


default search action
33rd ITNAC 2023: Melbourne, Australia
- 33rd International Telecommunication Networks and Applications Conference, ITNAC 2023, Melbourne, Australia, November 29 - Dec. 1, 2023. IEEE 2023, ISBN 979-8-3503-1713-8

- Mohammed Elsagher, Akram Al-Hourani, Ke Wang

:
On the Spatial Correlation of UAV-to-Ground Excess Path-Loss. 1-6 - Mohammed F. Suleiman

, Usman Adeel:
Energy Efficient Data Collection Using Predefined Path Constrained Mobility for Mobile Sinks in Wireless Sensor Networks. 1-6 - Jóhannus Kristmundsson, Øystein Patursson, John R. Potter

, Qin Xin
:
Exploring Cellular Communications for Remote Offshore Aquaculture Monitoring. 7-10 - Kai-Chun Yang, Po-Ching Lin:

Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme. 11-18 - K. T. Arasu, Michael R. Clark, Timothy Michael McManus:

A New Class of Optimal Frequency Hopping Sequences with Applications to Secure Communication Waveforms. 19-24 - Aiman Nait Abbou, Konstantinos Samdanis, Jukka Manner

:
URLLC in B5G Networks: Use Cases, TSN/DetNet Extension, and Pending Issues. 25-30 - Aliyu Makama, Koojana Kuladinithi, Andreas Timm-Giel:

Modeling and Evaluation of Geophone Energy Consumption in Wireless Seismic Data Acquisition Networks. 31-37 - Konrad Fuger

, Koojana Kuladinithi, Manav Sood, Andreas Timm-Giel:
Feasibility Study on Position Verification in Urban UAV Networks. 38-43 - Sun-Jin Lee, Na-Yeon Shin, Jung-Hyun Moon, Il-Gu Lee:

DANCE: Dynamic Anchor Node-Based Cooperative Enhancement of Wireless Indoor Localization for Internet of Things. 44-50 - Kodai Tanabe, Go Hasegawa, Gen Kitagata:

Adaptive compression of operational commands for remote network management over LPWA. 51-56 - Amjed Abbas Ahmed

, Mohammad Kamrul Hasan, Nurhizam Safie Mohd Satar, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Detection of Crucial Power Side Channel Data Leakage in Neural Networks. 57-62 - Bruno Ribeiro, Pedro Gonçalves

, Paulo C. Bartolomeu
:
Digital Twin Migration using the OKD platform: A Use-Case for Emergency Vehicles. 63-69 - Yu-Ran Jeon, Jung-Hwa Ryu, So-Yeon Kim, Na-Eun Park, Il-Gu Lee:

CaliProb: Probability-based Calibration Model for Robust Predictions in Environments with Data Biases. 70-75 - Yooncheol Choi, Dongyeong Kim, Mingyu Jang, Dongweon Yoon:

Spreading Sequence Blind Estimation in DSSS System Using Gradient Ascent Method. 76-79 - Amjed Abbas Ahmed

, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Mohammad Siab Nahi:
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks. 80-83 - Ryota Fukuda, Masahiro Shibata, Masato Tsuru:

Optimal Scheduling of Multipath Multicast with In-network Cache for One-to-many Transfer. 84-91 - Makoto Ito, Taiju Mikoshi, Kouichi Genda:

Deep Learning Based Path Planning Using Integer Linear Programming Method to Teacher Signal. 92-97 - RuoYang Gu, Jinlong Fei, Hao Yu, Yuefei Zhu, Kai Yang, Fang Guo:

Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection. 98-104 - B. Frischkorn, Michael Knitter, Wolfgang Endemann, Rüdiger Kays:

Achieving Sub-meter Accuracy for 5G Localization at FR1 Bandwidth Limitations. 105-109 - Ayush Kumar, Vrizlynn L. L. Thing:

Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection. 110-117 - Deven Panchal

, Dan Musgrove, Isilay Baran, David Lu:
Sharing, Licensing, Buying, Selling and Operationalizing ML Models: A Deep Learning based Co-operative and Co-ordinated Security usecase. 118-123 - Kola Thirupathaiah

, Montasir Qasymeh, A. Ramakrishna:
Nanoplasmonic Broadband Filters Using Broadside Edge Coupled Coplanar Waveguide. 124-127 - Ashish Rauniyar

, Olav N. Østerbø, Jan Erik Håkegård, Paal E. Engelstad:
Ergodic Performance Analysis of Reconfigurable Intelligent Surface Enabled Bidirectional NOMA. 128-133 - Praveen Peiris, Thursha Herath, Roshani Dissanayaka, Kanishka Saranga, Samantha Thelijjagoda, Ishara Weerathunge:

Comprehensive Browser Extension for Analysing YouTube User Engagement, Controversy, User Requirements, and Trending Keywords. 134-139 - Belal Ali

, Mark A. Gregory, Shuo Li
, Omar Amjad Dib
:
Zero Trust Security Framework for 5G MEC Applications: Evaluating UE Dynamic Network Behaviour. 140-144 - Bin Liang, Mark A. Gregory, Shuo Li

:
Service-driven User Plane Architecture for Future Cellular Networks and Multi-access Edge Computing. 145-151 - Shaimaa R. Alkaabi

, Mark A. Gregory, Shuo Li
:
Server Search and Selection Algorithm for a Pre-Handover in Multi-Access Edge Computing. 152-155 - Alexander Frömming, Stefan Diederich, Lars Häring, Andreas Czylwik:

