Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn109.bht:"
@article{DBLP:journals/cn/AlibertiPG16, author = {Giulio Aliberti and Roberto Di Pietro and Stefano Guarino}, title = {Reliable and perfectly secret communication over the generalized Ozarow-Wyner's wire-tap channel}, journal = {Comput. Networks}, volume = {109}, pages = {21--30}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.034}, doi = {10.1016/J.COMNET.2016.06.034}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AlibertiPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BhuniaBRS16, author = {Suman Bhunia and Vahid Behzadan and Paulo Alexandre Regis and Shamik Sengupta}, title = {Adaptive beam nulling in multihop ad hoc networks against a jammer in motion}, journal = {Comput. Networks}, volume = {109}, pages = {50--66}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.030}, doi = {10.1016/J.COMNET.2016.06.030}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BhuniaBRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BocchiGMBSMML16, author = {Enrico Bocchi and Luigi Grimaudo and Marco Mellia and Elena Baralis and Sabyasachi Saha and Stanislav Miskovic and Gaspar Modelo{-}Howard and Sung{-}Ju Lee}, title = {{MAGMA} network behavior classifier for malware traffic}, journal = {Comput. Networks}, volume = {109}, pages = {142--156}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.021}, doi = {10.1016/J.COMNET.2016.03.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BocchiGMBSMML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BonaldC16, author = {Thomas Bonald and C{\'{e}}line Comte}, title = {The multi-source model for dimensioning data networks}, journal = {Comput. Networks}, volume = {109}, pages = {225--233}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.019}, doi = {10.1016/J.COMNET.2016.03.019}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BonaldC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GoncalvesDVSAM16, author = {Glauber D. Gon{\c{c}}alves and Idilio Drago and Alex Borges Vieira and Ana Paula Couto da Silva and Jussara M. Almeida and Marco Mellia}, title = {Workload models and performance evaluation of cloud storage services}, journal = {Comput. Networks}, volume = {109}, pages = {183--199}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.024}, doi = {10.1016/J.COMNET.2016.03.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GoncalvesDVSAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HaKANJKL16, author = {Taejin Ha and Sunghwan Kim and Namwon An and Jargalsaikhan Narantuya and Chiwook Jeong and JongWon Kim and Hyuk Lim}, title = {Suspicious traffic sampling for intrusion detection in software-defined networks}, journal = {Comput. Networks}, volume = {109}, pages = {172--182}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.05.019}, doi = {10.1016/J.COMNET.2016.05.019}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HaKANJKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HanckeMSS16, author = {Gerhard P. Hancke and Aikaterini Mitrokotsa and Reihaneh Safavi{-}Naini and Damien Sauveron}, title = {Special issue on recent advances in physical-layer security}, journal = {Comput. Networks}, volume = {109}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.08.012}, doi = {10.1016/J.COMNET.2016.08.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HanckeMSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HoursBLFM16, author = {Hadrien Hours and Ernst W. Biersack and Patrick Loiseau and Alessandro Finamore and Marco Mellia}, title = {A study of the impact of {DNS} resolvers on {CDN} performance using a causal approach}, journal = {Comput. Networks}, volume = {109}, pages = {200--210}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.023}, doi = {10.1016/J.COMNET.2016.06.023}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HoursBLFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuthGSDSG16, author = {Christopher Huth and Ren{\'{e}} Guillaume and Thomas Strohm and Paul Duplys and Irin Ann Samuel and Tim G{\"{u}}neysu}, title = {Information reconciliation schemes in physical-layer security: {A} survey}, journal = {Comput. Networks}, volume = {109}, pages = {84--104}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.014}, doi = {10.1016/J.COMNET.2016.06.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HuthGSDSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KleinrouwelerCM16, author = {Jan Willem Kleinrouweler and Sergio Cabrero and Rob van der Mei and Pablo C{\'{e}}sar}, title = {A model for evaluating sharing policies for network-assisted {HTTP} adaptive streaming}, journal = {Comput. Networks}, volume = {109}, pages = {234--245}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.023}, doi = {10.1016/J.COMNET.2016.03.023}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KleinrouwelerCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeK16, author = {Il{-}Gu Lee and Myungchul Kim}, title = {Persistent jamming in wireless local area networks: Attack and defense}, journal = {Comput. Networks}, volume = {109}, pages = {67--83}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.024}, doi = {10.1016/J.COMNET.2016.06.024}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LeeK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MarchettiPCG16, author = {Mirco Marchetti and Fabio Pierazzi and Michele Colajanni and Alessandro Guido}, title = {Analysis of high volumes of network traffic for Advanced Persistent Threat detection}, journal = {Comput. Networks}, volume = {109}, pages = {127--141}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.05.018}, doi = {10.1016/J.COMNET.2016.05.018}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MarchettiPCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MeoW16, author = {Michela Meo and Sabine Wittevrongel}, title = {Traffic and performance in the big data era}, journal = {Comput. Networks}, volume = {109}, pages = {125--126}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.07.005}, doi = {10.1016/J.COMNET.2016.07.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MeoW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MetzgerLMH16, author = {Florian Metzger and Eirini Liotou and Christian Moldovan and Tobias Ho{\ss}feld}, title = {{TCP} video streaming and mobile networks: Not a love story, but better with context}, journal = {Comput. Networks}, volume = {109}, pages = {246--256}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.033}, doi = {10.1016/J.COMNET.2016.06.033}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MetzgerLMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NardelliALL16, author = {Pedro H. J. Nardelli and Hirley Alves and Carlos H. M. de Lima and Matti Latva{-}aho}, title = {Throughput maximization in multi-hop wireless networks under a secrecy constraint}, journal = {Comput. Networks}, volume = {109}, pages = {13--20}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.020}, doi = {10.1016/J.COMNET.2016.06.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NardelliALL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PetroulakisSA16, author = {Nikolaos E. Petroulakis and George Spanoudakis and Ioannis G. Askoxylakis}, title = {Patterns for the design of secure and dependable software defined networks}, journal = {Comput. Networks}, volume = {109}, pages = {39--49}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.028}, doi = {10.1016/J.COMNET.2016.06.028}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PetroulakisSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/QuyenDVXS16, author = {Nguyen Xuan Quyen and Trung Quang Duong and Nguyen{-}Son Vo and Qingqing Xie and Lei Shu}, title = {Chaotic direct-sequence spread-spectrum with variable symbol period: {A} technique for enhancing physical layer security}, journal = {Comput. Networks}, volume = {109}, pages = {4--12}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.022}, doi = {10.1016/J.COMNET.2016.06.022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/QuyenDVXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SomaniGSC16, author = {Gaurav Somani and Manoj Singh Gaur and Dheeraj Sanghi and Mauro Conti}, title = {DDoS attacks in cloud computing: Collateral damage to non-targets}, journal = {Comput. Networks}, volume = {109}, pages = {157--171}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.022}, doi = {10.1016/J.COMNET.2016.03.022}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SomaniGSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TippenhauerRC16, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Physical-layer integrity for wireless messages}, journal = {Comput. Networks}, volume = {109}, pages = {31--38}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.021}, doi = {10.1016/J.COMNET.2016.06.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WamserCSMTH16, author = {Florian Wamser and Pedro Casas and Michael Seufert and Christian Moldovan and Phuoc Tran{-}Gia and Tobias Ho{\ss}feld}, title = {Modeling the YouTube stack: From packets to quality of experience}, journal = {Comput. Networks}, volume = {109}, pages = {211--224}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.03.020}, doi = {10.1016/J.COMNET.2016.03.020}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WamserCSMTH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZengerPZPLP16, author = {Christian T. Zenger and Mario Pietersz and Jan Zimmer and Jan{-}Felix Posielek and Thorben Lenze and Christof Paar}, title = {Authenticated key establishment for low-resource devices exploiting correlated random channels}, journal = {Comput. Networks}, volume = {109}, pages = {105--123}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.013}, doi = {10.1016/J.COMNET.2016.06.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZengerPZPLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.