研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
International Journal of Internet Protocol Technology
短名 | Int. J. Internet Protoc. Technol. |
Journal Impact | 0.18 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 1743-8209, 1743-8217 |
h-index | 16 |
《International Journal of Internet Protocol Technology》为研究人员、学者、工程师、网络管理人员和服务提供商提供了一个开放的论坛,专注于互联网协议技术领域。期刊将广泛交流有关新协议、标准、服务及该领域各种应用的信息。
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学操作系统工程类计算机网络数学计算机安全电信程序设计语言万维网经济物理分布式计算无线人工智能电气工程量子力学互联网算法生物政治学法学网络数据包嵌入式系统 |
出版信息 | 出版商: Inderscience Enterprises Ltd,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2005,原创研究文献占比: 100.00%,自引率:33.30%, Gold OA占比: 0.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Enhanced TCP BBR Performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks
2024-1-1
A cross encryption scheme for data security storage in cloud computing environment
2023-1-1
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network
2023-1-1
Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)
2023-1-1
Research on personalised privacy-preserving model of multi-sensitive attributes
2023-1-1
Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks
2023-1-1
Smart approach to constraint programming: intelligent backtracking using artificial intelligence
2023-1-1
Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques
2023-1-1
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network
2023-1-1
Cognitive wireless communication network information sharing method based on blockchain technology
2023-1-1
Validating and verifying LwM2M clients with event-B
2023-1-1
Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP
2023-1-1
Validating and verifying LwM2M clients with event-B
2023-1-1
An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint
2023-1-1
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server
2023-1-1
A constant temperature control system for indoor environments in buildings using internet of things
2023-1-1
Smart approach to constraint programming: intelligent backtracking using artificial intelligence
2023-1-1
A cross encryption scheme for data security storage in cloud computing environment
2023-1-1
Research on personalised privacy-preserving model of multi-sensitive attributes
2023-1-1
A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP
2023-1-1
Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking
2023-1-1
Cognitive wireless communication network information sharing method based on blockchain technology
2023-1-1
Computation on scheduling attacks and optimal resource utilization in wireless sensor networks via optimization techniques
2023-1-1
A constant temperature control system for indoor environments in buildings using internet of things
2023-1-1
Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking
2023-1-1
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server
2023-1-1
Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP
2023-1-1
Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
2023-1-1
Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
2023-1-1
SVC-MST BWQLB multicast over software-defined networking
2023-1-1
A Comparative Performance Analysis of TCP Congestion Control Algorithm: Elastic TCP vs e-Elastic TCP
2023-1-1
Efficient Routing Protocol for IoT Networks based on Fog Computing and Routing Protocol of Low Power Lossy Networks
2023-1-1
Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image
2023-1-1
Practical and scalable access control mechanism for wireless sensor networks
2023-1-1
RAD: reinforcement authentication model based on DYMO protocol for MANET
2023-1-1
Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)
2023-1-1
RAD: reinforcement authentication model based on DYMO protocol for MANET
2023-1-1
Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks
2023-1-1
Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image
2023-1-1
Practical and scalable access control mechanism for wireless sensor networks
2023-1-1
SVC-MST BWQLB Multicast over Software-Defined Networking
2023-1-1
An effective differential privacy protection method of location data based on perturbation loss constraint
2023-1-1
Computation on scheduling attacks and optimal resource utilization in wireless sensor networks via optimization techniques
2022-8-30
Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)
2022-3-16
Congruent fine-grained data mining model for large-scale medical data mining
2022-1-1
Enhanced-KNN (M-KNN) based outlier detection and sensor data aggregation for large data streams in the IoT-cloud
2022-1-1
Efficient authentication method using binary search tree with multi-gateway in wireless IoT
2022-1-1
ICCO: immune clustering-based coverage optimisation algorithm in wireless sensor networks
2022-1-1
Small area purification and recognition of network intrusion signals based on the second-order matching filter detection
2022-1-1
Processing power sharing using a gadget 'Power Save' for downloading scientific research projects
2022-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远