![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2020
- Ahmad Abboud, Rémi Garcia
, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. NCA 2020: 1-10 - Peter Altmann
, Abdul Ghafoor Abbasi, Olov Schelén, Karl Andersson, Morteza Alizadeh:
Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS. NCA 2020: 1-8 - Vishaka Basnayake
, Hakim Mabed, Dushantha Nalin K. Jayakody, Philippe Canalda:
M-HELP - Multi-Hop Emergency Call Protocol in 5G. NCA 2020: 1-8 - Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, Youssef Laarouchi:
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. NCA 2020: 1-8 - Viveck R. Cadambe, Kishori M. Konwar, Muriel Médard, Haochen Pan, Lewis Tseng, Yingjian Wu:
CassandrEAS: Highly Available and Storage-Efficient Distributed Key-Value Store with Erasure Coding. NCA 2020: 1-8 - Wladimir De la Cadena, Daniel Kaiser, Andriy Panchenko, Thomas Engel
:
Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications. NCA 2020: 1-6 - Claudia Canali, Riccardo Lancellotti, Simone Mione:
Collaboration Strategies for Fog Computing under Heterogeneous Network-bound Scenarios. NCA 2020: 1-8 - Pedro Ákos Costa, Pedro Fouto, João Leitão
:
Overlay Networks for Edge Management. NCA 2020: 1-10 - Luís Dias, Simão Valente, Miguel Correia:
Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. NCA 2020: 1-10 - Shlomi Dolev, Ziyu Wang:
SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts. NCA 2020: 1-10 - Georgios Drainakis, Konstantinos V. Katsaros
, Panagiotis Pantazopoulos
, Vasilis Sourlas
, Angelos Amditis
:
Federated vs. Centralized Machine Learning under Privacy-elastic Users: A Comparative Analysis. NCA 2020: 1-8 - Sérgio Esteves, João Nuno de Oliveira e Silva, Luís Veiga
:
Palpatine: Mining Frequent Sequences for Data Prefetching in NoSQL Distributed Key-Value Stores. NCA 2020: 1-10 - Alexandra Figueiredo, Tatjana Lide, David R. Matos
, Miguel Correia:
MERLIN: Multi-Language Web Vulnerability Detection. NCA 2020: 1-9 - Lamia Chaari Fourati
, Mohamed Ali Ben Rejeb, Samiha Ayed:
New ICN based Clustering Mechanism for Vehicular Networks. NCA 2020: 1-4 - Noé Godinho
, Henrique Silva, Marília Curado, Luís Paquete
:
Energy and Latency-aware Resource Reconfiguration in Fog Environments. NCA 2020: 1-8 - Fábio Gomes, Miguel Correia:
Cryptojacking Detection with CPU Usage Metrics. NCA 2020: 1-10 - Gilberto Gomes, Luís Dias, Miguel Correia:
CryingJackpot: Network Flows and Performance Counters against Cryptojacking. NCA 2020: 1-10 - Arnaldo Gouveia, Miguel Correia:
Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. NCA 2020: 1-8 - Hugo Guerreiro, Luís Rodrigues, Nuno M. Preguiça
, Nívia Cruz Quental:
Causality Tracking Trade-offs for Distributed Storage. NCA 2020: 1-10 - Nguyen Thi Hanh, Huynh Thi Thanh Binh, Nguyen Van Son, Myungchul Kim:
Minimal Relay Node Placement for Ensuring Network Connectivity in Mobile Wireless Sensor Networks. NCA 2020: 1-8 - Lisa Her, Syeduzzaman Khan, David Samuel, Xusheng Ai, Sixia Chen, Vivek K. Pallipuram:
A2Cloud-cc: A Machine Learning Council to Guide Cloud Resource Selection for Scientific Applications. NCA 2020: 1-5 - M. Reza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya
, Zahir Tari
:
A Dynamic Resource Controller for Resolving Quality of Service Issues in Modern Streaming Processing Engines. NCA 2020: 1-8 - Renato Caminha Juaçaba-Neto
, Pascal Mérindol, Fabrice Theoleyre
:
Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT. NCA 2020: 1-8 - Shah Khalid Khan
, Usman Naseem, Abdul Sattar
, Nazar Waheed
, Adnan Mir, Atika Qazi
, Muhammad Ismail:
UAV-aided 5G Network in Suburban, Urban, Dense Urban, and High-rise Urban Environments. NCA 2020: 1-4 - Lukasz Krzywiecki
, Hannes Salin
, Nisha Panwar, Mykola Pavlov:
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1-8 - Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro:
MemOpLight: Leveraging application feedback to improve container memory consolidation. NCA 2020: 1-10 - Jorge López, Maxime Labonne, Claude Poletti, Dallal Belabed:
Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches. NCA 2020: 1-10 - Jean-Romain Luttringer, Thomas Alfroy, Pascal Mérindol, Quentin Bramas, François Clad, Cristel Pelsser
:
Computing Delay-Constrained Least-Cost Paths for Segment Routing is Easier Than You Think. NCA 2020: 1-8 - Filipe F. Martins, David R. Matos
, Miguel L. Pardal
, Miguel Correia:
Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum. NCA 2020: 1-9 - Ankur Nahar
, Debasis Das
:
SeScR: SDN-Enabled Spectral Clustering-Based Optimized Routing Using Deep Learning in VANET Environment. NCA 2020: 1-9
skipping 21 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-20 23:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint