![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Network Management, Volume 34
Volume 34, Number 1, January/February 2024
RESEARCH ARTICLES
- Vankadhara Rajyalakshmi, Kuruva Lakshmanna
:
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm. - Shengyi Yang
, Shaoying Zhu:
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning. - Kyungchan Ko
, Taeyeol Jeong
, Jongsoo Woo
, James Won-Ki Hong
:
Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges. - Ziyu Qiu, Zhilei Zhou, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files.
Volume 34, Number 2, March/April 2024
RESEARCH ARTICLES
- Kengo Arakawa, Eiji Oki
:
Availability-aware virtual network function placement based on multidimensional universal generating functions. - Anan Jin
, Yuhang Ye, Brian Lee, Yuansong Qiao:
Topology analysis of the Ripple transaction network. - Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane:
A comprehensive review of blockchain integration in remote patient monitoring for E-health. - Udit Agarwal
, Vinay Rishiwal
, Sudeep Tanwar
, Mano Yadav:
Blockchain and crypto forensics: Investigating crypto frauds.
Volume 34, Number 3, May/June 2024
RESEARCH ARTICLES
- V. Karthik
, R. Lakshmi, Salini Abraham, M. Ramkumar:
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network. - Kavi Priya Dhandapani
, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen
:
A novel eviction policy based on shortest remaining time for software defined networking flow tables. - Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad
, Johari Abdullah:
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network. - Aeri Kim
, Meryam Essaid, Sejin Park, Hongtaek Ju
:
Reducing the propagation delay of compact block in Bitcoin network.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.