Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm5.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/Al-SulaiymAB95,
  author       = {Hamad Al{-}Sulaiym and
                  Abdulaziz Al{-}Muammar and
                  Saad Haj Bakry},
  title        = {{GULFNET:} The academic network of the arab gulf countries},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {274--284},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050506},
  doi          = {10.1002/NEM.4560050506},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BakryAA95,
  author       = {Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan and
                  Abdulaziz Al{-}Muammar},
  title        = {A Mathematical Model for the Investigations of Access Demands on Information
                  Networks with Applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {82--94},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050206},
  doi          = {10.1002/NEM.4560050206},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BakryAA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Banes95,
  author       = {David Banes},
  title        = {Security and the Enterprise Network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {198--206},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050408},
  doi          = {10.1002/NEM.4560050408},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Banes95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Bauer95,
  author       = {Matthew Bauer},
  title        = {International virtual private networks: Background and tariff survey},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {95--99},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050207},
  doi          = {10.1002/NEM.4560050207},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Bauer95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Becker95,
  author       = {Hal Byron Becker},
  title        = {Disaster recovery long-range planning: {A} mandatory evolution for
                  protecting data},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {174--180},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050403},
  doi          = {10.1002/NEM.4560050403},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Becker95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Berman95,
  author       = {Al Berman},
  title        = {Planning Disaster Recovery Protection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {207--213},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050409},
  doi          = {10.1002/NEM.4560050409},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Berman95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Clemm95,
  author       = {Alexander Clemm},
  title        = {Adding value to MIBs: {A} relationship layer for management platforms},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {127--137},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050305},
  doi          = {10.1002/NEM.4560050305},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Clemm95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Cline95,
  author       = {Gregory P. Cline},
  title        = {Internet Firewall Servers Address Burning Corporate Security Issues},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {230--232},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050412},
  doi          = {10.1002/NEM.4560050412},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Cline95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HacaY95,
  author       = {Anno Haca and
                  Veronique Yur},
  title        = {Architecture and Performance Comparison of High-speed Switch Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {257--273},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050505},
  doi          = {10.1002/NEM.4560050505},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HacaY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HavelP95,
  author       = {Olga Havel and
                  Ahmed Patel},
  title        = {Design and Implementation of a Composite Performance Evaluation Model
                  for Heterogeneous Network Management Applications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {25--46},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050106},
  doi          = {10.1002/NEM.4560050106},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HavelP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HeisterK95,
  author       = {U. Heister and
                  Ulrich Killat},
  title        = {Private and Authentic Communication in Passive Optical Networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {66--76},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050204},
  doi          = {10.1002/NEM.4560050204},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HeisterK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95,
  author       = {Gilbert Held},
  title        = {Hardware Test Drive},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {54--55},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050108},
  doi          = {10.1002/NEM.4560050108},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95a,
  author       = {Gilbert Held},
  title        = {Considering Equipment and Transmission Availability Levels},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {157--170},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050307},
  doi          = {10.1002/NEM.4560050307},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Held95b,
  author       = {Gilbert Held},
  title        = {Considering Cyberliability},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {233--234},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050502},
  doi          = {10.1002/NEM.4560050502},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Held95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Herold95,
  author       = {Rebecca Herold},
  title        = {A Corporate Anti-Virus Strategy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {189--192},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050406},
  doi          = {10.1002/NEM.4560050406},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Herold95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jackson95,
  author       = {Bob Jackson},
  title        = {Do You Know Where Your Networks Are?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {121--126},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050304},
  doi          = {10.1002/NEM.4560050304},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jackson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones95,
  author       = {Katherine Jones},
  title        = {Contingency Planning in {LAN/WAN} Environments},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {77--81},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050205},
  doi          = {10.1002/NEM.4560050205},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Jones95a,
  author       = {Katharine Jones},
  title        = {Managing Diverse Environments with {CA-UNICENTER} for {UNIX}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {138--156},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050306},
  doi          = {10.1002/NEM.4560050306},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Jones95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/McCarthy95,
  author       = {William R. McCarthy},
  title        = {Cableless LANs: An emerging technology},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {59--65},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050203},
  doi          = {10.1002/NEM.4560050203},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/McCarthy95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Meyers95,
  author       = {Warren S. Meyers},
  title        = {The Evolution of a Network - {A} Case Study of Network Development
                  at John Wiley {\&} Sons},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {3--12},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050103},
  doi          = {10.1002/NEM.4560050103},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Meyers95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller95,
  author       = {Nathan J. Muller},
  title        = {Managing Desktop Assets},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {2},
  pages        = {100--111},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050208},
  doi          = {10.1002/NEM.4560050208},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Muller95a,
  author       = {Nathan J. Muller},
  title        = {Managing the Enterprise Network with LightWatch/Open},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {235--248},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050503},
  doi          = {10.1002/NEM.4560050503},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Muller95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nachsin95,
  author       = {Cynthia K. Nachsin},
  title        = {The World Trade Center Disaster and the Lessons Learned},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {181--184},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050404},
  doi          = {10.1002/NEM.4560050404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nachsin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nevola95,
  author       = {John E. Nevola},
  title        = {How Safe is Your Data Center?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {185--187},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050405},
  doi          = {10.1002/NEM.4560050405},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nevola95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen95,
  author       = {Jesper Nilausen},
  title        = {Token ring network management: Change management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {13--18},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050104},
  doi          = {10.1002/NEM.4560050104},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen95a,
  author       = {Jesper Nilausen},
  title        = {Token ring network management: Performance management},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {47--53},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050107},
  doi          = {10.1002/NEM.4560050107},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Nilausen95b,
  author       = {Jesper Nilausen},
  title        = {{APPN} - An Introduction},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {5},
  pages        = {249--256},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050504},
  doi          = {10.1002/NEM.4560050504},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Nilausen95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Peterson95,
  author       = {Dale G. Peterson},
  title        = {A new era in data network security: Protocol-sensitive encryption},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {214--218},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050410},
  doi          = {10.1002/NEM.4560050410},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Peterson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Ross95,
  author       = {Steven J. Ross},
  title        = {Is It Security or Disaster Recovery? Who Cares?},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {193--197},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050407},
  doi          = {10.1002/NEM.4560050407},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Ross95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Sarch95,
  author       = {Ray Sarch},
  title        = {From the Associate Editor},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {173},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050402},
  doi          = {10.1002/NEM.4560050402},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Sarch95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Shepherdson95,
  author       = {Lew Shepherdson},
  title        = {Empowering Net Ware With {REXX}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {19--24},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050105},
  doi          = {10.1002/NEM.4560050105},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Shepherdson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/Smith95,
  author       = {Richard E. Smith},
  title        = {Sidewinder: Defense in depth using type enforcement},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {219--229},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050411},
  doi          = {10.1002/NEM.4560050411},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/Smith95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/TaherBAA95,
  author       = {Hasan Taher and
                  Saad Haj Bakry and
                  Abdullah Al{-}Dhelaan and
                  Abdulaziz Al{-}Muammar},
  title        = {Information networks awareness and utilization issues: The case of
                  gulfnet},
  journal      = {Int. J. Netw. Manag.},
  volume       = {5},
  number       = {3},
  pages        = {115--120},
  year         = {1995},
  url          = {https://doi.org/10.1002/nem.4560050303},
  doi          = {10.1002/NEM.4560050303},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/TaherBAA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}