ISSN:
eISSN:
Disciplines
(Field of Science):
- information and communication technology (Engineering and Technology)
- biomedical engineering (Engineering and Technology)
- computer and information sciences (Natural sciences)
Ministry points: Help
Year | Points | List |
---|---|---|
Year 2024 | 100 | Ministry scored journals list 2024 |
Year | Points | List |
---|---|---|
2024 | 100 | Ministry scored journals list 2024 |
2023 | 100 | Ministry Scored Journals List |
2022 | 100 | Ministry Scored Journals List 2019-2022 |
2021 | 100 | Ministry Scored Journals List 2019-2022 |
2020 | 100 | Ministry Scored Journals List 2019-2022 |
2019 | 100 | Ministry Scored Journals List 2019-2022 |
2018 | 15 | Journals not listed on ministry scored list indexed in SCOPUS/Web of Science |
2017 | 15 | Journals not listed on ministry scored list indexed in SCOPUS/Web of Science |
2016 | 5 | foreign scientific journals |
2015 | 5 | foreign scientific journals |
2014 | 5 | foreign scientific journals |
2013 | 5 | foreign scientific journals |
2012 | 5 | foreign scientific journals |
Model:
Points CiteScore:
Year | Points |
---|---|
Year 2023 | 12.3 |
Year | Points |
---|---|
2023 | 12.3 |
2022 | 10.7 |
2021 | 9.3 |
2020 | 8.2 |
2019 | 7 |
2018 | 5.8 |
2017 | 5 |
2016 | 4.4 |
2015 | 4.1 |
2014 | 2.7 |
2013 | 1.4 |
2012 | 0.4 |
Impact Factor:
Sherpa Romeo:
Papers published in journal
Filters
total: 2
Catalog Journals
Year 2018
-
Seafloor Characterisation Using Underwater Acoustic Devices
PublicationThe problem of seafloor characterisation is important in the context of management as well as investigation and protection of the marine environment. In the first part of the paper, a review of underwater acoustic technology and methodology used in seafloor characterisation is presented. It consists of the techniques based on the use of singlebeam echosounders and seismic sources, along with those developed for the use of sidescan...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
seen 607 times