default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca151.bht:"
@article{DBLP:journals/jnca/GengZSWY20, author = {Haijun Geng and Han Zhang and Xingang Shi and Zhiliang Wang and Xia Yin}, title = {Efficient computation of loop-free alternates}, journal = {J. Netw. Comput. Appl.}, volume = {151}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2019.102501}, doi = {10.1016/J.JNCA.2019.102501}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GengZSWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoLCL20, author = {Jingjing Guo and Chunlin Li and Yi Chen and Youlong Luo}, title = {On-demand resource provision based on load estimation and service expenditure in edge cloud environment}, journal = {J. Netw. Comput. Appl.}, volume = {151}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2019.102506}, doi = {10.1016/J.JNCA.2019.102506}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoLCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HanGZLCZ20, author = {Guangjie Han and Haofei Guan and Zeren Zhou and Zhifan Li and Sammy Chan and Wenbo Zhang}, title = {{CTRA:} {A} complex terrain region-avoidance charging algorithm in Smart World}, journal = {J. Netw. Comput. Appl.}, volume = {151}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2019.02.007}, doi = {10.1016/J.JNCA.2019.02.007}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HanGZLCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KucekL20, author = {Stela Kucek and Maria Leitner}, title = {An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag {(CTF)} Environments}, journal = {J. Netw. Comput. Appl.}, volume = {151}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2019.102470}, doi = {10.1016/J.JNCA.2019.102470}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KucekL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RabbaniWKJZH20, author = {Mahdi Rabbani and Yongli Wang and Reza Khoshkangini and Hamed Jelodar and Ruxin Zhao and Peng Hu}, title = {A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {151}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2019.102507}, doi = {10.1016/J.JNCA.2019.102507}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/RabbaniWKJZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.