default search action
Journal of Network and Computer Applications, Volume 76
Volume 76, December 2016
- Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. 1-15 - Laisen Nie, Dingde Jiang, Lei Guo, Shui Yu:
Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks. 16-22 - Nazmus S. Nafi, Khandakar Ahmed, Mark A. Gregory, Manoj Datta:
A survey of smart grid architectures, applications, benefits and standardization. 23-36 - Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. 37-48 - Parisa Goudarzi, Hadi Tabatabaee Malazi, Mahmood Ahmadi:
Khorramshahr: A scalable peer to peer architecture for port warehouse management system. 49-59 - Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, Yuan-Cheng Lai:
High performance traffic classification based on message size sequence and distribution. 60-74 - Ehsan Ahvar, Nafiseh Daneshgar-Moghaddam, Antonio Manuel Ortiz, Gyu Myoung Lee, Noël Crespi:
On analyzing user location discovery methods in smart homes: A taxonomy and survey. 75-86 - Ren-Hung Hwang, Yu-Ling Hsueh, Jang-Jiin Wu, Fu-Hui Huang:
SocialHide: A generic distributed framework for location privacy protection. 87-100 - Divya Saxena, Vaskar Raychoudhury:
N-FIB: Scalable, memory efficient name-based forwarding. 101-109
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.