default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm5.bht:"
@article{DBLP:journals/ijnm/Al-SulaiymAB95, author = {Hamad Al{-}Sulaiym and Abdulaziz Al{-}Muammar and Saad Haj Bakry}, title = {{GULFNET:} The academic network of the arab gulf countries}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {274--284}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050506}, doi = {10.1002/NEM.4560050506}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryAA95, author = {Saad Haj Bakry and Abdullah Al{-}Dhelaan and Abdulaziz Al{-}Muammar}, title = {A Mathematical Model for the Investigations of Access Demands on Information Networks with Applications}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {82--94}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050206}, doi = {10.1002/NEM.4560050206}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryAA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Banes95, author = {David Banes}, title = {Security and the Enterprise Network}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {198--206}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050408}, doi = {10.1002/NEM.4560050408}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Banes95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Bauer95, author = {Matthew Bauer}, title = {International virtual private networks: Background and tariff survey}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {95--99}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050207}, doi = {10.1002/NEM.4560050207}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Bauer95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Becker95, author = {Hal Byron Becker}, title = {Disaster recovery long-range planning: {A} mandatory evolution for protecting data}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {174--180}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050403}, doi = {10.1002/NEM.4560050403}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Becker95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Berman95, author = {Al Berman}, title = {Planning Disaster Recovery Protection}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {207--213}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050409}, doi = {10.1002/NEM.4560050409}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Berman95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Clemm95, author = {Alexander Clemm}, title = {Adding value to MIBs: {A} relationship layer for management platforms}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {127--137}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050305}, doi = {10.1002/NEM.4560050305}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Clemm95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Cline95, author = {Gregory P. Cline}, title = {Internet Firewall Servers Address Burning Corporate Security Issues}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {230--232}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050412}, doi = {10.1002/NEM.4560050412}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Cline95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HacaY95, author = {Anno Haca and Veronique Yur}, title = {Architecture and Performance Comparison of High-speed Switch Networks}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {257--273}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050505}, doi = {10.1002/NEM.4560050505}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HacaY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HavelP95, author = {Olga Havel and Ahmed Patel}, title = {Design and Implementation of a Composite Performance Evaluation Model for Heterogeneous Network Management Applications}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {25--46}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050106}, doi = {10.1002/NEM.4560050106}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HavelP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HeisterK95, author = {U. Heister and Ulrich Killat}, title = {Private and Authentic Communication in Passive Optical Networks}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {66--76}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050204}, doi = {10.1002/NEM.4560050204}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HeisterK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held95, author = {Gilbert Held}, title = {Hardware Test Drive}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {54--55}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050108}, doi = {10.1002/NEM.4560050108}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held95a, author = {Gilbert Held}, title = {Considering Equipment and Transmission Availability Levels}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {157--170}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050307}, doi = {10.1002/NEM.4560050307}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Held95b, author = {Gilbert Held}, title = {Considering Cyberliability}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {233--234}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050502}, doi = {10.1002/NEM.4560050502}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Held95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Herold95, author = {Rebecca Herold}, title = {A Corporate Anti-Virus Strategy}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {189--192}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050406}, doi = {10.1002/NEM.4560050406}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Herold95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jackson95, author = {Bob Jackson}, title = {Do You Know Where Your Networks Are?}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {121--126}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050304}, doi = {10.1002/NEM.4560050304}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jackson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jones95, author = {Katherine Jones}, title = {Contingency Planning in {LAN/WAN} Environments}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {77--81}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050205}, doi = {10.1002/NEM.4560050205}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jones95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jones95a, author = {Katharine Jones}, title = {Managing Diverse Environments with {CA-UNICENTER} for {UNIX}}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {138--156}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050306}, doi = {10.1002/NEM.4560050306}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jones95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/McCarthy95, author = {William R. McCarthy}, title = {Cableless LANs: An emerging technology}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {59--65}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050203}, doi = {10.1002/NEM.4560050203}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/McCarthy95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Meyers95, author = {Warren S. Meyers}, title = {The Evolution of a Network - {A} Case Study of Network Development at John Wiley {\&} Sons}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {3--12}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050103}, doi = {10.1002/NEM.4560050103}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Meyers95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller95, author = {Nathan J. Muller}, title = {Managing Desktop Assets}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {100--111}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050208}, doi = {10.1002/NEM.4560050208}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Muller95a, author = {Nathan J. Muller}, title = {Managing the Enterprise Network with LightWatch/Open}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {235--248}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050503}, doi = {10.1002/NEM.4560050503}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Muller95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nachsin95, author = {Cynthia K. Nachsin}, title = {The World Trade Center Disaster and the Lessons Learned}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {181--184}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050404}, doi = {10.1002/NEM.4560050404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nachsin95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nevola95, author = {John E. Nevola}, title = {How Safe is Your Data Center?}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {185--187}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050405}, doi = {10.1002/NEM.4560050405}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nevola95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen95, author = {Jesper Nilausen}, title = {Token ring network management: Change management}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {13--18}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050104}, doi = {10.1002/NEM.4560050104}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen95a, author = {Jesper Nilausen}, title = {Token ring network management: Performance management}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {47--53}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050107}, doi = {10.1002/NEM.4560050107}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Nilausen95b, author = {Jesper Nilausen}, title = {{APPN} - An Introduction}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {249--256}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050504}, doi = {10.1002/NEM.4560050504}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Nilausen95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Peterson95, author = {Dale G. Peterson}, title = {A new era in data network security: Protocol-sensitive encryption}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {214--218}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050410}, doi = {10.1002/NEM.4560050410}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Peterson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Ross95, author = {Steven J. Ross}, title = {Is It Security or Disaster Recovery? Who Cares?}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {193--197}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050407}, doi = {10.1002/NEM.4560050407}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Ross95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Sarch95, author = {Ray Sarch}, title = {From the Associate Editor}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {173}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050402}, doi = {10.1002/NEM.4560050402}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Sarch95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Shepherdson95, author = {Lew Shepherdson}, title = {Empowering Net Ware With {REXX}}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {1}, pages = {19--24}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050105}, doi = {10.1002/NEM.4560050105}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Shepherdson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Smith95, author = {Richard E. Smith}, title = {Sidewinder: Defense in depth using type enforcement}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {4}, pages = {219--229}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050411}, doi = {10.1002/NEM.4560050411}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Smith95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/TaherBAA95, author = {Hasan Taher and Saad Haj Bakry and Abdullah Al{-}Dhelaan and Abdulaziz Al{-}Muammar}, title = {Information networks awareness and utilization issues: The case of gulfnet}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {115--120}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050303}, doi = {10.1002/NEM.4560050303}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/TaherBAA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.