Search dblp for Publications

export results for "toc:db/journals/jnca/jnca185.bht:"

 download as .bib file

@article{DBLP:journals/jnca/Abu-Salih21,
  author       = {Bilal Abu{-}Salih},
  title        = {Domain-specific knowledge graphs: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {185},
  pages        = {103076},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103076},
  doi          = {10.1016/J.JNCA.2021.103076},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/Abu-Salih21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HoQGGLX21,
  author       = {Stella Ho and
                  Youyang Qu and
                  Bruce Gu and
                  Longxiang Gao and
                  Jianxin Li and
                  Yong Xiang},
  title        = {{DP-GAN:} Differentially private consecutive data publishing using
                  generative adversarial nets},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {185},
  pages        = {103066},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103066},
  doi          = {10.1016/J.JNCA.2021.103066},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/HoQGGLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuRHZSW21,
  author       = {Xinqian Liu and
                  Jiadong Ren and
                  Haitao He and
                  Bing Zhang and
                  Chen Song and
                  Yunxue Wang},
  title        = {A fast all-packets-based DDoS attack detection approach based on network
                  graph and graph kernel},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {185},
  pages        = {103079},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103079},
  doi          = {10.1016/J.JNCA.2021.103079},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuRHZSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NayeriGJ21,
  author       = {Zahra Makki Nayeri and
                  Toktam Ghafarian and
                  Bahman Javadi},
  title        = {Application placement in Fog computing with {AI} approach: Taxonomy
                  and a state of the art survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {185},
  pages        = {103078},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103078},
  doi          = {10.1016/J.JNCA.2021.103078},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/NayeriGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ShiLGDLC21,
  author       = {Leyi Shi and
                  Xiaoyu Li and
                  Zhenbo Gao and
                  Pengfei Duan and
                  Na Liu and
                  Honglong Chen},
  title        = {Worm computing: {A} blockchain-based resource sharing and cybersecurity
                  framework},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {185},
  pages        = {103081},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2021.103081},
  doi          = {10.1016/J.JNCA.2021.103081},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ShiLGDLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics