IET Networks最新文献

筛选
英文 中文
A PU-learning based approach for cross-site scripting attacking reality detection 基于 PU 学习的跨站脚本攻击现实检测方法
IF 1.3
IET Networks Pub Date : 2024-04-02 DOI: 10.1049/ntw2.12123
Wenbo Wang, Peng Yi, Huikai Xu
{"title":"A PU-learning based approach for cross-site scripting attacking reality detection","authors":"Wenbo Wang,&nbsp;Peng Yi,&nbsp;Huikai Xu","doi":"10.1049/ntw2.12123","DOIUrl":"10.1049/ntw2.12123","url":null,"abstract":"<p>Cross-site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with the attacking reality. The authors collect responses from a web server and train a bagging-based PU learning model to determine whether the XSS vulnerability is truly triggered. To validate the authors’ proposed framework, experiments are performed on 5 popular web applications with 11 specified CVE recorded vulnerabilities and 32 vulnerable inputs. Results show that the authors’ approach outperforms existing research studies, effectively identifies the attacking reality from attacking attempts, and meanwhile reduces the number of worthless security alarms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"313-323"},"PeriodicalIF":1.3,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications 基于多变量奇异频谱分析的增强型网络流量预测,适用于实时工业物联网应用
IF 1.3
IET Networks Pub Date : 2024-03-12 DOI: 10.1049/ntw2.12121
Deva Priya Isravel, Salaja Silas, Jaspher Kathrine, Elijah Blessing Rajsingh, Andrew J
{"title":"Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications","authors":"Deva Priya Isravel,&nbsp;Salaja Silas,&nbsp;Jaspher Kathrine,&nbsp;Elijah Blessing Rajsingh,&nbsp;Andrew J","doi":"10.1049/ntw2.12121","DOIUrl":"10.1049/ntw2.12121","url":null,"abstract":"<p>Industrial IoT (IIoT) applications are widely used in multiple use cases to automate the industrial environment. Industry 4.0 presents challenges in numerous areas, including heterogeneous data, efficient data sensing and collection, real-time data processing, and higher request arrival rates, due to the massive amount of industrial data. Building a time-sensitive network that supports the voluminous and dynamic IoT traffic from heterogeneous applications is complex. Therefore, the authors provide insights into the challenges of industrial networks and propose a strategy for enhanced traffic management. An efficient multivariate forecasting model that adapts the Multivariate Singular Spectrum Analysis is employed for an SDN-based IIoT network. The proposed method considers multiple traffic flow parameters, such as packet sent and received, flow bytes sent and received, source rate, round trip time, jitter, packet arrival rate and flow duration to predict future flows. The experimental results show that the proposed method can effectively predict by contemplating every possible variation in the observed samples and predict average load, delay, inter-packet arrival rate and source sending rate with improved accuracy. The forecast results shows reduced error estimation when compared with existing methods with Mean Absolute Percentage Error of 1.64%, Mean Squared Error of 11.99, Root Mean Squared Error of 3.46 and Mean Absolute Error of 2.63.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"301-312"},"PeriodicalIF":1.3,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12121","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks 异构移动网络中利用移动性模型进行切换触发条件估计的性能评估
IF 1.3
IET Networks Pub Date : 2024-03-08 DOI: 10.1049/ntw2.12120
Asad Ali Malik, Muhammad Ali Jamshed, Ali Nauman, Adeel Iqbal, Atif Shakeel, Riaz Hussain
{"title":"Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks","authors":"Asad Ali Malik,&nbsp;Muhammad Ali Jamshed,&nbsp;Ali Nauman,&nbsp;Adeel Iqbal,&nbsp;Atif Shakeel,&nbsp;Riaz Hussain","doi":"10.1049/ntw2.12120","DOIUrl":"https://doi.org/10.1049/ntw2.12120","url":null,"abstract":"<p>Heterogeneous networks (HetNets) refer to the communication network, consisting of different types of nodes connected through communication networks deploying diverse radio access technologies like LTE, Wi-Fi, Zigbee, and Z-wave, and using different communication protocols and operating frequencies. Vertical handover, is the process of switching a mobile device from one network type to another, such as from a cellular network to a Wi-Fi network, and is critical for ensuring a seamless user experience and optimal network performance, within the handover process handover triggering estimation is one of the crucial step affecting the overall performance. A mathematical analysis is presented for the handover triggering estimation. The performance evaluation shows significant improvement in the probability of successful handover using the proposed handover triggering condition based on speed, distance, and different mobility models. The handover triggering condition is optimised based on the speed of the mobile node, handover completion time, and the coverage range of the current and the target networks of the HetNet node, with due consideration of the mobility model.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"291-300"},"PeriodicalIF":1.3,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12120","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Special issue on network/traffic optimisation towards 6G network 特邀编辑:面向 6G 网络的网络/流量优化特刊
