default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn230.bht:"
@article{DBLP:journals/cn/CerquitelliMCST23, author = {Tania Cerquitelli and Michela Meo and Mar{\'{\i}}lia Curado and Lea Skorin{-}Kapov and Eirini{-}Eleni Tsiropoulou}, title = {Machine learning empowered computer networks}, journal = {Comput. Networks}, volume = {230}, pages = {109807}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109807}, doi = {10.1016/J.COMNET.2023.109807}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CerquitelliMCST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/FotiouTSXP23, author = {Nikos Fotiou and Yannis Thomas and Vasilios A. Siris and George Xylomenos and George C. Polyzos}, title = {Self-verifiable content using decentralized identifiers}, journal = {Comput. Networks}, volume = {230}, pages = {109799}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109799}, doi = {10.1016/J.COMNET.2023.109799}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/FotiouTSXP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GarroppoS23, author = {Rosario Giuseppe Garroppo and Maria Grazia Scutell{\`{a}}}, title = {Design model of an {IEEE} 802.11ad infrastructure for TSN-based industrial applications}, journal = {Comput. Networks}, volume = {230}, pages = {109771}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109771}, doi = {10.1016/J.COMNET.2023.109771}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GarroppoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KayathriKV23, author = {T. L. Kayathri and N. Kumaresan and R. Vijayabhasker}, title = {SDBGPChain: {A} decentralized low complexity framework to detect and prevent the BGPattacks using {SDN} with smart contract based Dendrimer tree blockchain}, journal = {Comput. Networks}, volume = {230}, pages = {109800}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109800}, doi = {10.1016/J.COMNET.2023.109800}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KayathriKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Kim23, author = {Sungwook Kim}, title = {Radio resource management scheme in radar and communication spectral coexistence platform}, journal = {Comput. Networks}, volume = {230}, pages = {109773}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109773}, doi = {10.1016/J.COMNET.2023.109773}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Kim23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KowalskiM23, author = {Mikolaj Kowalski and Wojciech Mazurczyk}, title = {Toward the mutual routing security in wide area networks: {A} scoping review of current threats and countermeasures}, journal = {Comput. Networks}, volume = {230}, pages = {109778}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109778}, doi = {10.1016/J.COMNET.2023.109778}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KowalskiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KurtAA23, author = {Isil Kurt and Fatih Alag{\"{o}}z and Mete Akg{\"{u}}n}, title = {Scalable {RFID} authentication protocol based on physically unclonable functions}, journal = {Comput. Networks}, volume = {230}, pages = {109793}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109793}, doi = {10.1016/J.COMNET.2023.109793}, timestamp = {Thu, 01 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KurtAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiZZWXZ23, author = {Pengmiao Li and Yuchao Zhang and Huahai Zhang and Wendong Wang and Ke Xu and Zhili Zhang}, title = {A delayed eviction caching replacement strategy with unified standard for edge servers}, journal = {Comput. Networks}, volume = {230}, pages = {109794}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109794}, doi = {10.1016/J.COMNET.2023.109794}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiZZWXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MazloumKGC23, author = {Ali Mazloum and Elie F. Kfoury and Jose Gomez and Jorge Crichigno}, title = {A Survey on Rerouting Techniques with {P4} Programmable Data Plane Switches}, journal = {Comput. Networks}, volume = {230}, pages = {109795}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109795}, doi = {10.1016/J.COMNET.2023.109795}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MazloumKGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/QinJCD23, author = {Xingsheng Qin and Frank Jiang and Mingcan Cen and Robin Doss}, title = {Hybrid cyber defense strategies using Honey-X: {A} survey}, journal = {Comput. Networks}, volume = {230}, pages = {109776}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109776}, doi = {10.1016/J.COMNET.2023.109776}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/QinJCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShuFTZ23, author = {Zhaogang Shu and Haoxian Feng and Tarik Taleb and Zhifang Zhang}, title = {A novel combinatorial multi-armed bandit game to identify online the changing top-K flows in software-defined networks}, journal = {Comput. Networks}, volume = {230}, pages = {109783}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109783}, doi = {10.1016/J.COMNET.2023.109783}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ShuFTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TangLW23, author = {Tong Tang and Yingxu Lai and Yipeng Wang}, title = {Relational reasoning-based approach for network protocol reverse engineering}, journal = {Comput. Networks}, volume = {230}, pages = {109797}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109797}, doi = {10.1016/J.COMNET.2023.109797}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TangLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.