Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijipt/ijipt15.bht:"
@article{DBLP:journals/ijipt/BankuraK22, author = {Aditi Bankura and Anirban Kundu}, title = {Policy-based heterogeneous server utilisation using controller framework}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {8--28}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122041}, doi = {10.1504/IJIPT.2022.122041}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/BankuraK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Benmammar22, author = {Badr Benmammar}, title = {Cognitive decision engine design for cognitive radio networks using gravitational search algorithm and flower pollination algorithm}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {116--126}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123587}, doi = {10.1504/IJIPT.2022.123587}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Benmammar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Chandran22, author = {Anjana S. Chandran}, title = {Blockchain-based system for storage utilisation and secure sharing of {EHR} data}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {189--202}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051090}, doi = {10.1504/IJIPT.2022.10051090}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Chandran22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/ChaudhariB22, author = {Anita Chaudhari and Rajesh Bansode}, title = {Efficient authentication method using binary search tree with multi-gateway in wireless IoT}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {250--263}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051088}, doi = {10.1504/IJIPT.2022.10051088}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/ChaudhariB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/ChenM22, author = {Ruiwei Chen and Bala Anand Muthu}, title = {Internet of vehicle things communication based on big data analytics integrated internet of things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {203--213}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051096}, doi = {10.1504/IJIPT.2022.10051096}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/ChenM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/GaggedJ22, author = {Ghanshyam Gagged and S. M. Jaishakti}, title = {Secure dynamic bits standard scheme in private cloud environment}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {214--225}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10046387}, doi = {10.1504/IJIPT.2022.10046387}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/GaggedJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/GautamK22, author = {Amit Kumar Gautam and Rakesh Kumar}, title = {Secure node {ID} assignment for internet integrated sensor network}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {94--106}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123585}, doi = {10.1504/IJIPT.2022.123585}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/GautamK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Iyer22, author = {Sridhar Iyer}, title = {On the minimisation of resource utilisation for cost reduction in space division multiplexing based elastic optical networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {29--40}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122043}, doi = {10.1504/IJIPT.2022.122043}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Iyer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KallimaniI22, author = {Rakhee Kallimani and Sridhar Iyer}, title = {Dynamic power management modelling of a wireless sensor node}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {127--135}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123589}, doi = {10.1504/IJIPT.2022.123589}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KallimaniI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KhaitanSA22, author = {Supriya Khaitan and Shrddha Sagar and Rashi Agarwal}, title = {A one-dimensional superior logistic map based-image encryption}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {226--235}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051094}, doi = {10.1504/IJIPT.2022.10051094}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KhaitanSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KhudherMP22, author = {Ali Abdulrazzaq Khudher and Alhamza Munther and Supriyanto Praptodiyono}, title = {Efficient IPv4-IPv6 translation mechanism for {IMS} using {SIP} proxy}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {41--52}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122048}, doi = {10.1504/IJIPT.2022.122048}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipt/KhudherMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KrishnaL22, author = {Akula Vijaya Krishna and A. Anny Leema}, title = {Efficient routing algorithm for improving the network performance in Internet of Things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {107--115}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123586}, doi = {10.1504/IJIPT.2022.123586}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KrishnaL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KumarC22, author = {Y. R. Sampath Kumar and H. N. Champa}, title = {Enhanced-KNN {(M-KNN)} based outlier detection and sensor data aggregation for large data streams in the IoT-cloud}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {236--249}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051091}, doi = {10.1504/IJIPT.2022.10051091}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KumarC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KumariG22, author = {J. Arthi Jaya Kumari and Muhammad Rukunddin Ghalib}, title = {Congruent fine-grained data mining model for large-scale medical data mining}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {148--160}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051086}, doi = {10.1504/IJIPT.2022.10051086}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KumariG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Li0HCC22, author = {Hongbing Li and Xiaolong Liu and Meng Huang and Qiang Chen and Liwan Chen}, title = {{ICCO:} immune clustering-based coverage optimisation algorithm in wireless sensor networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {76--93}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123588}, doi = {10.1504/IJIPT.2022.123588}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Li0HCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/MoW22, author = {Lianguang Mo and Liang Wei}, title = {Risk assessment method for power grid communication link failure based on fuzzy comprehensive assessment}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {2}, pages = {69--75}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.123584}, doi = {10.1504/IJIPT.2022.123584}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/MoW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/MoZ22, author = {Lianguang Mo and Yucai Zhou}, title = {Small area purification and recognition of network intrusion signals based on the second-order matching filter detection}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {1--7}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122031}, doi = {10.1504/IJIPT.2022.122031}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/MoZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/PatilK22, author = {Sunita S. Patil and T. Senthil Kumaran}, title = {Priority-based SenCar deployment strategy for mobile sink data gathering in {WSN}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {161--168}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051095}, doi = {10.1504/IJIPT.2022.10051095}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/PatilK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/PriyadarshiniRS22, author = {K. Mariya Priyadarshini and R. S. Ernest Ravindran and M. Sujatha and K. T. P. S. Kumar}, title = {High-speed pre-accumulator and post-multiplier for convolution neural networks with low power consumption}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {139--147}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051093}, doi = {10.1504/IJIPT.2022.10051093}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/PriyadarshiniRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/RabaninejadAAA22, author = {Reyhaneh Rabaninejad and Mahmoud Ahmadian{-}Attari and Maryam Rajabzadeh Asaar and Mohammad Reza Aref}, title = {Security enhancement of an auditing scheme for shared cloud data}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {60--68}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122033}, doi = {10.1504/IJIPT.2022.122033}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/RabaninejadAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/TaywadeS22, author = {Akshay Taywade and R. Sasikala}, title = {Processing power sharing using a gadget 'Power Save' for downloading scientific research projects}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {182--188}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051092}, doi = {10.1504/IJIPT.2022.10051092}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/TaywadeS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Wu22, author = {Jung{-}Shyr Wu}, title = {The study of dynamic resource allocation on aggregation of unlicensed spectrum in {LTE-A} networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {1}, pages = {53--59}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.122049}, doi = {10.1504/IJIPT.2022.122049}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Wu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/XieHGLOV22, author = {Linjiang Xie and Feilu Hang and Wei Guo and Yao Lv and Wei Ou and C. Chandru Vignesh}, title = {Machine learning-based security active defence model - security active defence technology in the communication network}, journal = {Int. J. Internet Protoc. Technol.}, volume = {15}, number = {3/4}, pages = {169--181}, year = {2022}, url = {https://doi.org/10.1504/IJIPT.2022.10051087}, doi = {10.1504/IJIPT.2022.10051087}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/XieHGLOV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.