International Journal of Internet Protocol Technology

短名Int. J. Internet Protoc. Technol.
Journal Impact0.18
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4)
ISSN1743-8209, 1743-8217
h-index16

The IJIPT provides an open forum for researchers, academics, engineers, network managers, and service providers in Internet Protocol Technology. Extensive exchange of information will be provided on new protocols, standards, services, and various applications in this area.

涉及主题计算机科学操作系统工程类计算机网络数学计算机安全电信程序设计语言万维网经济物理分布式计算无线人工智能电气工程量子力学互联网算法生物政治学法学网络数据包嵌入式系统
出版信息出版商: Inderscience Enterprises Ltd出版周期: 期刊类型: journal
基本数据创刊年份: 2005原创研究文献占比100.00%自引率:33.30%Gold OA占比: 0.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Enhanced TCP BBR Performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks

2024-1-1

A cross encryption scheme for data security storage in cloud computing environment

2023-1-1

Research on personalised privacy-preserving model of multi-sensitive attributes

2023-1-1

Smart approach to constraint programming: intelligent backtracking using artificial intelligence

2023-1-1

SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network

2023-1-1

Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks

2023-1-1

Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)

2023-1-1

SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network

2023-1-1

Cognitive wireless communication network information sharing method based on blockchain technology

2023-1-1

Validating and verifying LwM2M clients with event-B

2023-1-1

Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP

2023-1-1

Validating and verifying LwM2M clients with event-B

2023-1-1

An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint

2023-1-1

Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques

2023-1-1

A constant temperature control system for indoor environments in buildings using internet of things

2023-1-1

Smart approach to constraint programming: intelligent backtracking using artificial intelligence

2023-1-1

Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server

2023-1-1

Cognitive wireless communication network information sharing method based on blockchain technology

2023-1-1

A cross encryption scheme for data security storage in cloud computing environment

2023-1-1

Computation on scheduling attacks and optimal resource utilization in wireless sensor networks via optimization techniques

2023-1-1

Research on personalised privacy-preserving model of multi-sensitive attributes

2023-1-1

A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP

2023-1-1

Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking

2023-1-1

Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server

2023-1-1

Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP

2023-1-1

Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks

2023-1-1

Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking

2023-1-1

A constant temperature control system for indoor environments in buildings using internet of things

2023-1-1

Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks

2023-1-1

SVC-MST BWQLB multicast over software-defined networking

2023-1-1

Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image

2023-1-1

Efficient Routing Protocol for IoT Networks based on Fog Computing and Routing Protocol of Low Power Lossy Networks

2023-1-1

A Comparative Performance Analysis of TCP Congestion Control Algorithm: Elastic TCP vs e-Elastic TCP

2023-1-1

Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)

2023-1-1

RAD: reinforcement authentication model based on DYMO protocol for MANET

2023-1-1

Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks

2023-1-1

Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image

2023-1-1

Practical and scalable access control mechanism for wireless sensor networks

2023-1-1

RAD: reinforcement authentication model based on DYMO protocol for MANET

2023-1-1

Practical and scalable access control mechanism for wireless sensor networks

2023-1-1

An effective differential privacy protection method of location data based on perturbation loss constraint

2023-1-1

SVC-MST BWQLB Multicast over Software-Defined Networking

2023-1-1

Computation on scheduling attacks and optimal resource utilization in wireless sensor networks via optimization techniques

2022-8-30

Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)

2022-3-16

Enhanced-KNN (M-KNN) based outlier detection and sensor data aggregation for large data streams in the IoT-cloud

2022-1-1

Efficient authentication method using binary search tree with multi-gateway in wireless IoT

2022-1-1

ICCO: immune clustering-based coverage optimisation algorithm in wireless sensor networks

2022-1-1

Congruent fine-grained data mining model for large-scale medical data mining

2022-1-1

Small area purification and recognition of network intrusion signals based on the second-order matching filter detection

2022-1-1

Processing power sharing using a gadget 'Power Save' for downloading scientific research projects

2022-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司