Journal of Network and Computer Applications
短名 | J. Netw. Comput. Appl. |
Journal Impact | 7.81 |
国际分区 | COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1) |
期刊索引 | SCI Q1中科院 2 区 |
ISSN | 1084-8045, 1095-8592 |
h-index | 141 |
国内分区 | 计算机科学(2区)计算机科学计算机硬件(2区)计算机科学计算机跨学科应用(2区)计算机科学计算机软件工程(2区) |
涉及主题 | 计算机科学工程类操作系统计算机网络电信计算机安全数学分布式计算电气工程万维网程序设计语言人工智能物理生物政治学法学经济无线 |
出版信息 | 出版商: Academic Press,出版周期: Bimonthly,期刊类型: journal |
基本数据 | 创刊年份: 1996,原创研究文献占比: 76.64%,自引率:5.20%, Gold OA占比: 14.43% |
平均审稿周期 | 网友分享经验:平均9.0个月 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission
2024-12-1
An online cost optimization approach for edge resource provisioning in cloud gaming
2024-12-1
Editorial Board
2024-11-1
Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities
2024-11-1
HRMF-DRP: A Next-Generation Solution for Overcoming Provisioning Challenges in Cloud Environments
2024-11-1
Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning
2024-11-1
Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey
2024-11-1
Designing transport scheme of 3D naked-eye system
2024-11-1
An efficient exact method with polynomial time-complexity to achieve <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si412.svg" display="inline" id="d1e2453"><mml:mi>k</mml:mi></mml:math>-strong barrier coverage in heterogeneous wireless multimedia sensor networks
2024-11-1
A blockchain transaction mechanism in the delay tolerant network
2024-11-1
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks
2024-11-1
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks
2024-11-1
A survey on security issues in IoT operating systems
2024-11-1
Towards zero-energy: Navigating the future with 6G in Cellular Internet of Things
2024-10-1
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks
2024-10-1
Editorial Board
2024-10-1
An agnostic and secure interoperability protocol for seamless asset movement
2024-10-1
Virtual reality traffic prioritization for Wi-Fi quality of service improvement using machine learning classification techniques
2024-10-1
Blockchain applications in UAV industry: Review, opportunities, and challenges
2024-10-1
Metarouting with automatic tunneling in multilayer networks
2024-10-1
Exploiting web content semantic features to detect web robots from weblogs
2024-10-1
Clone node detection in static wireless sensor networks: A hybrid approach
2024-9-1
An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario
2024-9-1
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques
2024-9-1
A survey on ethereum pseudonymity: Techniques, challenges, and future directions
2024-9-1
Editorial Board
2024-9-1
Generalized hierarchical coded caching
2024-9-1
Distributed Fog computing system for weapon detection and face recognition
2024-9-1
Living on the edge: A survey of digital twin-assisted task offloading in safety-critical environments
2024-9-1
Exclusively in-store: Acoustic location authentication for stationary business devices
2024-9-1
GROM: A generalized routing optimization method with graph neural network and deep reinforcement learning
2024-9-1
DeCa360: Deadline-aware edge caching for two-tier 360° video streaming
2024-9-1
Troubleshooting solution for traffic congestion control
2024-9-1
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model
2024-9-1
A survey on fuzz testing technologies for industrial control protocols
2024-9-1
CRSFL: Cluster-based resource-aware split federated learning for continuous authentication
2024-8-1
Network Quality Prediction in a Designated Area Using GPS Data
2024-8-1
An expandable and cost-effective data center network
2024-8-1
Credit risk prediction for small and micro enterprises based on Federated Transfer Learning frozen network parameters
2024-8-1
Artificial Intelligence of Things (AIoT) for smart agriculture: A review of architectures, technologies and solutions
2024-8-1
A Hybrid Bi-level Management Framework for caching and communication in Edge-AI enabled IoT
2024-8-1
Evolving techniques in cyber threat hunting: A systematic review
2024-8-1
An Efficient Certificateless Blockchain-enabled Authentication Scheme to Secure Producer Mobility in Named Data Networks
2024-8-1
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning
2024-8-1
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search
2024-8-1
DFier: A directed vulnerability verifier for Ethereum smart contracts
2024-7-30
Anomalous state detection in radio access networks: A proof-of-concept
2024-7-26
Enhanced detection of low-rate DDoS attack patterns using machine learning models
2024-7-1
Skin lesion classification using modified deep and multi-directional invariant handcrafted features
2024-7-1
Attenuating majority attack class bias using hybrid deep learning based IDS framework
2024-7-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远