Search dblp for Publications

export results for "toc:db/journals/cn/cn109.bht:"

 download as .bib file

@article{DBLP:journals/cn/AlibertiPG16,
  author       = {Giulio Aliberti and
                  Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Reliable and perfectly secret communication over the generalized Ozarow-Wyner's
                  wire-tap channel},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {21--30},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.034},
  doi          = {10.1016/J.COMNET.2016.06.034},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AlibertiPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BhuniaBRS16,
  author       = {Suman Bhunia and
                  Vahid Behzadan and
                  Paulo Alexandre Regis and
                  Shamik Sengupta},
  title        = {Adaptive beam nulling in multihop ad hoc networks against a jammer
                  in motion},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {50--66},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.030},
  doi          = {10.1016/J.COMNET.2016.06.030},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BhuniaBRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BocchiGMBSMML16,
  author       = {Enrico Bocchi and
                  Luigi Grimaudo and
                  Marco Mellia and
                  Elena Baralis and
                  Sabyasachi Saha and
                  Stanislav Miskovic and
                  Gaspar Modelo{-}Howard and
                  Sung{-}Ju Lee},
  title        = {{MAGMA} network behavior classifier for malware traffic},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {142--156},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.021},
  doi          = {10.1016/J.COMNET.2016.03.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BocchiGMBSMML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BonaldC16,
  author       = {Thomas Bonald and
                  C{\'{e}}line Comte},
  title        = {The multi-source model for dimensioning data networks},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {225--233},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.019},
  doi          = {10.1016/J.COMNET.2016.03.019},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BonaldC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GoncalvesDVSAM16,
  author       = {Glauber D. Gon{\c{c}}alves and
                  Idilio Drago and
                  Alex Borges Vieira and
                  Ana Paula Couto da Silva and
                  Jussara M. Almeida and
                  Marco Mellia},
  title        = {Workload models and performance evaluation of cloud storage services},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {183--199},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.024},
  doi          = {10.1016/J.COMNET.2016.03.024},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GoncalvesDVSAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HaKANJKL16,
  author       = {Taejin Ha and
                  Sunghwan Kim and
                  Namwon An and
                  Jargalsaikhan Narantuya and
                  Chiwook Jeong and
                  JongWon Kim and
                  Hyuk Lim},
  title        = {Suspicious traffic sampling for intrusion detection in software-defined
                  networks},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {172--182},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.05.019},
  doi          = {10.1016/J.COMNET.2016.05.019},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HaKANJKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HanckeMSS16,
  author       = {Gerhard P. Hancke and
                  Aikaterini Mitrokotsa and
                  Reihaneh Safavi{-}Naini and
                  Damien Sauveron},
  title        = {Special issue on recent advances in physical-layer security},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.08.012},
  doi          = {10.1016/J.COMNET.2016.08.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HanckeMSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HoursBLFM16,
  author       = {Hadrien Hours and
                  Ernst W. Biersack and
                  Patrick Loiseau and
                  Alessandro Finamore and
                  Marco Mellia},
  title        = {A study of the impact of {DNS} resolvers on {CDN} performance using
                  a causal approach},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {200--210},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.023},
  doi          = {10.1016/J.COMNET.2016.06.023},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HoursBLFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HuthGSDSG16,
  author       = {Christopher Huth and
                  Ren{\'{e}} Guillaume and
                  Thomas Strohm and
                  Paul Duplys and
                  Irin Ann Samuel and
                  Tim G{\"{u}}neysu},
  title        = {Information reconciliation schemes in physical-layer security: {A}
                  survey},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {84--104},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.014},
  doi          = {10.1016/J.COMNET.2016.06.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HuthGSDSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KleinrouwelerCM16,
  author       = {Jan Willem Kleinrouweler and
                  Sergio Cabrero and
                  Rob van der Mei and
                  Pablo C{\'{e}}sar},
  title        = {A model for evaluating sharing policies for network-assisted {HTTP}
                  adaptive streaming},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {234--245},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.023},
  doi          = {10.1016/J.COMNET.2016.03.023},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KleinrouwelerCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeeK16,
  author       = {Il{-}Gu Lee and
                  Myungchul Kim},
  title        = {Persistent jamming in wireless local area networks: Attack and defense},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {67--83},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.024},
  doi          = {10.1016/J.COMNET.2016.06.024},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LeeK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MarchettiPCG16,
  author       = {Mirco Marchetti and
                  Fabio Pierazzi and
                  Michele Colajanni and
                  Alessandro Guido},
  title        = {Analysis of high volumes of network traffic for Advanced Persistent
                  Threat detection},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {127--141},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.05.018},
  doi          = {10.1016/J.COMNET.2016.05.018},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MarchettiPCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MeoW16,
  author       = {Michela Meo and
                  Sabine Wittevrongel},
  title        = {Traffic and performance in the big data era},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {125--126},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.07.005},
  doi          = {10.1016/J.COMNET.2016.07.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MeoW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MetzgerLMH16,
  author       = {Florian Metzger and
                  Eirini Liotou and
                  Christian Moldovan and
                  Tobias Ho{\ss}feld},
  title        = {{TCP} video streaming and mobile networks: Not a love story, but better
                  with context},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {246--256},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.033},
  doi          = {10.1016/J.COMNET.2016.06.033},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MetzgerLMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NardelliALL16,
  author       = {Pedro H. J. Nardelli and
                  Hirley Alves and
                  Carlos H. M. de Lima and
                  Matti Latva{-}aho},
  title        = {Throughput maximization in multi-hop wireless networks under a secrecy
                  constraint},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {13--20},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.020},
  doi          = {10.1016/J.COMNET.2016.06.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NardelliALL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PetroulakisSA16,
  author       = {Nikolaos E. Petroulakis and
                  George Spanoudakis and
                  Ioannis G. Askoxylakis},
  title        = {Patterns for the design of secure and dependable software defined
                  networks},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {39--49},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.028},
  doi          = {10.1016/J.COMNET.2016.06.028},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/PetroulakisSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/QuyenDVXS16,
  author       = {Nguyen Xuan Quyen and
                  Trung Quang Duong and
                  Nguyen{-}Son Vo and
                  Qingqing Xie and
                  Lei Shu},
  title        = {Chaotic direct-sequence spread-spectrum with variable symbol period:
                  {A} technique for enhancing physical layer security},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {4--12},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.022},
  doi          = {10.1016/J.COMNET.2016.06.022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/QuyenDVXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SomaniGSC16,
  author       = {Gaurav Somani and
                  Manoj Singh Gaur and
                  Dheeraj Sanghi and
                  Mauro Conti},
  title        = {DDoS attacks in cloud computing: Collateral damage to non-targets},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {157--171},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.022},
  doi          = {10.1016/J.COMNET.2016.03.022},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SomaniGSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TippenhauerRC16,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Physical-layer integrity for wireless messages},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {31--38},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.021},
  doi          = {10.1016/J.COMNET.2016.06.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WamserCSMTH16,
  author       = {Florian Wamser and
                  Pedro Casas and
                  Michael Seufert and
                  Christian Moldovan and
                  Phuoc Tran{-}Gia and
                  Tobias Ho{\ss}feld},
  title        = {Modeling the YouTube stack: From packets to quality of experience},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {211--224},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.03.020},
  doi          = {10.1016/J.COMNET.2016.03.020},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WamserCSMTH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZengerPZPLP16,
  author       = {Christian T. Zenger and
                  Mario Pietersz and
                  Jan Zimmer and
                  Jan{-}Felix Posielek and
                  Thorben Lenze and
                  Christof Paar},
  title        = {Authenticated key establishment for low-resource devices exploiting
                  correlated random channels},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {105--123},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.013},
  doi          = {10.1016/J.COMNET.2016.06.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZengerPZPLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics