default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2024
- Muhammad Tahir Abbas, Karl-Johan Grinnemo, Guillaume Ferré, Philippe Laurent, Stefan Alfredsson, Mohammad Rajiullah, Johan Eklund:
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things. J. Netw. Comput. Appl. 230: 103945 (2024) - Sulyman Age Abdulkareem, Chuan Heng Foh, François Carrez, Klaus Moessner:
A lightweight SEL for attack detection in IoT/IIoT networks. J. Netw. Comput. Appl. 230: 103980 (2024) - Muhammad Abdullah, Humayun Zubair Khan, Umair Fakhar, Ahmad Naeem Akhtar, Shuja Ansari:
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks. J. Netw. Comput. Appl. 230: 103966 (2024) - Zainab Hassan Ali, Nora El-Rashidy, Mostafa A. Elhosseini, Sarah M. Ayyad:
SDN-based reliable emergency message routing schema using Digital Twins for adjusting beacon transmission in VANET. J. Netw. Comput. Appl. 230: 103944 (2024) - Ala Altaweel, Sidra Aslam, Ibrahim Kamel:
JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks. J. Netw. Comput. Appl. 230: 103953 (2024) - Emna Baccour, Aiman Erbad, Amr Mohamed, Mounir Hamdi, Mohsen Guizani:
Multi-agent reinforcement learning for privacy-aware distributed CNN in heterogeneous IoT surveillance systems. J. Netw. Comput. Appl. 230: 103933 (2024) - Lázaro Bustio-Martínez, Vitali Herrera-Semenets, Juan-Luis García-Mendoza, Miguel Ángel Álvarez-Carmona, Jorge Ángel González Ordiano, Luis N. Zúñiga-Morales, José Emilio Quíroz-Ibarra, Pedro Antonio Santander-Molina, Jan van den Berg:
Uncovering phishing attacks using principles of persuasion analysis. J. Netw. Comput. Appl. 230: 103964 (2024) - Guangchen Chen, Benjie Shi, Yinhui Zhang, Zifen He, Pengcheng Zhang:
CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake. J. Netw. Comput. Appl. 230: 103974 (2024) - El-hacen Diallo, Mohameden Dieye, Omar Dib, Pierre Valiorgue:
An agnostic and secure interoperability protocol for seamless asset movement. J. Netw. Comput. Appl. 230: 103930 (2024) - Quang Tuan Do, Duc Thien Hua, Anh-Tien Tran, Dongwook Won, Geeranuch Woraphonbenjakul, Wonjong Noh, Sungrae Cho:
Multi-UAV aided energy-aware transmissions in mmWave communication network: Action-branching QMIX network. J. Netw. Comput. Appl. 230: 103948 (2024) - Riya Goyal, Abhinav Tomar:
Dynamic Charging Scheduling and Path Planning Scheme for Multiple MC-enabled On-demand Wireless Rechargeable Sensor Networks. J. Netw. Comput. Appl. 230: 103943 (2024) - Diana Hawashin, Mohamed Nemer, Senay A. Gebreab, Khaled Salah, Raja Jayaraman, Muhammad Khurram Khan, Ernesto Damiani:
Blockchain applications in UAV industry: Review, opportunities, and challenges. J. Netw. Comput. Appl. 230: 103932 (2024) - Rikhi Ram Jagat, Dilip Singh Sisodia, Pradeep Singh:
Exploiting web content semantic features to detect web robots from weblogs. J. Netw. Comput. Appl. 230: 103975 (2024) - Sekione Reward Jeremiah, Haotian Chen, Stefanos Gritzalis, Jong Hyuk Park:
Leveraging application permissions and network traffic attributes for Android ransomware detection. J. Netw. Comput. Appl. 230: 103950 (2024) - Jong Wook Kim, Beakcheol Jang:
Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey. J. Netw. Comput. Appl. 230: 103951 (2024) - Orlando Landrove, Rufino Cabrera, Eneko Iradier, Erick Jimenez, Pablo Angueira, Jon Montalban:
Broadcast/multicast delivery integration in B5G/6G environments. J. Netw. Comput. Appl. 230: 103934 (2024) - Yue Li, Yingjian Liu, Haoyu Yin, Zhongwen Guo, Yu Wang:
RECAR: Robust and efficient collision-avoiding routing for 3D underwater named data networking. J. Netw. Comput. Appl. 230: 103940 (2024) - Man Li, Huachun Zhou, Shuangxing Deng:
Parallel path selection mechanism for DDoS attack detection. J. Netw. Comput. Appl. 230: 103938 (2024) - Yingze Liu, Yuanbo Guo:
CL-AP2: A composite learning approach to attack prediction via attack portraying. J. Netw. Comput. Appl. 230: 103963 (2024) - Yakoub Mordjana, Badis Djamaa, Mustapha Réda Senouci, Aymen Herzallah:
A Contextual Multi-Armed Bandit approach for NDN forwarding. J. Netw. Comput. Appl. 230: 103952 (2024) - Noureddine Mouhoub, Maria Moloney, Damien Magoni:
Metarouting with automatic tunneling in multilayer networks. J. Netw. Comput. Appl. 230: 103929 (2024) - K. G. Raghavendra Narayan, Rakesh Ganesula, Tamminaina Sai Somasekhar, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Alavalapati Goutham Reddy:
Attenuating majority attack class bias using hybrid deep learning based IDS framework. J. Netw. Comput. Appl. 230: 103954 (2024) - B. Padmavathi, Vanaja Selvaraj:
Advanced optimization-based weighted features for ensemble deep learning smart occupancy detection network for road traffic parking. J. Netw. Comput. Appl. 230: 103924 (2024) - Mohand Yazid Saidi, Issam Abdeldjalil Ikhelef, Shuopeng Li, Ken Chen:
Constrained routing in multi-partite graph to solve VNF placement and chaining problem. J. Netw. Comput. Appl. 230: 103931 (2024) - Seyedeh Soheila Shaabanzadeh, Marc Carrascosa-Zamacois, Juan Sánchez-González, Costas Michaelides, Boris Bellalta:
Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques. J. Netw. Comput. Appl. 230: 103939 (2024) - Libin Yang, Wei Lou:
On designing a profitable system model to harmonize the tripartite dissension in content delivery applications. J. Netw. Comput. Appl. 230: 103965 (2024) - Namkyung Yoon, Hwangnam Kim:
Detecting DDoS based on attention mechanism for Software-Defined Networks. J. Netw. Comput. Appl. 230: 103928 (2024)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-23 20:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint