Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm34.bht:"
@article{DBLP:journals/ijnm/AgarwalRTY24, author = {Udit Agarwal and Vinay Rishiwal and Sudeep Tanwar and Mano Yadav}, title = {Blockchain and crypto forensics: Investigating crypto frauds}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2255}, doi = {10.1002/NEM.2255}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AgarwalRTY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ArakawaO24, author = {Kengo Arakawa and Eiji Oki}, title = {Availability-aware virtual network function placement based on multidimensional universal generating functions}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2252}, doi = {10.1002/NEM.2252}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ArakawaO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BadriNS24, author = {Nedia Badri and Le{\"{\i}}la Nasraoui and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, title = {A comprehensive review of blockchain integration in remote patient monitoring for E-health}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2254}, doi = {10.1002/NEM.2254}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BadriNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DhandapaniTM24, author = {Kavi Priya Dhandapani and Mirnalinee Thanganadar Thangathai and Shahul Hamead Haja Moinudeen}, title = {A novel eviction policy based on shortest remaining time for software defined networking flow tables}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2257}, doi = {10.1002/NEM.2257}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DhandapaniTM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JinYLQ24, author = {Anan Jin and Yuhang Ye and Brian Lee and Yuansong Qiao}, title = {Topology analysis of the Ripple transaction network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2253}, doi = {10.1002/NEM.2253}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/JinYLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KarthikLAR24, author = {V. Karthik and R. Lakshmi and Salini Abraham and M. Ramkumar}, title = {Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2256}, doi = {10.1002/NEM.2256}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KarthikLAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KimEPJ24, author = {Aeri Kim and Meryam Essaid and Sejin Park and Hongtaek Ju}, title = {Reducing the propagation delay of compact block in Bitcoin network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2262}, doi = {10.1002/NEM.2262}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KimEPJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KoJWH24, author = {Kyungchan Ko and Taeyeol Jeong and Jongsoo Woo and James Won{-}Ki Hong}, title = {Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2245}, doi = {10.1002/NEM.2245}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/KoJWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NisaKAA24, author = {Najmun Nisa and Adnan Shahid Khan and Zeeshan Ahmad and Johari Abdullah}, title = {{TPAAD:} Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2258}, doi = {10.1002/NEM.2258}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/NisaKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/QiuZNJSZH24, author = {Ziyu Qiu and Zhilei Zhou and Brad Niblett and Andrew Johnston and Jeffrey Schwartzentruber and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2251}, doi = {10.1002/NEM.2251}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/QiuZNJSZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RajyalakshmiL24, author = {Vankadhara Rajyalakshmi and Kuruva Lakshmanna}, title = {Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2228}, doi = {10.1002/NEM.2228}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/RajyalakshmiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YangZ24, author = {Shengyi Yang and Shaoying Zhu}, title = {Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2242}, doi = {10.1002/NEM.2242}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YangZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.