default search action
30th ITNAC 2020: Melbourne, Australia
- 30th International Telecommunication Networks and Applications Conference, ITNAC 2020, Melbourne, Australia, November 25-27, 2020. IEEE 2020, ISBN 978-1-7281-8827-0
- Uwe Bauknecht, Tobias Enderle:
An Investigation on Core Network Latency. 1-6 - Hadi Alasti:
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field. 1-6 - M. Lakshmi Prasad Reddy, Sumanth Sakkara:
QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error Termination. 1-6 - Araya Kibrom Desta, Shuji Ohira, Ismail Arai, Kazutoshi Fujikawa:
MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks. 1-7 - Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman:
Detecting Network Intrusion through Anomalous Packet Identification. 1-6 - Zahir M. Hussain:
Energy-Efficient Systems for Smart Sensor Communications. 1-4 - Tony, Sieteng Soh, Mihai M. Lazarescu, Kwan-Wu Chin:
Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory Effects. 1-8 - Raman Singh, Andrew Donegan, Hitesh Tewari:
Framework for a Decentralized Web. 1-7 - Natiq M. Abdali, Zahir M. Hussain:
Reference-free Detection of LSB Steganography Using Histogram Analysis. 1-7 - Hamad Saud Alotaibi, Mark A. Gregory, Shuo Li, Hoang Do:
Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking-Based Gateways. 1-6 - Stanislaw Baranski, Jerzy Konorski:
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain. 1-6 - Md. Khairul Islam, Prithula Hridi, Md. Shohrab Hossain, Husnu S. Narman:
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier. 1-7 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:
MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments. 1-6 - Donovan Allen, Navid Shaghaghi:
Cuckoo Prefix: A Hash Set for Compressed IP Blocklists. 1-8 - Marianne Cherrington, David Airehrour, Joan Lu, Qiang Xu, Steve J. Wade, Ihaka Dunn:
Indigenous Big Data Implications in New Zealand. 1-6 - Ahmet Kaplan, Ibrahim Altunbas, Gunes Karabulut-Kurt, Mustafa Kesal, Defne Kucukyavuz:
OFDM-IM Performance Evaluation Under Jamming Attack. 1-6 - James Yockey, Benjamin Campbell, Andrew Coyle, Robert A. Hunjet:
Emulating Low Probability of Detection Algorithms. 1-6 - Bo Hu, Benjamin Fisher, Alirio Guerra, John P. T. Mo:
Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation. 1-4 - Da-Ren Chen, Wei-Min Chiu:
Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination Images. 1-6 - Liwei Yang, Qi Zhang, Ziyi Huang, Wenjie Zhang:
Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical Networks. 1-6 - Mohanad Alhabo, Naveed Nawaz, Omer Waqar:
Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous Networks. 1-6 - Md. Akbar Hossain, Sayan Kumar Ray, Seyed Reza Shahamiri, M. Daud Ahmed, Garry Singh, Rose Arts:
An End-to-End Medical Emergency Response System to Support Elderly People. 1-6 - Paul Zanna, Peter J. Radcliffe, Dinesh Kumar:
WP4: A P4 Programmable IEEE 802.11 Data Plane. 1-6 - Maryam Shahpasand, Leonard G. C. Hamey, Mohamed Ali Kâafar, Dinusha Vatsalan:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. 1-8 - Syed Danial Ali Shah, Mark A. Gregory, Shuo Li:
Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading. 1-3 - Temitope Odewole, Rajan Kadel:
Smart Attendance System in an Enterprise-Based Access Point Environment. 1-6 - Umar Ajaib Khan, Rong Chai, Muhammad Junaid Tahir, Waleed Almughalles:
Joint Resource Allocation and Computation Offloading Strategy for D2D-assisted and NOMA-based MEC Systems. 1-7 - Rauful Nibir, Md. Rafiqul Islam, Nazmus S. Nafi, Mark A. Gregory:
Quintuple Band Antenna Design Using Stacked Series Array For Millimeter Wave. 1-6 - Marjan Moradi, Ayub Bokani, Jahan Hassan:
Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band Allocation. 1-6 - Kriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, Ladawan Klinkusoom, La-or Kovavisaruch, Kamol Kaemarungsi:
A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System. 1-4 - Quentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val:
A distributed algorithm for range-based localization in sparse wireless networks. 1-8 - James Jin Kang:
A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks. 1-3 - Marianne Cherrington, David Airehrour, Joan Lu, Qiang Xu, David Cameron-Brown, Ihaka Dunn:
Features of Human-Centred Algorithm Design. 1-6 - Silvia Mignardi, Maximilian James Arpaio, Chiara Buratti, Enrico Maria Vitucci, Franco Fuschini, Roberto Verdone:
Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMs. 1-6 - Vijaya Durga Chemalamarri, Robin Braun, Mehran Abolhasan:
Constraint-Based Rerouting mechanism to address Congestion in Software Defined Networks. 1-6 - Rasha Al-Khansa, Hassan Ali Artail, Mohamad Assaad, Karim Y. Kabalan:
A Spatiotemporal Analysis of a Group-based Access Solution for Massive MTC Networks and the Stability-Scalability Trade-off. 1-8 - Irfan Simsek:
On-Demand Blind Packet Forwarding. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.