Journal of Network and Computer Applications

短名J. Netw. Comput. Appl.
Journal Impact7.81
国际分区COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1)
期刊索引SCI Q1中科院 2 区
ISSN1084-8045, 1095-8592
h-index141
国内分区计算机科学(2区)计算机科学计算机硬件(2区)计算机科学计算机跨学科应用(2区)计算机科学计算机软件工程(2区)

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 欢迎与计算机网络及其应用相关的所有领域的研究贡献、调查和笔记。

期刊主页投稿网址
涉及主题计算机科学工程类操作系统计算机网络电信计算机安全数学分布式计算电气工程万维网程序设计语言人工智能物理生物政治学法学经济无线
出版信息出版商: Academic Press出版周期: Bimonthly期刊类型: journal
基本数据创刊年份: 1996原创研究文献占比76.64%自引率:5.20%Gold OA占比: 14.43%
平均审稿周期 网友分享经验:平均9.0个月
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission

2024-12-1

An online cost optimization approach for edge resource provisioning in cloud gaming

2024-12-1

Editorial Board

2024-11-1

HRMF-DRP: A Next-Generation Solution for Overcoming Provisioning Challenges in Cloud Environments

2024-11-1

Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning

2024-11-1

Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey

2024-11-1

Designing transport scheme of 3D naked-eye system

2024-11-1

An efficient exact method with polynomial time-complexity to achieve <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si412.svg" display="inline" id="d1e2453"><mml:mi>k</mml:mi></mml:math>-strong barrier coverage in heterogeneous wireless multimedia sensor networks

2024-11-1

A blockchain transaction mechanism in the delay tolerant network

2024-11-1

MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks

2024-11-1

CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks

2024-11-1

A survey on security issues in IoT operating systems

2024-11-1

Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things

2024-10-1

Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks

2024-10-1

Editorial Board

2024-10-1

An agnostic and secure interoperability protocol for seamless asset movement

2024-10-1

Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques

2024-10-1

Blockchain applications in UAV industry: Review, opportunities, and challenges

2024-10-1

Clone node detection in static wireless sensor networks: A hybrid approach

2024-9-1

An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario

2024-9-1

PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques

2024-9-1

A survey on ethereum pseudonymity: Techniques, challenges, and future directions

2024-9-1

Editorial Board

2024-9-1

Generalized hierarchical coded caching

2024-9-1

Distributed Fog computing system for weapon detection and face recognition

2024-9-1

Living on the edge: A survey of digital twin-assisted task offloading in safety-critical environments

2024-9-1

Exclusively in-store: Acoustic location authentication for stationary business devices

2024-9-1

GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning

2024-9-1

DeCa360: Deadline-aware edge caching for two-tier 360° video streaming

2024-9-1

Troubleshooting solution for traffic congestion control

2024-9-1

SSBM: A spatially separated boxes-based multi-tab website fingerprinting model

2024-9-1

A survey on fuzz testing technologies for industrial control protocols

2024-9-1

Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities

2024-8-6

CRSFL: Cluster-based resource-aware split federated learning for continuous authentication

2024-8-1

Network Quality Prediction in a Designated Area Using GPS Data

2024-8-1

An expandable and cost-effective data center network

2024-8-1

Credit risk prediction for small and micro enterprises based on Federated Transfer Learning frozen network parameters

2024-8-1

Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions

2024-8-1

A Hybrid Bi-level Management Framework for caching and communication in Edge-AI enabled IoT

2024-8-1

Evolving techniques in cyber threat hunting: A systematic review

2024-8-1

An Efficient Certificateless Blockchain-enabled Authentication Scheme to Secure Producer Mobility in Named Data Networks

2024-8-1

CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning

2024-8-1

Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search

2024-8-1

DFier: A directed vulnerability verifier for Ethereum smart contracts

2024-7-30

Anomalous state detection in radio access networks: A proof-of-concept

2024-7-26

Exploiting web content semantic features to detect web robots from weblogs

2024-7-22

Enhanced detection of low-rate DDoS attack patterns using machine learning models

2024-7-1

Skin lesion classification using modified deep and multi-directional invariant handcrafted features

2024-7-1

Attenuating majority attack class bias using hybrid deep learning based IDS framework

2024-7-1

Uncovering phishing attacks using principles of persuasion analysis

2024-7-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司