研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
IET Networks
短名 | IET Netw. |
Journal Impact | 1.15 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3) |
ISSN | 2047-4954, 2047-4962 |
h-index | 31 |
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学操作系统工程类计算机网络数学电信计算机安全电气工程物理无线人工智能分布式计算统计程序设计语言量子力学网络数据包万维网经济生物算法 |
出版信息 | 出版商: John Wiley & Sons Inc.,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2014,原创研究文献占比: 97.62%,自引率:7.70%, Gold OA占比: 76.60% |
平均审稿周期 | 网友分享经验:33 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)
2024-9-1
A detailed reinforcement learning framework for resource allocation in non‐orthogonal multiple access enabled‐B5G/6G networks
2024-8-11
Guest Editorial: Unfolding the potential of 5G technologies for future wireless networks
2024-7-15
Configuration of multi‐shaper Time‐Sensitive Networking for industrial applications
2024-6-30
Machine learning approach of multi‐RAT selection for travelling users in 5G NSA networks
2024-6-18
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges
2024-6-18
Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system
2024-6-6
Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach
2024-5-21
Disaster scenario optimised link state routing protocol and message prioritisation
2024-4-7
A PU‐learning based approach for cross‐site scripting attacking reality detection
2024-4-2
Enhanced multivariate singular spectrum analysis‐based network traffic forecasting for real time industrial IoT applications
2024-3-12
Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks
2024-3-8
Cover Image
2024-3-1
Sub‐optimal Internet of Thing devices deployment using branch and bound method
2024-2-29
Guest Editorial: Special issue on network/traffic optimisation towards 6G network
2024-2-28
Investigating delay of the media access control protocols for IoT‐RoF using quantum entanglement
2024-2-24
Packets distribution over asymmetric paths using concurrent multipath transfer
2024-2-20
Leveraging InGaN solar cells for visible light communication reception
2024-2-6
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies
2024-1-23
Hardware nanosecond‐precision timestamping for line‐rate packet capture
2024-1-19
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
2024-1-17
Enhanced trust management for building trustworthy social internet of things network
2024-1-4
Flexible open network operating system architecture for implementing higher scalability using disaggregated software‐defined optical networking
2023-12-6
Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology
2023-12-4
Virtual network embedding method based on node delay perception
2023-11-29
Low complexity resource allocation scheme for IRS‐assisted downlink non‐orthogonal multiple access systems
2023-11-23
FUBA: A fuzzy‐based unmanned aerial vehicle behaviour analytics for trust management in flying ad‐hoc networks
2023-11-22
Energy efficiency optimisation in massive multiple‐input, multiple‐output network for 5G applications using new quantum genetic algorithm
2023-11-14
Wireless sensing charging based on multi‐drone cooperation
2023-11-11
A constructive airborne‐ground matrix algorithm for modern telecommunication systems
2023-9-26
NGMA‐based intergrated communication and computing for 6G‐enabled cognitive radio networks
2023-9-12
Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back‐propagation neural network
2023-9-2
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection
2023-8-28
Evaluation of antenna and relay scheme for cooperative non‐orthogonal multiple access
2023-8-25
A beginner's guide to infrastructure‐less networking concepts
2023-8-25
Cross layer protocol architecture for spectrum‐based routing in cognitive radio networks
2023-8-25
Vasicek and Van Es entropy‐based spectrum sensing for cognitive radios
2023-7-19
Performance evaluation of a mobile hotspot supporting quasi‐random traffic
2023-7-13
Optimal intelligent edge‐servers placement in the healthcare field
2023-7-9
Deploying cloud‐native experimental platforms for zero‐touch management 5G and beyond networks
2023-7-8
Anchored self‐similar 3D Gauss‐Markov mobility model for ad hoc routing scenarios
2023-7-5
Norm‐based spectrum sensing for cognitive radios under generalised Gaussian noise
2023-6-28
Optimal resource optimisation based on multi‐layer monitoring
2023-6-27
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远