


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 63 matches
- 2018
- Mohammad Al-Hisnawi
, Mahmood Ahmadi
:
QCF for deep packet inspection. IET Networks 7(5): 346-352 (2018) - Hassan El Alami
, Abdellah Najid:
MS-routing-G i : routing technique to minimise energy consumption and packet loss in WSNs with mobile sink. IET Networks 7(6): 422-428 (2018) - Sajjad Alizadeh, Reza Saadat:
Performance improvement of pilot-assisted power allocation in vehicular small cells with preprocessing under measurement errors. IET Networks 7(4): 220-225 (2018) - Pedro David Arjona-Villicaña
, Costas C. Constantinou
, Alexander S. Stepanenko, Jesús Acosta Elías:
Analysis of the use of complete orders to abstract the internet connectivity at the autonomous system level. IET Networks 7(1): 23-32 (2018) - Ainaz Bahramlou, Reza Javidan
:
Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL. IET Networks 7(5): 306-312 (2018) - Mohamed Boussif
, Noureddine Aloui
, Adnene Cherif
:
Secured cloud computing for medical data based on watermarking and encryption. IET Networks 7(5): 294-298 (2018) - Saad M. Darwish
, Adel A. El-Zoghabi, Amr G. El-Shnawy:
Proactive cache replacement technique for mobile networks based on genetic programming. IET Networks 7(6): 376-383 (2018) - Mahsa Derakhshani
, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia:
Leveraging synergy of SDWN and multi-layer resource management for 5G networks. IET Networks 7(5): 336-345 (2018) - Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah
:
Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes. IET Networks 7(5): 313-320 (2018) - Zhengxiong Dou, Xiaonan Wang, Yanli Li:
Data acquisition based on vehicular cloud. IET Networks 7(6): 465-470 (2018) - Juan Du, Ping Xie, Junlong Zhu, Ruijuan Zheng, Qingtao Wu, Mingchuan Zhang:
Method for detecting abnormal behaviour of users based on selective clustering ensemble. IET Networks 7(2): 85-90 (2018) - Joy Eze, Sijing Zhang, Enjie Liu
, Elias Chinedum Eze:
Cognitive radio-enabled Internet of Vehicles: a cooperative spectrum sensing and allocation for vehicular communication. IET Networks 7(4): 190-199 (2018) - Elias Chinedum Eze, Sijing Zhang, Enjie Liu
, Joy Eze, Shehu Jabaka Muhammad:
Reliable and enhanced cooperative cross-layer medium access control scheme for vehicular communication. IET Networks 7(4): 200-209 (2018) - Abd Elwahab Fawzy
, Mona Shokair, Waleed Saad
:
Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks. IET Networks 7(1): 33-43 (2018) - Guillaume Ferré, Eric Pierre Simon:
Packet collision analysis when heterogeneous unlicensed IoT technologies coexist. IET Networks 7(6): 384-392 (2018) - Badis Hammi
, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. IET Networks 7(1): 1-13 (2018) - Othmane Nait Hamoud
, Tayeb Kenaza, Yacine Challal
:
Security in device-to-device communications: a survey. IET Networks 7(1): 14-22 (2018) - Hua He, Zhen Xu, Lei Yang:
Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks. IET Networks 7(1): 44-49 (2018) - Atiieh Hoseinpour, Mojtaba Jafari Lahijani, Mohammad Hoseinpour, Javad Kazemitabar:
Fitness function improvement of evolutionary algorithms used in sensor network optimisations. IET Networks 7(3): 91-94 (2018) - Neminath Hubballi, Jonathan Santini:
Detecting TCP ACK storm attack: a state transition modelling approach. IET Networks 7(6): 429-434 (2018) - Tawfik Ismail
, Erich Leitgeb
, Zabih Ghassemlooy, Mohammed Alnahhal
:
Performance improvement of FSO system using multi-pulse pulse position modulation and SIMO under atmospheric turbulence conditions and with pointing errors. IET Networks 7(4): 165-172 (2018) - Suresh Kallam
, Madda Rajasekhara Babu, Chi-Yuan Chen, Rizwan Patan
, Dhanaraj Cheelu:
Low energy aware communication process in IoT using the green computing approach. IET Networks 7(4): 258-264 (2018) - Waqar Khurshid, Miss Laiha Mat Kiah
, Imran Ali Khan, Rosli Salleh
, Anthony Theodore Chronopoulos
, Sajjad Ahmad Madani
:
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. IET Networks 7(4): 248-257 (2018) - Vahid Kouhdaragh, Iraj Sadegh Amiri
, Seyedalireza Seyedi
:
Smart grid load balancing methods to make an efficient heterogeneous network by using the communication cost function. IET Networks 7(3): 95-102 (2018) - Ali El Ksimi, Leghris Cherkaoui
:
Minimising the impact of IPv6 neighbour discovery messages on energy consumption in small objects networks. IET Networks 7(4): 226-232 (2018) - Thomas Lagkas
, Panagiotis G. Sarigiannidis
, Paolo Bellavista
, Carlo Giannelli
:
Multi-stage resource allocation in hybrid 25G-EPON and LTE-Advanced Pro FiWi networks for 5G systems. IET Networks 7(4): 173-180 (2018) - Majd Latah
, Levent Toker:
Towards an efficient anomaly-based intrusion detection for software-defined networks. IET Networks 7(6): 453-459 (2018) - Babedi B. Letswamotse, Reza Malekian
, Chi-Yuan Chen, Kgotlaetsile Mathews Modieginyane:
Software defined wireless sensor networks and efficient congestion control. IET Networks 7(6): 460-464 (2018) - Shuo-Yen Robert Li
:
Unified theory on preservation of conditionally non-blocking switches by the two-stage interconnection network. IET Networks 7(6): 368-375 (2018) - Jiaqi Li, Zhifeng Zhao, Rongpeng Li:
Machine learning-based IDS for software-defined 5G network. IET Networks 7(2): 53-60 (2018)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-26 19:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
