no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
|
Boutaba, Raouf |
|
2018 |
9 |
1 |
p. 1-99 |
article |
2 |
A controller design for mitigation of passive system identification attacks in networked control systems
|
de Sá, Alan O. |
|
2018 |
9 |
1 |
p. 1-19 |
article |
3 |
A framework for searching encrypted databases
|
M. R. Alves, Pedro G. |
|
2018 |
9 |
1 |
p. 1-18 |
article |
4 |
A new approach to deploy a self-adaptive distributed firewall
|
da Costa Júnior, Edmilson P. |
|
2018 |
9 |
1 |
p. 1-21 |
article |
5 |
A user-driven free speech application for anonymous and verified online, public group discourse
|
Nekrasov, Michael |
|
2018 |
9 |
1 |
p. 1-23 |
article |
6 |
BROAD-RSI – educational recommender system using social networks interactions and linked data
|
Pereira, Crystiam Kelle |
|
2018 |
9 |
1 |
p. 1-28 |
article |
7 |
B-space: dynamic management and assurance of open systems of systems
|
Schneider, Daniel |
|
2018 |
9 |
1 |
p. 1-16 |
article |
8 |
Conflict-free rerouting scheme through flow splitting for virtual networks using switches
|
Tchendji, Vianney Kengne |
|
2018 |
9 |
1 |
p. 1-15 |
article |
9 |
Environment for integration of distributed heterogeneous computing systems
|
Silva, Thiago W. B. |
|
2018 |
9 |
1 |
p. 1-17 |
article |
10 |
EZ-AG: structure-free data aggregation in MANETs using push-assisted self-repelling random walks
|
Kulathumani, V. |
|
2018 |
9 |
1 |
p. 1-14 |
article |
11 |
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges
|
Velasquez, Karima |
|
2018 |
9 |
1 |
p. 1-23 |
article |
12 |
Graph mining for the detection of overcrowding and waste of resources in public transport
|
Caminha, Carlos |
|
2018 |
9 |
1 |
p. 1-11 |
article |
13 |
High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach
|
Lucchesi, Alexandre |
|
2018 |
9 |
1 |
p. 1-18 |
article |
14 |
Insights on the large-scale deployment of a curated Web-of-Trust: the Debian project’s cryptographic keyring
|
Wolf, Gunnar |
|
2018 |
9 |
1 |
p. 1-12 |
article |
15 |
Is it possible to describe television series from online comments?
|
Loures, Túlio C. |
|
2018 |
9 |
1 |
p. 1-17 |
article |
16 |
Metrics for network power based on Castells’ Network Theory of Power: a case study on Brazilian elections
|
Verona, Letícia |
|
2018 |
9 |
1 |
p. 1-16 |
article |
17 |
Networking architectures and protocols for smart city systems
|
Jawhar, Imad |
|
2018 |
9 |
1 |
p. 1-16 |
article |
18 |
Organizing for openness: six models for developer involvement in hybrid OSS projects
|
Mäenpää, Hanna |
|
2018 |
9 |
1 |
p. 1-14 |
article |
19 |
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces
|
Hooshmand, Salman |
|
2018 |
9 |
1 |
p. 1-27 |
article |
20 |
Security and privacy aware data aggregation on cloud computing
|
Silva, Leandro V. |
|
2018 |
9 |
1 |
p. 1-13 |
article |
21 |
Self-adaptive authorisation in OpenStack cloud platform
|
Da Silva, Carlos Eduardo |
|
2018 |
9 |
1 |
p. 1-17 |
article |
22 |
Support mechanisms provided by FLOSS foundations and other entities
|
Lindman, Juho |
|
2018 |
9 |
1 |
p. 1-12 |
article |
23 |
The computer for the 21st century: present security & privacy challenges
|
Oliveira, Leonardo B. |
|
2018 |
9 |
1 |
p. 1-25 |
article |
24 |
Thematic series on Verification and Composition for the Internet of Services and Things
|
Autili, Marco |
|
2018 |
9 |
1 |
p. 1-3 |
article |
25 |
Using sentiment analysis to define twitter political users’ classes and their homophily during the 2016 American presidential election
|
Caetano, Josemar A. |
|
2018 |
9 |
1 |
p. 1-15 |
article |
26 |
Who is really in my social circle?
|
Leão, Jeancarlo C. |
|
2018 |
9 |
1 |
p. 1-17 |
article |