Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS
Topic C.2.3 - Network Operations

L. Borzemski:
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
/jucs_13_2/internet_path_behavior_prediction
page 287 - 316
Vol.13 / Issue 2
J. Buford:
Telecommunication Services and Service Management Challenges
/jucs_7_5/telecommunication_services_and_service
page 355 - 365
Vol.7 / Issue 5
C.-L. Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
/jucs_15_2/a_new_detection_method
page 488 - 504
Vol.15 / Issue 2
G. Chmaj, K. Walkowiak:
Decision Strategies for a P2P Computing System
/jucs_18_5/decision_strategies_for_a
page 599 - 622
Vol.18 / Issue 5
D. Collange, J.-L. Costeux:
Passive Estimation of Quality of Experience
/jucs_14_5/passive_estimation_of_quality
page 625 - 641
Vol.14 / Issue 5
T. Forzi, M. Peters:
A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks
/jucs_11_4/a_methodology_and_a
page 495 - 525
Vol.11 / Issue 4
D. Won-Kyu Hong, C. Seon Hong, Y. Jae Hyoung, D.-S. Yun, W.-S. Kim:
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
/jucs_8_7/bounded_flooding_routing_algorithm
page 698 - 721
Vol.8 / Issue 7
Y.-L. Huang, F.-Y. Leu, C.-H. Chiu, I.-L. Lin:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
/jucs_17_6/improving_security_levels_of
page 891 - 911
Vol.17 / Issue 6
N. Labraoui, M. Gueroui, M. Aliouat, J. Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
/jucs_17_11/rahim_robust_adaptive_approach
page 1550 - 1571
Vol.17 / Issue 11
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
/jucs_14_7/a_knowledge_discovery_agent
page 1105 - 1117
Vol.14 / Issue 7
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
/jucs_18_6/countermeasures_to_prevent_misbehaviour
page 857 - 873
Vol.18 / Issue 6
T. Peng, Q. Zheng, Y. Jin:
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming
/jucs_15_9/transmission_latency_based_network
page 2011 - 2025
Vol.15 / Issue 9
L. Polčák, B. Franková:
Clock-Skew-Based Computer Identification: Traps and Pitfalls
/jucs_21_9/clock_skew_based_computer
page 1210 - 1233
Vol.21 / Issue 9
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
/jucs_16_10/cross_layer_optimization_for
page 1343 - 1367
Vol.16 / Issue 10
J. Tonejc, S. Güttes, A. Kobekova, J. Kaur:
Machine Learning Methods for Anomaly Detection in BACnet Networks
/jucs_22_9/machine_learning_methods_for
page 1203 - 1224
Vol.22 / Issue 9
D. Vega, R. Meseguer, F. Freitag, S.F. Ochoa:
Understanding Collaboration in Volunteer Computing Systems
/jucs_20_13/understanding_collaboration_in_volunteer
page 1738 - 1765
Vol.20 / Issue 13
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
/jucs_22_4/feature_selection_for_black
page 521 - 536
Vol.22 / Issue 4

Editors:
Müller Günter