IF 1.4
IET Networks Pub Date : 2024-02-28 DOI: 10.1049/ntw2.12118
Michael Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Rabie
{"title":"Guest Editorial: Special issue on network/traffic optimisation towards 6G network","authors":"Michael Logothetis,&nbsp;João Paulo Barraca,&nbsp;Shigeo Shioda,&nbsp;Khaled Rabie","doi":"10.1049/ntw2.12118","DOIUrl":"https://doi.org/10.1049/ntw2.12118","url":null,"abstract":"&lt;p&gt;An even faster and more heterogeneous communication infrastructure is planned for the 6G network, based on 5G in a way that leads us to much more deeply connected, programmable, intelligent, and sensing devices, with excellent network performance and coverage, and new dimensions of functionality. Therefore, 6G brings even greater challenges to network/traffic engineering and optimisation.&lt;/p&gt;&lt;p&gt;This virtual collection on Network/Traffic Optimisation towards 6G Network brings together the best six research papers submitted from academia, and reflects some of the latest and original achievements, concentrating on the performance of a mobile hotspot in vehicular communication, on the mobility modelling and ad hoc routing in Flying Ad-hoc NETworks (FANETs), on the performance of a joint antenna and relay selection Multiple-Input Multiple-Output (MIMO) system for cooperative Non-Orthogonal Multiple Access (NOMA) networks, on optimal resource optimisation based on multi-layer monitoring and Machine Learning (ML), on Voice over Wi-Fi Security Threats—Address Resolution Protocol (ARP) attacks and countermeasures—and on the management of 5G and Beyond networks through cloud-native deployments and end-to-end monitoring.&lt;/p&gt;&lt;p&gt;Although the rapid and substantial changes in networking technologies towards the 6G Network over the recent years could readily justify this virtual issue, our real motivation was the 13th event of the International Symposium of Communications Systems, Networks and Digital Signal Processing, held in Porto, Portugal (20–22 July 2022), and the IET's open call.&lt;/p&gt;&lt;p&gt;We begin with the first paper where Marinos Vlasakis et al theoretically analyse the performance of a mobile hotspot with limited bandwidth capacity and a Connection Admission Control functionality which provides Quality of Service (QoS) support for handover voice calls by serving them in priority over new voice calls. An interesting application example of vehicular communication is presented by considering a vehicle (say a bus), which alternates between stop and moving phases. In the stop phase, the vehicle can service both new and handover calls, while in the moving phase, only new calls (originating from the vehicle) are supported. Obviously, when passengers enter the vehicle while talking on their mobile phone, a handover should occur, that is, the Access Point must support handover connections in priority over new call connections. To this end, the capacity of the mobile hotspot is probabilistically reserved during the stop phase to benefit handover calls. In this case, new calls are accepted with a probability. This is called probabilistic bandwidth reservation policy. The system is modelled based on three-dimensional Markov chains. Moreover, the traffic is assumed quasi-random (originating from a finite traffic source population). This consideration is the first for loss/queueing models applied in a mobile hotspot and is proven to be very essential.&lt;/p&gt;&lt;p&gt;In the s","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 2","pages":"111-114"},"PeriodicalIF":1.4,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140104346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement 利用量子纠缠研究物联网 RoF 媒体访问控制协议的延迟问题
IF 1.3
IET Networks Pub Date : 2024-02-24 DOI: 10.1049/ntw2.12117
Shakir Salman Ahmad, Hamed Al-Raweshidy, Rajagopal Nilavalan
