


default search action
Annales des Télécommunications, Volume 77
Volume 77, Number 1-2, February 2022
- Maria Potop-Butucaru, Ariel Orda, Maurice Herlihy, Stefano Secci:

Special issue on blockchain networks and distributed protocols. 1-2 - Oded Noam, Ori Rottenstreich

:
Realizing privacy aspects in blockchain networks. 3-12 - Saima Zafar

, K. M. Bhatti, M. Shabbir, Fabiha Hashmat, Ali Hammad Akbar:
Integration of blockchain and Internet of Things: challenges and solutions. 13-32 - Pravin Pawar, Neeraj Parolia, Sameer Shinde, Thierry Oscar Edoh, Madhusudan Singh

:
eHealthChain - a blockchain-based personal health information management system. 33-45 - Vincent Messie

, Gaël Fromentoux, Nathalie Labidurie Omnès, Benoit Radier, Sandrine Vaton
, Isabel Amigo
:
BALAdIN: truthfulness in collaborative access networks with distributed ledgers. 47-59 - Maya Leshkowitz, Olivia Benattasse, Oded Wertheim, Ori Rottenstreich

:
Scalable blockchain execution via parallel block validation. 61-76 - Serguei Popov

, Sebastian Müller:
Voting-based probabilistic consensuses and their applications in distributed ledgers. 77-99 - Antonio Emerson Barros Tomaz

, José Cláudio do Nascimento, José Neuman de Souza:
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest. 101-118
Volume 77, Number 3-4, April 2022
- Swati Rawal, Sahadeo Padhye

, Debiao He:
Lattice-based undeniable signature scheme. 119-126 - Van Phu Tuan

, Hyung Yun Kong:
Secrecy sum rate maximization for UAV-aided NOMA communication systems. 127-138 - Alex Borges Vieira, Wallace Nascimento Paraizo, Luciano Jerez Chaves, Luiz H. A. Correia, Edelberto Franco Silva

:
An SDN-based energy-aware traffic management mechanism. 139-150 - Supriya Aggarwal

:
Product of two Gaussian Q-functions as sum of exponentials and its applications. 151-161 - Muhammad Muaaz

, Ali Chelli, Martin Wulf Gerdes, Matthias Pätzold:
Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems. 163-175 - Mustafa Namdar

, Arif Basgumus
, Sultan Aldirmaz Çolak, Eylem Erdogan
, Hakan Alakoca, Seda Ustunbas, Lutfiye Durak-Ata:
Iterative interference alignment with spatial hole sensing in MIMO cognitive radio networks. 177-185 - Ba Cao Nguyen

, Xuan Nam Tran
, Dinh Tan Tran:
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments. 187-200 - Abdelwahab Boualouache

, Thomas Engel:
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing. 201-220 - Zahi Nakad, Mohammad Ali Sayed

, Anthony Yaghi, Harag Margossian
, Wissam Fawaz
:
A novel offline indoor acoustic synchronization protocol: experimental analysis. 221-236 - Gang Zhang, Jiangtao Dong

, Lifang He:
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing. 237-250
Volume 77, Number 5-6, June 2022
- Selma Boumerdassi, Ruben H. Milocco, Leïla Saïdane, Nicolas Puech:

Machine learning for networking. 251-252 - Miguel Landry Foko Sindjoung

, Pascale Minet
:
Estimating and predicting link quality in wireless IoT networks. 253-265 - V. Ch Sekhar Rao Rayavarapu

, Arunanshu Mahapatro
:
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers. 267-280 - Golshan Famitafreshi

, Cristina Cano
:
Achieving proportional fairness in WiFi networks via bandit convex optimization. 281-295 - Ons Aouedi

, Kandaraj Piamrat, Salima Hamma, Menuka Perera Jayasuriya Kuranage:
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network. 297-309 - Adel Djama

, Badis Djamaa
, Mustapha Réda Senouci, Nabil Khemache:
LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks. 311-330 - Adda Boualem

, Hacène Fouchal
, Marwane Ayaida, Cyril De Runz:
Fibonacci tiles strategy for optimal coverage in IoT networks. 331-344 - Abdallah Sobehy

, Éric Renault, Paul Mühlethaler:
Generalization aspect of accurate machine learning models for CSI-based localization. 345-357 - Samuel A. Ajila

, Chung-Horng Lung
, Anurag Das:
Analysis of error-based machine learning algorithms in network anomaly detection and categorization. 359-370 - Arnaud Rosay

, Kévin Riou
, Florent Carlier
, Pascal Leroux
:
Multi-layer perceptron for network intrusion detection. 371-394 - Ola Salman

, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab
:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. 395-406 - Martín Panza

, Diego Madariaga
, Javier Bustos-Jiménez:
Extracting human behavior patterns from DNS traffic. 407-420 - Diogo Ferreira

, Carlos R. Senna
, Paulo Salvador
, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento
:
Prediction of low accessibility in 4G networks. 421-435 - Taku Wakui

, Takao Kondo
, Fumio Teraoka:
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN. 437-454
Volume 77, Number 7-8, August 2022
- Diogo Menezes Ferrazani Mattos, Dianne Scherly Varela de Medeiros, Daniel Mossé:

