


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2019
- Ghulam Abbas
, Usman Raza, Zahid Halim
, Kashif Kifayat
:
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet. IET Networks 8(6): 372-380 (2019) - Ashraf Ahmad, Yousef S. Abu Hour
, Mahmoud H. DarAssi
:
Advance system and model to predict malicious files prorogation inside computer network. IET Networks 8(1): 38-47 (2019) - Naser Al-Falahy
, Omar Alani
:
Coverage and capacity improvement of millimetre wave 5G network using distributed base station architecture. IET Networks 8(4): 246-255 (2019) - Hafiz Munsub Ali, Waleed Ejaz
, Daniel C. Lee, Ismail M. Khater:
Optimising the power using firework-based evolutionary algorithms for emerging IoT applications. IET Networks 8(1): 15-31 (2019) - Ibrahim S. Alsukayti
, Mohammed Alreshoodi
:
Toward an understanding of recent developments in RPL routing. IET Networks 8(6): 356-366 (2019) - Ahilan Appathurai, Gunasekaran Manogaran, Naveen K. Chilamkurti:
Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles. IET Networks 8(3): 169-178 (2019) - Junaid Arshad
, Muhammad Ajmal Azad
, Mohammad Mahmoud Abdellatif
, Muhammad Habib Ur Rehman
, Khaled Salah:
COLIDE: a collaborative intrusion detection framework for Internet of Things. IET Networks 8(1): 3-14 (2019) - Sankalita Biswas, Sanjay Dhar Roy
, Aniruddha Chandra
:
Single CCA for IEEE 802.15.4 networks: a cross layer energy model. IET Networks 8(3): 203-210 (2019) - Douglas Comer, Rajas H. Karandikar:
DCnet: a data centre network architecture that supports live VM migration. IET Networks 8(2): 114-125 (2019) - Shrayan Das, Kirtan Gopal Panda, Debarati Sen, Wasim Arif
:
Risk-aware last-minute data backup in inter-datacenter networks. IET Networks 8(5): 307-320 (2019) - Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh
, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. IET Networks 8(4): 272-279 (2019) - Ghurumuruhan Ganesan:
Random access networks with separable schemes. IET Networks 8(4): 233-238 (2019) - Rna Ghallab
, Mona Shokair, Atef E. Abou-El-azm
, Ali A. Sakr, Waleed Saad
, Ahmed Naguib:
Performance enhancement using multiple-input multiple-output (MIMO) electronic relay in massive MIMO cellular networks. IET Networks 8(5): 299-306 (2019) - Majid Jamali, Ali Ghiasian
:
Randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic. IET Networks 8(2): 138-142 (2019) - Said El Kafhali
, Khaled Salah:
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems. IET Networks 8(1): 48-58 (2019) - Muhammad Khalid
, Farah Ahmad, Muhammad Arshad, Waqar Khalid, Naveed Ahmad, Yue Cao
:
E2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks. IET Networks 8(5): 321-328 (2019) - Aparna Kumari
, Sudeep Tanwar
, Sudhanshu Tyagi
, Neeraj Kumar
:
Verification and validation techniques for streaming big data analytics in internet of things environment. IET Networks 8(3): 155-163 (2019) - Majd Latah
, Levent Toker:
Artificial intelligence enabled software-defined networking: a comprehensive overview. IET Networks 8(2): 79-99 (2019) - Yun-Wei Lin, Yi-Bing Lin, Chun-You Liu:
AItalk: a tutorial to implement AI as IoT devices. IET Networks 8(3): 195-202 (2019) - Yi-Bing Lin, Min-Zheng Shieh
, Yun-Wei Lin:
DormTalk: edge computing for the dormitory applications on campus. IET Networks 8(3): 179-186 (2019) - Ruijin Ma, Huisheng Zhang:
Channel estimation for massive multiple-input and multiple-output system based on different measurement matrices. IET Networks 8(3): 187-194 (2019) - Tanmoy Maitra
, Mohammad S. Obaidat, Debasis Giri
, Subrata Dutta
, Keshav P. Dahal
:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. IET Networks 8(5): 289-298 (2019) - Mohammadhasan Miri
, Kamal Mohamedpour, Yousef Darmani
, Mahasweta Sarkar:
DIAMOND: a distributed algorithm for vertex coloring problems and resource allocation. IET Networks 8(6): 381-389 (2019) - Ashkan Moradi
, Vahid Shah-Mansouri:
Opportunistic content dissemination in mobile social networks via adjustment of user selfishness. IET Networks 8(2): 126-137 (2019) - Munirathinam Nirmala
, Madda Rajasekhara Babu:
Fuzzy-based fake information detection algorithm to define the user trust on the content of social networks. IET Networks 8(6): 367-371 (2019) - Mpho C. Nkosi, Lusani Mamushiane, Albert A. Lysko
, David L. Johnson, Andries P. Engelbrecht:
Towards programmable on-demand lightpath services: current state-of-the-art and open research areas. IET Networks 8(6): 347-355 (2019) - Sanjeev Patel
:
Sensitivity analysis of queue-based AQM over network parameters. IET Networks 8(4): 280-288 (2019) - Sachin D. Patil
, Mohit P. Tahiliani:
Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling. IET Networks 8(1): 59-66 (2019) - Kshira Sagar Sahoo
, Bibhudatta Sahoo
:
CAMD: a switch migration based load balancing framework for software defined networks. IET Networks 8(4): 264-271 (2019) - Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam
, Anthony T. Chronopoulos
:
Agent-based ARP cache poisoning detection in switched LAN environments. IET Networks 8(1): 67-73 (2019)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-07 04:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint