


default search action
IET Networks, Volume 7
Volume 7, Number 1, January 2018
- Badis Hammi

, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. 1-13 - Othmane Nait Hamoud

, Tayeb Kenaza, Yacine Challal
:
Security in device-to-device communications: a survey. 14-22 - Pedro David Arjona-Villicaña

, Costas C. Constantinou
, Alexander S. Stepanenko, Jesús Acosta Elías:
Analysis of the use of complete orders to abstract the internet connectivity at the autonomous system level. 23-32 - Abd Elwahab Fawzy

, Mona Shokair, Waleed Saad
:
Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks. 33-43 - Hua He, Zhen Xu, Lei Yang:

Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks. 44-49
Volume 7, Number 2, March 2018
- Guest Editorial: Security Architecture and Technologies for 5G. 51-52

- Jiaqi Li, Zhifeng Zhao, Rongpeng Li

:
Machine learning-based IDS for software-defined 5G network. 53-60 - Jiaxin Zeng, Yuanlong Cao, Fenfen Ke, Minghe Huang, Guanghe Zhang, Wei Lu:

Performance evaluation of secure multipath retransmission mechanism in next generation heterogeneous communication systems. 61-67 - Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing, Qingtao Wu:

On physical-layer security for primary system in underlay cognitive radio networks. 68-73 - Vu Viet Hoang Pham

, Shui Yu
, Keshav Sood
, Lei Cui:
Privacy issues in social networks and analysis: a comprehensive survey. 74-84 - Juan Du, Ping Xie, Junlong Zhu, Ruijuan Zheng, Qingtao Wu, Mingchuan Zhang:

Method for detecting abnormal behaviour of users based on selective clustering ensemble. 85-90
Volume 7, Number 3, May 2018
- Atiieh Hoseinpour, Mojtaba Jafari Lahijani, Mohammad Hoseinpour, Javad Kazemitabar:

Fitness function improvement of evolutionary algorithms used in sensor network optimisations. 91-94 - Vahid Kouhdaragh, Iraj Sadegh Amiri

, Seyedalireza Seyedi
:
Smart grid load balancing methods to make an efficient heterogeneous network by using the communication cost function. 95-102 - Vassilios G. Vassilakis

, Ioannis D. Moscholios, Michael D. Logothetis:
Efficient radio resource allocation in SDN/NFV based mobile cellular networks under the complete sharing policy. 103-108 - Jun Zhan

, Yong Liu, Xiaohu Tang, Qingchun Chen:
Relaying protocols for buffer-aided energy harvesting wireless cooperative networks. 109-118 - Nouri Omheni

, Imen El Bouabidi, Amina Gharsallah, Faouzi Zarai
, Mohammad S. Obaidat:
Smart mobility management in 5G heterogeneous networks. 119-128 - Yilin Wang, Donghui Li, Na Dong:

Cellular automata malware propagation model for WSN based on multi-player evolutionary game. 129-135 - Kai Wang, Yude Zhao, Shugang Liu, Xiangrong Tong:

On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks. 136-140 - Vijayalakshmi Murugesan

, Mercy Shalinie
, Ming-Hour Yang:
Design and analysis of hybrid single packet IP traceback scheme. 141-151 - Dharani Kumari Nooji Venkatramana, Shylaja Banagiri Srikantaiah, Jayalakshmi Moodabidri:

CISRP: connectivity-aware intersection-based shortest path routing protocol for VANETs in urban environments. 152-161
Volume 7, Number 4, July 2018
- Guest Editorial: Traffic Engineering and Optimisation in Next Generation Networks. 163-164

- Tawfik Ismail

, Erich Leitgeb
, Zabih Ghassemlooy, Mohammed Alnahhal
:
Performance improvement of FSO system using multi-pulse pulse position modulation and SIMO under atmospheric turbulence conditions and with pointing errors. 165-172 - Thomas Lagkas

, Panagiotis G. Sarigiannidis
, Paolo Bellavista
, Carlo Giannelli
:
Multi-stage resource allocation in hybrid 25G-EPON and LTE-Advanced Pro FiWi networks for 5G systems. 173-180 - Chetna Singhal

, Swades De
:
eM-SON: efficient multimedia service over self-organising Wi-Fi network. 181-189 - Joy Eze, Sijing Zhang, Enjie Liu

, Elias Chinedum Eze:
Cognitive radio-enabled Internet of Vehicles: a cooperative spectrum sensing and allocation for vehicular communication. 190-199 - Elias Chinedum Eze, Sijing Zhang, Enjie Liu

, Joy Eze, Shehu Jabaka Muhammad:
Reliable and enhanced cooperative cross-layer medium access control scheme for vehicular communication. 200-209 - Fatma Salem, Yassin Elhillali, Smaïl Niar:

Efficient modelling of IEEE 802.11p MAC output process for V2X interworking enhancement. 210-219 - Sajjad Alizadeh, Reza Saadat:

Performance improvement of pilot-assisted power allocation in vehicular small cells with preprocessing under measurement errors. 220-225 - Ali El Ksimi, Leghris Cherkaoui

:
Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks. 226-232 - Stefanos G. Sagkriotis, Spyros K. Pantelis, Ioannis D. Moscholios, Vassilios G. Vassilakis

:
Call blocking probabilities in a two-link multirate loss system for Poisson traffic. 233-241 - Ioannis D. Moscholios, Vassilios G. Vassilakis

, Panagiotis G. Sarigiannidis
:
Performance modelling of a multirate loss system with batched Poisson arrivals under a probabilistic threshold policy. 242-247 - Waqar Khurshid, Miss Laiha Mat Kiah

, Imran Ali Khan, Rosli Salleh
, Anthony Theodore Chronopoulos
, Sajjad Ahmad Madani
:
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. 248-257 - Suresh Kallam

, Madda Rajasekhara Babu, Chi-Yuan Chen, Rizwan Patan
, Dhanaraj Cheelu:
Low energy aware communication process in IoT using the green computing approach. 258-264 - Yuvaraj Padmanaban

, Manimozhi Muthukumarasamy:
Energy-efficient clustering algorithm for structured wireless sensor networks. 265-272 - Mayank Swarnkar

, Neminath Hubballi:
RDClass: on using relative distance of keywords for accurate network traffic classification. 273-279 - Erratum: Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks. 280

Volume 7, Number 5, September 2018
- Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT). 281-282

- Jiajia Song, Jinbo Zhang, Xinnan Fan:

Routing protocol for battery management system of electric vehicles based on ad-hoc network. 283-286 - Manjula Raja

, Raja Datta
:
Efficient aggregation technique for data privacy in wireless sensor networks. 287-293 - Mohamed Boussif

, Noureddine Aloui
, Adnene Cherif
:
Secured cloud computing for medical data based on watermarking and encryption. 294-298 - Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang:

Potential threats mining methods based on correlation analysis of multi-type logs. 299-305 - Ainaz Bahramlou, Reza Javidan

:
Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL. 306-312 - Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah

:
Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes. 313-320 - Philip O'Kane, Sakir Sezer, Domhnall Carlin

:
Evolution of ransomware. 321-327 - Thomas I. Tegou, Antonios Tsiflikiotis, Dimitrios D. Vergados

, Katherine Siakavara, Spiros Nikolaidis
, Sotirios K. Goudos
, Panagiotis G. Sarigiannidis
, Mohammad S. Obaidat:
Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation. 328-335 - Mahsa Derakhshani

, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia:
Leveraging synergy of SDWN and multi-layer resource management for 5G networks. 336-345 - Mohammad Al-Hisnawi

, Mahmood Ahmadi
:
QCF for deep packet inspection. 346-352 - Habib Mostafaei

, Mohammad S. Obaidat:
Learning automaton-based self-protection algorithm for wireless sensor networks. 353-361
Volume 7, Number 6, November 2018
- Chandrashekhar Meshram, Pournima L. Powar

, Mohammad S. Obaidat, Cheng-Chi Lee
, Sarita Gajbhiye Meshram
:
Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs. 363-367 - Shuo-Yen Robert Li

:
Unified theory on preservation of conditionally non-blocking switches by the two-stage interconnection network. 368-375 - Saad M. Darwish

, Adel A. El-Zoghabi, Amr G. El-Shnawy:
Proactive cache replacement technique for mobile networks based on genetic programming. 376-383 - Guillaume Ferré, Eric Pierre Simon:

Packet collision analysis when heterogeneous unlicensed IoT technologies coexist. 384-392 - Waleed Saad

, Somaya A. El-Feshawy
, Mona Shokair, Mouad I. Dessouky:
Optimised approach based on hybrid MAC protocol for M2M networks. 393-397 - Ahmed Abdelaziz Salem

, Sayed El-Rabaie
, Mona Shokair:
Energy efficient ultra-dense networks based on multi-objective optimisation framework. 398-405 - Deepak Kumar Patel

, Chita Ranjan Tripathy:
On the design of an efficient load balancing mechanism on GridSim adapted to the computing environment of heterogeneity in both resources and networks. 406-413 - Zahra Zarei, Mozafar Bag Mohammadi

:
Priority-based target coverage in directional sensor networks. 414-421 - Hassan El Alami

, Abdellah Najid:
MS-routing-G i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. 422-428 - Neminath Hubballi, Jonathan Santini:

Detecting TCP ACK storm attack: a state transition modelling approach. 429-434 - Ayan Paul, Devodyuti Mukherjee, Madhubanti Maitra:

Reinforcement learning-based negotiation for spectrum micro-trading framework. 435-444 - Arunmozhi Manimuthu

, Ramadoss Ramesh:
Privacy and data security for grid-connected home area network using Internet of Things. 445-452 - Majd Latah

, Levent Toker:
Towards an efficient anomaly-based intrusion detection for software-defined networks. 453-459 - Babedi B. Letswamotse, Reza Malekian

, Chi-Yuan Chen, Kgotlaetsile Mathews Modieginyane:
Software defined wireless sensor networks and efficient congestion control. 460-464 - Zhengxiong Dou, Xiaonan Wang, Yanli Li:

Data acquisition based on vehicular cloud. 465-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














