


default search action
IEEE Networking Letters, Volume 4
Volume 4, Number 1, March 2022
- Yuting Guo, Xin Liu

, Xueying Liu, Tariq S. Durrani
:
Energy-Efficient Resource Allocation for Simultaneous Wireless Information and Power Transfer in GFDM Cooperative Communications. 1-5 - Miroslav Mitev

, M. Majid Butt
, Philippe Sehier
, Arsenia Chorti
, Luca Rose, Arto Lehti
:
Smart Link Adaptation and Scheduling for IIoT. 6-10 - Abd Ullah Khan

, Ghulam Abbas
, Ziaul Haq Abbas
, Wali Ullah Khan
:
On Reliable Key Performance Indicators in Cognitive Radio Networks. 11-15 - Xiaonan Wang

, Yimi Lu
, Zhanyu Wang, Feng Li:
Data Pushing Framework in NDN-Enabled IoT. 16-19 - Li-Zhuang Tan

, Wei Su
, Jingying Miao, Wei Zhang
:
FindINT: Detect and Locate the Lost in-Band Network Telemetry Packet. 20-24 - Ying Wan

, Haoyu Song
, Bin Liu
:
GreedyJump: A Fast TCAM Update Algorithm. 25-29 - Leonardo Badia

:
Impact of Transmission Cost on Age of Information at Nash Equilibrium in Slotted ALOHA. 30-33 - Ray-Guang Cheng

, Chi-Ming Yang
, Bariq S. Firmansyah, Ruki Harwahyu
:
Uplink OFDMA-Based Random Access Mechanism With Bursty Arrivals for IEEE 802.11ax Systems. 34-38 - Yan Zhang, Tian Pan, Yan Zheng, Minglan Gao, Houtian Wang, Tao Huang, Yunjie Liu:

Automating Rapid Network Anomaly Detection With In-Band Network Telemetry. 39-42 - Dimitris Tsolkas

, Harilaos Koumaras
:
On the Development and Provisioning of Vertical Applications in the Beyond 5G Era. 43-47 - Katsuki Isobe

, Daishi Kondo
, Hideki Tode:
Privacy Concerns From Single-Word Search Query Leakage From Web Browsers Through DNS. 48-52 - IEEE Networking Letters Author Guidelines. 53-54

Volume 4, Number 2, June 2022
- Xingwang Li

, Zhen Xie
, Gaojian Huang
, Jianhua Zhang
, Ming Zeng
, Zheng Chu
:
Sum Rate Maximization for RIS-Aided NOMA With Direct Links. 55-58 - Deepika Saxena

, Ashutosh Kumar Singh
:
An Intelligent Traffic Entropy Learning-Based Load Management Model for Cloud Networks. 59-63 - Aqsa Ashraf Makhdomi

, Gh. Rasool Begh
:
Energy Efficient Distributed Spectrum Sensing in Presence of Malicious Users. 64-67 - Monireh Allah Gholi Ghasri

, Ali Mohammad Afshin Hemmatyar
:
A Generalized Framework for Joint Dynamic Optimal RF Interface Setting and Next-Hop Selection in IoT Networks With Similar Requests. 68-72 - Gourish Goudar

, Suvadip Batabyal
:
Estimating Buffer Occupancy sans Message Exchange in Mobile Opportunistic Networks. 73-77 - Dinh Duc Nha Nguyen

, Keshav Sood
, Mohammad Reza Nosouhi
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
:
RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory. 78-81 - Mohammed A. Jasim

, Nazli Siasi
, Mohamed Rahouti
, Nasir Ghani
:
SFC Provisioning With Load Balancing Method in Multi-Tier Fog Networks. 82-86 - Vineeth Bala Sukumaran, Reuben Chacko Thomas

:
On the Average Age-of-Information for Hybrid Multiple Access Protocols. 87-91 - Federico Chiariotti

, Anders E. Kalør
, Josefine Holm
, Beatriz Soret
, Petar Popovski
:
Scheduling of Sensor Transmissions Based on Value of Information for Summary Statistics. 92-96
Volume 4, Number 3, September 2022
- Omid Moghimi Kandelusy

, Nicholas J. Kirsch
:
Full-Duplex Buffer-Aided MIMO Relaying Networks: Joint Antenna Selection and Rate Allocation Based on Buffer Status. 99-103 - Zeeshan Kaleem

, Ayaz Ahmad, Omer Chughtai, Joel J. P. C. Rodrigues
:
Enhanced Max-Min Rate of Users in UAV-Assisted Emergency Networks Using Reinforcement Learning. 104-107 - Sachin Sharma

, Avishek Nag
, Byrav Ramamurthy
:
Cross-Atlantic Experiments on EU-US Test-Beds. 108-112 - Zongshen Wu

