


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,077 matches
- 2023
- Zakaria Alomari
, Mohamed Faten Zhani
, Moayad Aloqaily, Ouns Bouachir:
Towards optimal synchronization in NFV-based environments. Int. J. Netw. Manag. 33(1) (2023) - Tanima Bhowmik
, Indrajit Banerjee:
EEPPDA - Edge-enabled efficient privacy-preserving data aggregation in smart healthcare Internet of Things network. Int. J. Netw. Manag. 33(1) (2023) - Sangjukta Das, Suyel Namasudra:
MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure. Int. J. Netw. Manag. 33(3) (2023) - Ameni Hbaieb, Mahdi Khemakhem
:
Optimal network-aware virtual data center embedding. Int. J. Netw. Manag. 33(2) (2023) - Zhiping Jin, Zhibiao Liang, Meirong He, Yao Peng, Hanxiao Xue, Yu Wang:
A federated semi-supervised learning approach for network traffic classification. Int. J. Netw. Manag. 33(3) (2023) - Heegon Kim, Suhyun Park, Stanislav Lange, Doyoung Lee, DongNyeong Heo, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong:
Graph neural network-based virtual network function deployment optimization. Int. J. Netw. Manag. 33(1) (2023) - Dong Liang, Qinrang Liu, Ke Song, Binghao Yan
, Tao Hu:
Audit-based correction mechanism for malicious statistics information of data plane. Int. J. Netw. Manag. 33(2) (2023) - Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Editorial for special issue on security and trust on networked systems. Int. J. Netw. Manag. 33(3) (2023) - Lei Wu, Shengnan Zhao, Xia Wei, Lingzhen Meng:
Privacy-preserving and efficient user matching based on attribute encryption in mobile social networks. Int. J. Netw. Manag. 33(3) (2023) - Haythem Yahyaoui, Mohamed Faten Zhani, Ouns Bouachir, Moayad Aloqaily:
On minimizing flow monitoring costs in large-scale software-defined network networks. Int. J. Netw. Manag. 33(2) (2023) - Shixiong Yao, Xingjian Tian, Jiageng Chen, Yi Xiong:
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard. Int. J. Netw. Manag. 33(3) (2023) - Peng Zeng, Guanjun Lin, Jun Zhang, Ying Zhang:
Intelligent detection of vulnerable functions in software through neural embedding-based code analysis. Int. J. Netw. Manag. 33(3) (2023) - 2022
- Godfrey Anuga Akpakwu
, Gerhard P. Hancke, Adnan M. Abu-Mahfouz:
An optimization-based congestion control for constrained application protocol. Int. J. Netw. Manag. 32(1) (2022) - Maher Alharby
, Aad van Moorsel:
Simulating permissionless blockchains: Distribution fitting, tool support, and a case study. Int. J. Netw. Manag. 32(2) (2022) - Wassim Sellil Atoui
, Nour Assy, Walid Gaaloul, Imen Grida Ben Yahia
:
A model-driven approach for deployment descriptor design in network function virtualization. Int. J. Netw. Manag. 32(1) (2022) - Ian Vilar Bastos
, Igor Monteiro Moraes
, Thi Mai Trang Nguyen, Guy Pujolle:
Content Media Retrieval using Virtual Network Functions in Multi-access Edge Computing architecture. Int. J. Netw. Manag. 32(5) (2022) - Elif Bozkaya
, Yusuf Özçevik
, Mertkan Akkoç, Muhammed Rasit Erol
, Berk Canberk
:
Energy-aware mobility for aerial networks: A reinforcement learning approach. Int. J. Netw. Manag. 32(1) (2022) - Yuxi Cai, Nafis Irtija
, Eirini-Eleni Tsiropoulou
, Andreas G. Veneris:
Truthful Decentralized Blockchain Oracles. Int. J. Netw. Manag. 32(2) (2022) - Mili Dhar
, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma, Swapan Debbarma:
A cost-effective and load-balanced controller placement method in software-defined networks. Int. J. Netw. Manag. 32(5) (2022) - Merlin George
, Anu Mary Chacko
:
MediTrans - Patient-centric interoperability through blockchain. Int. J. Netw. Manag. 32(3) (2022) - Fariba Ghaffari
, Komal Gilani
, Emmanuel Bertin, Noël Crespi:
Identity and access management using distributed ledger technology: A survey. Int. J. Netw. Manag. 32(2) (2022) - István Gódor, Imen Grida Ben Yahia:
Topics from networks management and operations. Int. J. Netw. Manag. 32(1) (2022) - Almir Pereira Guimarães
, Paulo Maciel, Rivalino Matias Jr., Bruno Silva
, Bruno Nogueira
:
An analytical approach for optimization of computer network design considering the integration of the communication and power infrastructures. Int. J. Netw. Manag. 32(2) (2022) - Laurens Van Hoye
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
A secure cross-organizational container deployment approach to enable ad hoc collaborations. Int. J. Netw. Manag. 32(4) (2022) - Xiaoying Huang
, Zhichuan Guo, Mangu Song:
FGLB: A fine-grained hardware intra-server load balancer based on 100 G FPGA SmartNIC. Int. J. Netw. Manag. 32(6) (2022) - Ranjeet B. Kagade, Santhosh Jayagopalan:
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation. Int. J. Netw. Manag. 32(4) (2022) - Reza Shokri Kalan, Stuart Clayman
, Müge Sayit:
vDANE: Using virtualization for improving video quality with Server and Network Assisted DASH. Int. J. Netw. Manag. 32(5) (2022) - Kiranpreet Kaur
, Fabrice Guillemin
, Françoise Sailhan
:
Container placement and migration strategies for cloud, fog, and edge data centers: A survey. Int. J. Netw. Manag. 32(6) (2022) - Satoru Kobayashi
, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda:
amulog: A general log analysis framework for comparison and combination of diverse template generation methods. Int. J. Netw. Manag. 32(4) (2022) - Akhilesh Kumar
, Shashwati Banerjea, Rishabh Jain, Mayank Pandey:
Software-defined content delivery network at the edge for adaptive video streaming. Int. J. Netw. Manag. 32(6) (2022)
skipping 1,047 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-05-30 12:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint