default search action
Search dblp for Publications
export results for "toc:db/journals/jnca/jnca110.bht:"
@article{DBLP:journals/jnca/GuirguisKHEY18, author = {Arsany Guirguis and Mohammed Karmoose and Karim Habak and Mustafa El{-}Nainay and Moustafa Youssef}, title = {Cooperation-based multi-hop routing protocol for cognitive radio networks}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {27--42}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.005}, doi = {10.1016/J.JNCA.2018.03.005}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuirguisKHEY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HayyolalamK18, author = {Vahideh Hayyolalam and Ali Asghar Pourhaji Kazem}, title = {A systematic literature review on QoS-aware service composition and selection in cloud environment}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {52--74}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.003}, doi = {10.1016/J.JNCA.2018.03.003}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HayyolalamK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JakobikPK18, author = {Agnieszka Jakobik and Francesco Palmieri and Joanna Kolodziej}, title = {Stackelberg games for modeling defense scenarios against cloud security threats}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {99--107}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.015}, doi = {10.1016/J.JNCA.2018.02.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/JakobikPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiCD18, author = {Jin Li and Aniello Castiglione and Changyu Dong}, title = {Special issue on security in cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {97--98}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.016}, doi = {10.1016/J.JNCA.2018.03.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiaoLSZ018, author = {Dan Liao and Hui Li and Gang Sun and Ming Zhang and Victor Chang}, title = {Location and trajectory privacy preservation in 5G-Enabled vehicle social network services}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {108--118}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.002}, doi = {10.1016/J.JNCA.2018.02.002}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiaoLSZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MurtiSS18, author = {Fahri Wisnu Murti and Rahmat Faddli Siregar and Soo Young Shin}, title = {{SU-MIMO} based uplink non-orthogonal multiple access for 5G}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {87--96}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.009}, doi = {10.1016/J.JNCA.2018.03.009}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MurtiSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NoshyIA18, author = {Mostafa Noshy and Abdelhameed Ibrahim and Hesham Arafat Ali}, title = {Optimization of live virtual machine migration in cloud computing: {A} survey and future directions}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {1--10}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.002}, doi = {10.1016/J.JNCA.2018.03.002}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/NoshyIA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SheikhKAWH18, author = {Umber Sheikh and Abid Khan and Bilal Ahmed and Abdul Waheed and Abdul Hameed}, title = {Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {11--26}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.004}, doi = {10.1016/J.JNCA.2018.03.004}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SheikhKAWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TanHLG18, author = {Choon Beng Tan and Mohd. Hanafi Ahmad Hijazi and Yuto Lim and Abdullah Gani}, title = {A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {75--86}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.017}, doi = {10.1016/J.JNCA.2018.03.017}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TanHLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Yang0SZ18, author = {Qiang Yang and Wei Li and Jos{\'{e}} Neuman de Souza and Albert Y. Zomaya}, title = {Resilient virtual communication networks using multi-commodity flow based local optimal mapping}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {43--51}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.022}, doi = {10.1016/J.JNCA.2018.02.022}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Yang0SZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.