Found: 11
Select item for more details and to access through your institution.
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 377, doi. 10.1049/ntw2.12136
- By:
- Publication type:
- Article
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 528, doi. 10.1049/ntw2.12135
- By:
- Publication type:
- Article
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 513, doi. 10.1049/ntw2.12134
- By:
- Publication type:
- Article
Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM).
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 486, doi. 10.1049/ntw2.12133
- By:
- Publication type:
- Article
An effective ensemble electricity theft detection algorithm for smart grid.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 471, doi. 10.1049/ntw2.12132
- By:
- Publication type:
- Article
A detailed reinforcement learning framework for resource allocation in non‐orthogonal multiple access enabled‐B5G/6G networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 455, doi. 10.1049/ntw2.12131
- By:
- Publication type:
- Article
Configuration of multi‐shaper Time‐Sensitive Networking for industrial applications.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 434, doi. 10.1049/ntw2.12129
- By:
- Publication type:
- Article
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 339, doi. 10.1049/ntw2.12128
- By:
- Publication type:
- Article
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 546, doi. 10.1049/ntw2.12127
- By:
- Publication type:
- Article
Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 413, doi. 10.1049/ntw2.12126
- By:
- Publication type:
- Article
Disaster scenario optimised link state routing protocol and message prioritisation.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 395, doi. 10.1049/ntw2.12125
- By:
- Publication type:
- Article