Journals in DBLP
Xiaobo Zhou , Cheng-Zhong Xu Distributed denial-of-service and intrusion detection. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:819-822 [Journal ] Shigang Chen , Yong Tang , Wenliang Du Stateful DDoS attacks and targeted filtering. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:823-840 [Journal ] Matthias Bossardt , Thomas Dübendorfer , Bernhard Plattner Enhanced Internet security by a distributed traffic control service based on traffic ownership. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:841-857 [Journal ] Vasilios A. Siris , Ilias Stavrakis Provider-based deterministic packet marking against distributed DoS attacks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:858-876 [Journal ] Tao Peng , Christopher Leckie , Kotagiri Ramamohanarao Information sharing for distributed intrusion detection systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:877-899 [Journal ] Gabriel López Millán , Óscar Cánovas Reverte , Antonio F. Gómez-Skarmeta , Jesús D. Jiménez , Rafael Marín A network access control approach based on the AAA architecture and authorization attributes. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:900-919 [Journal ] Celia Li , Cungang Yang , Richard Cheung Key management for role hierarchy in distributed systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:920-936 [Journal ] Bing Wu , Jie Wu , Eduardo B. Fernández , Mohammad Ilyas , Spyros S. Magliveras Secure and efficient key management in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:937-954 [Journal ] George D. Magoulas , George Ghinea Intelligence-based adaptation for ubiquitous multimedia communications. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:955-957 [Journal ] Dietmar Jannach , Klaus Leopold Knowledge-based multimedia adaptation for ubiquitous multimedia consumption. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:958-982 [Journal ] Nicola Cranley , Philip Perry , Liam Murphy Dynamic content-based adaptation of streamed multimedia. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:983-1006 [Journal ] Michael J. O'Grady , Gregory M. P. O'Hare , C. Donaghey Delivering adaptivity through context-awareness. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1007-1033 [Journal ] Vincent Charvillat , Romulus Grigoras Reinforcement learning for dynamic multimedia adaptation. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1034-1058 [Journal ] Johan Bollen , Michael L. Nelson , Gary Geisler , Raquel Araujo Usage derived recommendations for a video digital library. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1059-1083 [Journal ] Gloria E. Phillips-Wren , Anders I. Mørch , Jeffrey Tweedale , Nikhil Ichalkaranje Innovations in agent collaboration, cooperation and Teaming, Part 2. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1085-1088 [Journal ] Jeffrey Tweedale , Nikhil Ichalkaranje , Christos Sioutis , B. Jarvis , Angela Consoli , Gloria E. Phillips-Wren Innovations in multi-agent systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1089-1115 [Journal ] Lin Padgham , Wei Liu Internet collaboration and service composition as a loose form of teamwork. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1116-1135 [Journal ] Antonella Di Stefano , Giuseppe Pappalardo , Corrado Santoro , Emiliano Tramontana A framework for the design and automated implementation of communication aspects in multi-agent systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1136-1152 [Journal ] Wei Xu , Jiannong Cao , Beihong Jin , Jing Li , Liang Zhang GCS-MA: A group communication system for mobile agents. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1153-1172 [Journal ] Tom Wanyama , Behrouz Homayoun Far A protocol for multi-agent negotiation in a group-choice decision making process. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1173-1195 [Journal ] Gerhard Weiß , Matthias Nickles , Michael Rovatsos , Felix Fischer Specifying the intertwining of cooperation and autonomy in agent-based systems. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1196-1215 [Journal ] Justin Zhan , Stan Matwin , LiWu Chang Privacy-preserving collaborative association rule mining. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1216-1227 [Journal ] Abdelhamid Ouardani , Samuel Pierre , Hanifa Boucheneb A security protocol for mobile agents based upon the cooperation of sedentary agents. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1228-1243 [Journal ] Ruth Aguilar-Ponce , Ashok Kumar , J. Luis Tecpanecatl-Xihuitl , Magdy Bayoumi A network of sensor-based framework for automated visual surveillance. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2007, v:30, n:3, pp:1244-1271 [Journal ]