![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,185 matches
- 2024
- Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab:
On Feature Selection Algorithms for Effective Botnet Detection. J. Netw. Syst. Manag. 32(2): 43 (2024) - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach. J. Netw. Syst. Manag. 32(2): 41 (2024) - Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Muhammad Afaq, Wang-Cheol Song:
Correction: Assuring Efficient Path Selection in an IntentBased Networking System: a Graph Neural Networks and Deep Reinforcement Learning Approach. J. Netw. Syst. Manag. 32(3): 52 (2024) - Reham Aljohani, Anas Bushnag, Ali Alessa:
AI-Based Intrusion Detection for a Secure Internet of Things (IoT). J. Netw. Syst. Manag. 32(3): 56 (2024) - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Maen Alzubi
, Khaled Alrfou:
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. J. Netw. Syst. Manag. 32(1): 14 (2024) - Adeeb Mansoor Ansari
, Mohammed Nazir, Khurram Mustafa:
Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. J. Netw. Syst. Manag. 32(2): 29 (2024) - Siamak Azadiabad, Ferhat Khendek:
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification. J. Netw. Syst. Manag. 32(2): 37 (2024) - Nadia Belguerche, Samir Brahim Belhaouari, Noureddine Lasla, Mahfoud Benchaïba:
A Novel Light Reflection-Random Walk for Smart Sensors Relocation. J. Netw. Syst. Manag. 32(1): 7 (2024) - Vincent Bracke
, José Santos
, Tim Wauters
, Filip De Turck
, Bruno Volckaert
:
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement. J. Netw. Syst. Manag. 32(3): 61 (2024) - Mathias De Brouwer, Filip De Turck, Femke Ongenae:
Enabling Efficient Semantic Stream Processing Across the IoT Network Through Adaptive Distribution with DIVIDE. J. Netw. Syst. Manag. 32(2): 27 (2024) - Siwapon Charoenchai, Peerapon Siripongwutikorn:
Genetic Algorithm for Multi-hop VANET Clustering Based on Coalitional Game. J. Netw. Syst. Manag. 32(1): 9 (2024) - Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed:
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings. J. Netw. Syst. Manag. 32(2): 38 (2024) - Saidi Imad Eddine, Lamri Sayad, Djamil Aïssani:
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment. J. Netw. Syst. Manag. 32(2): 39 (2024) - Marwa A. Elsayed, Nur Zincir-Heywood:
BoostSec: Adaptive Attack Detection for Vehicular Networks. J. Netw. Syst. Manag. 32(1): 6 (2024) - Manoel C. Silva Filho, Claudio C. Monteiro, Pedro Ricardo M. Inácio, Mário M. Freire:
A Distributed Virtual-Machine Placement and Migration Approach Based on Modern Portfolio Theory. J. Netw. Syst. Manag. 32(1): 2 (2024) - Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O'Brien, Giuliano Casale:
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees. J. Netw. Syst. Manag. 32(3): 44 (2024) - Sateesh Gorikapudi, Hari Kishan Kondaveeti:
Energy Aware Cluster Based Routing Algorithm for Optimal Routing and Fault Tolerance in Wireless Sensor Networks. J. Netw. Syst. Manag. 32(2): 30 (2024) - Abdelaziz Hamdi, Amina Nahali, Rafik Brahem:
Optimal and Efficient Sensor Design for 5G-Based Internet-of-Body Healthcare Monitoring Network. J. Netw. Syst. Manag. 32(1): 22 (2024) - Salma Hameche, Mohamed Essaid Khanouche, Abdelghani Chibani, Abdelkamel Tari:
A Group Teaching Optimization-Based Approach for Energy and QoS-Aware Internet of Things Services Composition. J. Netw. Syst. Manag. 32(1): 4 (2024) - Nathan Harris, Sajad Khorsandroo:
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks. J. Netw. Syst. Manag. 32(2): 35 (2024) - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis. J. Netw. Syst. Manag. 32(1): 18 (2024) - Houda Hassen, Soumaya Meherzi, Zouhair Ben Jemaa:
Improved Exploration Strategy for Q-Learning Based Multipath Routing in SDN Networks. J. Netw. Syst. Manag. 32(2): 25 (2024) - Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphaël Couturier:
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications. J. Netw. Syst. Manag. 32(3): 54 (2024) - Hamida Ikhlef, Soumia Bourebia, Ali Melit:
Link State Estimator for VANETs Using Neural Networks. J. Netw. Syst. Manag. 32(1): 10 (2024) - Wilson de Souza Junior, Taufik Abrão:
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels. J. Netw. Syst. Manag. 32(3): 62 (2024) - Ivanilson França Vieira Júnior
, Jorge Granjal
, Marília Curado
:
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. J. Netw. Syst. Manag. 32(1): 19 (2024) - Stylianos Karagiannis
, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian:
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams. J. Netw. Syst. Manag. 32(2): 42 (2024) - Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation. J. Netw. Syst. Manag. 32(3): 59 (2024) - Abdelhamid Khiat, Mohamed Haddadi, Nacera Bahnes:
Genetic-Based Algorithm for Task Scheduling in Fog-Cloud Environment. J. Netw. Syst. Manag. 32(1): 3 (2024) - Jérôme Lacan, Emmanuel Lochin:
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing. J. Netw. Syst. Manag. 32(1): 15 (2024)
skipping 1,155 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-30 06:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint