Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca66.bht:"
@article{DBLP:journals/jnca/AirehrourGR16, author = {David Airehrour and Jairo A. Guti{\'{e}}rrez and Sayan Kumar Ray}, title = {Secure routing for internet of things: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {198--213}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.006}, doi = {10.1016/J.JNCA.2016.03.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AirehrourGR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChunlinXL16, author = {Chunlin Li and Yan Xin and Layuan Li}, title = {Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {250--261}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.003}, doi = {10.1016/J.JNCA.2016.03.003}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChunlinXL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FolinoS16, author = {Gianluigi Folino and Pietro Sabatino}, title = {Ensemble based collaborative and distributed intrusion detection systems: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {1--16}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.011}, doi = {10.1016/J.JNCA.2016.03.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/FolinoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GargB16, author = {Neenu Garg and Seema Bawa}, title = {Comparative analysis of cloud data integrity auditing protocols}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {17--32}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.010}, doi = {10.1016/J.JNCA.2016.03.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GargB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GranaWNXBB16, author = {Justin Grana and David H. Wolpert and Joshua Neil and Dongping Xie and Tanmoy Bhattacharya and Russell Bent}, title = {A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {166--179}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.008}, doi = {10.1016/J.JNCA.2016.03.008}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/GranaWNXBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiangYL16, author = {Fuu{-}Cheng Jiang and Ilsun You and Fang{-}Yie Leu}, title = {Approaching green sensor field using queue-based optimization technique}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {128--136}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.11.010}, doi = {10.1016/J.JNCA.2015.11.010}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JiangYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JoshiY16, author = {Yatish K. Joshi and Mohamed F. Younis}, title = {Restoring connectivity in a resource constrained {WSN}}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {151--165}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.009}, doi = {10.1016/J.JNCA.2016.03.009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JoshiY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanGWSA16, author = {Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Muhammad Shiraz and Iftikhar Ahmad}, title = {Network forensics: Review, taxonomy, and open challenges}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {214--235}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.005}, doi = {10.1016/J.JNCA.2016.03.005}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhanGWSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiCWQX16, author = {Shiyi Li and Qiang Cao and Shenggang Wan and Lu Qian and Changsheng Xie}, title = {{HRSPC:} a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {52--63}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.12.012}, doi = {10.1016/J.JNCA.2015.12.012}, timestamp = {Fri, 23 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiCWQX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MasdariNA16, author = {Mohammad Masdari and Sayyid Shahab Nabavi and Vafa Ahmadi}, title = {An overview of virtual machine placement schemes in cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {106--127}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.01.011}, doi = {10.1016/J.JNCA.2016.01.011}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MasdariNA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MasdariVSA16, author = {Mohammad Masdari and Sima ValiKardan and Zahra Shahi and Sonay Imani Azar}, title = {Towards workflow scheduling in cloud computing: {A} comprehensive analysis}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {64--82}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.01.018}, doi = {10.1016/J.JNCA.2016.01.018}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MasdariVSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MohapatraSW16, author = {Suvendu Kumar Mohapatra and Prasan Kumar Sahoo and Shih{-}Lin Wu}, title = {Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {236--249}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.004}, doi = {10.1016/J.JNCA.2016.03.004}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MohapatraSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/OtebolakuA16, author = {Abayomi Moradeyo Otebolaku and Maria Teresa Andrade}, title = {User context recognition using smartphone sensors and classification models}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {33--51}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.013}, doi = {10.1016/J.JNCA.2016.03.013}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/OtebolakuA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PhuttharakL16, author = {Jurairat Phuttharak and Seng W. Loke}, title = {Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {137--150}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.015}, doi = {10.1016/J.JNCA.2016.03.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/PhuttharakL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QureshiMR16, author = {Amna Qureshi and David Meg{\'{\i}}as and Helena Rif{\`{a}}{-}Pous}, title = {{PSUM:} Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {180--197}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.03.007}, doi = {10.1016/J.JNCA.2016.03.007}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/QureshiMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VermaVPANTAKAA16, author = {Pawan Kumar Verma and Rajesh Verma and Arun Prakash and Ashish Agrawal and Kshirasagar Naik and Rajeev Tripathi and Maazen Alsabaan and Tarek Khalifa and Tamer Abdelkader and Abdulhakim Abogharaf}, title = {Machine-to-Machine {(M2M)} communications: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {66}, pages = {83--105}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.02.016}, doi = {10.1016/J.JNCA.2016.02.016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/VermaVPANTAKAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.