default search action
IET Networks, Volume 8
Volume 8, Number 1, 2019
- Guest Editorial: Exploring IoT Systems in Businesses: Frameworks, Use Cases, Policies, Protocols and Services. 1-2
- Junaid Arshad, Muhammad Ajmal Azad, Mohammad Mahmoud Abdellatif, Muhammad Habib Ur Rehman, Khaled Salah:
COLIDE: a collaborative intrusion detection framework for Internet of Things. 3-14 - Hafiz Munsub Ali, Waleed Ejaz, Daniel C. Lee, Ismail M. Khater:
Optimising the power using firework-based evolutionary algorithms for emerging IoT applications. 15-31 - Ahmed Suliman, Zainab Husain, Menatalla Abououf, Mansoor Alblooshi, Khaled Salah:
Monetization of IoT data using smart contracts. 32-37 - Ashraf Ahmad, Yousef S. Abu Hour, Mahmoud H. DarAssi:
Advance system and model to predict malicious files prorogation inside computer network. 38-47 - Said El Kafhali, Khaled Salah:
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems. 48-58 - Sachin D. Patil, Mohit P. Tahiliani:
Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling. 59-66 - Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam, Anthony T. Chronopoulos:
Agent-based ARP cache poisoning detection in switched LAN environments. 67-73 - Chai-Keong Toh, Juan-Carlos Cano, Carlos Fernandez-Laguia, Pietro Manzoni, Carlos T. Calafate:
Wireless digital traffic signs of the future. 74-78
Volume 8, Number 2, 2019
- Majd Latah, Levent Toker:
Artificial intelligence enabled software-defined networking: a comprehensive overview. 79-99 - Krishnan Sakthidasan, Natarajan Vasudevan, Paramesvarane Kumara Guru Diderot, Chellakkutti Kadhiravan:
WOAPR: an affinity propagation based clustering and optimal path selection for time-critical wireless sensor networks. 100-106 - Chunjiong Zhang, Tao Xie, Kai Yang, Hui Ma, Yuxia Xie, Yueyao Xu, Pan Luo:
Positioning optimisation based on particle quality prediction in wireless sensor networks. 107-113 - Douglas Comer, Rajas H. Karandikar:
DCnet: a data centre network architecture that supports live VM migration. 114-125 - Ashkan Moradi, Vahid Shah-Mansouri:
Opportunistic content dissemination in mobile social networks via adjustment of user selfishness. 126-137 - Majid Jamali, Ali Ghiasian:
Randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic. 138-142
Volume 8, Number 3, 2019
- Guest Editorial: Special Issue on Edge Network Computing for Big Data Systems over Internet of Things. 143-144
- Zaijian Wang, Shiwen Mao, Weidong Yang:
Deep learning approach to multimedia traffic classification based on QoS characteristics. 145-154 - Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar:
Verification and validation techniques for streaming big data analytics in internet of things environment. 155-163 - Luis Alexandre da Silva, Kelton A. P. da Costa, João P. Papa, Gustavo H. Rosa, Victor Hugo C. de Albuquerque:
Fine-tuning restricted Boltzmann machines using quaternions and its application for spam detection. 164-168 - Ahilan Appathurai, Gunasekaran Manogaran, Naveen K. Chilamkurti:
Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles. 169-178 - Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin:
DormTalk: edge computing for the dormitory applications on campus. 179-186 - Ruijin Ma, Huisheng Zhang:
Channel estimation for massive multiple-input and multiple-output system based on different measurement matrices. 187-194 - Yun-Wei Lin, Yi-Bing Lin, Chun-You Liu:
AItalk: a tutorial to implement AI as IoT devices. 195-202 - Sankalita Biswas, Sanjay Dhar Roy, Aniruddha Chandra:
Single CCA for IEEE 802.15.4 networks: a cross layer energy model. 203-210 - Girraj Sharma, Ritu Sharma:
Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception. 211-217
Volume 8, Number 4, 2019
- Sibi Chakkaravarthy Sethuraman, Sangeetha Dhamodaran, Vaidehi Vijayakumar:
Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. 219-232 - Ghurumuruhan Ganesan:
Random access networks with separable schemes. 233-238 - Nan Wang, Hai Zhao, Long Hai:
Distributed routing algorithm with dynamic connection partition for mobile ad hoc networks. 239-245 - Naser Al-Falahy, Omar Alani:
Coverage and capacity improvement of millimetre wave 5G network using distributed base station architecture. 246-255 - Ramakrishnan Sethuraman, Subrat Kar, Selvamuthu Dharmaraja:
Analysis of traffic offload using multi-attribute decision making technique in heterogeneous shared networks. 256-263 - Kshira Sagar Sahoo, Bibhudatta Sahoo:
CAMD: a switch migration based load balancing framework for software defined networks. 264-271 - Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. 272-279 - Sanjeev Patel:
Sensitivity analysis of queue-based AQM over network parameters. 280-288
Volume 8, Number 5, 2019
- Tanmoy Maitra, Mohammad S. Obaidat, Debasis Giri, Subrata Dutta, Keshav P. Dahal:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. 289-298 - Rna Ghallab, Mona Shokair, Atef E. Abou-El-azm, Ali A. Sakr, Waleed Saad, Ahmed Naguib:
Performance enhancement using multiple-input multiple-output (MIMO) electronic relay in massive MIMO cellular networks. 299-306 - Shrayan Das, Kirtan Gopal Panda, Debarati Sen, Wasim Arif:
Risk-aware last-minute data backup in inter-datacenter networks. 307-320 - Muhammad Khalid, Farah Ahmad, Muhammad Arshad, Waqar Khalid, Naveed Ahmad, Yue Cao:
E2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks. 321-328 - Qinqin Tang, Renchao Xie, Tao Huang, Yunjie Liu:
Jointly caching and computation resource allocation for mobile edge networks. 329-338 - Nan Wang, Hai Zhao, Long Hai:
Shortest-path-based back-pressure routing with single-FIFO queueing in ad hoc networks'. 339-345
Volume 8, Number 6, 2019
- Mpho C. Nkosi, Lusani Mamushiane, Albert A. Lysko, David L. Johnson, Andries P. Engelbrecht:
Towards programmable on-demand lightpath services: current state-of-the-art and open research areas. 347-355 - Ibrahim S. Alsukayti, Mohammed Alreshoodi:
Toward an understanding of recent developments in RPL routing. 356-366 - Munirathinam Nirmala, Madda Rajasekhara Babu:
Fuzzy-based fake information detection algorithm to define the user trust on the content of social networks. 367-371 - Ghulam Abbas, Usman Raza, Zahid Halim, Kashif Kifayat:
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet. 372-380 - Mohammadhasan Miri, Kamal Mohamedpour, Yousef Darmani, Mahasweta Sarkar:
DIAMOND: a distributed algorithm for vertex coloring problems and resource allocation. 381-389 - Nagesha Shivappa, Sunilkumar S. Manvi:
Fuzzy-based cluster head selection and cluster formation in wireless sensor networks. 390-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.