


default search action
30th ITNAC 2020: Melbourne, Australia
- 30th International Telecommunication Networks and Applications Conference, ITNAC 2020, Melbourne, Australia, November 25-27, 2020. IEEE 2020, ISBN 978-1-7281-8827-0
- Uwe Bauknecht, Tobias Enderle:
An Investigation on Core Network Latency. 1-6 - Hadi Alasti
:
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field. 1-6 - M. Lakshmi Prasad Reddy, Sumanth Sakkara:
QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error Termination. 1-6 - Araya Kibrom Desta, Shuji Ohira
, Ismail Arai
, Kazutoshi Fujikawa:
MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks. 1-7 - Tanjim Munir Dipon, Md. Shohrab Hossain
, Husnu S. Narman
:
Detecting Network Intrusion through Anomalous Packet Identification. 1-6 - Zahir M. Hussain:
Energy-Efficient Systems for Smart Sensor Communications. 1-4 - Tony, Sieteng Soh, Mihai M. Lazarescu, Kwan-Wu Chin:
Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory Effects. 1-8 - Raman Singh
, Andrew Donegan, Hitesh Tewari
:
Framework for a Decentralized Web. 1-7 - Natiq M. Abdali
, Zahir M. Hussain:
Reference-free Detection of LSB Steganography Using Histogram Analysis. 1-7 - Hamad Saud Alotaibi, Mark A. Gregory, Shuo Li, Hoang Do:
Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking-Based Gateways. 1-6 - Stanislaw Baranski
, Jerzy Konorski:
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain. 1-6 - Md. Khairul Islam
, Prithula Hridi, Md. Shohrab Hossain
, Husnu S. Narman
:
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier. 1-7 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:
MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments. 1-6 - Donovan Allen, Navid Shaghaghi
:
Cuckoo Prefix: A Hash Set for Compressed IP Blocklists. 1-8 - Marianne Cherrington, David Airehrour, Joan Lu
, Qiang Xu
, Steve J. Wade, Ihaka Dunn:
Indigenous Big Data Implications in New Zealand. 1-6 - Ahmet Kaplan, Ibrahim Altunbas
, Gunes Karabulut-Kurt, Mustafa Kesal, Defne Kucukyavuz:
OFDM-IM Performance Evaluation Under Jamming Attack. 1-6 - James Yockey, Benjamin Campbell, Andrew Coyle, Robert A. Hunjet:
Emulating Low Probability of Detection Algorithms. 1-6 - Bo Hu, Benjamin Fisher, Alirio Guerra, John P. T. Mo:
Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation. 1-4 - Da-Ren Chen, Wei-Min Chiu:
Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination Images. 1-6 - Liwei Yang, Qi Zhang, Ziyi Huang, Wenjie Zhang:
Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical Networks. 1-6 - Mohanad Alhabo, Naveed Nawaz, Omer Waqar:
Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous Networks. 1-6 - Md. Akbar Hossain
, Sayan Kumar Ray, Seyed Reza Shahamiri
, M. Daud Ahmed, Garry Singh, Rose Arts:
An End-to-End Medical Emergency Response System to Support Elderly People. 1-6 - Paul Zanna
, Peter J. Radcliffe, Dinesh Kumar:
WP4: A P4 Programmable IEEE 802.11 Data Plane. 1-6 - Maryam Shahpasand, Leonard G. C. Hamey
, Mohamed Ali Kâafar
, Dinusha Vatsalan
:
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors. 1-8 - Syed Danial Ali Shah, Mark A. Gregory, Shuo Li:
Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading. 1-3 - Temitope Odewole, Rajan Kadel
:
Smart Attendance System in an Enterprise-Based Access Point Environment. 1-6 - Umar Ajaib Khan, Rong Chai, Muhammad Junaid Tahir, Waleed Almughalles:
Joint Resource Allocation and Computation Offloading Strategy for D2D-assisted and NOMA-based MEC Systems. 1-7 - Rauful Nibir
, Md. Rafiqul Islam
, Nazmus S. Nafi, Mark A. Gregory:
Quintuple Band Antenna Design Using Stacked Series Array For Millimeter Wave. 1-6 - Marjan Moradi, Ayub Bokani
, Jahan Hassan
:
Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band Allocation. 1-6 - Kriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, Ladawan Klinkusoom, La-or Kovavisaruch
, Kamol Kaemarungsi:
A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System. 1-4 - Quentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val:
A distributed algorithm for range-based localization in sparse wireless networks. 1-8 - James Jin Kang
:
A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks. 1-3 - Marianne Cherrington, David Airehrour, Joan Lu
, Qiang Xu
, David Cameron-Brown, Ihaka Dunn:
Features of Human-Centred Algorithm Design. 1-6 - Silvia Mignardi
, Maximilian James Arpaio
, Chiara Buratti, Enrico Maria Vitucci
, Franco Fuschini, Roberto Verdone:
Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMs. 1-6 - Vijaya Durga Chemalamarri, Robin Braun
, Mehran Abolhasan
:
Constraint-Based Rerouting mechanism to address Congestion in Software Defined Networks. 1-6 - Rasha Al-Khansa, Hassan Ali Artail, Mohamad Assaad, Karim Y. Kabalan:
A Spatiotemporal Analysis of a Group-based Access Solution for Massive MTC Networks and the Stability-Scalability Trade-off. 1-8 - Irfan Simsek:
On-Demand Blind Packet Forwarding. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.