Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2.3 - Network Operations

L. Borzemski:
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
page 287 - 316
Vol.13 / Issue 2
J. Buford:
Telecommunication Services and Service Management Challenges
page 355 - 365
Vol.7 / Issue 5
C.-L. Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
page 488 - 504
Vol.15 / Issue 2
G. Chmaj, K. Walkowiak:
Decision Strategies for a P2P Computing System
page 599 - 622
Vol.18 / Issue 5
D. Collange, J.-L. Costeux:
Passive Estimation of Quality of Experience
page 625 - 641
Vol.14 / Issue 5
T. Forzi, M. Peters:
A Methodology and a Toolkit that Integrate Technological, Organisational, and Human Factors to Design KM within Knowledge-Intensive Networks
page 495 - 525
Vol.11 / Issue 4
D. Won-Kyu Hong, C. Seon Hong, Y. Jae Hyoung, D.-S. Yun, W.-S. Kim:
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
page 698 - 721
Vol.8 / Issue 7
Y.-L. Huang, F.-Y. Leu, C.-H. Chiu, I.-L. Lin:
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
page 891 - 911
Vol.17 / Issue 6
N. Labraoui, M. Gueroui, M. Aliouat, J. Petit:
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
page 1550 - 1571
Vol.17 / Issue 11
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
page 1105 - 1117
Vol.14 / Issue 7
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
page 857 - 873
Vol.18 / Issue 6
T. Peng, Q. Zheng, Y. Jin:
Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming
page 2011 - 2025
Vol.15 / Issue 9
L. Polčák, B. Franková:
Clock-Skew-Based Computer Identification: Traps and Pitfalls
page 1210 - 1233
Vol.21 / Issue 9
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
page 1605 - 1622
Vol.17 / Issue 11
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
page 1343 - 1367
Vol.16 / Issue 10
J. Tonejc, S. Güttes, A. Kobekova, J. Kaur:
Machine Learning Methods for Anomaly Detection in BACnet Networks
page 1203 - 1224
Vol.22 / Issue 9
D. Vega, R. Meseguer, F. Freitag, S.F. Ochoa:
Understanding Collaboration in Volunteer Computing Systems
page 1738 - 1765
Vol.20 / Issue 13
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
page 521 - 536
Vol.22 / Issue 4

Müller Günter