default search action
Search dblp for Publications
export results for "toc:db/journals/ijnm/ijnm34.bht:"
@article{DBLP:journals/ijnm/AgarwalRTY24, author = {Udit Agarwal and Vinay Rishiwal and Sudeep Tanwar and Mano Yadav}, title = {Blockchain and crypto forensics: Investigating crypto frauds}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2255}, doi = {10.1002/NEM.2255}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AgarwalRTY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/AlqahtaniK24, author = {Ali Alqahtani and Surbhi Bhatia Khan}, title = {An optimal hybrid cascade regional convolutional network for cyberattack detection}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2247}, doi = {10.1002/NEM.2247}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AlqahtaniK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ArakawaO24, author = {Kengo Arakawa and Eiji Oki}, title = {Availability-aware virtual network function placement based on multidimensional universal generating functions}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2252}, doi = {10.1002/NEM.2252}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ArakawaO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BadriNS24, author = {Nedia Badri and Le{\"{\i}}la Nasraoui and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, title = {A comprehensive review of blockchain integration in remote patient monitoring for E-health}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2254}, doi = {10.1002/NEM.2254}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BadriNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BasakS24, author = {Suvam Basak and Satish Narayana Srirama}, title = {Fog computing out of the box: Dynamic deployment of fog service containers with {TOSCA}}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2246}, doi = {10.1002/NEM.2246}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/BasakS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BezerraKW24, author = {Wesley dos Reis Bezerra and Fernando Koch and Carlos Becker Westphall}, title = {Performance of security options for message protocols: {A} comparative analysis}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2274}, doi = {10.1002/NEM.2274}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BezerraKW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BoskovCSTS24, author = {Novak Boskov and Xingyu Chen and Sevval Simsek and Ari Trachtenberg and David Starobinski}, title = {Out-of-band transaction pool sync for large dynamic blockchain networks}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2265}, doi = {10.1002/NEM.2265}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BoskovCSTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/CaoJZX24, author = {Xiangyu Cao and Zhengjun Jing and Xiaorong Zhao and Xiaolong Xu}, title = {A security-enhanced equipment predictive maintenance solution for the {ETO} manufacturing}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2263}, doi = {10.1002/NEM.2263}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/CaoJZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ChoiWH24, author = {Wonseok Choi and Jongsoo Woo and James Won{-}Ki Hong}, title = {Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/nem.2260}, doi = {10.1002/NEM.2260}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ChoiWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DeviAHM24, author = {C. H. Sarada Devi and R. Anand and R. Hemalatha and B. Uma Maheswari}, title = {Duo-H: An Effectual Consensus Algorithm Using Two-Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2300}, doi = {10.1002/NEM.2300}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/DeviAHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/DhandapaniTM24, author = {Kavi Priya Dhandapani and Mirnalinee Thanganadar Thangathai and Shahul Hamead Haja Moinudeen}, title = {A novel eviction policy based on shortest remaining time for software defined networking flow tables}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2257}, doi = {10.1002/NEM.2257}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/DhandapaniTM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/FuWYC24, author = {Shange Fu and Qin Wang and Jiangshan Yu and Shiping Chen}, title = {Leveraging Ponzi-like designs in stablecoins}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/nem.2277}, doi = {10.1002/NEM.2277}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/FuWYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/GaoGZJLLZL24, author = {Dongying Gao and Caiwei Guo and Yi Zhang and Wen Ji and Zhilei Lv and Zheng Li and Kunsan Zhang and Ruibin Lin}, title = {Risk-Aware {SDN} Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2297}, doi = {10.1002/NEM.2297}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/GaoGZJLLZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HenkerAVSDB24, author = {Robert Henker and Daniel Atzberger and Jan Ole Vollmer and Willy Scheibel and J{\"{u}}rgen D{\"{o}}llner and Markus Bick}, title = {Athena: Smart order routing on centralized crypto exchanges using a unified order book}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/nem.2266}, doi = {10.1002/NEM.2266}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/HenkerAVSDB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HongVJJK24, author = {James Won{-}Ki Hong and Andreas G. Veneris and Hongtaek Ju and Taeyeol Jeong and Changhoon Kang}, title = {Innovations in Blockchain for Crypto Assets and Exchanges}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/nem.2287}, doi = {10.1002/NEM.2287}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HongVJJK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/HougaardPH24, author = {Jens Leth Hougaard and Mohsen Pourpouneh and Haiting Han}, title = {Transaction fee mechanisms with farsighted miners}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2275}, doi = {10.1002/NEM.2275}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/HougaardPH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JinCQSCC24, author = {Chunhua Jin and Zhiwei Chen and Wenyu Qin and Kaijun Sun and Guanhua Chen and Liqing Chen}, title = {A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2305}, doi = {10.1002/NEM.2305}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/JinCQSCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/JinYLQ24, author = {Anan Jin and Yuhang Ye and Brian Lee and Yuansong Qiao}, title = {Topology analysis of the Ripple transaction network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/nem.2253}, doi = {10.1002/NEM.2253}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/JinYLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KarthikLAR24, author = {V. Karthik and R. Lakshmi and Salini Abraham and M. Ramkumar}, title = {Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2256}, doi = {10.1002/NEM.2256}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KarthikLAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KimEPJ24, author = {Aeri Kim and Meryam Essaid and Sejin Park and Hongtaek Ju}, title = {Reducing the propagation delay of compact block in Bitcoin network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2262}, doi = {10.1002/NEM.2262}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KimEPJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KoJWH24, author = {Kyungchan Ko and Taeyeol Jeong and Jongsoo Woo and James Won{-}Ki Hong}, title = {Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2245}, doi = {10.1002/NEM.2245}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/KoJWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KumarMMB24, author = {Chandra Umakantham Om Kumar and Suguna Marappan and Bhavadharini Murugeshan and P. Mercy Rajaselvi Beaulah}, title = {Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture-Fully Convolutional Variational Autoencoder Model}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2295}, doi = {10.1002/NEM.2295}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/KumarMMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiZDYWLW24, author = {Xinyang Li and Meng Zhao and Yong Ding and Changsong Yang and Huiyong Wang and Hai Liang and Yujue Wang}, title = {Privacy-preserving data aggregation achieving completeness of data queries in smart grid}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2273}, doi = {10.1002/NEM.2273}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/LiZDYWLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LiuZZQL24, author = {Yifan Liu and Heng Zhang and Yang Zhou and Kai Qi and Qingxiang Li}, title = {Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2306}, doi = {10.1002/NEM.2306}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/LiuZZQL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ManikandanS24, author = {Kayalvizhi Manikandan and Ramamoorthy Sriramulu}, title = {{ASMTP:} Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2271}, doi = {10.1002/NEM.2271}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/ManikandanS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MengKCC24, author = {Weizhi Meng and Sokratis K. Katsikas and Jiageng Chen and Chao Chen}, title = {Security, Privacy, and Trust Management on Decentralized Systems and Networks}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2311}, doi = {10.1002/NEM.2311}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/MengKCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/MittalCRPK24, author = {Shubh Mittal and Tisha Chawla and Saifur Rahman and Shantanu Pal and Chandan K. Karmakar}, title = {A secure and light-weight patient survival prediction in Internet of Medical Things framework}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2286}, doi = {10.1002/NEM.2286}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/MittalCRPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NN24, author = {Renya Nath N and Hiran V. Nath}, title = {A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2291}, doi = {10.1002/NEM.2291}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/NN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NichollsKL24, author = {Jack Nicholls and Aditya Kuppa and Nhien{-}An Le{-}Khac}, title = {The next phase of identifying illicit activity in Bitcoin}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2259}, doi = {10.1002/NEM.2259}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/NichollsKL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/NisaKAA24, author = {Najmun Nisa and Adnan Shahid Khan and Zeeshan Ahmad and Johari Abdullah}, title = {{TPAAD:} Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {3}, year = {2024}, url = {https://doi.org/10.1002/nem.2258}, doi = {10.1002/NEM.2258}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/NisaKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/PenuelaAMGGB24, author = {F. Javier Fern{\'{a}}ndez{-}Bravo Pe{\~{n}}uela and Jordi Arjona Aroca and Francesc D. Mu{\~{n}}oz{-}Esco{\'{\i}} and Yuriy Yatsyk Gravrylyak and Ismael Ill{\'{a}}n Garc{\'{\i}}a and Jos{\'{e}} M. Bernab{\'{e}}u{-}Aub{\'{a}}n}, title = {{DELTA:} {A} Modular, Transparent, and Efficient Synchronization of DLTs and Databases}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2293}, doi = {10.1002/NEM.2293}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/PenuelaAMGGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/QiuZNJSZH24, author = {Ziyu Qiu and Zhilei Zhou and Brad Niblett and Andrew Johnston and Jeffrey Schwartzentruber and Nur Zincir{-}Heywood and Malcolm I. Heywood}, title = {Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2251}, doi = {10.1002/NEM.2251}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/QiuZNJSZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RajyalakshmiL24, author = {Vankadhara Rajyalakshmi and Kuruva Lakshmanna}, title = {Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2228}, doi = {10.1002/NEM.2228}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/RajyalakshmiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/RicciAP24, author = {Laura Ricci and Moayad Aloqaily and Vinayaka Pandit}, title = {Editorial for the {IJNM} Special Issue From the Best Papers of {IEEE} {ICBC} 2023 "Advancing Blockchain and Cryptocurrency"}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2301}, doi = {10.1002/NEM.2301}, timestamp = {Tue, 15 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/RicciAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SinghMV24, author = {Srisht Fateh Singh and Panagiotis Michalopoulos and Andreas G. Veneris}, title = {Deeper: {A} shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/nem.2261}, doi = {10.1002/NEM.2261}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SinghMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/VidhyaRS24, author = {S. Vidhya and P. M. Siva Raja and R. P. Sumithra}, title = {Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/nem.2289}, doi = {10.1002/NEM.2289}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/VidhyaRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/WangLWYPCHR24, author = {Qiuhua Wang and Chuangchuang Li and Dong Wang and Lifeng Yuan and Gaoning Pan and Yanyu Cheng and Mingde Hu and Yizhi Ren}, title = {{IGXSS:} {XSS} payload detection model based on inductive {GCN}}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2264}, doi = {10.1002/NEM.2264}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/WangLWYPCHR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YangZ24, author = {Shengyi Yang and Shaoying Zhu}, title = {Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/nem.2242}, doi = {10.1002/NEM.2242}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YangZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ZhangZYZS24, author = {Chao Zhang and Jinmei Zhang and Lijun Yun and Jun Zhang and Junbo Su}, title = {Privacy-protected object detection through trustworthy image fusion}, journal = {Int. J. Netw. Manag.}, volume = {34}, number = {6}, year = {2024}, url = {https://doi.org/10.1002/nem.2270}, doi = {10.1002/NEM.2270}, timestamp = {Sun, 05 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnm/ZhangZYZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.