


default search action
IET Networks, Volume 8
Volume 8, Number 1, 2019
- Guest Editorial: Exploring IoT Systems in Businesses: Frameworks, Use Cases, Policies, Protocols and Services. 1-2

 - Junaid Arshad

, Muhammad Ajmal Azad
, Mohammad Mahmoud Abdellatif
, Muhammad Habib Ur Rehman
, Khaled Salah:
COLIDE: a collaborative intrusion detection framework for Internet of Things. 3-14 - Hafiz Munsub Ali, Waleed Ejaz

, Daniel C. Lee, Ismail M. Khater:
Optimising the power using firework-based evolutionary algorithms for emerging IoT applications. 15-31 - Ahmed Talal Suliman

, Zainab Husain
, Menatalla Abououf
, Mansoor Alblooshi, Khaled Salah:
Monetization of IoT data using smart contracts. 32-37 - Ashraf Ahmad, Yousef S. Abu Hour

, Mahmoud H. DarAssi
:
Advance system and model to predict malicious files prorogation inside computer network. 38-47 - Said El Kafhali

, Khaled Salah:
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems. 48-58 - Sachin D. Patil

, Mohit P. Tahiliani:
Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling. 59-66 - Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam

, Anthony T. Chronopoulos
:
Agent-based ARP cache poisoning detection in switched LAN environments. 67-73 - Chai-Keong Toh, Juan-Carlos Cano

, Carlos Fernandez-Laguia, Pietro Manzoni, Carlos T. Calafate
:
Wireless digital traffic signs of the future. 74-78 
Volume 8, Number 2, 2019
- Majd Latah

, Levent Toker:
Artificial intelligence enabled software-defined networking: a comprehensive overview. 79-99 - Krishnan Sakthidasan, Natarajan Vasudevan, Paramesvarane Kumara Guru Diderot, Chellakkutti Kadhiravan:

WOAPR: an affinity propagation based clustering and optimal path selection for time-critical wireless sensor networks. 100-106 - Chunjiong Zhang

, Tao Xie, Kai Yang, Hui Ma, Yuxia Xie, Yueyao Xu, Pan Luo:
Positioning optimisation based on particle quality prediction in wireless sensor networks. 107-113 - Douglas Comer, Rajas H. Karandikar:

DCnet: a data centre network architecture that supports live VM migration. 114-125 - Ashkan Moradi

, Vahid Shah-Mansouri:
Opportunistic content dissemination in mobile social networks via adjustment of user selfishness. 126-137 - Majid Jamali, Ali Ghiasian

:
Randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic. 138-142 
Volume 8, Number 3, 2019
- Guest Editorial: Special Issue on Edge Network Computing for Big Data Systems over Internet of Things. 143-144

 - Zaijian Wang, Shiwen Mao, Weidong Yang:

Deep learning approach to multimedia traffic classification based on QoS characteristics. 145-154 - Aparna Kumari

, Sudeep Tanwar
, Sudhanshu Tyagi
, Neeraj Kumar
:
Verification and validation techniques for streaming big data analytics in internet of things environment. 155-163 - Luis Alexandre da Silva

, Kelton A. P. da Costa
, João P. Papa, Gustavo H. Rosa
, Victor Hugo C. de Albuquerque
:
Fine-tuning restricted Boltzmann machines using quaternions and its application for spam detection. 164-168 - Ahilan Appathurai, Gunasekaran Manogaran, Naveen K. Chilamkurti:

Trusted FPGA-based transport traffic inject, impersonate (I2) attacks beaconing in the Internet of Vehicles. 169-178 - Yi-Bing Lin, Min-Zheng Shieh

, Yun-Wei Lin:
DormTalk: edge computing for the dormitory applications on campus. 179-186 - Ruijin Ma, Huisheng Zhang:

Channel estimation for massive multiple-input and multiple-output system based on different measurement matrices. 187-194 - Yun-Wei Lin, Yi-Bing Lin, Chun-You Liu:

AItalk: a tutorial to implement AI as IoT devices. 195-202 - Sankalita Biswas, Sanjay Dhar Roy

, Aniruddha Chandra
:
Single CCA for IEEE 802.15.4 networks: a cross layer energy model. 203-210 - Girraj Sharma

, Ritu Sharma:
Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception. 211-217 
Volume 8, Number 4, 2019
- Sibi Chakkaravarthy Sethuraman, Sangeetha Dhamodaran

, Vaidehi Vijayakumar:
Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. 219-232 - Ghurumuruhan Ganesan:

Random access networks with separable schemes. 233-238 - Nan Wang, Hai Zhao, Long Hai:

Distributed routing algorithm with dynamic connection partition for mobile ad hoc networks. 239-245 - Naser Al-Falahy

, Omar Alani
:
Coverage and capacity improvement of millimetre wave 5G network using distributed base station architecture. 246-255 - Ramakrishnan Sethuraman

, Subrat Kar, Selvamuthu Dharmaraja
:
Analysis of traffic offload using multi-attribute decision making technique in heterogeneous shared networks. 256-263 - Kshira Sagar Sahoo

, Bibhudatta Sahoo
:
CAMD: a switch migration based load balancing framework for software defined networks. 264-271 - Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh

, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. 272-279 - Sanjeev Patel

:
Sensitivity analysis of queue-based AQM over network parameters. 280-288 
Volume 8, Number 5, 2019
- Tanmoy Maitra

, Mohammad S. Obaidat, Debasis Giri
, Subrata Dutta
, Keshav P. Dahal
:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. 289-298 - Rna Ghallab

, Mona Shokair, Atef E. Abou-El-azm
, Ali A. Sakr, Waleed Saad
, Ahmed Naguib:
Performance enhancement using multiple-input multiple-output (MIMO) electronic relay in massive MIMO cellular networks. 299-306 - Shrayan Das, Kirtan Gopal Panda, Debarati Sen, Wasim Arif

:
Risk-aware last-minute data backup in inter-datacenter networks. 307-320 - Muhammad Khalid

, Farah Ahmad, Muhammad Arshad, Waqar Khalid, Naveed Ahmad, Yue Cao
:
E2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks. 321-328 - Qinqin Tang, Renchao Xie, Tao Huang

, Yunjie Liu:
Jointly caching and computation resource allocation for mobile edge networks. 329-338 - Nan Wang, Hai Zhao, Long Hai:

Shortest-path-based back-pressure routing with single-FIFO queueing in ad hoc networks'. 339-345 
Volume 8, Number 6, 2019
- Mpho C. Nkosi, Lusani Mamushiane, Albert A. Lysko

, David L. Johnson, Andries P. Engelbrecht:
Towards programmable on-demand lightpath services: current state-of-the-art and open research areas. 347-355 - Ibrahim S. Alsukayti

, Mohammed Alreshoodi
:
Toward an understanding of recent developments in RPL routing. 356-366 - Munirathinam Nirmala

, Madda Rajasekhara Babu:
Fuzzy-based fake information detection algorithm to define the user trust on the content of social networks. 367-371 - Ghulam Abbas

, Usman Raza, Zahid Halim
, Kashif Kifayat
:
ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet. 372-380 - Mohammadhasan Miri

, Kamal Mohamedpour, Yousef Darmani
, Mahasweta Sarkar:
DIAMOND: a distributed algorithm for vertex coloring problems and resource allocation. 381-389 - Nagesha Shivappa

, Sunilkumar S. Manvi:
Fuzzy-based cluster head selection and cluster formation in wireless sensor networks. 390-397 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














