default search action
Computer Communications, Volume 42
Volume 42, April 2014
- Robert Mitchell, Ing-Ray Chen:
A survey of intrusion detection in wireless network applications. 1-23
- Konglin Zhu, Wenzhong Li, Xiaoming Fu:
Rethinking routing information in mobile social networks: Location-based or social-based? 24-37 - Nicolas Drouant, Eric Rondeau, Jean-Philippe Georges, Francis Lepage:
Designing green network architectures using the ten commandments for a mature ecosystem. 38-46 - Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Andrés Suárez-González, Manuel Fernández-Veiga, Cándido López-García:
Quantitative end-to-end throughput differentiation for bulk TCP applications in the Internet. 47-59 - Samant Saurabh, Ashok Singh Sairam:
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. 60-69 - Nikolaos Pappas, Anthony Ephremides, Apostolos Traganitis:
Stability and performance issues of a relay assisted multiple access scheme with MPR capabilities. 70-76
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.