default search action
Computer Networks, Volume 109
Volumes 109, Part 1, November 2016
- Gerhard P. Hancke, Aikaterini Mitrokotsa, Reihaneh Safavi-Naini, Damien Sauveron:
Special issue on recent advances in physical-layer security. 1-3 - Nguyen Xuan Quyen, Trung Quang Duong, Nguyen-Son Vo, Qingqing Xie, Lei Shu:
Chaotic direct-sequence spread-spectrum with variable symbol period: A technique for enhancing physical layer security. 4-12 - Pedro H. J. Nardelli, Hirley Alves, Carlos H. M. de Lima, Matti Latva-aho:
Throughput maximization in multi-hop wireless networks under a secrecy constraint. 13-20 - Giulio Aliberti, Roberto Di Pietro, Stefano Guarino:
Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel. 21-30 - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. 31-38 - Nikolaos E. Petroulakis, George Spanoudakis, Ioannis G. Askoxylakis:
Patterns for the design of secure and dependable software defined networks. 39-49 - Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta:
Adaptive beam nulling in multihop ad hoc networks against a jammer in motion. 50-66 - Il-Gu Lee, Myungchul Kim:
Persistent jamming in wireless local area networks: Attack and defense. 67-83 - Christopher Huth, René Guillaume, Thomas Strohm, Paul Duplys, Irin Ann Samuel, Tim Güneysu:
Information reconciliation schemes in physical-layer security: A survey. 84-104 - Christian T. Zenger, Mario Pietersz, Jan Zimmer, Jan-Felix Posielek, Thorben Lenze, Christof Paar:
Authenticated key establishment for low-resource devices exploiting correlated random channels. 105-123
Volumes 109, Part 2, November 2016
- Michela Meo, Sabine Wittevrongel:
Traffic and performance in the big data era. 125-126 - Mirco Marchetti, Fabio Pierazzi, Michele Colajanni, Alessandro Guido:
Analysis of high volumes of network traffic for Advanced Persistent Threat detection. 127-141 - Enrico Bocchi, Luigi Grimaudo, Marco Mellia, Elena Baralis, Sabyasachi Saha, Stanislav Miskovic, Gaspar Modelo-Howard, Sung-Ju Lee:
MAGMA network behavior classifier for malware traffic. 142-156 - Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti:
DDoS attacks in cloud computing: Collateral damage to non-targets. 157-171 - Taejin Ha, Sunghwan Kim, Namwon An, Jargalsaikhan Narantuya, Chiwook Jeong, JongWon Kim, Hyuk Lim:
Suspicious traffic sampling for intrusion detection in software-defined networks. 172-182 - Glauber D. Gonçalves, Idilio Drago, Alex Borges Vieira, Ana Paula Couto da Silva, Jussara M. Almeida, Marco Mellia:
Workload models and performance evaluation of cloud storage services. 183-199 - Hadrien Hours, Ernst W. Biersack, Patrick Loiseau, Alessandro Finamore, Marco Mellia:
A study of the impact of DNS resolvers on CDN performance using a causal approach. 200-210 - Florian Wamser, Pedro Casas, Michael Seufert, Christian Moldovan, Phuoc Tran-Gia, Tobias Hoßfeld:
Modeling the YouTube stack: From packets to quality of experience. 211-224 - Thomas Bonald, Céline Comte:
The multi-source model for dimensioning data networks. 225-233 - Jan Willem Kleinrouweler, Sergio Cabrero, Rob van der Mei, Pablo César:
A model for evaluating sharing policies for network-assisted HTTP adaptive streaming. 234-245 - Florian Metzger, Eirini Liotou, Christian Moldovan, Tobias Hoßfeld:
TCP video streaming and mobile networks: Not a love story, but better with context. 246-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.