![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn133.bht:"
@article{DBLP:journals/cn/ArghavaniAAC18, author = {Abbas Arghavani and Mahdi Arghavani and Mahmood Ahmadi and Paul Crane}, title = {Attacker-Manager Game Tree {(AMGT):} {A} new framework for visualizing and analysing the interactions between attacker and network security manager}, journal = {Comput. Networks}, volume = {133}, pages = {42--58}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.013}, doi = {10.1016/J.COMNET.2018.01.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ArghavaniAAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AyadIKH18, author = {Ibrahim Ayad and Youngbin Im and Eric Keller and Sangtae Ha}, title = {A Practical Evaluation of Rate Adaptation Algorithms in HTTP-based Adaptive Streaming}, journal = {Comput. Networks}, volume = {133}, pages = {90--103}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.019}, doi = {10.1016/J.COMNET.2018.01.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AyadIKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BelguithKLJA18, author = {Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia}, title = {{PHOABE:} Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT}, journal = {Comput. Networks}, volume = {133}, pages = {141--156}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.036}, doi = {10.1016/J.COMNET.2018.01.036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BelguithKLJA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BoryloDW18, author = {Piotr Borylo and Jerzy Domzal and Robert W{\'{o}}jcik}, title = {Survivable automatic hidden bypasses in Software-Defined Networks}, journal = {Comput. Networks}, volume = {133}, pages = {73--89}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.022}, doi = {10.1016/J.COMNET.2018.01.022}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BoryloDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Carmona-Murillo18, author = {Javier Carmona{-}Murillo and Vasilis Friderikos and Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez}, title = {A hybrid {DMM} solution and trade-off analysis for future wireless networks}, journal = {Comput. Networks}, volume = {133}, pages = {17--32}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.030}, doi = {10.1016/J.COMNET.2018.01.030}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Carmona-Murillo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenWZSWXL18, author = {Huan Chen and Xiong Wang and Yangming Zhao and Tongyu Song and Yang Wang and Shizhong Xu and Lemin Li}, title = {{MOSC:} a method to assign the outsourcing of service function chain across multiple clouds}, journal = {Comput. Networks}, volume = {133}, pages = {166--182}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.020}, doi = {10.1016/J.COMNET.2018.01.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChenWZSWXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CuiDLYN18, author = {Hui Cui and Robert H. Deng and Junzuo Lai and Xun Yi and Surya Nepal}, title = {An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited}, journal = {Comput. Networks}, volume = {133}, pages = {157--165}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.034}, doi = {10.1016/J.COMNET.2018.01.034}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CuiDLYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GuptaHMCTM18, author = {Abhishek Gupta and M. Farhan Habib and Uttam Mandal and Pulak Chowdhury and Massimo Tornatore and Biswanath Mukherjee}, title = {On service-chaining strategies using Virtual Network Functions in operator networks}, journal = {Comput. Networks}, volume = {133}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.028}, doi = {10.1016/J.COMNET.2018.01.028}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/GuptaHMCTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiHXH18, author = {Wei Li and Changxin Huang and Chao Xiao and Songchen Han}, title = {A heading adjustment method in wireless directional sensor networks}, journal = {Comput. Networks}, volume = {133}, pages = {33--41}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.031}, doi = {10.1016/J.COMNET.2018.01.031}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiHXH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MoazzeniKMC18, author = {Shadi Moazzeni and Mohammad Reza Khayyambashi and Naser Movahhedinia and Franco Callegati}, title = {On reliability improvement of Software-Defined Networks}, journal = {Comput. Networks}, volume = {133}, pages = {195--211}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.023}, doi = {10.1016/J.COMNET.2018.01.023}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MoazzeniKMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShenLYWDH18, author = {Yiran Shen and Chengwen Luo and Dan Yin and Hongkai Wen and Daniela Rus and Wen Hu}, title = {Privacy-preserving sparse representation classification in cloud-enabled mobile applications}, journal = {Comput. Networks}, volume = {133}, pages = {59--72}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.035}, doi = {10.1016/J.COMNET.2018.01.035}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShenLYWDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangA18, author = {Jessie Hui Wang and Changqing An}, title = {A study on geographic properties of internet routing}, journal = {Comput. Networks}, volume = {133}, pages = {183--194}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.032}, doi = {10.1016/J.COMNET.2018.01.032}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangZBCCTX18, author = {Tian Wang and Jiandian Zeng and Md. Zakirul Alam Bhuiyan and Yonghong Chen and Yiqiao Cai and Hui Tian and Mande Xie}, title = {Energy-efficient relay tracking with multiple mobile camera sensors}, journal = {Comput. Networks}, volume = {133}, pages = {130--140}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.002}, doi = {10.1016/J.COMNET.2018.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangZBCCTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XuGZ18, author = {Jun Xu and Chengcheng Guo and Hao Zhang}, title = {Joint channel allocation and power control based on {PSO} for cellular networks with {D2D} communications}, journal = {Comput. Networks}, volume = {133}, pages = {104--119}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.017}, doi = {10.1016/J.COMNET.2018.01.017}, timestamp = {Sat, 01 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XuGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XuMX18, author = {Chaonong Xu and Kaichi Ma and Yongjun Xu}, title = {Complexity of minimum uplink scheduling in backbone-assisted successive interference cancellation-based wireless networks}, journal = {Comput. Networks}, volume = {133}, pages = {120--129}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.014}, doi = {10.1016/J.COMNET.2018.01.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/XuMX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YiWLDH18, author = {Bo Yi and Xingwei Wang and Keqin Li and Sajal K. Das and Min Huang}, title = {A comprehensive survey of Network Function Virtualization}, journal = {Comput. Networks}, volume = {133}, pages = {212--262}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.021}, doi = {10.1016/J.COMNET.2018.01.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/YiWLDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.