Journal: IET Networks

Volume 13, Issue 5-6

339 -- 376Ziadoon Kamil Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif. Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
377 -- 394Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel. Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method
395 -- 412Umar Aliyu, Haifa Takruri, Martin Hope, Abubakar Gidado Halilu, Hamid Abubakar Adamu. Disaster scenario optimised link state routing protocol and message prioritisation
413 -- 433Nada Alsalmi, K. Navaie, H. Rahmani. Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach
434 -- 454Paul Pop, Konstantinos Alexandris, Tongtong Wang. Configuration of multi-shaper Time-Sensitive Networking for industrial applications
455 -- 470Nouri Omheni, Anis Amiri, Faouzi Zarai. A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks
471 -- 485Chun-Wei Tsai, Chi-Tse Lu, Chun-hua Li, Shuo-Wen Zhang. An effective ensemble electricity theft detection algorithm for smart grid
486 -- 512Ana Catarina Grilo, Pedro Oliveira, Rui Valadas. Hard-state Protocol Independent Multicast - Source-Specific Multicast (HPIM-SSM)
513 -- 527Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan 0001, Balasubramaniyan Chandrasekaran. An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks
528 -- 545Alireza Etaati, Mostafa Bastam, Ehsan Ataie. Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management
546 -- 559Kuan-Chu Lu, I-Hsien Liu, Zong-Chao Liu, Jung-Shian Li. Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system

Volume 13, Issue 4

271 -- 279Habib Ullah Manzoor, Sanaullah Manzoor, Muhammad Ali Jamshed, Tareq Manzoor. Leveraging InGaN solar cells for visible light communication reception
280 -- 290Hatem Fetoh, Khaled M. Amin, Ahmed M. Hamad. Packets distribution over asymmetric paths using concurrent multipath transfer
291 -- 300Asad Ali Malik, Muhammad Ali Jamshed, Ali Nauman, Adeel Iqbal, Atif Shakeel, Riaz Hussain. Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks
301 -- 312Deva Priya Isravel, Salaja Silas, G. Jaspher Willsie Kathrine, Elijah Blessing Rajsingh, Andrew J 0001. Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications
313 -- 323Wenbo Wang, Peng Yi, Huikai Xu. A PU-learning based approach for cross-site scripting attacking reality detection
324 -- 337Shakir Salman Ahmad, Hamed S. Al-Raweshidy, Rajagopal Nilavalan. Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement

Volume 13, Issue 3

199 -- 207Guoxin Xu, Jiawen Zhao, Xuehe Wang. Wireless sensing charging based on multi-drone cooperation
208 -- 220Sihem Benfriha, Nabila Labraoui, Radjaa Bensaid, Haythem Bany Salameh, Hafida Saidi. FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks
221 -- 240Kenneth Nsafoa-Yeboah, Eric Tutu Tchao, Benjamin Kommey, Andrew Selasi Agbemenu, Griffith Selorm Klogo, Nana Kwadwo Akrasi-Mensah. Flexible open network operating system architecture for implementing higher scalability using disaggregated software-defined optical networking
241 -- 248Xavier Gomes, João Fonseca, Rui Valadas. Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies
249 -- 261Xiaoying Huang. Hardware nanosecond-precision timestamping for line-rate packet capture
262 -- 269Wei Liang 0002, Jiankang Zhang, Dawei Wang 0001, Lixin Li, Soon Xin Ng. NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks

Volume 13, Issue 2

0 -- 0Kuan-Chu Lu, I-Hsien Liu, Keng-hao Chang, Jung-Shian Li. Cover Image
111 -- 114Michael D. Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Maaiuf Rabie. Guest Editorial: Special issue on network/traffic optimisation towards 6G network
115 -- 128Vipin Balyan. Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access
129 -- 146Kuan-Chu Lu, I-Hsien Liu, Keng-hao Chang, Jung-Shian Li. VoWi-Fi security threats: Address resolution protocol attack and countermeasures
147 -- 164A. Samson Arun Raj, S. Basil Xavier, Jaspher Willsie Kathrine Gnanaraj, Salaja Silas, Andrew J 0001. A constructive airborne-ground matrix algorithm for modern telecommunication systems
165 -- 177Abdulbasit M. A. Sabaawi, Mohammed R. Almasaoodi, Sara El Gaily, Sándor Imre. Energy efficiency optimisation in massive multiple-input, multiple-output network for 5G applications using new quantum genetic algorithm
178 -- 191Yaning Wang, Hui Zhi. Virtual network embedding method based on node delay perception
192 -- 198Ren Ming, Zhang Rong. Low complexity resource allocation scheme for IRS-assisted downlink non-orthogonal multiple access systems

Volume 13, Issue 1

1 -- 12Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath. Vasicek and Van Es entropy-based spectrum sensing for cognitive radios
13 -- 27Ahmed M. Jasim, Hamed S. Al-Raweshidy. Optimal intelligent edge-servers placement in the healthcare field
28 -- 44Mohammad Arafah, Iain Phillips, Asma Adnane. Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection
45 -- 57Ya Li, Yu Zhang, Xinji Tian, Ruipeng Liu. Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network
58 -- 65R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Md. Akhtaruzzaman. Cross layer protocol architecture for spectrum-based routing in cognitive radio networks
66 -- 110Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig. A beginner's guide to infrastructure-less networking concepts