


default search action
Annales des Télécommunications, Volume 79
Volume 79, Number 1-2, February 2024
- Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen:
A game-theoretical paradigm for collaborative and distributed power control in wireless networks. 1-14 - Athanasios Karapantelakis
, Pegah Alizadeh, Abdulrahman Alabassi, Kaushik Dey, Alexandros Nikou:
Generative AI in mobile networks: a survey. 15-33 - Sourour Dhifaoui, Chiraz Houaidia
, Leïla Azouz Saïdane:
Computing paradigms for smart farming in the era of drones: a systematic review. 35-59 - Kongyang Chen
, Yao Huang, Yiwen Wang, Xiaoxue Zhang, Bing Mi, Yu Wang:
Privacy preserving machine unlearning for smart cities. 61-72 - Amer A. Sallam
, Noran Aklan, Norhan Aklan, Taha H. Rassem:
A dense memory representation using bitmap data structure for improving NDN push-traffic model. 73-83 - Changhong Yu, Zhong Ye, Yinghui He, Ming Gao, Haiyan Luo, Guanding Yu
:
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming. 85-100 - Mustafa Mulla
, Ali Hakan Ulusoy
, Ahmet Rizaner, Hasan Amca:
A low-complexity iterative algorithm for multiuser millimeter-wave systems. 101-110 - Adel Salah Ould Khaoua
, Abdelmadjid Boukra
, Fella Bey
:
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks. 111-130
Volume 79, Number 3-4, April 2024
- Marie-José Montpetit, Walter Cerroni:
ICIN 2023 special issue - Emergence of the data and intelligence networking across the edge-cloud continuum. 131-133 - Juan José López Escobar
, Rebeca P. Díaz Redondo
, Felipe J. Gil-Castiñeira
:
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison. 135-148 - Ziad Tlaiss
, Alexandre Ferrieux, Isabel Amigo, Isabelle Hamchaoui, Sandrine Vaton:
Automated slow-start detection for anomaly root cause analysis and BBR identification. 149-163 - Mays F. Al-Naday
, Vlad Dobre, Martin Reed, Salman Toor, Bruno Volckaert, Filip De Turck:
Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems. 165-178 - Shogo Saito
, Kei Fujimoto
, Akinori Shiraga
:
Low-latency remote-offloading system for accelerator. 179-196 - Mustafa Tüker, Emre Karakis, Müge Sayit
, Stuart Clayman
:
Using packet trimming at the edge for in-network video quality adaption. 197-210 - Kai Takahashi, Shigeo Shioda
:
Distributed congestion control method for sending safety messages to vehicles at a set target distance. 211-225 - Houssam ElBouanani
, Chadi Barakat, Walid Dabbous, Thierry Turletti:
Troubleshooting distributed network emulation. 227-239 - Alejandro Antonio Moreno Sancho
, Antonio Pastor
, Ignacio Dominguez Martinez-Casanueva
, Daniel González-Sánchez
, Luis Bellido Triana
:
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection. 241-256 - Saif Zabarah
, Omar Naman, Mohammad A. Salahuddin, Raouf Boutaba, Samer Al-Kiswany:
An approach for detecting multi-institution attacks. 257-270 - Roman-Valentyn Tkachuk
, Dragos Ilie, Remi Robert, Victor R. Kebande, Kurt Tutschku
:
On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace. 271-288
Volume 79, Number 5-6, June 2024
- Tahira Batool, Atiq Ahmed
, Dominique Gaïti:
Two level data centric aggregation scheme for wireless sensor networks. 289-299 - Ivan Palamà
, Stefania Bartoletti, Giuseppe Bianchi, Nicola Blefari-Melazzi:
Experimental assessment of SDR-based 5G positioning: methodologies and insights. 301-313 - Wided Hadj Alouane:
Semi-blind AF transmission in secure NOMA systems. 315-325 - Bibekananda Panda
, Poonam Singh:
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems. 327-341 - Asmad Bin Abdul Razzaque
, Hassaan Khaliq Qureshi, Andrea Baiocchi:
The role of SIC on the design of next generation multiple access. 343-360 - Ibrahim Sammour
, Gérard Chalhoub
, Gil De Sousa
:
Capacity aware Wi-Fi networks deployment. 361-379 - Geo Francis E
, S. Sheeja:
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system. 381-396 - Victor M. Garcia Martinez, Moisés R. N. Ribeiro, Vinícius F. S. Mota:
Wi-Fi faces the new wireless ecosystem: a critical review. 397-413 - Ritika Yaduvanshi, Shivendu Mishra
, Nimisha Yadav, Prince Rajpoot:
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems. 415-436 - Omar Abu-Ella
:
On the capacity of multiple antenna systems. 437-446 - Arif Basgumus, Fatih Kocak, Mustafa Namdar
:
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels. 447-453
Volume 79, Number 7-8, August 2024
- Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung:
CSNet 2022 special issue - decentralized and data-driven security in networking. 455-456 - Cherifa Hamroun
, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle:
A review on lexical based malicious domain name detection methods. 457-473 - Diego Canizio Lopes