Enabling technologies for running IoT applications on the cloud. 455-456 - Silvio E. Quincozes

, Diego G. Passos
, Célio Vinicius N. de Albuquerque, Daniel Mossé, Luiz Satoru Ochi:
An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer. 457-471 - Kirti A. Yadav, P. Vijayakumar

:
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network. 473-489 - Melody Jamalzadeh, Mohsen Maadani

, Mojdeh Mahdavi:
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles. 491-503 - Renato Souza Silva

, Luís F. M. de Moraes:
A balanced prior knowledge model based on Beta function for evaluating DIDS performance. 505-515 - Gabriel Antonio F. Rebello

, Gustavo Franco Camilo
, Lucas C. B. Guimarães
, Lucas Airam C. de Souza
, Guilherme A. Thomaz
, Otto Carlos M. B. Duarte:
A security and performance analysis of proof-based consensus protocols. 517-537 - Lucas C. B. Guimarães

, Gabriel Antonio F. Rebello, Gustavo Franco Camilo
, Lucas Airam C. de Souza
, Otto Carlos M. B. Duarte:
A threat monitoring system for intelligent data analytics of network traffic. 539-554 - João Vitor Valle Silva, Nicollas Rodrigues de Oliveira

, Dianne S. V. Medeiros, Martin Andreoni Lopez
, Diogo M. F. Mattos:
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms. 555-571
Volume 77, Number 9-10, October 2022
- Shi Dong

, Yuanjun Xia, Tao Peng:
Traffic identification model based on generative adversarial deep convolutional network. 573-587 - Abdelouahab Bentrcia

:
Block-wise Kaczmarz successive interference cancellation: a matrix algebraic approach. 589-599 - Nadia Mouawad

, Rami Khoder, Rola Naja, Samir Tohmé:
Vertical group handover congestion game for a vehicular platoon in VLC networks. 601-610 - Rodrigo S. V. Eiras

, Rodrigo S. Couto
, Marcelo G. Rubinstein
:
Performance evaluation of an HTTP proxy implemented as a virtual network function. 611-619 - Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee

:
An improved user authentication and key agreement scheme for roaming service in ubiquitous network. 621-640 - Aymen Hasan Alawadi

, Sándor Molnár:
Oddlab: fault-tolerant aware load-balancing framework for data center networks. 641-662 - Wanjia Zheng

, Kazumasa Omote:
A study on robustness of malware detection model. 663-675 - Dimas Mavares Terán

, Kevin M. Diaz España, Laura I. Ochoa Escobar:
Full data rate space-time code selection. 677-688 - Kais Jallouli

, Mohamed Mazouzi, Jean-Philippe Diguet, Alireza Monemi, Salem Hasnaoui:
MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA. 689-702 - Ghufran Ali M. Jawad, Ali Kadhum M. Al-Qurabat

, Ali Kadhum Idrees
:
Maximizing the underwater wireless sensor networks' lifespan using BTC and MNP5 compression techniques. 703-723 - Editorial Expression of Concern: Motor imagery-based neuro-feedback system using neuronal excitation of the active synapses. 725

Volume 77, Number 11-12, December 2022
- Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang:

Interactions between artificial intelligence and cybersecurity to protect future networks. 727-729 - Maria Mushtaq

, Muhammad Muneeb Yousaf, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat
:
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection. 731-747 - Theobald de Riberolles, Yunkai Zou, Guthemberg Silvestre, Emmanuel Lochin

, Jiefu Song
:
Anomaly detection for ICS based on deep learning: a use case for aeronautical radar data. 749-761 - Mohamed Amine Merzouk

, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Investigating the practicality of adversarial evasion attacks on network intrusion detection. 763-775 - Yuki Osada, Ryusei Nagasawa, Yoshiaki Shiraishi

, Makoto Takita, Keisuke Furumoto, Takeshi Takahashi, Masami Mohri, Masakatu Morii:
Multi-labeling with topic models for searching security information. 777-788 - Fabien Charmet

, Harry Chandra Tanuwidjaja, Solayman Ayoubi
, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. 789-812 - Antonio José Silvério, Rodrigo S. Couto

, Miguel Elias M. Campista
, Luís Henrique M. K. Costa:
A bi-objective optimization model for segment routing traffic engineering. 813-824 - Juin Acharjee

, Kaushik Mandal, Sujit Kumar Mandal:
Slotted patch and ground for reducing side lobe level of planar antenna operating under higher order mode. 825-834 - Xu Lu

, Kezhou Chen, Rongjun Chen:
Balance: depolarized intelligent sensing system with multi-angle energy-saving optimized control model. 835-846 - Haidar Taki

, Chadi Abou-Rjeily:
On enhancing the transmission efficiency of modulated UWB signals under different emission standards. 847-865 - Fábio Henrique Cabrini

, Albérico de Castro Barros Filho, Douglas Braz Maciel, Filippo Valiante Filho
, Augusto José Venâncio Neto, Sergio Takeo Kofuji:
Helix Multi-layered: a context broker federation for an efficient cloud-to-things continuum. 867-879

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














