研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
International Journal of Communication Networks and Distributed Systems
短名 | IJCNDS |
Journal Impact | 0.93 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 1754-3916, 1754-3924 |
h-index | 20 |
《International Journal of Communication Networks and Distributed Systems》旨在提升全球在通信网络和分布式系统领域的研究水平,探讨各种方法论、工具、技术、算法及其结果。该期刊不仅限于电信领域的网络问题,还考虑其他应用领域的网络问题,如生物网络、社交网络和化学网络。这一特点有助于促进这些领域的跨学科研究。
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机网络工程类操作系统数学电信计算机安全分布式计算无线物理程序设计语言电气工程量子力学人工智能算法统计网络数据包生物嵌入式系统电子工程经济法学政治学万维网 |
出版信息 | 出版商: Inderscience,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2008,原创研究文献占比: 100.00%,自引率:20.00%, Gold OA占比: 1.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Context-aware enhancement of buffer utilization in MQTT-based IoT communication
2025-1-1
An innovative approach based on clustering and digital signature to prevent black hole attack from vehicular ad-hoc network
2025-1-1
An Efficient Attack Detection Approach for Software Defined Internet of Things using Jaya Optimization based Feature Selection Technique
2025-1-1
Network-aware cache provisioning and request routing in Heterogeneous Cellular Networks
2025-1-1
The intelligent object detection framework for detecting fish from underwater images
2025-1-1
A hybrid zone based routing protocol based on ZRP and DSR for emergency application
2025-1-1
Relatively Strong Barrier Coverage for β-Breadth Intruder in Hybrid Visual IoT
2025-1-1
Addressing escalating threats: a secret image sharing scheme with adjustable threshold resilience against external adversaries and colluding participants
2025-1-1
Blocking performance comparison under hard handoff constraint using optimal guard channel in GSM standards
2025-1-1
Self energised UAV-assisted wireless communication using NOMA over Nakagami-m fading channel
2025-1-1
Secure emergency MAC protocol for wireless body area networks
2025-1-1
Blockchain-based privacy-preserving technology to secure shared data in vehicular communication
2025-1-1
A linear regression based prediction model for load distribution and quality of service improvement with different resource utilisation in cloud environment
2025-1-1
Harnessing machine learning for dynamic defence in the battle against 5G cybersecurity threats
2025-1-1
Joint coded caching and distributed storage with product matrix non-systematic code
2025-1-1
Enhancing road safety: UAV-enabled warning message dissemination in urban and rural environments for VANETS
2025-1-1
Harnessing machine learning for dynamic defence in the battle against 5G cybersecurity threats
2024-6-27
A linear regression based prediction model for load distribution and quality of service improvement with different resource utilisation in cloud environment
2024-6-26
Blockchain-based privacy-preserving technology to secure shared data in vehicular communication
2024-6-10
Secure emergency MAC protocol for wireless body area networks
2024-5-30
Self energised UAV-assisted wireless communication using NOMA over Nakagami-m fading channel
2024-4-19
Blocking performance comparison under hard handoff constraint using optimal guard channel in GSM standards
2024-4-11
Addressing escalating threats: a secret image sharing scheme with adjustable threshold resilience against external adversaries and colluding participants
2024-4-8
The intelligent object detection framework for detecting fish from underwater images
2024-2-29
Relatively Strong Barrier Coverage for β-Breadth Intruder in Hybrid Visual IoT
2024-2-26
An Efficient Attack Detection Approach for Software Defined Internet of Things using Jaya Optimization based Feature Selection Technique
2024-2-10
Network-aware cache provisioning and request routing in Heterogeneous Cellular Networks
2024-2-10
A hybrid zone based routing protocol based on ZRP and DSR for emergency application
2024-1-8
Developing Policy Hierarchies for an Effective Distributed Systems and Network Management. Case Study in a Videoconference Service.
2024-1-1
Metaheuristic Based Segment Routing for Hybrid Software-Defined Network (SDN) Under Heterogeneous Environment
2024-1-1
Ultra-scalable ensemble clustering with simulated annealing based coot bird routing protocol for WSN
2024-1-1
Energy efficient and lifetime aware clustering and routing using improved rabbit optimisation algorithm in WSN
2024-1-1
A Low Complexity Enhanced Squirrel Search Algorithm for Reduction of Peak to Average Power Ratio in OFDM systems
2024-1-1
Elastic Demand Network Slicing based on Fuzzy Multicriteria
2024-1-1
Low complexity IAOR signal detection for uplink GSM - massive MIMO systems
2024-1-1
Attractiveness of firms with chatbot as job interviewers. Does the interviewer-type matter to be the first contact with candidates
2024-1-1
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation
2024-1-1
Subcarrier power control for URLLC communication system via multi-agent deep reinforcement learning in IoT network
2024-1-1
A critical review of feature selection methods for machine learning in IoT security
2024-1-1
Searchlight: a novel data delivery cost-aware multi-mode data transmission scheme with best-fit resource allocation for 6G underwater sensor networks applications
2024-1-1
Research on the optimisation of whitelisting technology for network firewall in industrial control system using genetic algorithm
2024-1-1
OPTIMIZATION TECHNIQUES IN POLICY HIERARCHIES FOR MANAGING DISTRIBUTED SYSTEMS AND NETWORKS.
2024-1-1
Extended Diffie Hellman Protocol Based on Exponential and Multiplication Operation Over Modular Arithmetic
2024-1-1
Effect of user mobility under Rician fading on power allocation for non-orthogonal multiple access strategy
2024-1-1
ULTRA-SCALABLE ENSEMBLE CLUSTERING WITH SIMULATED ANNEALING BASED COOT BIRD ROUTING PROTOCOL FOR WSN
2024-1-1
STAGNN: a spatial-temporal attention graph neural network for network traffic prediction
2024-1-1
Secure key exchange protocol using graph and trusted third party
2024-1-1
A secured lightweight authentication protocol for vehicular ad hoc network using blind signature
2024-1-1
Multimodal Sentiment Analysis Based on Improved Correlation Representation Network
2024-1-1
Subcarrier Power Control for URLLC Communication System via Multi-Agent Deep Reinforcement Learning in IoT Network
2024-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远