default search action
IET Networks, Volume 8
Volume 8, Number 1, 2019
- Guest Editorial: Exploring IoT Systems in Businesses: Frameworks, Use Cases, Policies, Protocols and Services. 1-2
- Junaid Arshad
, Muhammad Ajmal Azad
, Mohammad Mahmoud Abdellatif
, Muhammad Habib Ur Rehman
, Khaled Salah:
COLIDE: a collaborative intrusion detection framework for Internet of Things. 3-14 - Hafiz Munsub Ali, Waleed Ejaz
, Daniel C. Lee, Ismail M. Khater:
Optimising the power using firework-based evolutionary algorithms for emerging IoT applications. 15-31 - Ahmed Suliman
, Zainab Husain
, Menatalla Abououf
, Mansoor Alblooshi, Khaled Salah:
Monetization of IoT data using smart contracts. 32-37 - Ashraf Ahmad, Yousef S. Abu Hour
, Mahmoud H. DarAssi
:
Advance system and model to predict malicious files prorogation inside computer network. 38-47 - Said El Kafhali
, Khaled Salah:
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems. 48-58 - Sachin D. Patil
, Mohit P. Tahiliani:
Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling. 59-66 - Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam, Anthony T. Chronopoulos
:
Agent-based ARP cache poisoning detection in switched LAN environments. 67-73 - Chai-Keong Toh, Juan-Carlos Cano
, Carlos Fernandez-Laguia, Pietro Manzoni, Carlos T. Calafate
:
Wireless digital traffic signs of the future. 74-78
Volume 8, Number 2, 2019
- Majd Latah
, Levent Toker:
Artificial intelligence enabled software-defined networking: a comprehensive overview. 79-99 - Krishnan Sakthidasan, Natarajan Vasudevan, Paramesvarane Kumara Guru Diderot, Chellakkutti Kadhiravan:
WOAPR: an affinity propagation based clustering and optimal path selection for time-critical wireless sensor networks. 100-106 - Chunjiong Zhang
, Tao Xie, Kai Yang, Hui Ma, Yuxia Xie, Yueyao Xu, Pan Luo:
Positioning optimisation based on particle quality prediction in wireless sensor networks. 107-113 - Douglas Comer, Rajas H. Karandikar:
DCnet: a data centre network architecture that supports live VM migration. 114-125 - Ashkan Moradi
, Vahid Shah-Mansouri:
Opportunistic content dissemination in mobile social networks via adjustment of user selfishness. 126-137 - Majid Jamali, Ali Ghiasian
:
Randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic. 138-142
Volume 8, Number 3, 2019
- Guest Editorial: Special Issue on Edge Network Computing for Big Data Systems over Internet of Things. 143-144
- Zaijian Wang, Shiwen Mao, Weidong Yang:
Deep learning approach to multimedia traffic classification based on QoS characteristics. 145-154 - Aparna Kumari
, Sudeep Tanwar
, Sudhanshu Tyagi
, Neeraj Kumar
:
Verification and validation techniques for streaming big data analytics in internet of things environment. 155-163 - Luis Alexandre da Silva
, Kelton A. P. da Costa
, João P. Papa, Gustavo H. Rosa
, Victor Hugo C. de Albuquerque
:
Fine-tuning restricted Boltzmann machines using quaternions and its application for spam detection. 164-168 - Ahilan Appathurai, Gunasekaran Manogaran, Naveen K. Chilamkurti:
Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles. 169-178 - Yi-Bing Lin, Min-Zheng Shieh
, Yun-Wei Lin:
DormTalk: edge computing for the dormitory applications on campus. 179-186 - Ruijin Ma, Huisheng Zhang:
Channel estimation for massive multiple-input and multiple-output system based on different measurement matrices. 187-194 - Yun-Wei Lin, Yi-Bing Lin, Chun-You Liu:
AItalk: a tutorial to implement AI as IoT devices. 195-202 - Sankalita Biswas, Sanjay Dhar Roy
, Aniruddha Chandra
:
Single CCA for IEEE 802.15.4 networks: a cross layer energy model. 203-210 - Girraj Sharma
, Ritu Sharma:
Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception. 211-217
Volume 8, Number 4, 2019
- Sibi Chakkaravarthy Sethuraman, Sangeetha Dhamodaran
, Vaidehi Vijayakumar:
Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. 219-232 - Ghurumuruhan Ganesan:
Random access networks with separable schemes. 233-238 - Nan Wang, Hai Zhao, Long Hai:
Distributed routing algorithm with dynamic connection partition for mobile ad hoc networks. 239-245 - Naser Al-Falahy
, Omar Alani
:
Coverage and capacity improvement of millimetre wave 5G network using distributed base station architecture. 246-255 - Ramakrishnan Sethuraman
, Subrat Kar, Selvamuthu Dharmaraja
:
Analysis of traffic offload using multi-attribute decision making technique in heterogeneous shared networks. 256-263 - Kshira Sagar Sahoo
, Bibhudatta Sahoo
:
CAMD: a switch migration based load balancing framework for software defined networks. 264-271 - Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh
, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. 272-279 - Sanjeev Patel
:
Sensitivity analysis of queue-based AQM over network parameters. 280-288
Volume 8, Number 5, 2019
- Tanmoy Maitra
, Mohammad S. Obaidat, Debasis Giri
, Subrata Dutta, Keshav P. Dahal
:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. 289-298 - Rna Ghallab
, Mona Shokair, Atef E. Abou-El-azm
, Ali A. Sakr, Waleed Saad
, Ahmed Naguib:
Performance enhancement using multiple-input multiple-output (MIMO) electronic relay in massive MIMO cellular networks. 299-306 - Shrayan Das, Kirtan Gopal Panda, Debarati Sen, Wasim Arif
:
Risk-aware last-minute data backup in inter-datacenter networks. 307-320 - Muhammad Khalid
, Farah Ahmad, Muhammad Arshad, Waqar Khalid, Naveed Ahmad, Yue Cao
:
E2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks. 321-328 - Qinqin Tang, Renchao Xie, Tao Huang
, Yunjie Liu:
Jointly caching and computation resource allocation for mobile edge networks. 329-338 - Nan Wang, Hai Zhao, Long Hai:
Shortest-path-based back-pressure routing with single-FIFO queueing in ad hoc networks'. 339-345
Volume 8, Number 6, 2019
- Mpho C. Nkosi, Lusani Mamushiane, Albert A. Lysko
, David L. Johnson, Andries P. Engelbrecht:
Towards programmable on-demand lightpath services: current state-of-the-art and open research areas. 347-355 - Ibrahim S. Alsukayti
, Mohammed Alreshoodi
:
Toward an understanding of recent developments in RPL routing. 356-366 - Munirathinam Nirmala
, Madda Rajasekhara Babu:
Fuzzy-based fake information detection algorithm to define the user trust on the content of social networks. 367-371 - Ghulam Abbas
, Usman Raza, Zahid Halim
, Kashif Kifayat
:
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet. 372-380 - Mohammadhasan Miri
, Kamal Mohamedpour, Yousef Darmani
, Mahasweta Sarkar:
DIAMOND: a distributed algorithm for vertex coloring problems and resource allocation. 381-389 - Nagesha Shivappa
, Sunilkumar S. Manvi:
Fuzzy-based cluster head selection and cluster formation in wireless sensor networks. 390-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.