


default search action
30th ITNAC 2020: Melbourne, Australia
- 30th International Telecommunication Networks and Applications Conference, ITNAC 2020, Melbourne, Australia, November 25-27, 2020. IEEE 2020, ISBN 978-1-7281-8827-0

- Uwe Bauknecht, Tobias Enderle:

An Investigation on Core Network Latency. 1-6 - Hadi Alasti

:
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field. 1-6 - M. Lakshmi Prasad Reddy, Sumanth Sakkara:

QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error Termination. 1-6 - Araya Kibrom Desta

, Shuji Ohira
, Ismail Arai
, Kazutoshi Fujikawa:
MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks. 1-7 - Tanjim Munir Dipon, Md. Shohrab Hossain

, Husnu S. Narman
:
Detecting Network Intrusion through Anomalous Packet Identification. 1-6 - Zahir M. Hussain:

Energy-Efficient Systems for Smart Sensor Communications. 1-4 - Tony, Sieteng Soh, Mihai M. Lazarescu, Kwan-Wu Chin:

Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory Effects. 1-8 - Raman Singh

, Andrew Donegan, Hitesh Tewari
:
Framework for a Decentralized Web. 1-7 - Natiq M. Abdali

, Zahir M. Hussain:
Reference-free Detection of LSB Steganography Using Histogram Analysis. 1-7 - Hamad Saud Alotaibi, Mark A. Gregory, Shuo Li

, Hoang Do:
Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking-Based Gateways. 1-6 - Stanislaw Baranski

, Jerzy Konorski:
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain. 1-6 - Md. Khairul Islam

, Prithula Hridi, Md. Shohrab Hossain
, Husnu S. Narman
:
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier. 1-7 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:

MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments. 1-6 - Donovan Allen, Navid Shaghaghi

:
Cuckoo Prefix: A Hash Set for Compressed IP Blocklists. 1-8 - Marianne Cherrington, David Airehrour, Joan Lu

, Qiang Xu
, Steve J. Wade, Ihaka Dunn:
Indigenous Big Data Implications in New Zealand. 1-6 - Ahmet Kaplan, Ibrahim Altunbas

, Gunes Karabulut-Kurt, Mustafa Kesal, Defne Kucukyavuz:
OFDM-IM Performance Evaluation Under Jamming Attack. 1-6 - James Yockey, Benjamin Campbell, Andrew Coyle, Robert A. Hunjet:

Emulating Low Probability of Detection Algorithms. 1-6 - Bo Hu, Benjamin Fisher, Alirio Guerra, John P. T. Mo:

Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation. 1-4 - Da-Ren Chen, Wei-Min Chiu:

Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination Images. 1-6 - Liwei Yang, Qi Zhang, Ziyi Huang, Wenjie Zhang:

Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical Networks. 1-6 - Mohanad Alhabo, Naveed Nawaz, Omer Waqar:

Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous Networks. 1-6 - Md. Akbar Hossain

, Sayan Kumar Ray
, Seyed Reza Shahamiri
, M. Daud Ahmed, Garry Singh, Rose Arts:
An End-to-End Medical Emergency Response System to Support Elderly People. 1-6 - Paul Zanna

, Peter J. Radcliffe, Dinesh K. Kumar
:
WP4: A P4 Programmable IEEE 802.11 Data Plane. 1-6 - Maryam Shahpasand, Leonard G. C. Hamey

, Mohamed Ali Kâafar
, Dinusha Vatsalan
:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. 1-8 - Syed Danial Ali Shah, Mark A. Gregory, Shuo Li

:
Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading. 1-3 - Temitope Odewole, Rajan Kadel

:
Smart Attendance System in an Enterprise-Based Access Point Environment. 1-6 - Umar Ajaib Khan, Rong Chai, Muhammad Junaid Tahir, Waleed Almughalles:

Joint Resource Allocation and Computation Offloading Strategy for D2D-assisted and NOMA-based MEC Systems. 1-7 - Rauful Nibir

, Md. Rafiqul Islam
, Nazmus S. Nafi, Mark A. Gregory:
Quintuple Band Antenna Design Using Stacked Series Array For Millimeter Wave. 1-6 - Marjan Moradi, Ayub Bokani

, Jahan Hassan
:
Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band Allocation. 1-6 - Kriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, Ladawan Klinkusoom, La-or Kovavisaruch

, Kamol Kaemarungsi:
A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System. 1-4 - Quentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val:

A distributed algorithm for range-based localization in sparse wireless networks. 1-8 - James Jin Kang

:
A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks. 1-3 - Marianne Cherrington, David Airehrour, Joan Lu

, Qiang Xu
, David Cameron-Brown, Ihaka Dunn:
Features of Human-Centred Algorithm Design. 1-6 - Silvia Mignardi

, Maximilian James Arpaio
, Chiara Buratti, Enrico Maria Vitucci
, Franco Fuschini, Roberto Verdone:
Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMs. 1-6 - Vijaya Durga Chemalamarri, Robin Braun

, Mehran Abolhasan
:
Constraint-Based Rerouting mechanism to address Congestion in Software Defined Networks. 1-6 - Rasha Al-Khansa, Hassan Ali Artail, Mohamad Assaad, Karim Y. Kabalan:

A Spatiotemporal Analysis of a Group-based Access Solution for Massive MTC Networks and the Stability-Scalability Trade-off. 1-8 - Irfan Simsek:

On-Demand Blind Packet Forwarding. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














