default search action
34th ITNAC 2024: Sydney, Australia
- 34th International Telecommunication Networks and Applications Conference, ITNAC 2024, Sydney, Australia, November 27-29, 2024. IEEE 2024, ISBN 979-8-3503-7911-2
- Yannick Carlinet, Eric Gourdin, Nancy Perrot:
Congestion Prevention at Ingress Peering Links. 1-8 - Abdullah Al Mamun, Harith Al-Sahaf, Ian Welch, Marinho Barcellos, Seyit Camtepe:
Limitations of Advanced Persistent Threat Datasets: Insights for Cybersecurity Research. 1-8 - Kai Lehniger, Peter Langendörfer:
StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture. 1-7 - Max Amiri, David M. Eyers, Zhiyi Huang:
A Specialised Synthetic Mobility Model Based on Real-World Traces. 1-5 - Priyanka Singla, Himmat Rathore:
Innovative Message Routing for Next Generation Transportation System Using GA-Based SVM. 1-7 - Ana Rita Ortigoso, Gabriel Vieira, Daniel Fuentes, Luís Frazão, Nuno Costa, António Pereira:
DDFH: Dynamic Dual Frequency Hopping for LoRa Networks. 1-4 - Tushar Gupta:
Evolution of Data Center Design to Handle AI Workloads. 1-8 - Geonho Song, Ganghyuk Jeon, Dongweon Yoon:
Deep Learning-Based Automatic Modulation Classification for Composite Modulated Radar Signal Using Time-Frequency Image. 1-6 - Kaori Iwata, Yoshihiro Ito:
A Study on Transmission Selection for Credit-Based Shaper in IEEE 802.1TSN. 1-4 - Hong Nhung Nguyen, Hong-Duc Phan:
A Novel AI Approach for Privacy Preserving In Biomedical Using Federated Learning. 1-5 - Shaimaa R. Alkaabi, Mark A. Gregory, Shuo Li:
Three-Phase Handover Protocol Design for Multi-Access Edge Computing. 1-5 - Prashanth PVN, Satish Kumar Yellaveni, Sudhamsu Mouli, Veeraiah Thalagondapati:
Towards Optimized Peer Connectivity in Blockchain Networks using Digital Twin. 1-6 - Abdussalam Salama, Maryam Bagheri, Emmanuel Onyilo Peter:
Comparative Performance Evaluation of Real-Time Traffic on Wi-Fi Standards: 802.11ax vs. 802.11ac. 1-4 - Muhammad Moazzam Ali, Shaiful Jahari Hashim, Zaid Ahmad, Guillaume Ferré, Fakhrul Zaman Rokhani, Muhammad Akmal Chaudhary:
Frame Error Rate of Turbo Coded Rotating Polarization Wave. 1-6 - Ayush Kumar, Kar-Wai Fok, Vrizlynn L. L. Thing:
ExpIDS: A Drift-Adaptable Network Intrusion Detection System with Improved Explainability. 1-7 - Rasini Amarasooriya, Mark A. Gregory, Shuo Li:
Explainable Artificial Intelligence for Computation Offloading Optimization. 1-8 - Rashmi Kushwaha, Rahul Bhattacharyya, Yatindra Nath Singh:
Reputation-Driven Peer-to-Peer Live Streaming Architecture for Preventing Free-Riding. 1-6 - Farhad Rahmanifard, Masoud Barati:
Data Compliance in P2P Energy Sharing: A Blockchain-Based Platform for PIPEDA. 1-7 - Saurab Rauniyar, Pål Orten, Stig Petersen:
Improving Last-Mile Maritime Communication Using Intelligent Reflecting Surfaces. 1-6 - Ahmed Asiri, Weiqi Wang, Feng Wu, Hiep Vo, Shui Yu:
FedXAI for Detecting DDoS on IoT Edge Networks in Federated Learning. 1-6 - MD Jannatul Rakib Joy, Philip Branch:
Flooding in LoRa Mesh Networks. 1-4 - Ayush Verma, Tanuj Chandela:
Towards WRSN Security: Probabilistic Approach for Malicious Node Identification. 1-6 - M. Jyothi Kiran, Venkatesh Chebolu, Goutam Das, Raja Datta:
