Search dblp for Publications

export results for "toc:db/journals/jnca/jnca190.bht:"

 download as .bib file

@article{DBLP:journals/jnca/Al-AhmadKAAJ21,
  author       = {Ahmad Salah Al{-}Ahmad and
                  Hasan Kahtan and
                  Yehia Ibrahim Alzoubi and
                  Omar Ali and
                  Ashraf Jaradat},
  title        = {Mobile cloud computing models security issues: {A} systematic review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103152},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103152},
  doi          = {10.1016/J.JNCA.2021.103152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Al-AhmadKAAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CasinoLHPH21,
  author       = {Fran Casino and
                  Nikolaos Lykousas and
                  Ivan Homoliak and
                  Constantinos Patsakis and
                  Julio C. Hernandez{-}Castro},
  title        = {Intercepting Hail Hydra: Real-time detection of Algorithmically Generated
                  Domains},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103135},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103135},
  doi          = {10.1016/J.JNCA.2021.103135},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/CasinoLHPH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/CuiQGSTXY21,
  author       = {Yunhe Cui and
                  Qing Qian and
                  Chun Guo and
                  Guowei Shen and
                  Youliang Tian and
                  Huanlai Xing and
                  Lianshan Yan},
  title        = {Towards DDoS detection mechanisms in Software-Defined Networking},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103156},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103156},
  doi          = {10.1016/J.JNCA.2021.103156},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/CuiQGSTXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/KhanMA21,
  author       = {Tanveer Khan and
                  Antonis Michalas and
                  Adnan Akhunzada},
  title        = {Fake news outbreak 2021: Can we stop the viral spread?},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103112},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103112},
  doi          = {10.1016/J.JNCA.2021.103112},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/KhanMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NguyenDR21,
  author       = {Hai T. Nguyen and
                  Tien Van Do and
                  Csaba Rotter},
  title        = {Optimizing the resource usage of actor-based systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103143},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103143},
  doi          = {10.1016/J.JNCA.2021.103143},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/NguyenDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WuLZZ21,
  author       = {Jiajing Wu and
                  Jieli Liu and
                  Yijing Zhao and
                  Zibin Zheng},
  title        = {Analysis of cryptocurrency transactions from a network perspective:
                  An overview},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103139},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103139},
  doi          = {10.1016/J.JNCA.2021.103139},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WuLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YangZBYZC21,
  author       = {Hui Yang and
                  Kaixuan Zhan and
                  Bowen Bao and
                  Qiuyan Yao and
                  Jie Zhang and
                  Mohamed Cheriet},
  title        = {Automatic guarantee scheme for intent-driven network slicing and reconfiguration},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103163},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103163},
  doi          = {10.1016/J.JNCA.2021.103163},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YangZBYZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YousefpoorYBBMH21,
  author       = {Mohammad Sadegh Yousefpoor and
                  Efat Yousefpoor and
                  Hamid Barati and
                  Ali Barati and
                  Ali Movaghar and
                  Mehdi Hosseinzadeh},
  title        = {Secure data aggregation methods and countermeasures against various
                  attacks in wireless sensor networks: {A} comprehensive review},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103118},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103118},
  doi          = {10.1016/J.JNCA.2021.103118},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YousefpoorYBBMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZaraketMYRR21,
  author       = {Elie Zaraket and
                  Nour Mohammad Murad and
                  Samar Syed Yazdani and
                  Lala H. Rajaoarisoa and
                  Blaise Ravelo},
  title        = {An overview on low energy wake-up radio technology: Active and passive
                  circuits associated with {MAC} and routing protocols},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {190},
  pages        = {103140},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103140},
  doi          = {10.1016/J.JNCA.2021.103140},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ZaraketMYRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}