Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca132.bht:"
@article{DBLP:journals/jnca/AshrafGAQIL19, author = {Nouman Ashraf and Muhammad Faizan Ghuman and Waqar Asif and Hassaan Khaliq Qureshi and Adnan Iqbal and Marios Lestas}, title = {Energy management in harvesting enabled sensing nodes: Prediction and control}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {104--117}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.015}, doi = {10.1016/J.JNCA.2019.01.015}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AshrafGAQIL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GoFT19, author = {Sharleen Joy Y. Go and Cedric Angelo M. Festin and Wilson M. Tan}, title = {An SDN-based framework for improving the performance of underprovisioned {IP} Video Surveillance networks}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {49--74}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.026}, doi = {10.1016/J.JNCA.2019.01.026}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GoFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GomesBFA19, author = {Ruan Delgado Gomes and C{\'{e}}sar Benavente{-}Peces and Iguatemi E. Fonseca and Marcelo S. Alencar}, title = {Adaptive and Beacon-based multi-channel protocol for Industrial Wireless Sensor Networks}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {22--39}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.025}, doi = {10.1016/J.JNCA.2019.01.025}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GomesBFA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HanCCCKK19, author = {Jinyoung Han and Daejin Choi and Taejoong Chung and Chen{-}Nee Chuah and Hyunchul Kim and Ted Taekyoung Kwon}, title = {Predicting content consumption from content-to-content relationships}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {1--9}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.030}, doi = {10.1016/J.JNCA.2019.01.030}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HanCCCKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HanLZLL19, author = {Wenyuan Han and Weijiang Liu and Kaiye Zhang and Zhiyang Li and Zhaobin Liu}, title = {A protocol for detecting missing target tags in {RFID} systems}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {40--48}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.027}, doi = {10.1016/J.JNCA.2019.01.027}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HanLZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KongSY0019, author = {Xiangjie Kong and Yajie Shi and Shuo Yu and Jiaying Liu and Feng Xia}, title = {Academic social networks: Modeling, analysis, mining and applications}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {86--103}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.029}, doi = {10.1016/J.JNCA.2019.01.029}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KongSY0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ThulasiramanHC19, author = {Preetha Thulasiraman and Thomas Haakensen and Audrey F. Callanan}, title = {Countering passive cyber attacks against sink nodes in tactical sensor networks using reactive route obfuscation}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {10--21}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.01.028}, doi = {10.1016/J.JNCA.2019.01.028}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ThulasiramanHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DongJ19, title = {Flow online identification method for the encrypted Skype}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {75--85}, year = {2019}, note = {Withdrawn.}, url = {https://doi.org/10.1016/j.jnca.2019.01.007}, doi = {10.1016/J.JNCA.2019.01.007}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/DongJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuptaACKGW19, title = {Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {132}, pages = {118--148}, year = {2019}, note = {Withdrawn.}, url = {https://doi.org/10.1016/j.jnca.2019.01.012}, doi = {10.1016/J.JNCA.2019.01.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GuptaACKGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.