default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca190.bht:"
@article{DBLP:journals/jnca/Al-AhmadKAAJ21, author = {Ahmad Salah Al{-}Ahmad and Hasan Kahtan and Yehia Ibrahim Alzoubi and Omar Ali and Ashraf Jaradat}, title = {Mobile cloud computing models security issues: {A} systematic review}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103152}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103152}, doi = {10.1016/J.JNCA.2021.103152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Al-AhmadKAAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CasinoLHPH21, author = {Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103135}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103135}, doi = {10.1016/J.JNCA.2021.103135}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/CasinoLHPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CuiQGSTXY21, author = {Yunhe Cui and Qing Qian and Chun Guo and Guowei Shen and Youliang Tian and Huanlai Xing and Lianshan Yan}, title = {Towards DDoS detection mechanisms in Software-Defined Networking}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103156}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103156}, doi = {10.1016/J.JNCA.2021.103156}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CuiQGSTXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanMA21, author = {Tanveer Khan and Antonis Michalas and Adnan Akhunzada}, title = {Fake news outbreak 2021: Can we stop the viral spread?}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103112}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103112}, doi = {10.1016/J.JNCA.2021.103112}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/KhanMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NguyenDR21, author = {Hai T. Nguyen and Tien Van Do and Csaba Rotter}, title = {Optimizing the resource usage of actor-based systems}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103143}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103143}, doi = {10.1016/J.JNCA.2021.103143}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NguyenDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WuLZZ21, author = {Jiajing Wu and Jieli Liu and Yijing Zhao and Zibin Zheng}, title = {Analysis of cryptocurrency transactions from a network perspective: An overview}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103139}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103139}, doi = {10.1016/J.JNCA.2021.103139}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WuLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangZBYZC21, author = {Hui Yang and Kaixuan Zhan and Bowen Bao and Qiuyan Yao and Jie Zhang and Mohamed Cheriet}, title = {Automatic guarantee scheme for intent-driven network slicing and reconfiguration}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103163}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103163}, doi = {10.1016/J.JNCA.2021.103163}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YangZBYZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YousefpoorYBBMH21, author = {Mohammad Sadegh Yousefpoor and Efat Yousefpoor and Hamid Barati and Ali Barati and Ali Movaghar and Mehdi Hosseinzadeh}, title = {Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: {A} comprehensive review}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103118}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103118}, doi = {10.1016/J.JNCA.2021.103118}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YousefpoorYBBMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZaraketMYRR21, author = {Elie Zaraket and Nour Mohammad Murad and Samar Syed Yazdani and Lala H. Rajaoarisoa and Blaise Ravelo}, title = {An overview on low energy wake-up radio technology: Active and passive circuits associated with {MAC} and routing protocols}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103140}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103140}, doi = {10.1016/J.JNCA.2021.103140}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZaraketMYRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.