


default search action
IEEE Network, Volume 23
Volume 23, Number 1, January - February 2009
- Ioanis Nikolaidis:
Risk homeostasis and network security [editor's note]. 2 - Thomas M. Chen, Zhi Fu, Liwen He, Tim Strayer:
Recent developments in network intrusion detection [guest editorial]. 4-5 - Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou:
Network anomaly detection and classification via opportunistic sampling. 6-12 - Benfano Soewito
, Lucas Vespa, Atul Mahajan, Ning Weng, Haibo Wang:
Self-addressable memory-based FSM: a scalable intrusion detection engine. 14-21 - Shashank Shanbhag, Tilman Wolf
:
Accurate anomaly detection through parallelism. 22-28 - Gianni Antichi
, Domenico Ficara, Stefano Giordano, Gregorio Procissi
, Fabio Vitucci:
Counting bloom filters for pattern matching and anti-evasion at the wire speed. 30-35 - André O. Castelucio, Artur Ziviani
, Ronaldo M. Salles
:
An AS-level overlay network for IP traceback. 36-41 - Jiankun Hu
, Xinghuo Yu
, Dong Qiu, Hsiao-Hwa Chen:
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. 42-47
Volume 23, Number 2, March - April 2009
- Ioanis Nikolaidis:
Handover [editor's note]. 2-3 - Aiko Pras, Lambert J. M. Nieuwenhuis
, Remco van de Meent, Michel Mandjes:
Dimensioning network links: a new look at equivalent bandwidth. 5-10 - Piotr Cholda
, János Tapolcai
, Tibor Cinkler, Krzysztof Wajda, Andrzej Jajszczyk
:
Quality of resilience as a network reliability characterization tool. 11-19 - Emir Halepovic, Carey L. Williamson, Majid Ghaderi:
Wireless data traffic: a decade of change. 20-26 - Xiao Zheng, Behçet Sarikaya:
Handover keying and its uses. 27-34 - Dhafer Ben Khedher, Roch H. Glitho
, Rachida Dssouli:
Media handling for multimedia conferencing in multihop cellular networks. 35-42 - Di Ma
, Claudio Soriente
, Gene Tsudik:
New adversary and new threats: security in unattended sensor networks. 43-48
Volume 23, Number 3, May - June 2009
- Chava Vijaya Saradhi, Ashwin Gumaste, Ioannis Tomkos
, Daniel C. Kilper
:
Protocols and algorithms for future cross-layer and hybrid optical networks - [Guest editorial]. 2-3 - Carolina Pinart:
A multilayer fault localization framework for IP over all-optical multilayer networks. 4-9 - Marwan Batayneh, Biswanath Mukherjee, Dominic A. Schupke, Marco Hoffmann, Andreas Kirstädter:
Carrier-grade ethernet: etherpath protection vs. ethertunnel protection. 10-17 - Chongyang Xie, Nasir Ghani, Qing Liu, R. Kouatang, Wei Wennie Shu, Yan Qiao, Min-You Wu, Shuping Peng:
Traffic engineering for ethernet over SONET/SDH: advances and frontiers. 18-25 - Kostas Christodoulopoulos
, Konstantinos Manousakis
, Emmanouel A. Varvarigos
, Marianna Angelou:
Considering physical layer impairments in offline RWA. 26-33 - Nicola Sambo, Nicola Andriolli
, Alessio Giorgetti
, Luca Valcarenghi
, Isabella Cerutti, Piero Castoldi, Filippo Cugini:
GMPLS-controlled dynamic translucent optical networks. 34-40 - Pulak Chowdhury, Biswanath Mukherjee, Suman Sarkar, Glen Kramer, Sudhir S. Dixit:
Hybrid wireless-optical broadband access network(woban) : prototype development and research challenges. 41-48
Volume 23, Number 4, July - August 2009
- Matteo Cesana
, Eylem Ekici
, Yeheskel Bar-Ness:
Networking over multi-hop cognitive networks [Guest Editorial]. 4-5 - Ian F. Akyildiz, Won-Yeol Lee, Kaushik R. Chowdhury
:
Spectrum management in cognitive radio ad hoc networks. 6-12 - Haythem Bany Salameh
, Marwan Krunz:
Channel access protocols for multihop opportunistic networks: challenges and recent developments. 14-19 - Hicham Khalife, Naceur Malouch, Serge Fdida:
Multihop cognitive radio networks: to route or not to route. 20-25 - Alfred Asterjadhi, Nicola Baldo, Michele Zorzi:
A distributed network coded control channel for multihop cognitive radio networks. 26-32 - Özgür B. Akan, O. Karli, Özgür Ergül:
Cognitive radio sensor networks. 34-40
Volume 23, Number 5, September - October 2009
- T. M. Chen:
Future special issues [Editor's note]. 2-3 - Chan-Kyu Han, Hyoung-Kee Choi:
Effective discovery of attacks using entropy of packet dynamics. 4-12 - Hyundo Park, Hyogon Kim, Heejo Lee:
Is early warning of an imminent worm epidemic possible? 14-20 - Ting Liu, Xiaohong Guan, Qinghua Zheng, Yu Qu
:
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. 22-29 - Yang Xiao
:
Flow-net methodology for accountability in wireless networks. 30-37
Volume 23, Number 6, November - December 2009
- T. M. Chen:
Editor's note. 2-3 - Antonio Sánchez-Esguevillas, Belén Carro
, B. Wei, W. Feng:
Guest editorial. 6-7 - Spyridon L. Tompros, Nikolaos P. Mouratidis, M. Draaijer, Andreas Foglar, Halid Hrasnica
:
Enabling applicability of energy saving applications on the appliances of the home environment. 8-16 - Alejandro Fernández-Montes
, Luis González Abril
, Juan Antonio Ortega
, Francisco Velasco Morente
:
A study on saving energy in artificial lighting by making smart use of wireless sensor networks and actuators. 16-20 - Jin-Hwan Jeong, Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Kimyoo-Hyun Park:
Cable-TV-based home video streaming system: practice and experience. 22-28 - Iván Vidal
, Jaime García-Reinoso
, Francisco Valera
, Alex Bikfalvi:
Enabling layered video coding for IMS-based IPTV home services. 30-35 - Javier M. Aguiar, Carlos García, Henar Vega, Álvaro Martínez, Tamara de Vega, Philippe Bouillé, Antoine de Poorter:
Multimedia services interoperability in next-generation networks for the residential environment. 36-42 - Javier M. Aguiar, Carlos Baladrón Zorita
, Borja de la Cuesta Diego, Isabel Ordás Arnal, Patrice Mignot, Gino Carrozzo
, Paolo Comi:
Personal multimedia services over a common home and access networking environment. 43-49 - Rob Brennan
, David Lewis
, John Keeney, Zohar Etzioni, Kevin Feeney, Declan O'Sullivan
, J. Lozano, Brendan Jennings
:
Policy-based integration of multiprovider digital home services. 50-56

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.