ABACUS: A Joint Optimal Dynamic RMLSA in Elastic Optical Networks. 1-6 - Zolzaya Kherlenchimeg, Tumnee Telmuun, Ugtakhbayar Naidansuren, Nanzadragchaa Dambasuren, Di Zhang, Battulga Davaasambuu:
Parameter Estimation-Aided Conditional Handover. 1-4 - Philip Branch, Jason But:
Power Saving in LoRa Linear Networks Through Self Synchronization. 1-5 - Roberto Saia, Salvatore Carta, Gianni Fenu, Alessandro Sebastian Podda, Livio Pompianu:
Enhancing IDS with Ensemble LSTM Networks Using Real and GAN Data. 1-7 - Ana Moragrega, Carles Fernández-Prades:
Improving the Convergence of a Data-Driven Factor Graph Model for UWB-Based Positioning in Challenging Indoor Scenarios. 1-4 - Fahim Faisal, Birupaxha Mondal, Md Fahad Monir, Tarem Ahmed, Md Zahangir Alam:
WNetMon: An ML Approach for Real-time DoS Attack Detection in Wireless Networks. 1-7 - Siyu Ren, Haibo Mei, Shuang Du, Runzhi Fan, Qi Wang, Huan Ye:
Joint Task-Trajectory and Location Sense Optimization for UAV-enabled Communication Computation and Sense System. 1-6 - Hongyu Zhu, Abbas Jamalipour:
A Deep Learning Algorithm for UAV Placement in 6G Cell-Free Massive MIMO Networks. 1-6 - Safa Alghadi, Shuo Li, Withawat Withayachumnankul, Ke Wang:
Performance Analysis of Single-Carrier and Multi-Carrier Schemes in a Non-Linear Terahertz Communication System. 1-3 - Benjamin Förster, Thomas Hinze, Peter Langendörfer:
Topology- and Resource-Based Distribution Scheme for Collaborative Security-Focused Design Space Exploration in Large-Scale Static WSNs. 1-6 - Ismatov Akobir, Beomkyu Suh, Ki-Il Kim:
Fuzzy Logic Based Broadcasting Scheme for Mobile Ad Hoc Network. 1-6 - Ghazia Qaiser, Siva Chandrasekaran, Jinchuan Zheng, Rifai Chai:
Hybrid Deep Learning-Based Ensemble Model for Detecting Network-Based Cyber-Attacks of Industrial Internet of Services. 1-7 - Shuaijun Liu, Jiaying Yin, Jinqiu Du, Yaxin Zheng, Yuhui Deng, Jingjin Wu:
Meteorological and Topographical Big Data-Driven UAV Trajectory Planning. 1-6 - Jherson Caceres Chanaga, Efren Acevedo Cardenas, Julián Rodriguez-Ferreira:
Radio Propagation Model Adjusted to Mountainous Topography for TVWS Coverage Study. 1-7 - Mariam Munsif Mir, Wee Lum Tan, Mohammad Awrangjeb, Ali Zia:
A Comparative Analysis of IoT Device Fingerprinting Methods. 1-7 - Giuseppe Tricomi, Luca D'Agati, Michele Arena, Francesco Longo, Giovanni Merlino, Antonio Puliafito, Stefano Silvestri:
On the Way to Distribute Compute Continuum Urban Applications by Deploying Clusters of Drones. 1-5 - Xinyu Wan, Feiran You, Abbas Jamalipour:
Resource Allocation Optimization with Cluster Based Auction in Wireless Virtual Reality Network. 1-6 - Kaled Aljebur, Ron Addie:
The Cybersecurity Management of Incontrovertible Information. 1-8 - Ashish Sheikh:
Optimizing Channel Availability in WLAN 6GHz Networks Using Automatic Frequency Coordination(AFC) System. 1-4 - Khondaker Musfakus Salehin, Travis Ricker, Yi Wang, Alex Chen, Eiji Oki:
A Machine Learning Approach to Estimating Queuing Delay on Routers: The Multiple-Hop Case. 1-4 - Chung-Ming Huang, Yen-Hung Wu, Duy-Tuan Dao:
Reliability-considered Multi-platoon's Groupcasting using the Resource Sharing Method. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.