Journal: IET Networks

Volume 13, Issue 5-6

339 -- 376Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif. Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
377 -- 394Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel. Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method
395 -- 412Umar Aliyu, Haifa Takruri, Martin Hope, Abubakar Gidado Halilu, Hamid Abubakar Adamu. Disaster scenario optimised link state routing protocol and message prioritisation
413 -- 433Nada Alsalmi, K. Navaie, H. Rahmani. Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach
434 -- 454Paul Pop, Konstantinos Alexandris, Tongtong Wang. Configuration of multi-shaper Time-Sensitive Networking for industrial applications
455 -- 470Nouri Omheni, Anis Amiri, Faouzi Zarai. A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks
471 -- 485Chun-Wei Tsai, Chi-Tse Lu, Chun-hua Li, Shuo-Wen Zhang. An effective ensemble electricity theft detection algorithm for smart grid
486 -- 512Ana Catarina Grilo, Pedro Oliveira, Rui Valadas. Hard-state Protocol Independent Multicast - Source-Specific Multicast (HPIM-SSM)
513 -- 527Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan 0001, Balasubramaniyan Chandrasekaran. An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks
528 -- 545Alireza Etaati, Mostafa Bastam, Ehsan Ataie. Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management
546 -- 559Kuan-Chu Lu, I-Hsien Liu, Zong-Chao Liu, Jung-Shian Li. Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system