Transactions on Emerging Telecommunications Technologies

短名Trans Emerging Tel Tech
Journal Impact2.61
国际分区TELECOMMUNICATIONS(Q3)
期刊索引SCI Q3中科院 4 区
ISSN2161-3915, 2161-5748
h-index60
国内分区计算机科学(4区)计算机科学电信学(4区)

新兴电信技术交易 (ETT),前身为欧洲电信交易 (ETT),其目标如下:- 吸引来自世界各地领先研究人员和研究小组的前沿出版物- 成为及时引用的高引用来源新兴电信领域的研究成果——将修订和出版周期限制在几个月内,从而显着提高出版吸引力——成为出版电信最新发展的领先期刊

期刊主页投稿网址
涉及主题计算机科学工程类计算机网络操作系统电信数学电气工程物理计算机安全统计量子力学人工智能无线频道(广播)算法电子工程生物经济万维网
出版信息出版商: John Wiley and Sons Ltd出版周期: 期刊类型: journal
基本数据创刊年份: 2012原创研究文献占比97.88%自引率:4.00%Gold OA占比: 3.49%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time‐controlled jellyfish optimization

2024-9-17

Issue Information

2024-9-17

Reliable information delivery and dynamic link utilization in <scp>MANET</scp> cloud using deep reinforcement learning

2024-9-1

SKALP: Secure key agreement and lightweight protocol for dew‐assisted IoT enabled edge computing

2024-9-1

RF‐GCN: Residual fused‐graph convolutional network using multimodalities for facial emotion recognition

2024-9-1

A semantic axiomatic design for integrity in IoT

2024-8-27

Enhancing <scp>5G</scp> massive <scp>MIMO</scp> systems with <scp>EfficientNet</scp>‐<scp>B7</scp>‐powered deep learning‐driven beamforming

2024-8-26

Construction of switch information security protection system based on software‐defined networking

2024-8-20

A hybrid intrusion detection approach based on message queuing telemetry transport (<scp>MQTT</scp>) protocol in industrial internet of things

2024-8-20

Issue Information

2024-8-19

Review of intrusion detection system in cyber‐physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges

2024-8-19

Correction to “<scp>PAM</scp>: Predictive analytics and modules‐based computation offloading framework using greedy heuristics and <scp>5G NR</scp>‐<scp>V2X</scp>”

2024-8-1

Correction to “Dynamic service function chain placement in mobile computing: An asynchronous advantage actor‐critic based approach”

2024-8-1

Optimizing hybrid beamforming in millimeter‐wave massive multiple‐input multiple‐output systems: A gradient projection approach

2024-8-1

Secure and efficient device‐to‐device communication in <scp>IoT</scp>: The <scp>DMBSOA</scp>‐enhanced <scp>MQTT</scp> protocol

2024-7-30

Sequential detection with feedback information for two‐way cooperative spectrum sensing in cognitive internet of things

2024-7-26

Issue Information

2024-7-18

Interference management of cognitive IoT based on interference steering and alignment

2024-7-18

Dynamic service function chain placement in mobile computing: An asynchronous advantage actor‐critic based approach

2024-7-17

Multi‐graph representation spatio‐temporal attention networks for traffic forecasting in the cinematic metaverse

2024-7-1

<scp>HRF</scp>‐<scp>ExGB</scp>: Hybrid random forest‐extreme gradient boosting for mobile edge computing

2024-7-1

Development of novel intrusion detection in Internet of Things using improved dart game optimizer‐derived optimal cascaded ensemble learning

2024-7-1

GIJA:Enhanced geyser‐inspired Jaya algorithm for task scheduling optimization in cloud computing

2024-7-1

Quantum‐safe Lattice‐based mutual authentication and key‐exchange scheme for the smart grid

2024-7-1

Hardware software <scp>SoC</scp> co‐design analysis and implementation of <scp>MIMO</scp>‐<scp>OFDM</scp> for <scp>4G</scp>/<scp>5G</scp>/<scp>6G eNodeB</scp> applications

2024-6-26

A spatial‐temporal graph gated transformer for traffic forecasting

2024-6-26

DRL‐based customised resource allocation for sub‐slices in 6G network slicing

2024-6-26

PAM: Predictive analytics and modules‐based computation offloading framework using greedy heuristics and 5G NR‐V2X

2024-6-25

Less sample‐cooperative spectrum sensing against large‐scale Byzantine attack in cognitive wireless sensor networks

2024-6-24

Issue Information

2024-6-1

Reliable community card system for detecting and isolating selfish vehicles in smart and connected communities‐based VDTN's

2024-6-1

Achievable secrecy rate analysis of OFDM‐based multi‐user untrusted relay networks with imperfect CSI

2024-6-1

An optimal attention <scp>PLSTM</scp>‐based classification model to enhance the performance of <scp>IoMT</scp> attack detection in healthcare application

2024-6-1

Identical code‐data cyclic shift transmission for time‐dispersive channel

2024-6-1

<scp>AdaBoost</scp>‐powered cloud of things framework for low‐latency, energy‐efficient chronic kidney disease prediction

2024-6-1

Cognitive blockchain and its application to optimize performance in blockchain systems

2024-6-1

A trusted mechanism against device reputation attacks in Web‐of‐Things applications

2024-6-1

Efficient plaintext checkable identity‐based signcryption in cyber‐physical systems towards IIoT

2024-6-1

A systematic literature review on past attack analysis on industrial control systems

2024-5-31

Algorithms and throughput analysis of cognitive radio‐based <scp>MIMO‐NOMA</scp> for the next generation of wireless communications

2024-5-23

Modeling the dissemination of privacy information in online social networks

2024-5-21

The applications of nature‐inspired algorithms in Internet of Things‐based healthcare service: A systematic literature review

2024-5-21

Signal points allocation for generalized enhanced spatial modulation

2024-5-21

<scp>RCVM</scp>‐<scp>ASS‐CICSKA</scp>‐<scp>PAPT‐VDF</scp>: <scp>VLSI</scp> design of high‐speed reconfigurable compressed Vedic <scp>PAPT‐VDF</scp> filter for <scp>ECG</scp> medical application

2024-5-20

Issue Information

2024-5-20

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司