Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm26.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/AgostiniBVV16,
  author       = {Elena Agostini and
                  Massimo Bernaschi and
                  Massimo Vellucci and
                  Luca Vollero},
  title        = {OpenCAPWAP v2.0: the new open-source implementation of the {CAPWAP}
                  protocol},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {537--552},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1949},
  doi          = {10.1002/NEM.1949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgostiniBVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BasileCLPV16,
  author       = {Cataldo Basile and
                  Daniele Canavese and
                  Antonio Lioy and
                  Christian Pitscheider and
                  Fulvio Valenza},
  title        = {Inter-function anomaly analysis for correct {SDN/NFV} deployment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {25--43},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1917},
  doi          = {10.1002/NEM.1917},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BasileCLPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BianLLG16,
  author       = {Yongna Bian and
                  Bin Liu and
                  Yuefeng Li and
                  Jianmin Gao},
  title        = {Characterizing network traffic behaviour using granule-based association
                  rule mining},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {308--329},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1935},
  doi          = {10.1002/NEM.1935},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BianLLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CardosoBGA16,
  author       = {Igor Duarte Cardoso and
                  Jo{\~{a}}o Paulo Barraca and
                  Carlos Goncalves and
                  Rui L. Aguiar},
  title        = {Seamless integration of cloud and fog networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {435--460},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1944},
  doi          = {10.1002/NEM.1944},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CardosoBGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/CevherUH16,
  author       = {Selcuk Cevher and
                  Mustafa Ulutas and
                  Ibrahim H{\"{o}}kelek},
  title        = {Enhancing Multiple Routing Configurations through systematic analysis
                  of topological characteristics},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {176--198},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1926},
  doi          = {10.1002/NEM.1926},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/CevherUH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DalmazoVC16,
  author       = {Bruno Lopes Dalmazo and
                  Jo{\~{a}}o P. Vilela and
                  Mar{\'{\i}}lia Curado},
  title        = {Online traffic prediction in the cloud},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {269--285},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1934},
  doi          = {10.1002/NEM.1934},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DalmazoVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Dogan16,
  author       = {Gulustan Dogan},
  title        = {ProTru: a provenance-based trust architecture for wireless sensor
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {131--151},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1925},
  doi          = {10.1002/NEM.1925},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Dogan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DurraniZS16,
  author       = {Muhammad Nouman Durrani and
                  Feroz Zahid and
                  Jawwad A. Shamsi},
  title        = {{PAVM:} a framework for policy-aware virtual machine management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {515--536},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1948},
  doi          = {10.1002/NEM.1948},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DurraniZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HohlfeldZBH16,
  author       = {Oliver Hohlfeld and
                  Thomas Zinner and
                  Theophilus Benson and
                  David Hausheer},
  title        = {Special issue on Software-Defined Networking and Network Functions
                  Virtualization for flexible network management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {4--5},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1915},
  doi          = {10.1002/NEM.1915},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HohlfeldZBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangHLT16,
  author       = {Huai{-}Sheng Huang and
                  Shu{-}Chiung Hu and
                  Po{-}Han Lee and
                  Yu{-}Chee Tseng},
  title        = {An adaptive Paris Metro Pricing scheme for mobile data networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {422--434},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1941},
  doi          = {10.1002/NEM.1941},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangHLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HuangSMM16,
  author       = {Xiaohong Huang and
                  Qiong Sun and
                  Maode Ma and
                  Yan Ma},
  title        = {{H-LCFST:} a hash lowest cost first search tree for flexible packet
                  classification},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {286--307},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1938},
  doi          = {10.1002/NEM.1938},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HuangSMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JiangLCL16,
  author       = {Ci{-}Bin Jiang and
                  I{-}Hsien Liu and
                  Yao{-}Nien Chung and
                  Jung{-}Shian Li},
  title        = {Novel intrusion prediction mechanism based on honeypot log similarity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {156--175},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1923},
  doi          = {10.1002/NEM.1923},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JiangLCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Karoui16,
  author       = {Kamel Karoui},
  title        = {Security novel risk assessment framework based on reversible metrics:
                  a case study of DDoS attacks on an E-commerce web server},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {553--578},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1956},
  doi          = {10.1002/NEM.1956},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Karoui16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KumarRG16,
  author       = {A. R. Ashok Kumar and
                  S. V. Rao and
                  Diganta Goswami},
  title        = {Simple, efficient location-based routing for data center network using
                  {IP} address hierarchy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {492--514},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1946},
  doi          = {10.1002/NEM.1946},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KumarRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiLFWW16,
  author       = {Jun Li and
                  Cuilian Li and
                  Zhaoxi Fang and
                  Haoyun Wang and
                  Yao{-}hui Wu},
  title        = {Optimal layer division for low latency in DHT-based hierarchical {P2P}
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {95--110},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1922},
  doi          = {10.1002/NEM.1922},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiLFWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiYH16,
  author       = {Jian Li and
                  Jae{-}Hyoung Yoo and
                  James Won{-}Ki Hong},
  title        = {Dynamic control plane management for software-defined networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {111--130},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1924},
  doi          = {10.1002/NEM.1924},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiaoL16,
  author       = {Qi Liao and
                  Ting Li},
  title        = {Effective network management via dynamic network anomaly visualization},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {6},
  pages        = {461--491},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1945},
  doi          = {10.1002/NEM.1945},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiaoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LiuZBLG16,
  author       = {Zhihong Liu and
                  Qi Zhang and
                  Raouf Boutaba and
                  Yaping Liu and
                  Zhenghu Gong},
  title        = {{ROUTE:} run-time robust reducer workload estimation for MapReduce},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {224--244},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1928},
  doi          = {10.1002/NEM.1928},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LiuZBLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MamatasCG16,
  author       = {Lefteris Mamatas and
                  Stuart Clayman and
                  Alex Galis},
  title        = {A flexible information service for management of virtualized software-defined
                  infrastructures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {396--418},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1943},
  doi          = {10.1002/NEM.1943},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MamatasCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MeirosuPKP16,
  author       = {Catalin Meirosu and
                  Kostas Pentikousis and
                  Mario Kind and
                  Alberto Gonzalez Prieto},
  title        = {Software-defined operations},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {334--335},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1947},
  doi          = {10.1002/NEM.1947},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MeirosuPKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MizrahiM16,
  author       = {Tal Mizrahi and
                  Yoram Moses},
  title        = {ReversePTP: {A} clock synchronization scheme for software-defined
                  networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {355--372},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1942},
  doi          = {10.1002/NEM.1942},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/MizrahiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/MlikiCKC16,
  author       = {Hela Mliki and
                  Lamia Chaari and
                  Lotfi Kamoun and
                  Bernard Cousin},
  title        = {Performance evaluation of legacy {QCN} for multicast and multiple
                  unicast traffic transmission},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {3},
  pages        = {199--223},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1927},
  doi          = {10.1002/NEM.1927},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/MlikiCKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NaudtsKVCP16,
  author       = {Bram Naudts and
                  Mario Kind and
                  Sofie Verbrugge and
                  Didier Colle and
                  Mario Pickavet},
  title        = {How can a mobile service provider reduce costs with software-defined
                  networking?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {56--72},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1919},
  doi          = {10.1002/NEM.1919},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NaudtsKVCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PetrangeliWHBT16,
  author       = {Stefano Petrangeli and
                  Tim Wauters and
                  Rafael Huysegems and
                  Tom Bostoen and
                  Filip De Turck},
  title        = {Software-defined network-based prioritization to avoid video freezes
                  in {HTTP} adaptive streaming},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {4},
  pages        = {248--268},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1931},
  doi          = {10.1002/NEM.1931},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PetrangeliWHBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ProencaFCAR16,
  author       = {Mario Lemes Proen{\c{c}}a Jr. and
                  Gilberto Fernandes Jr. and
                  Luiz Fernando Carvalho and
                  Marcos V. O. de Assis and
                  Joel J. P. C. Rodrigues},
  title        = {Digital signature to help network management using flow analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {2},
  pages        = {76--94},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1892},
  doi          = {10.1002/NEM.1892},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ProencaFCAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RopkeH16,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  title        = {On network operating system security},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {6--24},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1918},
  doi          = {10.1002/NEM.1918},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RopkeH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/WangLQL16,
  author       = {Ying Wang and
                  Xiao Liu and
                  Xuesong Qiu and
                  Wenjing Li},
  title        = {Prediction-based survivable virtual network mapping against disaster
                  failures},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {336--354},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1939},
  doi          = {10.1002/NEM.1939},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/WangLQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangKCH16,
  author       = {Nan Zhang and
                  Ma{\"{e}}l Kimmerlin and
                  Jos{\'{e}} Costa{-}Requena and
                  Heikki H{\"{a}}mm{\"{a}}inen},
  title        = {Cost efficiency of mobile in-network caching},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {1},
  pages        = {44--55},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1916},
  doi          = {10.1002/NEM.1916},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangKCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhongWQL16,
  author       = {Xuxia Zhong and
                  Ying Wang and
                  Xuesong Qiu and
                  Wenjing Li},
  title        = {FlowVisor-based cost-aware {VN} embedding in OpenFlow networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {26},
  number       = {5},
  pages        = {373--395},
  year         = {2016},
  url          = {https://doi.org/10.1002/nem.1940},
  doi          = {10.1002/NEM.1940},
  timestamp    = {Sat, 17 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhongWQL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics