenT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PoltronieriTMSS22,
  author       = {Filippo Poltronieri and
                  Mauro Tortonesi and
                  Alessandro Morelli and
                  Cesare Stefanelli and
                  Niranjan Suri},
  title        = {A Value-of-Information-based management framework for fog services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2156},
  doi          = {10.1002/NEM.2156},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PoltronieriTMSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SantosRLKSE22,
  author       = {Guto Leoni Santos and
                  Pierangelo Rosati and
                  Theo Lynn and
                  Judith Kelner and
                  Djamel Sadok and
                  Patricia Takako Endo},
  title        = {Predicting short-term mobile Internet traffic from Internet activity
                  using recurrent neural networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2191},
  doi          = {10.1002/NEM.2191},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SantosRLKSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SasabeYZK22,
  author       = {Masahiro Sasabe and
                  Masanari Yamamoto and
                  Yuanyu Zhang and
                  Shoji Kasahara},
  title        = {Block diffusion delay attack and its countermeasures in a Bitcoin
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2190},
  doi          = {10.1002/NEM.2190},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SasabeYZK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SchaererZB22,
  author       = {Jakob Schaerer and
                  Severin Zumbrunn and
                  Torsten Braun},
  title        = {Veritaa: {A} distributed public key infrastructure with signature
                  store},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2183},
  doi          = {10.1002/NEM.2183},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SchaererZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SoosFV22,
  author       = {Gabor Soos and
                  D{\'{a}}niel Ficzere and
                  P{\'{a}}l Varga},
  title        = {Analyzing group behavior patterns in a cellular mobile network for
                  5G use-cases},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2157},
  doi          = {10.1002/NEM.2157},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SoosFV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YanLSLL22,
  author       = {Binghao Yan and
                  Qinrang Liu and
                  JianLiang Shen and
                  Dong Liang and
                  Xingyu Liu},
  title        = {Cost-effective and accurate flow statistics collection in OpenFlow-based
                  {SDN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2197},
  doi          = {10.1002/NEM.2197},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YanLSLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZadehZBG22,
  author       = {Sepehr Abbasi Zadeh and
                  Farid Zandi and
                  Mohammad Amin Beiruti and
                  Yashar Ganjali},
  title        = {Load migration in distributed softwarized network controllers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2214},
  doi          = {10.1002/NEM.2214},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZadehZBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangLNW22,
  author       = {Rongbo Zhang and
                  Xin Liu and
                  Jibin Niu and
                  Yinqing Wang},
  title        = {A batch delivery mechanism of network update in software-defined wide
                  area networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {32},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/nem.2186},
  doi          = {10.1002/NEM.2186},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangLNW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AnbiahS21,
  author       = {Anix Anbiah and
                  Krishna M. Sivalingam},
  title        = {Optimal segments for forwarding table size minimization in segment-routed
                  SDNs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2142},
  doi          = {10.1002/NEM.2142},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AnbiahS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArfeenHY21,
  author       = {Asad Arfeen and
                  Khizar Ul Haq and
                  Syed Muhammad Yasir},
  title        = {Application layer classification of Internet traffic using ensemble
                  learning models},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2147},
  doi          = {10.1002/NEM.2147},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArfeenHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AslamBR21,
  author       = {Mudassar Aslam and
                  Simon Bouget and
                  Shahid Raza},
  title        = {Security and trust preserving inter- and intra-cloud {VM} migrations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2103},
  doi          = {10.1002/NEM.2103},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AslamBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BarretoRM21,
  author       = {David S. Barreto and
                  Rafael F. Reale and
                  Joberto S. B. Martins},
  title        = {Modeling and accomplishing the {BEREC} network neutrality policy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2148},
  doi          = {10.1002/NEM.2148},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BarretoRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BelmoukadamKB21,
  author       = {Othmane Belmoukadam and
                  Muhammad Jawad Khokhar and
                  Chadi Barakat},
  title        = {On accounting for screen resolution in adaptive video streaming: QoE-driven
                  bandwidth sharing framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2128},
  doi          = {10.1002/NEM.2128},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BelmoukadamKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bertrand-Martinez21,
  author       = {Eddas Bertrand{-}Mart{\'{\i}}nez and
                  Phelipe Dias Feio and
                  Vagner de Brito Nascimento and
                  Fabio Kon and
                  Ant{\^{o}}nio Abel{\'{e}}m},
  title        = {Classification and evaluation of IoT brokers: {A} methodology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2115},
  doi          = {10.1002/NEM.2115},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bertrand-Martinez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CaiLWTT21,
  author       = {Yun{-}Zhan Cai and
                  Ting{-}Yu Lin and
                  Yu{-}Ting Wang and
                  Ya{-}Pei Tuan and
                  Meng{-}Hsun Tsai},
  title        = {E-Replacement: Efficient scanner data collection method in P4-based
                  software-defined networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2162},
  doi          = {10.1002/NEM.2162},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/CaiLWTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CaoZLZFGDC21,
  author       = {Shaohua Cao and
                  Dongjie Zhu and
                  Guofu Li and
                  Yanwu Zhang and
                  Xiani Fan and
                  Shanshan Geng and
                  Haiwen Du and
                  Ning Cao},
  title        = {Research on scheduling method based on traffic matrix for IoT security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2101},
  doi          = {10.1002/NEM.2101},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CaoZLZFGDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChoR21,
  author       = {Choong{-}Hee Cho and
                  Jeong{-}dong Ryoo},
  title        = {Minimizing protection switching time in transport networks with shared
                  mesh protection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2136},
  doi          = {10.1002/NEM.2136},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChoR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DalmazoMCBCSFBA21,
  author       = {Bruno Lopes Dalmazo and
                  Jonatas Adilson Marques and
                  Lucas Rodrigues Costa and
                  Michel S. Bonfim and
                  Ranyelson Neres Carvalho and
                  Anderson Santos da Silva and
                  Stenio Fernandes and
                  Jacir Luiz Bordim and
                  Eduardo Alchieri and
                  Alberto Schaeffer{-}Filho and
                  Luciano Paschoal Gaspary and
                  Weverton Cordeiro},
  title        = {A systematic review on distributed denial of service attack defense
                  mechanisms in programmable networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2163},
  doi          = {10.1002/NEM.2163},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DalmazoMCBCSFBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DawadiRJMK21,
  author       = {Babu R. Dawadi and
                  Danda B. Rawat and
                  Shashidhar R. Joshi and
                  Pietro Manzoni and
                  Martina M. Keitsch},
  title        = {Migration cost optimization for service provider legacy network migration
                  to software-defined IPv6 network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2145},
  doi          = {10.1002/NEM.2145},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DawadiRJMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DiabABLKG21,
  author       = {Diab M. Diab and
                  Basil AsSadhan and
                  Hamad Binsalleeh and
                  Sangarapillai Lambotharan and
                  Konstantinos G. Kyriakopoulos and
                  Ibrahim Ghafir},
  title        = {Denial of service detection using dynamic time warping},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2159},
  doi          = {10.1002/NEM.2159},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DiabABLKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DuranKC21,
  author       = {K{\"{u}}bra Duran and
                  Bahtiyar Karanlik and
                  Berk Canberk},
  title        = {Graph theoretical approach for automated {IP} lifecycle management
                  in telco networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2138},
  doi          = {10.1002/NEM.2138},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DuranKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FarasatK21,
  author       = {Talaya Farasat and
                  Akmal Khan},
  title        = {Detecting and analyzing border gateway protocol blackholing activity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2143},
  doi          = {10.1002/NEM.2143},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FarasatK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GavelRT21,
  author       = {Shashank Gavel and
                  Ajay Singh Raghuvanshi and
                  Sudarshan Tiwari},
  title        = {A multilevel hybrid anomaly detection scheme for industrial wireless
                  sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2144},
  doi          = {10.1002/NEM.2144},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GavelRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GooSLK21,
  author       = {Young{-}Hoon Goo and
                  Kyu{-}Seok Shim and
                  Min{-}Seob Lee and
                  Myung{-}Sup Kim},
  title        = {A message keyword extraction approach by accurate identification of
                  field boundaries},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2140},
  doi          = {10.1002/NEM.2140},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GooSLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimPLLHCYH21,
  author       = {Heegon Kim and
                  Suhyun Park and
                  Stanislav Lange and
                  Doyoung Lee and
                  DongNyeong Heo and
                  Heeyoul Choi and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Graph neural network-based virtual network function deployment optimization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2164},
  doi          = {10.1002/NEM.2164},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimPLLHCYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KundelNBMZKSGHK21,
  author       = {Ralf Kundel and
                  Leonhard Nobach and
                  Jeremias Blendin and
                  Wilfried Maas and
                  Andreas Zimber and
                  Hans{-}Joerg Kolbe and
                  Georg Schyguda and
                  Vladimir Gurevich and
                  Rhaban Hark and
                  Boris Koldehofe and
                  Ralf Steinmetz},
  title        = {OpenBNG: Central office network functions on programmable data plane
                  hardware},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2134},
  doi          = {10.1002/NEM.2134},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KundelNBMZKSGHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeZ21,
  author       = {Duc C. Le and
                  Nur Zincir{-}Heywood},
  title        = {Exploring anomalous behaviour detection and classification for insider
                  threat identification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2109},
  doi          = {10.1002/NEM.2109},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeJKYH21,
  author       = {Doyoung Lee and
                  Seyeon Jeong and
                  Kyungchan Ko and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Deep Q-network-based auto scaling for service in a multi-access edge
                  computing environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2176},
  doi          = {10.1002/NEM.2176},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeJKYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiAW21,
  author       = {Wenjuan Li and
                  Man Ho Au and
                  Yu Wang},
  title        = {A fog-based collaborative intrusion detection framework for smart
                  grid},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2107},
  doi          = {10.1002/NEM.2107},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LinoySR21,
  author       = {Shlomi Linoy and
                  Natalia Stakhanova and
                  Suprio Ray},
  title        = {De-anonymizing Ethereum blockchain smart contracts through code attribution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2130},
  doi          = {10.1002/NEM.2130},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LinoySR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiuLLBLG21,
  author       = {Bo Liu and
                  Jiawei Li and
                  Weiwei Lin and
                  Weihua Bai and
                  Pengfei Li and
                  Qian Gao},
  title        = {{K-PSO:} An improved PSO-based container scheduling algorithm for
                  big data applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2092},
  doi          = {10.1002/NEM.2092},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiuLLBLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MaengELPJ21,
  author       = {Soohoon Maeng and
                  Meryam Essaid and
                  Changhyun Lee and
                  Sejin Park and
                  Hongteak Ju},
  title        = {Visualization of Ethereum {P2P} network topology and peer properties},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2175},
  doi          = {10.1002/NEM.2175},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MaengELPJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MarviAU21,
  author       = {Murk Marvi and
                  Asad Arfeen and
                  Riaz Uddin},
  title        = {A generalized machine learning-based model for the detection of DDoS
                  attacks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2152},
  doi          = {10.1002/NEM.2152},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MarviAU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MarviAU21a,
  author       = {Murk Marvi and
                  Asad Arfeen and
                  Riaz Uddin},
  title        = {An augmented K-means clustering approach for the detection of distributed
                  denial-of-service attacks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2160},
  doi          = {10.1002/NEM.2160},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MarviAU21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MedeirosPRBNCG21,
  author       = {Iago Medeiros and
                  Lucas Pacheco and
                  Denis Ros{\'{a}}rio and
                  Cristiano Both and
                  J{\'{e}}ferson Campos Nobre and
                  Eduardo Cerqueira and
                  Lisandro Zambenedetti Granville},
  title        = {Quality of experience and quality of service-aware handover for video
                  transmission in heterogeneous networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2064},
  doi          = {10.1002/NEM.2064},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MedeirosPRBNCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MengCG21,
  author       = {Weizhi Meng and
                  Piotr Cofta and
                  Tyrone W. A. Grandison},
  title        = {Editorial for special issue on security, trust, and privacy in internet
                  of things: Challenges and solutions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2150},
  doi          = {10.1002/NEM.2150},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MengCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MijumbiAKHZ21,
  author       = {Rashid Mijumbi and
                  Abhaya Asthana and
                  Markku Koivunen and
                  Fu Haiyong and
                  Qinjun Zhu},
  title        = {Design, implementation, and evaluation of learning algorithms for
                  dynamic real-time network monitoring},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2108},
  doi          = {10.1002/NEM.2108},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MijumbiAKHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MoeyersonsFWVT21,
  author       = {Jerico Moeyersons and
                  Behrooz Farkiani and
                  Tim Wauters and
                  Bruno Volckaert and
                  Filip De Turck},
  title        = {Towards distributed emergency flow prioritization in software-defined
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2127},
  doi          = {10.1002/NEM.2127},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MoeyersonsFWVT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MoraesAZ21,
  author       = {Igor Monteiro Moraes and
                  C{\'{e}}lio Albuquerque and
                  Artur Ziviani},
  title        = {Editorial for the special issue on research trends in network operations
                  and management with selected papers from the ninth edition of the
                  Latin American Network Operations and Management Symposium},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2153},
  doi          = {10.1002/NEM.2153},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MoraesAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MuslimIG21,
  author       = {Nasif Muslim and
                  Salekul Islam and
                  Jean{-}Charles Gr{\'{e}}goire},
  title        = {Offloading framework for computation service in the edge cloud and
                  core cloud: {A} case study for face recognition},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2146},
  doi          = {10.1002/NEM.2146},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MuslimIG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NallusamySM21,
  author       = {Priyanka Nallusamy and
                  Sapna Saravanen and
                  Krishnan Murugan},
  title        = {Decision Tree-Based Entries Reduction scheme using multi-match attributes
                  to prevent flow table overflow in {SDN} environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2141},
  doi          = {10.1002/NEM.2141},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NallusamySM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OliveiraM21,
  author       = {Mauricio de Oliveira and
                  Daniel F. Macedo},
  title        = {Slicing Wi-Fi links based on QoE video streaming fairness},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2155},
  doi          = {10.1002/NEM.2155},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/OliveiraM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OliveiraMMGZV21,
  author       = {Alexandre T. Oliveira and
                  Bruno Jos{\'{e}} C. de A. Martins and
                  Marcelo F. Moreno and
                  Ant{\^{o}}nio Tadeu A. Gomes and
                  Artur Ziviani and
                  Alex Borges Vieira},
  title        = {SDN-based architecture for providing quality of service to high-performance
                  distributed applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2078},
  doi          = {10.1002/NEM.2078},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OliveiraMMGZV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OnoGIAS21,
  author       = {Daichi Ono and
                  Luis Guillen and
                  Satoru Izumi and
                  Toru Abe and
                  Takuo Suganuma},
  title        = {A proposal of port scan detection method based on Packet-In Messages
                  in OpenFlow networks and its evaluation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2174},
  doi          = {10.1002/NEM.2174},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OnoGIAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OteroRRVCPC21,
  author       = {Beatriz Otero and
                  Eva Rodr{\'{\i}}guez and
                  Otilio Rojas and
                  Javier Verd{\'{u}} and
                  Juan Jos{\'{e}} Costa and
                  Manuel Alejandro Pajuelo and
                  Ramon Canal},
  title        = {A cost-efficient QoS-aware analytical model of future software content
                  delivery networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2137},
  doi          = {10.1002/NEM.2137},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OteroRRVCPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/QuincozesSNAPM21,
  author       = {Silvio E. Quincozes and
                  Carlos Raniery Paula dos Santos and
                  Raul Ceretta Nunes and
                  C{\'{e}}lio Albuquerque and
                  Diego Gimenez Passos and
                  Daniel Moss{\'{e}}},
  title        = {Counselors network for intrusion detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2111},
  doi          = {10.1002/NEM.2111},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/QuincozesSNAPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RosarioV21,
  author       = {Denis Ros{\'{a}}rio and
                  Leandro A. Villas},
  title        = {Editorial for special issue on selected papers from 23rd edition of
                  the Brazilian Workshop on Network and Service Management {(WGRS)}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2151},
  doi          = {10.1002/NEM.2151},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RosarioV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SeokJZC21,
  author       = {Seung{-}Joon Seok and
                  Hongtaek Ju and
                  Yuncheng Zhu and
                  Jen{-}Jee Chen},
  title        = {Editorial for special issue on "Towards service and networking intelligence
                  for humanity"},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2177},
  doi          = {10.1002/NEM.2177},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SeokJZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SoaresVQFULPFMM21,
  author       = {Arthur Albuquerque Zopellaro Soares and
                  Juan Lucas Vieira and
                  Silvio E. Quincozes and
                  Vinicius C. Ferreira and
                  Luana M. Uch{\^{o}}a and
                  Yona Lopes and
                  Diego Gimenez Passos and
                  Natalia Castro Fernandes and
                  Igor Monteiro Moraes and
                  D{\'{e}}bora C. Muchaluat{-}Saade and
                  C{\'{e}}lio Albuquerque},
  title        = {SDN-based teleprotection and control power systems: {A} study of available
                  controllers and their suitability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2112},
  doi          = {10.1002/NEM.2112},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SoaresVQFULPFMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SousaOVGVBV21,
  author       = {Jos{\'{e}} Eduardo de Azevedo Sousa and
                  Vinicius C. Oliveira and
                  J{\'{u}}lia Valadares and
                  Glauber Dias Gon{\c{c}}alves and
                  Saulo Moraes Villela and
                  Heder Soares Bernardino and
                  Alex Borges Vieira},
  title        = {An analysis of the fees and pending time correlation in Ethereum},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2113},
  doi          = {10.1002/NEM.2113},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SousaOVGVBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SunCLGZL21,
  author       = {Liping Sun and
                  Shang Ci and
                  Xiaoqing Liu and
                  Liangmin Guo and
                  Xiaoyao Zheng and
                  Yonglong Luo},
  title        = {Secure grid-based density peaks clustering on hybrid cloud for industrial
                  IoT},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2139},
  doi          = {10.1002/NEM.2139},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SunCLGZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TanakaKO21,
  author       = {Tomoya Tanaka and
                  Tomio Kamada and
                  Chikara Ohta},
  title        = {Topic allocation method on edge servers for latency-sensitive notification
                  service},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2173},
  doi          = {10.1002/NEM.2173},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TanakaKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VenancioGMTFBFS21,
  author       = {Giovanni Ven{\^{a}}ncio and
                  Vinicius Fulber{-}Garcia and
                  Leonardo da Cruz Marcuzzo and
                  Thales Nicolai Tavares and
                  Muriel Figueredo Franco and
                  Lucas Bondan and
                  Alberto Egon Schaeffer Filho and
                  Carlos Raniery Paula dos Santos and
                  Lisandro Zambenedetti Granville and
                  Elias P. Duarte Jr.},
  title        = {Beyond {VNFM:} Filling the gaps of the {ETSI} {VNF} manager to fully
                  support {VNF} life cycle operations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2068},
  doi          = {10.1002/NEM.2068},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VenancioGMTFBFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VenancioTCD21,
  author       = {Giovanni Ven{\^{a}}ncio and
                  Rog{\'{e}}rio C. Turchetti and
                  Edson Tavares de Camargo and
                  Elias P. Duarte Jr.},
  title        = {VNF-Consensus: {A} virtual network function for maintaining a consistent
                  distributed software-defined network control plane},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2124},
  doi          = {10.1002/NEM.2124},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/VenancioTCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangWQLW21,
  author       = {Wei Wang and
                  Lei Wu and
                  Wenlei Qu and
                  Zhaoman Liu and
                  Hao Wang},
  title        = {Privacy-preserving cloud-fog-based traceable road condition monitoring
                  in {VANET}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2096},
  doi          = {10.1002/NEM.2096},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangWQLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangCCXTZ21,
  author       = {Yidan Zhang and
                  Jiageng Chen and
                  Kaiming Chen and
                  Ruoyan Xu and
                  Jesen Teh and
                  Shuai Zhang},
  title        = {Network traffic identification of several open source secure proxy
                  protocols},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2090},
  doi          = {10.1002/NEM.2090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangCCXTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangWWDHYLZ21,
  author       = {Yuejin Zhang and
                  Meng Wang and
                  Juan Wang and
                  Fei Du and
                  Yong Hu and
                  Meng Yu and
                  Guanghui Li and
                  Aiyun Zhan},
  title        = {Research on adaptive beacon message broadcasting cycle based on vehicle
                  driving stability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2091},
  doi          = {10.1002/NEM.2091},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangWWDHYLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Zincir-HeywoodB21,
  author       = {Nur Zincir{-}Heywood and
                  R{\'{e}}mi Badonnel},
  title        = {{CNSM} 2019 special issue: Embracing the new wave of artificial intelligence},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2149},
  doi          = {10.1002/NEM.2149},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Zincir-HeywoodB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AgrawalT20,
  author       = {Neha Agrawal and
                  Shashikala Tapaswi},
  title        = {A proactive defense method for the stealthy EDoS attacks in a cloud
                  environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2094},
  doi          = {10.1002/NEM.2094},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgrawalT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AliPT20,
  author       = {Shabir Ali and
                  Mayank Pandey and
                  Neeraj Tyagi},
  title        = {Wireless-Fog Mesh: {A} framework for in-network computing of microservices
                  in semipermanent smart environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2125},
  doi          = {10.1002/NEM.2125},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AliPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlsaeedyC20,
  author       = {Alaa A. R. Alsaeedy and
                  Edwin K. P. Chong},
  title        = {A review of mobility management entity in {LTE} networks: Power consumption
                  and signaling overhead},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2088},
  doi          = {10.1002/NEM.2088},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlsaeedyC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArisuYB20,
  author       = {Sevket Arisu and
                  Ertan Yildiz and
                  Ali C. Begen},
  title        = {Game of protocols: Is {QUIC} ready for prime time streaming?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2063},
  doi          = {10.1002/NEM.2063},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArisuYB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AsSadhanABKL20,
  author       = {Basil AsSadhan and
                  Abraham Alzoghaiby and
                  Hamad Binsalleeh and
                  Konstantinos G. Kyriakopoulos and
                  Sangarapillai Lambotharan},
  title        = {Network anomaly detection using a cross-correlation-based long-range
                  dependence analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2129},
  doi          = {10.1002/NEM.2129},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AsSadhanABKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BadarnehRM20,
  author       = {Hazem Jihad Badarneh and
                  Sri Devi Ravana and
                  Ali Mohammed Mansoor},
  title        = {A survey on indexing techniques for mobility in Internet of Things':
                  Challenges, performances, and perspectives},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2097},
  doi          = {10.1002/NEM.2097},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BadarnehRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BarmanZSMM20,
  author       = {Nabajeet Barman and
                  Saman Zadtootaghaj and
                  Steven Schmidt and
                  Maria G. Martini and
                  Sebastian M{\"{o}}ller},
  title        = {An objective and subjective quality assessment study of passive gaming
                  video streaming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2054},
  doi          = {10.1002/NEM.2054},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BarmanZSMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ButerinRLP20,
  author       = {Vitalik Buterin and
                  Dani{\"{e}}l Reijsbergen and
                  Stefanos Leonardos and
                  Georgios Piliouras},
  title        = {Incentives in Ethereum's hybrid Casper protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2098},
  doi          = {10.1002/NEM.2098},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ButerinRLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CetinkayaHHS20,
  author       = {Cihat Cetinkaya and
                  Korhan Herguner and
                  Cornelius Hellge and
                  M{\"{u}}ge Sayit},
  title        = {Segment-aware dynamic routing for {DASH} flows over software-defined
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2102},
  doi          = {10.1002/NEM.2102},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CetinkayaHHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Dinh-XuanPBWH20,
  author       = {Lam Dinh{-}Xuan and
                  Christian Popp and
                  Valentin Burger and
                  Florian Wamser and
                  Tobias Ho{\ss}feld},
  title        = {Impact of {VNF} placements on QoE monitoring in the cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2053},
  doi          = {10.1002/NEM.2053},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Dinh-XuanPBWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DoumanisPXPG20,
  author       = {Ioannis Doumanis and
                  Alexander Phinikarides and
                  George Xylomenos and
                  Stuart Porter and
                  Michael Georgiades},
  title        = {Improving video QoE with {IP} over {ICN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2057},
  doi          = {10.1002/NEM.2057},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DoumanisPXPG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/EssaidPJ20,
  author       = {Meryam Essaid and
                  Sejin Park and
                  Hongtaek Ju},
  title        = {Bitcoin's dynamic peer-to-peer topology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2106},
  doi          = {10.1002/NEM.2106},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/EssaidPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GorenfloLGK20,
  author       = {Christian Gorenflo and
                  Stephen Lee and
                  Lukasz Golab and
                  Srinivasan Keshav},
  title        = {FastFabric: Scaling hyperledger fabric to 20 000 transactions per
                  second},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2099},
  doi          = {10.1002/NEM.2099},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GorenfloLGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hamidi-AlaouiMA20,
  author       = {Zakaria Hamidi{-}Alaoui and
                  Noureddine Moussa and
                  Abdelbaki El Belrhiti El Alaoui},
  title        = {CL-MIPv6: {A} cross-layer approach for fast-internetwork-mobility
                  support in 6LoWPAN wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2123},
  doi          = {10.1002/NEM.2123},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hamidi-AlaouiMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HarutyunyanRKA20,
  author       = {Davit Harutyunyan and
                  Roberto Riggio and
                  Slawomir Kuklinski and
                  Toufik Ahmed},
  title        = {{CU} placement over a reconfigurable wireless fronthaul in 5G networks
                  with functional splits},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2086},
  doi          = {10.1002/NEM.2086},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HarutyunyanRKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HoyeWTV20,
  author       = {Laurens Van Hoye and
                  Tim Wauters and
                  Filip De Turck and
                  Bruno Volckaert},
  title        = {Trustful ad hoc cross-organizational data exchanges based on the Hyperledger
                  Fabric framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2131},
  doi          = {10.1002/NEM.2131},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HoyeWTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangH20,
  author       = {Huai{-}Sheng Huang and
                  Da{-}Yu Hung},
  title        = {Dynamic credit reservation for online charging of regular Internet
                  of things traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2114},
  doi          = {10.1002/NEM.2114},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HusicBCSODZ20,
  author       = {Jasmina Barakovic Husic and
                  Sabina Barakovic and
                  Enida Cero and
                  Nina Slamnik and
                  Merima Ocuz and
                  Azer Dedovic and
                  Osman Zupcic},
  title        = {Quality of experience for unified communications: {A} survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2083},
  doi          = {10.1002/NEM.2083},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HusicBCSODZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JuBKS20,
  author       = {Hongtaek Ju and
                  Raouf Boutaba and
                  Myung{-}Sup Kim and
                  Burkhard Stiller},
  title        = {Editorial for special issue on "challenges and opportunities of Blockchain
                  and Cryptocurrency"},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2133},
  doi          = {10.1002/NEM.2133},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JuBKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeonardosRP20,
  author       = {Stefanos Leonardos and
                  Dani{\"{e}}l Reijsbergen and
                  Georgios Piliouras},
  title        = {Weighted voting on the blockchain: Improving consensus in proof of
                  stake protocols},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2093},
  doi          = {10.1002/NEM.2093},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeonardosRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MoeyersonsMTV20,
  author       = {Jerico Moeyersons and
                  Pieter{-}Jan Maenhaut and
                  Filip De Turck and
                  Bruno Volckaert},
  title        = {Pluggable {SDN} framework for managing heterogeneous {SDN} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2087},
  doi          = {10.1002/NEM.2087},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MoeyersonsMTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MoreiraMPS20,
  author       = {Jo{\~{a}}o Bourbon Moreira and
                  Henrique S. Mamede and
                  Vasco Pereira and
                  Bruno Sousa},
  title        = {Next generation of microservices for the 5G Service-Based Architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2132},
  doi          = {10.1002/NEM.2132},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MoreiraMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MostafaeiLLRB20,
  author       = {Habib Mostafaei and
                  Gabriele Lospoto and
                  Roberto di Lallo and
                  Massimo Rimondini and
                  Giuseppe Di Battista},
  title        = {A framework for multi-provider virtual private networks in software-defined
                  federated networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2116},
  doi          = {10.1002/NEM.2116},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MostafaeiLLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PandeyPC20,
  author       = {Suman Pandey and
                  Soyoung Park and
                  Mi{-}Jung Choi},
  title        = {Community oriented in-network caching and edge caching for over-the-top
                  services in adaptive network conditions to improve performance},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2104},
  doi          = {10.1002/NEM.2104},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PandeyPC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SchepperCFL20,
  author       = {Tom De Schepper and
                  Miguel Camelo and
                  Jeroen Famaey and
                  Steven Latr{\'{e}}},
  title        = {Traffic classification at the radio spectrum level using deep learning
                  models trained with synthetic data},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2100},
  doi          = {10.1002/NEM.2100},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SchepperCFL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SchwindMAGW20,
  author       = {Anika Schwind and
                  Cise Midoglu and
                  {\"{O}}zg{\"{u}} Alay and
                  Carsten Griwodz and
                  Florian Wamser},
  title        = {Dissecting the performance of YouTube video streaming in mobile networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2058},
  doi          = {10.1002/NEM.2058},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SchwindMAGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShimGLK20,
  author       = {Kyu{-}Seok Shim and
                  Young{-}Hoon Goo and
                  Min{-}Seob Lee and
                  Myung{-}Sup Kim},
  title        = {Clustering method in protocol reverse engineering for industrial protocols},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2126},
  doi          = {10.1002/NEM.2126},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShimGLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SilvaBLNR20,
  author       = {Simon Da Silva and
                  Joachim Bruneau{-}Queyreix and
                  Mathias Lacaud and
                  Daniel N{\'{e}}gru and
                  Laurent R{\'{e}}veill{\`{e}}re},
  title        = {Muslin: {A} QoE-aware {CDN} resources provisioning and advertising
                  system for cost-efficient multisource live streaming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2081},
  doi          = {10.1002/NEM.2081},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SilvaBLNR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TadiKF20,
  author       = {Ali Abbasi Tadi and
                  Mohammad Reza Khayyambashi and
                  Hadi Khosravi Farsani},
  title        = {{OASM:} An overload-aware workload scheduling method for cloud computing
                  based on biogeographical optimization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2105},
  doi          = {10.1002/NEM.2105},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TadiKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WamserAMV20,
  author       = {Florian Wamser and
                  {\"{O}}zg{\"{u}} Alay and
                  Florian Metzger and
                  Stefan Valentin},
  title        = {{IJNM} Special Issue - International Journal of Network Management:
                  QoE-centric analysis and management of communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2110},
  doi          = {10.1002/NEM.2110},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WamserAMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XuMSN20,
  author       = {Lei Xu and
                  Isaac M. Markus and
                  I Subhod and
                  Nikhil Nayab},
  title        = {Blockchain-based access control for enterprise blockchain applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2089},
  doi          = {10.1002/NEM.2089},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/XuMSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XuPGQH20,
  author       = {Siya Xu and
                  Xujing Peng and
                  Shaoyong Guo and
                  Xuesong Qiu and
                  Wenchen He},
  title        = {QoS-aware cross-domain collaborative energy-saving mechanism for FiWi
                  virtual networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2095},
  doi          = {10.1002/NEM.2095},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/XuPGQH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZengLZC20,
  author       = {Xiaoping Zeng and
                  Qi Luo and
                  Jiali Zheng and
                  Guanghui Chen},
  title        = {An efficient neural network optimized by fruit fly optimization algorithm
                  for user equipment association in software-defined wireless sensor
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {30},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/nem.2135},
  doi          = {10.1002/NEM.2135},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZengLZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BreskovicB19,
  author       = {Damir Breskovic and
                  Dinko Begusic},
  title        = {Techno-economic analysis of FiWi access networks based on optimized
                  source packet traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2069},
  doi          = {10.1002/NEM.2069},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BreskovicB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CallegatiC19,
  author       = {Franco Callegati and
                  Walter Cerroni},
  title        = {{IEEE} NetSoft 2017 special issue: Softwarization sustaining a hyper-connected
                  world: En route to 5G},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2048},
  doi          = {10.1002/NEM.2048},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CallegatiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CastroCMS19,
  author       = {Tiago O. Castro and
                  Vitor Gabriel Reis Caitit{\'{e}} and
                  Daniel F. Macedo and
                  Aldri L. dos Santos},
  title        = {CASA-IoT: Scalable and context-aware IoT access control supporting
                  multiple users},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2084},
  doi          = {10.1002/NEM.2084},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/CastroCMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChiaraviglioABD19,
  author       = {Luca Chiaraviglio and
                  Lavinia Amorosi and
                  Nicola Blefari{-}Melazzi and
                  Paolo Dell'Olmo and
                  Mohammad Shojafar and
                  Stefano Salsano},
  title        = {Optimal management of reusable functional blocks in 5G superfluid
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2045},
  doi          = {10.1002/NEM.2045},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChiaraviglioABD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CostaNPCAA19,
  author       = {Leonardo B. da Costa and
                  Andr{\'{e}} Silva Neto and
                  Billy Pinheiro and
                  Weverton Cordeiro and
                  Roberto Ara{\'{u}}jo and
                  Ant{\^{o}}nio Abel{\'{e}}m},
  title        = {Securing light clients in blockchain with {DLCP}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2055},
  doi          = {10.1002/NEM.2055},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CostaNPCAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DavoliCTBCC19,
  author       = {Gianluca Davoli and
                  Walter Cerroni and
                  Slavica Tomovic and
                  Chiara Buratti and
                  Chiara Contoli and
                  Franco Callegati},
  title        = {Intent-based service management for heterogeneous software-defined
                  infrastructure domains},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2051},
  doi          = {10.1002/NEM.2051},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DavoliCTBCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FanouSVMC19,
  author       = {Rod{\'{e}}rick Fanou and
                  Victor Sanchez{-}Ag{\"{u}}ero and
                  Francisco Valera and
                  Michuki Mwangi and
                  Jane Coffin},
  title        = {A system for profiling the IXPs in a region and monitoring their growth:
                  Spotlight at the internet frontier},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2056},
  doi          = {10.1002/NEM.2056},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/FanouSVMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FungFCZ19,
  author       = {Carol J. Fung and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Weverton Cordeiro and
                  Mohamed Faten Zhani},
  title        = {Advanced security management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2070},
  doi          = {10.1002/NEM.2070},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/FungFCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GeronimoUW19,
  author       = {Guilherme Arthur Geronimo and
                  Rafael Brundo Uriarte and
                  Carlos Becker Westphall},
  title        = {Order@Cloud: An agnostic meta-heuristic for {VM} provisioning, adaptation,
                  and organisation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2085},
  doi          = {10.1002/NEM.2085},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GeronimoUW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GileshKJ19,
  author       = {Malayam Parambath Gilesh and
                  S. D. Madhu Kumar and
                  Lillykutty Jacob},
  title        = {Resource availability-aware adaptive provisioning of virtual data
                  center networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2066},
  doi          = {10.1002/NEM.2066},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GileshKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HasanovaBSCK19,
  author       = {Huru Hasanova and
                  Ui{-}Jun Baek and
                  Mu{-}Gon Shin and
                  Kyunghee Cho and
                  Myung{-}Sup Kim},
  title        = {A survey on blockchain cybersecurity vulnerabilities and possible
                  countermeasures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2060},
  doi          = {10.1002/NEM.2060},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HasanovaBSCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HyunTYH19,
  author       = {Jonghwan Hyun and
                  Nguyen Van Tu and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Real-time and fine-grained network monitoring using in-band network
                  telemetry},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2080},
  doi          = {10.1002/NEM.2080},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HyunTYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LagraaCF19,
  author       = {Sofiane Lagraa and
                  Yutian Chen and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois},
  title        = {Deep mining port scans from darknet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2065},
  doi          = {10.1002/NEM.2065},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LagraaCF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LemosRMCH19,
  author       = {Marcus Lemos and
                  Ricardo A. L. Rab{\^{e}}lo and
                  Douglas Mendes and
                  Carlos Giovanni Carvalho and
                  Raimir Holanda},
  title        = {An approach for provisioning virtual sensors in sensor clouds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2062},
  doi          = {10.1002/NEM.2062},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LemosRMCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MiyamuraMK19,
  author       = {Takashi Miyamura and
                  Akira Misawa and
                  Junichi Kani},
  title        = {Highly efficient optical aggregation network with network functions
                  virtualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2052},
  doi          = {10.1002/NEM.2052},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MiyamuraMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PalmaVPM19,
  author       = {Lucas M. Palma and
                  Mart{\'{\i}}n A. Gagliotti Vigil and
                  Fernando Lauro Pereira and
                  Jean Everson Martina},
  title        = {Blockchain and smart contracts for higher education registry in Brazil},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2061},
  doi          = {10.1002/NEM.2061},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PalmaVPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PektasA19,
  author       = {Abdurrahman Pektas and
                  Tankut Acarman},
  title        = {A deep learning method to detect network intrusion through flow-based