Clipping Noise Mitigation for Coherent OFDM Systems Using Decision-Aided Reconstruction Combined with Neural Networks. 156-161 - Rafee Al Ahsan

, Fadhel M. Ghannouchi, Abraham O. Fapojuwo:
Analysis of Adapted Tone Reservation PAPR Reduction Techniques in OTSM System. 162-168 - Mohammad Reza Dibaj

, Pouya Mehdizadeh
, Mohammad Sadegh Ghasrizadeh, Hamzeh Beyranvand, Juan Carlos Hernandez-Hernandez, José Alberto Hernández, David Larrabeiti, Farhad Arpanaei:
From Strings to Streams: A Multi-Period Analysis of QKD over EONs, Showcasing Multi-Band vs. Multi-Fiber Solutions. 169-175 - Filippos Christou, Andreas Kirstädter:

Using Intent Directed Acyclic Graphs in Multi-Domain IP-Optical Networks. 176-179 - Md. Jahid Faruki, Nemai Karmakar:

Modulation Bandwidth Study on SQW GaN LEDs for High-Speed Visible Light Communication. 180-182 - Yevhenii Shudrenko

, Koojana Kuladinithi, Daniel Plöger, Andreas Timm-Giel:
Optimizing Data Latency for Time-Critical Avionic Sensors. 183-189 - Evizal Abdul Kadir, Akram Alomainy, Hanita Daud, Warih Maharani, Noryanti Muhammad

, Nesi Syafitri
:
Multi Sensor Network System for Early Detection and Prediction of Forest Fires in Southeast Asia. 190-195 - Steven Cumming, Philip Branch:

A LoRa-Based Monitoring System for Agriculture. 196-203 - Shih-Jung Wang, Bo-Jhen Huang, Ming-Hui Hu:

A Deep Learning-based Air Quality Index Prediction Model Using LSTM and Reference Stations: A Real Application in Taiwan. 204-209 - Da-Ren Chen:

Sensor-Centric Link Adaptation and Transmit Power Control for Energy-Efficient and Quality-of-Service WBANs. 210-213 - Philip Branch, Phillip Weinstock

:
Functional Programming for the Internet of Things: A LoRa-MQTT Gateway written in Elixir. 214-217 - Camilo Anzola Rojas

, Juan Carlos Aguado
, Ramón J. Durán Barroso
, Ignacio de Miguel
, Noemí Merayo
, Patricia Fernández
, Rubén M. Lorenzo
, Evaristo J. Abril
:
RSU Placement Considering V2X Services Requirements and Available Radio Resources. 218-221 - Ken T. Murata, Kazutaka Kikuta

, Tsutomu Nagatsuma, Hideo Imanaka, Praphan Pavarangkoon
:
International Deployment of Visual IoT for Disaster Mitigation. 228-233 - Boris Ramos, Edison Del Rosario, Nelson Tovar:

Assessing the Capability of Random Forest to Estimate Received Power in LoRaWAN for Agricultural Settings Using Climate Data. 234-239 - Jesus Arellano-Uson

, Eduardo Magaña, Daniel Morató, Mikel Izal:
Evaluation of RTT as an Estimation of Interactivity Time for QoE Evaluation in Remote Desktop Environments. 240-245 - Sota Uchida, Hikaru Shimada, Tomotaka Wada, Naohisa Hashimoto:

Pedestrian-Vehicle Collision Avoidance Support System Considering the Left and Right Positions of Pedestrians. 246-251 - Hye-Yeon Shim, Tae-Rim Park, Il-Gu Lee:

Hybrid Encryption Technique for Low-Latency Multi-Hop Communications. 252-258 - Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Abdul Rahman, Dhruv Nandakumar, Christopher Redino, Kevin Choi, Robert Schiller, Sanmitra Bhattacharya, Balaji Veeramani, Alex West, Edward Bowen:

Anomaly Detection via Federated Learning. 259-266 - Sarah Alharbi, Arshiya Khan:

Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection. 267-270 - Nenad Dragun

, Nikola Bogunovic:
Enhancing Intent-Driven Networking with Granular and Aspect Approach. 271-276 - Shouthiri Partheepan, Farzad Sanati

, Jahan Hassan:
An Analysis of Pre-trained Models Versus Custom Deep Learning Models for Forest Fire Detection. 277-282 - Noureen Islam, Md Fahad Monir, M. M. Mahbubul Syeed, Mahady Hasan

, Mohammad Faisal Uddin:
Federated Learning Integration in O- RAN: A Concise Review. 283-288 - Santanam Kasturi, Xiaolong Li, John Pickard, Peng Li:

Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools. 289-296 - Shawn A. Prestridge, James G. Dunham, Dinesh Rajan:

Information-Theoretic Security in BB84 QKD. 297-303 - Shijin Liu, Hiroaki Fukuda, Paul Leger:

An RF-based Low Rate DDoS Attack Real-time Detection System. 304-309 - Alessandro Pino

, Davide Margaria
, Andrea Vesco
:
Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks. 310-317 - Hao Yu, Bin Lu, RuoYang Gu, Di Wang, Long Meng, Fang Guo:

TGP-based dynamic traffic camouflage method. 318-324 - Amjed Abbas Ahmed

, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, Azana Hafizah Mohd Aman, Shayla Islam, Saif Aamer Fadhil:
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks. 325-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














