


default search action
IEEE Network, Volume 23
Volume 23, Number 1, January - February 2009
- Ioanis Nikolaidis:

Risk homeostasis and network security [editor's note]. 2 - Thomas M. Chen, Zhi Fu, Liwen He, Tim Strayer:

Recent developments in network intrusion detection [guest editorial]. 4-5 - Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou:

Network anomaly detection and classification via opportunistic sampling. 6-12 - Benfano Soewito

, Lucas Vespa, Atul Mahajan, Ning Weng, Haibo Wang:
Self-addressable memory-based FSM: a scalable intrusion detection engine. 14-21 - Shashank Shanbhag, Tilman Wolf

:
Accurate anomaly detection through parallelism. 22-28 - Gianni Antichi

, Domenico Ficara, Stefano Giordano, Gregorio Procissi
, Fabio Vitucci:
Counting bloom filters for pattern matching and anti-evasion at the wire speed. 30-35 - André O. Castelucio, Artur Ziviani

, Ronaldo M. Salles
:
An AS-level overlay network for IP traceback. 36-41 - Jiankun Hu

, Xinghuo Yu
, Dong Qiu, Hsiao-Hwa Chen:
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. 42-47
Volume 23, Number 2, March - April 2009
- Ioanis Nikolaidis:

Handover [editor's note]. 2-3 - Aiko Pras, Lambert J. M. Nieuwenhuis

, Remco van de Meent, Michel Mandjes:
Dimensioning network links: a new look at equivalent bandwidth. 5-10 - Piotr Cholda

, János Tapolcai
, Tibor Cinkler, Krzysztof Wajda, Andrzej Jajszczyk
:
Quality of resilience as a network reliability characterization tool. 11-19 - Emir Halepovic, Carey L. Williamson, Majid Ghaderi:

Wireless data traffic: a decade of change. 20-26 - Xiao Zheng, Behçet Sarikaya:

Handover keying and its uses. 27-34 - Dhafer Ben Khedher, Roch H. Glitho

, Rachida Dssouli:
Media handling for multimedia conferencing in multihop cellular networks. 35-42 - Di Ma

, Claudio Soriente
, Gene Tsudik:
New adversary and new threats: security in unattended sensor networks. 43-48
Volume 23, Number 3, May - June 2009
- Chava Vijaya Saradhi, Ashwin Gumaste, Ioannis Tomkos

, Daniel C. Kilper
:
Protocols and algorithms for future cross-layer and hybrid optical networks - [Guest editorial]. 2-3 - Carolina Pinart:

A multilayer fault localization framework for IP over all-optical multilayer networks. 4-9 - Marwan Batayneh, Biswanath Mukherjee, Dominic A. Schupke, Marco Hoffmann, Andreas Kirstädter:

Carrier-grade ethernet: etherpath protection vs. ethertunnel protection. 10-17 - Chongyang Xie, Nasir Ghani, Qing Liu, R. Kouatang, Wei Wennie Shu, Yan Qiao, Min-You Wu, Shuping Peng:

Traffic engineering for ethernet over SONET/SDH: advances and frontiers. 18-25 - Kostas Christodoulopoulos

, Konstantinos Manousakis
, Emmanouel A. Varvarigos
, Marianna Angelou:
Considering physical layer impairments in offline RWA. 26-33 - Nicola Sambo, Nicola Andriolli

, Alessio Giorgetti
, Luca Valcarenghi
, Isabella Cerutti, Piero Castoldi, Filippo Cugini:
GMPLS-controlled dynamic translucent optical networks. 34-40 - Pulak Chowdhury, Biswanath Mukherjee, Suman Sarkar, Glen Kramer, Sudhir S. Dixit:

Hybrid wireless-optical broadband access network(woban) : prototype development and research challenges. 41-48
Volume 23, Number 4, July - August 2009
- Matteo Cesana

, Eylem Ekici
, Yeheskel Bar-Ness:
Networking over multi-hop cognitive networks [Guest Editorial]. 4-5 - Ian F. Akyildiz, Won-Yeol Lee, Kaushik R. Chowdhury

:
Spectrum management in cognitive radio ad hoc networks. 6-12 - Haythem Bany Salameh

, Marwan Krunz:
Channel access protocols for multihop opportunistic networks: challenges and recent developments. 14-19 - Hicham Khalife, Naceur Malouch, Serge Fdida:

Multihop cognitive radio networks: to route or not to route. 20-25 - Alfred Asterjadhi, Nicola Baldo, Michele Zorzi:

A distributed network coded control channel for multihop cognitive radio networks. 26-32 - Özgür B. Akan, O. Karli, Özgür Ergül:

Cognitive radio sensor networks. 34-40
Volume 23, Number 5, September - October 2009
- T. M. Chen:

Future special issues [Editor's note]. 2-3 - Chan-Kyu Han, Hyoung-Kee Choi:

Effective discovery of attacks using entropy of packet dynamics. 4-12 - Hyundo Park, Hyogon Kim, Heejo Lee:

Is early warning of an imminent worm epidemic possible? 14-20 - Ting Liu, Xiaohong Guan, Qinghua Zheng, Yu Qu

:
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. 22-29 - Yang Xiao

:
Flow-net methodology for accountability in wireless networks. 30-37
Volume 23, Number 6, November - December 2009
- T. M. Chen:

Editor's note. 2-3 - Antonio Sánchez-Esguevillas, Belén Carro

, B. Wei, W. Feng:
Guest editorial. 6-7 - Spyridon L. Tompros, Nikolaos P. Mouratidis, M. Draaijer, Andreas Foglar, Halid Hrasnica

:
Enabling applicability of energy saving applications on the appliances of the home environment. 8-16 - Alejandro Fernández-Montes

, Luis González Abril
, Juan Antonio Ortega
, Francisco Velasco Morente
:
A study on saving energy in artificial lighting by making smart use of wireless sensor networks and actuators. 16-20 - Jin-Hwan Jeong, Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Kimyoo-Hyun Park:

Cable-TV-based home video streaming system: practice and experience. 22-28 - Iván Vidal

, Jaime García-Reinoso
, Francisco Valera
, Alex Bikfalvi:
Enabling layered video coding for IMS-based IPTV home services. 30-35 - Javier M. Aguiar, Carlos García, Henar Vega, Álvaro Martínez, Tamara de Vega, Philippe Bouillé, Antoine de Poorter:

Multimedia services interoperability in next-generation networks for the residential environment. 36-42 - Javier M. Aguiar, Carlos Baladrón Zorita

, Borja de la Cuesta Diego, Isabel Ordás Arnal, Patrice Mignot, Gino Carrozzo
, Paolo Comi:
Personal multimedia services over a common home and access networking environment. 43-49 - Rob Brennan

, David Lewis
, John Keeney, Zohar Etzioni, Kevin Feeney, Declan O'Sullivan
, J. Lozano, Brendan Jennings
:
Policy-based integration of multiprovider digital home services. 50-56

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














