研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

IET Networks

短名IET Netw.
Journal Impact1.15
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3)
ISSN2047-4954, 2047-4962
h-index31

期刊主页投稿网址

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学操作系统工程类计算机网络数学电信计算机安全电气工程物理无线人工智能分布式计算统计程序设计语言量子力学网络数据包万维网经济生物算法
出版信息出版商: John Wiley & Sons Inc.出版周期: 期刊类型: journal
基本数据创刊年份: 2014原创研究文献占比97.62%自引率:7.70%Gold OA占比: 76.60%
平均审稿周期 网友分享经验:33 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Hard‐state Protocol Independent Multicast—Source‐Specific Multicast (HPIM‐SSM)

2024-9-1

A detailed reinforcement learning framework for resource allocation in non‐orthogonal multiple access enabled‐B5G/6G networks

2024-8-11

Guest Editorial: Unfolding the potential of 5G technologies for future wireless networks

2024-7-15

Configuration of multi‐shaper Time‐Sensitive Networking for industrial applications

2024-6-30

Machine learning approach of multi‐RAT selection for travelling users in 5G NSA networks

2024-6-18

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

2024-6-18

Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system

2024-6-6

Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach

2024-5-21

Disaster scenario optimised link state routing protocol and message prioritisation

2024-4-7

A PU‐learning based approach for cross‐site scripting attacking reality detection

2024-4-2

Enhanced multivariate singular spectrum analysis‐based network traffic forecasting for real time industrial IoT applications

2024-3-12

Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks

2024-3-8

Cover Image

2024-3-1

Sub‐optimal Internet of Thing devices deployment using branch and bound method

2024-2-29

Guest Editorial: Special issue on network/traffic optimisation towards 6G network

2024-2-28

Investigating delay of the media access control protocols for IoT‐RoF using quantum entanglement

2024-2-24

Packets distribution over asymmetric paths using concurrent multipath transfer

2024-2-20

Leveraging InGaN solar cells for visible light communication reception

2024-2-6

Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies

2024-1-23

Hardware nanosecond‐precision timestamping for line‐rate packet capture

2024-1-19

VoWi‐Fi security threats: Address resolution protocol attack and countermeasures

2024-1-17

Enhanced trust management for building trustworthy social internet of things network

2024-1-4

Flexible open network operating system architecture for implementing higher scalability using disaggregated software‐defined optical networking

2023-12-6

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

2023-12-4

Virtual network embedding method based on node delay perception

2023-11-29

Low complexity resource allocation scheme for IRS‐assisted downlink non‐orthogonal multiple access systems

2023-11-23

FUBA: A fuzzy‐based unmanned aerial vehicle behaviour analytics for trust management in flying ad‐hoc networks

2023-11-22

Energy efficiency optimisation in massive multiple‐input, multiple‐output network for 5G applications using new quantum genetic algorithm

2023-11-14

Wireless sensing charging based on multi‐drone cooperation

2023-11-11

A constructive airborne‐ground matrix algorithm for modern telecommunication systems

2023-9-26

NGMA‐based intergrated communication and computing for 6G‐enabled cognitive radio networks

2023-9-12

Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back‐propagation neural network

2023-9-2

Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection

2023-8-28

Evaluation of antenna and relay scheme for cooperative non‐orthogonal multiple access

2023-8-25

A beginner's guide to infrastructure‐less networking concepts

2023-8-25

Cross layer protocol architecture for spectrum‐based routing in cognitive radio networks

2023-8-25

Vasicek and Van Es entropy‐based spectrum sensing for cognitive radios

2023-7-19

Performance evaluation of a mobile hotspot supporting quasi‐random traffic

2023-7-13

Optimal intelligent edge‐servers placement in the healthcare field

2023-7-9

Deploying cloud‐native experimental platforms for zero‐touch management 5G and beyond networks

2023-7-8

Anchored self‐similar 3D Gauss‐Markov mobility model for ad hoc routing scenarios

2023-7-5

Norm‐based spectrum sensing for cognitive radios under generalised Gaussian noise

2023-6-28

Optimal resource optimisation based on multi‐layer monitoring

2023-6-27

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司