Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
42 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.2 - Network Protocols
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Shanshan Jia
,
Gaukhar A. Kamalova
,
Dmytro Mykhalevskiy
10.3897/jucs.108446
28-02-2024
Unique: 865 | Total: 1212
| Access Period:
204-220
HTML
PDF
Research Article
Traffic Optimization with Software-Defined Network Controller on a New User Interface
Derya Yiltas-Kaplan
10.3897/jucs.80625
28-06-2022
Unique: 1837 | Total: 2856
| Access Period:
648-669
HTML
XML
PDF
Research Article
Weather Station IoT Educational Model Using Cloud Services
Ján Molnár
,
Simona Kirešová
,
Tibor Vince
,
Dobroslav Kováč
,
Patrik Jacko
,
Matej Bereš
,
Peter Hrabovský
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.079
28-11-2020
Unique: 1359 | Total: 2156
| Access Period:
1495-1512
HTML
XML
PDF
Research Article
IoT Implementation in Remote Measuring Laboratory VMLab Analyses
Tibor Vince
,
Matej Bereš
,
Irena Kováčová
,
Ján Molnár
,
Branislav Fecko
,
Jozef Dziak
,
Iveta Tomčiková
,
Milan Guzan
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.074
28-11-2020
Unique: 1592 | Total: 2539
| Access Period:
1402-1421
HTML
XML
PDF
Research Article
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things
Sathishkumar Natesan
,
Rajakumar Krishnan
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.072
28-11-2020
Unique: 967 | Total: 1639
| Access Period:
1366-1381
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 1156 | Total: 1851
| Access Period:
1396-1416
HTML
XML
PDF
Research Article
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
Pir Shah
,
Peer Shah
,
Sadaf Yasmin
,
Zahoor Ur-Rehman
,
Akhlaque Ahmad
,
Yunyoung Nam
,
Seungmin Rho
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1282
28-09-2018
Unique: 930 | Total: 1569
| Access Period:
1282-1305
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 802 | Total: 1107
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
Steganography in VLC Systems
Grzegorz Blinowski
,
Krzysztof Szczypiorski
10.3217/jucs-023-05-0454
28-05-2017
Unique: 760 | Total: 1056
| Access Period:
454-478
HTML
XML
PDF
Research Article
Contactless Vulnerability Analysis using Google and Shodan
Kai Simon
,
Cornelius Moucha
,
Jörg Keller
10.3217/jucs-023-04-0404
01-04-2017
Unique: 803 | Total: 1115
| Access Period:
404-430
HTML
XML
PDF
Research Article
A Semantically Enhanced Service Discovery for MANET
Unai Aguilera
,
Diego López-De-Ipiña
10.3217/jucs-022-07-0896
01-07-2016
Unique: 832 | Total: 1126
| Access Period:
896-920
HTML
XML
PDF
Research Article
Classification of VANET MAC, Routing and Approaches A Detailed Survey
Sana Ajmal
,
Asim Rasheed
,
Amir Qayyum
,
Aamir Hasan
10.3217/jucs-020-04-0462
01-04-2014
Unique: 890 | Total: 1196
| Access Period:
462-487
HTML
XML
PDF
1
2
3
4
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK