


default search action
IET Networks, Volume 13
Volume 13, Number 1, January 2024
ORIGINAL RESEARCH
- Sutapa Sarkar

, R. Muralishankar
, Sanjeev Gurugopinath
:
Vasicek and Van Es entropy-based spectrum sensing for cognitive radios. 1-12 - Ahmed M. Jasim

, Hamed S. Al-Raweshidy:
Optimal intelligent edge-servers placement in the healthcare field. 13-27 - Mohammad Arafah

, Iain W. Phillips, Asma Adnane:
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection. 28-44 - Ya Li, Yu Zhang

, Xinji Tian, Ruipeng Liu:
Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network. 45-57 - R. Sri Uma Suseela

, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti
, Md. Akhtaruzzaman
:
Cross layer protocol architecture for spectrum-based routing in cognitive radio networks. 58-65
PERSPECTIVE
- Anna Förster

, Jens Dede
, Andreas Könsgen
, Koojana Kuladinithi
, Vishnupriya Kuppusamy
, Andreas Timm-Giel
, Asanga Udugama
, Andreas Willig
:
A beginner's guide to infrastructure-less networking concepts. 66-110
Volume 13, Number 2, March 2024
COVER IMAGE
- Kuan-Chu Lu, I-Hsien Liu

, Keng-Hao Chang, Jung-Shian Li
:
Cover Image. i
NETWORK/TRAFFIC OPTIMIZATION TOWARDS 6G NETWORK
- Michael D. Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Maaiuf Rabie:

Guest Editorial: Special issue on network/traffic optimisation towards 6G network. 111-114 - Vipin Balyan

:
Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access. 115-128 - Kuan-Chu Lu, I-Hsien Liu

, Keng-Hao Chang, Jung-Shian Li
:
VoWi-Fi security threats: Address resolution protocol attack and countermeasures. 129-146
ORIGINAL RESEARCH
- A. Samson Arun Raj

, S. Basil Xavier, Jaspher Willsie Kathrine Gnanaraj
, Salaja Silas
, Andrew J.
:
A constructive airborne-ground matrix algorithm for modern telecommunication systems. 147-164 - Abdulbasit M. A. Sabaawi

, Mohammed R. Almasaoodi
, Sara El Gaily, Sándor Imre
:
Energy efficiency optimisation in massive multiple-input, multiple-output network for 5G applications using new quantum genetic algorithm. 165-177 - Yaning Wang

, Hui Zhi:
Virtual network embedding method based on node delay perception. 178-191 - Ren Ming

, Zhang Rong:
Low complexity resource allocation scheme for IRS-assisted downlink non-orthogonal multiple access systems. 192-198
Volume 13, Number 3, May 2024
ORIGINAL RESEARCH
- Guoxin Xu, Jiawen Zhao, Xuehe Wang

:
Wireless sensing charging based on multi-drone cooperation. 199-207 - Sihem Benfriha

, Nabila Labraoui
, Radjaa Bensaid
, Haythem Bany Salameh, Hafida Saidi:
FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks. 208-220 - Kenneth Nsafoa-Yeboah, Eric Tutu Tchao

, Benjamin Kommey
, Andrew Selasi Agbemenu
, Griffith Selorm Klogo, Nana Kwadwo Akrasi-Mensah:
Flexible open network operating system architecture for implementing higher scalability using disaggregated software-defined optical networking. 221-240 - Xavier Gomes, João Fonseca, Rui Valadas

:
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies. 241-248 - Xiaoying Huang

:
Hardware nanosecond-precision timestamping for line-rate packet capture. 249-261
CASE STUDY
- Wei Liang

, Jian-Kang Zhang
, Dawei Wang, Lixin Li, Soon Xin Ng
:
NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks. 262-269
Volume 13, Number 4, July 2024
Original Research
- Habib Ullah Manzoor

, Sanaullah Manzoor
, Muhammad Ali Jamshed
, Tareq Manzoor:
Leveraging InGaN solar cells for visible light communication reception. 271-279 - Hatem Fetoh

, Khaled M. Amin, Ahmed M. Hamad:
Packets distribution over asymmetric paths using concurrent multipath transfer. 280-290 - Asad Ali Malik, Muhammad Ali Jamshed

, Ali Nauman
, Adeel Iqbal
, Atif Shakeel, Riaz Hussain:
Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks. 291-300 - Deva Priya Isravel, Salaja Silas

, G. Jaspher Willsie Kathrine, Elijah Blessing Rajsingh, Andrew J.
:
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications. 301-312 - Wenbo Wang

, Peng Yi, Huikai Xu:
A PU-learning based approach for cross-site scripting attacking reality detection. 313-323
Virtual Collection on Edge Intelligence for Next Generation Industrial IoT Applications
- Shakir Salman Ahmad

, Hamed S. Al-Raweshidy, Rajagopal Nilavalan:
Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement. 324-337
Volume 13, Numbers 5-6, 2024
- Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander

, Robiah Yusof, Abdu Saif:
Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges. 339-376 - Moawiah El-Dalahmeh

, Adi El-Dalahmeh
, Usman Adeel:
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method. 377-394 - Umar Aliyu

, Haifa Takruri, Martin Hope, Abubakar Gidado Halilu
, Hamid Abubakar Adamu:
Disaster scenario optimised link state routing protocol and message prioritisation. 395-412 - Nada Alsalmi

, Keivan Navaie
, H. Rahmani
:
Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach. 413-433 - Paul Pop

, Konstantinos Alexandris, Tongtong Wang:
Configuration of multi-shaper Time-Sensitive Networking for industrial applications. 434-454 - Nouri Omheni

, Anis Amiri, Faouzi Zarai:
A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks. 455-470 - Chun-Wei Tsai

, Chi-Tse Lu, Chun-hua Li, Shuo-Wen Zhang:
An effective ensemble electricity theft detection algorithm for smart grid. 471-485 - Ana Catarina Grilo, Pedro Oliveira, Rui Valadas

:
Hard-state Protocol Independent Multicast - Source-Specific Multicast (HPIM-SSM). 486-512 - Monika Roopak

, Simon Parkinson
, Gui Yun Tian, Yachao Ran
, Saad Khan
, Balasubramaniyan Chandrasekaran:
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks. 513-527 - Alireza Etaati, Mostafa Bastam

, Ehsan Ataie
:
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management. 528-545 - Kuan-Chu Lu, I-Hsien Liu

, Zong-Chao Liu, Jung-Shian Li
:
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system. 546-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














