![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Network Management, Volume 29
Volume 29, Number 1, January 2019
Editorial
- Franco Callegati
, Walter Cerroni:
IEEE NetSoft 2017 special issue: Softwarization sustaining a hyper-connected world: En route to 5G.
- Filippo Rebecchi
, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, Vania Conan:
DDoS protection with stateful software-defined networking. - Salvatore Pontarelli
, Marco Bonola
, Giuseppe Bianchi:
Smashing OpenFlow's "atomic" actions: Programmable data plane packet manipulation in hardware. - Luca Chiaraviglio
, Lavinia Amorosi
, Nicola Blefari-Melazzi, Paolo Dell'Olmo, Mohammad Shojafar
, Stefano Salsano:
Optimal management of reusable functional blocks in 5G superfluid networks. - Gianluca Davoli, Walter Cerroni
, Slavica Tomovic, Chiara Buratti, Chiara Contoli
, Franco Callegati
:
Intent-based service management for heterogeneous software-defined infrastructure domains.
Volume 29, Number 2, March 2019
- Takashi Miyamura
, Akira Misawa, Junichi Kani
:
Highly efficient optical aggregation network with network functions virtualization. - Rodérick Fanou
, Victor Sanchez-Agüero, Francisco Valera
, Michuki Mwangi, Jane Coffin:
A system for profiling the IXPs in a region and monitoring their growth: Spotlight at the internet frontier. - Emmanouil Vasilomanolakis
, Max Mühlhäuser:
Detection and mitigation of monitor identification attacks in collaborative intrusion detection systems. - Huru Hasanova
, Ui-Jun Baek, Mu-Gon Shin, Kyunghee Cho, Myung-Sup Kim
:
A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. - Marcus Lemos
, Ricardo A. L. Rabêlo, Douglas Mendes
, Carlos Giovanni Carvalho, Raimir Holanda
:
An approach for provisioning virtual sensors in sensor clouds. - Malayam Parambath Gilesh
, S. D. Madhu Kumar, Lillykutty Jacob:
Resource availability-aware adaptive provisioning of virtual data center networks.
Volume 29, Number 3, May 2019
Editorial
- Carol J. Fung, Jérôme François, Weverton Cordeiro, Mohamed Faten Zhani
:
Advanced security management.
- Tien D. Phan
, Nur Zincir-Heywood:
User identification via neural network based language models. - Abdurrahman Pektas
, Tankut Acarman:
A deep learning method to detect network intrusion through flow-based features. - Mahesh Kumar Prasath
, Balasubramani Perumal:
A meta-heuristic Bayesian network classification for intrusion detection. - Sofiane Lagraa
, Yutian Chen, Jérôme François
:
Deep mining port scans from darknet. - Lucas M. Palma, Martín A. Gagliotti Vigil
, Fernando Lauro Pereira, Jean Everson Martina
:
Blockchain and smart contracts for higher education registry in Brazil. - Leonardo B. da Costa
, André Silva Neto, Billy Pinheiro, Weverton Cordeiro, Roberto Araújo, Antônio Abelém
:
Securing light clients in blockchain with DLCP.
Volume 29, Number 4, July 2019
- Manuel Peuster
, Hannes Kuttner, Holger Karl:
A flow handover protocol to support state migration in softwarized networks. - Damir Breskovic
, Dinko Begusic:
Techno-economic analysis of FiWi access networks based on optimized source packet traffic. - Rafael Xavier
, Lisandro Zambenedetti Granville, Filip De Turck
, Bruno Volckaert:
Efficient allocation of elastic interfederation encrypted streaming sessions.
Volume 29, Number 5, September 2019
- Nitin Shukla
, Mayank Pandey, Shashank Srivastava
:
Formal modeling and verification of software-defined networks: A survey. - Tiago O. Castro, Vitor Gabriel Reis Caitité, Daniel F. Macedo
, Aldri L. dos Santos:
CASA-IoT: Scalable and context-aware IoT access control supporting multiple users.
Volume 29, Number 6, November 2019
- Jonghwan Hyun
, Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:
Real-time and fine-grained network monitoring using in-band network telemetry. - Guilherme Arthur Geronimo
, Rafael Brundo Uriarte
, Carlos Becker Westphall
:
Order@Cloud: An agnostic meta-heuristic for VM provisioning, adaptation, and organisation.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.