default search action
IET Networks, Volume 7
Volume 7, Number 1, January 2018
- Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. 1-13 - Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal:
Security in device-to-device communications: a survey. 14-22 - Pedro David Arjona-Villicaña, Costas C. Constantinou, Alexander S. Stepanenko, Jesús Acosta Elías:
Analysis of the use of complete orders to abstract the internet connectivity at the autonomous system level. 23-32 - Abd Elwahab Fawzy, Mona Shokair, Waleed Saad:
Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks. 33-43 - Hua He, Zhen Xu, Lei Yang:
Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks. 44-49
Volume 7, Number 2, March 2018
- Guest Editorial: Security Architecture and Technologies for 5G. 51-52
- Jiaqi Li, Zhifeng Zhao, Rongpeng Li:
Machine learning-based IDS for software-defined 5G network. 53-60 - Jiaxin Zeng, Yuanlong Cao, Fenfen Ke, Minghe Huang, Guanghe Zhang, Wei Lu:
Performance evaluation of secure multipath retransmission mechanism in next generation heterogeneous communication systems. 61-67 - Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing, Qingtao Wu:
On physical-layer security for primary system in underlay cognitive radio networks. 68-73 - Vu Viet Hoang Pham, Shui Yu, Keshav Sood, Lei Cui:
Privacy issues in social networks and analysis: a comprehensive survey. 74-84 - Juan Du, Ping Xie, Junlong Zhu, Ruijuan Zheng, Qingtao Wu, Mingchuan Zhang:
Method for detecting abnormal behaviour of users based on selective clustering ensemble. 85-90
Volume 7, Number 3, May 2018
- Atiieh Hoseinpour, Mojtaba Jafari Lahijani, Mohammad Hoseinpour, Javad Kazemitabar:
Fitness function improvement of evolutionary algorithms used in sensor network optimisations. 91-94 - Vahid Kouhdaragh, Iraj Sadegh Amiri, Seyedalireza Seyedi:
Smart grid load balancing methods to make an efficient heterogeneous network by using the communication cost function. 95-102 - Vassilios G. Vassilakis, Ioannis D. Moscholios, Michael D. Logothetis:
Efficient radio resource allocation in SDN/NFV based mobile cellular networks under the complete sharing policy. 103-108 - Jun Zhan, Yong Liu, Xiaohu Tang, Qingchun Chen:
Relaying protocols for buffer-aided energy harvesting wireless cooperative networks. 109-118 - Nouri Omheni, Imen El Bouabidi, Amina Gharsallah, Faouzi Zarai, Mohammad S. Obaidat:
Smart mobility management in 5G heterogeneous networks. 119-128 - Yilin Wang, Donghui Li, Na Dong:
Cellular automata malware propagation model for WSN based on multi-player evolutionary game. 129-135 - Kai Wang, Yude Zhao, Shugang Liu, Xiangrong Tong:
On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks. 136-140 - Vijayalakshmi Murugesan, Mercy Shalinie, Ming-Hour Yang:
Design and analysis of hybrid single packet IP traceback scheme. 141-151 - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah, Jayalakshmi Moodabidri:
CISRP: connectivity-aware intersection-based shortest path routing protocol for VANETs in urban environments. 152-161
Volume 7, Number 4, July 2018
- Guest Editorial: Traffic Engineering and Optimisation in Next Generation Networks. 163-164
- Tawfik Ismail, Erich Leitgeb, Zabih Ghassemlooy, Mohammed Alnahhal:
Performance improvement of FSO system using multi-pulse pulse position modulation and SIMO under atmospheric turbulence conditions and with pointing errors. 165-172 - Thomas Lagkas, Panagiotis G. Sarigiannidis, Paolo Bellavista, Carlo Giannelli:
Multi-stage resource allocation in hybrid 25G-EPON and LTE-Advanced Pro FiWi networks for 5G systems. 173-180 - Chetna Singhal, Swades De:
eM-SON: efficient multimedia service over self-organising Wi-Fi network. 181-189 - Joy Eze, Sijing Zhang, Enjie Liu, Elias Chinedum Eze:
Cognitive radio-enabled Internet of Vehicles: a cooperative spectrum sensing and allocation for vehicular communication. 190-199 - Elias Chinedum Eze, Sijing Zhang, Enjie Liu, Joy Eze, Shehu Jabaka Muhammad:
Reliable and enhanced cooperative cross-layer medium access control scheme for vehicular communication. 200-209 - Fatma Salem, Yassin Elhillali, Smaïl Niar:
Efficient modelling of IEEE 802.11p MAC output process for V2X interworking enhancement. 210-219 - Sajjad Alizadeh, Reza Saadat:
Performance improvement of pilot-assisted power allocation in vehicular small cells with preprocessing under measurement errors. 220-225 - Ali El Ksimi, Leghris Cherkaoui:
Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks. 226-232 - Stefanos G. Sagkriotis, Spyros K. Pantelis, Ioannis D. Moscholios, Vassilios G. Vassilakis:
Call blocking probabilities in a two-link multirate loss system for Poisson traffic. 233-241 - Ioannis D. Moscholios, Vassilios G. Vassilakis, Panagiotis G. Sarigiannidis:
Performance modelling of a multirate loss system with batched Poisson arrivals under a probabilistic threshold policy. 242-247 - Waqar Khurshid, Miss Laiha Mat Kiah, Imran Ali Khan, Rosli Salleh, Anthony Theodore Chronopoulos, Sajjad Ahmad Madani:
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. 248-257 - Suresh Kallam, Madda Rajasekhara Babu, Chi-Yuan Chen, Rizwan Patan, Dhanaraj Cheelu:
Low energy aware communication process in IoT using the green computing approach. 258-264 - Yuvaraj Padmanaban, Manimozhi Muthukumarasamy:
Energy-efficient clustering algorithm for structured wireless sensor networks. 265-272 - Mayank Swarnkar, Neminath Hubballi:
RDClass: on using relative distance of keywords for accurate network traffic classification. 273-279 - Erratum: Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks. 280
Volume 7, Number 5, September 2018
- Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT). 281-282
- Jiajia Song, Jinbo Zhang, Xinnan Fan:
Routing protocol for battery management system of electric vehicles based on ad-hoc network. 283-286 - Manjula Raja, Raja Datta:
Efficient aggregation technique for data privacy in wireless sensor networks. 287-293 - Mohamed Boussif, Noureddine Aloui, Adnene Cherif:
Secured cloud computing for medical data based on watermarking and encryption. 294-298 - Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang:
Potential threats mining methods based on correlation analysis of multi-type logs. 299-305 - Ainaz Bahramlou, Reza Javidan:
Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL. 306-312 - Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah:
Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes. 313-320 - Philip O'Kane, Sakir Sezer, Domhnall Carlin:
Evolution of ransomware. 321-327 - Thomas I. Tegou, Antonios Tsiflikiotis, Dimitrios D. Vergados, Katherine Siakavara, Spiros Nikolaidis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis, Mohammad S. Obaidat:
Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation. 328-335 - Mahsa Derakhshani, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia:
Leveraging synergy of SDWN and multi-layer resource management for 5G networks. 336-345 - Mohammad Al-Hisnawi, Mahmood Ahmadi:
QCF for deep packet inspection. 346-352 - Habib Mostafaei, Mohammad S. Obaidat:
Learning automaton-based self-protection algorithm for wireless sensor networks. 353-361
Volume 7, Number 6, November 2018
- Chandrashekhar Meshram, Pournima L. Powar, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. 363-367 - Shuo-Yen Robert Li:
Unified theory on preservation of conditionally non-blocking switches by the two-stage interconnection network. 368-375 - Saad M. Darwish, Adel A. El-Zoghabi, Amr G. El-Shnawy:
Proactive cache replacement technique for mobile networks based on genetic programming. 376-383 - Guillaume Ferré, Eric Pierre Simon:
Packet collision analysis when heterogeneous unlicensed IoT technologies coexist. 384-392 - Waleed Saad, Somaya A. El-Feshawy, Mona Shokair, Mouad I. Dessouky:
Optimised approach based on hybrid MAC protocol for M2M networks. 393-397 - Ahmed Abdelaziz Salem, Sayed El-Rabaie, Mona Shokair:
Energy efficient ultra-dense networks based on multi-objective optimisation framework. 398-405 - Deepak Kumar Patel, Chita Ranjan Tripathy:
On the design of an efficient load balancing mechanism on GridSim adapted to the computing environment of heterogeneity in both resources and networks. 406-413 - Zahra Zarei, Mozafar Bag Mohammadi:
Priority-based target coverage in directional sensor networks. 414-421 - Hassan El Alami, Abdellah Najid:
MS-routing-G i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. 422-428 - Neminath Hubballi, Jonathan Santini:
Detecting TCP ACK storm attack: a state transition modelling approach. 429-434 - Ayan Paul, Devodyuti Mukherjee, Madhubanti Maitra:
Reinforcement learning-based negotiation for spectrum micro-trading framework. 435-444 - Arunmozhi Manimuthu, Ramadoss Ramesh:
Privacy and data security for grid-connected home area network using Internet of Things. 445-452 - Majd Latah, Levent Toker:
Towards an efficient anomaly-based intrusion detection for software-defined networks. 453-459 - Babedi B. Letswamotse, Reza Malekian, Chi-Yuan Chen, Kgotlaetsile Mathews Modieginyane:
Software defined wireless sensor networks and efficient congestion control. 460-464 - Zhengxiong Dou, Xiaonan Wang, Yanli Li:
Data acquisition based on vehicular cloud. 465-470
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.