Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2721)
Editorial
(415)
by Journal
by Funding Agency
Clear filters
Powered by
42 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.2 - Network Protocols
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Shanshan Jia
,
Gaukhar A. Kamalova
,
Dmytro Mykhalevskiy
10.3897/jucs.108446
28-02-2024
Unique: 1030 | Total: 1463
| Access Period:
204-220
HTML
PDF
Research Article
Traffic Optimization with Software-Defined Network Controller on a New User Interface
Derya Yiltas-Kaplan
10.3897/jucs.80625
28-06-2022
Unique: 2015 | Total: 3155
| Access Period:
648-669
HTML
XML
PDF
Research Article
Weather Station IoT Educational Model Using Cloud Services
Ján Molnár
,
Simona Kirešová
,
Tibor Vince
,
Dobroslav Kováč
,
Patrik Jacko
,
Matej Bereš
,
Peter Hrabovský
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.079
28-11-2020
Unique: 1598 | Total: 2504
| Access Period:
1495-1512
HTML
XML
PDF
Research Article
IoT Implementation in Remote Measuring Laboratory VMLab Analyses
Tibor Vince
,
Matej Bereš
,
Irena Kováčová
,
Ján Molnár
,
Branislav Fecko
,
Jozef Dziak
,
Iveta Tomčiková
,
Milan Guzan
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.074
28-11-2020
Unique: 1770 | Total: 2838
| Access Period:
1402-1421
HTML
XML
PDF
Research Article
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things
Sathishkumar Natesan
,
Rajakumar Krishnan
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.072
28-11-2020
Unique: 1109 | Total: 1875
| Access Period:
1366-1381
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 1304 | Total: 2085
| Access Period:
1396-1416
HTML
XML
PDF
Research Article
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
Pir Shah
,
Peer Shah
,
Sadaf Yasmin
,
Zahoor Ur-Rehman
,
Akhlaque Ahmad
,
Yunyoung Nam
,
Seungmin Rho
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1282
28-09-2018
Unique: 1033 | Total: 1735
| Access Period:
1282-1305
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 906 | Total: 1277
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
Steganography in VLC Systems
Grzegorz Blinowski
,
Krzysztof Szczypiorski
10.3217/jucs-023-05-0454
28-05-2017
Unique: 848 | Total: 1200
| Access Period:
454-478
HTML
XML
PDF
Research Article
Contactless Vulnerability Analysis using Google and Shodan
Kai Simon
,
Cornelius Moucha
,
Jörg Keller
10.3217/jucs-023-04-0404
01-04-2017
Unique: 908 | Total: 1278
| Access Period:
404-430
HTML
XML
PDF
Research Article
A Semantically Enhanced Service Discovery for MANET
Unai Aguilera
,
Diego López-De-Ipiña
10.3217/jucs-022-07-0896
01-07-2016
Unique: 907 | Total: 1264
| Access Period:
896-920
HTML
XML
PDF
Research Article
Classification of VANET MAC, Routing and Approaches A Detailed Survey
Sana Ajmal
,
Asim Rasheed
,
Amir Qayyum
,
Aamir Hasan
10.3217/jucs-020-04-0462
01-04-2014
Unique: 989 | Total: 1351
| Access Period:
462-487
HTML
XML
PDF
1
2
3
4
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK