


default search action
Annales des Télécommunications, Volume 78
Volume 78, Number 1-2, February 2023
- Dorabella Santos

, Lúcia Martins
, Teresa Gomes
:
A biobjective availability optimization problem with nonlinear constraints. 1-12 - Jaime Galán-Jiménez

, Marco Polverini, Francesco Giacinto Lavacca, Juan Luis Herrera
, Javier Berrocal:
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks. 13-31 - Michael Braun

, Alexander Wiesmaier
, Nouri Alnahawi:
Efficient practical Byzantine consensus using random linear network coding. 33-51 - Kohei Shiomoto

, Tatsuya Otoshi
, Masayuki Murata:
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population. 53-70 - Narendra Kumar

, Siddhartha Siddhiprada Bhoi, Ruchir Gupta, Abhay Kumar Singh
:
Sliding window symbol-pair constrained codes for energy harvesting. 71-77 - Amit Kumar Singh

, Kamalesh Acharya, Ratna Dutta:
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles. 79-90 - Basil K. Jeemon

, T. K. Shahana:
PAPR reduction using constrained convex optimization for vector OFDM. 91-99 - C. Srikamu

, K. G. Sujanth Narayan
, S. Karthikeyan, R. Jayabharathy
:
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC. 101-113 - Pedro Victor Borges Caldas da Silva

, Chantal Taconet, Sophie Chabridon
, Denis Conan, Everton Cavalcante
, Thaís Batista:
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review. 115-131
Volume 78, Number 3-4, April 2023
- Ahmad Samer Wazan, Frédéric Cuppens:

Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures. 133-134 - Zhaosen Shi, Xuyang Ding

, Fagen Li, Yingni Chen, Canran Li:
Mitigation of a poisoning attack in federated learning by using historical distance detection. 135-147 - Raphaël M. J. I. Larsen

, Marc-Oliver Pahl
, Gouenou Coatrieux:
Multipath neural networks for anomaly detection in cyber-physical systems. 149-167 - David Cordova Morales

, Pedro B. Velloso
, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
A performance evaluation of C4M consensus algorithm. 169-182 - Zainab Khalid

, Farkhund Iqbal, Faouzi Kamoun, Liaqat Ali Khan, Babar Shah
:
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. 183-208 - Kai Lehniger

, Abdelaziz Saad, Peter Langendörfer
:
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices. 209-220 - Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:

Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography. 221-233 - Gang Zhang, Ping He, Lifang He:

Multi-carrier multi-level DCSK communication system based on time-reversal. 235-247
Volume 78, Number 5-6, June 2023
- Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas Machuca, Vinod Sharma, Anna Tzanakaki:

Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact. 249-251 - Publisher Correction: Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact. 253

- Dominique Chiaroni

, Raffaele Luca Amalfi, Jos George, Maximilian Riegel:
Towards greener digital infrastructures for ICT and vertical markets. 255-275 - Tilman Santarius

, Jan C. T. Bieser
, Vivian Frick, Mattias Höjer, Maike Gossen, Lorenz M. Hilty
, Eva Kern, Johanna Pohl
, Friederike Rohde
, Steffen Lange
:
Digital sufficiency: conceptual considerations for ICTs on a finite planet. 277-295 - Memedhe Ibrahimi

, Omran Ayoub
, Aryanaz Attarpour, Francesco Musumeci, Andrea Castoldi, Mario Ragni, Massimo Tornatore:
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards. 297-311 - Louis Golard

, Jérôme Louveaux, David Bol:
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020-2025. 313-327 - Kishalay Bairagi

, Sulata Mitra, Uma Bhattacharya:
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints. 329-346 - Ali Kadhum Idrees

, Lina Waleed Jawad:
Energy-efficient Data Processing Protocol in edge-based IoT networks. 347-362 - Bartlomiej Blaszczyszyn, Philippe Jacquet, Bernard Mans

, Dalia Popescu:
Energy and delay trade-offs of end-to-end vehicular communications using a hyperfractal urban modelling. 363-381
Volume 78, Number 7-8, August 2023
- Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens:

Foreword of the special issue on « FPS 2021» symposium. 383 - Hazel Murray

, David Malone:
Adaptive password guessing: learning language, nationality and dataset source. 385-400 - João Vitorino

, Isabel Praça
, Eva Maia
:
Towards adversarial realism and robust learning for IoT intrusion detection and classification. 401-412 - Dylan Paulin, Raphaël Joud, Christine Hennebert

, Pierre-Alain Moëllic, Thibault Franco-Rondisson, Romain Jayles:
HistoTrust: tracing AI behavior with secure hardware and blockchain technology. 413-427 - Rania Taleb

, Sylvain Hallé, Raphaël Khoury:
A modular pipeline for enforcement of security properties at runtime. 429-457 - Jemimah J. P. P

, S. Miruna Joe Amali:
Secure and low PAPR OFDM system using TCCM. 459-474 - Tapan Kumar Mohanta

, Dushmanta Kumar Das:
A three-dimensional wireless sensor network with an improved localization algorithm based on orthogonal learning class topper optimization. 475-489 - Mohammad Akhondi Darzikolaei, Mohammad Ali Alirezapouri:

A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system. 491-507 - Shengzhou Hu

, Tingting Zhong, Hua He, Wenhao Li:
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain. 509-524
Volume 78, Number 9-10, October 2023
- Fatima Salahdine

, Tao Han, Ning Zhang:
5G, 6G, and Beyond: Recent advances and future challenges. 525-549 - Dennis Krummacker

, Benedikt Veith
, Daniel Lindenschmitt, Hans D. Schotten:
DLT architectures for trust anchors in 6G. 551-560 - Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak:

Backscatter communication system efficiency with diffusing surfaces. 561-576 - Pinakpani Mukherjee

, Santu Sarkar, Nikhil R. Das:
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk. 577-584 - T. Nathezhtha, Sangeetha Dhamodaran

, Vaidehi V.:
Social network malicious insider detection using time-based trust evaluation. 585-597 - Rim Jouini, Chiraz Houaidia

, Leïla Azouz Saïdane:
Hidden Markov Model for early prediction of the elderly's dependency evolution in ambient assisted living. 599-615 - Mohamed Hamidi

, Ouissam Zealouk, Hassan Satori
:
Telephony speech system performance based on the codec effect. 617-625 - Chongrui Pan, Guanding Yu

:
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity. 627-639 - Yuxi Du

, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba:
Robust adaptive beamforming algorithm for coherent signals based on virtual array. 641-651
Volume 78, Number 11-12, November 2023
- Mohamed Lahby, Rachid Saadane

, Sérgio D. Correia:
Integration of IoT with cloud computing for next generation wireless technology. 653-654 - Tarek Moulahi, Salim El Khediri

, Durre Nayab
, Mushira Freihat, Rehan Ullah Khan:
Effects of dataset attacks on machine learning models in e-health. 655-665 - Preechai Mekbungwan

, Adisorn Lertsinsrubtavee, Sukumal Kitisin
, Giovanni Pau
, Kanchana Kanchanasut:
Towards programmable IoT with ActiveNDN. 667-684 - Publisher Correction: Towards programmable IoT with ActiveNDN. 685

- Sevda Özge Bursa

, Özlem Durmaz Incel
, Gülfem Isiklar Alptekin:
Building Lightweight Deep learning Models with TensorFlow Lite for Human Activity Recognition on Mobile Devices. 687-702 - Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi:

Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework. 703-715 - Sara Yassmine Brahimi, Fatna Mouffak, Fatima Zohra Bousbaa, Chaker Abdelaziz Kerrache

, Nasreddine Lagraa, Abderrahmane Lakas
:
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach. 717-728 - Nahid Eddermoug, Abdeljebar Mansour

, Mohamed Sadik
, Essaid Sabir
, Mohamed Azmi:
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments. 729-755

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














