default search action
20th DRCN 2024: Montreal, QC, Canada
- 20th International Conference on the Design of Reliable Communication Networks, DRCN 2024, Montreal, QC, Canada, May 6-9, 2024. IEEE 2024, ISBN 979-8-3503-4897-2
- Ali Bostani, Amir Baniamerian, Ahraf Zaher, Mohammad Al Shammari:
LEO Satellite Constellations with 5G and 6G Networks for Enhanced IoT and PV System Performance. 1-7 - Elarbi Badidi, Hanane Lamaazi, Omar El Harrouss:
Toward a Secure Healthcare Ecosystem: A Convergence of Edge Analytics, Blockchain, and Federated Learning. 1-5 - Guillaume Breyton, Mohd Saqib, Benjamin C. M. Fung, Philippe Charland:
BETAC: Bidirectional Encoder Transformer for Assembly Code Function Name Recovery. 1-8 - Dimitrios Michael Manias, Ali Chouman, Abdallah Shami:
Towards Intent-Based Network Management: Large Language Models for Intent Extraction in 5G Core Networks. 1-6 - Fabrizio Baiardi, Cosimo Comella, Vincenzo Sammartino:
Satisfying Least Privilege Through Database Decomposition. 1-6 - Naohide Wakuda, Nozomi Kita, Ryuta Shiraki, Eiji Oki:
Analytical Model for Assessing Unavailability in Middleboxes with Multiple Backup Servers under Shared Protection. 1-8 - Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, Ahmed Hashem El Fiky:
Using AI to Detect Android Malware Families. 1-8 - Sara Taghavi Motlagh, Amin Ibrahim, Shahram Shah-Heydari, Khalil El-Khatib:
Multi-Objective Optimization for Managing Disruption Risk in SDN. 1-8 - Imene Romdhane, Ziyaur Rahman, Georges Kaddoum:
DDPG-Based Link Adaptation for Direct Air-to-Underwater Optical Communication Under Noisy CSI Conditions. 1-6 - Antonios Ntib, Panagiotis Katrakazas, Evangelia Panourgias, Vasileios Prevelakis:
Use Case of ML-Algorithm to Effectively Detect Malignant Breast Tumors Without Compromising Medical Data Privacy. 1-7 - Dariush Ebrahimi, Govind Sudarshan, Fadi Alzhouri:
BNART: A Novel Centralized Traffic Management Approach for Autonomous Vehicles. 1-8 - Ashraf A. Tahat, Farah Wahhab, Talal A. Edwan:
An Exemplification of Decisions of Machine Learning Classifiers to Predict Handover in a 5G/4G/3G Cellular Communications Network. 1-5 - Fatemeh Stodt, Fabrice Theoleyre, Christoph Reich:
Advancing Network Survivability and Reliability: Integrating XAI-Enhanced Autoencoders and LDA for Effective Detection of Unknown Attacks. 9-16 - Jinyuan Gu, Mingxing Wang, Wei Duan, Lei Zhang, Huaiping Zhang:
Imperfect SIC for NOMA Communications Under Nakagami-m Fading: Comparison of RIS and Relay. 17-23 - Fenghua Wang, Jinyi Zou, Robert E. Kooij:
Analytical Approximation for ATTR with Respect to Node Removals. 24-31 - Mostafa Abbasmollaei, Tarek Ould-Bachir, Yvon Savaria:
Normal and Resilient Mode FPGA-based Access Gateway Function Through P4-generated RTL. 32-38 - Abdelhak Bentaleb, Sarra Hammoudi:
BML3: Accurate Bandwidth Measurement for QoE Optimization in Low Latency Live Streaming. 39-46 - Aunas Manzoor, Mustafa Özger, Dominic Schupke, Cicek Cavdar:
Combined Airspace and Non-Terrestrial 6G Networks for Advanced Air Mobility. 47-53 - Yan Jiao, Pin-Han Ho, Xiangzhu Lu, János Tapolcai, Limei Peng:
On Board-Level Failure Localization in Optical Transport Networks Using Graph Neural Network. 54-61 - Maryam Ben Driss, Essaid Sabir, Halima Elbiaze, Abdoulaye Baniré Diallo, Mohamed Sadik:
GWO-Boosted Multi-Attribute Client Selection for Over- The-Air Federated Learning. 62-69 - Mohammed Mahyoub, Sazzad Hossain, Ashraf Matrawy:
On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks. 70-75 - Dimitrios Michael Manias, Joe Naoum-Sawaya, Abbas Javadtalab, Abdallah Shami:
Probabilistic Fault-Tolerant Robust Traffic Grooming in OTN-over-DWDM Networks. 76-83 - Arunabha Sen, Christopher Sumnicht, Suli Adeniye, D. Patel, Sandipan Choudhuri:
Fault-Tolerant Network Design for Bounded Delay Data Transfer from PMUs to Control Center. 84-91 - Y A Joarder, Carol J. Fung:
QUICwand: A Machine Learning Optimization-Based Hybrid Defense Approach Against QUIC Flooding Attacks. 92-99 - Nusrat Samia, Sajal Saha, Anwar Haque:
Advancing Network Resilience Through Data Mining and Machine Learning in Cybersecurity. 100-106 - Ehsan Tohidi, Max Franke, Cao Vien Phung, Naveed Ali Kaim Khani, André C. Drummond, Stefan Schmid, Admela Jukan, Slawomir Stanczak:
Reliability Assurance in RIS-Assisted 6G Campus Networks. 107-114 - Maria Samonaki, Carmen Mas Machuca:
Optimal and Reliable Routing for Multicast Sessions in WDM Networks. 115-122 - Soheil Hosseini, Ignacio de Miguel, Óscar González de Dios, Noemí Merayo, Juan Pedro Fernández-Palacios, Ramón J. Durán Barroso:
Dynamic Restoration Assessment in Partially Upgraded Networks from the C to the C+L bands. 123-128 - Mahzabeen Emu, Salimur Choudhury, Kai Salomaa:
Robust Virtual Network Function Optimization Under Post-Failure Uncertainty: Classical & Quantum Computing. 129-135 - AbdulAziz AbdulGhaffar, Mohammed Mahyoub, Ashraf Matrawy:
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations. 136-142 - Alon Marzin, Moshe Schwartz, Michael Segal:
Covert Communication by Exploiting Error-Correcting Codes. 143-150 - Manuel Utsch, Björn Böckling, Wolfgang Kiess, Thomas Bauschert, Andreas Baumgartner, Sebastian Baumgärtner:
High-Availability in IoT Applications through Dual Connectivity: Integrating LoRaWAN and NB-IoT. 151-158 - Dawid Kulikowski, Kamran Zia, Alessandro Chiumento, Paul J. M. Havinga:
Towards Robust Slice Control in SDN Enabled WiFi based IoT Networks. 159-164 - Mohammad Reza Mousavi, Stephan Ludwig:
Application of HFrFT-OFDM to IEEE 802.11bd Performance Enhancement for Vehicle-to-vehicle Communication in High Speed Conditions. 165-171
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.