{"title":"Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement","authors":"Shakir Salman Ahmad,&nbsp;Hamed Al-Raweshidy,&nbsp;Rajagopal Nilavalan","doi":"10.1049/ntw2.12117","DOIUrl":"10.1049/ntw2.12117","url":null,"abstract":"<p>One of the significant challenges of the Radio over fibre (RoF) Medium Access Control (MAC) protocol is the propagation delay. This delay can lead to serious issues, such as higher propagation delay resulting in collisions and unnecessary retransmissions. Quantum entanglement is an excellent candidate to overcome the propagation delay of the RoF MAC protocol. A new quantum MAC protocol is proposed, named the Quantum Entanglement-based MAC protocol (QE-MAC), in which Quantum Teleportation is utilised to address the propagation delay. Four entanglement states are employed to represent the control packets of the classical MAC protocol, and data is transmitted over the classical channel. Instead of using control packets such as acknowledgement, request to send, and Clear to send, state transitions are employed. This approach avoids the delay and collision issues associated with control packets, resulting in a significant improvement in network performance. The delay, duty cycle (DC), and power consumption of the proposed QE-MAC protocol are formulated and derived. The protocol is evaluated in terms of delay, DC, and power consumption, demonstrating superior performance compared to the classical RoF MAC protocol. In comparison to published works, our proposed approach has successfully reduced both delay and power consumption by 35%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"324-337"},"PeriodicalIF":1.3,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packets distribution over asymmetric paths using concurrent multipath transfer 利用并发多路径传输在非对称路径上分配数据包
IF 1.3
IET Networks Pub Date : 2024-02-20 DOI: 10.1049/ntw2.12116
Hatem Fetoh, Khaled M. Amin, Ahmed M. Hamad
{"title":"Packets distribution over asymmetric paths using concurrent multipath transfer","authors":"Hatem Fetoh,&nbsp;Khaled M. Amin,&nbsp;Ahmed M. Hamad","doi":"10.1049/ntw2.12116","DOIUrl":"10.1049/ntw2.12116","url":null,"abstract":"<p>Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, the dissimilarity of delay, bandwidth, and loss rate among paths leads to challenges such as out-of-order packets, receiver buffer blocking, and throughput reduction. A framework that uses the end-to-end delay of paths to distribute the packets over asymmetric paths in ordering policy is proposed. The proposed framework detects network congestion in the assigned path and reduces the congestion window. Furthermore, the proposed framework predicts receiver buffer blocking and deactivates the highest delay path that causes this problem. The simulation results show that the proposed framework achieves highest throughput, lower entropy and lower average application end-to-end delay than the previous algorithms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"280-290"},"PeriodicalIF":1.3,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140447606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging InGaN solar cells for visible light communication reception 利用 InGaN 太阳能电池接收可见光通信
IF 1.3
IET Networks Pub Date : 2024-02-06 DOI: 10.1049/ntw2.12115
Habib Ullah Manzoor, Sanaullah Manzoor, Muhammad Ali Jamshed, Tareq Manzoor
{"title":"Leveraging InGaN solar cells for visible light communication reception","authors":"Habib Ullah Manzoor,&nbsp;Sanaullah Manzoor,&nbsp;Muhammad Ali Jamshed,&nbsp;Tareq Manzoor","doi":"10.1049/ntw2.12115","DOIUrl":"10.1049/ntw2.12115","url":null,"abstract":"<p>Solar cells are increasingly being utilised for both energy harvesting and reception in free-space optical (FSO) communication networks. The authors focus on the implementation of a mid-band p-In<sub>0.01</sub>Ga<sub>0.99</sub> N/p-In<sub>0.5</sub>Ga<sub>0.5</sub> N/n-In<sub>0.5</sub>Ga<sub>0.5</sub> N (PPN) solar cell, boasting an impressive 26.36% conversion efficiency (under 1.5AM conditions) as a receiver within an indoor FSO communication network. Employing a solar cell with dimensions of 1 mm in length and width, the FSO system underwent simulation using Optisystm software, while the solar cell's behaviour was simulated using SCAPS-1D. The received power from the solar cell was then compared to that of four commercially available avalanche photodiode (APD) receivers. Exploring incident wavelengths spanning 400–700 nm within the visible spectrum, across transmission distances of 5, 10, 15, and 20 m, the study presented current-voltage (IV) and power-voltage curves. Notably, the InGaN solar cell exhibited superior electrical power output compared to all commercial APDs. In conclusion, the findings underscore that augmenting received power has the potential to enhance FSO network quality and support extended transmission distances.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 4","pages":"271-279"},"PeriodicalIF":1.3,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12115","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139859431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies 开放式最短路径优先扩展,支持任意拓扑结构的多区域网络
IF 1.4
IET Networks Pub Date : 2024-01-23 DOI: 10.1049/ntw2.12112
Xavier Gomes, João Fonseca, Rui Valadas
