Journal: IET Networks

Volume 7, Issue 5

281 -- 282. Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT)
283 -- 286Jiajia Song, Jinbo Zhang, Xinnan Fan. ad-hoc network
287 -- 293Manjula Raja, Raja Datta. Efficient aggregation technique for data privacy in wireless sensor networks
294 -- 298Mohamed Boussif, Noureddine Aloui, Adnene Cherif. Secured cloud computing for medical data based on watermarking and encryption
299 -- 305Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang. Potential threats mining methods based on correlation analysis of multi-type logs
306 -- 312Ainaz Bahramlou, Reza Javidan. Adaptive timing model for improving routing and data aggregation in Internet of things networks using RPL
313 -- 320Rajavel Dhandabani, Shantharajah S. Periyasamy, Theagarajan Padma, Arun Kumar Sangaiah. Six-face cubical key encryption and decryption based on product cipher using hybridisation and Rubik's cubes
321 -- 327Philip O'Kane, Sakir Sezer, Domhnall Carlin. Evolution of ransomware
328 -- 335Thomas I. Tegou, Antonios Tsiflikiotis, Dimitrios D. Vergados, Katherine Siakavara, Spiros Nikolaidis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis, Mohammad S. Obaidat. Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation
336 -- 345Mahsa Derakhshani, Saeedeh Parsaeefard, Tho Le-Ngoc, Alberto Leon-Garcia. Leveraging synergy of SDWN and multi-layer resource management for 5G networks
346 -- 352Mohammad Al-Hisnawi, Mahmood Ahmadi. QCF for deep packet inspection
353 -- 361Habib Mostafaei, Mohammad S. Obaidat. Learning automaton-based self-protection algorithm for wireless sensor networks