Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm26.bht:"
@article{DBLP:journals/ijnm/AgostiniBVV16, author = {Elena Agostini and Massimo Bernaschi and Massimo Vellucci and Luca Vollero}, title = {OpenCAPWAP v2.0: the new open-source implementation of the {CAPWAP} protocol}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {537--552}, year = {2016}, url = {https://doi.org/10.1002/nem.1949}, doi = {10.1002/NEM.1949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AgostiniBVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BasileCLPV16, author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Christian Pitscheider and Fulvio Valenza}, title = {Inter-function anomaly analysis for correct {SDN/NFV} deployment}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {25--43}, year = {2016}, url = {https://doi.org/10.1002/nem.1917}, doi = {10.1002/NEM.1917}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BasileCLPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BianLLG16, author = {Yongna Bian and Bin Liu and Yuefeng Li and Jianmin Gao}, title = {Characterizing network traffic behaviour using granule-based association rule mining}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {4}, pages = {308--329}, year = {2016}, url = {https://doi.org/10.1002/nem.1935}, doi = {10.1002/NEM.1935}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BianLLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CardosoBGA16, author = {Igor Duarte Cardoso and Jo{\~{a}}o Paulo Barraca and Carlos Goncalves and Rui L. Aguiar}, title = {Seamless integration of cloud and fog networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {435--460}, year = {2016}, url = {https://doi.org/10.1002/nem.1944}, doi = {10.1002/NEM.1944}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/CardosoBGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CevherUH16, author = {Selcuk Cevher and Mustafa Ulutas and Ibrahim H{\"{o}}kelek}, title = {Enhancing Multiple Routing Configurations through systematic analysis of topological characteristics}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {3}, pages = {176--198}, year = {2016}, url = {https://doi.org/10.1002/nem.1926}, doi = {10.1002/NEM.1926}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/CevherUH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DalmazoVC16, author = {Bruno Lopes Dalmazo and Jo{\~{a}}o P. Vilela and Mar{\'{\i}}lia Curado}, title = {Online traffic prediction in the cloud}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {4}, pages = {269--285}, year = {2016}, url = {https://doi.org/10.1002/nem.1934}, doi = {10.1002/NEM.1934}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DalmazoVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Dogan16, author = {Gulustan Dogan}, title = {ProTru: a provenance-based trust architecture for wireless sensor networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {2}, pages = {131--151}, year = {2016}, url = {https://doi.org/10.1002/nem.1925}, doi = {10.1002/NEM.1925}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Dogan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DurraniZS16, author = {Muhammad Nouman Durrani and Feroz Zahid and Jawwad A. Shamsi}, title = {{PAVM:} a framework for policy-aware virtual machine management}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {515--536}, year = {2016}, url = {https://doi.org/10.1002/nem.1948}, doi = {10.1002/NEM.1948}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DurraniZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HohlfeldZBH16, author = {Oliver Hohlfeld and Thomas Zinner and Theophilus Benson and David Hausheer}, title = {Special issue on Software-Defined Networking and Network Functions Virtualization for flexible network management}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {4--5}, year = {2016}, url = {https://doi.org/10.1002/nem.1915}, doi = {10.1002/NEM.1915}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HohlfeldZBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HuangHLT16, author = {Huai{-}Sheng Huang and Shu{-}Chiung Hu and Po{-}Han Lee and Yu{-}Chee Tseng}, title = {An adaptive Paris Metro Pricing scheme for mobile data networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {422--434}, year = {2016}, url = {https://doi.org/10.1002/nem.1941}, doi = {10.1002/NEM.1941}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HuangHLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HuangSMM16, author = {Xiaohong Huang and Qiong Sun and Maode Ma and Yan Ma}, title = {{H-LCFST:} a hash lowest cost first search tree for flexible packet classification}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {4}, pages = {286--307}, year = {2016}, url = {https://doi.org/10.1002/nem.1938}, doi = {10.1002/NEM.1938}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HuangSMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JiangLCL16, author = {Ci{-}Bin Jiang and I{-}Hsien Liu and Yao{-}Nien Chung and Jung{-}Shian Li}, title = {Novel intrusion prediction mechanism based on honeypot log similarity}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {3}, pages = {156--175}, year = {2016}, url = {https://doi.org/10.1002/nem.1923}, doi = {10.1002/NEM.1923}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/JiangLCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Karoui16, author = {Kamel Karoui}, title = {Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {553--578}, year = {2016}, url = {https://doi.org/10.1002/nem.1956}, doi = {10.1002/NEM.1956}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Karoui16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KumarRG16, author = {A. R. Ashok Kumar and S. V. Rao and Diganta Goswami}, title = {Simple, efficient location-based routing for data center network using {IP} address hierarchy}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {492--514}, year = {2016}, url = {https://doi.org/10.1002/nem.1946}, doi = {10.1002/NEM.1946}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KumarRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiLFWW16, author = {Jun Li and Cuilian Li and Zhaoxi Fang and Haoyun Wang and Yao{-}hui Wu}, title = {Optimal layer division for low latency in DHT-based hierarchical {P2P} network}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {2}, pages = {95--110}, year = {2016}, url = {https://doi.org/10.1002/nem.1922}, doi = {10.1002/NEM.1922}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiLFWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiYH16, author = {Jian Li and Jae{-}Hyoung Yoo and James Won{-}Ki Hong}, title = {Dynamic control plane management for software-defined networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {2}, pages = {111--130}, year = {2016}, url = {https://doi.org/10.1002/nem.1924}, doi = {10.1002/NEM.1924}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiaoL16, author = {Qi Liao and Ting Li}, title = {Effective network management via dynamic network anomaly visualization}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {6}, pages = {461--491}, year = {2016}, url = {https://doi.org/10.1002/nem.1945}, doi = {10.1002/NEM.1945}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiaoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiuZBLG16, author = {Zhihong Liu and Qi Zhang and Raouf Boutaba and Yaping Liu and Zhenghu Gong}, title = {{ROUTE:} run-time robust reducer workload estimation for MapReduce}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {3}, pages = {224--244}, year = {2016}, url = {https://doi.org/10.1002/nem.1928}, doi = {10.1002/NEM.1928}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LiuZBLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MamatasCG16, author = {Lefteris Mamatas and Stuart Clayman and Alex Galis}, title = {A flexible information service for management of virtualized software-defined infrastructures}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {5}, pages = {396--418}, year = {2016}, url = {https://doi.org/10.1002/nem.1943}, doi = {10.1002/NEM.1943}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MamatasCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MeirosuPKP16, author = {Catalin Meirosu and Kostas Pentikousis and Mario Kind and Alberto Gonzalez Prieto}, title = {Software-defined operations}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {5}, pages = {334--335}, year = {2016}, url = {https://doi.org/10.1002/nem.1947}, doi = {10.1002/NEM.1947}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MeirosuPKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MizrahiM16, author = {Tal Mizrahi and Yoram Moses}, title = {ReversePTP: {A} clock synchronization scheme for software-defined networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {5}, pages = {355--372}, year = {2016}, url = {https://doi.org/10.1002/nem.1942}, doi = {10.1002/NEM.1942}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/MizrahiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MlikiCKC16, author = {Hela Mliki and Lamia Chaari and Lotfi Kamoun and Bernard Cousin}, title = {Performance evaluation of legacy {QCN} for multicast and multiple unicast traffic transmission}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {3}, pages = {199--223}, year = {2016}, url = {https://doi.org/10.1002/nem.1927}, doi = {10.1002/NEM.1927}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/MlikiCKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NaudtsKVCP16, author = {Bram Naudts and Mario Kind and Sofie Verbrugge and Didier Colle and Mario Pickavet}, title = {How can a mobile service provider reduce costs with software-defined networking?}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {56--72}, year = {2016}, url = {https://doi.org/10.1002/nem.1919}, doi = {10.1002/NEM.1919}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/NaudtsKVCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/PetrangeliWHBT16, author = {Stefano Petrangeli and Tim Wauters and Rafael Huysegems and Tom Bostoen and Filip De Turck}, title = {Software-defined network-based prioritization to avoid video freezes in {HTTP} adaptive streaming}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {4}, pages = {248--268}, year = {2016}, url = {https://doi.org/10.1002/nem.1931}, doi = {10.1002/NEM.1931}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/PetrangeliWHBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ProencaFCAR16, author = {Mario Lemes Proen{\c{c}}a Jr. and Gilberto Fernandes Jr. and Luiz Fernando Carvalho and Marcos V. O. de Assis and Joel J. P. C. Rodrigues}, title = {Digital signature to help network management using flow analysis}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {2}, pages = {76--94}, year = {2016}, url = {https://doi.org/10.1002/nem.1892}, doi = {10.1002/NEM.1892}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ProencaFCAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RopkeH16, author = {Christian R{\"{o}}pke and Thorsten Holz}, title = {On network operating system security}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {6--24}, year = {2016}, url = {https://doi.org/10.1002/nem.1918}, doi = {10.1002/NEM.1918}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/RopkeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WangLQL16, author = {Ying Wang and Xiao Liu and Xuesong Qiu and Wenjing Li}, title = {Prediction-based survivable virtual network mapping against disaster failures}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {5}, pages = {336--354}, year = {2016}, url = {https://doi.org/10.1002/nem.1939}, doi = {10.1002/NEM.1939}, timestamp = {Sat, 17 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/WangLQL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhangKCH16, author = {Nan Zhang and Ma{\"{e}}l Kimmerlin and Jos{\'{e}} Costa{-}Requena and Heikki H{\"{a}}mm{\"{a}}inen}, title = {Cost efficiency of mobile in-network caching}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {44--55}, year = {2016}, url = {https://doi.org/10.1002/nem.1916}, doi = {10.1002/NEM.1916}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ZhangKCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhongWQL16, author = {Xuxia Zhong and Ying Wang and Xuesong Qiu and Wenjing Li}, title = {FlowVisor-based cost-aware {VN} embedding in OpenFlow networks}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {5}, pages = {373--395}, year = {2016}, url = {https://doi.org/10.1002/nem.1940}, doi = {10.1002/NEM.1940}, timestamp = {Sat, 17 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ZhongWQL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.