{"title":"Open Shortest Path First extension for the support of multiarea networks with arbitrary topologies","authors":"Xavier Gomes,&nbsp;João Fonseca,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12112","DOIUrl":"10.1049/ntw2.12112","url":null,"abstract":"<p>Open Shortest Path First (OSPF) currently supports multiarea networking with two severe limitations: the multiarea topology is restricted to a two-level hierarchy, and globally optimal routing may not be achieved. An OSPF extension that overcomes these limitations is proposed by introducing a routing overlay for the dissemination of multiarea routing information. It applies to both OSPFv2 (IPv4) and OSPFv3 (IPv6) and is transparent to area-internal routers. The extension was fully implemented and tested, and the results show that the added functionality is completely achieved, at the cost of a small penalty in terms of convergence times for small networks.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 3","pages":"241-248"},"PeriodicalIF":1.4,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139603818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware nanosecond-precision timestamping for line-rate packet capture 用于线速数据包捕获的纳秒级精度硬件时间戳
IF 1.4
IET Networks Pub Date : 2024-01-19 DOI: 10.1049/ntw2.12114
Xiaoying Huang
{"title":"Hardware nanosecond-precision timestamping for line-rate packet capture","authors":"Xiaoying Huang","doi":"10.1049/ntw2.12114","DOIUrl":"10.1049/ntw2.12114","url":null,"abstract":"<p>Cybersecurity events occur frequently. When it comes to investigating security threats, it is essential to offer a 100 percent accurate and packet-level network history, which depends on packet capture with high precision packet timestamping. Many packet capture applications are developed based on data plane development kit (DPDK)—a set of libraries and drivers for fast packet processing. However, DPDK cannot give an accurate timestamp for every packet, and it is unable to truly reflect the order in which packets arrive at the network interface card. In addition, DPDK-based applications cannot achieve zero packet loss when the packet is small such as 64 B for beyond 10 Gigabit Ethernet. Therefore, the authors proposed a new method based on Field-Programmable Gate Array (FPGA) to solve this problem. The authors also develop a DPDK driver for FPGA devices to make the design compatible with all DPDK-based applications. The proposed method performs timestamping at line-rate for 10 Gigabit Ethernet traffic at 4 ns precision and 1 ns precision for 25 Gigabit, which greatly improves the accuracy of security incident retrospective analysis. Furthermore, the design can capture full-size packets for any protocol with zero packet loss and can be applied to 40/100 Gigabit systems as well.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 3","pages":"249-261"},"PeriodicalIF":1.4,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139525261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoWi-Fi security threats: Address resolution protocol attack and countermeasures VoWi-Fi 安全威胁:地址解析协议攻击与对策
IF 1.4
IET Networks Pub Date : 2024-01-17 DOI: 10.1049/ntw2.12113
Kuan-Chu Lu, I.-Hsien Liu, Keng-Hao Chang, Jung-Shian Li
{"title":"VoWi-Fi security threats: Address resolution protocol attack and countermeasures","authors":"Kuan-Chu Lu,&nbsp;I.-Hsien Liu,&nbsp;Keng-Hao Chang,&nbsp;Jung-Shian Li","doi":"10.1049/ntw2.12113","DOIUrl":"10.1049/ntw2.12113","url":null,"abstract":"<p>B5G/6G networks are facing challenges in the deployment of additional base stations. However, Taiwan's four major operators have launched VoWi-Fi calling services to maintain signal quality and coverage for customers. These services pose potential threats when users connect to untrusted Wi-Fi networks. Therefore, the authors utilised commercial equipment to study the security of VoWi-Fi calling services offered by Taiwan's four major telecom companies. The authors employed address resolution protocol attack methods to develop two verification attacks that bypass existing security measures: one for dropping session initiation protocol packets and the other for dropping voice call packets, both capable of circumventing current security defences. Through real-world experiments, the authors confirmed their feasibility and assessed their potential harm. Consequently, two defence methods are proposed. The first is an anti-attack algorithm for app and device manufacturers to detect the security of the user's calling environment. The second is a recommendation for telecom operators to implement new detection mechanisms to safeguard user rights.</p><p>The cover image is based on the Case Study <i>VoWi-Fi security threats: Address resolution protocol attack and countermeasures</i> by Kuan-Chu Lu et al., https://doi.org/10.1049/ntw2.12113</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 2","pages":"129-146"},"PeriodicalIF":1.4,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139617777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信