


default search action
IEEE Networking Letters, Volume 4
Volume 4, Number 1, March 2022
- Yuting Guo, Xin Liu
, Xueying Liu, Tariq S. Durrani
:
Energy-Efficient Resource Allocation for Simultaneous Wireless Information and Power Transfer in GFDM Cooperative Communications. 1-5 - Miroslav Mitev
, M. Majid Butt
, Philippe Sehier
, Arsenia Chorti
, Luca Rose, Arto Lehti
:
Smart Link Adaptation and Scheduling for IIoT. 6-10 - Abd Ullah Khan
, Ghulam Abbas
, Ziaul Haq Abbas
, Wali Ullah Khan
:
On Reliable Key Performance Indicators in Cognitive Radio Networks. 11-15 - Xiaonan Wang
, Yimi Lu
, Zhanyu Wang, Feng Li:
Data Pushing Framework in NDN-Enabled IoT. 16-19 - Li-Zhuang Tan
, Wei Su
, Jingying Miao, Wei Zhang
:
FindINT: Detect and Locate the Lost in-Band Network Telemetry Packet. 20-24 - Ying Wan
, Haoyu Song
, Bin Liu
:
GreedyJump: A Fast TCAM Update Algorithm. 25-29 - Leonardo Badia
:
Impact of Transmission Cost on Age of Information at Nash Equilibrium in Slotted ALOHA. 30-33 - Ray-Guang Cheng
, Chi-Ming Yang
, Bariq S. Firmansyah, Ruki Harwahyu
:
Uplink OFDMA-Based Random Access Mechanism With Bursty Arrivals for IEEE 802.11ax Systems. 34-38 - Yan Zhang, Tian Pan, Yan Zheng, Minglan Gao, Houtian Wang, Tao Huang, Yunjie Liu:
Automating Rapid Network Anomaly Detection With In-Band Network Telemetry. 39-42 - Dimitris Tsolkas
, Harilaos Koumaras
:
On the Development and Provisioning of Vertical Applications in the Beyond 5G Era. 43-47 - Katsuki Isobe
, Daishi Kondo
, Hideki Tode:
Privacy Concerns From Single-Word Search Query Leakage From Web Browsers Through DNS. 48-52 - IEEE Networking Letters Author Guidelines. 53-54
Volume 4, Number 2, June 2022
- Xingwang Li
, Zhen Xie
, Gaojian Huang
, Jianhua Zhang
, Ming Zeng
, Zheng Chu
:
Sum Rate Maximization for RIS-Aided NOMA With Direct Links. 55-58 - Deepika Saxena
, Ashutosh Kumar Singh
:
An Intelligent Traffic Entropy Learning-Based Load Management Model for Cloud Networks. 59-63 - Aqsa Ashraf Makhdomi
, Gh. Rasool Begh
:
Energy Efficient Distributed Spectrum Sensing in Presence of Malicious Users. 64-67 - Monireh Allah Gholi Ghasri
, Ali Mohammad Afshin Hemmatyar
:
A Generalized Framework for Joint Dynamic Optimal RF Interface Setting and Next-Hop Selection in IoT Networks With Similar Requests. 68-72 - Gourish Goudar
, Suvadip Batabyal
:
Estimating Buffer Occupancy sans Message Exchange in Mobile Opportunistic Networks. 73-77 - Dinh Duc Nha Nguyen
, Keshav Sood
, Mohammad Reza Nosouhi
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
:
RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory. 78-81 - Mohammed A. Jasim
, Nazli Siasi
, Mohamed Rahouti
, Nasir Ghani
:
SFC Provisioning With Load Balancing Method in Multi-Tier Fog Networks. 82-86 - Vineeth Bala Sukumaran, Reuben Chacko Thomas
:
On the Average Age-of-Information for Hybrid Multiple Access Protocols. 87-91 - Federico Chiariotti
, Anders E. Kalør
, Josefine Holm
, Beatriz Soret
, Petar Popovski
:
Scheduling of Sensor Transmissions Based on Value of Information for Summary Statistics. 92-96
Volume 4, Number 3, September 2022
- Omid Moghimi Kandelusy
, Nicholas J. Kirsch
:
Full-Duplex Buffer-Aided MIMO Relaying Networks: Joint Antenna Selection and Rate Allocation Based on Buffer Status. 99-103 - Zeeshan Kaleem
, Ayaz Ahmad, Omer Chughtai, Joel J. P. C. Rodrigues
:
Enhanced Max-Min Rate of Users in UAV-Assisted Emergency Networks Using Reinforcement Learning. 104-107 - Sachin Sharma
, Avishek Nag
, Byrav Ramamurthy
:
Cross-Atlantic Experiments on EU-US Test-Beds. 108-112 - Zongshen Wu
, Chin-Ya Huang
, Parameswaran Ramanathan:
Measuring Millimeter Wave Based Link Bandwidth Fluctuations During Indoor Immersive Experience. 113-117 - Tadege Mihretu Ayenew
, Dionysis Xenakis
, Luis Alonso
, Nikos I. Passas, Lazaros F. Merakos:
Demand-Aware Cooperative Content Caching in 5G/6G Networks With MEC-Enabled Edges. 118-122 - Kensuke Shibata, Shusuke Narieda
, Hiroshi Naruse:
Throughput Estimation of WLAN in Multiple Channels Using a Software Based Packet Analyzer. 123-126 - Vikas Kumar
, Mithun Mukherjee
, Jaime Lloret
, Qi Zhang
, Mamta Kumari
:
Delay-Optimal and Incentive-Aware Computation Offloading for Reconfigurable Intelligent Surface-Assisted Mobile Edge Computing. 127-131 - Xiyu Lv
, Shaohua Wu
, Aimin Li
, Jian Jiao
, Ning Zhang, Qinyu Zhang
:
A Weighted Graph-Based Handover Strategy for Aeronautical Traffic in LEO SatCom Networks. 132-136 - Nguyen Quang Hieu, The Anh Tran, Cong Luong Nguyen
, Dusit Niyato
, Dong In Kim
, Erik Elmroth:
Deep Reinforcement Learning for Resource Management in Blockchain-Enabled Federated Learning Network. 137-141 - Sateeshkrishna Dhuli
, Fouzul Atik, Firdoshi Parveen, Om Jee Pandey
:
Performance Analysis of Consensus Algorithms Over Prism Networks Using Laplacian Spectra. 142-146 - Daniela M. Casas-Velasco
, Fabrizio Granelli
, Nelson L. S. da Fonseca
:
Impact of Background Traffic on the BBR and CUBIC Variants of the TCP Protocol. 147-151 - Navya Vuppalapati
, T. G. Venkatesh
:
Minimum Candidate Selection Algorithm for Hybrid IP/SDN Networks With Single Link Failures. 152-156 - Galina Sidorenko
, Daniel Plöger
, Johan Thunberg
, Alexey V. Vinel
:
Emergency Braking With ACC: How Much Does V2V Communication Help? 157-161 - Jinxin Liu
, Yu Shen
, Murat Simsek
, Burak Kantarci
, Hussein T. Mouftah
, Mehran Bagheri, Petar Djukic:
A New Realistic Benchmark for Advanced Persistent Threats in Network Traffic. 162-166 - Pieter Barnard
, Nicola Marchetti
, Luiz A. DaSilva
:
Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI). 167-171
Volume 4, Number 4, December 2022
- Rishabh Gupta
, Deepika Saxena
, Ishu Gupta
, Aaisha Makkar, Ashutosh Kumar Singh
:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. 174-178 - Badarla Sri Pavan
, V. P. Harigovindan
:
Power-Optimized NOMA With TXOP Tuning-Based Channel Access Scheme for IEEE 802.11ah Dense IoT Networks. 179-183 - Harun Siljak
, Michael Taynnan Barros
, Leo Cooke
, Nicola Marchetti
:
Intelligent Dynamic Indoor Aerosol Sensing Using Terahertz Band Wireless Communication Systems. 184-188 - Bijoy Chand Chatterjee
, Basavaprabhu S
, Eiji Oki
:
BPA: Approximation Batch-Processing Algorithm for Static Lightpath Requests in Elastic Optical Networks. 189-193 - Jouni Ikonen
, Niklas Nelimarkka, Pedro H. J. Nardelli
, Niko Mattila, Dick Carrillo Melgarejo
:
Experimental Evaluation of End-to-End Delay in a Sigfox Network. 194-198 - Viviana Arrigoni
, Novella Bartolini
:
Network Identifiability: Advances in Separating Systems and Networking Applications. 199-203 - Saeed Banaeian Far
, Azadeh Imani Rad
:
PP-DENT: A Privacy-Preserving Framework for Blockchain-Based Mobile/Roaming Transactions. 204-207 - Gorla Praveen
, Siddharth Pratap Singh, Vinay Chamola
, Mohsen Guizani
:
Novel Consensus Algorithm for Blockchain Using Proof-of-Majority (PoM). 208-211 - Suvrima Datta, Aditya Kotha, Kota Manohar
, U. Venkanna
:
DNSguard: A Raspberry Pi-Based DDoS Mitigation on DNS Server in IoT Networks. 212-216 - Rishabh Gupta
, Deepika Saxena
, Ishu Gupta
, Ashutosh Kumar Singh
:
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment. 217-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.