


default search action
Journal of Network and Systems Management, Volume 12
Volume 12, Number 1, March 2004
- John Hale, Paul Brusil:
Secur(e/ity) Management: Two Sides of the Same Coin. 1-8
- Andreas Pashalidis, Martin Fleury:
Secure Network Management within an Open-source Mobile Agent Framework. 9-31 - Mohamed Eltoweissy, Mohammad Hossain Heydari, Linda Morales, Ivan Hal Sudborough:
Combinatorial Optimization of Group Key Management. 33-50 - Jun Jiang, Symeon Papavassiliou:
Detecting Network Attacks in the Internet via Statistical Network Traffic Normality Prediction. 51-72 - Georgios Koutepas, Fotis Stamatelopoulos, Basil S. Maglaris
:
Distributed Management Architecture for Cooperative Detection and Reaction to DDOS Attacks. 73-94 - Donald G. Marks, Peter Mell, Michael Stinson:
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents. 95-110 - Udaya Kiran Tupakula, Vijay Varadharajan:
Tracing DoS Floods: An Automated Approach. 111-135
- Diana Kelley:
Security Management Convergence via SIM (Security Information Management) - a Requirements Perspective. 137-144
Volume 12, Number 2, June 2004
- Nelson L. S. da Fonseca
, Sergio A. Yunes:
On the Need for Frame Discarding in Cell-Switched Networks. 147-154
- David Thaler, Chinya V. Ravishankar
:
An Architecture for Inter-Domain Troubleshooting. 155-189 - Aldri L. dos Santos
, Elias P. Duarte Jr., Glenn Mansfield Keeni:
Reliable Distributed Network Management by Replication. 191-213 - Kenichi Tayama, Takashi Inoue, Tsutomu Maruyama, Hiroshi Uno:
An Operation Support System Architecture and Process for Optical Access Network Allocation during Service Provisioning. 215-230 - Dongfang Zheng, Xian Liu, Mrinal Mandal, Weidong Lu:
Virtual Path Optimization in Connection-Oriented Networks with Stochastic Traffic. 231-249 - Indrajit Ray, Sonja Tideman:
A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack. 251-276
Volume 12, Number 3, September 2004
Thresholds
- Lawrence Bernstein:
Outsourcing while making Distributed Network Management Work. 287-292
- Ajita John, Burkhard Stiller:
Distributed Management of Networks. 293-295
- Prashant Rajvaidya, Krishna N. Ramachandran, Kevin C. Almeroth:
Managing and Securing the Global Multicast Infrastructure. 297-326 - Kamil Saraç, Kevin C. Almeroth:
A Distributed Approach for Monitoring Multicast Service Availability. 327-348 - Maurizio D'Arienzo
, Antonio Pescapè, Giorgio Ventre:
Dynamic Service Management in Heterogeneous Networks. 349-370 - Vasilios Darlagiannis, Andreas Mauthe
, Ralf Steinmetz
:
Overlay Design Mechanisms for Heterogeneous Large-Scale Dynamic P2P Systems. 371-395 - Solange Rito Lima
, Paulo Carvalho
, Vasco Freitas:
Distributed Admission Control for QoS and SLS Management. 397-426
Volume 12, Number 4, December 2004
- Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li:
Workflow Oriented Network Management - A Web/Java Approach. 431-439
- Manuel Pessoa, Antonio Alves, Gonçalo Quadros, Fernando Boavida
, Michael Henke, Milva Natcheva, Patrick Halke, Peter Maurutschek, Zenon Huskic, Kurt Wagner, Frank Zeppenfeldt, Roberto Donadio:
PROQOS - Dynamic SLA Management in DiffServ Space Links. 441-461 - Christos Bouras, Apostolos Gkamas
, Dimitris Primpas, Kostas Stamos
:
Performance Evaluation of the impact of QoS mechanisms in an IPv6 network for IPv6-capable real time applications. 463-483 - Eun Kyoung Paik, Ho-sik Cho, Yanghee Choi:
Mobility-Aware Mobile Router Selection and Address Management for IPv6 Network Mobility. 485-505 - Yi Zhang, Yong Zhang, Weinong Wang:
Modeling and Analyzing of Workflow Authorization Management. 507-535 - Evi Tsolakou, Eugenia G. Nikolouzou, Sotiris Maniatis, Iakovos S. Venieris:
Definition and Performance Evaluation of Network Services Deployed over a Differentiated Services Network. 537-565

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.