, Chin-Ya Huang
, Parameswaran Ramanathan:
Measuring Millimeter Wave Based Link Bandwidth Fluctuations During Indoor Immersive Experience. 113-117 - Tadege Mihretu Ayenew

, Dionysis Xenakis
, Luis Alonso
, Nikos I. Passas, Lazaros F. Merakos:
Demand-Aware Cooperative Content Caching in 5G/6G Networks With MEC-Enabled Edges. 118-122 - Kensuke Shibata, Shusuke Narieda

, Hiroshi Naruse:
Throughput Estimation of WLAN in Multiple Channels Using a Software Based Packet Analyzer. 123-126 - Vikas Kumar

, Mithun Mukherjee
, Jaime Lloret
, Qi Zhang
, Mamta Kumari
:
Delay-Optimal and Incentive-Aware Computation Offloading for Reconfigurable Intelligent Surface-Assisted Mobile Edge Computing. 127-131 - Xiyu Lv

, Shaohua Wu
, Aimin Li
, Jian Jiao
, Ning Zhang, Qinyu Zhang
:
A Weighted Graph-Based Handover Strategy for Aeronautical Traffic in LEO SatCom Networks. 132-136 - Nguyen Quang Hieu, The Anh Tran, Cong Luong Nguyen

, Dusit Niyato
, Dong In Kim
, Erik Elmroth:
Deep Reinforcement Learning for Resource Management in Blockchain-Enabled Federated Learning Network. 137-141 - Sateeshkrishna Dhuli

, Fouzul Atik, Firdoshi Parveen, Om Jee Pandey
:
Performance Analysis of Consensus Algorithms Over Prism Networks Using Laplacian Spectra. 142-146 - Daniela M. Casas-Velasco

, Fabrizio Granelli
, Nelson L. S. da Fonseca
:
Impact of Background Traffic on the BBR and CUBIC Variants of the TCP Protocol. 147-151 - Navya Vuppalapati

, T. G. Venkatesh
:
Minimum Candidate Selection Algorithm for Hybrid IP/SDN Networks With Single Link Failures. 152-156 - Galina Sidorenko

, Daniel Plöger
, Johan Thunberg
, Alexey V. Vinel
:
Emergency Braking With ACC: How Much Does V2V Communication Help? 157-161 - Jinxin Liu

, Yu Shen
, Murat Simsek
, Burak Kantarci
, Hussein T. Mouftah
, Mehran Bagheri, Petar Djukic:
A New Realistic Benchmark for Advanced Persistent Threats in Network Traffic. 162-166 - Pieter Barnard

, Nicola Marchetti
, Luiz A. DaSilva
:
Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI). 167-171
Volume 4, Number 4, December 2022
- Rishabh Gupta

, Deepika Saxena
, Ishu Gupta
, Aaisha Makkar
, Ashutosh Kumar Singh
:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. 174-178 - Badarla Sri Pavan

, V. P. Harigovindan
:
Power-Optimized NOMA With TXOP Tuning-Based Channel Access Scheme for IEEE 802.11ah Dense IoT Networks. 179-183 - Harun Siljak

, Michael Taynnan Barros
, Leo Cooke
, Nicola Marchetti
:
Intelligent Dynamic Indoor Aerosol Sensing Using Terahertz Band Wireless Communication Systems. 184-188 - Bijoy Chand Chatterjee

, Basavaprabhu S
, Eiji Oki
:
BPA: Approximation Batch-Processing Algorithm for Static Lightpath Requests in Elastic Optical Networks. 189-193 - Jouni Ikonen

, Niklas Nelimarkka, Pedro H. J. Nardelli
, Niko Mattila, Dick Carrillo Melgarejo
:
Experimental Evaluation of End-to-End Delay in a Sigfox Network. 194-198 - Viviana Arrigoni

, Novella Bartolini
:
Network Identifiability: Advances in Separating Systems and Networking Applications. 199-203 - Saeed Banaeian Far

, Azadeh Imani Rad
:
PP-DENT: A Privacy-Preserving Framework for Blockchain-Based Mobile/Roaming Transactions. 204-207 - Gorla Praveen

, Siddharth Pratap Singh, Vinay Chamola
, Mohsen Guizani
:
Novel Consensus Algorithm for Blockchain Using Proof-of-Majority (PoM). 208-211 - Suvrima Datta, Aditya Kotha, Kota Manohar

, U. Venkanna
:
DNSguard: A Raspberry Pi-Based DDoS Mitigation on DNS Server in IoT Networks. 212-216 - Rishabh Gupta

, Deepika Saxena
, Ishu Gupta
, Ashutosh Kumar Singh
:
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment. 217-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














