Journal: IET Networks

Volume 8, Issue 6

347 -- 355Mpho C. Nkosi, Lusani Mamushiane, Albert A. Lysko, David L. Johnson 0001, Andries P. Engelbrecht. Towards programmable on-demand lightpath services: current state-of-the-art and open research areas
356 -- 366Ibrahim S. Alsukayti, Mohammed Alreshoodi. Toward an understanding of recent developments in RPL routing
367 -- 371Munirathinam Nirmala, Rajasekhara Babu Madda. Fuzzy-based fake information detection algorithm to define the user trust on the content of social networks
372 -- 380Ghulam Abbas, Usman Raza, Zahid Halim, Kashif Kifayat. ARCH: A dual-mode fairness-driven AQM for promoting cooperative behaviour in best effort Internet
381 -- 389Mohammadhasan Miri, Kamal Mohamedpour, Yousef Darmani, Mahasweta Sarkar. DIAMOND: a distributed algorithm for vertex coloring problems and resource allocation
390 -- 397Nagesha Shivappa, Sunilkumar S. Manvi. Fuzzy-based cluster head selection and cluster formation in wireless sensor networks

Volume 8, Issue 5

289 -- 298Tanmoy Maitra, Mohammad S. Obaidat, Debasis Giri, Subrata Dutta, Keshav P. Dahal. ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications
299 -- 306Rna Ghallab, Mona Shokair, Atef E. Abou-El-azm, Ali A. Sakr, Waleed Saad, Ahmed Naguib. Performance enhancement using multiple-input multiple-output (MIMO) electronic relay in massive MIMO cellular networks
307 -- 320Shrayan Das, Kirtan Gopal Panda, Debarati Sen, Wasim Arif. Risk-aware last-minute data backup in inter-datacenter networks
321 -- 328Muhammad Khalid, Farah Ahmad, Muhammad Arshad 0001, Waqar Khalid, Naveed Ahmad, Yue Cao 0002. 2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks
329 -- 338Qinqin Tang, Renchao Xie, Tao Huang 0005, Yunjie Liu. Jointly caching and computation resource allocation for mobile edge networks
339 -- 345Nan Wang, Hai Zhao, Long Hai. ad hoc networks'

Volume 8, Issue 4

219 -- 232Sibi Chakkaravarthy Sethuraman, Sangeetha Dhamodaran, Vaidehi Vijayakumar. Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks
233 -- 238Ghurumuruhan Ganesan. Random access networks with separable schemes
239 -- 245Nan Wang, Hai Zhao, Long Hai. ad hoc networks
246 -- 255Naser Al-Falahy, Omar Alani. Coverage and capacity improvement of millimetre wave 5G network using distributed base station architecture
256 -- 263Ramakrishnan Sethuraman, Subrat Kar, Selvamuthu Dharmaraja. Analysis of traffic offload using multi-attribute decision making technique in heterogeneous shared networks
264 -- 271Kshira Sagar Sahoo, Bibhudatta Sahoo. CAMD: a switch migration based load balancing framework for software defined networks
272 -- 279Sanjay Kumar Dhurandher, Isaac Woungang, Jagdeep Singh, Satya Jyoti Borah. Energy aware routing for efficient green communication in opportunistic networks
280 -- 288Sanjeev Patel. Sensitivity analysis of queue-based AQM over network parameters

Volume 8, Issue 3

143 -- 144. Guest Editorial: Special Issue on Edge Network Computing for Big Data Systems over Internet of Things
145 -- 154Zaijian Wang, Shiwen Mao, Weidong Yang. Deep learning approach to multimedia traffic classification based on QoS characteristics
155 -- 163Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar 0001. Verification and validation techniques for streaming big data analytics in internet of things environment
164 -- 168Luis Alexandre da Silva, Kelton A. P. da Costa, João P. Papa, Gustavo H. Rosa, Victor Hugo C. de Albuquerque. Fine-tuning restricted Boltzmann machines using quaternions and its application for spam detection
169 -- 178Ahilan Appathurai, Gunasekaran Manogaran, Naveen Chilamkurti. 2) attacks beaconing in the Internet of Vehicles
179 -- 186Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin. DormTalk: edge computing for the dormitory applications on campus
187 -- 194Ruijin Ma, Huisheng Zhang. Channel estimation for massive multiple-input and multiple-output system based on different measurement matrices
195 -- 202Yun-Wei Lin, Yi-Bing Lin, Chun-You Liu. AItalk: a tutorial to implement AI as IoT devices
203 -- 210Sankalita Biswas, Sanjay Dhar Roy, Aniruddha Chandra. Single CCA for IEEE 802.15.4 networks: a cross layer energy model
211 -- 217Girraj Sharma, Ritu Sharma. Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception

Volume 8, Issue 2

79 -- 99Majd Latah, Levent Toker. Artificial intelligence enabled software-defined networking: a comprehensive overview
100 -- 106Krishnan Sakthidasan, Natarajan Vasudevan, Paramesvarane Kumara Guru Diderot, Chellakkutti Kadhiravan. WOAPR: an affinity propagation based clustering and optimal path selection for time-critical wireless sensor networks
107 -- 113Chunjiong Zhang, Tao Xie, Kai Yang, Hui Ma, Yuxia Xie, Yueyao Xu, Pan Luo. Positioning optimisation based on particle quality prediction in wireless sensor networks
114 -- 125Douglas E. Comer, Rajas H. Karandikar. DCnet: a data centre network architecture that supports live VM migration
126 -- 137Ashkan Moradi, Vahid Shah-Mansouri. Opportunistic content dissemination in mobile social networks via adjustment of user selfishness
138 -- 142Majid Jamali, Ali Ghiasian. Randomised scheduling algorithm for virtual output queuing switch at the presence of non-uniform traffic

Volume 8, Issue 1

1 -- 2. Guest Editorial: Exploring IoT Systems in Businesses: Frameworks, Use Cases, Policies, Protocols and Services
3 -- 14Junaid Arshad, Muhammad Ajmal Azad, Mohammad Mahmoud Abdellatif, Muhammad Habib Ur Rehman, Khaled Salah. COLIDE: a collaborative intrusion detection framework for Internet of Things
15 -- 31Hafiz Munsub Ali, Waleed Ejaz, Daniel C. Lee 0001, Ismail M. Khater. Optimising the power using firework-based evolutionary algorithms for emerging IoT applications
32 -- 37Ahmed Suliman, Zainab Husain, Menatallah Abououf, Mansoor Alblooshi, Khaled Salah. Monetization of IoT data using smart contracts
38 -- 47Ashraf Ahmad, Yousef S. Abu Hour, Mahmoud H. DarAssi. Advance system and model to predict malicious files prorogation inside computer network
48 -- 58Said El Kafhali, Khaled Salah. Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems
59 -- 66Sachin D. Patil, Mohit P. Tahiliani. Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling
67 -- 73Daniyal Sakhawat, Abdul Nasir Khan, Mudassar Aslam, Anthony T. Chronopoulos. Agent-based ARP cache poisoning detection in switched LAN environments
74 -- 78Chai-Keong Toh, Juan-Carlos Cano, Carlos Fernandez-Laguia, Pietro Manzoni, Carlos T. Calafate. Wireless digital traffic signs of the future