                  features},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2050},
  doi          = {10.1002/NEM.2050},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PektasA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PeusterKK19,
  author       = {Manuel Peuster and
                  Hannes Kuttner and
                  Holger Karl},
  title        = {A flow handover protocol to support state migration in softwarized
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2067},
  doi          = {10.1002/NEM.2067},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PeusterKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PhanZ19,
  author       = {Tien D. Phan and
                  Nur Zincir{-}Heywood},
  title        = {User identification via neural network based language models},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2049},
  doi          = {10.1002/NEM.2049},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/PhanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PontarelliBB19,
  author       = {Salvatore Pontarelli and
                  Marco Bonola and
                  Giuseppe Bianchi},
  title        = {Smashing OpenFlow's "atomic" actions: Programmable data plane packet
                  manipulation in hardware},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2043},
  doi          = {10.1002/NEM.2043},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PontarelliBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PrasathP19,
  author       = {Mahesh Kumar Prasath and
                  Balasubramani Perumal},
  title        = {A meta-heuristic Bayesian network classification for intrusion detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2047},
  doi          = {10.1002/NEM.2047},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PrasathP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RebecchiBNBC19,
  author       = {Filippo Rebecchi and
                  Julien Boite and
                  Pierre{-}Alexis Nardin and
                  Mathieu Bouet and
                  Vania Conan},
  title        = {DDoS protection with stateful software-defined networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2042},
  doi          = {10.1002/NEM.2042},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RebecchiBNBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShuklaPS19,
  author       = {Nitin Shukla and
                  Mayank Pandey and
                  Shashank Srivastava},
  title        = {Formal modeling and verification of software-defined networks: {A}
                  survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2082},
  doi          = {10.1002/NEM.2082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShuklaPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Vasilomanolakis19,
  author       = {Emmanouil Vasilomanolakis and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Detection and mitigation of monitor identification attacks in collaborative
                  intrusion detection systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2059},
  doi          = {10.1002/NEM.2059},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Vasilomanolakis19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XavierGTV19,
  author       = {Rafael Xavier and
                  Lisandro Zambenedetti Granville and
                  Filip De Turck and
                  Bruno Volckaert},
  title        = {Efficient allocation of elastic interfederation encrypted streaming
                  sessions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {29},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/nem.2079},
  doi          = {10.1002/NEM.2079},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/XavierGTV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AntunesDCMS18,
  author       = {Josu{\'{e}} B. Antunes and
                  Istv{\'{a}}n L. Den{\'{e}}s and
                  Tiago O. Castro and
                  Daniel F. Macedo and
                  Aldri L. dos Santos},
  title        = {ManIoT: {A} 2-tier management platform for heterogeneous IoT devices
                  and applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2034},
  doi          = {10.1002/NEM.2034},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AntunesDCMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BarshanMVT18,
  author       = {Maryam Barshan and
                  Hendrik Moens and
                  Bruno Volckaert and
                  Filip De Turck},
  title        = {A flexible, reliable, and adaptive timeslot-based advance bandwidth-reservation
                  mechanism for media delivery services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2020},
  doi          = {10.1002/NEM.2020},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BarshanMVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BennaceurIS18,
  author       = {Jihen Bennaceur and
                  Hanen Idoudi and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {Trust management in cognitive radio networks: {A} survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1999},
  doi          = {10.1002/NEM.1999},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BennaceurIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BoudiaSF18,
  author       = {Omar Rafik Merad Boudia and
                  Sidi Mohammed Senouci and
                  Mohammed Feham},
  title        = {Secure and efficient verification for data aggregation in wireless
                  sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2000},
  doi          = {10.1002/NEM.2000},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BoudiaSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BoussadaGF18,
  author       = {Mohamed El Hedi Boussada and
                  Jean{-}Marie Garcia and
                  Mounir Frikha},
  title        = {New fluid approaches for studying the performance of elastic traffic
                  under class based weighed fair queuing system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2037},
  doi          = {10.1002/NEM.2037},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BoussadaGF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CaiJM18,
  author       = {Xuejun Cai and
                  Wolfgang John and
                  Catalin Meirosu},
  title        = {Automatic data aggregation for recursively modeled {NFV} services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2009},
  doi          = {10.1002/NEM.2009},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CaiJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChoiGK18,
  author       = {Nak{-}Jung Choi and
                  Moneeb Gohar and
                  Seok Joo Koh},
  title        = {Domain-based distributed identifier-locator mapping management in
                  Internet-of-Things networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2035},
  doi          = {10.1002/NEM.2035},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChoiGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ClaeysBVSLLT18,
  author       = {Maxim Claeys and
                  Niels Bouten and
                  Danny De Vleeschauwer and
                  Koen De Schepper and
                  Werner Van Leekwijck and
                  Steven Latr{\'{e}} and
                  Filip De Turck},
  title        = {Deadline-aware {TCP} congestion control for {HTTP} adaptive streaming
                  services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2023},
  doi          = {10.1002/NEM.2023},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ClaeysBVSLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DongYGFLW18,
  author       = {Ligang Dong and
                  Dandan Yang and
                  Kaiqiang Guo and
                  Shuocheng Fei and
                  Ying Li and
                  Weiming Wang},
  title        = {The research on a novel structure of two-layer distributed controllers
                  in software-defined networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2016},
  doi          = {10.1002/NEM.2016},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DongYGFLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DridiZ18,
  author       = {Lobna Dridi and
                  Mohamed Faten Zhani},
  title        = {A holistic approach to mitigating DoS attacks in {SDN} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1996},
  doi          = {10.1002/NEM.1996},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DridiZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DusiaS18,
  author       = {Ayush Dusia and
                  Adarshpal S. Sethi},
  title        = {Probe generation for active probing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2021},
  doi          = {10.1002/NEM.2021},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DusiaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FotiouA18,
  author       = {Nikos Fotiou and
                  Bander A. Alzahrani},
  title        = {Rendezvous-based access control for information-centric architectures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2007},
  doi          = {10.1002/NEM.2007},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FotiouA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FungZCF18,
  author       = {Carol J. Fung and
                  Mohamed Faten Zhani and
                  Weverton Cordeiro and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois},
  title        = {Special issue on security for emerging open networking technologies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2010},
  doi          = {10.1002/NEM.2010},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/FungZCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GanesanM18,
  author       = {Vennila Ganesan and
                  M. S. K. Manikandan},
  title        = {A scalable detection and prevention scheme for voice over internet
                  protocol (VoIP) signaling attacks using handler with Bloom filter},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1995},
  doi          = {10.1002/NEM.1995},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GanesanM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HanVALHSH18,
  author       = {Yoonseon Han and
                  Thomas Vachuska and
                  Ali Al{-}Shabibi and
                  Jian Li and
                  Huibai Huang and
                  William Snow and
                  James Won{-}Ki Hong},
  title        = {ONVisor: Towards a scalable and flexible SDN-based network virtualization
                  platform on {ONOS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2012},
  doi          = {10.1002/NEM.2012},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HanVALHSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HooftBVLWLT18,
  author       = {Jeroen van der Hooft and
                  Niels Bouten and
                  Danny De Vleeschauwer and
                  Werner Van Leekwijck and
                  Tim Wauters and
                  Steven Latr{\'{e}} and
                  Filip De Turck},
  title        = {Clustering-based quality selection heuristics for {HTTP} adaptive
                  streaming over cache networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2046},
  doi          = {10.1002/NEM.2046},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HooftBVLWLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimLHS18,
  author       = {Woojoong Kim and
                  Jian Li and
                  James Won{-}Ki Hong and
                  Young{-}Joo Suh},
  title        = {HeS-CoP: Heuristic switch-controller placement scheme for distributed
                  {SDN} controllers in data center networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2015},
  doi          = {10.1002/NEM.2015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimLHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KreugerSGG18,
  author       = {Per Kreuger and
                  Rebecca Steinert and
                  Olof G{\"{o}}rnerup and
                  Daniel Gillblad},
  title        = {Distributed dynamic load balancing with applications in radio access
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2014},
  doi          = {10.1002/NEM.2014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KreugerSGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KwonKJ18,
  author       = {Dongwoo Kwon and
                  Hyeonwoo Kim and
                  Hongtaek Ju},
  title        = {PlaySharing: {A} group synchronization scheme for media streaming
                  services in hierarchical WLANs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2024},
  doi          = {10.1002/NEM.2024},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KwonKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LamLLO18,
  author       = {Jun Huy Lam and
                  Sanggon Lee and
                  Hoon{-}Jae Lee and
                  Yustus Eko Oktian},
  title        = {Design, implementation, and performance evaluation of identity-based
                  cryptography in {ONOS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1990},
  doi          = {10.1002/NEM.1990},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LamLLO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MetongnonS18,
  author       = {Lionel Metongnon and
                  Ramin Sadre},
  title        = {Fast and efficient probing of heterogeneous IoT networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1997},
  doi          = {10.1002/NEM.1997},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MetongnonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PektasA18,
  author       = {Abdurrahman Pektas and
                  Tankut Acarman},
  title        = {Botnet detection based on network flow summary and deep learning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2039},
  doi          = {10.1002/NEM.2039},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PektasA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RezendeCFCP18,
  author       = {Pedro H. A. Rezende and
                  Paulo R. S. L. Coelho and
                  Luis F. Faina and
                  L{\'{a}}saro J. Camargos and
                  Rafael Pasquini},
  title        = {Analysis of monitoring and multipath support on top of OpenFlow specification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2017},
  doi          = {10.1002/NEM.2017},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RezendeCFCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SahooTSDN18,
  author       = {Kshira Sagar Sahoo and
                  Mayank Tiwary and
                  Bibhudatta Sahoo and
                  Ratnakar Dash and
                  Kshirasagar Naik},
  title        = {{DSSDN:} Demand-supply based load balancing in Software-Defined Wide-Area
                  Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2022},
  doi          = {10.1002/NEM.2022},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SahooTSDN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SamirARS18,
  author       = {Mohamed Samir and
                  Mohamed Azab and
                  Mohamed R. M. Rizk and
                  Nayera M. Sadek},
  title        = {{PYGRID:} {A} software development and assessment framework for grid-aware
                  software defined networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2033},
  doi          = {10.1002/NEM.2033},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SamirARS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SantannaVSTGP18,
  author       = {Jos{\'{e}} Jair Santanna and
                  Joey de Vries and
                  Ricardo de Oliveira Schmidt and
                  Daphn{\'{e}} Tuncer and
                  Lisandro Zambenedetti Granville and
                  Aiko Pras},
  title        = {Booter list generation: The basis for investigating DDoS-for-hire
                  websites},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2008},
  doi          = {10.1002/NEM.2008},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SantannaVSTGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SebrechtsSWVT18,
  author       = {Merlijn Sebrechts and
                  Gregory van Seghbroeck and
                  Tim Wauters and
                  Bruno Volckaert and
                  Filip De Turck},
  title        = {Orchestrator conversation: Distributed management of cloud applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2036},
  doi          = {10.1002/NEM.2036},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SebrechtsSWVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SethomP18,
  author       = {Kaouthar Sethom and
                  Guy Pujolle},
  title        = {Spectrum mobility management in cognitive two-tier networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2019},
  doi          = {10.1002/NEM.2019},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SethomP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShimYSPCK18,
  author       = {Kyu{-}Seok Shim and
                  Sung{-}Ho Yoon and
                  Baraka D. Sija and
                  Jun{-}Sang Park and
                  Kyunghee Cho and
                  Myung{-}Sup Kim},
  title        = {Effective behavior signature extraction method using sequence pattern
                  algorithm for traffic identification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2011},
  doi          = {10.1002/NEM.2011},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShimYSPCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SilvaLSB18,
  author       = {Jorge S{\'{a}} Silva and
                  Antonio A. F. Loureiro and
                  Antonio F. Skarmeta and
                  Fernando Boavida},
  title        = {Special issue on management of IoT},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2032},
  doi          = {10.1002/NEM.2032},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SilvaLSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SilvaMTMZ18,
  author       = {Bruno Silva and
                  R{\'{u}}bens de Souza Matos J{\'{u}}nior and
                  Eduardo Tavares and
                  Paulo Romero Martins Maciel and
                  Armin Zimmermann},
  title        = {Sensitivity analysis of an availability model for disaster tolerant
                  cloud computing system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2040},
  doi          = {10.1002/NEM.2040},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SilvaMTMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SinghS18,
  author       = {Ashutosh Kumar Singh and
                  Shashank Srivastava},
  title        = {A survey and classification of controller placement problem in {SDN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2018},
  doi          = {10.1002/NEM.2018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SinghS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SouzaCO18,
  author       = {Artur L. F. Souza and
                  {\'{I}}talo Cunha and
                  Leonardo B. Oliveira},
  title        = {NomadiKey: User authentication for smart devices based on nomadic
                  keys},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1998},
  doi          = {10.1002/NEM.1998},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SouzaCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/UddinSC18,
  author       = {Misbah Uddin and
                  Rolf Stadler and
                  Alexander Clemm},
  title        = {A bottom-up design for spatial search in large networks and clouds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2041},
  doi          = {10.1002/NEM.2041},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/UddinSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VegaMJVMA18,
  author       = {Carlos Vega and
                  Eduardo Miravalls{-}Sierra and
                  Guillermo Juli{\'{a}}n{-}Moreno and
                  Jorge E. L{\'{o}}pez de Vergara and
                  Eduardo Maga{\~{n}}a and
                  Javier Aracil},
  title        = {On the design and performance evaluation of automatic traffic report
                  generation systems with huge data volumes},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2044},
  doi          = {10.1002/NEM.2044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/VegaMJVMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YanggratokeAAFJ18,
  author       = {Rerngvit Yanggratoke and
                  Jawwad Ahmed and
                  John Ardelius and
                  Christofer Flinta and
                  Andreas Johnsson and
                  Daniel Gillblad and
                  Rolf Stadler},
  title        = {A service-agnostic method for predicting service metrics in real time},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.1991},
  doi          = {10.1002/NEM.1991},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YanggratokeAAFJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZarcaBFKTS18,
  author       = {Alejandro Molina Zarca and
                  Jorge Bernal Bernab{\'{e}} and
                  Ivan Farris and
                  Yacine Khettab and
                  Tarik Taleb and
                  Antonio F. Skarmeta},
  title        = {Enhancing IoT security through network softwarization and virtual
                  security appliances},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2038},
  doi          = {10.1002/NEM.2038},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZarcaBFKTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangLSHL18,
  author       = {Shouli Zhang and
                  Chen Liu and
                  Shen Su and
                  Yanbo Han and
                  Xiaohong Li},
  title        = {A feature extraction method for predictive maintenance with time-lagged
                  correlation-based curve-registration model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2025},
  doi          = {10.1002/NEM.2025},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangLSHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhmadiVPB17,
  author       = {Hanen Ahmadi and
                  Federico Viani and
                  Alessandro Polo and
                  Ridha Bouallegue},
  title        = {Learning ensemble strategy for static and dynamic localization in
                  wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1979},
  doi          = {10.1002/NEM.1979},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhmadiVPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AouadjLDS17,
  author       = {Messaoud Aouadj and
                  Emmanuel Lavinal and
                  Thierry Desprats and
                  Michelle Sibilla},
  title        = {AirNet: An Edge-Fabric abstraction model to manage software-defined
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1983},
  doi          = {10.1002/NEM.1983},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AouadjLDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AwadEDRBA17,
  author       = {Mohamad Khattar Awad and
                  Mohammed El{-}Shafei and
                  Tassos Dimitriou and
                  Yousef Rafique and
                  Mohammed W. Baidas and
                  Ammar Alhusaini},
  title        = {Power-efficient routing for {SDN} with discrete link rates and size-limited
                  flow tables: {A} tree-based particle swarm optimization approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1972},
  doi          = {10.1002/NEM.1972},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AwadEDRBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BadonnelKTS17,
  author       = {R{\'{e}}mi Badonnel and
                  Kazuhiko Kinoshita and
                  Daphn{\'{e}} Tuncer and
                  Sejun Song},
  title        = {Special Issue on management of SDN/NFV-based systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1982},
  doi          = {10.1002/NEM.1982},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BadonnelKTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BatallaMM17,
  author       = {Jordi Mongay Batalla and
                  George Mastorakis and
                  Constandinos X. Mavromoustakis},
  title        = {Special issue on management of the Internet of things and big data},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1971},
  doi          = {10.1002/NEM.1971},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BatallaMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BifulcoMS17,
  author       = {Roberto Bifulco and
                  Anton Matsiuk and
                  Alessio Silvestro},
  title        = {{CATENAE:} {A} scalable service function chaining system for legacy
                  mobile networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1965},
  doi          = {10.1002/NEM.1965},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BifulcoMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CaoFQSZ17,
  author       = {Jie Cao and
                  Zhiyi Fang and
                  Guannan Qu and
                  Hongyu Sun and
                  Dan Zhang},
  title        = {An accurate traffic classification model based on support vector machines},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1962},
  doi          = {10.1002/NEM.1962},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CaoFQSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CasconeSPCS17,
  author       = {Carmelo Cascone and
                  Davide Sanvito and
                  Luca Pollini and
                  Antonio Capone and
                  Brunilde Sans{\`{o}}},
  title        = {Fast failure detection and recovery in {SDN} with stateful data plane},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1957},
  doi          = {10.1002/NEM.1957},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CasconeSPCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DiaoZ17,
  author       = {Yixin Diao and
                  Nur Zincir{-}Heywood},
  title        = {Big data analytics for network and service management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1974},
  doi          = {10.1002/NEM.1974},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DiaoZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DraxlerK17,
  author       = {Sevil Dr{\"{a}}xler and
                  Holger Karl},
  title        = {Specification, composition, and placement of network services with
                  flexible structures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1963},
  doi          = {10.1002/NEM.1963},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DraxlerK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GoharBCKA17,
  author       = {Moneeb Gohar and
                  Faisal Bashir and
                  Jin{-}Ghoo Choi and
                  Seok Joo Koh and
                  Waleed Ahmad},
  title        = {A hash-based distributed mapping control scheme in mobile locator-identifier
                  separation protocol networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1961},
  doi          = {10.1002/NEM.1961},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GoharBCKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GuizaniH17,
  author       = {Zeineb Guizani and
                  Noureddine Hamdi},
  title        = {CRAN, H-CRAN, and {F-RAN} for 5G systems: Key capabilities and recent
                  advances},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1973},
  doi          = {10.1002/NEM.1973},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GuizaniH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HaddadiZ17,
  author       = {Fariba Haddadi and
                  Nur Zincir{-}Heywood},
  title        = {Botnet behaviour analysis: How would a data analytics-based system
                  with minimum a priori information perform?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1977},
  doi          = {10.1002/NEM.1977},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HaddadiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HeYWT17,
  author       = {Jie He and
                  Yuexiang Yang and
                  Xiaolei Wang and
                  Zhiguo Tan},
  title        = {Adaptive traffic sampling for {P2P} botnet detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1992},
  doi          = {10.1002/NEM.1992},
  timestamp    = {Tue, 20 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HeYWT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HouZLCZ17,
  author       = {Lu Hou and
                  Shaohang Zhao and
                  Xing Li and
                  Periklis Chatzimisios and
                  Kan Zheng},
  title        = {Design and implementation of application programming interface for
                  Internet of things cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1936},
  doi          = {10.1002/NEM.1936},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HouZLCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HsuHKTL17,
  author       = {Huai{-}Wen Hsu and
                  Kuei{-}Li Huang and
                  Yi{-}Chih Kao and
                  Shi{-}Chun Tsai and
                  Yi{-}Bing Lin},
  title        = {Deploying {WLAN} service with OpenFlow technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1970},
  doi          = {10.1002/NEM.1970},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HsuHKTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JiangKMSHC17,
  author       = {Qi Jiang and
                  Neeraj Kumar and
                  Jianfeng Ma and
                  Jian Shen and
                  Debiao He and
                  Naveen K. Chilamkurti},
  title        = {A privacy-aware two-factor authentication protocol based on elliptic
                  curve cryptography for wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1937},
  doi          = {10.1002/NEM.1937},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JiangKMSHC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KarolewiczBBMM17,
  author       = {Konrad Karolewicz and
                  Andrzej Beben and
                  Jordi Mongay Batalla and
                  George Mastorakis and
                  Constandinos X. Mavromoustakis},
  title        = {On efficient data storage service for IoT},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1932},
  doi          = {10.1002/NEM.1932},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KarolewiczBBMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KaurKS17,
  author       = {Rajbir Kaur and
                  Navroop Kaur and
                  Sandeep K. Sood},
  title        = {Security in IoT network based on stochastic game net model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1975},
  doi          = {10.1002/NEM.1975},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KaurKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KaurS17,
  author       = {Navroop Kaur and
                  Sandeep K. Sood},
  title        = {Dynamic resource allocation for big data streams based on data characteristics
                  (5Vs)},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1978},
  doi          = {10.1002/NEM.1978},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KaurS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KhazaeiM17,
  author       = {Mehdi Khazaei and
                  Nasser Mozayani},
  title        = {Overload management with regard to fairness in session initiation
                  protocol networks by holonic multiagent systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1969},
  doi          = {10.1002/NEM.1969},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KhazaeiM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KhosraviK17,
  author       = {Habib Allah Khosravi and
                  Mohammad Reza Khayyambashi},
  title        = {A system for providing load-aware virtual network service in a software-defined
                  data center network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1989},
  doi          = {10.1002/NEM.1989},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KhosraviK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KurekNLP17,
  author       = {Tytus Kurek and
                  Marcin Niemiec and
                  Artur Lason and
                  Andrzej R. Pach},
  title        = {Universal privacy-preserving platform for SecaaS services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1994},
  doi          = {10.1002/NEM.1994},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KurekNLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiberatiGPSGTDP17,
  author       = {Francesco Liberati and
                  Alessandro Giuseppi and
                  Antonio Pietrabissa and
                  Vincenzo Suraci and
                  Alessandro Di Giorgio and
                  Marco Trubian and
                  David Dietrich and
                  Panagiotis Papadimitriou and
                  Francesco Delli Priscoli},
  title        = {Stochastic and exact methods for service mapping in virtualized network
                  infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1985},
  doi          = {10.1002/NEM.1985},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiberatiGPSGTDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiuGLZF17,
  author       = {Zehui Liu and
                  Deyun Gao and
                  Ying Liu and
                  Hongke Zhang and
                  Chuan Heng Foh},
  title        = {An adaptive approach for elephant flow detection with the rapidly
                  changing traffic in data center network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1987},
  doi          = {10.1002/NEM.1987},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiuGLZF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MoyanoFBG17,
  author       = {Ricardo Flores Moyano and
                  David Fern{\'{a}}ndez and
                  Luis Bellido and
                  Carlos Gonz{\'{a}}lez},
  title        = {A software-defined networking approach to improve service provision
                  in residential networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1984},
  doi          = {10.1002/NEM.1984},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MoyanoFBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NarmanliogluZ17,
  author       = {Omer Narmanlioglu and
                  Engin Zeydan},
  title        = {New Era in shared cellular networks: Moving into open and virtualized
                  platform},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1986},
  doi          = {10.1002/NEM.1986},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NarmanliogluZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NaudtsFMVSC17,
  author       = {Bram Naudts and
                  Mario Flores and
                  Rashid Mijumbi and
                  Sofie Verbrugge and
                  Joan Serrat and
                  Didier Colle},
  title        = {A dynamic pricing algorithm for a network of virtual resources},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1960},
  doi          = {10.1002/NEM.1960},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NaudtsFMVSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OliveiraK17,
  author       = {Ramon de Oliveira and
                  Guilherme Pi{\^{e}}gas Koslovski},
  title        = {A tree-based algorithm for virtual infrastructure allocation with
                  joint virtual machine and network requirements},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1958},
  doi          = {10.1002/NEM.1958},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/OliveiraK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sanchez-Vilchez17,
  author       = {Jos{\'{e}} Manuel S{\'{a}}nchez{-}V{\'{\i}}lchez and
                  Imen Grida Ben Yahia and
                  Chidung Lac and
                  No{\"{e}}l Crespi},
  title        = {Self-modeling based diagnosis of network services over programmable
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1964},
  doi          = {10.1002/NEM.1964},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sanchez-Vilchez17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SanchezA17,
  author       = {Antonio Cuadra S{\'{a}}nchez and
                  Javier Aracil},
  title        = {A novel blind traffic analysis technique for detection of \emph{WhatsApp}
                  VoIP calls},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1968},
  doi          = {10.1002/NEM.1968},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SanchezA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShiehHSTC17,
  author       = {Ce{-}Kuen Shieh and
                  Sheng{-}Wei Huang and
                  Li{-}Da Sun and
                  Ming{-}Fong Tsai and
                  Naveen K. Chilamkurti},
  title        = {A topology-based scaling mechanism for Apache Storm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1933},
  doi          = {10.1002/NEM.1933},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShiehHSTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShimHSK17,
  author       = {Kyu{-}Seok Shim and
                  Jae{-}Hyun Ham and
                  Baraka D. Sija and
                  Myung{-}Sup Kim},
  title        = {Application traffic classification using payload size sequence signature},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1981},
  doi          = {10.1002/NEM.1981},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShimHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SolmazGFSZE17,
  author       = {Sel{\c{c}}uk Emre Solmaz and
                  Bugra Gedik and
                  Hakan Ferhatosmanoglu and
                  Sel{\c{c}}uk S{\"{o}}z{\"{u}}er and
                  Engin Zeydan and
                  {\c{C}}agri {\"{O}}zgenc Etemoglu},
  title        = {{ALACA:} {A} platform for dynamic alarm collection and alert notification
                  in network management systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1980},
  doi          = {10.1002/NEM.1980},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SolmazGFSZE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/StergiouP17,
  author       = {Christos Stergiou and
                  Kostas E. Psannis},
  title        = {Recent advances delivered by Mobile Cloud Computing and Internet of
                  Things for Big Data applications: a survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1930},
  doi          = {10.1002/NEM.1930},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/StergiouP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SuksomboonMFOH17,
  author       = {Kalika Suksomboon and
                  Nobutaka Matsumoto and
                  Masaki Fukushima and
                  Shuichi Okamoto and
                  Michiaki Hayashi},
  title        = {Towards performance prediction of multicore software routers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1966},
  doi          = {10.1002/NEM.1966},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SuksomboonMFOH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SzottGKLNWC17,
  author       = {Szymon Szott and
                  Janusz Gozdecki and
                  Katarzyna Kosek{-}Szott and
                  Krzysztof Loziak and
                  Marek Natkaniec and
                  Michal Wagrowski and
                  Ranganai Chaparadza},
  title        = {Enabling autonomicity in wireless mesh networks with the {ETSI} {AFI}
                  {GANA} reference model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1993},
  doi          = {10.1002/NEM.1993},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SzottGKLNWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TurchettiD17,
  author       = {Rog{\'{e}}rio C. Turchetti and
                  Elias P. Duarte Jr.},
  title        = {{NFV-FD:} Implementation of a failure detector using network virtualization
                  technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1988},
  doi          = {10.1002/NEM.1988},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/TurchettiD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TurckKCKCBH17,
  author       = {Filip De Turck and
                  Joon{-}Myung Kang and
                  Hyunseung Choo and
                  Myung{-}Sup Kim and
                  Baek{-}Young Choi and
                  Remi Badonnel and
                  James Won{-}Ki Hong},
  title        = {Softwarization of networks, clouds, and internet of things},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1967},
  doi          = {10.1002/NEM.1967},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/TurckKCKCBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VanhoveSSWVT17,
  author       = {Thomas Vanhove and
                  Merlijn Sebrechts and
                  Gregory van Seghbroeck and
                  Tim Wauters and
                  Bruno Volckaert and
                  Filip De Turck},
  title        = {Data transformation as a means towards dynamic data storage and polyglot
                  persistence},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1976},
  doi          = {10.1002/NEM.1976},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VanhoveSSWVT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VladutuCD17,
  author       = {Alina Vladutu and
                  Dragos{-}George Comaneci and
                  Ciprian Dobre},
  title        = {Internet traffic classification based on flows' statistical properties
                  with machine learning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1929},
  doi          = {10.1002/NEM.1929},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VladutuCD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YoonPSCK17,
  author       = {Sung{-}Ho Yoon and
                  Jun{-}Sang Park and
                  Baraka D. Sija and
                  Mi{-}Jung Choi and
                  Myung{-}Sup Kim},
  title        = {Header signature maintenance for Internet traffic identification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {27},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1002/nem.1959},
  doi          = {10.1002/NEM.1959},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YoonPSCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AgostiniBVV16,
  author       = {Elena Agostini and
                  Massimo Bernaschi and
                  Massimo Vellucci and
                  Luca Vollero},
  title        = {OpenCAPWAP v2.0: the new open-source implementation of the {CAPWAP}
                  protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {537--552},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1949},
  doi          = {10.1002/NEM.1949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgostiniBVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BasileCLPV16,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy and
                  Christian Pitscheider and
                  Fulvio Valenza},
  title        = {Inter-function anomaly analysis for correct {SDN/NFV} deployment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {25--43},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1917},
  doi          = {10.1002/NEM.1917},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BasileCLPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BianLLG16,
  author       = {Yongna Bian and
                  Bin Liu and
                  Yuefeng Li and
                  Jianmin Gao},
  title        = {Characterizing network traffic behaviour using granule-based association
                  rule mining},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {308--329},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1935},
  doi          = {10.1002/NEM.1935},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BianLLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CardosoBGA16,
  author       = {Igor Duarte Cardoso and
                  Jo{\~{a}}o Paulo Barraca and
                  Carlos Goncalves and
                  Rui L. Aguiar},
  title        = {Seamless integration of cloud and fog networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {435--460},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1944},
  doi          = {10.1002/NEM.1944},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CardosoBGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CevherUH16,
  author       = {Selcuk Cevher and
                  Mustafa Ulutas and
                  Ibrahim H{\"{o}}kelek},
  title        = {Enhancing Multiple Routing Configurations through systematic analysis
                  of topological characteristics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {176--198},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1926},
  doi          = {10.1002/NEM.1926},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CevherUH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DalmazoVC16,
  author       = {Bruno Lopes Dalmazo and
                  Jo{\~{a}}o P. Vilela and
                  Mar{\'{\i}}lia Curado},
  title        = {Online traffic prediction in the cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {269--285},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1934},
  doi          = {10.1002/NEM.1934},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DalmazoVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Dogan16,
  author       = {Gulustan Dogan},
  title        = {ProTru: a provenance-based trust architecture for wireless sensor
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {131--151},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1925},
  doi          = {10.1002/NEM.1925},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Dogan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DurraniZS16,
  author       = {Muhammad Nouman Durrani and
                  Feroz Zahid and
                  Jawwad A. Shamsi},
  title        = {{PAVM:} a framework for policy-aware virtual machine management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {515--536},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1948},
  doi          = {10.1002/NEM.1948},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DurraniZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HohlfeldZBH16,
  author       = {Oliver Hohlfeld and
                  Thomas Zinner and
                  Theophilus Benson and
                  David Hausheer},
  title        = {Special issue on Software-Defined Networking and Network Functions
                  Virtualization for flexible network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {4--5},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1915},
  doi          = {10.1002/NEM.1915},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HohlfeldZBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangHLT16,
  author       = {Huai{-}Sheng Huang and
                  Shu{-}Chiung Hu and
                  Po{-}Han Lee and
                  Yu{-}Chee Tseng},
  title        = {An adaptive Paris Metro Pricing scheme for mobile data networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {422--434},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1941},
  doi          = {10.1002/NEM.1941},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangHLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangSMM16,
  author       = {Xiaohong Huang and
                  Qiong Sun and
                  Maode Ma and
                  Yan Ma},
  title        = {{H-LCFST:} a hash lowest cost first search tree for flexible packet
                  classification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {286--307},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1938},
  doi          = {10.1002/NEM.1938},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangSMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JiangLCL16,
  author       = {Ci{-}Bin Jiang and
                  I{-}Hsien Liu and
                  Yao{-}Nien Chung and
                  Jung{-}Shian Li},
  title        = {Novel intrusion prediction mechanism based on honeypot log similarity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {156--175},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1923},
  doi          = {10.1002/NEM.1923},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JiangLCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Karoui16,
  author       = {Kamel Karoui},
  title        = {Security novel risk assessment framework based on reversible metrics:
                  a case study of DDoS attacks on an E-commerce web server},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {553--578},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1956},
  doi          = {10.1002/NEM.1956},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Karoui16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KumarRG16,
  author       = {A. R. Ashok Kumar and
                  S. V. Rao and
                  Diganta Goswami},
  title        = {Simple, efficient location-based routing for data center network using
                  {IP} address hierarchy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {492--514},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1946},
  doi          = {10.1002/NEM.1946},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KumarRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiLFWW16,
  author       = {Jun Li and
                  Cuilian Li and
                  Zhaoxi Fang and
                  Haoyun Wang and
                  Yao{-}hui Wu},
  title        = {Optimal layer division for low latency in DHT-based hierarchical {P2P}
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {95--110},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1922},
  doi          = {10.1002/NEM.1922},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiLFWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiYH16,
  author       = {Jian Li and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Dynamic control plane management for software-defined networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {111--130},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1924},
  doi          = {10.1002/NEM.1924},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiaoL16,
  author       = {Qi Liao and
                  Ting Li},
  title        = {Effective network management via dynamic network anomaly visualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {461--491},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1945},
  doi          = {10.1002/NEM.1945},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiaoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiuZBLG16,
  author       = {Zhihong Liu and
                  Qi Zhang and
                  Raouf Boutaba and
                  Yaping Liu and
                  Zhenghu Gong},
  title        = {{ROUTE:} run-time robust reducer workload estimation for MapReduce},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {224--244},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1928},
  doi          = {10.1002/NEM.1928},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiuZBLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MamatasCG16,
  author       = {Lefteris Mamatas and
                  Stuart Clayman and
                  Alex Galis},
  title        = {A flexible information service for management of virtualized software-defined
                  infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {396--418},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1943},
  doi          = {10.1002/NEM.1943},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MamatasCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MeirosuPKP16,
  author       = {Catalin Meirosu and
                  Kostas Pentikousis and
                  Mario Kind and
                  Alberto Gonzalez Prieto},
  title        = {Software-defined operations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {334--335},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1947},
  doi          = {10.1002/NEM.1947},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MeirosuPKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MizrahiM16,
  author       = {Tal Mizrahi and
                  Yoram Moses},
  title        = {ReversePTP: {A} clock synchronization scheme for software-defined
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {355--372},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1942},
  doi          = {10.1002/NEM.1942},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MizrahiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MlikiCKC16,
  author       = {Hela Mliki and
                  Lamia Chaari and
                  Lotfi Kamoun and
                  Bernard Cousin},
  title        = {Performance evaluation of legacy {QCN} for multicast and multiple
                  unicast traffic transmission},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {199--223},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1927},
  doi          = {10.1002/NEM.1927},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MlikiCKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NaudtsKVCP16,
  author       = {Bram Naudts and
                  Mario Kind and
                  Sofie Verbrugge and
                  Didier Colle and
                  Mario Pickavet},
  title        = {How can a mobile service provider reduce costs with software-defined
                  networking?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {56--72},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1919},
  doi          = {10.1002/NEM.1919},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NaudtsKVCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PetrangeliWHBT16,
  author       = {Stefano Petrangeli and
                  Tim Wauters and
                  Rafael Huysegems and
                  Tom Bostoen and
                  Filip De Turck},
  title        = {Software-defined network-based prioritization to avoid video freezes
                  in {HTTP} adaptive streaming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {248--268},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1931},
  doi          = {10.1002/NEM.1931},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PetrangeliWHBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ProencaFCAR16,
  author       = {Mario Lemes Proen{\c{c}}a Jr. and
                  Gilberto Fernandes Jr. and
                  Luiz Fernando Carvalho and
                  Marcos V. O. de Assis and
                  Joel J. P. C. Rodrigues},
  title        = {Digital signature to help network management using flow analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {76--94},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1892},
  doi          = {10.1002/NEM.1892},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ProencaFCAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RopkeH16,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {On network operating system security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {6--24},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1918},
  doi          = {10.1002/NEM.1918},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RopkeH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangLQL16,
  author       = {Ying Wang and
                  Xiao Liu and
                  Xuesong Qiu and
                  Wenjing Li},
  title        = {Prediction-based survivable virtual network mapping against disaster
                  failures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {336--354},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1939},
  doi          = {10.1002/NEM.1939},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangLQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangKCH16,
  author       = {Nan Zhang and
                  Ma{\"{e}}l Kimmerlin and
                  Jos{\'{e}} Costa{-}Requena and
                  Heikki H{\"{a}}mm{\"{a}}inen},
  title        = {Cost efficiency of mobile in-network caching},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {44--55},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1916},
  doi          = {10.1002/NEM.1916},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangKCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhongWQL16,
  author       = {Xuxia Zhong and
                  Ying Wang and
                  Xuesong Qiu and
                  Wenjing Li},
  title        = {FlowVisor-based cost-aware {VN} embedding in OpenFlow networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {373--395},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1940},
  doi          = {10.1002/NEM.1940},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhongWQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Alshaer15,
  author       = {Hamada Alshaer},
  title        = {An overview of network virtualization and cloud network as a service},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {1--30},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1882},
  doi          = {10.1002/NEM.1882},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Alshaer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BaiardiTB15,
  author       = {Fabrizio Baiardi and
                  Federico Tonelli and
                  Alessandro Bertolini},
  title        = {Iterative selection of countermeasures for intelligent threat agents},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {340--354},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1899},
  doi          = {10.1002/NEM.1899},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BaiardiTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BartosR15,
  author       = {Karel Bartos and
                  Martin Reh{\'{a}}k},
  title        = {{IFS:} Intelligent flow sampling for network security-an adaptive
                  approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {263--282},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1902},
  doi          = {10.1002/NEM.1902},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BartosR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BouetLCC15,
  author       = {Mathieu Bouet and
                  J{\'{e}}r{\'{e}}mie Leguay and
                  Th{\'{e}}o Combe and
                  Vania Conan},
  title        = {Cost-based placement of vDPI functions in {NFV} infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {490--506},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1920},
  doi          = {10.1002/NEM.1920},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BouetLCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CharalambidesZS15,
  author       = {Marinos Charalambides and
                  Thomas Zinner and
                  Hiroshi Saito and
                  Prasad Calyam and
                  Steven Latr{\'{e}}},
  title        = {Advances in management of multimedia services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {203--204},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1896},
  doi          = {10.1002/NEM.1896},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/CharalambidesZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChungHH15,
  author       = {Jae Yoon Chung and
                  Sangtae Ha and
                  James Won{-}Ki Hong},
  title        = {A management architecture for client-defined cloud storage services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {435--453},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1904},
  doi          = {10.1002/NEM.1904},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChungHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DarabkhAK15,
  author       = {Khalid A. Darabkh and
                  Abeer M. Awad and
                  Al{\'{a}} F. Khalifeh},
  title        = {New video discarding policies for improving {UDP} performance over
                  wired/wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {181--202},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1888},
  doi          = {10.1002/NEM.1888},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DarabkhAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DechouniotisLAC15,
  author       = {Dimitrios Dechouniotis and
                  Nikolaos Leontiou and
                  Nikolaos Athanasopoulos and
                  Athanasios Christakidis and
                  Spyros G. Denazis},
  title        = {A control-theoretic approach towards joint admission control and resource
                  allocation of cloud computing services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {159--180},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1889},
  doi          = {10.1002/NEM.1889},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DechouniotisLAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Erol-Kantarci15,
  author       = {Melike Erol{-}Kantarci},
  title        = {Cache-at-relay: energy-efficient content placement for next-generation
                  wireless relays},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {454--470},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1912},
  doi          = {10.1002/NEM.1912},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Erol-Kantarci15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Farash15,
  author       = {Mohammad Sabzinejad Farash},
  title        = {Cryptanalysis and improvement of 'an improved authentication with
                  key agreement scheme on elliptic curve cryptosystem for global mobility
                  networks'},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {31--51},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1883},
  doi          = {10.1002/NEM.1883},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Farash15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FlaitheartaMS15,
  author       = {Padraig O. Flaithearta and
                  Hugh Melvin and
                  Michael Schukat},
  title        = {A QoS enabled multimedia WiFi access point},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {205--222},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1895},
  doi          = {10.1002/NEM.1895},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FlaitheartaMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FoteinosTPCD15,
  author       = {Vassilis Foteinos and
                  Kostas Tsagkaris and
                  Pierre Peloso and
                  Laurent Ciavaglia and
                  Panagiotis Demestichas},
  title        = {Energy-aware traffic allocation to optical lightpaths in multilayer
                  core networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {394--417},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1890},
  doi          = {10.1002/NEM.1890},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FoteinosTPCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GarmehiAPB15,
  author       = {Mehran Garmehi and
                  Morteza Analoui and
                  Mukaddim Pathan and
                  Rajkumar Buyya},
  title        = {An economic mechanism for request routing and resource allocation
                  in hybrid {CDN-P2P} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {375--393},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1891},
  doi          = {10.1002/NEM.1891},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GarmehiAPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/IsmailMKN15,
  author       = {Ismahani Binti Ismail and
                  Muhammad Nadzir Marsono and
                  Ban Mohammed Khammas and
                  Sulaiman Mohd Nor},
  title        = {Incorporating known malware signatures to classify new malware variants
                  in network traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {471--489},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1913},
  doi          = {10.1002/NEM.1913},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/IsmailMKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JeongLHYH15,
  author       = {Taeyeol Jeong and
                  Jian Li and
                  Jonghwan Hyun and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {{LISP} controller: a centralized {LISP} management system for {ISP}
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {507--525},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1921},
  doi          = {10.1002/NEM.1921},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JeongLHYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KantarciFCM15,
  author       = {Burak Kantarci and
                  Luca Foschini and
                  Antonio Corradi and
                  Hussein T. Mouftah},
  title        = {Design of energy-efficient cloud systems via network and resource
                  virtualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {75--94},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1838},
  doi          = {10.1002/NEM.1838},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KantarciFCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiYAWW15,
  author       = {Fuliang Li and
                  Jiahai Yang and
                  Changqing An and
                  Jianping Wu and
                  Xingwei Wang},
  title        = {Towards centralized and semi-automatic {VLAN} management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {1},
  pages        = {52--73},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1884},
  doi          = {10.1002/NEM.1884},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiYAWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MammelaM15,
  author       = {Olli M{\"{a}}mmel{\"{a}} and
                  Petteri Mannersalo},
  title        = {User-centric versus network-centric load balancing: How to provide
                  good QoE for gold users},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {242--259},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1893},
  doi          = {10.1002/NEM.1893},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MammelaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MavromoustakisM15,
  author       = {Constandinos X. Mavromoustakis and
                  George Mastorakis and
                  Athina Bourdena and
                  Evangelos Pallis},
  title        = {Energy-efficient management using a traffic-oriented routing scheme
                  for cognitive radio networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {6},
  pages        = {418--434},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1897},
  doi          = {10.1002/NEM.1897},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MavromoustakisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MayzaudSBCS15,
  author       = {Anth{\'{e}}a Mayzaud and
                  Anuj Sehgal and
                  Remi Badonnel and
                  Isabelle Chrisment and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Mitigation of topological inconsistency attacks in RPL-based low-power
                  lossy networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {320--339},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1898},
  doi          = {10.1002/NEM.1898},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MayzaudSBCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MazelCFFO15,
  author       = {Johan Mazel and
                  Pedro Casas and
                  Romain Fontugne and
                  Kensuke Fukuda and
                  Philippe Owezarski},
  title        = {Hunting attacks in the dark: clustering and correlation analysis for
                  unsupervised anomaly detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {283--305},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1903},
  doi          = {10.1002/NEM.1903},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MazelCFFO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Rubio-LoyolaPCM15,
  author       = {Javier Rubio{-}Loyola and
                  Gregorio Toscano Pulido and
                  Marinos Charalambides and
                  Marisol Maga{\~{n}}a{-}Aguilar and
                  Joan Serrat{-}Fern{\'{a}}ndez and
                  George Pavlou and
                  Hiram Galeana{-}Zapi{\'{e}}n},
  title        = {Business-driven policy optimization for service management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {113--140},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1886},
  doi          = {10.1002/NEM.1886},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Rubio-LoyolaPCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SperottoHDSR15,
  author       = {Anna Sperotto and
                  Rick Hofstede and
                  Alberto Dainotti and
                  Corinna Schmitt and
                  Gabi Dreo Rodosek},
  title        = {Special issue on measure, detect and mitigate-challenges and trends
                  in network security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {261--262},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1905},
  doi          = {10.1002/NEM.1905},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SperottoHDSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VelanCCD15,
  author       = {Petr Velan and
                  Milan Cerm{\'{a}}k and
                  Pavel Celeda and
                  Martin Drasar},
  title        = {A survey of methods for encrypted traffic classification and analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {355--374},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1901},
  doi          = {10.1002/NEM.1901},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VelanCCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VuleticVK15,
  author       = {Pavle V. Vuletic and
                  Jovana J. Vuleta{-}Radoicic and
                  Dimitrios Kalogeras},
  title        = {Federated trouble ticket system for service management support in
                  loosely coupled multi-domain environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {2},
  pages        = {95--112},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1885},
  doi          = {10.1002/NEM.1885},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VuleticVK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WamserBSZKT15,
  author       = {Florian Wamser and
                  Andreas Blenk and
                  Michael Seufert and
                  Thomas Zinner and
                  Wolfgang Kellerer and
                  Phuoc Tran{-}Gia},
  title        = {Modelling and performance analysis of application-aware resource management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {223--241},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1894},
  doi          = {10.1002/NEM.1894},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/WamserBSZKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangLCM15,
  author       = {Xiaonan Wang and
                  Deguang Le and
                  Hongbin Cheng and
                  Yi Mu},
  title        = {An IPv6-based mobility framework for urban vehicular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {3},
  pages        = {141--158},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1887},
  doi          = {10.1002/NEM.1887},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangLCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangMZTLTM15,
  author       = {Yang Zhang and
                  Hesham Mekky and
                  Zhi{-}Li Zhang and
                  Ruben Torres and
                  Sung{-}Ju Lee and
                  Alok Tongaonkar and
                  Marco Mellia},
  title        = {Detecting malicious activities with user-agent-based profiles},
  journal      = {Int. J. Netw. Manag.},
  volume       = {25},
  number       = {5},
  pages        = {306--319},
  year         = {2015},
  url          = {https://doi.org/10.1002/nem.1900},
  doi          = {10.1002/NEM.1900},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangMZTLTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/0001S14,
  author       = {Shantanu Sharma and
                  Awadhesh Kumar Singh},
  title        = {On detecting termination in cognitive radio networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {499--527},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1870},
  doi          = {10.1002/NEM.1870},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/0001S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ASSL14,
  author       = {Avelin Diana A. and
                  K. Sundarakantham and
                  S. Mercy Shalinie and
                  Rajendran L.},
  title        = {Analytical model for Binding Refresh Request to reduce storage and
                  communication overhead in MIPv6 network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {5},
  pages        = {402--414},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1871},
  doi          = {10.1002/NEM.1871},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ASSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AsaiFABE14,
  author       = {Hirochika Asai and
                  Kensuke Fukuda and
                  Patrice Abry and
                  Pierre Borgnat and
                  Hiroshi Esaki},
  title        = {Network application profiling with traffic causality graphs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {289--303},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1865},
  doi          = {10.1002/NEM.1865},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AsaiFABE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Carmona-MurilloGCR14,
  author       = {Javier Carmona{-}Murillo and
                  Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez and
                  David Cort{\'{e}}s{-}Polo and
                  Francisco{-}Javier Rodr{\'{\i}}guez{-}P{\'{e}}rez},
  title        = {{DM3:} distributed mobility management in MPLS-based access networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {2},
  pages        = {85--100},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1854},
  doi          = {10.1002/NEM.1854},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Carmona-MurilloGCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DabbebiBF14,
  author       = {Oussema Dabbebi and
                  Remi Badonnel and
                  Olivier Festor},
  title        = {Leveraging countermeasures as a service for VoIP security in the cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {1},
  pages        = {70--84},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1853},
  doi          = {10.1002/NEM.1853},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DabbebiBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DrasarVV14,
  author       = {Martin Drasar and
                  Martin Vizv{\'{a}}ry and
                  Jan Vykopal},
  title        = {Similarity as a central approach to flow-based anomaly detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {318--336},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1867},
  doi          = {10.1002/NEM.1867},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DrasarVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ForemskiCP14,
  author       = {Pawel Foremski and
                  Christian Callegari and
                  Michele Pagano},
  title        = {DNS-Class: immediate classification of {IP} flows using {DNS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {272--288},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1864},
  doi          = {10.1002/NEM.1864},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ForemskiCP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Garcia-DoradoRRMMVA14,
  author       = {Jos{\'{e}} Luis Garc{\'{\i}}a{-}Dorado and
                  Pedro M. Santiago del R{\'{\i}}o and
                  Javier Ramos and
                  David Muelas and
                  Victor Moreno and
                  Jorge E. L{\'{o}}pez de Vergara and
                  Javier Aracil},
  title        = {Low-cost and high-performance: VoIP monitoring and full-data retention
                  at multi-Gb/s rates using commodity hardware},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {3},
  pages        = {181--199},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1858},
  doi          = {10.1002/NEM.1858},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Garcia-DoradoRRMMVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GroleatVA14,
  author       = {Tristan Groleat and
                  Sandrine Vaton and
                  Matthieu Arzel},
  title        = {High-speed flow-based classification on {FPGA}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {253--271},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1863},
  doi          = {10.1002/NEM.1863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GroleatVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JabbarifarD14,
  author       = {Masoume Jabbarifar and
                  Michel R. Dagenais},
  title        = {Reference node selection in dynamic tree},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {450--468},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1874},
  doi          = {10.1002/NEM.1874},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JabbarifarD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JursonovicsI14,
  author       = {Tam{\'{a}}s Jursonovics and
                  S{\'{a}}ndor Imre},
  title        = {Quality-based charging solutions for wireless multimedia services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {5},
  pages        = {357--401},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1868},
  doi          = {10.1002/NEM.1868},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JursonovicsI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JuskoR14,
  author       = {Jan Jusko and
                  Martin Reh{\'{a}}k},
  title        = {Identifying peer-to-peer communities in the network by connection
                  graph analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {235--252},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1862},
  doi          = {10.1002/NEM.1862},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JuskoR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KangK14,
  author       = {Hye Joong Kang and
                  Chung Gu Kang},
  title        = {A distributed implementation of mobility load balancing with power
                  control and cell reselection in 4G network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {5},
  pages        = {337--356},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1860},
  doi          = {10.1002/NEM.1860},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KangK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KhalifeHD14,
  author       = {Jawad Khalife and
                  Amjad Hajjar and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  title        = {A multilevel taxonomy and requirements for an optimal traffic-classification
                  model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {2},
  pages        = {101--120},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1855},
  doi          = {10.1002/NEM.1855},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KhalifeHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KousaridasKMMKHA14,
  author       = {Apostolos Kousaridas and
                  Alexandros Kaloxylos and
                  Panagis Magdalinos and
                  Thanos Makris and
                  Georgios P. Koudouridis and
                  Gunnar Hedby and
                  Nancy Alonistioti},
  title        = {Integrating the self-growing concept in a self-organizing wireless
                  network for topology optimization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {2},
  pages        = {121--152},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1856},
  doi          = {10.1002/NEM.1856},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KousaridasKMMKHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KudoT14,
  author       = {Takanori Kudo and
                  Tetsuya Takine},
  title        = {On-line detection of persistently high packet-rate flows via a sliding
                  window scheme with random packet sampling},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {1},
  pages        = {28--47},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1850},
  doi          = {10.1002/NEM.1850},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KudoT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LatreFT14,
  author       = {Steven Latr{\'{e}} and
                  Jeroen Famaey and
                  Filip De Turck},
  title        = {A semantic context exchange process for the federated management of
                  the future internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {1},
  pages        = {1--27},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1840},
  doi          = {10.1002/NEM.1840},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LatreFT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiL14,
  author       = {Zhen Li and
                  Qi Liao},
  title        = {Network pricing: can both {ISP} and {P2P} benefit?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {433--449},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1869},
  doi          = {10.1002/NEM.1869},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Liu14,
  author       = {Xin Liu},
  title        = {A new sensing-throughput tradeoff scheme in cooperative multiband
                  cognitive radio network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {3},
  pages        = {200--217},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1859},
  doi          = {10.1002/NEM.1859},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Liu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MakhloufiDBG14,
  author       = {Rafik Makhloufi and
                  Guillaume Doyen and
                  Gr{\'{e}}gory Bonnet and
                  Dominique Ga{\"{\i}}ti},
  title        = {A survey and performance evaluation of decentralized aggregation schemes
                  for autonomic management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {469--498},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1875},
  doi          = {10.1002/NEM.1875},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MakhloufiDBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MorenoRRMGGA14,
  author       = {Victor Moreno and
                  Pedro M. Santiago del R{\'{\i}}o and
                  Javier Ramos and
                  David Muelas and
                  Jos{\'{e}} Luis Garc{\'{\i}}a{-}Dorado and
                  Francisco J. Gomez{-}Arribas and
                  Javier Aracil},
  title        = {Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf
                  systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {221--234},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1861},
  doi          = {10.1002/NEM.1861},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MorenoRRMGGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NguyenLN14,
  author       = {Tu Hoang Nguyen and
                  Jiawei Luo and
                  Humphrey Waita Njogu},
  title        = {An efficient approach to reduce alerts generated by multiple {IDS}
                  products},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {3},
  pages        = {153--180},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1857},
  doi          = {10.1002/NEM.1857},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/NguyenLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PerumalS14,
  author       = {Varalakshmi Perumal and
                  Sankari Subbiah},
  title        = {Power-conservative server consolidation based resource management
                  in cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {6},
  pages        = {415--432},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1873},
  doi          = {10.1002/NEM.1873},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PerumalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SadreSHB14,
  author       = {Ramin Sadre and
                  Anna Sperotto and
                  Rick Hofstede and
                  Nevil Brownlee},
  title        = {Flow-based Approaches in Network Management: Recent Advances and Future
                  Trends},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {219--220},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1872},
  doi          = {10.1002/NEM.1872},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SadreSHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SeoKLHH14,
  author       = {Sin{-}Seok Seo and
                  Joon{-}Myung Kang and
                  Alberto Leon{-}Garcia and
                  Yoonseon Han and
                  James Won{-}Ki Hong},
  title        = {User-centric context data collection and provision harnessing Content-Centric
                  Networking paradigm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {1},
  pages        = {48--69},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1851},
  doi          = {10.1002/NEM.1851},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SeoKLHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Zhanikeev14,
  author       = {Marat Zhanikeev},
  title        = {A lockfree shared memory design for high-throughput multicore packet
                  traffic capture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {24},
  number       = {4},
  pages        = {304--317},
  year         = {2014},
  url          = {https://doi.org/10.1002/nem.1866},
  doi          = {10.1002/NEM.1866},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Zhanikeev14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AbedAKR13,
  author       = {Hesham J. Abed and
                  Ala I. Al{-}Fuqaha and
                  Bilal Khan and
                  Ammar Rayes},
  title        = {Efficient failure prediction in autonomic networks based on trend
                  and frequency analysis of anomalous patterns},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {186--213},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1825},
  doi          = {10.1002/NEM.1825},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AbedAKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Abusubaih13,
  author       = {Murad Abusubaih},
  title        = {Heterogeneous uncoordinated deployment of WLANs: an evolving problem
                  for current and future Wi-Fi access},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {66--79},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1815},
  doi          = {10.1002/NEM.1815},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Abusubaih13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AkbarzadehCA13,
  author       = {Sara Akbarzadeh and
                  Richard Combes and
                  Zwi Altman},
  title        = {Self-organizing femtocell offloading at the flow level},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {4},
  pages        = {259--271},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1832},
  doi          = {10.1002/NEM.1832},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AkbarzadehCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AsgariS13,
  author       = {Abolghasem (Hamid) Asgari and
                  Edward V. Stansfield},
  title        = {Multi-step solution for QoS management in wireless mesh networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {41--65},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1814},
  doi          = {10.1002/NEM.1814},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AsgariS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GhoshD13,
  author       = {Uttam Ghosh and
                  Raja Datta},
  title        = {{IDSDDIP:} a secure distributed dynamic {IP} configuration scheme
                  for mobile ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {6},
  pages        = {424--446},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1849},
  doi          = {10.1002/NEM.1849},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GhoshD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GibeliBMZM13,
  author       = {Luis Henrique Gibeli and
                  Gean Davis Breda and
                  Rodrigo Sanches Miani and
                  Bruno Bogaz Zarpel{\~{a}}o and
                  Leonardo de Souza Mendes},
  title        = {Construction of baselines for VoIP traffic management on open MANs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {2},
  pages        = {137--153},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1820},
  doi          = {10.1002/NEM.1820},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GibeliBMZM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GrgicM13,
  author       = {Tomislav Grgic and
                  Maja Matijasevic},
  title        = {An overview of online charging in 3GPP networks: new ways of utilizing
                  user, network, and service-related information},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {2},
  pages        = {81--100},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1816},
  doi          = {10.1002/NEM.1816},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GrgicM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongJH13,
  author       = {Seong{-}Cheol Hong and
                  Hong{-}Taek Ju and
                  James Won{-}Ki Hong},
  title        = {Network reachability-based {IP} prefix hijacking detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {1--15},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1805},
  doi          = {10.1002/NEM.1805},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KarvounasVGSD13,
  author       = {Dimitrios Karvounas and
                  Panagiotis Vlacheas and
                  Andreas Georgakopoulos and
                  Vera Stavroulaki and
                  Panagiotis Demestichas},
  title        = {Enriching self-organizing networks use cases with opportunistic features:
                  a coverage and capacity optimization paradigm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {4},
  pages        = {272--286},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1829},
  doi          = {10.1002/NEM.1829},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KarvounasVGSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimKSH13,
  author       = {Sung{-}Su Kim and
                  Joon{-}Myung Kang and
                  Sin{-}Seok Seo and
                  James Won{-}Ki Hong},
  title        = {A cognitive model-based approach for autonomic fault management in
                  OpenFlow networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {6},
  pages        = {383--401},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1839},
  doi          = {10.1002/NEM.1839},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimKSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KreugerGA13,
  author       = {Per Kreuger and
                  Daniel Gillblad and
                  {\AA}ke Arvidsson},
  title        = {\emph{zCap}: a zero configuration adaptive paging and mobility management
                  mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {4},
  pages        = {235--258},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1830},
  doi          = {10.1002/NEM.1830},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KreugerGA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LatreMDPDT13,
  author       = {Steven Latr{\'{e}} and
                  Wim Van de Meerssche and
                  Dirk Deschrijver and
                  Dimitri Papadimitriou and
                  Tom Dhaene and
                  Filip De Turck},
  title        = {A cognitive accountability mechanism for penalizing misbehaving ECN-based
                  {TCP} stacks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {1},
  pages        = {16--40},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1806},
  doi          = {10.1002/NEM.1806},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LatreMDPDT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiWZJ13,
  author       = {Xuelei Li and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {An improved authentication with key agreement scheme on elliptic curve
                  cryptosystem for global mobility networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {5},
  pages        = {311--324},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1827},
  doi          = {10.1002/NEM.1827},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiWZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiuL13,
  author       = {Bin Liu and
                  Yuefeng Li},
  title        = {A hybrid association rule mining approach for characterizing network
                  traffic behaviour},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {214--231},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1826},
  doi          = {10.1002/NEM.1826},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MarconettLYVY13,
  author       = {Dan Marconett and
                  Minsoo Lee and
                  Xiaohui Ye and
                  Rao Vemuri and
                  S. J. Ben Yoo},
  title        = {Self-adapting protocol tuning for multi-hop wireless networks using
                  Q-learning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {2},
  pages        = {119--136},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1819},
  doi          = {10.1002/NEM.1819},
  timestamp    = {Thu, 11 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MarconettLYVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ParkRLBLKC13,
  author       = {Jongdae Park and
                  Hoyoung Ryu and
                  Soon Seok Lee and
                  Sueng Jae Bae and
                  Ju Yong Lee and
                  Mihui Kim and
                  Min Young Chung},
  title        = {Cost-efficient vertical handover between cellular networks and {WLAN}
                  based on HMIPv6 and {IEEE} 802.21 {MIH}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {155--171},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1822},
  doi          = {10.1002/NEM.1822},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ParkRLBLKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ParkWCKH13,
  author       = {Byungchul Park and
                  Youngjoon Won and
                  Jae Yoon Chung and
                  Myung{-}Sup Kim and
                  James Won{-}Ki Hong},
  title        = {Fine-grained traffic classification based on functional separation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {5},
  pages        = {350--381},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1837},
  doi          = {10.1002/NEM.1837},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ParkWCKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ParkYPK13,
  author       = {Daihee Park and
                  Jaehak Yu and
                  Jun{-}Sang Park and
                  Myung{-}Sup Kim},
  title        = {\emph{NetCube}: a comprehensive network traffic analysis model based
                  on multidimensional {OLAP} data cube},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {2},
  pages        = {101--118},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1818},
  doi          = {10.1002/NEM.1818},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ParkYPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PotierQ13,
  author       = {Paul Potier and
                  Lijun Qian},
  title        = {Management of cognitive radio ad hoc networks using a congestion-based
                  metric},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {5},
  pages        = {325--349},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1835},
  doi          = {10.1002/NEM.1835},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PotierQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sanchez-GonzalezSPA13,
  author       = {Juan Sanchez{-}Gonzalez and
                  Oriol Sallent and
                  Jordi P{\'{e}}rez{-}Romero and
                  Ram{\'{o}}n Agust{\'{\i}}},
  title        = {A multi-cell multi-objective self-optimisation methodology based on
                  genetic algorithms for wireless cellular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {4},
  pages        = {287--307},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1831},
  doi          = {10.1002/NEM.1831},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sanchez-GonzalezSPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TsagkarisGS13,
  author       = {Kostas Tsagkaris and
                  Markus Gruber and
                  Berna Sayra{\c{c}}},
  title        = {Managing self-organizing radio access networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {4},
  pages        = {233--234},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1834},
  doi          = {10.1002/NEM.1834},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TsagkarisGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TsagkarisNGYGKGKBGBAD13,
  author       = {Kostas Tsagkaris and
                  G{\'{e}}rard Nguengang and
                  Aristi Galani and
                  Imen Grida Ben Yahia and
                  Majid Ghader and
                  Alexandros Kaloxylos and
                  Markus Gruber and
                  Apostolos Kousaridas and
                  Mathieu Bouet and
                  Stylianos Georgoulas and
                  Aimilia Bantouna and
                  Nancy Alonistioti and
                  Panagiotis Demestichas},
  title        = {A survey of autonomic networking architectures: towards a Unified
                  Management Framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {6},
  pages        = {402--423},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1841},
  doi          = {10.1002/NEM.1841},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TsagkarisNGYGKGKBGBAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangDCW13,
  author       = {Ying Yang and
                  Wenxiang Dong and
                  Xiaohui Chen and
                  Weidong Wang},
  title        = {A utility-based load-balancing scheme with guarantee of users' rate
                  for {LTE} self-organization networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {172--185},
  year         = {2013},
  url          = {https://doi.org/10.1002/nem.1824},
  doi          = {10.1002/NEM.1824},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangDCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlshaerSA12,
  author       = {Hamada Alshaer and
                  Raed M. Shubair and
                  Mohamed Alyafei},
  title        = {A framework for resource dimensioning in {GPON} access networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {3},
  pages        = {199--215},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.801},
  doi          = {10.1002/NEM.801},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlshaerSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlsubhiAB12,
  author       = {Khalid Alsubhi and
                  Issam Aib and
                  Raouf Boutaba},
  title        = {FuzMet: a fuzzy-logic based alert prioritization engine for intrusion
                  detection systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {4},
  pages        = {263--284},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.804},
  doi          = {10.1002/NEM.804},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlsubhiAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AmigoVCL12,
  author       = {Isabel Amigo and
                  Sandrine Vaton and
                  Thierry Chonavel and
                  Federico Larroca},
  title        = {Maximum delay computation for interdomain path selection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {162--179},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.799},
  doi          = {10.1002/NEM.799},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AmigoVCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArakawaIM12,
  author       = {Shin'ichi Arakawa and
                  Shinya Ishida and
                  Masayuki Murata},
  title        = {Analyses of soft-state signaling protocols in GMPLS-Based {WDM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {5},
  pages        = {418--434},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1800},
  doi          = {10.1002/NEM.1800},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArakawaIM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chentouf12,
  author       = {Zohair Chentouf},
  title        = {Detecting OAM{\&}P design defects using a feature interaction
                  approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {95--103},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.789},
  doi          = {10.1002/NEM.789},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chentouf12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FamaeyLST12,
  author       = {Jeroen Famaey and
                  Steven Latr{\'{e}} and
                  John Strassner and
                  Filip De Turck},
  title        = {Semantic context dissemination and service matchmaking in future network
                  management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {4},
  pages        = {285--310},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.805},
  doi          = {10.1002/NEM.805},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FamaeyLST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FamaeyT12,
  author       = {Jeroen Famaey and
                  Filip De Turck},
  title        = {Federated management of the Future Internet: status and challenges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {6},
  pages        = {508--528},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1813},
  doi          = {10.1002/NEM.1813},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FamaeyT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GanapathyPMA12,
  author       = {Vinayak Ganapathy and
                  Niki Pissinou and
                  S. Kami Makki and
                  Qutub Bakhtiar Ali},
  title        = {An epistemic event-based correlation approach for managing pervasive
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {81--94},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.788},
  doi          = {10.1002/NEM.788},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GanapathyPMA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GoncalvesOA12,
  author       = {Pedro Gon{\c{c}}alves and
                  Jos{\'{e}} Lu{\'{\i}}s Oliveira and
                  Rui L. Aguiar},
  title        = {A study of encoding overhead in network management protocols},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {6},
  pages        = {435--450},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1801},
  doi          = {10.1002/NEM.1801},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GoncalvesOA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HaddadouGGA12,
  author       = {Kamel Haddadou and
                  Samir Ghamri{-}Doudane and
                  Yacine Ghamri{-}Doudane and
                  Nazim Agoulmine},
  title        = {Practical and analytical approaches for designing scalable on-demand
                  policy-based resource allocation in stateless {IP} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {131--149},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.796},
  doi          = {10.1002/NEM.796},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HaddadouGGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JrGPSATCL12,
  author       = {Elias P. Duarte Jr. and
                  Lisandro Zambenedetti Granville and
                  Luci Pirmez and
                  Jos{\'{e}} Neuman de Souza and
                  Rossana M. C. Andrade and
                  Liane Margarida Rockenbach Tarouco and
                  Reinaldo de Barros Correia and
                  Alexandre G. Lages},
  title        = {GigaManP2P: an overlay network for distributed QoS management and
                  resilient routing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {50--64},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.785},
  doi          = {10.1002/NEM.785},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JrGPSATCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KioumourtzisBG12,
  author       = {Georgios Kioumourtzis and
                  Christos Bouras and
                  Apostolos Gkamas},
  title        = {Performance evaluation of ad hoc routing protocols for military communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {3},
  pages        = {216--234},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.802},
  doi          = {10.1002/NEM.802},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KioumourtzisBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KioumourtzisBG12a,
  author       = {Georgios Kioumourtzis and
                  Christos Bouras and
                  Apostolos Gkamas},
  title        = {{TFMCC} versus {ASMP:} lessons learned from performance evaluation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {5},
  pages        = {349--372},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.810},
  doi          = {10.1002/NEM.810},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KioumourtzisBG12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiL12,
  author       = {Jung{-}Shian Li and
                  Kun{-}Hsuan Liu},
  title        = {Network-coding-based cache policy for loss recovery enhancement in
                  reliable multicast},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {4},
  pages        = {330--345},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.808},
  doi          = {10.1002/NEM.808},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MaCKHH12,
  author       = {Yi{-}Wei Ma and
                  Jiann{-}Liang Chen and
                  Sy{-}Yen Kuo and
                  Wen{-}Kuei Hsieh and
                  Yueh{-}Min Huang},
  title        = {An efficient code gateway for {RFID} seamless applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {150--161},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.797},
  doi          = {10.1002/NEM.797},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MaCKHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Marsono12,
  author       = {Muhammad N. Marsono},
  title        = {Packet-level open-digest fingerprinting for spam detection on middleboxes},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {12--26},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.780},
  doi          = {10.1002/NEM.780},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/Marsono12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sakib12,
  author       = {Kazi Sakib},
  title        = {Asynchronous failed sensor node detection method for sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {27--49},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.782},
  doi          = {10.1002/NEM.782},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sakib12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalahHBA12,
  author       = {Khaled Salah and
                  Jamil Hamodi and
                  Zubair A. Baig and
                  Fahd Al{-}Haidari},
  title        = {Video-on-Demand (VoD) deployment over hospitality networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {65--80},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.787},
  doi          = {10.1002/NEM.787},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalahHBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SatyanarayanaR12,
  author       = {D. Satyanarayana and
                  S. V. Rao},
  title        = {Fault-tolerant spanners for ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {4},
  pages        = {311--329},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.807},
  doi          = {10.1002/NEM.807},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SatyanarayanaR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TammaroVRP12,
  author       = {Davide Tammaro and
                  Silvio Valenti and
                  Dario Rossi and
                  Antonio Pescap{\`{e}}},
  title        = {Exploiting packet-sampling measurements for traffic characterization
                  and classification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {6},
  pages        = {451--476},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1802},
  doi          = {10.1002/NEM.1802},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/TammaroVRP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TsagkarisAGD12,
  author       = {Kostas Tsagkaris and
                  Maria Akezidou and
                  Aristi Galani and
                  Panagiotis Demestichas},
  title        = {Evaluation of signalling loads in a cognitive network management architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {3},
  pages        = {235--260},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.803},
  doi          = {10.1002/NEM.803},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TsagkarisAGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WallinLNB12,
  author       = {Stefan Wallin and
                  Viktor Leijon and
                  Johan Nordlander and
                  Nicklas Bystedt},
  title        = {The semantics of alarm definitions: enabling systematic reasoning
                  about alarms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {3},
  pages        = {181--198},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.800},
  doi          = {10.1002/NEM.800},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WallinLNB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WonCPH12,
  author       = {Youngjoon Won and
                  Mi{-}Jung Choi and
                  Byungchul Park and
                  James Won{-}Ki Hong},
  title        = {An approach for failure recognition in IP-based industrial control
                  networks and systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {6},
  pages        = {477--493},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1804},
  doi          = {10.1002/NEM.1804},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WonCPH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuC12,
  author       = {Lianlong Wu and
                  Kevin Curran},
  title        = {A practical network coding and routing scheme based on maximum flow
                  combination},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {5},
  pages        = {373--396},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1797},
  doi          = {10.1002/NEM.1797},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuK12,
  author       = {Kuo{-}Wei Wu and
                  Wen{-}Kuang Kuo},
  title        = {Game-based cross-layer channel allocation with SVC-encoded multimedia
                  streams in cognitive radio networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {5},
  pages        = {397--417},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1798},
  doi          = {10.1002/NEM.1798},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YampolskiyHLKMS12,
  author       = {Mark Yampolskiy and
                  Wolfgang Hommel and
                  Feng Liu and
                  Ralf K{\"{o}}nig and
                  Martin G. Metzker and
                  Michael Schiffers},
  title        = {Link repair in managed multi-domain connections with end-to-end quality
                  guarantees},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {6},
  pages        = {494--507},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.1810},
  doi          = {10.1002/NEM.1810},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YampolskiyHLKMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YogoSKIDYT12,
  author       = {Kazufumi Yogo and
                  Ryoichi Shinkuma and
                  Taku Konishi and
                  Satoko Itaya and
                  Shinichi Doi and
                  Keiji Yamada and
                  Tatsuro Takahashi},
  title        = {Incentive-rewarding mechanism to stimulate activities in social networking
                  services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {1},
  pages        = {1--11},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.779},
  doi          = {10.1002/NEM.779},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YogoSKIDYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZambonEW12,
  author       = {Emmanuele Zambon and
                  Sandro Etalle and
                  Roel J. Wieringa},
  title        = {A\({}^{\mbox{2}}\)thOS: availability analysis and optimisation in
                  SLAs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {22},
  number       = {2},
  pages        = {104--130},
  year         = {2012},
  url          = {https://doi.org/10.1002/nem.790},
  doi          = {10.1002/NEM.790},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZambonEW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Ali-YahiyaA11,
  author       = {Tara Ali{-}Yahiya and
                  Khaldoun Al Agha},
  title        = {Downlink fairness-aware adaptive resource allocation approach for
                  {LTE} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {269--283},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.795},
  doi          = {10.1002/NEM.795},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Ali-YahiyaA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Androutsos11,
  author       = {Athanassios Androutsos},
  title        = {Access link bandwidth externalities and endogenous Internet growth:
                  a long-run economic approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {21--44},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.771},
  doi          = {10.1002/NEM.771},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Androutsos11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AnjumPMK11,
  author       = {Bushra Anjum and
                  Harry G. Perros and
                  Xenia Mountrouidou and
                  Kimon P. Kontovasilis},
  title        = {Bandwidth allocation under end-to-end percentile delay bounds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {536--547},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.783},
  doi          = {10.1002/NEM.783},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AnjumPMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BourasGKPSZ11,
  author       = {Christos Bouras and
                  Apostolos Gkamas and
                  Vaggelis Kapoulas and
                  Vassilis Papapanagiotou and
                  Kostas Stamos and
                  Giannis Zaoudis},
  title        = {Power management adaptation techniques for video transmission over
                  {TFRC}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {414--431},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.766},
  doi          = {10.1002/NEM.766},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BourasGKPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DarabkhA11,
  author       = {Khalid A. Darabkh and
                  Ramazan Savas Ayg{\"{u}}n},
  title        = {Improving {UDP} performance using intermediate QoD-aware hop system
                  for wired/wireless multimedia communication systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {432--454},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.768},
  doi          = {10.1002/NEM.768},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DarabkhA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DimitriouSLKS11,
  author       = {Nikos Dimitriou and
                  Lambros Sarakis and
                  Dimitrios Loukatos and
                  George Kormentzas and
                  Charalambos Skianis},
  title        = {Vertical handover {(VHO)} framework for future collaborative wireless
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {548--564},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.786},
  doi          = {10.1002/NEM.786},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DimitriouSLKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GagnonE11,
  author       = {Fran{\c{c}}ois Gagnon and
                  Babak Esfandiari},
  title        = {A hybrid approach to operating system discovery based on diagnosis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {2},
  pages        = {106--119},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.751},
  doi          = {10.1002/NEM.751},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GagnonE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GarofalakisS11,
  author       = {John D. Garofalakis and
                  Eleftherios Stergiou},
  title        = {Mechanisms and analysis for supporting multicast traffic by using
                  multilayer multistage interconnection networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {2},
  pages        = {130--146},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.754},
  doi          = {10.1002/NEM.754},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GarofalakisS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HasslingerNMFA11,
  author       = {Gerhard Ha{\ss}linger and
                  Giorgio Nunzi and
                  Catalin Meirosu and
                  Changpeng Fan and
                  Frank{-}Uwe Andersen},
  title        = {Traffic engineering supported by Inherent Network Management: analysis
                  of resource efficiency and cost saving potential},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {45--64},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.770},
  doi          = {10.1002/NEM.770},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HasslingerNMFA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HausheerSS11,
  author       = {David Hausheer and
                  George D. Stamoulis and
                  Burkhard Stiller},
  title        = {Editorial to the special issue on Economic Traffic Management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.773},
  doi          = {10.1002/NEM.773},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HausheerSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HazraS11,
  author       = {Sukanta Kumar Hazra and
                  Winston Khoon Guan Seah},
  title        = {Measurement-based link scheduling for maritime mesh networks with
                  directional antennas},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {2},
  pages        = {83--105},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.745},
  doi          = {10.1002/NEM.745},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HazraS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/IslamHA11,
  author       = {Md. Rafiqul Islam and
                  Mohd Toufiq Hasan and
                  G. M. Ashaduzzaman},
  title        = {An architecture and a dynamic scheduling algorithm of grid for providing
                  security for real-time data-intensive applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {402--413},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.765},
  doi          = {10.1002/NEM.765},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/IslamHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KathirvelS11,
  author       = {Ayyaswamy Kathirvel and
                  Rengaramanujam Srinivasan},
  title        = {{ETUS:} An enhanced triple umpiring system for security and performance
                  improvement of mobile ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {341--359},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.761},
  doi          = {10.1002/NEM.761},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KathirvelS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KawaharaIMKHHA11,
  author       = {Ryoichi Kawahara and
                  Keisuke Ishibashi and
                  Tatsuya Mori and
                  Noriaki Kamiyama and
                  Shigeaki Harada and
                  Haruhisa Hasegawa and
                  Shoichiro Asano},
  title        = {Detection accuracy of network anomalies using sampled flow statistics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {513--535},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.777},
  doi          = {10.1002/NEM.777},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KawaharaIMKHHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KropiwiecJPP11,
  author       = {C{\'{a}}ssio Ditzel Kropiwiec and
                  Edgard Jamhour and
                  Manoel Camillo Penna and
                  Guy Pujolle},
  title        = {Multi-constraint security policies for delegated firewall administration},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {469--493},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.774},
  doi          = {10.1002/NEM.774},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KropiwiecJPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LehriederOHSDKM11,
  author       = {Frank Lehrieder and
                  Simon Oechsner and
                  Tobias Ho{\ss}feld and
                  Dirk Staehle and
                  Zoran Despotovic and
                  Wolfgang Kellerer and
                  Maximilian Michel},
  title        = {Mitigating unfairness in locality-aware peer-to-peer networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {3--20},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.772},
  doi          = {10.1002/NEM.772},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LehriederOHSDKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LoO11,
  author       = {Shou{-}Chih Lo and
                  Lyu{-}Chen Ou},
  title        = {Efficient routing and centralized scheduling algorithms for {IEEE}
                  802.16 Mesh Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {494--512},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.775},
  doi          = {10.1002/NEM.775},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LoO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MailleTV11,
  author       = {Patrick Maill{\'{e}} and
                  Bruno Tuffin and
                  Jean{-}Marc Vigne},
  title        = {Technological investment games among wireless telecommunications service
                  providers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {65--82},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.776},
  doi          = {10.1002/NEM.776},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MailleTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MasoumzadehMGT11,
  author       = {Seyed Saeid Masoumzadeh and
                  Kourosh Meshgi and
                  Saeid Shiry Ghidari and
                  Gelareh Taghizadeh},
  title        = {{FQL-RED:} an adaptive scalable schema for active queue management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {2},
  pages        = {147--167},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.755},
  doi          = {10.1002/NEM.755},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MasoumzadehMGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NolteKTRSGBMTGAHADK11,
  author       = {Klaus Nolte and
                  Alexandros Kaloxylos and
                  Kostas Tsagkaris and
                  Thomas Rosowski and
                  Makis Stamatelatos and
                  Aristi Galani and
                  Eckard Bogenfeld and
                  Panagis Magdalinos and
                  Jens Tiemann and
                  Jens Gebert and
                  Paul Arnold and
                  Dirk von Hugo and
                  Nancy Alonistioti and
                  Panagiotis Demestichas and
                  Wolfgang Koenig},
  title        = {The {E3} architecture: enabling future cellular networks with cognitive
                  and self-x capabilities},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {360--383},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.762},
  doi          = {10.1002/NEM.762},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NolteKTRSGBMTGAHADK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PandeyCWH11,
  author       = {Suman Pandey and
                  Mi{-}Jung Choi and
                  Young J. Won and
                  James Won{-}Ki Hong},
  title        = {SNMP-based enterprise {IP} network topology discovery},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {169--184},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.756},
  doi          = {10.1002/NEM.756},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PandeyCWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PandeyWHS11,
  author       = {Suman Pandey and
                  Young J. Won and
                  James W. Hong and
                  John Strassner},
  title        = {Dimensioning internet protocol television video on demand services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {6},
  pages        = {455--468},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.769},
  doi          = {10.1002/NEM.769},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PandeyWHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Ren11,
  author       = {Wei Ren},
  title        = {QoS-aware and compromise-resilient key management scheme for heterogeneous
                  wireless Internet of Things},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {284--299},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.794},
  doi          = {10.1002/NEM.794},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Ren11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SheikhG11,
  author       = {Waseem Sheikh and
                  Arif Ghafoor},
  title        = {Jitter-minimized reliability-maximized management of networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {185--222},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.757},
  doi          = {10.1002/NEM.757},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SheikhG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TranT11,
  author       = {Hoang{-}Hai Tran and
                  Bruno Tuffin},
  title        = {Inter-domain pricing: challenges and possible approaches},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {223--246},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.760},
  doi          = {10.1002/NEM.760},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TranT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VidyarthiA11,
  author       = {Deo Prakash Vidyarthi and
                  Mohammad Anbar},
  title        = {Comparative study of two {CPU} router time management algorithms in
                  cellular {IP} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {2},
  pages        = {120--129},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.752},
  doi          = {10.1002/NEM.752},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VidyarthiA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VidyarthiK11,
  author       = {Deo Prakash Vidyarthi and
                  Lutfi Mohammed Omer Khanbary},
  title        = {Multi-objective optimization for channel allocation in mobile computing
                  using {NSGA-II}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {247--266},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.763},
  doi          = {10.1002/NEM.763},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VidyarthiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangWC11,
  author       = {Yu Wang and
                  Changhua Wu and
                  Xiaowen Chu},
  title        = {Quality of service management in emerging wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {267--268},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.791},
  doi          = {10.1002/NEM.791},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuLL11,
  author       = {Di Wu and
                  Juanjuan Li and
                  Jiangchuan Liu},
  title        = {A random obstacle-based mobility model for delay-tolerant networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {326--339},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.793},
  doi          = {10.1002/NEM.793},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuZP11,
  author       = {Shuhua Wu and
                  Yuefei Zhu and
                  Qiong Pu},
  title        = {A novel lightweight authentication scheme with anonymity for roaming
                  service in global mobility networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {5},
  pages        = {384--401},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.764},
  doi          = {10.1002/NEM.764},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuZP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XuWZTW11,
  author       = {Xianghua Xu and
                  Jian Wan and
                  Wei Zhang and
                  Chao Tong and
                  Changhua Wu},
  title        = {{PMSW:} a passive monitoring system in wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {300--325},
  year         = {2011},
  url          = {https://doi.org/10.1002/nem.792},
  doi          = {10.1002/NEM.792},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/XuWZTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AnhaltKP10,
  author       = {Fabienne Anhalt and
                  Guilherme Pi{\^{e}}gas Koslovski and
                  Pascale Vicat{-}Blanc Primet},
  title        = {Specifying and provisioning virtual infrastructures with HIPerNET},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {129--148},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.732},
  doi          = {10.1002/NEM.732},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AnhaltKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AparnaA10,
  author       = {R. Aparna and
                  B. B. Amberker},
  title        = {A key management scheme for secure group communication using binomial
                  key trees},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {6},
  pages        = {383--418},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.742},
  doi          = {10.1002/NEM.742},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AparnaA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BirkeMPR10,
  author       = {Robert Birke and
                  Marco Mellia and
                  Michele Petracca and
                  Dario Rossi},
  title        = {Experiences of VoIP traffic monitoring in a commercial {ISP}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {339--359},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.758},
  doi          = {10.1002/NEM.758},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BirkeMPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BiswasPCG10,
  author       = {Pratik K. Biswas and
                  Alexander Poylisher and
                  Ritu Chadha and
                  Abhrajit Ghosh},
  title        = {Integrated network experimentation for QoS measurements in opaque
                  MANETs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {199--218},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.727},
  doi          = {10.1002/NEM.727},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BiswasPCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CherkaouiFG10,
  author       = {Omar Cherkaoui and
                  Olivier Festor and
                  Lisandro Zambenedetti Granville},
  title        = {Special issue on virtualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {109},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.744},
  doi          = {10.1002/NEM.744},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CherkaouiFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChuangT10,
  author       = {Yun{-}Hsin Chuang and
                  Yuh{-}Min Tseng},
  title        = {An efficient dynamic group key agreement protocol for imbalanced wireless
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {167--180},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.739},
  doi          = {10.1002/NEM.739},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChuangT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DAlconzoCR10,
  author       = {Alessandro D'Alconzo and
                  Angelo Coluccia and
                  Peter Romirer{-}Maierhofer},
  title        = {Distribution-based anomaly detection in 3G mobile networks: from theory
                  to practice},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {245--269},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.747},
  doi          = {10.1002/NEM.747},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DAlconzoCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DewaeleHBFAMFCE10,
  author       = {Guillaume Dewaele and
                  Yosuke Himura and
                  Pierre Borgnat and
                  Kensuke Fukuda and
                  Patrice Abry and
                  Olivier J. J. Michel and
                  Romain Fontugne and
                  Kenjiro Cho and
                  Hiroshi Esaki},
  title        = {Unsupervised host behavior classification from connection patterns},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {317--337},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.750},
  doi          = {10.1002/NEM.750},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DewaeleHBFAMFCE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FreitasPMV10,
  author       = {Ricardo B. Freitas and
                  Luciano Bernardes de Paula and
                  Edmundo Roberto Mauro Madeira and
                  F{\'{a}}bio Luciano Verdi},
  title        = {Using virtual topologies to manage inter-domain QoS in next-generation
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {111--128},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.734},
  doi          = {10.1002/NEM.734},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/FreitasPMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GalaniTKD10,
  author       = {Aristi Galani and
                  Kostas Tsagkaris and
                  Nikolaos Koutsouris and
                  Panagiotis Demestichas},
  title        = {Design and assessment of functional architecture for optimized spectrum
                  and radio resource management in heterogeneous wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {219--241},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.736},
  doi          = {10.1002/NEM.736},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GalaniTKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HausheerSS10,
  author       = {David Hausheer and
                  George D. Stamoulis and
                  Burkhard Stiller},
  title        = {Special issue of the international journal on network management {(IJNM)}
                  on 'economic traffic management'Publication: February 2011},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {107},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.738},
  doi          = {10.1002/NEM.738},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HausheerSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HimuraFCE10,
  author       = {Yosuke Himura and
                  Kensuke Fukuda and
                  Kenjiro Cho and
                  Hiroshi Esaki},
  title        = {An evaluation of automatic parameter tuning of a statistics-based
                  anomaly detection algorithm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {295--316},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.749},
  doi          = {10.1002/NEM.749},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HimuraFCE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JagadishG10,
  author       = {Chundury Jagadish and
                  Timothy A. Gonsalves},
  title        = {Distributed control of event floods in a large telecom network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {57--70},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.728},
  doi          = {10.1002/NEM.728},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JagadishG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiZLY10,
  author       = {Jun Li and
                  Shunyi Zhang and
                  Cuilian Li and
                  Junrong Yan},
  title        = {Composite lightweight traffic classification system for network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {85--105},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.735},
  doi          = {10.1002/NEM.735},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiZLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NassefBF10,
  author       = {Mohammad Nassef and
                  Amr Badr and
                  Ibrahim Farag},
  title        = {An immunological approach for file recovery over {JXTA} peer-to-peer
                  framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {181--197},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.741},
  doi          = {10.1002/NEM.741},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NassefBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ParkKCHLJC10,
  author       = {Chang{-}Keun Park and
                  Joon{-}Myung Kang and
                  Mi{-}Jung Choi and
                  James Won{-}Ki Hong and
                  Yong{-}Hun Lim and
                  Seongho Ju and
                  Moon{-}Suk Choi},
  title        = {Development and testing of an SNMP-based integrated management system
                  for heterogeneous power line communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {1},
  pages        = {35--55},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.731},
  doi          = {10.1002/NEM.731},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ParkKCHLJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PilakkatJ10,
  author       = {Reena Pilakkat and
                  Lillykutty Jacob},
  title        = {Scheduling and power control for {MAC} layer design in multihop {IR-UWB}
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {1},
  pages        = {1--19},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.721},
  doi          = {10.1002/NEM.721},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PilakkatJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RicciatoOP10,
  author       = {Fabio Ricciato and
                  Philippe Owezarski and
                  Maria Papadopouli},
  title        = {Preface to special issue on 'traffic monitoring and network measurements:
                  from theory to practice'},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {243--244},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.746},
  doi          = {10.1002/NEM.746},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RicciatoOP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RubinZ10,
  author       = {Izhak Rubin and
                  Runhe Zhang},
  title        = {Max-min utility fair flow management for networks with route diversity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {6},
  pages        = {361--381},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.740},
  doi          = {10.1002/NEM.740},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RubinZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalemVG10,
  author       = {Osman Salem and
                  Sandrine Vaton and
                  Annie Gravey},
  title        = {A scalable, efficient and informative approach for anomaly-based intrusion
                  detection systems: theory and practice},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {5},
  pages        = {271--293},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.748},
  doi          = {10.1002/NEM.748},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalemVG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TsugawaF10,
  author       = {Maur{\'{\i}}cio O. Tsugawa and
                  Jos{\'{e}} A. B. Fortes},
  title        = {Characterizing user-level network virtualization: performance, overheads
                  and limits},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {3},
  pages        = {149--166},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.733},
  doi          = {10.1002/NEM.733},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TsugawaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangG10,
  author       = {Xiaonan Wang and
                  Demin Gao},
  title        = {Research on IPv6 address configuration for wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {6},
  pages        = {419--432},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.743},
  doi          = {10.1002/NEM.743},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WanrooijP10,
  author       = {Ward van Wanrooij and
                  Aiko Pras},
  title        = {Filtering spam from bad neighborhoods},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {6},
  pages        = {433--444},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.753},
  doi          = {10.1002/NEM.753},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WanrooijP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Yang10,
  author       = {Shin{-}Jer Yang},
  title        = {Design issues and performance analysis for {DSR} routing with reclaim-based
                  caching in MANETs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {1},
  pages        = {21--34},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.726},
  doi          = {10.1002/NEM.726},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Yang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangXYY10,
  author       = {Bin Yang and
                  Jinwu Xu and
                  Jianhong Yang and
                  Debin Yang},
  title        = {A novel weighted clustering algorithm in mobile ad hoc networks using
                  discrete particle swarm optimization {(DPSOWCA)}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {71--84},
  year         = {2010},
  url          = {https://doi.org/10.1002/nem.730},
  doi          = {10.1002/NEM.730},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangXYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AndreyFLPS09,
  author       = {Laurent Andrey and
                  Olivier Festor and
                  Abdelkader Lahmadi and
                  Aiko Pras and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Survey of {SNMP} performance analysis studies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {527--548},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.729},
  doi          = {10.1002/NEM.729},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AndreyFLPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaMO09,
  author       = {James Aweya and
                  Delfin Y. Montuno and
                  Michel Ouellette},
  title        = {Limitations of current Ethernet switch architectures for enhanced
                  flow control and service differentiation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {153--174},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.690},
  doi          = {10.1002/NEM.690},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BenmammarJK09,
  author       = {Badr Benmammar and
                  Zeina Jrad and
                  Francine Krief},
  title        = {QoS management in mobile {IP} networks using a terminal assistant},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {1--24},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.684},
  doi          = {10.1002/NEM.684},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BenmammarJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BourasP09,
  author       = {Christos Bouras and
                  Dimitris Primpas},
  title        = {Architectures and performance evaluation of bandwidth brokers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {2},
  pages        = {101--117},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.694},
  doi          = {10.1002/NEM.694},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BourasP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BroganGO09,
  author       = {D. Brogan and
                  Ivan Ganchev and
                  Mairtin O'Droma},
  title        = {{A-WING:} an ad hoc wireless inter-network gateway},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {253--269},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.701},
  doi          = {10.1002/NEM.701},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BroganGO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chaparadza09,
  author       = {Ranganai Chaparadza},
  title        = {UniFAFF: a unified framework for implementing autonomic fault management
                  and failure detection for self-managing networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {271--290},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.702},
  doi          = {10.1002/NEM.702},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chaparadza09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenCCL09,
  author       = {Nong{-}Kun Chen and
                  Jiann{-}Liang Chen and
                  Teng{-}Hsun Chang and
                  Hsi{-}Feng Lu},
  title        = {Reliable {ALE} middleware for {RFID} network applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {203--216},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.698},
  doi          = {10.1002/NEM.698},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenCCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DechouniotisLDKD09,
  author       = {Dimitrios Dechouniotis and
                  Nikolaos Leontiou and
                  Xenofontas A. Dimitropoulos and
                  Andreas Kind and
                  Spyros G. Denazis},
  title        = {Unveiling the underlying relationships over a network for monitoring
                  purposes},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {513--526},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.725},
  doi          = {10.1002/NEM.725},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DechouniotisLDKD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DeviMR09,
  author       = {K. Vimala Devi and
                  K. M. Mehata and
                  S. Radhakrishnan},
  title        = {Resource prediction and management in active networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {57--74},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.688},
  doi          = {10.1002/NEM.688},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DeviMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GopakumarJ09,
  author       = {Aloor Gopakumar and
                  Lillykutty Jacob},
  title        = {Performance of some metaheuristic algorithms for localization in wireless
                  sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {355--373},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.714},
  doi          = {10.1002/NEM.714},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GopakumarJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GouyaC09,
  author       = {Anahita Gouya and
                  No{\"{e}}l Crespi},
  title        = {Detection and resolution of feature interactions in {IP} multimedia
                  subsystem},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {315--337},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.710},
  doi          = {10.1002/NEM.710},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GouyaC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HamidaB09,
  author       = {Ines Ben Hamida and
                  Lila Boukhatem},
  title        = {An adaptive resource reservation for vehicular mobile networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {375--398},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.715},
  doi          = {10.1002/NEM.715},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HamidaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JagadishG09,
  author       = {Chundury Jagadish and
                  Timothy A. Gonsalves},
  title        = {Distributed control of performance management traffic with accuracy
                  objectives},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {465--478},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.722},
  doi          = {10.1002/NEM.722},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JagadishG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KangJCHK09,
  author       = {Joon{-}Myung Kang and
                  Hong{-}Taek Ju and
                  Mi{-}Jung Choi and
                  James Won{-}Ki Hong and
                  Jun{-}Gu Kim},
  title        = {{OMA} DM-based remote software fault management for mobile devices},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {491--511},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.724},
  doi          = {10.1002/NEM.724},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KangJCHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KaoS09,
  author       = {Shang{-}Juh Kao and
                  Lai{-}Ming Shiue},
  title        = {Security management of mutually trusted domains through cooperation
                  of defensive technologies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {183--201},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.697},
  doi          = {10.1002/NEM.697},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KaoS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KaralisKKV09,
  author       = {Y. Karalis and
                  Michael N. Kalochristianakis and
                  Panagiotis C. Kokkinos and
                  Emmanouel A. Varvarigos},
  title        = {OpenRSM: a lightweight integrated open source remote management solution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {237--252},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.700},
  doi          = {10.1002/NEM.700},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KaralisKKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LavinalDR09,
  author       = {Emmanuel Lavinal and
                  Thierry Desprats and
                  Yves Raynaud},
  title        = {A multi-agent self-adaptative management framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {217--235},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.699},
  doi          = {10.1002/NEM.699},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LavinalDR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeroyB09,
  author       = {Damien Leroy and
                  Olivier Bonaventure},
  title        = {Preparing network configurations for IPv6 renumbering},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {415--426},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.717},
  doi          = {10.1002/NEM.717},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeroyB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiakopoulosKMPB09,
  author       = {Athanassios Liakopoulos and
                  Dimitrios Kalogeras and
                  Vasilis Maglaris and
                  Dimitris Primpas and
                  Christos Bouras},
  title        = {QoS experiences in native IPv6 networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {2},
  pages        = {119--137},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.695},
  doi          = {10.1002/NEM.695},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiakopoulosKMPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Lo09,
  author       = {Shou{-}Chih Lo},
  title        = {Design of multichannel {MAC} protocols for wireless ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {399--413},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.716},
  doi          = {10.1002/NEM.716},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Lo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MutawaAR09,
  author       = {A. M. Mutawa and
                  Hamed M. K. Alazemi and
                  Ammar Rayes},
  title        = {A novel steady-state genetic algorithm approach to the reliability
                  optimization design problem of computer networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {39--55},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.687},
  doi          = {10.1002/NEM.687},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MutawaAR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OuLHJ09,
  author       = {Hsia{-}Hung Ou and
                  Iuon{-}Chang Lin and
                  Min{-}Shiang Hwang and
                  Jinn{-}ke Jan},
  title        = {{TK-AKA:} using temporary key on Authentication and Key Agreement
                  protocol on {UMTS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {291--303},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.703},
  doi          = {10.1002/NEM.703},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OuLHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PazandD09,
  author       = {Babak Pazand and
                  Amitava Datta},
  title        = {An energy-efficient node-scheduling scheme for wireless sensor networks
                  based on minimum dominating sets},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {2},
  pages        = {75--99},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.689},
  doi          = {10.1002/NEM.689},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PazandD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RizkDEA09,
  author       = {Mohamed R. M. Rizk and
                  Moawad I. Dessouky and
                  Sami A. El{-}Dolil and
                  Mohammed Abd{-}Elnaby},
  title        = {A novel fair random access scheme with throughput optimization using
                  fuzzy controller for wireless systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {305--314},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.704},
  doi          = {10.1002/NEM.704},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/RizkDEA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalahDSS09,
  author       = {Khaled Salah and
                  Nasir Darwish and
                  M. Saleem and
                  Y. Shaaban},
  title        = {An analytical simulator for deploying {IP} telephony},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {1},
  pages        = {25--37},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.685},
  doi          = {10.1002/NEM.685},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalahDSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SamdanisA09,
  author       = {Konstantinos Samdanis and
                  A. Hamid Aghvami},
  title        = {QoS provision in wireless access networks: a routing perspective considering
                  mobility},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {445--456},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.719},
  doi          = {10.1002/NEM.719},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/SamdanisA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VianaRAS09,
  author       = {Mateus Mosca Viana and
                  Riverson Rios and
                  Rossana M. de Castro Andrade and
                  Jos{\'{e}} Neuman de Souza},
  title        = {An innovative approach to identify the {IP} address in denial-of-service
                  (DoS) attacks based on Cauchy's integral theorem},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {339--354},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.713},
  doi          = {10.1002/NEM.713},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/VianaRAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangQ09,
  author       = {Xiaonan Wang and
                  Huanyan Qian},
  title        = {Design and implementation of Anycast communication model in IPv6},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {175--182},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.692},
  doi          = {10.1002/NEM.692},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WeiWD09,
  author       = {Anne Wei and
                  Gouzhi Wei and
                  Gerard Dupeyrat},
  title        = {Improving Mobile IPv6 handover and authentication in wireless network
                  with {E-HCF}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {479--489},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.723},
  doi          = {10.1002/NEM.723},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WeiWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuSCZ09,
  author       = {Jing Wu and
                  Michel Savoie and
                  Scott Campbell and
                  Hanxi Zhang},
  title        = {A network management tool for resource-partition based layer 1 virtual
                  private networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {2},
  pages        = {139--152},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.696},
  doi          = {10.1002/NEM.696},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuSCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XiongPB09,
  author       = {Kaiqi Xiong and
                  Harry G. Perros and
                  Steven Blake},
  title        = {Bandwidth provisioning in {ADSL} access networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {5},
  pages        = {427--444},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.718},
  doi          = {10.1002/NEM.718},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/XiongPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangWZL09,
  author       = {Hua Zhang and
                  Qiao{-}Yan Wen and
                  Jie Zhang and
                  Wenmin Li},
  title        = {A constant rounds group key agreement protocol without using hash
                  functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {19},
  number       = {6},
  pages        = {457--464},
  year         = {2009},
  url          = {https://doi.org/10.1002/nem.720},
  doi          = {10.1002/NEM.720},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangWZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-OsaimiAB08,
  author       = {Khalid Al{-}Osaimi and
                  Abdulmohsen A. Alheraish and
                  Saad Haj Bakry},
  title        = {STOPE-based approach for e-readiness assessment case studies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {65--75},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.657},
  doi          = {10.1002/NEM.657},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-OsaimiAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlamW08,
  author       = {Muhammad Tanvir Alam and
                  Zheng Da Wu},
  title        = {Dimensioning and optimization of push-to-talk over cellular server},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {47--63},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.652},
  doi          = {10.1002/NEM.652},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlamW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlexanderB08,
  author       = {Michael Alexander and
                  Mark Burgess},
  title        = {Special issue on mathematical methods in network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {465--466},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.711},
  doi          = {10.1002/NEM.711},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlexanderB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlshaerE08,
  author       = {Hamada Alshaer and
                  Jaafar M. H. Elmirghani},
  title        = {Enabling novel premium service classes in DiffServ over MPLS-enabled
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {447--464},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.693},
  doi          = {10.1002/NEM.693},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlshaerE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Blefari-MelazziF08,
  author       = {Nicola Blefari{-}Melazzi and
                  Mauro Femminella},
  title        = {Measuring the edge-to-edge available bandwidth in a DiffServ domain},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {409--426},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.660},
  doi          = {10.1002/NEM.660},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Blefari-MelazziF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BourasS08,
  author       = {Christos Bouras and
                  Kostas Stamos},
  title        = {An efficient architecture for Bandwidth Brokers in DiffServ networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {27--46},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.650},
