


default search action
ITNAC 2019: Auckland, New Zealand
- 29th International Telecommunication Networks and Applications Conference, ITNAC 2019, Auckland, New Zealand, November 27-29, 2019. IEEE 2019, ISBN 978-1-7281-3673-8

- Jun O. Seo, Sathiamoorthy Manoharan

, Ulrich Speidel:
Steganalysis of Storage-based Covert Channels Using Entropy. 1-6 - Da-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen:

Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing. 1-6 - Yong Jin, Masahiko Tomoishi:

A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes. 1-7 - Vaibhav Fanibhare

, Nurul I. Sarkar
, Adnan Al-Anbuky:
A Cloud-Based Traffic Flow Framework for Tactile Internet using SDN and Fog Computing. 1-6 - Jing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao:

Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems. 1-6 - Xue Jun Li, Maode Ma, Yi Lin Yen:

Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning. 1-6 - Darryn Wells, Fakhrul Alam

, Yi Chen, Robert Abbel, Kate Parker:
Development of a Supply Chain Product Monitoring Network. 1-4 - Saad Aslam

, Fakhrul Alam
, Syed Faraz Hasan
, Mohammad A. Rashid:
Decentralized Interference Mitigation Technique for D2D Networks Using Game Theory Optimization. 1-7 - Firas Al-Ali, Thilina Doremure Gamage, Hewa W. T. S. Nanayakkara, Farhad Mehdipour, Sayan Kumar Ray

:
Supercomputer Networks in the Datacenter: Benchmarking the Evolution of Communication Granularity from Macroscale down to Nanoscale. 1-6 - Youngbok Cho:

Dynamic RNN -CNN based Malware Classifier for Deep Learning Algorithm. 1-6 - Xue Jun Li, Maode Ma, Narayanan Arjun:

An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks. 1-6 - Saad Aslam

, Fakhrul Alam
, Syed Faraz Hasan
, Mohammad A. Rashid:
Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D Enabled 5G Networks. 1-7 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:

Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature. 1-4 - Byoungjo Choi, Stevan Berber:

Rate Matching Pattern Estimation. 1-3 - Eiichiro Kawaguchi, Hikaru Kasuga, Norihiko Shinomiya:

Unsplittable flow Edge Load factor Balancing in SDN using P4 Runtime. 1-6 - Lely Hiryanto, Sieteng Soh

, Kwan-Wu Chin
, Mihai M. Lazarescu
:
Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget Constraint. 1-7 - Dawood Sheniar, Nabeel Mahdy Haddad

, Ron Addie:
The Inference Graph of Cybersecurity Rules. 1-6 - Baden Parr, Daniel Konings

, Mathew Legg, Fakhrul Alam
:
Early Warning System with Real Time Tilt Monitoring. 1-3 - Zhongyang Yu, Boon-Chong Seet:

Performance Analysis of Random Backoff based D2D Discovery in Cellular Networks. 1-6 - Rais Rizal Yunus, Husna Zainol Abidin

, Fadhlan Hafizhelmi Kamaru Zaman, Syahrul Afzal Che Abdullah
:
Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity. 1-6 - Amir Hossein Moravejosharieh, Francisco Claudio Araujo Palmeira:

Load-balancing In Software-Defined Networking: An Investigation On Influential System Parameters. 1-6 - Muhsiul Hassan, Nazmus Shaker Nafi, Nguyen Vo, Rahul Thakkar, Mark A. Gregory:

Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming. 1-4 - Hideaki Yoshino, Kenko Ota, Takefumi Hiraguri:

Adaptive Control of Nonstatistical Sensor Data Aggregation to Minimize Latency in IoT Gateways. 1-6 - Lincy Elizebeth Jim, Mark A. Gregory:

Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree. 1-6 - Nils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek:

Evaluating TCP Connection Healthiness. 1-4 - Fariza Sabrina:

A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. 1-7 - Archana Banepali, Rajan Kadel

, Deepani B. Guruge, Sharly Joana Halder:
Design and Implementation of Wi-Fi Based Attendance System Using Raspberry Pi. 1-6 - Syeda Kanwal Zaidi, Syed Faraz Hasan

, Xiang Gui:
A Novel Relaying Mechanism for Multi-Cast Transmission with Ground-Aerial NOMA. 1-6 - Marianne Cherrington, Joan Lu

, David Airehrour, Fadi A. Thabtah, Qiang Xu
, Samaneh Madanian
:
Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials. 1-6 - Hamad Alotaibi, Shuo Li

, Mark A. Gregory:
Utilising SDN to Counter BGP Convergence Delays. 1-6 - Adnan Ghaffar

, Xue Jun Li, Boon-Chong Seet, Wahaj Abbas Awan
, Niamat Hussain
:
Compact Multiband Frequency Reconfigurable Antenna for 5G Communications. 1-3 - Abdullah Omar Arafat, Mark A. Gregory:

A Weight Based Channel Scheduling for LTE-A Femtocells. 1-5 - Liwei Yang, Wenjie Zhang, Lining Deng, Junning Zhang:

Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems. 1-6 - Shakil Ahmed, Mohammad A. Rashid, Fakhrul Alam

, Bapon Fakhruddin
:
A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology. 1-6 - Jofina Jijin, Boon-Chong Seet, Peter Han Joo Chong:

Blockchain Enabled Opportunistic Fog-based Radio Access Network: A Position Paper. 1-3 - Saadullah Kalwar, Kwan-Wu Chin

, Luyao Wang:
An Orientation Aware Learning MAC for Multi-UAVs Networks. 1-4 - Md. Akbar Hossain

, Sayan Kumar Ray
, Seyed Reza Shahamiri
:
A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency. 1-6 - Anh Tuyen Le, Le Chung Tran

, Xiaojing Huang
, Y. Jay Guo:
Analog Least Mean Square Loop for Self-Interference Cancellation: Implementation and Measurements. 1-6 - Hoang Do, Mark A. Gregory, Shuo Li

:
SDN-based Wireless Access Networks Utilising BBR TCP Congestion Control. 1-8 - Yawen Zheng, Kwan-Wu Chin, Luyao Wang:

Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links. 1-6 - Zhenjie Tan, Hua Qu, Jihong Zhao, Shiyu Zhou, Wenjie Wang:

UAV-aided Data Collection in Self Organized IoT Network for Social Augmented Reality. 1-7 - Samundra Deep, Xi Zheng

:
Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition. 1-4 - Paul Zanna

, Peter J. Radcliffe, Karina Gomez Chavez:
A Method for Comparing OpenFlow and P4. 1-3 - Michael Santamaria, Alan Marchiori:

Demystifying LoRa WAN Security and Capacity. 1-7 - Debraj Basu

, Xiang Gui
, Yi Zhang, Avishek Nag
:
Non-Centralised and Non-GPS Navigation Mechanism using IoT sensors: challenges and trade-offs. 1-6 - Nguyen Canh Thang

, Minho Park:
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining. 1-6 - Seong Su Keum, Cheol Hwan Lee, Soon Ju Kang:

Device to Device Collaboration Architecture for Real- Time Identification of User and Abnormal Activities in Home. 1-3 - Arslan Rasheed, Asim Anwar, Arun Kumar

, Peter Han Joo Chong, Xue Jun Li:
Hierarchical Architecture for Computational Offloading in Autonomous Vehicle Environment. 1-6 - Sadia Qureshi, Robin Braun

:
Mininet Topology: Mirror of the Optical Switch Fabric. 1-6 - Yuya Ota, Norihiko Shinomiya:

A proposal of information diffusion model using information vitality. 1-3 - Humaira Abdul Salam, Franco Davoli

, Andreas Timm-Giel
:
Improving Prediction Accuracy for Power Consumption in Virtual Environments. 1-6 - Shakir Ullah, Saeed Ur Rehman

, Peter Hoon Joon Chong:
Performance Analysis of Defused VLC Channel for Mobile Environment. 1-6 - Tomohiro Kiguchi, Ran Sun, Hiromasa Habuchi, Yusuke Kozawa:

Frame Synchronization Performance of Optical-Wireless Hybrid BPPM-OOK System. 1-6 - Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa:

Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication. 1-6 - Yawen Zheng, Kwan-Wu Chin

:
Link Scheduling for Data Collection in SIC-Capable UAV Networks. 1-6 - Chenchen Liu, Yuyang Zheng, Zhengyu Zhang, Weilong Ren:

Relay Selection Scheme for Energy Harvesting IoT Networks with Direct Link. 1-4 - Dai-Lun Chiang, JihHsiang Yang, Ziyuan Huang, Feipei Lai:

Music Response Based on Real-time Facial Expression Recognition. 1-3 - David Soldani:

5G and the Future of Security in ICT. 1-8 - Jerzy Konorski:

Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting. 1-7 - Minh Pham, Doan B. Hoang, Zenon Chaczko:

Realization of congestion-aware energy-aware virtual link embedding. 1-6 - Hakilo Sabit

, Peter Han Joo Chong, Jeff Kilby:
Ambient Intelligence for Smart Home using The Internet of Things. 1-3 - James Jin Kang

, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua
, Paul S. Haskell-Dowland:
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 1-6 - Xiaowen Huang

, Wenjie Zhang, Liwei Yang, Chai Kiat Yeo
, Shengyu Chen:
Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio Networks. 1-6 - Ar Kar Kyaw, Brian Cusack, Raymond Lutui

:
Digital Forensic Readiness In Wireless Medical Systems. 1-6 - Hao Wu, Huayong Wang:

Decoding Latency of LDPC Codes in 5G NR. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














