Volume 32, Number 1, January 2009
, Zhao Shi
, Shuai Li
: Multicast routing for delay variation bound using a modified ant colony algorithm.
Volume 32, Number 2, March 2009
Special issue on network and system security
, Lynn Margaret Batten
: Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks.
Special issue on service oriented computing and advanced network applications
Volume 32, Number 3, May 2009
, Ding-Chyu Liu
: An incentive-based electronic payment scheme for digital content transactions over the Internet.
, Pin-Han Ho
: Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks.
Jemal H. Abawajy
: Adaptive hierarchical scheduling policy for enterprise grid computing systems.
Volume 32, Number 4, July 2009
, Zili Li
, Yi Zhang
: Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network.
, Chai Kiat Yeo
: Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks.
Volume 32, Number 5, September 2009
Special Issue on Next Generation Content Networks
: Deconstructing Network Attached Storage systems.
: A novel network mobility handoff scheme using SIP and SCTP for multimedia applications.
Volume 32, Number 6, November 2009