  doi          = {10.1002/NEM.650},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/BourasS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BullotKHGM08,
  author       = {Thomas Bullot and
                  Rida Khatoun and
                  Louis Hugues and
                  Dominique Ga{\"{\i}}ti and
                  Le{\"{\i}}la Merghem{-}Boulahia},
  title        = {A situatedness-based Knowledge Plane for autonomic networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {171--193},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.679},
  doi          = {10.1002/NEM.679},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BullotKHGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CherkaouiE08,
  author       = {Omar Cherkaoui and
                  Halima Elbiaze},
  title        = {Network virtualization under user control},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {147--158},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.675},
  doi          = {10.1002/NEM.675},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CherkaouiE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChrysoulasHKHK08,
  author       = {Christos Chrysoulas and
                  Evangelos Haleplidis and
                  Giorgos Kostopoulos and
                  Robert Haas and
                  Odysseas G. Koufopavlou},
  title        = {Towards a resource management and service deployment framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {345--363},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.672},
  doi          = {10.1002/NEM.672},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChrysoulasHKHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranF08,
  author       = {Kevin Curran and
                  Eoghan Furey},
  title        = {Pinpointing users with location estimation techniques and Wi-Fi hotspot
                  technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {395--408},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.683},
  doi          = {10.1002/NEM.683},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DuarteMF08,
  author       = {Elias Proc{\'{o}}pio Duarte Jr. and
                  Martin A. Musicante and
                  Henrique Denes H. Fernandes},
  title        = {{ANEMONA:} a programming language for network monitoring applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {295--302},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.655},
  doi          = {10.1002/NEM.655},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DuarteMF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/EsseghirB08,
  author       = {Moez Esseghir and
                  Nizar Bouabdallah},
  title        = {Node density control for maximizing wireless sensor network lifetime},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {159--170},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.676},
  doi          = {10.1002/NEM.676},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/EsseghirB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GawedzkiA08,
  author       = {Ignacy Gawedzki and
                  Khaldoun Al Agha},
  title        = {How to avoid packet droppers with proactive routing protocols for
                  ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {195--208},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.677},
  doi          = {10.1002/NEM.677},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GawedzkiA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Habib08,
  author       = {Sami J. Habib},
  title        = {Redesigning network topology with technology considerations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {1--13},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.635},
  doi          = {10.1002/NEM.635},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Habib08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/IskanderY08,
  author       = {Adel F. Iskander and
                  Akmal A. Younis},
  title        = {A proactive management algorithm for self-healing mobile ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {229--250},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.654},
  doi          = {10.1002/NEM.654},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/IskanderY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/IslamIL08,
  author       = {Md. Rafiqul Islam and
                  Md Zahidul Islam and
                  Nazia Leyla},
  title        = {A tree-based approach to matchmaking algorithms for resource discovery},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {427--436},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.686},
  doi          = {10.1002/NEM.686},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/IslamIL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JagadishJG08,
  author       = {Chundury Jagadish and
                  Vinod Kumar Jammula and
                  Timothy A. Gonsalves},
  title        = {Low-cost data communication network for rural telecom network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {1},
  pages        = {15--26},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.645},
  doi          = {10.1002/NEM.645},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JagadishJG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JayashreeAM08,
  author       = {L. S. Jayashree and
                  S. Arumugam and
                  A. R. Meenakshi},
  title        = {A communication-efficient framework for outlier-free data reporting
                  in data-gathering sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {437--445},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.691},
  doi          = {10.1002/NEM.691},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/JayashreeAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KornerP08,
  author       = {Ulf K{\"{o}}rner and
                  Guy Pujolle},
  title        = {Protocols and control schemes in the {NGN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {77},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.682},
  doi          = {10.1002/NEM.682},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KornerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Kuo08,
  author       = {Wen{-}Kuang Kuo},
  title        = {Supporting multimedia streaming and best-effort data transmission
                  over {IEEE} 802.11e {EDCA}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {209--228},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.653},
  doi          = {10.1002/NEM.653},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Kuo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LohierDP08,
  author       = {St{\'{e}}phane Lohier and
                  Yacine Ghamri{-}Doudane and
                  Guy Pujolle},
  title        = {Cross-layer design to improve elastic traffic performance in WLANs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {251--277},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.658},
  doi          = {10.1002/NEM.658},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LohierDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MarsonoEG08,
  author       = {Muhammad N. Marsono and
                  M. Watheq El{-}Kharashi and
                  Fayez Gebali},
  title        = {Prioritized e-mail servicing to reduce non-spam delay and loss: {A}
                  performance analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {325--344},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.664},
  doi          = {10.1002/NEM.664},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MarsonoEG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NatuS08,
  author       = {Maitreya Natu and
                  Adarshpal S. Sethi},
  title        = {Using temporal correlation for fault localization in dynamically changing
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {303--316},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.659},
  doi          = {10.1002/NEM.659},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NatuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OzturkK08,
  author       = {Yusuf Ozturk and
                  Manish Kulkarni},
  title        = {DIChirp: direct injection bandwidth estimation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {5},
  pages        = {377--394},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.674},
  doi          = {10.1002/NEM.674},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OzturkK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PlymothKJ08,
  author       = {Anders Nilsson Plymoth and
                  Ulf K{\"{o}}rner and
                  Per Johansson},
  title        = {Urban mesh and ad hoc mesh networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {107--127},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.681},
  doi          = {10.1002/NEM.681},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PlymothKJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalehO08,
  author       = {Moutaz Saleh Mustafa and
                  Zulaiha Ali Othman},
  title        = {Efficient scheduling discipline for Hierarchical Diff-EDF},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {279--294},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.661},
  doi          = {10.1002/NEM.661},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalehO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TamilarasiP08,
  author       = {Muthu Tamilarasi and
                  T. G. Palanivelu},
  title        = {A strategy to reduce the control packet load of MANETs with bidirectional
                  links using {DSR}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {365--376},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.673},
  doi          = {10.1002/NEM.673},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TamilarasiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TanwirBPK08,
  author       = {Savera Tanwir and
                  Lina Battestilli and
                  Harry G. Perros and
                  Gigi Karmous{-}Edwards},
  title        = {Dynamic scheduling of network resources with advance reservations
                  in optical grids},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {79--105},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.680},
  doi          = {10.1002/NEM.680},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/TanwirBPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/UrienP08,
  author       = {Pascal Urien and
                  Guy Pujolle},
  title        = {Security and privacy for the next wireless generation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {129--145},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.678},
  doi          = {10.1002/NEM.678},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/UrienP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/XiaonanH08,
  author       = {Xiaonan Wang and
                  Huanyan Qian},
  title        = {A scheme for solving Anycast scalability in IPv6},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {4},
  pages        = {317--324},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.665},
  doi          = {10.1002/NEM.665},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/XiaonanH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YanEA08,
  author       = {Yonghe Yan and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic model for capacity-constrained fair bandwidth allocation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {485--504},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.709},
  doi          = {10.1002/NEM.709},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YanEA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhengHWTL08,
  author       = {Qunwei Zheng and
                  Xiaoyan Hong and
                  Pu Wang and
                  Lei Tang and
                  Jun Liu},
  title        = {Delay management in delay-tolerant networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {521--537},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.706},
  doi          = {10.1002/NEM.706},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhengHWTL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhouYYLZ08,
  author       = {Jingjing Zhou and
                  Jiahai Yang and
                  Yang Yang and
                  Hongbo Liu and
                  Ming Zeng},
  title        = {Traffic matrix estimation based on a square root Kalman filtering
                  algorithm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {539--551},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.708},
  doi          = {10.1002/NEM.708},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhouYYLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhuP08,
  author       = {Quanyan Zhu and
                  Lacra Pavel},
  title        = {End-to-end {DWDM} optical link power-control via a Stackelberg revenue-maximizing
                  model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {505--520},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.705},
  doi          = {10.1002/NEM.705},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhuSBWS08,
  author       = {Xiaoyun Zhu and
                  Cipriano A. Santos and
                  Dirk Beyer and
                  Julie Ward and
                  Sharad Singhal},
  title        = {Automated application component placement in data centers using mathematical
                  programming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {467--483},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.707},
  doi          = {10.1002/NEM.707},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhuSBWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Abdennour07,
  author       = {Adel Abdennour},
  title        = {{VBR} video traffic modeling and synthetic data generation using GA-optimized
                  Volterra filters},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {231--241},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.620},
  doi          = {10.1002/NEM.620},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Abdennour07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhluwaliaV07,
  author       = {Punit Ahluwalia and
                  Upkar Varshney},
  title        = {Managing end-to-end quality of service in multiple heterogeneous wireless
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {243--260},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.639},
  doi          = {10.1002/NEM.639},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhluwaliaV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlexopoulosSKS07,
  author       = {Dimitris Alexopoulos and
                  John Soldatos and
                  George Kormentzas and
                  Charalabos Skianis},
  title        = {UbiXML: programmable management of ubiquitous computing resources},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {6},
  pages        = {415--435},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.649},
  doi          = {10.1002/NEM.649},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlexopoulosSKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArafahAB07,
  author       = {Mohammad Amer Arafah and
                  Hazza S. Al{-}Harbi and
                  Saad Haj Bakry},
  title        = {Grid computing: a {STOPE} view},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {295--305},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.634},
  doi          = {10.1002/NEM.634},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArafahAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM07,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {A simple mechanism for stabilizing network queues in {TCP/IP} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {275--286},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.625},
  doi          = {10.1002/NEM.625},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CarmoSM07,
  author       = {Maxweel Carmo and
                  Jorge S{\'{a}} Silva and
                  Edmundo Monteiro},
  title        = {EuQoS approach for resource allocation in Ethernet networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {373--388},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.670},
  doi          = {10.1002/NEM.670},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/CarmoSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenC07,
  author       = {Yen{-}Cheng Chen and
                  Io{-}Kuan Chan},
  title        = {{SNMP} GetRows: an effective scheme for retrieving management information
                  from {MIB} tables},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {51--67},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.613},
  doi          = {10.1002/NEM.613},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenLL07,
  author       = {Jiann{-}Liang Chen and
                  Hsi{-}Feng Lu and
                  Chien{-}An Lee},
  title        = {Autonomic self-organization architecture for wireless sensor communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {197--208},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.617},
  doi          = {10.1002/NEM.617},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChengL07,
  author       = {Rung{-}Shiang Cheng and
                  Hui{-}Tang Lin},
  title        = {Protecting {TCP} from a misbehaving receiver},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {209--218},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.618},
  doi          = {10.1002/NEM.618},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChengL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FarnhamSE07,
  author       = {Tim Farnham and
                  Mahesh Sooriyabandara and
                  Costas Efthymiou},
  title        = {Enhancing multimedia streaming over existing wireless {LAN} technology
                  using the Unified Link Layer {API}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {331--346},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.667},
  doi          = {10.1002/NEM.667},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FarnhamSE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HegdeAKK07,
  author       = {Malati Hegde and
                  S. V. R. Anand and
                  Anurag Kumar and
                  Joy Kuri},
  title        = {{WLAN} Manager {(WM):} a device for performance management of a {WLAN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {155--170},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.642},
  doi          = {10.1002/NEM.642},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HegdeAKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held07,
  author       = {Gilbert Held},
  title        = {Net neutrality may be a necessity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {1},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.624},
  doi          = {10.1002/NEM.624},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held07a,
  author       = {Gilbert Held},
  title        = {Focus on protecting data with DESlock+{\textregistered}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {99--102},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.644},
  doi          = {10.1002/NEM.644},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held07b,
  author       = {Gilbert Held},
  title        = {Greed is alive and well},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {195},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.633},
  doi          = {10.1002/NEM.633},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held07c,
  author       = {Gilbert Held},
  title        = {Do you get what you paid for?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {261},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.646},
  doi          = {10.1002/NEM.646},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JacobP07,
  author       = {Lillykutty Jacob and
                  Hung Keng Pung},
  title        = {Wireless and mobile network management research in Asia},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {103--105},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.637},
  doi          = {10.1002/NEM.637},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JacobP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimSY07,
  author       = {Dongwook Kim and
                  Mrinalini Sawhney and
                  Hyunsoo Yoon},
  title        = {An effective traffic management scheme using adaptive handover time
                  in next-generation cellular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {139--154},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.641},
  doi          = {10.1002/NEM.641},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimSY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KormentzasAAS07,
  author       = {George Kormentzas and
                  Maria Teresa Andrade and
                  Abolghasem (Hamid) Asgari and
                  Charalabos Skianis},
  title        = {Service management enhancements to {IMS} architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {363--371},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.669},
  doi          = {10.1002/NEM.669},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KormentzasAAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KormentzasS07,
  author       = {George Kormentzas and
                  Charalabos Skianis},
  title        = {Management solutions for QoS support over the entire audio-visual
                  service distribution chain},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {329--330},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.666},
  doi          = {10.1002/NEM.666},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KormentzasS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KuriK07,
  author       = {Joy Kuri and
                  R. M. Karthik},
  title        = {Scheduling streaming flows on the downlink shared channel of {UMTS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {117--137},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.640},
  doi          = {10.1002/NEM.640},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KuriK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeC07,
  author       = {Jong{-}Hyouk Lee and
                  Tai{-}Myoung Chung},
  title        = {Performance evaluation of distributed multiple home agents with {HAHA}
                  protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {107--115},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.638},
  doi          = {10.1002/NEM.638},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LimaCSM07,
  author       = {Ana Fl{\`{a}}via M. de Lima and
                  Leandro S. G. de Carvalho and
                  Jos{\'{e}} Neuman de Souza and
                  Edjair de Souza Mota},
  title        = {A framework for network quality monitoring in the VoIP environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {263--274},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.621},
  doi          = {10.1002/NEM.621},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LimaCSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NafisiWAFR07,
  author       = {Nima Nafisi and
                  Lin Wang and
                  Hamid Aghvami and
                  Ramon Ferr{\'{u}}s and
                  Xavier Rev{\'{e}}s},
  title        = {{IP} micromobility and QoS virtual network testbed},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {307--319},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.647},
  doi          = {10.1002/NEM.647},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NafisiWAFR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalehAB07,
  author       = {Mohammad Saad Saleh and
                  Abdullah Alrabiah and
                  Saad Haj Bakry},
  title        = {Using {ISO} 17799: 2005 information security management: a {STOPE}
                  view with six sigma approach},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {85--97},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.616},
  doi          = {10.1002/NEM.616},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalehAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SilvaW07,
  author       = {Paulo Fernando da Silva and
                  Carlos Becker Westphall},
  title        = {Improvements in the model for interoperability of intrusion detection
                  responses compatible with the {IDWG} model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {287--294},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.626},
  doi          = {10.1002/NEM.626},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SilvaW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SiqueiraRLN07,
  author       = {Isabela G. Siqueira and
                  Linnyer Beatrys Ruiz and
                  Antonio Alfredo Ferreira Loureiro and
                  Jos{\'{e}} Marcos S. Nogueira},
  title        = {Coverage area management for wireless sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {17--31},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.604},
  doi          = {10.1002/NEM.604},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SiqueiraRLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SoldatosA07,
  author       = {John Soldatos and
                  Dimitris Alexopoulos},
  title        = {Web Services-based network management: approaches and the {WSNET}
                  system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {33--50},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.612},
  doi          = {10.1002/NEM.612},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SoldatosA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SrinivasanVRSS07,
  author       = {Rajavelu Srinivasan and
                  Vaidehi V. and
                  N. Ranjani and
                  M. Sathya and
                  D. Subramani},
  title        = {Multi-path routing scheme for non-interactive multicast communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {6},
  pages        = {399--413},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.636},
  doi          = {10.1002/NEM.636},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SrinivasanVRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TriantafyllopoulouPSK07,
  author       = {Dionysia Triantafyllopoulou and
                  Nikos I. Passas and
                  Apostolis K. Salkintzis and
                  Alexandros Kaloxylos},
  title        = {A heuristic cross-layer mechanism for real-time traffic over {IEEE}
                  802.16 networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {347--361},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.668},
  doi          = {10.1002/NEM.668},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TriantafyllopoulouPSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Tseng07,
  author       = {Yuh{-}Min Tseng},
  title        = {A heterogeneous-network aided public-key management scheme for mobile
                  ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {3--15},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.603},
  doi          = {10.1002/NEM.603},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Tseng07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Varshney07,
  author       = {Upkar Varshney},
  title        = {Supporting dependable group-oriented mobile transactions: redundancy-based
                  architecture and performance},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {219--229},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.619},
  doi          = {10.1002/NEM.619},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Varshney07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VenkataramanET07,
  author       = {Gayathri Venkataraman and
                  Sabu Emmanuel and
                  Thambipillai Srikanthan},
  title        = {Size-restricted cluster formation and cluster maintenance technique
                  for mobile ad hoc networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {171--194},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.643},
  doi          = {10.1002/NEM.643},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VenkataramanET07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangQ07,
  author       = {Xiaonan Wang and
                  Huanyan Qian},
  title        = {Analysis and discussion of Anycast scalability in IPv6},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {321--328},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.648},
  doi          = {10.1002/NEM.648},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZafalaoF07,
  author       = {Rogerio M. Zafalao and
                  Nelson L. S. da Fonseca},
  title        = {A video broadcasting protocol for bandwidth-constrained clients},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {5},
  pages        = {389--398},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.671},
  doi          = {10.1002/NEM.671},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZafalaoF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZouKB07,
  author       = {Xukai Zou and
                  Yogesh Karandikar and
                  Elisa Bertino},
  title        = {A dynamic key management solution to access hierarchy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {6},
  pages        = {437--450},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.656},
  doi          = {10.1002/NEM.656},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZouKB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZubairiA07,
  author       = {Junaid Ahmed Zubairi and
                  Nabeel Ali Al{-}Bahbooh},
  title        = {Novel schemes for traffic engineering in access domains},
  journal      = {Int. J. Netw. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {69--83},
  year         = {2007},
  url          = {https://doi.org/10.1002/nem.615},
  doi          = {10.1002/NEM.615},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZubairiA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Abdel-HafezMO06,
  author       = {Ahmed Abdel{-}Hafez and
                  Ali Miri and
                  Luis Orozco{-}Barbosa},
  title        = {Scalable and fault-tolerant key agreement protocol for dynamic groups},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {185--202},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.592},
  doi          = {10.1002/NEM.592},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Abdel-HafezMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-BassamAB06,
  author       = {Bassam Al{-}Bassam and
                  Abdulmohsen A. Alheraish and
                  Saad Haj Bakry},
  title        = {A tutorial on using genetic algorithms for the design of network topology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {253--262},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.597},
  doi          = {10.1002/NEM.597},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-BassamAB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaMOF06,
  author       = {James Aweya and
                  Delfin Y. Montuno and
                  Michel Ouellette and
                  Kent Felske},
  title        = {Clock synchronization using a linear process model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {3--28},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.583},
  doi          = {10.1002/NEM.583},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaMOF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMF06,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Kent Felske},
  title        = {Rate-based proportional-integral control scheme for active queue management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {203--231},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.594},
  doi          = {10.1002/NEM.594},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bose06,
  author       = {Vanu G. Bose},
  title        = {Opportunities and challenges in software radio design for interference
                  management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {149--156},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.611},
  doi          = {10.1002/NEM.611},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bose06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaouchiVGOK06,
  author       = {Hakima Chaouchi and
                  Ivan Armuelles Voinov and
                  Ivan Ganchev and
                  M{\'{a}}irt{\'{\i}}n O'Droma and
                  Nino Kubinidze},
  title        = {Signalling analysis in integrated 4G networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {59--78},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.589},
  doi          = {10.1002/NEM.589},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaouchiVGOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenLC06,
  author       = {Jiann{-}Liang Chen and
                  Yu{-}Feng Lee and
                  Yao{-}Chung Chang},
  title        = {Mobile IPv6 network: implementation and application},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {29--43},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.586},
  doi          = {10.1002/NEM.586},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Christensen06,
  author       = {Kenneth J. Christensen},
  title        = {A special issue on a hot topic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {83},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.614},
  doi          = {10.1002/NEM.614},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Christensen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CridligASF06,
  author       = {Vincent Cridlig and
                  Humberto J. Abdelnur and
                  Radu State and
                  Olivier Festor},
  title        = {{XBGP-MAN:} an {XML} management architecture for {BGP}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {295--309},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.600},
  doi          = {10.1002/NEM.600},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CridligASF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FawazMCP06,
  author       = {Wissam Fawaz and
                  Fabio Martignon and
                  Ken Chen and
                  Guy Pujolle},
  title        = {A novel fault management approach for {DWDM} optical networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {5},
  pages        = {337--349},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.601},
  doi          = {10.1002/NEM.601},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/FawazMCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06,
  author       = {Gilbert Held},
  title        = {Authors and publishers get googled},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {1},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.590},
  doi          = {10.1002/NEM.590},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06a,
  author       = {Gilbert Held},
  title        = {Focus on Axis Communications' 206W wireless network camera},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {79--82},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.563},
  doi          = {10.1002/NEM.563},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06b,
  author       = {Gilbert Held},
  title        = {What was Cisco thinking?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {157--158},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.595},
  doi          = {10.1002/NEM.595},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06c,
  author       = {Gilbert Held},
  title        = {Working with the Proxim ORiNOCO {AP-700}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {233--237},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.575},
  doi          = {10.1002/NEM.575},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06d,
  author       = {Gilbert Held},
  title        = {Why searching DVDs can be frustrating},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {239},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.605},
  doi          = {10.1002/NEM.605},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06e,
  author       = {Gilbert Held},
  title        = {Focus on the Belkin Pre-N Wireless Router},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {311--314},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.588},
  doi          = {10.1002/NEM.588},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06f,
  author       = {Gilbert Held},
  title        = {Are regulations doing their job?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {5},
  pages        = {315},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.622},
  doi          = {10.1002/NEM.622},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held06g,
  author       = {Gilbert Held},
  title        = {Focus on the {ESET} {NOD32} antivirus system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {5},
  pages        = {375--379},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.623},
  doi          = {10.1002/NEM.623},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held06g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HnatyshinS06,
  author       = {Vasil Hnatyshin and
                  Adarshpal S. Sethi},
  title        = {Architecture for dynamic and fair distribution of bandwidth},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {5},
  pages        = {317--336},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.596},
  doi          = {10.1002/NEM.596},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HnatyshinS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongY06,
  author       = {James Won{-}Ki Hong and
                  Jae{-}Hyoung Yoo},
  title        = {Operations support systems and technologies for broadband convergence
                  networks and services in Korea},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {381--382},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.627},
  doi          = {10.1002/NEM.627},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HoodR06,
  author       = {Cindy Hood and
                  Dennis Roberson},
  title        = {Management of interference in wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {85--87},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.606},
  doi          = {10.1002/NEM.606},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HoodR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jesuale06,
  author       = {Nancy Jesuale},
  title        = {Spectrum policy issues for state and local government},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {89--101},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.607},
  doi          = {10.1002/NEM.607},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jesuale06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimOHCB06,
  author       = {Cheol{-}Seong Kim and
                  Ki{-}Sang Ok and
                  Daniel W. Hong and
                  Byung{-}Soo Chang and
                  Yoon{-}Hak Bang},
  title        = {NGOSS-based convergent {OSS} framework toward business agility: {KT}
                  case},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {399--412},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.629},
  doi          = {10.1002/NEM.629},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimOHCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimPKLKJ06,
  author       = {Jisun Kim and
                  Jong Hoon Park and
                  Sung Kim and
                  Dong Geol Lee and
                  Yo Sub Kim and
                  Sang Hyun Jin},
  title        = {Customer-centric service quality management for {SK} Telecom's mobile
                  packet service},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {413--427},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.630},
  doi          = {10.1002/NEM.630},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimPKLKJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Kolodzy06,
  author       = {Paul J. Kolodzy},
  title        = {Interference temperature: a metric for dynamic spectrum utilization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {103--113},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.608},
  doi          = {10.1002/NEM.608},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Kolodzy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LaithBA06,
  author       = {Mohamed Laith and
                  Saad Haj Bakry and
                  Abdulmohsen A. Alheraish},
  title        = {A simple approach for optimum channel reservation for hand-over calls
                  in cellular systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {241--252},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.593},
  doi          = {10.1002/NEM.593},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LaithBA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LangarTB06,
  author       = {Rami Langar and
                  Samir Tohm{\'{e}} and
                  Nizar Bouabdallah},
  title        = {Mobility management support and performance analysis for wireless
                  {MPLS} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {279--294},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.599},
  doi          = {10.1002/NEM.599},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LangarTB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeHKH06,
  author       = {Jae{-}Jo Lee and
                  Choong Seon Hong and
                  Joon{-}Myung Kang and
                  James Won{-}Ki Hong},
  title        = {Power line communication network trial and management in Korea},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {443--457},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.632},
  doi          = {10.1002/NEM.632},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeHKH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeLLS06,
  author       = {Dong{-}Hyun Lee and
                  Hwan{-}Joong Lee and
                  Young{-}Woo Lee and
                  Dong{-}Houn Shin},
  title        = {Wireless broadband services and network management system in {KT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {429--442},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.631},
  doi          = {10.1002/NEM.631},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeLLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeuMM06,
  author       = {Alexe E. Leu and
                  Mark A. McHenry and
                  Brian L. Mark},
  title        = {Modeling and analysis of interference in Listen-Before-Talk spectrum
                  access schemes},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {131--147},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.610},
  doi          = {10.1002/NEM.610},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeuMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiSY06,
  author       = {Hanyu Li and
                  Mubashir Syed and
                  Yu{-}Dong Yao},
  title        = {Outage performance of a hybrid {DS/FH} spread-spectrum signal in an
                  {ISM} band},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {2},
  pages        = {115--129},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.609},
  doi          = {10.1002/NEM.609},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NguyenOPJ06,
  author       = {Tuan Loc Nguyen and
                  Laurent Ouakil and
                  Guy Pujolle and
                  Abbas Jamalipour},
  title        = {MAN@RCHISES: new added-services architecture in automatic management
                  networking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {45--57},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.587},
  doi          = {10.1002/NEM.587},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NguyenOPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SalahA06,
  author       = {Khaled Salah and
                  A. Alkhoraidly},
  title        = {An OPNET-based simulation approach for deploying VoIP},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {159--183},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.591},
  doi          = {10.1002/NEM.591},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SalahA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SirajuddinS06,
  author       = {Shaik Sirajuddin and
                  Mohammed H. Sqalli},
  title        = {Distributed XML-based network management using {JPVM}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {263--277},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.598},
  doi          = {10.1002/NEM.598},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SirajuddinS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VarshneyM06,
  author       = {Upkar Varshney and
                  Alisha D. Malloy},
  title        = {Multilevel fault tolerance in infrastructure-oriented wireless networks:
                  framework and performance evaluation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {5},
  pages        = {351--374},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.602},
  doi          = {10.1002/NEM.602},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VarshneyM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Yoo06,
  author       = {Jae{-}Hyoung Yoo},
  title        = {Broadband Internet network management software platform and systems
                  in {KT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {16},
  number       = {6},
  pages        = {383--397},
  year         = {2006},
  url          = {https://doi.org/10.1002/nem.628},
  doi          = {10.1002/NEM.628},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Yoo06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Abdennour05,
  author       = {Adel Abdennour},
  title        = {Short-term {MPEG-4} video traffic prediction using {ANFIS}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {377--392},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110971},
  doi          = {10.1145/1110969.1110971},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Abdennour05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AbusinaZACSS05,
  author       = {Zalal Uddin Mohammad Abusina and
                  Salahuddin Muhammad Salim Zabir and
                  Ashir Ahmed and
                  Debasish Chakraborty and
                  Takuo Suganuma and
                  Norio Shiratori},
  title        = {An engineering approach to dynamic prediction of network performance
                  from application logs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {151--162},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066411},
  doi          = {10.1145/1066409.1066411},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AbusinaZACSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BadonnelSF05,
  author       = {Remi Badonnel and
                  Radu State and
                  Olivier Festor},
  title        = {Management of mobile ad hoc networks: information model and probe-based
                  architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {335--347},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110965},
  doi          = {10.1145/1110960.1110965},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BadonnelSF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryB05,
  author       = {Ali Haj Bakry and
                  Saad Haj Bakry},
  title        = {Enterprise resource planning: a review and a {STOPE} view},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {363--370},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110967},
  doi          = {10.1145/1110960.1110967},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BouabdallahP05,
  author       = {Nizar Bouabdallah and
                  Guy Pujolle},
  title        = {Optical resources provisioning: multipoint-to-point lightpaths mapping
                  in all-optical networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {203--212},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066415},
  doi          = {10.1145/1066409.1066415},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BouabdallahP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BoulisJ05,
  author       = {Athanassios Boulis and
                  Sanjay Jha},
  title        = {Guest editorial: network management in new realms: wireless sensor
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {219--221},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110932},
  doi          = {10.1145/1110930.1110932},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BoulisJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChangCCTL05,
  author       = {Chi{-}Yuan Chang and
                  Wei{-}Ming Chen and
                  Han{-}Chieh Chao and
                  Tak{-}Goa Tsuei and
                  Hong Bin Liu},
  title        = {{IP} layer load balance using fuzzy logic under IPv6 anycast mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {311--319},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110963},
  doi          = {10.1145/1110960.1110963},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChangCCTL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chen05,
  author       = {Yen{-}Wen Chen},
  title        = {Study of {LSP} arrangement schemes in label switch networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {421--431},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110974},
  doi          = {10.1145/1110969.1110974},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenCK05,
  author       = {Jiann{-}Liang Chen and
                  Wen{-}Hao Chen and
                  Sy{-}Yen Kuo},
  title        = {All-IPv6 service interworking gateway},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {135--147},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056174},
  doi          = {10.1145/1056168.1056174},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenCK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenCS05,
  author       = {Yen{-}Cheng Chen and
                  Yao{-}Jung Chan and
                  Cheung{-}Wo She},
  title        = {Enabling location-based services in wireless {LAN} hotspots},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {163--175},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066412},
  doi          = {10.1145/1066409.1066412},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChoiH05,
  author       = {Yong{-}Hoon Choi and
                  Ik{-}Soon Hwang},
  title        = {In-service QoS monitoring of real-time applications using {SM} {MIB}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {31--42},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044381},
  doi          = {10.1145/1044377.1044381},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChoiH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Christensen05,
  author       = {Ken Christensen},
  title        = {From the associate editor: a special issue on a rapidly expanding
                  field},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {217--218},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110931},
  doi          = {10.1145/1110930.1110931},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Christensen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranA05,
  author       = {Kevin Curran and
                  Stephen Annesley},
  title        = {Transcoding media for bandwidth constrained mobile devices},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {75--88},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056170},
  doi          = {10.1145/1056168.1056170},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranD05,
  author       = {Kevin Curran and
                  Connor Duffy},
  title        = {Understanding and reducing web delays},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {89--102},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056171},
  doi          = {10.1145/1056168.1056171},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranMFMOFC05,
  author       = {Kevin Curran and
                  Colman Morrissey and
                  Colm Fagan and
                  Colm Murphy and
                  Brian O'Donnell and
                  Gerry Fitzpatrick and
                  Stephen Condit},
  title        = {Monitoring hacker activity with a Honeynet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {123--134},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056173},
  doi          = {10.1145/1056168.1056173},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranMFMOFC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Dugas05,
  author       = {Christophe Dugas},
  title        = {Configuring and managing a large-scale monitoring network: solving
                  real world challenges for ultra-low-powered and long-range wireless
                  mesh networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {269--282},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110936},
  doi          = {10.1145/1110930.1110936},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Dugas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FodilP05,
  author       = {Idir Fodil and
                  Guy Pujolle},
  title        = {Roaming and service management in public wireless networks using an
                  innovative policy management architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {103--121},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056172},
  doi          = {10.1145/1056168.1056172},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FodilP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GunaratneCN05,
  author       = {Chamara Gunaratne and
                  Kenneth J. Christensen and
                  Bruce Nordman},
  title        = {Managing energy consumption costs in desktop PCs and {LAN} switches
                  with proxying, split {TCP} connections, and scaling of link speed},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {297--310},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110962},
  doi          = {10.1145/1110960.1110962},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GunaratneCN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HabibFB05,
  author       = {Ahsan Habib and
                  Sonia Fahmy and
                  Bharat K. Bhargava},
  title        = {Monitoring and controlling QoS network domains},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {11--29},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044380},
  doi          = {10.1145/1044377.1044380},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HabibFB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HanKSS05,
  author       = {Chih{-}Chieh Han and
                  Ram Kumar and
                  Roy Shea and
                  Mani B. Srivastava},
  title        = {Sensor network software update management: a survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {283--294},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110937},
  doi          = {10.1145/1110930.1110937},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HanKSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05,
  author       = {Gilbert Held},
  title        = {From the editor: a new year and a new journal},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {1},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044378},
  doi          = {10.1145/1044377.1044378},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05a,
  author       = {Gilbert Held},
  title        = {Focus on firetide hotpoint wireless mesh routers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {67--71},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044384},
  doi          = {10.1145/1044377.1044384},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05b,
  author       = {Gilbert Held},
  title        = {From the editor: doing business with {MCI}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {73--74},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1056168.1056169},
  doi          = {10.1145/1056168.1056169},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05c,
  author       = {Gilbert Held},
  title        = {From the editor: a first for the {FCC}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {149},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066410},
  doi          = {10.1145/1066409.1066410},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05d,
  author       = {Gilbert Held},
  title        = {Focus on the Cisco Aironet 802.11 a/b/g wireless {LAN} client adapter},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {213--216},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066416},
  doi          = {10.1145/1066409.1066416},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05e,
  author       = {Gilbert Held},
  title        = {From the editor: public versus private WiFi},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {295},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110961},
  doi          = {10.1145/1110960.1110961},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05f,
  author       = {Gilbert Held},
  title        = {Hardware spotlight: focus on blue secure intrusion protection system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {371--374},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110968},
  doi          = {10.1145/1110960.1110968},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05g,
  author       = {Gilbert Held},
  title        = {From the editor: do books matter?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {375},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110970},
  doi          = {10.1145/1110969.1110970},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held05h,
  author       = {Gilbert Held},
  title        = {Software spotlight: focus on network instruments' observer 10},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {433--440},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110975},
  doi          = {10.1145/1110969.1110975},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Kamoun05,
  author       = {Faouzi Kamoun},
  title        = {Toward best maintenance practices in communications network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {321--334},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110964},
  doi          = {10.1145/1110960.1110964},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Kamoun05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Koren05,
  author       = {Debby Koren},
  title        = {Are we ready for IPv6? Is IPv6 ready for us?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {61--66},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044383},
  doi          = {10.1145/1044377.1044383},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Koren05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeV05,
  author       = {Jangwon Lee and
                  Gustavo de Veciana},
  title        = {Scalable multicast based filtering and tracing framework for defeating
                  distributed DoS attacks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {43--60},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044382},
  doi          = {10.1145/1044377.1044382},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiM05,
  author       = {Jung{-}Shian Li and
                  Chung{-}Wen Ma},
  title        = {Improving fairness of {TCP} Vegas},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {1},
  pages        = {3--10},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1044377.1044379},
  doi          = {10.1145/1044377.1044379},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MarronLMGSR05,
  author       = {Pedro Jos{\'{e}} Marr{\'{o}}n and
                  Andreas J{\"{u}}rgen Lachenmann and
                  Daniel Minder and
                  Matthias Gauger and
                  Olga Saukh and
                  Kurt Rothermel},
  title        = {Management and configuration issues for sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {235--253},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110934},
  doi          = {10.1145/1110930.1110934},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MarronLMGSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PandeyF05,
  author       = {Ashwini K. Pandey and
                  Hiroshi Fujinoki},
  title        = {Study of {MANET} routing protocols by GloMoSim simulator},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {393--410},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110972},
  doi          = {10.1145/1110969.1110972},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PandeyF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/QuoitinPBU05,
  author       = {Bruno Quoitin and
                  Cristel Pelsser and
                  Olivier Bonaventure and
                  Steve Uhlig},
  title        = {A performance evaluation of BGP-based traffic engineering},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {177--191},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066413},
  doi          = {10.1145/1066409.1066413},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/QuoitinPBU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RamanathanKE05,
  author       = {Nithya Ramanathan and
                  Eddie Kohler and
                  Deborah Estrin},
  title        = {Towards a debugging system for sensor networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {223--234},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110933},
  doi          = {10.1145/1110930.1110933},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RamanathanKE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Tseng05,
  author       = {Yuh{-}Min Tseng},
  title        = {Efficient authenticated key agreement protocols resistant to a denial-of-service
                  attack},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {193--202},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1066409.1066414},
  doi          = {10.1145/1066409.1066414},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Tseng05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WolenetzKSR05,
  author       = {Matthew Wolenetz and
                  Rajnish Kumar and
                  JunSuk Shin and
                  Umakishore Ramachandran},
  title        = {A simulation-based study of wireless sensor network middleware},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {4},
  pages        = {255--267},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110930.1110935},
  doi          = {10.1145/1110930.1110935},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WolenetzKSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuCTL05,
  author       = {Tin Yu Wu and
                  Han{-}Chieh Chao and
                  Tak{-}Goa Tsuei and
                  Yufeng Li},
  title        = {A measurement study of network efficiency for {TWAREN} IPv6 backbone},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {6},
  pages        = {411--419},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110969.1110973},
  doi          = {10.1145/1110969.1110973},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuCTL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WuSCZBA05,
  author       = {Jing Wu and
                  Michel Savoie and
                  Scott Campbell and
                  Hanxi Zhang and
                  Gregor von Bochmann and
                  Bill St. Arnaud},
  title        = {Customer-managed end-to-end lightpath provisioning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {15},
  number       = {5},
  pages        = {349--362},
  year         = {2005},
  url          = {http://doi.acm.org/10.1145/1110960.1110966},
  doi          = {10.1145/1110960.1110966},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WuSCZBA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhmedC04,
  author       = {Rana Ejaz Ahmed and
                  Robin Cardan},
  title        = {{POCA:} pattern-oriented channel assignment scheme for wireless cellular
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {273--277},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017195},
  doi          = {10.1145/1017189.1017195},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhmedC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhmedKM04,
  author       = {Rana Ejaz Ahmed and
                  Hasan A. Khan and
                  Hussein T. Mouftah},
  title        = {Frame-level performance measurement in an {ATM} test-bed environment:
                  methodologies and experiences},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {279--286},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017196},
  doi          = {10.1145/1017189.1017196},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhmedKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Alheraish04,
  author       = {Abdulmohsen A. Alheraish},
  title        = {Autoregressive video conference models},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {329--337},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024516},
  doi          = {10.1145/1024511.1024516},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Alheraish04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AuLPW04,
  author       = {Siew Cheong Au and
                  Christopher Leckie and
                  Ajeet Parhar and
                  Gerard Wong},
  title        = {Efficient visualization of large routing topologies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {105--118},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987189},
  doi          = {10.1145/987185.987189},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AuLPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaODM04,
  author       = {James Aweya and
                  Michel Ouellette and
                  Abel Dasylva and
                  Delfin Y. Montuno},
  title        = {{DRED-MP:} queue management with multiple levels of drop precedence},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {405--424},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035736},
  doi          = {10.1145/1035731.1035736},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaODM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM04,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Weighted proportional loss rate differentiation of {TCP} traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {257--272},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017194},
  doi          = {10.1145/1017189.1017194},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMF04,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Kent Felske},
  title        = {Circuit emulation services over ethernet-part 1: clock synchronization
                  using timestamps},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {29--44},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971941},
  doi          = {10.1145/971936.971941},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMMSF04,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Jeganathan Markandu and
                  Karin Sundstrom and
                  Kent Felske},
  title        = {Circuit emulation services over ethernet-part 2: prototype and experimental
                  results},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {45--58},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971942},
  doi          = {10.1145/971936.971942},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMMSF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bakry04,
  author       = {Saad Haj Bakry},
  title        = {Development of e-government: a {STOPE} view},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {339--350},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024517},
  doi          = {10.1145/1024511.1024517},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bakry04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryAA04,
  author       = {Saad Haj Bakry and
                  Bassam Al{-}Bassam and
                  Abdulmohsen A. Alheraish},
  title        = {An integrated simple approach for the analysis of internet backbone
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {391--403},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035735},
  doi          = {10.1145/1035731.1035735},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryAA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BivensGMSW04,
  author       = {Alan Bivens and
                  Rashim Gupta and
                  Ingo McLean and
                  Boleslaw K. Szymanski and
                  Jerome White},
  title        = {Scalability and performance of an agent-based network management middleware},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {131--146},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987191},
  doi          = {10.1145/987185.987191},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BivensGMSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChakrabortyASKRS04,
  author       = {Debasish Chakraborty and
                  Ashir Ahmed and
                  Takuo Suganuma and
                  Glenn Mansfield Keeni and
                  T. K. Roy and
                  Norio Shiratori},
  title        = {Self-similar and fractal nature of internet traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {119--129},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987190},
  doi          = {10.1145/987185.987190},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChakrabortyASKRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chaouchi04,
  author       = {Hakima Chaouchi},
  title        = {A new policy-aware terminal for QoS, {AAA} and mobility management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {77--87},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987187},
  doi          = {10.1145/987185.987187},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chaouchi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaouchiA04,
  author       = {Hakima Chaouchi and
                  Pedro Marques Antunes},
  title        = {Pre-handover signalling for QoS aware mobility management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {367--374},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035733},
  doi          = {10.1145/1035731.1035733},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaouchiA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChieraKPT04,
  author       = {Belinda A. Chiera and
                  Michelle R. Krieg and
                  James W. Parrott and
                  Peter G. Taylor},
  title        = {Dynamic reallocation of capacity in logically fully-connected networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {9--18},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971939},
  doi          = {10.1145/971936.971939},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChieraKPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DuarteMF04,
  author       = {Elias P. Duarte Jr. and
                  Martin A. Musicante and
                  Di{\'{o}}genes Cogo Furlan},
  title        = {Formal specification of SNMPv3 entities using action semantics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {295--303},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024513},
  doi          = {10.1145/1024511.1024513},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/DuarteMF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Francis-CobleyC04,
  author       = {Pauline P. Francis{-}Cobley and
                  Adrian D. Coward},
  title        = {Voice over {IP} versus voice over frame relay},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {223--230},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017191},
  doi          = {10.1145/1017189.1017191},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Francis-CobleyC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Giladi04,
  author       = {Ran Giladi},
  title        = {{SNMP} for home automation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {231--239},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017192},
  doi          = {10.1145/1017189.1017192},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Giladi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04,
  author       = {Gilbert Held},
  title        = {It's time to regulate the {FCC}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {1},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971937},
  doi          = {10.1145/971936.971937},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04a,
  author       = {Gilbert Held},
  title        = {Focus on the Cisco Aironet 350 wireless access point},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {3--7},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971938},
  doi          = {10.1145/971936.971938},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04b,
  author       = {Gilbert Held},
  title        = {From the editor: stupidity and the software bullet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {75},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987186},
  doi          = {10.1145/987185.987186},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04c,
  author       = {Gilbert Held},
  title        = {From the editor: we need virus-writing courses},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {147},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992920},
  doi          = {10.1145/992919.992920},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04d,
  author       = {Gilbert Held},
  title        = {Software spotlight: focus on the CyberAngel security program},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {213--219},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992925},
  doi          = {10.1145/992919.992925},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04e,
  author       = {Gilbert Held},
  title        = {From the editor: ethics and our journal},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {221},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017190},
  doi          = {10.1145/1017189.1017190},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04f,
  author       = {Gilbert Held},
  title        = {Hardware spotlight: focus on {SMC} networks wireless {USB} and ethernet
                  network adapters},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {287--292},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017197},
  doi          = {10.1145/1017189.1017197},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04g,
  author       = {Gilbert Held},
  title        = {From the editor: for whom the {FCC} toils?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {293},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024512},
  doi          = {10.1145/1024511.1024512},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04h,
  author       = {Gilbert Held},
  title        = {It's the applications, stupid!},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {365},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035732},
  doi          = {10.1145/1035731.1035732},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held04i,
  author       = {Gilbert Held},
  title        = {Focus on the Asant{\'{e}} FriendlyNET {FR1104-G} router},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {425--430},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035737},
  doi          = {10.1145/1035731.1035737},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held04i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongH04,
  author       = {Daniel Won{-}Kyu Hong and
                  Choong Seon Hong},
  title        = {A distributed networking system for multimedia internet access service
                  using {ATM} over {ADSL}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {6},
  pages        = {375--390},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1035731.1035734},
  doi          = {10.1145/1035731.1035734},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Krief04,
  author       = {Francine Krief},
  title        = {Self-aware management of {IP} networks with QoS guarantees},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {351--364},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024518},
  doi          = {10.1145/1024511.1024518},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Krief04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeS04,
  author       = {Fu{-}Yuan Lee and
                  Shiuh{-}Pyng Shieh},
  title        = {Scalable and lightweight key distribution for secure group communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {167--176},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992922},
  doi          = {10.1145/992919.992922},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MahajanRP04,
  author       = {Manish Mahajan and
                  Ananthanarayanan Ramanathan and
                  Manish Parashar},
  title        = {Active resource management for the differentiated services environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {149--165},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992921},
  doi          = {10.1145/992919.992921},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MahajanRP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ParameswaranLHM04,
  author       = {Anandkrishna Parameswaran and
                  Miguel A. Labrador and
                  Ibrahim W. Habib and
                  Wilfrido Alejandro Moreno},
  title        = {Improving bandwidth efficiency in fault-tolerant opaque {IP} over
                  optical mesh networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {19--27},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971940},
  doi          = {10.1145/971936.971940},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ParameswaranLHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ProdanoffC04,
  author       = {Zornitza Genova Prodanoff and
                  Kenneth J. Christensen},
  title        = {Managing routing tables for {URL} routers in content distribution
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {177--192},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992923},
  doi          = {10.1145/992919.992923},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ProdanoffC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Rosenthal04,
  author       = {David A. Rosenthal},
  title        = {Analyses of selected variables effecting video streamed over {IP}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {193--211},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992924},
  doi          = {10.1145/992919.992924},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Rosenthal04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SenouciBP04,
  author       = {Sidi{-}Mohammed Senouci and
                  Andr{\'{e}}{-}Luc Beylot and
                  Guy Pujolle},
  title        = {Call admission control in cellular networks: a reinforcement learning
                  solution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {2},
  pages        = {89--103},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/987185.987188},
  doi          = {10.1145/987185.987188},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SenouciBP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ShahbazianC04,
  author       = {John Shahbazian and
                  Kenneth J. Christensen},
  title        = {TSGen: a tool for modeling of frame loss in streaming video},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {315--327},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024515},
  doi          = {10.1145/1024511.1024515},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ShahbazianC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/StephanRP04,
  author       = {Rayan Stephan and
                  Pradeep Kumar Ray and
                  Nandan Paramesh},
  title        = {Network management platform based on mobile agents},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {1},
  pages        = {59--73},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/971936.971943},
  doi          = {10.1145/971936.971943},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/StephanRP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangCC04,
  author       = {Reen{-}Cheng Wang and
                  R. I. Chen and
                  Han{-}Chieh Chao},
  title        = {{AAA} architecture for mobile IPv6 based on {WLAN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {5},
  pages        = {305--313},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1024511.1024514},
  doi          = {10.1145/1024511.1024514},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZabirAKS04,
  author       = {Salahuddin Muhammad Salim Zabir and
                  Ashir Ahmed and
                  Gen Kitagata and
                  Norio Shiratori},
  title        = {A new approach to ensure fairness over the internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {241--255},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/1017189.1017193},
  doi          = {10.1145/1017189.1017193},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZabirAKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-Asmari03,
  author       = {Awad Kh. Al{-}Asmari},
  title        = {A new video compression algorithm for different videoconferencing
                  standards},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {3--10},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.455},
  doi          = {10.1002/NEM.455},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-Asmari03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Aweya03,
  author       = {James Aweya},
  title        = {Trunking of {TDM} and narrowband services over {IP} Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {33--60},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.458},
  doi          = {10.1002/NEM.458},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Aweya03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM03,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Active queue management with flow proportional buffering},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {211--229},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794118},
  doi          = {10.1145/794112.794118},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bakry03,
  author       = {Saad Haj Bakry},
  title        = {Toward the development of a standard e-readiness assessment policy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {129--137},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.466},
  doi          = {10.1002/NEM.466},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bakry03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bakry03a,
  author       = {Saad Haj Bakry},
  title        = {Development of security policies for private networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {203--210},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794117},
  doi          = {10.1145/794112.794117},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bakry03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BeckmannT03,
  author       = {Dirk Beckmann and
                  J{\"{o}}rn Thurow},
  title        = {Global optimization of {SDH} networks: a practical application},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {61--67},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.459},
  doi          = {10.1002/NEM.459},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BeckmannT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BoukhatemGP03,
  author       = {Lila Boukhatem and
                  Dominique Ga{\"{\i}}ti and
                  Guy Pujolle},
  title        = {A time-based reservation scheme for managing handovers in satellite
                  systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {139--145},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.467},
  doi          = {10.1002/NEM.467},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BoukhatemGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChakrabortyCS03,
  author       = {Debasish Chakraborty and
                  Goutam Chakraborty and
                  Norio Shiratori},
  title        = {A dynamic multicast routing satisfying multiple QoS constraints},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {321--335},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944375},
  doi          = {10.1145/944373.944375},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChakrabortyCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaoTY03,
  author       = {Han{-}Chieh Chao and
                  Tak{-}Goa Tsuei and
                  Chih{-}Hung Ying},
  title        = {IPv6-GSM: an IPv6-based solution for {GSM} number portability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {349--357},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944377},
  doi          = {10.1145/944373.944377},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaoTY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranWMB03,
  author       = {Kevin Curran and
                  Derek Woods and
                  Nadene McDermot and
                  Colleen Bradley},
  title        = {The effects of badly behaved routers on Internet congestion},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {83--94},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.464},
  doi          = {10.1002/NEM.464},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranWMB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ElAaragB03,
  author       = {Hala ElAarag and
                  Mostafa A. Bassiouni},
  title        = {A reliable congestion control mechanism for geocasting in mobile wireless
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {375--387},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944379},
  doi          = {10.1145/944373.944379},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ElAaragB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/EvansH03,
  author       = {Jeffrey J. Evans and
                  Cynthia S. Hood},
  title        = {Modeling and simulation of mixed traffic on a prioritized shared medium},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {11--31},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.457},
  doi          = {10.1002/NEM.457},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/EvansH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03,
  author       = {Gilbert Held},
  title        = {Trash fake music},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {1},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.481},
  doi          = {10.1002/NEM.481},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03a,
  author       = {Gilbert Held},
  title        = {The {FCC} can't see},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {95},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.475},
  doi          = {10.1002/NEM.475},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03b,
  author       = {Gilbert Held},
  title        = {Focus on the Netgear 802.11b wireless {PC} card},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {155--162},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.461},
  doi          = {10.1002/NEM.461},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03c,
  author       = {Gilbert Held},
  title        = {Focus on PerfectDisk},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {163--169},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.462},
  doi          = {10.1002/NEM.462},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03d,
  author       = {Gilbert Held},
  title        = {From the editor: a tale of two emails},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {171--172},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794113},
  doi          = {10.1145/794112.794113},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03e,
  author       = {Gilbert Held},
  title        = {From the editor: {AOL} is acting offline},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {247},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897424},
  doi          = {10.1145/897423.897424},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03f,
  author       = {Gilbert Held},
  title        = {Hardware spotlight: focus on the D-link {DCS-1000W} wireless internet
                  camera},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {307--317},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897429},
  doi          = {10.1145/897423.897429},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03g,
  author       = {Gilbert Held},
  title        = {From the editor: take the hammer to WorldCom},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {319},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944374},
  doi          = {10.1145/944373.944374},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03h,
  author       = {Gilbert Held},
  title        = {Software spotlight: focus on Sniffer Portable},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {389--396},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944380},
  doi          = {10.1145/944373.944380},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03i,
  author       = {Gilbert Held},
  title        = {From the editor: complying with subpoenas},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {397},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958818},
  doi          = {10.1145/958817.958818},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03j,
  author       = {Gilbert Held},
  title        = {Focus on the Asant{\'{e}} FriendlyNet {VR2004} series {VPN} security
                  router},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {427--432},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958822},
  doi          = {10.1145/958817.958822},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held03k,
  author       = {Gilbert Held},
  title        = {Focus on undelete 3.0},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {433--437},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958823},
  doi          = {10.1145/958817.958823},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held03k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongH03,
  author       = {Daniel Won{-}Kyu Hong and
                  Choong Seon Hong},
  title        = {A QoS management framework for distributed multimedia systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {115--127},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.465},
  doi          = {10.1002/NEM.465},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JhaH03,
  author       = {Sanjay K. Jha and
                  Mahbub Hassan},
  title        = {Java implementation of policy-based bandwidth management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {249--258},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897425},
  doi          = {10.1145/897423.897425},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JhaH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimAC03,
  author       = {Jong{-}Keun Kim and
                  Seong{-}Jin Ahn and
                  Jin{-}Wook Chung},
  title        = {Design and implementation of WAP-based {LAN} segment management system
                  using {RMON} {MIB}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {187--202},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794116},
  doi          = {10.1145/794112.794116},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeBP03,
  author       = {Sung{-}Ju Lee and
                  Elizabeth M. Belding{-}Royer and
                  Charles E. Perkins},
  title        = {Scalability study of the ad hoc on-demand distance vector routing
                  protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {97--114},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.463},
  doi          = {10.1002/NEM.463},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeBP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Liu03,
  author       = {Xian Liu},
  title        = {Capacity and flow assignment issues in {MPLS} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {173--179},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794114},
  doi          = {10.1145/794112.794114},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Liu03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Liu03a,
  author       = {Xian Liu},
  title        = {Network capacity allocation for traffic with time priorities},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {411--417},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958820},
  doi          = {10.1145/958817.958820},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Liu03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LoC03,
  author       = {Chi{-}Chun Lo and
                  Bin{-}Wen Chuang},
  title        = {An adaptive survivability admission control algorithm using backup
                  path for high-speed networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {399--410},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958819},
  doi          = {10.1145/958817.958819},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LoC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PrabhavalkarP03,
  author       = {Niraj Prabhavalkar and
                  Manish Parashar},
  title        = {Controlling unresponsive connections in an active network architecture},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {289--305},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897428},
  doi          = {10.1145/897423.897428},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PrabhavalkarP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PujolleKP03,
  author       = {Guy Pujolle and
                  Ulf K{\"{o}}rner and
                  Harry G. Perros},
  title        = {Resource allocation in the new fixed and mobile internet generation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {181--185},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794115},
  doi          = {10.1145/794112.794115},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PujolleKP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RosenbaumJH03,
  author       = {Gustav Rosenbaum and
                  Sanjay K. Jha and
                  Mahbub Hassan},
  title        = {Empirical study of traffic trunking in Linux-based {MPLS} test-bed},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {277--288},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897427},
  doi          = {10.1145/897423.897427},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RosenbaumJH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TanTN03,
  author       = {Sin{-}Lam Tan and
                  Chen{-}Khong Tham and
                  Lek Heng Ngoh},
  title        = {Connection set-up and QoS monitoring in {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {3},
  pages        = {231--245},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/794112.794119},
  doi          = {10.1145/794112.794119},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TanTN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Tseng03,
  author       = {Yuh{-}Min Tseng},
  title        = {A scalable key-management scheme with minimizing key storage for secure
                  group communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {6},
  pages        = {419--425},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/958817.958821},
  doi          = {10.1145/958817.958821},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Tseng03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Yang03,
  author       = {Shin{-}Jer Yang},
  title        = {Design issues and performance improvements in routing strategy on
                  the internet workflow},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {359--374},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944378},
  doi          = {10.1145/944373.944378},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Yang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangC03,
  author       = {Shin{-}Jer Yang and
                  Hung{-}Cheng Chou},
  title        = {Adaptive QoS parameters approach to modeling Internet performance},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {1},
  pages        = {69--82},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.460},
  doi          = {10.1002/NEM.460},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangCWL03,
  author       = {Ruey{-}Bin Yang and
                  Yuan{-}Sun Chu and
                  Cheng{-}Shong Wu and
                  Ming{-}Cheng Liang},
  title        = {Pushout with virtual thresholds buffer management scheme in a shared
                  buffer {ATM} switch},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {2},
  pages        = {147--154},
  year         = {2003},
  url          = {https://doi.org/10.1002/nem.468},
  doi          = {10.1002/NEM.468},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangCWL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YoonJH03,
  author       = {Jeong{-}Hyuk Yoon and
                  Hong{-}Taek Ju and
                  James W. Hong},
  title        = {Development of {SNMP-XML} translator and gateway for XML-based integrated
                  network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {4},
  pages        = {259--276},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/897423.897426},
  doi          = {10.1145/897423.897426},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YoonJH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZabirAKSS03,
  author       = {Salahuddin Muhammad Salim Zabir and
                  Ashir Ahmed and
                  Gen Kitagata and
                  Takuo Suganuma and
                  Norio Shiratori},
  title        = {Ensuring fairness among {ECN} and non-ECN {TCP} over the internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {13},
  number       = {5},
  pages        = {337--348},
  year         = {2003},
  url          = {http://doi.acm.org/10.1145/944373.944376},
  doi          = {10.1145/944373.944376},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZabirAKSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-AmriA02,
  author       = {Marei S. Al{-}Amri and
                  Rana Ejaz Ahmed},
  title        = {New job selection and location policies for load-distributing algorithms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {165--178},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.428},
  doi          = {10.1002/NEM.428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-AmriA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-Ruwais02,
  author       = {Abdulaziz S. Al{-}Ruwais},
  title        = {Teletraffic capacity of {CDMA} cellular mobile networks and adaptive
                  antennas},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {203--211},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.435},
  doi          = {10.1002/NEM.435},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-Ruwais02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlheraishSI02,
  author       = {Abdulmohsen A. Alheraish and
                  D. G. Smith and
                  James Irvine},
  title        = {A novel methodology for robust {VBR} video transmission in an {ATM}
                  system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {347--355},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.450},
  doi          = {10.1002/NEM.450},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlheraishSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Service differentiation using a multi-level {RED} mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {81--98},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.424},
  doi          = {10.1002/NEM.424},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02a,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {A self-regulating {TCP} acknowledgment {(ACK)} pacing scheme},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {145--163},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.426},
  doi          = {10.1002/NEM.426},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM02b,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Interworking of switched ethernet and {ATM} flow control mechanisms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {357--366},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.452},
  doi          = {10.1002/NEM.452},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMDF02,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Bernard Doray and
                  Kent Felske},
  title        = {An adaptive load balancing scheme for web servers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {3--39},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.421},
  doi          = {10.1002/NEM.421},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMDF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaoHT02,
  author       = {Han{-}Chieh Chao and
                  C. L. Hung and
                  Tak{-}Goa Tsuei},
  title        = {{ECVBA} traffic-smoothing scheme for {VBR} media streams},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {179--185},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.434},
  doi          = {10.1002/NEM.434},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaoHT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChellappaG02,
  author       = {Ramnath K. Chellappa and
                  Alok Gupta},
  title        = {Managing computing resources in active intranets},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {117--128},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.427},
  doi          = {10.1002/NEM.427},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChellappaG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chen02,
  author       = {Yen{-}Wen Chen},
  title        = {Traffic behavior analysis and modeling of sub-networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {323--330},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.451},
  doi          = {10.1002/NEM.451},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenY02,
  author       = {Jiann{-}Liang Chen and
                  Ka{-}Chin Yen},
  title        = {Transparent bridging support for Bluetooth-IP service interworking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {379--386},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.454},
  doi          = {10.1002/NEM.454},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChengCLC02,
  author       = {Sheng{-}Tzong Cheng and
                  C. Chen and
                  C. Li and
                  Chia{-}Mei Chen},
  title        = {Network topology management in a mobile-switch {ATM} network: dynamic
                  partition algorithms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {99--115},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.425},
  doi          = {10.1002/NEM.425},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChengCLC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurranP02,
  author       = {Kevin Curran and
                  Gerard Parr},
  title        = {A framework for the transmission of streaming media to mobile devices},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {41--59},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.420},
  doi          = {10.1002/NEM.420},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurranP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FlynnCL02,
  author       = {Paul Flynn and
                  Kevin Curran and
                  Tom Lunney},
  title        = {A decision support system for telecommunications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {69--80},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.422},
  doi          = {10.1002/NEM.422},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FlynnCL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GreschlerM02,
  author       = {David Greschler and
                  Tim Mangan},
  title        = {Networking lessons in delivering Software as a Service - part {I}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {317--321},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.446},
  doi          = {10.1002/NEM.446},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GreschlerM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GreschlerM02a,
  author       = {David Greschler and
                  Tim Mangan},
  title        = {Networking lessons in delivering Software as a Service - Part {II}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {339--345},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.447},
  doi          = {10.1002/NEM.447},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GreschlerM02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ02,
  author       = {Anna Hac and
                  Yongcan Zhang},
  title        = {Reducing signaling traffic in wireless {ATM} networks through handoff
                  scheme improvement},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {281--302},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.444},
  doi          = {10.1002/NEM.444},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HanAC02,
  author       = {Jeong{-}Soo Han and
                  Seong{-}Jin Ahn and
                  Jin{-}Wook Chung},
  title        = {Study of delay patterns of weighted voice traffic of end-to-end users
                  on the VoIP network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {271--280},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.443},
  doi          = {10.1002/NEM.443},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HanAC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02,
  author       = {Gilbert Held},
  title        = {Amazon needs a Sampson},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.419},
  doi          = {10.1002/NEM.419},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02a,
  author       = {Gilbert Held},
  title        = {Focus on: Encryption Plus},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {1},
  pages        = {61--66},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.416},
  doi          = {10.1002/NEM.416},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02b,
  author       = {Gilbert Held},
  title        = {Minimizing wireless {LAN} exposure},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {67},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.440},
  doi          = {10.1002/NEM.440},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02c,
  author       = {Gilbert Held},
  title        = {Focus on: Router Sim},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {2},
  pages        = {129--132},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.417},
  doi          = {10.1002/NEM.417},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02d,
  author       = {Gilbert Held},
  title        = {Our new world},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {133},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.449},
  doi          = {10.1002/NEM.449},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02e,
  author       = {Gilbert Held},
  title        = {Focus on Agere System's Orinoco {PC} Card},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {187--193},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.432},
  doi          = {10.1002/NEM.432},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02f,
  author       = {Gilbert Held},
  title        = {Focus on EtherPeek},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {195--199},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.429},
  doi          = {10.1002/NEM.429},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02g,
  author       = {Gilbert Held},
  title        = {Fed up with the Feds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {201},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.441},
  doi          = {10.1002/NEM.441},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02h,
  author       = {Gilbert Held},
  title        = {Focus on System Mechanic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {259--263},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.430},
  doi          = {10.1002/NEM.430},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02i,
  author       = {Gilbert Held},
  title        = {Focus on the {SMC} network {EZ} Connect Wireless {PC} Card},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {265--267},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.437},
  doi          = {10.1002/NEM.437},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02j,
  author       = {Gilbert Held},
  title        = {Fighting junk fax},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {269},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.448},
  doi          = {10.1002/NEM.448},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02k,
  author       = {Gilbert Held},
  title        = {Focus on AiroPeek},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {331--335},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.431},
  doi          = {10.1002/NEM.431},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02l,
  author       = {Gilbert Held},
  title        = {Are Our Rights Illegal?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {337},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.474},
  doi          = {10.1002/NEM.474},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held02m,
  author       = {Gilbert Held},
  title        = {Focus on the {SMC} Networks Barricade},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {387--393},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.438},
  doi          = {10.1002/NEM.438},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held02m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HendriksSL02,
  author       = {J. C. W. Hendriks and
                  Marcel E. M. Spruit and
                  Maarten Looijen},
  title        = {Network management abroad},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {5},
  pages        = {303--316},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.445},
  doi          = {10.1002/NEM.445},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HendriksSL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongH02,
  author       = {Daniel Won{-}Kyu Hong and
                  Choong Seon Hong},
  title        = {Hierarchical {VP} restoration management system for a reliable {ATM}
                  backbone network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {213--224},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.436},
  doi          = {10.1002/NEM.436},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimCH02,
  author       = {Myung{-}Sup Kim and
                  Mi{-}Joung Choi and
                  James Won{-}Ki Hong},
  title        = {A load cluster management system using {SNMP} and web},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {6},
  pages        = {367--378},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.453},
  doi          = {10.1002/NEM.453},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimCH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Lincke-SaleckerH02,
  author       = {Susan Lincke{-}Salecker and
                  Cynthia S. Hood},
  title        = {Integrated networks that overflow speech and data between component
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {235--257},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.442},
  doi          = {10.1002/NEM.442},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Lincke-SaleckerH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Liu02,
  author       = {Xian Liu},
  title        = {Network optimization with stochastic traffic flows},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {4},
  pages        = {225--234},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.439},
  doi          = {10.1002/NEM.439},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Liu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson02,
  author       = {Judith M. Myerson},
  title        = {Identifying enterprise network vulnerabilities},
  journal      = {Int. J. Netw. Manag.},
  volume       = {12},
  number       = {3},
  pages        = {135--144},
  year         = {2002},
  url          = {https://doi.org/10.1002/nem.433},
  doi          = {10.1002/NEM.433},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Ahmed01,
  author       = {Rana Ejaz Ahmed},
  title        = {{ATM} test-bed architecture for training purposes},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {51--57},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.388},
  doi          = {10.1002/NEM.388},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Ahmed01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AnP01,
  author       = {Beongku An and
                  Symeon Papavassiliou},
  title        = {A mobility-based clustering approach to support mobility management
                  and multicast routing in mobile ad-hoc wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {387--395},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.415},
  doi          = {10.1002/NEM.415},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AnP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOM01,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno},
  title        = {Weighted proportional window control of {TCP} traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {213--242},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.407},
  doi          = {10.1002/NEM.407},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMC01,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Alan Chapman},
  title        = {Enhancing {TCP} performance with a load-adaptive {RED} mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {31--50},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.387},
  doi          = {10.1002/NEM.387},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AweyaOMY01,
  author       = {James Aweya and
                  Michel Ouellette and
                  Delfin Y. Montuno and
                  Zhonghui Yao},
  title        = {Improving network service quality with explicit {TCP} window control},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {169--188},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.402},
  doi          = {10.1002/NEM.402},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AweyaOMY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryB01,
  author       = {Saad Haj Bakry and
                  Fahed Haj Bakry},
  title        = {A strategic view for the development of E-Business},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {103--112},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.395},
  doi          = {10.1002/NEM.395},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChaoWC01,
  author       = {Han{-}Chieh Chao and
                  Tin Yu Wu and
                  Jiann{-}Liang Chen},
  title        = {Security-enhanced packet video with dynamic multicast throughput adjustment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {147--159},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.398},
  doi          = {10.1002/NEM.398},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChaoWC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hac01,
  author       = {Anna H{\'{a}}c},
  title        = {Wireless {ATM} network architectures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {161--167},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.399},
  doi          = {10.1002/NEM.399},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hac01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacA01,
  author       = {Anna Hac and
                  Abhinay Armstrong},
  title        = {Resource allocation scheme for QoS provisioning in microcellular networks
                  carrying multimedia traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {5},
  pages        = {277--307},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.410},
  doi          = {10.1002/NEM.410},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacC01,
  author       = {Anna Hac and
                  Boon Ling Chew},
  title        = {{ARCMA} - adaptive request channel multiple access protocol for wireless
                  {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {333--363},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.411},
  doi          = {10.1002/NEM.411},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacH01,
  author       = {Anna Hac and
                  Asif Hossain},
  title        = {A {LAN} emulation model for wireless {ATM}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {189--197},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.400},
  doi          = {10.1002/NEM.400},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacP01,
  author       = {Anna Hac and
                  Jing Peng},
  title        = {A two-phase combined QoS-based handoff scheme in a wireless {ATM}
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {5},
  pages        = {309--330},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.413},
  doi          = {10.1002/NEM.413},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HanAC01,
  author       = {Jeong{-}Soo Han and
                  Seong{-}Jin Ahn and
                  Jin{-}Wook Chung},
  title        = {A new approach of polling efficiency based on network topology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {243--251},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.408},
  doi          = {10.1002/NEM.408},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/HanAC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01,
  author       = {Gilbert Held},
  title        = {Hollywood goes haywire},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {1},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.380},
  doi          = {10.1002/NEM.380},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01a,
  author       = {Gilbert Held},
  title        = {Focus on Screen Pass},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {59--63},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.389},
  doi          = {10.1002/NEM.389},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01b,
  author       = {Gilbert Held},
  title        = {Hacker insurance - will you ever see a payout?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {73--74},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.381},
  doi          = {10.1002/NEM.381},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01c,
  author       = {Gilbert Held},
  title        = {Think twice before you post a message},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {137},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.385},
  doi          = {10.1002/NEM.385},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01d,
  author       = {Gilbert Held},
  title        = {Focus on Diskeeper 6.0},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {199--203},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.403},
  doi          = {10.1002/NEM.403},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01e,
  author       = {Gilbert Held},
  title        = {Considering wireless LANs: proceed with caution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {205},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.401},
  doi          = {10.1002/NEM.401},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01f,
  author       = {Gilbert Held},
  title        = {Focus on {PATHPING}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {259--261},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.404},
  doi          = {10.1002/NEM.404},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01g,
  author       = {Gilbert Held},
  title        = {When will Sun illuminate its server problem?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {5},
  pages        = {263},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.405},
  doi          = {10.1002/NEM.405},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held01h,
  author       = {Gilbert Held},
  title        = {A bad business practice award},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {331},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.418},
  doi          = {10.1002/NEM.418},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held01h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HicksW01,
  author       = {Jeffrey T. Hicks and
                  John Q. Walker II},
  title        = {A quick check of network performance},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {65--72},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.390},
  doi          = {10.1002/NEM.390},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HicksW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Koon01,
  author       = {David N. Koon},
  title        = {The importance of modal bandwidth in Gigabit Ethernet systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {139--146},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.396},
  doi          = {10.1002/NEM.396},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Koon01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Mangan01,
  author       = {Tim Mangan},
  title        = {Using Frame Relay for a {VPN}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {253--257},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.409},
  doi          = {10.1002/NEM.409},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Mangan01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson01,
  author       = {Judith M. Myerson},
  title        = {Identifying threats or assets: which come first?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {4},
  pages        = {207--211},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.406},
  doi          = {10.1002/NEM.406},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Papavassiliou01,
  author       = {Symeon Papavassiliou},
  title        = {Network and service management for wide-area electronic commercenetworks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {75--90},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.391},
  doi          = {10.1002/NEM.391},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Papavassiliou01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PedenYS01,
  author       = {Mark Peden and
                  Gavin Young and
                  Allison Sokol},
  title        = {From voice-band modems to {DSL} technologies},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {5},
  pages        = {265--276},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.423},
  doi          = {10.1002/NEM.423},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PedenYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SuLG01,
  author       = {William Su and
                  Sung{-}Ju Lee and
                  Mario Gerla},
  title        = {Mobility prediction and routing in ad hoc wireless networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {1},
  pages        = {3--30},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.386},
  doi          = {10.1002/NEM.386},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SuLG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Yang01,
  author       = {Shin{-}Jer Yang},
  title        = {An approach to modeling performance evaluation on the ethernet with
                  QoSparameters},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {91--101},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.394},
  doi          = {10.1002/NEM.394},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Yang01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangFS01,
  author       = {Wen{-}Her Yang and
                  Kai{-}Wei Fan and
                  Shiuh{-}Pyng Shieh},
  title        = {A secure multicast protocol for the internet's multicast backbone},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {129--136},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.392},
  doi          = {10.1002/NEM.392},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangFS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangFT01,
  author       = {Chyan Yang and
                  Chen{-}Hua Fu and
                  Yueh{-}Heng Tu},
  title        = {Enterprise traffic with a differentiated service mechanism},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {113--128},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.397},
  doi          = {10.1002/NEM.397},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangFT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangS01,
  author       = {Wen{-}Her Yang and
                  Shiuh{-}Pyng Shieh},
  title        = {Secure key agreement for group communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {365--374},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.412},
  doi          = {10.1002/NEM.412},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YeP01,
  author       = {Jian Ye and
                  Symeon Papavassiliou},
  title        = {Dynamic market-driven allocation of network resources using genetic
                  algorithms in a competitive electronic commerce marketplace},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {375--385},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.414},
  doi          = {10.1002/NEM.414},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YeP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Agha00,
  author       = {Khaldoun Al Agha},
  title        = {Resource management in wireless networks using intelligent agents},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {29--39},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<29::AID-NEM349\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<29::AID-NEM349\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Agha00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlkasabiA00,
  author       = {Saad O. Alkasabi and
                  Yasser M. AL{-}Eissa},
  title        = {Modeling and simulation of an {ATM} backbone network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {3--15},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<3::AID-NEM346\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<3::AID-NEM346\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlkasabiA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryB00,
  author       = {Saad Haj Bakry and
                  Fahed Haj Bakry},
  title        = {Identifying information network profiles for planning management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {315--322},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<315::AID-NEM378\>3.0.CO;2-Z},
  doi          = {10.1002/1099-1190(200011/12)10:6\<315::AID-NEM378\>3.0.CO;2-Z},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Carrere00,
  author       = {Daniel Carrere},
  title        = {Linux local and wide area network adapter support: (From 10 Mbps to
                  Gigabit Ethernet, Token Ring, Frame Relay, and Slow Packet)},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {2},
  pages        = {103--112},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200003/04)10:2\<103::AID-NEM361\>3.0.CO;2-4},
  doi          = {10.1002/(SICI)1099-1190(200003/04)10:2\<103::AID-NEM361\>3.0.CO;2-4},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Carrere00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChenW00,
  author       = {Yen{-}Wen Chen and
                  Jean{-}Lien C. Wu},
  title        = {A heuristic approach of bandwidth management for video sources in
                  {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {41--49},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<41::AID-NEM356\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<41::AID-NEM356\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChenW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Gerakoulis00,
  author       = {Diakoumis P. Gerakoulis},
  title        = {Demand assignment control in a satellite switched {CDMA} network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {175--189},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200007/08)10:4\<175::AID-NEM369\>3.0.CO;2-J},
  doi          = {10.1002/1099-1190(200007/08)10:4\<175::AID-NEM369\>3.0.CO;2-J},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Gerakoulis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacC00,
  author       = {Anna Hac and
                  Zhengping Chen},
  title        = {A hybrid channel allocation method for wireless communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {2},
  pages        = {59--74},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200003/04)10:2\<59::AID-NEM354\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(200003/04)10:2\<59::AID-NEM354\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacG00,
  author       = {Anna Hac and
                  Lei Guo},
  title        = {A scalable mobile host protocol for the internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {115--134},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200005/06)10:3\<115::AID-NEM365\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(200005/06)10:3\<115::AID-NEM365\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacH00,
  author       = {Anna Hac and
                  Yujing Huang},
  title        = {Location update and routing scheme for a mobile computing environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {191--214},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200007/08)10:4\<191::AID-NEM367\>3.0.CO;2-Z},
  doi          = {10.1002/1099-1190(200007/08)10:4\<191::AID-NEM367\>3.0.CO;2-Z},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00,
  author       = {Gilbert Held},
  title        = {The buzz about Linux},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {1},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<1::AID-NEM359\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<1::AID-NEM359\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00a,
  author       = {Gilbert Held},
  title        = {Internet tax via a stacked deck},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {2},
  pages        = {57},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200003/04)10:2\<57::AID-NEM353\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(200003/04)10:2\<57::AID-NEM353\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00b,
  author       = {Gilbert Held},
  title        = {Cisco network control - a dumb idea},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {113},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200005/06)10:3\<113::AID-NEM362\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(200005/06)10:3\<113::AID-NEM362\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00c,
  author       = {Gilbert Held},
  title        = {Are universal service fees a universal ripoff?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {173},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200007/08)10:4\<173::AID-NEM363\>3.0.CO;2-6},
  doi          = {10.1002/1099-1190(200007/08)10:4\<173::AID-NEM363\>3.0.CO;2-6},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00d,
  author       = {Gilbert Held},
  title        = {Focus on the MultiTech MultiVOIP gateway},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {229--237},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200007/08)10:4\<229::AID-NEM371\>3.0.CO;2-W},
  doi          = {10.1002/1099-1190(200007/08)10:4\<229::AID-NEM371\>3.0.CO;2-W},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00e,
  author       = {Gilbert Held},
  title        = {From the editor: thank you, postal service},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {239},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200009/10)10:5\<239::AID-NEM370\>3.0.CO;2-U},
  doi          = {10.1002/1099-1190(200009/10)10:5\<239::AID-NEM370\>3.0.CO;2-U},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00f,
  author       = {Gilbert Held},
  title        = {Focus on HackerShield},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {289--295},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200009/10)10:5\<289::AID-NEM372\>3.0.CO;2-J},
  doi          = {10.1002/1099-1190(200009/10)10:5\<289::AID-NEM372\>3.0.CO;2-J},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held00g,
  author       = {Gilbert Held},
  title        = {Patently absurd},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {297},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<297::AID-NEM379\>3.0.CO;2-L},
  doi          = {10.1002/1099-1190(200011/12)10:6\<297::AID-NEM379\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held00g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hemmen00,
  author       = {L. J. G. T. van Hemmen},
  title        = {Models supporting the network management organization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {299--314},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<299::AID-NEM377\>3.0.CO;2-L},
  doi          = {10.1002/1099-1190(200011/12)10:6\<299::AID-NEM377\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hemmen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HwangY00,
  author       = {Ren{-}Hung Hwang and
                  Pao{-}Ta Yu},
  title        = {{PROMS:} a PRO-active Monitoring System for {SS7} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {17--27},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<17::AID-NEM348\>3.0.CO;2-0},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<17::AID-NEM348\>3.0.CO;2-0},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HwangY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jamal-AldeenBN00,
  author       = {Rafiq Jamal{-}Aldeen and
                  Saad Haj Bakry and
                  Adnan Andrew Nouh},
  title        = {Performance-based evaluations of the tangible benefits of information
                  networks with applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {2},
  pages        = {91--101},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200003/04)10:2\<91::AID-NEM358\>3.0.CO;2-0},
  doi          = {10.1002/(SICI)1099-1190(200003/04)10:2\<91::AID-NEM358\>3.0.CO;2-0},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jamal-AldeenBN00a,
  author       = {Rafiq Jamal{-}Aldeen and
                  Saad Haj Bakry and
                  Adnan Andrew Nouh},
  title        = {Analysis of the cost-effectiveness of information networks with applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {145--156},
  year         = {2000},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jamal-AldeenBN00b,
  author       = {Rafiq Jamal{-}Aldeen and
                  Saad Haj Bakry and
                  Adnan Andrew Nouh},
  title        = {A methodology for the evaluation of the replacement of information
                  network technology with applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {349--359},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<349::AID-NEM384\>3.0.CO;2-V},
  doi          = {10.1002/1099-1190(200011/12)10:6\<349::AID-NEM384\>3.0.CO;2-V},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JiangTK00,
  author       = {Yuming Jiang and
                  Chen{-}Khong Tham and
                  Chi Chung Ko},
  title        = {Challenges and approaches in providing QoS monitoring},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {323--334},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<323::AID-NEM382\>3.0.CO;2-K},
  doi          = {10.1002/1099-1190(200011/12)10:6\<323::AID-NEM382\>3.0.CO;2-K},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JiangTK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JuCH00,
  author       = {Hong{-}Taek Ju and
                  Mi{-}Young Choi and
                  James W. Hong},
  title        = {An efficient and lightweight embedded Web server for Web-based network
                  element management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {261--275},
  year         = {2000},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JuCH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KanamaruOKMN00,
  author       = {Akira Kanamaru and
                  Kohei Ohta and
                  Nei Kato and
                  Glenn Mansfield and
                  Yoshiaki Nemoto},
  title        = {A simple packet aggregation technique for fault detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {215--228},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200007/08)10:4\<215::AID-NEM373\>3.0.CO;2-2},
  doi          = {10.1002/1099-1190(200007/08)10:4\<215::AID-NEM373\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KanamaruOKMN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimC00,
  author       = {Do{-}Hyeon Kim and
                  You Ze Cho},
  title        = {Design and implementation of network management systems for integrated
                  management of LANs and WANs},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {135--143},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200005/06)10:3\<135::AID-NEM364\>3.0.CO;2-C},
  doi          = {10.1002/(SICI)1099-1190(200005/06)10:3\<135::AID-NEM364\>3.0.CO;2-C},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LoCL00,
  author       = {Chi{-}Chun Lo and
                  Shing Hong Chen and
                  Bon{-}Yeh Lin},
  title        = {Coding-based schemes for fault identification in communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {157--164},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200005/06)10:3\<157::AID-NEM360\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(200005/06)10:3\<157::AID-NEM360\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LoCL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson00,
  author       = {Judith M. Myerson},
  title        = {Computer speech: streaming technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {1},
  pages        = {51--55},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200001/02)10:1\<51::AID-NEM357\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(200001/02)10:1\<51::AID-NEM357\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PapavassiliouP00,
  author       = {Symeon Papavassiliou and
                  Mike Pace},
  title        = {From service configuration through performance monitoring to fault
                  detection: implementing an integrated and automated network maintenance
                  platform for enhancing wide area transaction access services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {241--259},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200009/10)10:5\<241::AID-NEM374\>3.0.CO;2-4},
  doi          = {10.1002/1099-1190(200009/10)10:5\<241::AID-NEM374\>3.0.CO;2-4},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PapavassiliouP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SolletiC00,
  author       = {Arun Solleti and
                  Kenneth J. Christensen},
  title        = {Efficient transmission of stored video for improved management of
                  network bandwidth},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {277--288},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200009/10)10:5\<277::AID-NEM376\>3.0.CO;2-E},
  doi          = {10.1002/1099-1190(200009/10)10:5\<277::AID-NEM376\>3.0.CO;2-E},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SolletiC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ThamJK00,
  author       = {Chen{-}Khong Tham and
                  Yuming Jiang and
                  Chi Chung Ko},
  title        = {Monitoring QoS distribution in multimedia networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {2},
  pages        = {75--90},
  year         = {2000},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ThamJK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Wells00,
  author       = {Troy D. Wells},
  title        = {The basics of Windows {NT} 4.0 administration},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {6},
  pages        = {335--347},
  year         = {2000},
  url          = {https://doi.org/10.1002/1099-1190(200011/12)10:6\<335::AID-NEM383\>3.0.CO;2-A},
  doi          = {10.1002/1099-1190(200011/12)10:6\<335::AID-NEM383\>3.0.CO;2-A},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Wells00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WeyHCL00,
  author       = {Jyhi{-}Kong Wey and
                  Pen{-}Kuan Huang and
                  Hui{-}Chi Chang and
                  Jiu{-}Yang Liu},
  title        = {Implementation and management of a mobile phone filtering system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {165--171},
  year         = {2000},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(200005/06)10:3\<165::AID-NEM366\>3.0.CO;2-3},
  doi          = {10.1002/(SICI)1099-1190(200005/06)10:3\<165::AID-NEM366\>3.0.CO;2-3},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WeyHCL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhnYC99,
  author       = {Seong{-}Jin Ahn and
                  Seung Keun Yoo and
                  Jin{-}Wook Chung},
  title        = {Design and implementation of a web-based Internet performance management
                  system using {SNMP} {MIB-II0}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {309--321},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C309::AID-NEM339\%3E3.0.CO;2-8},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhnYC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-BarrakNB99,
  author       = {Saud Andrew Al{-}Barrak and
                  Adnan Andrew Nouh and
                  Saad Haj Bakry},
  title        = {Computer simulation for the evaluation of static and dynamic priority
                  schemes in an {ATM} multiplexer with multimedia traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {359--369},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-BarrakNB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-TawilA99,
  author       = {Khalid Al{-}Tawil and
                  Ibrahim A. Al{-}Kaltham},
  title        = {Evaluation and testing of internet firewalls},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {135--149},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C135::AID-NEM311\%3E3.0.CO;2-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-TawilA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Au99,
  author       = {T. Andrew Au},
  title        = {Topological considerations of {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {347--358},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C347::AID-NEM338\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Au99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryA99,
  author       = {Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan},
  title        = {Planning information networks: the scope and the customer issues},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {28--37},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryZ99,
  author       = {Saad Haj Bakry and
                  Naim Zawawi},
  title        = {An initial zone-splitting design method for cellular telephone systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {291--297},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Biloon99,
  author       = {Audrey Biloon},
  title        = {Caveat emptor},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {209--211},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C209::AID-NEM327\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Biloon99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CicaleseKDVZF99,
  author       = {Cynthia Della Torre Cicalese and
                  Martha L. Kahn and
                  John DeCarlo and
                  Pushkar Varna and
                  Elizabeth D. Zeisler and
                  Hal Folts},
  title        = {Intelligent interdomain distributed service management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {68--79},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C68::AID-NEM277\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CicaleseKDVZF99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CurtisS99,
  author       = {Walt Curtis and
                  Lori Sinton},
  title        = {Securing the global, remote, mobile user},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {9--21},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C9::AID-NEM246\%3E3.0.CO;2-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CurtisS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Deri99,
  author       = {Luca Deri},
  title        = {Desktop versus web-based network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {371--378},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C371::AID-NEM347\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Deri99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Engel99,
  author       = {Fred Engel},
  title        = {The role of service level agreements in the internet service provider
                  industry},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {299--301},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C299::AID-NEM335\%3E3.0.CO;2-E},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Engel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Engel99a,
  author       = {Fred Engel},
  title        = {Developing standards for {IT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {303--304},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C303::AID-NEM336\%3E3.0.CO;2-Z},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Engel99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Fuller99,
  author       = {Wayne Fuller},
  title        = {Network management using expert diagnostics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {199--208},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C199::AID-NEM324\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Fuller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/GuiagoussouS99,
  author       = {Mahamat Guiagoussou and
                  Said Soulhi},
  title        = {Implementation of a diagnostic and troubleshooting multi-agent system
                  for cellular networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {221--237},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C221::AID-NEM329\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/GuiagoussouS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hac99,
  author       = {Anna Hac},
  title        = {Congestion control in a wireless network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {185--192},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C185::AID-NEM326\%3E3.0.CO;2-L},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hac99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacL99,
  author       = {Anna Hac and
                  Hong Lin},
  title        = {Congestion control for {ABR} traffic in an {ATM} network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {249--264},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C249::AID-NEM325\%3E3.0.CO;2-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacM99,
  author       = {Anna Hac and
                  Chunlei Mo},
  title        = {Dynamic channel assignment in wireless communication networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {44--66},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C44::AID-NEM310\%3E3.0.CO;2-T},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ99,
  author       = {Anna Hac and
                  Zhu Zhu},
  title        = {Performance of routing schemes in wireless personal networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {80--105},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C80::AID-NEM301\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacZ99a,
  author       = {Anna Hac and
                  Kelei Zhou},
  title        = {A new heuristic algorithm for finding minimum-cost multicast trees
                  with bounded path delay},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {265--278},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C265::AID-NEM331\%3E3.0.CO;2-N},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacZ99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99,
  author       = {Gilbert Held},
  title        = {Beware of a new potential liability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {1},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C1::AID-NEM315\%3E3.0.CO;2-X},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99a,
  author       = {Gilbert Held},
  title        = {Extend the product cycle},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {67},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C67::AID-NEM322\%3E3.0.CO;2-2},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99b,
  author       = {Gilbert Held},
  title        = {Network undelete for Windows {NT} 4.04},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {126--132},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C126::AID-NEM323\%3E3.0.CO;2-7},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99c,
  author       = {Gilbert Held},
  title        = {Control runaway email},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {133},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C133::AID-NEM334\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99d,
  author       = {Gilbert Held},
  title        = {Working with Cisco access lists},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {151--154},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C151::AID-NEM314\%3E3.0.CO;2-6},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99e,
  author       = {Gilbert Held},
  title        = {Diskeeper server for Windows {NT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {193--196},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C193::AID-NEM333\%3E3.0.CO;2-Y},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99f,
  author       = {Gilbert Held},
  title        = {The evil of the urge to merge},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {197},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C197::AID-NEM340\%3E3.0.CO;2-J},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99g,
  author       = {Gilbert Held},
  title        = {Focus on WebTrends},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {279--284},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C279::AID-NEM341\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99h,
  author       = {Gilbert Held},
  title        = {Father Gore needs a reality check},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {285},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C285::AID-NEM344\%3E3.0.CO;2-T},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99i,
  author       = {Gilbert Held},
  title        = {Focus on Hyena},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {339--343},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C339::AID-NEM345\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99j,
  author       = {Gilbert Held},
  title        = {Are you prepared for an Internet hoax},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {345},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C345::AID-NEM350\%3E3.0.CO;2-0},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held99k,
  author       = {Gilbert Held},
  title        = {Focus on Cisco switch management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {387--392},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C387::AID-NEM351\%3E3.0.CO;2-O},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held99k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Herscovitz99,
  author       = {Eli Herscovitz},
  title        = {Secure virtual private networks: the future of data communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {213--220},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C213::AID-NEM328\%3E3.0.CO;2-E},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Herscovitz99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hoymany99,
  author       = {Fahad Hoymany},
  title        = {{ATM} adaptation layer choice for {IP-ATM} integration},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {6},
  pages        = {379--386},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C379::AID-NEM352\%3E3.0.CO;2-G},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hoymany99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HussainB99,
  author       = {Iftekhar Hussain and
                  Kuldip Bains},
  title        = {An explicit rate {ABR} algorithm for new-generation {ATM} switches},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {323--338},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C323::AID-NEM343\%3E3.0.CO;2-4},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HussainB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jenkins99,
  author       = {Ron Jenkins},
  title        = {Why web-based network monitoring? Leveraging the platform},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {175--183},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C175::AID-NEM320\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jenkins99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LuC99,
  author       = {Yantian Lu and
                  Kenneth J. Christensen},
  title        = {Using selective discard to improve real-time video quality on an ethernet
                  local area network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {106--117},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C106::AID-NEM312\%3E3.0.CO;2-D},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LuC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller99,
  author       = {Nathan J. Muller},
  title        = {Managing service level agreements},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {155--166},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C155::AID-NEM317\%3E3.0.CO;2-M},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Myerson99,
  author       = {Judith M. Myerson},
  title        = {Risk management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {305--308},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C305::AID-NEM337\%3E3.0.CO;2-Q},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Myerson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nicoll99,
  author       = {Chris Nicoll},
  title        = {A closer look at service level metrics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {5},
  pages        = {287--290},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C287::AID-NEM321\%3E3.0.CO;2-Y},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nicoll99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen99,
  author       = {Jesper Nilausen},
  title        = {{APPN} in heterogeneous environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {2--8},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C2::AID-NEM237\%3E3.0.CO;2-P},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen99a,
  author       = {Jesper Nilausen},
  title        = {{APPN} - a continuous evolution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {22--27},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C22::AID-NEM253\%3E3.0.CO;2-R},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Post99,
  author       = {Stephen D. Post},
  title        = {Network planning with a performance-prediction tool},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {3},
  pages        = {167--173},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199905/06\%299:3\%3C167::AID-NEM319\%3E3.0.CO;2-9},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Post99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Stallings99,
  author       = {William Stallings},
  title        = {Integrated services architecture: the next-generation internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {38--43},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C38::AID-NEM294\%3E3.0.CO;2-1},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Stallings99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Watson99,
  author       = {Terry Watson},
  title        = {An introduction to {WAN} analysis and the {HCT-6000} protocol analyser},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {239--247},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199907/08\%299:4\%3C239::AID-NEM330\%3E3.0.CO;2-H},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Watson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Wright99,
  author       = {Michele Wright},
  title        = {Using policies for effective network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {9},
  number       = {2},
  pages        = {118--125},
  year         = {1999},
  url          = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3},
  doi          = {10.1002/\%28SICI\%291099-1190\%28199903/04\%299:2\%3C118::AID-NEM313\%3E3.0.CO;2-3},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Wright99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BandyopadhyayCNT98,
  author       = {D. Bandyopadhyay and
                  H. Chen and
                  S. Nedialkov and
                  D. Tam},
  title        = {A video conference network management system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {182--190},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<182::AID-NEM279\>3.0.CO;2-N},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<182::AID-NEM279\>3.0.CO;2-N},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BandyopadhyayCNT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BhushanP98,
  author       = {Bharat Bhushan and
                  Ahmed Patel},
  title        = {Requirements and the concept of cooperative system management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {139--158},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<139::AID-NEM276\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<139::AID-NEM276\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BhushanP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BhushanP98a,
  author       = {Bharat Bhushan and
                  Ahmed Patel},
  title        = {A functional model of cooperative system management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {170--181},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<170::AID-NEM278\>3.0.CO;2-X},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<170::AID-NEM278\>3.0.CO;2-X},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BhushanP98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Chiu98,
  author       = {Timothy Chiu},
  title        = {Getting proactive network management from reactive network management
                  tools},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {12--17},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<12::AID-NEM289\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<12::AID-NEM289\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Chiu98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChristensenG98,
  author       = {Kenneth J. Christensen and
                  Franklin "Bo" Gulledge},
  title        = {Enabling power management for network-attached computers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {120--130},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<120::AID-NEM273\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<120::AID-NEM273\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChristensenG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DuarteMNN98,
  author       = {Elias Proc{\'{o}}pio Duarte Jr. and
                  Glenn Mansfield and
                  Takashi Nanya and
                  Shoichi Noguchi},
  title        = {Improving the dependability of network management systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {244--253},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<244::AID-NEM291\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<244::AID-NEM291\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DuarteMNN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/EngermanK98,
  author       = {Geoffrey Engerman and
                  Lee Kearney},
  title        = {Effective use of wireless data communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {2--11},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<2::AID-NEM288\>3.0.CO;2-L},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<2::AID-NEM288\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/EngermanK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Greenstein98,
  author       = {Larry J. Greenstein},
  title        = {Transporting voice traffic over packet networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {227--234},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<227::AID-NEM290\>3.0.CO;2-P},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<227::AID-NEM290\>3.0.CO;2-P},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Greenstein98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Guizani98,
  author       = {Mohsen Guizani},
  title        = {An effective congestion control scheme for {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {75--86},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<75::AID-NEM260\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<75::AID-NEM260\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Guizani98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Gulati98,
  author       = {Nav Gulati},
  title        = {Technology as a catalyst for acquisitions? Year 2000 preparedness
                  for the astute executive},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {206--210},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<206::AID-NEM303\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<206::AID-NEM303\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Gulati98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Gutierrez98,
  author       = {Jairo A. Guti{\'{e}}rrez},
  title        = {A connectionless approach to integrated network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {219--226},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<219::AID-NEM292\>3.0.CO;2-E},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<219::AID-NEM292\>3.0.CO;2-E},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Gutierrez98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hac98,
  author       = {Anna Hac},
  title        = {Network time slot allocation in an intelligent network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {57--63},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<57::AID-NEM267\>3.0.CO;2-0},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<57::AID-NEM267\>3.0.CO;2-0},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hac98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacC98,
  author       = {Anna Hac and
                  Xiaoyang Chu},
  title        = {A new cell loss recovery method using forward error correction in
                  {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {87--103},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<87::AID-NEM272\>3.0.CO;2-2},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<87::AID-NEM272\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacG98,
  author       = {Anna Hac and
                  Lining Gao},
  title        = {Analysis of congestion control mechanisms in an intelligent network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {18--41},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<18::AID-NEM262\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<18::AID-NEM262\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacM98,
  author       = {Anna Hac and
                  Yingjun Ma},
  title        = {A rate-based congestion control scheme for {ABR} service in {ATM}
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {5},
  pages        = {292--317},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199809/10)8:5\<292::AID-NEM286\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199809/10)8:5\<292::AID-NEM286\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacO98,
  author       = {Anna Hac and
                  Johnny On},
  title        = {Multimedia virtual circuit model for {MPEG} on {ATM} networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {6},
  pages        = {325--342},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199811/12)8:6\<325::AID-NEM299\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199811/12)8:6\<325::AID-NEM299\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98,
  author       = {Gilbert Held},
  title        = {Ignore the Gigabit Ethernet vs. {ATM} war},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {1998},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98a,
  author       = {Gilbert Held},
  title        = {ViaCrypt PGP/Business Edition},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {64--68},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<64::AID-NEM234\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<64::AID-NEM234\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98b,
  author       = {Gilbert Held},
  title        = {Spam the spammer},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {69},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<69::AID-NEM283\>3.0.CO;2-V},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<69::AID-NEM283\>3.0.CO;2-V},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98c,
  author       = {Gilbert Held},
  title        = {SysDraw - the network illustrator},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {131--136},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<131::AID-NEM222\>3.0.CO;2-V},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<131::AID-NEM222\>3.0.CO;2-V},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98d,
  author       = {Gilbert Held},
  title        = {Voice over data networks: an evolving technology with a warning flag},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {137--138},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<137::AID-NEM275\>3.0.CO;2-P},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<137::AID-NEM275\>3.0.CO;2-P},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98e,
  author       = {Gilbert Held},
  title        = {Norman virus control for Windows {NT}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {200--204},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<200::AID-NEM235\>3.0.CO;2-D},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<200::AID-NEM235\>3.0.CO;2-D},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98f,
  author       = {Gilbert Held},
  title        = {Why pay for phantom service?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {205},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<205::AID-NEM296\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<205::AID-NEM296\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98g,
  author       = {Gilbert Held},
  title        = {Cinco Networks WebXRay},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {254--261},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<254::AID-NEM285\>3.0.CO;2-H},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<254::AID-NEM285\>3.0.CO;2-H},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98h,
  author       = {Gilbert Held},
  title        = {Intels Web proposal = stupidity inside!},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {5},
  pages        = {263},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199809/10)8:5\<263::AID-NEM304\>3.0.CO;2-8},
  doi          = {10.1002/(SICI)1099-1190(199809/10)8:5\<263::AID-NEM304\>3.0.CO;2-8},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98i,
  author       = {Gilbert Held},
  title        = {EtherPeek - Ethernet network analysis software},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {5},
  pages        = {318--322},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199809/10)8:5\<318::AID-NEM305\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199809/10)8:5\<318::AID-NEM305\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98j,
  author       = {Gilbert Held},
  title        = {Contract renewal-think short term},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {6},
  pages        = {323--324},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199811/12)8:6\<323::AID-NEM309\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(199811/12)8:6\<323::AID-NEM309\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held98k,
  author       = {Gilbert Held},
  title        = {Password recovery windows toolkit},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {6},
  pages        = {368--370},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199811/12)8:6\<368::AID-NEM306\>3.0.CO;2-H},
  doi          = {10.1002/(SICI)1099-1190(199811/12)8:6\<368::AID-NEM306\>3.0.CO;2-H},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held98k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones98,
  author       = {Katherine Jones},
  title        = {An introduction to data warehousing: what are the implications for
                  the network?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {42--56},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199801/02)8:1\<42::AID-NEM236\>3.0.CO;2-M},
  doi          = {10.1002/(SICI)1099-1190(199801/02)8:1\<42::AID-NEM236\>3.0.CO;2-M},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones98a,
  author       = {Katherine Jones},
  title        = {Secure internet access to SAP's {R/3:} keeping dragons out},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {191--199},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<191::AID-NEM281\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<191::AID-NEM281\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KumarV98,
  author       = {G. Prem Kumar and
                  Pallapa Venkataram},
  title        = {Network restoration using recurrent neural networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {5},
  pages        = {264--273},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199809/10)8:5\<264::AID-NEM298\>3.0.CO;2-O},
  doi          = {10.1002/(SICI)1099-1190(199809/10)8:5\<264::AID-NEM298\>3.0.CO;2-O},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KumarV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller98,
  author       = {N. J. Muller},
  title        = {Java for network management applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {5},
  pages        = {274--291},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199809/10)8:5\<274::AID-NEM293\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(199809/10)8:5\<274::AID-NEM293\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller98a,
  author       = {Nathan J. Muller},
  title        = {Improving and managing multimedia performance over {TCP/IP} nets},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {6},
  pages        = {356--367},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199811/12)8:6\<356::AID-NEM308\>3.0.CO;2-I},
  doi          = {10.1002/(SICI)1099-1190(199811/12)8:6\<356::AID-NEM308\>3.0.CO;2-I},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sebuktekin98,
  author       = {Isil Seb{\"{u}}ktekin},
  title        = {An empirical study of {TCP/IP} performance over {FR/ATM} service interworking},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {6},
  pages        = {343--355},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199811/12)8:6\<343::AID-NEM302\>3.0.CO;2-9},
  doi          = {10.1002/(SICI)1099-1190(199811/12)8:6\<343::AID-NEM302\>3.0.CO;2-9},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sebuktekin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sharer98,
  author       = {Russell J. Sharer},
  title        = {Applying policy management to reduce support costs for remote and
                  mobile computing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {211--218},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<211::AID-NEM295\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<211::AID-NEM295\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sharer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TanterdtidSB98,
  author       = {Surat Tanterdtid and
                  Worawit Steanputtanagul and
                  Watit Benjapolakul},
  title        = {An optimum virtual paths network-based atm network using the geneticalgorithm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {3},
  pages        = {159--169},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199805/06)8:3\<159::AID-NEM297\>3.0.CO;2-9},
  doi          = {10.1002/(SICI)1099-1190(199805/06)8:3\<159::AID-NEM297\>3.0.CO;2-9},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TanterdtidSB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TsaiC98,
  author       = {Ching{-}Wun Tsai and
                  Ruay Shiung Chang},
  title        = {{SNMP} through {WWW}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {104--119},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<104::AID-NEM280\>3.0.CO;2-P},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<104::AID-NEM280\>3.0.CO;2-P},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TsaiC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Wetterau98,
  author       = {James Wetterau},
  title        = {{CTI} in the corporate enterprise},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {4},
  pages        = {235--243},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199807/08)8:4\<235::AID-NEM307\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199807/08)8:4\<235::AID-NEM307\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Wetterau98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Wolf98,
  author       = {Eugene H. Wolf},
  title        = {Local loop {ISDN} dial backup for frame relay},
  journal      = {Int. J. Netw. Manag.},
  volume       = {8},
  number       = {2},
  pages        = {70--74},
  year         = {1998},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199803/04)8:2\<70::AID-NEM257\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199803/04)8:2\<70::AID-NEM257\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Wolf98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Abul-HamayelE97,
  author       = {M. A. Abul{-}Hamayel and
                  N. S. El{-}Halmoushi},
  title        = {Moving mainframe {VM} users to a distributed {UNIX} system {(KFUPM}
                  {VM} rightsizing experience)},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {339--350},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<339::AID-NEM268\>3.0.CO;2-C},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<339::AID-NEM268\>3.0.CO;2-C},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Abul-HamayelE97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AhmedB97,
  author       = {Rana Ejaz Ahmed and
                  Saad Haj Bakry},
  title        = {New topology designs for the future expansion of the academic network
                  of the Gulf countries},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {1},
  pages        = {18--32},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199701/02)7:1\<18::AID-NEM231\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(199701/02)7:1\<18::AID-NEM231\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AhmedB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-SulaiymAB97,
  author       = {Hamad Al{-}Sulaiym and
                  Abdulaziz Al{-}Muammar and
                  Saad Haj Bakry},
  title        = {An Overview of Public, Research and Private Data Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {103--113},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\<103::AID-NEM230\>3.0.CO;2-0},
  doi          = {10.1002/(SICI)1099-1190(199703/04)7:2\<103::AID-NEM230\>3.0.CO;2-0},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Beyer-EbbesenCHL97,
  author       = {Bengt Beyer{-}Ebbesen and
                  Mark Cowtan and
                  Sharam Hakimi and
                  Robert D. Love},
  title        = {Migration Issues and Strategies for Token Ring},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {221--239},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199707/08)7:4\<221::AID-NEM258\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(199707/08)7:4\<221::AID-NEM258\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Beyer-EbbesenCHL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BroekL97,
  author       = {Floris G. H. van den Broek and
                  Maarten Looijen},
  title        = {Cost-effective Management of International Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {137--146},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<137::AID-NEM243\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<137::AID-NEM243\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BroekL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BroekL97a,
  author       = {Floris G. H. van den Broek and
                  Maarten Looijen},
  title        = {Management of international networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {242--250},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<242::AID-NEM252\>3.0.CO;2-L},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<242::AID-NEM252\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BroekL97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChristensenJ97,
  author       = {Kenneth J. Christensen and
                  Nandini Javagal},
  title        = {Prediction of future world wide web traffic characteristics for capacity
                  planning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {264--276},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<264::AID-NEM259\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<264::AID-NEM259\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChristensenJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Greggains97,
  author       = {David Greggains},
  title        = {{ADSL} and high bandwidth over copper lines},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {277--287},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<277::AID-NEM269\>3.0.CO;2-I},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<277::AID-NEM269\>3.0.CO;2-I},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Greggains97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Guizani97,
  author       = {Mohsen Guizani},
  title        = {High-speed protocol for an all-optical packet switched metropolitan
                  area network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {1},
  pages        = {9--17},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199701/02)7:1\<9::AID-NEM229\>3.0.CO;2-7},
  doi          = {10.1002/(SICI)1099-1190(199701/02)7:1\<9::AID-NEM229\>3.0.CO;2-7},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Guizani97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Guizani97a,
  author       = {Mohsen Guizani},
  title        = {{ATM} Architectures Using Optical Technology: An Overview of Switching,
                  Buffering and Multiplexing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {198--220},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199707/08)7:4\<198::AID-NEM244\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199707/08)7:4\<198::AID-NEM244\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Guizani97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacL97,
  author       = {Anna Hac and
                  Dongchen Lu},
  title        = {Architecture, design, and implementation of a multimedia conference
                  system},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {64--83},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\<64::AID-NEM247\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(199703/04)7:2\<64::AID-NEM247\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacW97,
  author       = {Anna Hac and
                  Dongmei Wang},
  title        = {A Multicast Routing Algorithm Reducing Congestion},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {147--163},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<147::AID-NEM249\>3.0.CO;2-J},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<147::AID-NEM249\>3.0.CO;2-J},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacX97,
  author       = {Anna Hac and
                  Cindy X. Xue},
  title        = {Synchronization in multimedia data retrieval},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {1},
  pages        = {33--62},
  year         = {1997},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacX97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97,
  author       = {Gilbert Held},
  title        = {Using the Internet - proceed with caution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {1},
  pages        = {1--2},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199701/02)7:1\<1::AID-NEM228\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199701/02)7:1\<1::AID-NEM228\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97a,
  author       = {Gilbert Held},
  title        = {Lets Attack the License War!},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {63},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\<63::AID-NEM248\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(199703/04)7:2\<63::AID-NEM248\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97b,
  author       = {Gilbert Held},
  title        = {Fighting Complexity With the Internet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {115},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<115::AID-NEM223\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<115::AID-NEM223\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97c,
  author       = {Gilbert Held},
  title        = {TR/Tracer for Windows},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {175--180},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<175::AID-NEM221\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<175::AID-NEM221\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97d,
  author       = {Gilbert Held},
  title        = {Measure Web traffic with caution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {181--182},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199707/08)7:4\<181::AID-NEM263\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(199707/08)7:4\<181::AID-NEM263\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97e,
  author       = {Gilbert Held},
  title        = {Are your communications {Y2000} problem proof?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {241},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<241::AID-NEM282\>3.0.CO;2-L},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<241::AID-NEM282\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held97f,
  author       = {Gilbert Held},
  title        = {Keep peering free},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {299},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<299::AID-NEM274\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<299::AID-NEM274\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held97f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jabri97,
  author       = {A. Kh. Al Jabri},
  title        = {A symmetric version of the McEliece public-key cryptosystem},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {316--323},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<316::AID-NEM261\>3.0.CO;2-7},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<316::AID-NEM261\>3.0.CO;2-7},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jabri97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones97,
  author       = {Katherine Jones},
  title        = {ServerWORKS manager: network management integrated with enterpriseand
                  applications servers},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {334--338},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<334::AID-NEM266\>3.0.CO;2-X},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<334::AID-NEM266\>3.0.CO;2-X},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Kalowski97,
  author       = {Nathan Kalowski},
  title        = {Applying the {RMON} standard to switched environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {305--315},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<305::AID-NEM256\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<305::AID-NEM256\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Kalowski97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KhanAGBY97,
  author       = {Abid Khan and
                  Nasir Al{-}Darwish and
                  Mohsen Guizani and
                  M. Benten and
                  H. Youssef},
  title        = {Design and implementation of a software bridge with packet filtering
                  and statistics collection functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {251--263},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<251::AID-NEM254\>3.0.CO;2-H},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<251::AID-NEM254\>3.0.CO;2-H},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KhanAGBY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller97,
  author       = {Nathan J. Muller},
  title        = {Improving Network Operations With Intelligent Agents},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {116--126},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<116::AID-NEM239\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<116::AID-NEM239\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller97a,
  author       = {Nathan J. Muller},
  title        = {Web-accessible network management tools},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {5},
  pages        = {288--29},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\<288::AID-NEM270\>3.0.CO;2-3},
  doi          = {10.1002/(SICI)1099-1190(199709/10)7:5\<288::AID-NEM270\>3.0.CO;2-3},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller97b,
  author       = {Nathan J. Muller},
  title        = {Advanced drawing tools aid network planning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {324--333},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<324::AID-NEM265\>3.0.CO;2-0},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<324::AID-NEM265\>3.0.CO;2-0},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nemzow97,
  author       = {Martin Nemzow},
  title        = {Business Continuity Planning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {127--136},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<127::AID-NEM233\>3.0.CO;2-3},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<127::AID-NEM233\>3.0.CO;2-3},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nemzow97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen97,
  author       = {Jesper Nilausen},
  title        = {{APPN} connection networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {1},
  pages        = {3--8},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199701/02)7:1\<3::AID-NEM226\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199701/02)7:1\<3::AID-NEM226\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PatelM97,
  author       = {Ahmed Patel and
                  Stephen Morris},
  title        = {Design and Implementation of an SNMPv2 Management System for MS-DOS/Novell
                  NetWare and Unix-TCP/IP},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {164--174},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199705/06)7:3\<164::AID-NEM250\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199705/06)7:3\<164::AID-NEM250\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PatelM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Salenger97,
  author       = {Dan Salenger},
  title        = {Internet environment and outsourcing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {6},
  pages        = {300--304},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199711/12)7:6\<300::AID-NEM255\>3.0.CO;2-F},
  doi          = {10.1002/(SICI)1099-1190(199711/12)7:6\<300::AID-NEM255\>3.0.CO;2-F},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Salenger97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Salsburg97,
  author       = {Michael A. Salsburg},
  title        = {Network performance modeling with NetArchitect \({}^{\mbox{TM}}\)
                  get a grip!},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {84--93},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\<84::AID-NEM245\>3.0.CO;2-9},
  doi          = {10.1002/(SICI)1099-1190(199703/04)7:2\<84::AID-NEM245\>3.0.CO;2-9},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Salsburg97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Schneider97,
  author       = {Kenneth S. Schneider},
  title        = {Solving two application problems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {94--102},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\<94::AID-NEM241\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(199703/04)7:2\<94::AID-NEM241\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Schneider97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Yang97,
  author       = {Shin{-}Jer Yang},
  title        = {Performance evaluation of routing algorithms under various network
                  configuration parameters},
  journal      = {Int. J. Netw. Manag.},
  volume       = {7},
  number       = {4},
  pages        = {183--197},
  year         = {1997},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199707/08)7:4\<183::AID-NEM251\>3.0.CO;2-2},
  doi          = {10.1002/(SICI)1099-1190(199707/08)7:4\<183::AID-NEM251\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Yang97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-Kadi96,
  author       = {Ibrahim A. Al{-}Kadi},
  title        = {Evaluation of Capacity and Spectral Efficiency of the Emerging Digital
                  Mobile Systems},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {215--222},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<215::AID-NEM213\>3.0.CO;2-2},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<215::AID-NEM213\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-Kadi96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-RumaihABA96,
  author       = {Adel Al{-}Rumaih and
                  Rana Ejaz Ahmed and
                  Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan},
  title        = {A Methodology for Network Topology Design with Link and Node Failuresy
                  Tolerance},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {42--63},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\<42::AID-NEM208\>3.0.CO;2-R},
  doi          = {10.1002/(SICI)1099-1190(199601/02)6:1\<42::AID-NEM208\>3.0.CO;2-R},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-RumaihABA96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-SulaiymAAB96,
  author       = {Hamad Al{-}Sulaiym and
                  Mohammed A. Al{-}Turaigi and
                  Abdullah Al{-}Dhelaan and
                  Saad Haj Bakry},
  title        = {Computer Simulation for the Evaluation of the {IBM-SNA} CongestionManagement
                  Method on {GULFNET}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {94--107},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<94::AID-NEM194\>3.0.CO;2-D},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<94::AID-NEM194\>3.0.CO;2-D},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAAB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryA96,
  author       = {Saad Haj Bakry and
                  Ibrahim A. Al{-}Kadi},
  title        = {Analysis of Public Access Provisioning Requirements for Information
                  Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {327--333},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<327::AID-NEM224\>3.0.CO;2-2},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<327::AID-NEM224\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryA96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BensimonZ96,
  author       = {Jacques Bensimon and
                  Yuri Zlotnikov},
  title        = {Estimation of Packet Delivery Time Characteristics in an Ethernet-type
                  {LAN} Management System},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {5},
  pages        = {264--270},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199609/10)6:5\<264::AID-NEM211\>3.0.CO;2-O},
  doi          = {10.1002/(SICI)1099-1190(199609/10)6:5\<264::AID-NEM211\>3.0.CO;2-O},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BensimonZ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hac96,
  author       = {Anna Hac},
  title        = {Bandwidth Management and Switch Buffer Allocation in High-speed Networks
                  with Bursty Traffic},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {2--16},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\<2::AID-NEM170\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(199601/02)6:1\<2::AID-NEM170\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hac96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacL96,
  author       = {Anna Hac and
                  Dongchen Lu},
  title        = {Architecture and Performance of a Multimedia Conference System},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {230--240},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<230::AID-NEM217\>3.0.CO;2-3},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<230::AID-NEM217\>3.0.CO;2-3},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Har-Lev96,
  author       = {Yoram Har{-}Lev},
  title        = {Vive le Customer!},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {212--214},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<212::AID-NEM212\>3.0.CO;2-E},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<212::AID-NEM212\>3.0.CO;2-E},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Har-Lev96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hauf96,
  author       = {Allen Hauf},
  title        = {{ISDN:} The New, All-digital Network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {129--134},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<129::AID-NEM198\>3.0.CO;2-K},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<129::AID-NEM198\>3.0.CO;2-K},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hauf96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96,
  author       = {Gilbert Held},
  title        = {{PGP} = {PSG}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {1},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\<1::AID-NEM176\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(199601/02)6:1\<1::AID-NEM176\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96a,
  author       = {Gilbert Held},
  title        = {{LAN} Software Cost Confusion},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {67--68},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<67::AID-NEM191\>3.0.CO;2-G},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<67::AID-NEM191\>3.0.CO;2-G},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96b,
  author       = {Gilbert Held},
  title        = {Providing Network Information and Assistance Via the Web},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {69--76},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<69::AID-NEM178\>3.0.CO;2-S},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<69::AID-NEM178\>3.0.CO;2-S},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96c,
  author       = {Gilbert Held},
  title        = {Procomm Plus for Windows},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {119--125},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<119::AID-NEM175\>3.0.CO;2-6},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<119::AID-NEM175\>3.0.CO;2-6},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96d,
  author       = {Gilbert Held},
  title        = {Check Your Email},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {127--128},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<127::AID-NEM165\>3.0.CO;2-1},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<127::AID-NEM165\>3.0.CO;2-1},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96e,
  author       = {Gilbert Held},
  title        = {The CrossComm Internetwork Management System},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {177--183},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<177::AID-NEM192\>3.0.CO;2-2},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<177::AID-NEM192\>3.0.CO;2-2},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96f,
  author       = {Gilbert Held},
  title        = {From the Editor: Can Plug and Play Play?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {187},
  year         = {1996},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96g,
  author       = {Gilbert Held},
  title        = {ServerTrak for Windows},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {241--246},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<241::AID-NEM193\>3.0.CO;2-6},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<241::AID-NEM193\>3.0.CO;2-6},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96h,
  author       = {Gilbert Held},
  title        = {Where Have All the Ethics Gone?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {297--298},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<297::AID-NEM227\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<297::AID-NEM227\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held96i,
  author       = {Gilbert Held},
  title        = {Using SimpleView to Manage {SNMP} Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {341--346},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<341::AID-NEM209\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<341::AID-NEM209\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held96i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Hillhouse96,
  author       = {Jack Hillhouse},
  title        = {Operation and Utilization of the Racal-Datacom {CMS} {\textregistered}
                  for Tivoli {TME} 10 NetView},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {5},
  pages        = {284--294},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199609/10)6:5\<284::AID-NEM219\>3.0.CO;2-Z},
  doi          = {10.1002/(SICI)1099-1190(199609/10)6:5\<284::AID-NEM219\>3.0.CO;2-Z},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Hillhouse96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jacobson96,
  author       = {Robert V. Jacobson},
  title        = {Electronic Data Processing Security - An Overview},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {77--93},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<77::AID-NEM184\>3.0.CO;2-7},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<77::AID-NEM184\>3.0.CO;2-7},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jacobson96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones96,
  author       = {Katherine Jones},
  title        = {System Management for the Three-tiered {SAP} {AG} {R/3} Environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {150--159},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<150::AID-NEM203\>3.0.CO;2-S},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<150::AID-NEM203\>3.0.CO;2-S},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones96a,
  author       = {Katherine Jones},
  title        = {Protecting {UNIX} Systems: Security Management with {CA-UNICENTER}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {188--198},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<188::AID-NEM172\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<188::AID-NEM172\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimK96,
  author       = {Tai Woo Kim and
                  Tai Yun Kim},
  title        = {Pre-electing a Leader in Distributed Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {160--169},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<160::AID-NEM205\>3.0.CO;2-L},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<160::AID-NEM205\>3.0.CO;2-L},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeK96,
  author       = {Yong{-}Jin Lee and
                  Tai{-}Yun Kim},
  title        = {Two-phase Heuristic Algorithm for Delay Constrained Minimal Cost LoopProblem},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {142--149},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<142::AID-NEM202\>3.0.CO;2-Q},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<142::AID-NEM202\>3.0.CO;2-Q},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LombardoPS96,
  author       = {Alfio Lombardo and
                  Sergio Palazzo and
                  Giovanni Schembra},
  title        = {Modeling Service Activation in a Multimedia Environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {299--311},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<299::AID-NEM214\>3.0.CO;2-U},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<299::AID-NEM214\>3.0.CO;2-U},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LombardoPS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Lopilato96,
  author       = {Michael Lopilato},
  title        = {Revitalizing {X.25} Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {37--41},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\<37::AID-NEM196\>3.0.CO;2-D},
  doi          = {10.1002/(SICI)1099-1190(199601/02)6:1\<37::AID-NEM196\>3.0.CO;2-D},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Lopilato96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/McGowen96,
  author       = {Michael McGowen},
  title        = {Serial-HIPPI Network Interfaces Using the RoadRunnerPCI {ASIC}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {334--340},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<334::AID-NEM225\>3.0.CO;2-7},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<334::AID-NEM225\>3.0.CO;2-7},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/McGowen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller96,
  author       = {Nathan J. Muller},
  title        = {SNMPs Remote Monitoring {MIB}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {17--32},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\<17::AID-NEM171\>3.0.CO;2-W},
  doi          = {10.1002/(SICI)1099-1190(199601/02)6:1\<17::AID-NEM171\>3.0.CO;2-W},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller96a,
  author       = {Nathan J. Muller},
  title        = {The OpenView Enterprise Management Framework},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {5},
  pages        = {271--283},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199609/10)6:5\<271::AID-NEM218\>3.0.CO;2-B},
  doi          = {10.1002/(SICI)1099-1190(199609/10)6:5\<271::AID-NEM218\>3.0.CO;2-B},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen96,
  author       = {Jesper Nilausen},
  title        = {{APPN} - Communications Scenarios},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {170--176},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<170::AID-NEM210\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<170::AID-NEM210\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen96a,
  author       = {Jesper Nilausen},
  title        = {{APPN} - The Control Point},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {199--205},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<199::AID-NEM197\>3.0.CO;2-5},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<199::AID-NEM197\>3.0.CO;2-5},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen96b,
  author       = {Jesper Nilausen},
  title        = {NetSP - Network Security Program},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {223--229},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<223::AID-NEM216\>3.0.CO;2-Z},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<223::AID-NEM216\>3.0.CO;2-Z},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/OhtaKMN96,
  author       = {Kohei Ohta and
                  Nei Kato and
                  Glenn Mansfield and
                  Yoshiaki Nemoto},
  title        = {Configuring a Network Management System for Efficient Operation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {2},
  pages        = {108--118},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\<108::AID-NEM200\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199603/04)6:2\<108::AID-NEM200\>3.0.CO;2-T},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/OhtaKMN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SahaM96,
  author       = {Debashis Saha and
                  Amitava Mukherjee},
  title        = {Managing the Topological Expansion of Computer Networks in an Optimal
                  Way},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {4},
  pages        = {206--211},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199607/08)6:4\<206::AID-NEM206\>3.0.CO;2-T},
  doi          = {10.1002/(SICI)1099-1190(199607/08)6:4\<206::AID-NEM206\>3.0.CO;2-T},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SahaM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sander96,
  author       = {Ronald C. Sander},
  title        = {The Network Management Wars Have Barely Just Begun},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {5},
  pages        = {248--263},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199609/10)6:5\<248::AID-NEM195\>3.0.CO;2-Y},
  doi          = {10.1002/(SICI)1099-1190(199609/10)6:5\<248::AID-NEM195\>3.0.CO;2-Y},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sander96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Smith96,
  author       = {Doug Smith},
  title        = {2M/T1 Testing: Ensuring That Your Data Makes It Across The Interface},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {1},
  pages        = {33--36},
  year         = {1996},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Smith96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Weissberger96,
  author       = {Alan J. Weissberger},
  title        = {Videoconferencing on LANs: Issues and Proposals},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {135--141},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199605/06)6:3\<135::AID-NEM199\>3.0.CO;2-S},
  doi          = {10.1002/(SICI)1099-1190(199605/06)6:3\<135::AID-NEM199\>3.0.CO;2-S},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Weissberger96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZeislerBJ96,
  author       = {Elizabeth D. Zeisler and
                  Daniel H. Bolton and
                  Gordon B. Jones},
  title        = {A Customer-to-carrier Gateway for Multiple Services},
  journal      = {Int. J. Netw. Manag.},
  volume       = {6},
  number       = {6},
  pages        = {312--326},
  year         = {1996},
  url          = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\<312::AID-NEM220\>3.0.CO;2-U},
  doi          = {10.1002/(SICI)1099-1190(199611/12)6:6\<312::AID-NEM220\>3.0.CO;2-U},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZeislerBJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Al-SulaiymAB95,
  author       = {Hamad Al{-}Sulaiym and
                  Abdulaziz Al{-}Muammar and
                  Saad Haj Bakry},
  title        = {{GULFNET:} The academic network of the arab gulf countries},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {274--284},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050506},
  doi          = {10.1002/NEM.4560050506},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryAA95,
  author       = {Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan and
                  Abdulaziz Al{-}Muammar},
  title        = {A Mathematical Model for the Investigations of Access Demands on Information
                  Networks with Applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {82--94},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050206},
  doi          = {10.1002/NEM.4560050206},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryAA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Banes95,
  author       = {David Banes},
  title        = {Security and the Enterprise Network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {198--206},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050408},
  doi          = {10.1002/NEM.4560050408},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Banes95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bauer95,
  author       = {Matthew Bauer},
  title        = {International virtual private networks: Background and tariff survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {95--99},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050207},
  doi          = {10.1002/NEM.4560050207},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bauer95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Becker95,
  author       = {Hal Byron Becker},
  title        = {Disaster recovery long-range planning: {A} mandatory evolution for
                  protecting data},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {174--180},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050403},
  doi          = {10.1002/NEM.4560050403},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Becker95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Berman95,
  author       = {Al Berman},
  title        = {Planning Disaster Recovery Protection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {207--213},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050409},
  doi          = {10.1002/NEM.4560050409},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Berman95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Clemm95,
  author       = {Alexander Clemm},
  title        = {Adding value to MIBs: {A} relationship layer for management platforms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {127--137},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050305},
  doi          = {10.1002/NEM.4560050305},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Clemm95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Cline95,
  author       = {Gregory P. Cline},
  title        = {Internet Firewall Servers Address Burning Corporate Security Issues},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {230--232},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050412},
  doi          = {10.1002/NEM.4560050412},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Cline95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacaY95,
  author       = {Anno Haca and
                  Veronique Yur},
  title        = {Architecture and Performance Comparison of High-speed Switch Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {257--273},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050505},
  doi          = {10.1002/NEM.4560050505},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacaY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HavelP95,
  author       = {Olga Havel and
                  Ahmed Patel},
  title        = {Design and Implementation of a Composite Performance Evaluation Model
                  for Heterogeneous Network Management Applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {25--46},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050106},
  doi          = {10.1002/NEM.4560050106},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HavelP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HeisterK95,
  author       = {U. Heister and
                  Ulrich Killat},
  title        = {Private and Authentic Communication in Passive Optical Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {66--76},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050204},
  doi          = {10.1002/NEM.4560050204},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HeisterK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95,
  author       = {Gilbert Held},
  title        = {Hardware Test Drive},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {54--55},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050108},
  doi          = {10.1002/NEM.4560050108},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95a,
  author       = {Gilbert Held},
  title        = {Considering Equipment and Transmission Availability Levels},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {157--170},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050307},
  doi          = {10.1002/NEM.4560050307},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95b,
  author       = {Gilbert Held},
  title        = {Considering Cyberliability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {233--234},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050502},
  doi          = {10.1002/NEM.4560050502},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Herold95,
  author       = {Rebecca Herold},
  title        = {A Corporate Anti-Virus Strategy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {189--192},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050406},
  doi          = {10.1002/NEM.4560050406},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Herold95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jackson95,
  author       = {Bob Jackson},
  title        = {Do You Know Where Your Networks Are?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {121--126},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050304},
  doi          = {10.1002/NEM.4560050304},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jackson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones95,
  author       = {Katherine Jones},
  title        = {Contingency Planning in {LAN/WAN} Environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {77--81},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050205},
  doi          = {10.1002/NEM.4560050205},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones95a,
  author       = {Katharine Jones},
  title        = {Managing Diverse Environments with {CA-UNICENTER} for {UNIX}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {138--156},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050306},
  doi          = {10.1002/NEM.4560050306},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/McCarthy95,
  author       = {William R. McCarthy},
  title        = {Cableless LANs: An emerging technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {59--65},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050203},
  doi          = {10.1002/NEM.4560050203},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/McCarthy95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics