


default search action
IET Networks, Volume 13
Volume 13, Number 1, January 2024
ORIGINAL RESEARCH
- Sutapa Sarkar
, R. Muralishankar
, Sanjeev Gurugopinath
:
Vasicek and Van Es entropy-based spectrum sensing for cognitive radios. 1-12 - Ahmed M. Jasim
, Hamed S. Al-Raweshidy:
Optimal intelligent edge-servers placement in the healthcare field. 13-27 - Mohammad Arafah
, Iain W. Phillips, Asma Adnane:
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection. 28-44 - Ya Li, Yu Zhang
, Xinji Tian, Ruipeng Liu:
Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network. 45-57 - R. Sri Uma Suseela
, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti
, Md. Akhtaruzzaman
:
Cross layer protocol architecture for spectrum-based routing in cognitive radio networks. 58-65
PERSPECTIVE
- Anna Förster
, Jens Dede
, Andreas Könsgen
, Koojana Kuladinithi
, Vishnupriya Kuppusamy
, Andreas Timm-Giel
, Asanga Udugama
, Andreas Willig
:
A beginner's guide to infrastructure-less networking concepts. 66-110
Volume 13, Number 2, March 2024
COVER IMAGE
- Kuan-Chu Lu, I-Hsien Liu
, Keng-Hao Chang, Jung-Shian Li
:
Cover Image. i
NETWORK/TRAFFIC OPTIMIZATION TOWARDS 6G NETWORK
- Michael D. Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Maaiuf Rabie:
Guest Editorial: Special issue on network/traffic optimisation towards 6G network. 111-114 - Vipin Balyan
:
Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access. 115-128 - Kuan-Chu Lu, I-Hsien Liu
, Keng-Hao Chang, Jung-Shian Li
:
VoWi-Fi security threats: Address resolution protocol attack and countermeasures. 129-146
ORIGINAL RESEARCH
- A. Samson Arun Raj
, S. Basil Xavier, Jaspher Willsie Kathrine Gnanaraj
, Salaja Silas, Andrew J.
:
A constructive airborne-ground matrix algorithm for modern telecommunication systems. 147-164 - Abdulbasit M. A. Sabaawi
, Mohammed R. Almasaoodi
, Sara El Gaily, Sándor Imre
:
Energy efficiency optimisation in massive multiple-input, multiple-output network for 5G applications using new quantum genetic algorithm. 165-177 - Yaning Wang
, Hui Zhi:
Virtual network embedding method based on node delay perception. 178-191 - Ren Ming
, Zhang Rong:
Low complexity resource allocation scheme for IRS-assisted downlink non-orthogonal multiple access systems. 192-198
Volume 13, Number 3, May 2024
ORIGINAL RESEARCH
- Guoxin Xu, Jiawen Zhao, Xuehe Wang
:
Wireless sensing charging based on multi-drone cooperation. 199-207 - Sihem Benfriha
, Nabila Labraoui, Radjaa Bensaid
, Haythem Bany Salameh, Hafida Saidi:
FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks. 208-220 - Kenneth Nsafoa-Yeboah, Eric Tutu Tchao
, Benjamin Kommey
, Andrew Selasi Agbemenu
, Griffith Selorm Klogo, Nana Kwadwo Akrasi-Mensah:
Flexible open network operating system architecture for implementing higher scalability using disaggregated software-defined optical networking. 221-240 - Xavier Gomes, João Fonseca, Rui Valadas
:
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies. 241-248 - Xiaoying Huang
:
Hardware nanosecond-precision timestamping for line-rate packet capture. 249-261
CASE STUDY
- Wei Liang
, Jian-Kang Zhang
, Dawei Wang, Lixin Li, Soon Xin Ng
:
NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks. 262-269
Volume 13, Number 4, July 2024
Original Research
- Habib Ullah Manzoor
, Sanaullah Manzoor
, Muhammad Ali Jamshed
, Tareq Manzoor:
Leveraging InGaN solar cells for visible light communication reception. 271-279 - Hatem Fetoh
, Khaled M. Amin, Ahmed M. Hamad:
Packets distribution over asymmetric paths using concurrent multipath transfer. 280-290 - Asad Ali Malik, Muhammad Ali Jamshed
, Ali Nauman
, Adeel Iqbal
, Atif Shakeel, Riaz Hussain:
Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks. 291-300 - Deva Priya Isravel, Salaja Silas, G. Jaspher Willsie Kathrine, Elijah Blessing Rajsingh, Andrew J.
:
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications. 301-312 - Wenbo Wang
, Peng Yi, Huikai Xu:
A PU-learning based approach for cross-site scripting attacking reality detection. 313-323
Virtual Collection on Edge Intelligence for Next Generation Industrial IoT Applications
- Shakir Salman Ahmad
, Hamed S. Al-Raweshidy, Rajagopal Nilavalan:
Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement. 324-337
Volume 13, Numbers 5-6, 2024
- Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander
, Robiah Yusof, Abdu Saif:
Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. 339-376 - Moawiah El-Dalahmeh
, Adi El-Dalahmeh
, Usman Adeel:
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method. 377-394 - Umar Aliyu
, Haifa Takruri, Martin Hope, Abubakar Gidado Halilu
, Hamid Abubakar Adamu:
Disaster scenario optimised link state routing protocol and message prioritisation. 395-412 - Nada Alsalmi
, K. Navaie, H. Rahmani:
Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach. 413-433 - Paul Pop
, Konstantinos Alexandris, Tongtong Wang:
Configuration of multi-shaper Time-Sensitive Networking for industrial applications. 434-454 - Nouri Omheni
, Anis Amiri, Faouzi Zarai:
A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks. 455-470 - Chun-Wei Tsai
, Chi-Tse Lu, Chun-hua Li, Shuo-Wen Zhang:
An effective ensemble electricity theft detection algorithm for smart grid. 471-485 - Ana Catarina Grilo, Pedro Oliveira, Rui Valadas
:
Hard-state Protocol Independent Multicast - Source-Specific Multicast (HPIM-SSM). 486-512 - Monika Roopak
, Simon Parkinson
, Gui Yun Tian, Yachao Ran
, Saad Khan
, Balasubramaniyan Chandrasekaran:
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks. 513-527 - Alireza Etaati, Mostafa Bastam
, Ehsan Ataie
:
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management. 528-545 - Kuan-Chu Lu, I-Hsien Liu
, Zong-Chao Liu, Jung-Shian Li
:
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system. 546-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
