Journals in DBLP
Ajith Abraham , Kate A. Smith , Ravi Jain , Lakhmi C. Jain Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:1-3 [Journal ] Feng-Hsing Wang , Lakhmi C. Jain , Jeng-Shyang Pan VQ-based watermarking scheme with genetic codebook partition. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:4-23 [Journal ] Tai-Wen Yue , Suchen Chiang The semipublic encryption for visual cryptography using Q'tron neural networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:24-41 [Journal ] Gail-Joon Ahn , Badrinath Mohan , Seng-Phil Hong Towards secure information sharing using role-based delegation. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:42-59 [Journal ] Yihua Liao , V. Rao Vemuri , Alejandro Pasos Adaptive anomaly detection with evolving connectionist systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:60-80 [Journal ] Ajith Abraham , Ravi Jain , Johnson Thomas , Sang-Yong Han D-SCIDS: Distributed soft computing intrusion detection system. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:81-98 [Journal ] Tansel Özyer , Reda Alhajj , Ken Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:99-113 [Journal ] Sandhya Peddabachigari , Ajith Abraham , Crina Grosan , Johnson P. Thomas Modeling intrusion detection system using hybrid intelligent systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:114-132 [Journal ] Ali El Kateeb High-speed routers design using data stream distributor unit. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:133-144 [Journal ] Hongsong Chen , Zhenzhou Ji , Mingzeng Hu , Fu Zhongchuan , Jiang Ruixiang Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:145-166 [Journal ] Khong Neng Choong , B. M. Ali , V. Prakash , Yoke Chek Yee The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:167-185 [Journal ] Hojjat Jafarpour , Nasser Yazdani , Navid Bazzaz-zadeh A scalable group communication mechanism for mobile agents. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:186-208 [Journal ] Vana Kalogeraki , Demetrios Zeinalipour-Yazti , Dimitrios Gunopulos , Alex Delis Distributed middleware architectures for scalable media services. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:209-243 [Journal ] Tainchi Lu , Chinghao Hsu Mobile agents for information retrieval in hybrid simulation environment. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:244-264 [Journal ] Hui Guo , Guobin Shen , Zhiguang Wang , Shipeng Li Optimized streaming media proxy and its applications. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:265-281 [Journal ] Lei Guo , Hongfang Yu , Lemin Li Dynamic survivable algorithm for meshed WDM optical networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:282-295 [Journal ] Jenq-Shiou Leu , Yuan-Po Chi , Wei-Kuan Shih Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS). [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:296-307 [Journal ] Lijun Qian , Ning Song , Xiangfang Li Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:308-330 [Journal ] Kwang-Sik Shin , Jin-Ha Jung , Jin Young Cheon , Sang-Bang Choi Real-time network monitoring scheme based on SNMP for dynamic information. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:331-353 [Journal ] Xiaobo Zhou , Jianbin Wei , Cheng-Zhong Xu Quality-of-service differentiation on the Internet: A taxonomy. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:354-383 [Journal ] Suneuy Kim , Chita R. Das An analytical model for interval caching in interactive video servers. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:384-413 [Journal ] Mohammad Saniee Abadeh , Jafar Habibi , C. Lucas Intrusion detection using a fuzzy genetics-based learning algorithm. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:1, pp:414-428 [Journal ]