Journal articles on the topic 'Network devices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network devices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hamza, Muhammad, Syed Mashhad M. Geelani, Qamar Nawaz, Asif Kabir, and Isma Hamid. "Clustering of IoT Devices Using Device Profiling and Behavioral Analysis to Build Efficient Network Policies." April 2021 40, no. 2 (April 1, 2021): 335–45. http://dx.doi.org/10.22581/muet1982.2102.08.
Full textAhmad, Hamza Sajjad, Muhammad Junaid Arshad, and Muhammad Sohail Akram. "Device Authentication and Data Encryption for IoT Network by Using Improved Lightweight SAFER Encryption With S-Boxes." International Journal of Embedded and Real-Time Communication Systems 12, no. 3 (July 2021): 1–13. http://dx.doi.org/10.4018/ijertcs.2021070101.
Full textRodriguez Medel, Abel, and Jose Marcos C. Brito. "Random-Access Accelerator (RAA): A Framework to Speed Up the Random-Access Procedure in 5G New Radio for IoT mMTC by Enabling Device-To-Device Communications." Sensors 20, no. 19 (September 25, 2020): 5485. http://dx.doi.org/10.3390/s20195485.
Full textSun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi, and Jian-guo Jiang. "A Novel Device Identification Method Based on Passive Measurement." Security and Communication Networks 2019 (June 23, 2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.
Full textHasan Al-Bowarab, Mustafa, Nurul Azma Zakaria, Zaheera Zainal Abidin, and Ziadoon Kamil Maseer. "Review on Device-to-Device Communication in Cellular based Network Systems." International Journal of Engineering & Technology 7, no. 3.20 (September 1, 2018): 435. http://dx.doi.org/10.14419/ijet.v7i3.20.20587.
Full textYi-Wei Ma, Yi-Wei Ma, Jiann-Liang Chen Yi-Wei Ma, Yu-Liang Tang Jiann-Liang Chen, and Kuan-Hung Lai Yu-Liang Tang. "Towards Adaptive Network Resource Orchestration for Cognitive Radio Networks." 網際網路技術學刊 23, no. 5 (September 2022): 1087–97. http://dx.doi.org/10.53106/160792642022092305017.
Full textRondeau, Christopher M., J. Addison Betances, and Michael A. Temple. "Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting." Security and Communication Networks 2018 (July 11, 2018): 1–14. http://dx.doi.org/10.1155/2018/1489347.
Full textLaguidi, Ahmed, Tarik Hachad, and Lamiae Hachad. "Mobile network connectivity analysis for device to device communication in 5G network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (February 1, 2023): 680. http://dx.doi.org/10.11591/ijece.v13i1.pp680-687.
Full textOgogo, Wycliffe Lamech. "Real-Time Monitoring of Network Devices: Its Effectiveness in Enhancing Network Security." East African Journal of Information Technology 3, no. 1 (March 4, 2021): 1–6. http://dx.doi.org/10.37284/eajit.3.1.153.
Full textA., Dr Sathesh. "OPTIMIZED MULTI-OBJECTIVE ROUTING FOR WIRELESS COMMUNICATION WITH LOAD BALANCING." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (December 23, 2019): 106–20. http://dx.doi.org/10.36548/jtcsst.2019.2.004.
Full textKumar, Vipin, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad, and Abdul Razaque. "Light Weight Authentication Scheme for Smart Home IoT Devices." Cryptography 6, no. 3 (July 20, 2022): 37. http://dx.doi.org/10.3390/cryptography6030037.
Full textNaz, Naila, Muazzam A. Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, and Jawad Ahmad. "Ensemble learning-based IDS for sensors telemetry data in IoT networks." Mathematical Biosciences and Engineering 19, no. 10 (2022): 10550–80. http://dx.doi.org/10.3934/mbe.2022493.
Full textOuaissa, Mariya, and A. Rhattoy. "A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 1169. http://dx.doi.org/10.11591/ijece.v8i2.pp1169-1181.
Full textBystrova, I. V., and B. P. Podkopaev. "Fault Isolation in Network of State Automates." Journal of the Russian Universities. Radioelectronics 23, no. 1 (February 28, 2020): 18–29. http://dx.doi.org/10.32603/1993-8985-2020-23-1-18-29.
Full textOser, Pascal, Rens W. van der Heijden, Stefan Lüders, and Frank Kargl. "Risk Prediction of IoT Devices Based on Vulnerability Analysis." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3510360.
Full textKuriakose, Jeril, and Sandeep Joshi. "A Comparative Review of Moveable Sensor Location Identification." International Journal of Robotics Applications and Technologies 3, no. 2 (July 2015): 20–37. http://dx.doi.org/10.4018/ijrat.2015070102.
Full textFagbola, Funmilola Ikeolu, and Hein S. Venter. "Smart Digital Forensic Readiness Model for Shadow IoT Devices." Applied Sciences 12, no. 2 (January 12, 2022): 730. http://dx.doi.org/10.3390/app12020730.
Full textHossain, Nazmul, Md Zobayer Hossain, and Md Alam Hossain. "An Ontological Security Framework to Secure the SDN based IoT Networks." American Journal of Agricultural Science, Engineering and Technology 5, no. 1 (November 18, 2021): 4–18. http://dx.doi.org/10.54536/ajaset.v5i1.55.
Full textYuan, Jie, Erxia Li, Chaoqun Kang, Fangyuan Chang, and Xiaoyong Li. "Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing." Information 10, no. 8 (August 15, 2019): 259. http://dx.doi.org/10.3390/info10080259.
Full textMhetre, Nalini A., Arvind V. Deshpande, and Parikshit Narendra Mahalle. "Device Classification-Based Context Management for Ubiquitous Computing using Machine Learning." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 135–42. http://dx.doi.org/10.35940/ijeat.e2688.0610521.
Full textWEN, HAO, ZHENG-FU HAN, GUANG-CAN GUO, and PEI-LIN HONG. "QKD NETWORKS WITH PASSIVE OPTICAL ELEMENTS: ANALYSIS AND ASSESSMENT." International Journal of Quantum Information 07, no. 06 (September 2009): 1217–31. http://dx.doi.org/10.1142/s0219749909005730.
Full textMallela, Sree Naga Raja Sekhar. "IOT-5G-Exploring next-generation media consumption in the area of Journalism." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 1448–51. http://dx.doi.org/10.22214/ijraset.2021.38208.
Full textHizriadi, Ainul, Radea Shiddiq, Ivan Jaya, and Santi Prayudani. "Network Device Monitoring System based on Geographic Information System dan Simple Network Management Protocol." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 3, no. 2 (January 20, 2020): 216–23. http://dx.doi.org/10.31289/jite.v3i2.3187.
Full textFachrurrozi, Nurwan Reza, Andri Agustav Wirabudi, and Seandy Arandiant Rozano. "Design of network monitoring system based on LibreNMS using Line Notify, Telegram, and Email notification." SINERGI 27, no. 1 (January 18, 2023): 111. http://dx.doi.org/10.22441/sinergi.2023.1.013.
Full textCurran, Kevin, and Paul Canning. "Wireless Handheld Devices Become Trusted Network Devices." Information Systems Security 16, no. 3 (June 12, 2007): 134–46. http://dx.doi.org/10.1080/10658980701401686.
Full textLee, Won Hyoung, Ho Young Hwang, and Jo Woon Chong. "Runtime Estimation of the Number of Active Devices in IEEE 802.15.4 Slotted CSMA/CA Networks with Deferred Transmission and No Acknowledgment Using ARMA Filters." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–12. http://dx.doi.org/10.1155/2018/5420876.
Full textShan, Chun, Xiao-ping Wu, Yan Liu, Jun Cai, and Jian-zhen Luo. "IBP Based Caching Strategy in D2D." Applied Sciences 9, no. 12 (June 13, 2019): 2416. http://dx.doi.org/10.3390/app9122416.
Full textDawadi, Babu R., Danda B. Rawat, Shashidhar R. Joshi, and Pietro Manzoni. "Intelligent Approach to Network Device Migration Planning towards Software-Defined IPv6 Networks." Sensors 22, no. 1 (December 26, 2021): 143. http://dx.doi.org/10.3390/s22010143.
Full textRasheed, Zeeshan, Shahzad Ashraf, Naeem Ahmed Ibupoto, Pinial Khan Butt, and Emad Hussen Sadiq. "SDS: Scrumptious Dataflow Strategy for IoT Devices in Heterogeneous Network Environment." Smart Cities 5, no. 3 (September 5, 2022): 1115–28. http://dx.doi.org/10.3390/smartcities5030056.
Full textReinehr Gobatto, Leonardo, Pablo Rodrigues, Mateus Saquetti Pereira de Carvalho Tirone, Weverton Luis da Costa Cordeiro, and José Rodrigo Furlanetto Azambuja. "Programmable Data Planes meets In-Network Computing: A Review of the State of the Art and Prospective Directions." Journal of Integrated Circuits and Systems 16, no. 2 (August 17, 2021): 1–8. http://dx.doi.org/10.29292/jics.v16i2.497.
Full textBurger, Alwyn, Gregor Schiele, and David W. King. "Reconfigurable Embedded Devices Using Reinforcement Learning to Develop Action Policies." ACM Transactions on Autonomous and Adaptive Systems 15, no. 4 (December 31, 2020): 1–25. http://dx.doi.org/10.1145/3487920.
Full textCho, Seongsoo, and Bhanu Shrestha. "A Study on Improving M2M Network Security through Abnormal Traffic Control." Applied Sciences 12, no. 21 (October 26, 2022): 10836. http://dx.doi.org/10.3390/app122110836.
Full textTilwari, Valmik, MHD Hindia, Kaharudin Dimyati, Dushantha Jayakody, Sourabh Solanki, Rashmi Sinha, and Effariza Hanafi. "MBMQA: A Multicriteria-Aware Routing Approach for the IoT 5G Network Based on D2D Communication." Electronics 10, no. 23 (November 26, 2021): 2937. http://dx.doi.org/10.3390/electronics10232937.
Full textMenon, Varun G., Joe Prathap Pathrose, and Jogi Priya. "Ensuring Reliable Communication in Disaster Recovery Operations with Reliable Routing Technique." Mobile Information Systems 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/9141329.
Full textLee, Minbaek, Meg Noah, June Park, Maeng-Je Seong, Young-Kyun Kwon, and Seunghun Hong. "“Textured” Network Devices: Overcoming Fundamental Limitations of Nanotube/Nanowire Network-Based Devices." Small 5, no. 14 (July 17, 2009): 1642–48. http://dx.doi.org/10.1002/smll.200801500.
Full textUllah, Farman, Ghulam Sarwar, and Sungchang Lee. "A Network and Visual Quality Aware N-Screen Content Recommender System Using Joint Matrix Factorization." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/806517.
Full textSuhartono, Joni. "Merencanakan Keamanan Jaringan Komputer." ComTech: Computer, Mathematics and Engineering Applications 2, no. 1 (June 1, 2011): 467. http://dx.doi.org/10.21512/comtech.v2i1.2784.
Full textSchuba, C. L., J. Goldschmidt, M. F. Speer, and M. Hefeeda. "Scaling network services using programmable network devices." Computer 38, no. 4 (April 2005): 52–60. http://dx.doi.org/10.1109/mc.2005.139.
Full textChen, Whai-En, Yi-Bing Lin, Tai-Hsiang Yen, Syuan-Ru Peng, and Yun-Wei Lin. "DeviceTalk: A No-Code Low-Code IoT Device Code Generation." Sensors 22, no. 13 (June 30, 2022): 4942. http://dx.doi.org/10.3390/s22134942.
Full textAlsaffar, Mohammad, Abdulsattar Abdullah Hamad, Abdullah Alshammari, Gharbi Alshammari, Tariq S. Almurayziq, Mohammed Shareef Mohammed, and Wegayehu Enbeyle. "Network Management System for IoT Based on Dynamic Systems." Computational and Mathematical Methods in Medicine 2021 (December 13, 2021): 1–8. http://dx.doi.org/10.1155/2021/9102095.
Full textKim, Sangdae, Cheonyong Kim, Hyunchong Cho, and Kwansoo Jung. "A Hierarchical Routing Graph for Supporting Mobile Devices in Industrial Wireless Sensor Networks." Sensors 21, no. 2 (January 11, 2021): 458. http://dx.doi.org/10.3390/s21020458.
Full textKim , Sangdae, Cheonyong Kim , Hyunchong Cho , and Kwansoo Jung . "A Hierarchical Routing Graph for Supporting Mobile Devices in Industrial Wireless Sensor Networks." Sensors 21, no. 2 (January 11, 2021): 458. http://dx.doi.org/10.3390/s21020458.
Full textZhu, Fangzhou, Liang Liu, Simin Hu, Ting Lv, and Renjun Ye. "WND-Identifier: Automated and Efficient Identification of Wireless Network Devices." Security and Communication Networks 2021 (November 20, 2021): 1–16. http://dx.doi.org/10.1155/2021/9069123.
Full textMaheswari, G. Uma. "Fuzzy QoS Based OLSR Network." International Journal of Interdisciplinary Telecommunications and Networking 3, no. 1 (January 2011): 50–55. http://dx.doi.org/10.4018/jitn.2011010104.
Full textJia, Liang, Ye Tian, and Junguo Zhang. "Identifying Animals in Camera Trap Images via Neural Architecture Search." Computational Intelligence and Neuroscience 2022 (February 7, 2022): 1–15. http://dx.doi.org/10.1155/2022/8615374.
Full textShafiq, Muhammad, Zhihong Tian, Ali Kashif Bashir, Korhan Cengiz, and Adnan Tahir. "SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique." Wireless Communications and Mobile Computing 2020 (October 9, 2020): 1–10. http://dx.doi.org/10.1155/2020/8864301.
Full textManin, A. V., and D. B. Vyner. "System of monitoring parameters of distribution grid with corrective control based on neural network." Vestnik IGEU, no. 4 (August 31, 2022): 35–45. http://dx.doi.org/10.17588/2072-2672.2022.4.035-045.
Full textJailton, José, Tassio Carvalho, Jasmine Araújo, and Renato Francês. "Relay Positioning Strategy for Traffic Data Collection of Multiple Unmanned Aerial Vehicles Using Hybrid Optimization Systems: A FANET-Based Case Study." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2865482.
Full textKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Full textQomarudin, Muhammad Faisal, and Agit Amrullah. "SISTEM MONITORING JARINGAN REALTIME BERBASIS INTERNET CONTROL MESSAGE PROTOCOL." JINTECH: Journal Of Information Technology 3, no. 2 (August 12, 2022): 67–80. http://dx.doi.org/10.22373/jintech.v3i2.1935.
Full text