, André Nasserala, Ian Vilar Bastos, Igor Monteiro Moraes:
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks. 475-486 - Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:
Zt &t: secure service session management using blockchain-based tokens in zero trust networks. 487-505 - Fábio César Schuartz
, Mauro Fonseca, Anelise Munaretto:
A distributed platform for intrusion detection system using data stream mining in a big data environment. 507-521 - Govinda Mohini G. Bezerra, Nicollas Rodrigues de Oliveira, Tadeu N. Ferreira, Diogo M. F. Mattos:
A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks. 523-535 - Vagner Ereno Quincozes, Silvio E. Quincozes
, Diego G. Passos
, Célio Vinicius N. de Albuquerque, Daniel Mossé:
Towards feature engineering for intrusion detection in IEC-61850 communication networks. 537-551 - Yao Li, Xiaochao Wei
, Guopeng Cai, Hao Wang:
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing. 553-565 - Princewill Kum Kumson, Mahmoud Aldababsa, Khalid Yahya, Mahmoud Obaid, Allam Abumwais:
Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks. 567-576 - Sunil Sharma, Minakshi Sharma:
A novel technique to reduce Near-Far problem in multi-user VDSL network. 577-584 - Nathanaël Denis
, Sophie Chabridon, Maryline Laurent:
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. 585-601
Volume 79, Number 9-10, October 2024
- Raouf Boutaba, Guy Pujolle, Amina Boudendir, Abdallah Shami, Daniel Benevides da Costa:
Editorial of 6GNet 2023 special issue. 603-604 - Marius Corici
, Fabian Eichhorn
, Hauke Buhr, Thomas Magedanz:
Organic 6G networks: ultra-flexibility through extensive stateless functional split. 605-619 - Marius Corici
, Elena-Ramona Modroiu, Fabian Eichhorn
, Eric Troudt, Thomas Magedanz:
Towards efficient conflict mitigation in the converged 6G Open RAN control plane. 621-631 - Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy:
Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface. 633-648 - Rodrigo S. Couto, Pedro Cruz, Roberto Gonçalves Pacheco, Vivian Maria S. Souza, Miguel Elias M. Campista, Luís Henrique M. K. Costa:
A survey of public datasets for O-RAN: fostering the development of machine learning models. 649-662 - Leyli Karaçay, Zakaria Laaroussi, Sonika Ujjwal, Elif Ustundag Soykan:
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting. 663-677 - Ramin Fuladi, Tuncer Baykas, Emin Anarim:
The use of statistical features for low-rate denial-of-service attack detection. 679-691 - Nicollas Rodrigues de Oliveira, Dianne S. V. Medeiros, Igor M. Moraes, Martin Andreonni, Diogo M. F. Mattos:
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts. 693-706
Volume 79, Number 11-12, December 2024
- Carol Fung, Augusto Neto, Nur Zincir-Heywood, Changqing Luo:
CSNet 2023 special issue - the resilient networked systems. 707-709 - Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:
Large language models and unsupervised feature learning: implications for log analysis. 711-729 - Halvor Nybø Risto, Olaf Hallan Graven
:
Fixed-text keystroke dynamics authentication data set - collection and analysis. 731-743 - Antoine Fressancourt, Luigi Iannone, Mael Kerichard:
A deeper look at Ariadne: a privacy-preserving network layer protocol. 745-762 - Germán Rodríguez-Galán, Jenny Torres:
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing. 763-802 - Michael Kouremetis, Dean Lawrence, Ron Alford, Zoe Cheuvront, David Davila, Benjamin Geyer, Trevor Haigh, Ethan Michalak, Rachel Murphy, Gianpaolo Russo:
Mirage: cyber deception against autonomous cyber attacks in emulation and simulation. 803-817 - Zhiyuan Wei
, Usman Rauf, Fadi Mohsen:
E-Watcher: insider threat monitoring and detection for enhanced security. 819-831 - Maede Ashouri-Talouki, Nafiseh Kahani, Masoud Barati, Zomorod Abedini:
A revocable attribute-based access control with non-monotonic access structure. 833-842 - Rosa Pericàs-Gornals, Macià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal, Jaume Ramis-Bibiloni
:
Digital credentials management system using rejectable soulbound tokens. 843-855 - Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri:
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives. 857-880 - Daniel Alejandro Maldonado-Ruiz
, Alan Pulval-Dady, Yulin Shi, Zhe Wang, Nour El Madhoun, Jenny Torres:
NestedChain: "Blockchain-inside-a-Blockchain" new generation prototype. 881-899 - Renato Souza Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes:
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms. 901-912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.