Journal: IET Networks

Volume 9, Issue 6

277 -- 278. Guest Editorial: Intelligent Computing: a Promising Network Computing Paradigm
279 -- 283B. S. Shylaja, R. Bhaskar. Rough-set and machine learning-based approach for optimised virtual machine utilisation in cloud computing
284 -- 289Whai-En Chen, Chia-Hung Liu. High-performance user plane function (UPF) for the next generation core networks
290 -- 297Jianneng Chen, Zhen-Jie Huang, Yu-ping Zhou, Fumin Zou, Chien-Ming Chen, Jimmy Ming-Tai Wu, Tsu-Yang Wu. ad hoc networks
298 -- 304Yize Yang, Hong-yong Yang, Yuling Li. Finite-time convergence of group flocking for multi-agent systems with mismatched/matched disturbances
305 -- 314Dang Huynh-Van, Quan Le Trung. SD-IoTR: an SDN-based Internet of Things reprogramming framework
315 -- 325Devender Kumar, Satish Chand, Bijendra Kumar. Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps
326 -- 337Khiet Thanh Bui, Hung Dac Ho, Tran Vu Pham, Hung Cong Tran. Virtual machines migration game approach for multi-tier application in infrastructure as a service cloud computing
338 -- 347Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee. Effective spam filter based on a hybrid method of header checking and content parsing
348 -- 359Bhushan Yelure, Shefali Sonavane. ACO-IBR: a modified intersection-based routing approach for the VANET
360 -- 366Ridhima Mehta. Multi-objective design of energy harvesting enabled wireless networks based on evolutionary genetic optimisation
367 -- 371Ali Ghiasian. Impact of TCAM size on power efficiency in a network of OpenFlow switches
372 -- 377Jun Li, Xingyu He, Dan Zhao, Guisong Yang, Daojing He, Sammy Chan. Delay-aware and cost-efficient probabilistic transmission for opportunistic networks

Volume 9, Issue 5

207 -- 208. Guest Editorial: Selected Papers from the Ubiquitous Clouds and Cognitive Communication Networks (UCCCN 2019)
209 -- 214Pradeep Sudhakaran, Chidambaranathan Malathy. Authorisation, attack detection and avoidance framework for IoT devices
215 -- 222Sivaraman Eswaran, Daniel Dominic, Jayapandian Natarajan, Prasad B. Honnavalli. Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment
223 -- 228K. Sridharan, G. Komarasamy, S. Daniel Madan Raja. Hadoop framework for efficient sentiment classification using trees
229 -- 234Padakandla Chenna Praveen Kumar, Polipalli Trinatha Rao. Design of reconfigurable circularly polarised double folded inverted-L antenna with rectangular ground plane using HFSS
235 -- 246Vijayalakshmi Murugesan, S. Mercy Shalinie, Ming-Hour Yang, Raja Meenakshi U.. Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions
247 -- 254Raad S. Alhumaima, Saib Thiab Alwan, Riyadh Khlf Ahmed. Mitigating X2-AP interface cost using quantum teleportation
255 -- 261Ramachandira Moorthy Buvanesvari, Kanagaraj Suresh Joseph. RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking
262 -- 269Shuan He, Wei Wang 0015. QoE-aware Q-learning resource allocation for NOMA wireless multimedia communications
270 -- 275David Aondoakaa, John Comas, Stephen Swift. Exploiting heterogeneity for cost efficient 5G base station deployment using meta-heuristics

Volume 9, Issue 4

145 -- 155Hitesh Mohapatra, Amiya Kumar Rath. Survey on fault tolerance-based clustering evolution in WSN
156 -- 164Shun-Ping Chung, Hui-Yu Pai, Chia-Hsin Lin, Guan-Ting Lin. Performance analysis of the pending interest table in the cellular network with reservation and retrials
165 -- 169Hamza Hammami, Sadok Ben Yahia, Mohammad S. Obaidat. Scalable and efficient authentication scheme for secure smart grid communication
170 -- 179Radhika Gour, Anshul Tyagi 0001. Cluster oriented resource allocation and power optimisation for D2D network in cellular communications
180 -- 188Quynh Tu Ngo, Duc Ngoc Minh Dang, Quan Le Trung. Extreme power saving directional MAC protocol in IEEE 802.11ah networks
189 -- 199Kapil Netaji Vhatkar, Girish P. Bhole. Particle swarm optimisation with grey wolf optimisation for optimal container resource allocation in cloud
200 -- 205Hankiz Yilahun, Kudret Abdurahman, Seyyare Imam, Askar Hamdulla. Automatic extraction of Uyghur domain concepts based on multi-feature for ontology extension

Volume 9, Issue 3

95 -- 101Zhengxiong Dou, Xiaonan Wang. Ethernet-based access cloud
102 -- 109Guo-Ming Sung, Yen-Shih Shen, Chih-Ping Yu, Cheng-Syuan Jian. Two-port-two-port SI between RS485 and Ethernet with an FIFO queue for efficient PC-to-PC communication
110 -- 119Rakesh Ranjan Swain, Tirtharaj Dash, Pabitra Mohan Khilar. Lightweight approach to automated fault diagnosis in WSNs
120 -- 127Monika Roopak, Gui Yun Tian, Jonathon Chambers. Multi-objective-based feature selection for DDoS attack detection in IoT networks
128 -- 138Ehsan Kharati, Mohammad Khalily Dermany, Hamidreza Karmajani. Increasing the amount of collected data using network coding and continuous movement of mobile sinks in wireless sensor networks
139 -- 144Xian Liu. Optimisation of the duplex D2D network: a deep learning approach

Volume 9, Issue 2

43 -- 47Bhisham Sharma, Mohammad S. Obaidat. Comparative analysis of IoT based products, technology and integration of IoT with cloud computing
48 -- 55Samaneh Hoghooghi, Reza Javidan. Proposing a new method for improving RPL to support mobility in the Internet of things
56 -- 63Weijing Wang, Guoxiang Tong. Multi-path unequal clustering protocol based on ant colony algorithm in wireless sensor networks
64 -- 73V. Ramasamy, B. Gomathy, Joy Lal Sarkar, Chhabi Rani Panigrahi, Bibudhendu Pati, Abhishek Majumder. 2: an emergency management system using mobile cloud computing
74 -- 82Parimala Venkata Krishna, Vankadara Saritha, Mohammad S. Obaidat. E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems
83 -- 93Deepak Kr. Sharma, Swati Singh, Vishakha Gautam, Shubham Kumaram, Mehul Sharma, Shrid Pant. Ant Router: An efficient routing protocol for social opportunistic networks using ant routing

Volume 9, Issue 1

1 -- 6Fei Wang, Changchun Qin. Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users
7 -- 11Juan Zhao, Guihui Xie, Dongming Li, Mailing Song. Improved GMM-based method for target detection
12 -- 22R. Muthukkumar, D. Manimegalai. ad hoc networks
23 -- 28Zakia Berber, Samir Kameche, Elhadj Benkhelifa. N PLL frequency synthesiser for E-band frequency for high phase noise performance in 5G communication systems
29 -- 37Qingbo Du, Faming Yin, Zongchen Li. Base station traffic prediction using XGBoost-LSTM with feature enhancement
38 -- 42Yanli Li, Xiaonan Wang. Green content communications in 6LoWPAN