default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca185.bht:"
@article{DBLP:journals/jnca/Abu-Salih21, author = {Bilal Abu{-}Salih}, title = {Domain-specific knowledge graphs: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {185}, pages = {103076}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103076}, doi = {10.1016/J.JNCA.2021.103076}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Abu-Salih21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HoQGGLX21, author = {Stella Ho and Youyang Qu and Bruce Gu and Longxiang Gao and Jianxin Li and Yong Xiang}, title = {{DP-GAN:} Differentially private consecutive data publishing using generative adversarial nets}, journal = {J. Netw. Comput. Appl.}, volume = {185}, pages = {103066}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103066}, doi = {10.1016/J.JNCA.2021.103066}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HoQGGLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuRHZSW21, author = {Xinqian Liu and Jiadong Ren and Haitao He and Bing Zhang and Chen Song and Yunxue Wang}, title = {A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel}, journal = {J. Netw. Comput. Appl.}, volume = {185}, pages = {103079}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103079}, doi = {10.1016/J.JNCA.2021.103079}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuRHZSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NayeriGJ21, author = {Zahra Makki Nayeri and Toktam Ghafarian and Bahman Javadi}, title = {Application placement in Fog computing with {AI} approach: Taxonomy and a state of the art survey}, journal = {J. Netw. Comput. Appl.}, volume = {185}, pages = {103078}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103078}, doi = {10.1016/J.JNCA.2021.103078}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NayeriGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ShiLGDLC21, author = {Leyi Shi and Xiaoyu Li and Zhenbo Gao and Pengfei Duan and Na Liu and Honglong Chen}, title = {Worm computing: {A} blockchain-based resource sharing and cybersecurity framework}, journal = {J. Netw. Comput. Appl.}, volume = {185}, pages = {103081}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103081}, doi = {10.1016/J.JNCA.2021.103081}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ShiLGDLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.