首页
OALib 期刊
OALib 预印
快速投稿通道
排名
新闻
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
Journal of Networks
ISSN Print: 1796-2056
ISSN Online:
主页:
http://www.academypublisher.com/jnw/
分享:
Go
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games
Wei Yuan
,
Liang Hu
,
Hongtu Li
,
Jianfeng Chu
On the Validity of Fluid-dynamic Models for Data Networks
Ciro D'Apice
,
Rosanna Manzo
,
Benedetto Piccoli
FRPWPS: A Filter Driver and Reverse Proxy Based Web Protection System
Qian He
,
Yong Wang
,
Bang Zhao
,
Linlin Yao
An Improved Localization Algorithm for Wireless Sensor Network Based on the Selection of Benchmark Anchor Node
Xiaohui Chen
,
Jinpeng Chen
,
Jing He
,
Bangjun Lei
Based on combination of L2TP and IPSec VPN security technology research
Ya-qin Fan
,
Chi Li
,
Chao Sun
Design and Analysis on Error Handing and Controlling Protocol in Mobile Payment
Yong Xu
,
Tingting YAN
An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game
Zhuoqun Xia
,
Zhigang Chen
,
Xiaoheng Deng
,
Ming Zhao
Delay-Constrained Admission and Bandwidth Allocation for Long-Reach EPON
Burak Kantarci
,
Hussein T. Mouftah
The Impact of Comments and Recommendation System on Online Shopper Buying Behaviour
Hui Chen
Traffic Driven Epidemic Spreading in Homogeneous Networks with Community Structure
Fei Shao
,
GuoPing Jiang
A Research on HCCA Mechanism of Wireless LAN Access
Hua Liang
,
Feng Zeng
Efficient Satellite Scheduling Based on Improved Vector Evaluated Genetic Algorithm
Tengyue Mao
,
Zhengquan Xu
,
Rui Hou
,
Min Peng
Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System
Yang Lu
Adaptive Data Rates for Flexible Transceivers in Optical Networks
Brian Thomas Teipen
,
Michael H. Eiselt
,
Klaus Grobe
,
J?rg-Peter Elbers
Dynamic Communication Performance Enhancement in Hierarchical Torus Network by Selection Algorithm
MM Hafizur Rahman
,
Yukinori Sato
,
Yasushi Inoguchi
Fake BTS Attacks of GSM System on Software Radio Platform
Yubo Song
,
Kan Zhou
,
Xi Chen
An Improved Localization Algorithm of Nodes in Wireless Sensor Network
Xiaohui Chen
,
Jing He
,
Bangjun Lei
,
Tingyao Jiang
Lower Bounds of Differential and Linear Active S-boxes for Generalized Feistel Network with SP Type F-function
Ting Cui
,
Chenhui Jin
Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware–based Architecture
Guoqiong Liao
Capacity of 60 GHz Wireless Communication Systems over Fading Channels
Jingjing Wang
,
Hao Zhang
,
Tingting Lv
,
T. Aaron Gulliver
Intelligent Storage and Retrieval Systems Based on RFID and Vision in Automated Warehouse
Yinghua Xue
,
Hongpeng Liu
Study on Airspace Covert Communication Algorithm of Covert Communication System
Yinpu Zhang
Application of Rank Correlation, Clustering and Classification in Information Security
Gleb Beliakov
,
John Yearwood
,
Andrei Kelarev
Virtualization in Wireless Sensor Network: Challenges and Opportunities
Md. Motaharul Islam
,
Eui-Nam Huh
Identifying Microphone from Noisy Recordings by Using Representative Instance One Class-Classification Approach
Huy Quan Vu
,
Shaowu Liu
,
Xinghua Yang
,
Zhi Li
Bounded Length Least-Cost Path Estimation in Wireless Sensor Networks Using Petri Nets
Lingxi Li
,
Dongsoo Stephen Kim
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach
Yaser Khamayseh
,
Ruba Al-Salah
,
Muneer Bani Yassein
Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace
Jianwen Sun
,
Zongkai Yang
,
Sanya Liu
,
Pei Wang
A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks
Peng Xiao
,
Jingsha He
,
Yingfang Fu
Heuristic Approaches for Periodic Reconfiguration of Lightpath-based Networks under Multi-hour Traffic
Ramon Aparicio-Pardo
,
Belen Garcia-Manrubia
,
Nina Skorin-Kapov
,
Pablo Pavon-Marino
Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks
Yingying Qin
,
Rongbo Zhu
A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment
Nan Feng
,
Jing Xie
A Distributed Trust Evaluation Model for Mobile P2P Systems
Xu Wu
A New RFID Tag Code Transformation Approach in Internet of Things
Yulong Huang
,
Zhihao Chen
,
Jianqing Xi
A New Control Structure Model Based on Object-oriented Petri Nets
Yan-pei Liu
,
Yuesheng Gu
,
Jun Chen
High Performance Hierarchical Torus Network Under Adverse Traffic Patterns
MM Hafizur Rahman
,
Yukinori Sato
,
Yasushi Inoguchi
Effect of Polarization Mode Dispersion on the BER Performance of Optical CDMA
Md. Jahedul Islam
,
Md. Rafiqul Islam
The Design and Implementation of Single Sign-on Based on Hybrid Architecture
Zhigang Liang
,
Yuhai Chen
An Access Control Model based on Multi-factors Trust
Shunan Ma
,
Jingsha He
,
Feng Gao
A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking
Haibo li
,
Yang Li
,
Zhijun Zhao
,
Tao Lin
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model
Alireza Shameli Sendi
,
Michel Dagenais
,
Masoume Jabbarifar
,
Mario Couture
Cost and Efficiency Analysis of NEMO Protocol Entities
Md Shohrab Hossain
,
Mohammed Atiquzzaman
,
William D. Ivancic
RobotDroid: A Lightweight Malware Detection Framework On Smartphones
Min Zhao
,
Tao Zhang
,
Fangbin Ge
,
Zhijian Yuan
Performance Analysis of a Novel LBS Application Using MBMS&TPEG in 3G Mobile Networks
Lu Lou
,
Xin Xu
,
Zhili Chen
Target Tracking Approximation Algorithms with Particle Filter Optimization and Fault-Tolerant Analysis in Wireless Sensor Networks
Xiang Gao
,
Yintang Yang
,
Duan Zhou
,
Jianxian Zhang
Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network
Jun Lei
,
XingHua Yang
,
YinLong Liu
,
YiFang Qin
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods
Rafiqul Islam
,
Ronghua Tian
,
Veelasha Moonsamy
,
Lynn M Batten
A Highly Flexible LDPC Decoder using Hierarchical Quasi-Cyclic Matrix with Layered Permutation
Vikram Arkalgud Chandrasetty
,
Syed Mahfuzul Aziz
Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving
Hongzeng He
,
Jingbo Sun
,
Yue Wang
,
Qi Liu
An Optimization Technique for Improved VoIP Performance over Wireless LAN
Tamal Chakraborty
,
Atri Mukhopadhyay
,
Suman Bhunia
,
Iti Saha Misra
Go