Search dblp for Publications

export results for "toc:db/journals/ijnm/ijnm34.bht:"

 download as .bib file

@article{DBLP:journals/ijnm/AgarwalRTY24,
  author       = {Udit Agarwal and
                  Vinay Rishiwal and
                  Sudeep Tanwar and
                  Mano Yadav},
  title        = {Blockchain and crypto forensics: Investigating crypto frauds},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2255},
  doi          = {10.1002/NEM.2255},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AgarwalRTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/AlqahtaniK24,
  author       = {Ali Alqahtani and
                  Surbhi Bhatia Khan},
  title        = {An optimal hybrid cascade regional convolutional network for cyberattack
                  detection},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2247},
  doi          = {10.1002/NEM.2247},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/AlqahtaniK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ArakawaO24,
  author       = {Kengo Arakawa and
                  Eiji Oki},
  title        = {Availability-aware virtual network function placement based on multidimensional
                  universal generating functions},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2252},
  doi          = {10.1002/NEM.2252},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ArakawaO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BadriNS24,
  author       = {Nedia Badri and
                  Le{\"{\i}}la Nasraoui and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  title        = {A comprehensive review of blockchain integration in remote patient
                  monitoring for E-health},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2254},
  doi          = {10.1002/NEM.2254},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BadriNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BasakS24,
  author       = {Suvam Basak and
                  Satish Narayana Srirama},
  title        = {Fog computing out of the box: Dynamic deployment of fog service containers
                  with {TOSCA}},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2246},
  doi          = {10.1002/NEM.2246},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BasakS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BezerraKW24,
  author       = {Wesley dos Reis Bezerra and
                  Fernando Koch and
                  Carlos Becker Westphall},
  title        = {Performance of security options for message protocols: {A} comparative
                  analysis},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2274},
  doi          = {10.1002/NEM.2274},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BezerraKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/BoskovCSTS24,
  author       = {Novak Boskov and
                  Xingyu Chen and
                  Sevval Simsek and
                  Ari Trachtenberg and
                  David Starobinski},
  title        = {Out-of-band transaction pool sync for large dynamic blockchain networks},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2265},
  doi          = {10.1002/NEM.2265},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/BoskovCSTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ChoiWH24,
  author       = {Wonseok Choi and
                  Jongsoo Woo and
                  James Won{-}Ki Hong},
  title        = {Fractional non-fungible tokens: Overview, evaluation, marketplaces,
                  and challenges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2260},
  doi          = {10.1002/NEM.2260},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/ChoiWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/DhandapaniTM24,
  author       = {Kavi Priya Dhandapani and
                  Mirnalinee Thanganadar Thangathai and
                  Shahul Hamead Haja Moinudeen},
  title        = {A novel eviction policy based on shortest remaining time for software
                  defined networking flow tables},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2257},
  doi          = {10.1002/NEM.2257},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/DhandapaniTM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/FuWYC24,
  author       = {Shange Fu and
                  Qin Wang and
                  Jiangshan Yu and
                  Shiping Chen},
  title        = {Leveraging Ponzi-like designs in stablecoins},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2277},
  doi          = {10.1002/NEM.2277},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/FuWYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HenkerAVSDB24,
  author       = {Robert Henker and
                  Daniel Atzberger and
                  Jan Ole Vollmer and
                  Willy Scheibel and
                  J{\"{u}}rgen D{\"{o}}llner and
                  Markus Bick},
  title        = {Athena: Smart order routing on centralized crypto exchanges using
                  a unified order book},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2266},
  doi          = {10.1002/NEM.2266},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HenkerAVSDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HongVJJK24,
  author       = {James Won{-}Ki Hong and
                  Andreas G. Veneris and
                  Hongtaek Ju and
                  Taeyeol Jeong and
                  Changhoon Kang},
  title        = {Innovations in Blockchain for Crypto Assets and Exchanges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2287},
  doi          = {10.1002/NEM.2287},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HongVJJK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/HougaardPH24,
  author       = {Jens Leth Hougaard and
                  Mohsen Pourpouneh and
                  Haiting Han},
  title        = {Transaction fee mechanisms with farsighted miners},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2275},
  doi          = {10.1002/NEM.2275},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/HougaardPH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/JinYLQ24,
  author       = {Anan Jin and
                  Yuhang Ye and
                  Brian Lee and
                  Yuansong Qiao},
  title        = {Topology analysis of the Ripple transaction network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2253},
  doi          = {10.1002/NEM.2253},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/JinYLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KarthikLAR24,
  author       = {V. Karthik and
                  R. Lakshmi and
                  Salini Abraham and
                  M. Ramkumar},
  title        = {Residual based temporal attention convolutional neural network for
                  detection of distributed denial of service attacks in software defined
                  network integrated vehicular adhoc network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2256},
  doi          = {10.1002/NEM.2256},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KarthikLAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KimEPJ24,
  author       = {Aeri Kim and
                  Meryam Essaid and
                  Sejin Park and
                  Hongtaek Ju},
  title        = {Reducing the propagation delay of compact block in Bitcoin network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2262},
  doi          = {10.1002/NEM.2262},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/KimEPJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/KoJWH24,
  author       = {Kyungchan Ko and
                  Taeyeol Jeong and
                  Jongsoo Woo and
                  James Won{-}Ki Hong},
  title        = {Survey on blockchain-based non-fungible tokens: History, technologies,
                  standards, and open challenges},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2245},
  doi          = {10.1002/NEM.2245},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/KoJWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NichollsKL24,
  author       = {Jack Nicholls and
                  Aditya Kuppa and
                  Nhien{-}An Le{-}Khac},
  title        = {The next phase of identifying illicit activity in Bitcoin},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2259},
  doi          = {10.1002/NEM.2259},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NichollsKL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/NisaKAA24,
  author       = {Najmun Nisa and
                  Adnan Shahid Khan and
                  Zeeshan Ahmad and
                  Johari Abdullah},
  title        = {{TPAAD:} Two-phase authentication system for denial of service attack
                  detection and mitigation using machine learning in software-defined
                  network},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2258},
  doi          = {10.1002/NEM.2258},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/NisaKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/PenuelaAMGGB24,
  author       = {F. Javier Fern{\'{a}}ndez{-}Bravo Pe{\~{n}}uela and
                  Jordi Arjona Aroca and
                  Francesc D. Mu{\~{n}}oz{-}Esco{\'{\i}} and
                  Yuriy Yatsyk Gravrylyak and
                  Ismael Ill{\'{a}}n Garc{\'{\i}}a and
                  Jos{\'{e}} M. Bernab{\'{e}}u{-}Aub{\'{a}}n},
  title        = {{DELTA:} {A} Modular, Transparent, and Efficient Synchronization of
                  DLTs and Databases},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2293},
  doi          = {10.1002/NEM.2293},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/PenuelaAMGGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/QiuZNJSZH24,
  author       = {Ziyu Qiu and
                  Zhilei Zhou and
                  Brad Niblett and
                  Andrew Johnston and
                  Jeffrey Schwartzentruber and
                  Nur Zincir{-}Heywood and
                  Malcolm I. Heywood},
  title        = {Assessing the impact of bag-of-words versus word-to-vector embedding
                  methods and dimension reduction on anomaly detection from log files},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2251},
  doi          = {10.1002/NEM.2251},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/QiuZNJSZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RajyalakshmiL24,
  author       = {Vankadhara Rajyalakshmi and
                  Kuruva Lakshmanna},
  title        = {Detection of car parking space by using Hybrid Deep DenseNet Optimization
                  algorithm},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2228},
  doi          = {10.1002/NEM.2228},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/RajyalakshmiL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/RicciAP24,
  author       = {Laura Ricci and
                  Moayad Aloqaily and
                  Vinayaka Pandit},
  title        = {Editorial for the {IJNM} Special Issue From the Best Papers of {IEEE}
                  {ICBC} 2023 "Advancing Blockchain and Cryptocurrency"},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2301},
  doi          = {10.1002/NEM.2301},
  timestamp    = {Tue, 15 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/RicciAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SinghMV24,
  author       = {Srisht Fateh Singh and
                  Panagiotis Michalopoulos and
                  Andreas G. Veneris},
  title        = {Deeper: {A} shared liquidity decentralized exchange design for low
                  trading volume tokens to enhance average liquidity},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2261},
  doi          = {10.1002/NEM.2261},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SinghMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/VidhyaRS24,
  author       = {S. Vidhya and
                  P. M. Siva Raja and
                  R. P. Sumithra},
  title        = {Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging
                  Novel Encryption Scheme, Smart Contracts, and Ring Signatures for
                  Enhanced Data Security and Patient Privacy},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {5},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2289},
  doi          = {10.1002/NEM.2289},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/VidhyaRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangZ24,
  author       = {Shengyi Yang and
                  Shaoying Zhu},
  title        = {Thinking and exploration of the teaching mode of empirical accounting
                  course based on the Internet of Things and deep learning},
  journal      = {Int. J. Netw. Manag.},
  volume       = {34},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/nem.2242},
  doi          = {10.1002/NEM.2242},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}