


default search action
34th ITNAC 2024: Sydney, Australia
- 34th International Telecommunication Networks and Applications Conference, ITNAC 2024, Sydney, Australia, November 27-29, 2024. IEEE 2024, ISBN 979-8-3503-7911-2

- Yannick Carlinet, Eric Gourdin, Nancy Perrot:

Congestion Prevention at Ingress Peering Links. 1-8 - Abdullah Al Mamun, Harith Al-Sahaf

, Ian Welch, Marinho Barcellos, Seyit Camtepe:
Limitations of Advanced Persistent Threat Datasets: Insights for Cybersecurity Research. 1-8 - Kai Lehniger, Peter Langendörfer:

StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture. 1-7 - Max Amiri, David M. Eyers, Zhiyi Huang:

A Specialised Synthetic Mobility Model Based on Real-World Traces. 1-5 - Priyanka Singla, Himmat Rathore

:
Innovative Message Routing for Next Generation Transportation System Using GA-Based SVM. 1-7 - Ana Rita Ortigoso

, Gabriel Vieira, Daniel Fuentes, Luís Frazão, Nuno Costa
, António Pereira:
DDFH: Dynamic Dual Frequency Hopping for LoRa Networks. 1-4 - Tushar Gupta

:
Evolution of Data Center Design to Handle AI Workloads. 1-8 - Geonho Song, Ganghyuk Jeon, Dongweon Yoon:

Deep Learning-Based Automatic Modulation Classification for Composite Modulated Radar Signal Using Time-Frequency Image. 1-6 - Kaori Iwata, Yoshihiro Ito:

A Study on Transmission Selection for Credit-Based Shaper in IEEE 802.1TSN. 1-4 - Hong Nhung Nguyen, Hong-Duc Phan:

A Novel AI Approach for Privacy Preserving In Biomedical Using Federated Learning. 1-5 - Shaimaa R. Alkaabi

, Mark A. Gregory
, Shuo Li
:
Three-Phase Handover Protocol Design for Multi-Access Edge Computing. 1-5 - Prashanth PVN

, Satish Kumar Yellaveni
, Seethamraju Sudhamsu Mouli
, Veeraiah Thalagondapati:
Towards Optimized Peer Connectivity in Blockchain Networks using Digital Twin. 1-6 - Abdussalam Salama

, Maryam Bagheri, Emmanuel Onyilo Peter:
Comparative Performance Evaluation of Real-Time Traffic on Wi-Fi Standards: 802.11ax vs. 802.11ac. 1-4 - Muhammad Moazzam Ali

, Shaiful Jahari Hashim, Zaid Ahmad
, Guillaume Ferré, Fakhrul Zaman Rokhani, Muhammad Akmal Chaudhary:
Frame Error Rate of Turbo Coded Rotating Polarization Wave. 1-6 - Ayush Kumar, Kar-Wai Fok, Vrizlynn L. L. Thing:

ExpIDS: A Drift-Adaptable Network Intrusion Detection System with Improved Explainability. 1-7 - Rasini Amarasooriya, Mark A. Gregory

, Shuo Li
:
Explainable Artificial Intelligence for Computation Offloading Optimization. 1-8 - Rashmi Kushwaha, Rahul Bhattacharyya, Yatindra Nath Singh:

Reputation-Driven Peer-to-Peer Live Streaming Architecture for Preventing Free-Riding. 1-6 - Farhad Rahmanifard, Masoud Barati:

Data Compliance in P2P Energy Sharing: A Blockchain-Based Platform for PIPEDA. 1-7 - Saurab Rauniyar, Pål Orten, Stig Petersen:

Improving Last-Mile Maritime Communication Using Intelligent Reflecting Surfaces. 1-6 - Ahmed Asiri, Weiqi Wang, Feng Wu, Hiep Vo

, Shui Yu
:
FedXAI for Detecting DDoS on IoT Edge Networks in Federated Learning. 1-6 - Md. Jannatul Rakib Joy, Philip Branch:

Flooding in LoRa Mesh Networks. 1-4 - Ayush Verma

, Tanuj Chandela
:
Towards WRSN Security: Probabilistic Approach for Malicious Node Identification. 1-6 - M. Jyothi Kiran, Venkatesh Chebolu, Goutam Das, Raja Datta:

ABACUS: A Joint Optimal Dynamic RMLSA in Elastic Optical Networks. 1-6 - Zolzaya Kherlenchimeg

, Tumnee Telmuun
, Ugtakhbayar Naidansuren, Nanzadragchaa Dambasuren, Di Zhang, Battulga Davaasambuu
:
Parameter Estimation-Aided Conditional Handover. 1-4 - Philip Branch

, Jason But
:
Power Saving in LoRa Linear Networks Through Self Synchronization. 1-5 - Roberto Saia, Salvatore Carta, Gianni Fenu, Alessandro Sebastian Podda

, Livio Pompianu:
Enhancing IDS with Ensemble LSTM Networks Using Real and GAN Data. 1-7 - Ana Moragrega

, Carles Fernández-Prades:
Improving the Convergence of a Data-Driven Factor Graph Model for UWB-Based Positioning in Challenging Indoor Scenarios. 1-4 - Fahim Faisal, Birupaxha Mondal, Md Fahad Monir, Tarem Ahmed, Md. Zahangir Alam:

WNetMon: An ML Approach for Real-time DoS Attack Detection in Wireless Networks. 1-7 - Siyu Ren, Haibo Mei, Shuang Du, Runzhi Fan, Qi Wang, Huan Ye:

Joint Task-Trajectory and Location Sense Optimization for UAV-enabled Communication Computation and Sense System. 1-6 - Hongyu Zhu, Abbas Jamalipour

:
A Deep Learning Algorithm for UAV Placement in 6G Cell-Free Massive MIMO Networks. 1-6 - Safa Alghadi

, Shuo Li
, Withawat Withayachumnankul, Ke Wang
:
Performance Analysis of Single-Carrier and Multi-Carrier Schemes in a Non-Linear Terahertz Communication System. 1-3 - Benjamin Förster, Thomas Hinze, Peter Langendörfer:

Topology- and Resource-Based Distribution Scheme for Collaborative Security-Focused Design Space Exploration in Large-Scale Static WSNs. 1-6 - Ismatov Akobir, Beomkyu Suh, Ki-Il Kim:

Fuzzy Logic Based Broadcasting Scheme for Mobile Ad Hoc Network. 1-6 - Ghazia Qaiser, Siva Chandrasekaran, Jinchuan Zheng, Rifai Chai:

Hybrid Deep Learning-Based Ensemble Model for Detecting Network-Based Cyber-Attacks of Industrial Internet of Services. 1-7 - Shuaijun Liu

, Jiaying Yin, Jinqiu Du
, Yaxin Zheng, Yuhui Deng, Jingjin Wu
:
Meteorological and Topographical Big Data-Driven UAV Trajectory Planning. 1-6 - Jherson Caceres Chanaga, Efren Acevedo Cardenas, Julián Rodriguez-Ferreira

:
Radio Propagation Model Adjusted to Mountainous Topography for TVWS Coverage Study. 1-7 - Mariam Munsif Mir, Wee Lum Tan, Mohammad Awrangjeb

, Ali Zia:
A Comparative Analysis of IoT Device Fingerprinting Methods. 1-7 - Giuseppe Tricomi, Luca D'Agati, Michele Arena, Francesco Longo, Giovanni Merlino

, Antonio Puliafito, Stefano Silvestri
:
On the Way to Distribute Compute Continuum Urban Applications by Deploying Clusters of Drones. 1-5 - Xinyu Wan, Feiran You, Abbas Jamalipour

:
Resource Allocation Optimization with Cluster Based Auction in Wireless Virtual Reality Network. 1-6 - Kaled Aljebur, Ron Addie:

The Cybersecurity Management of Incontrovertible Information. 1-8 - Ashish Sheikh

:
Optimizing Channel Availability in WLAN 6GHz Networks Using Automatic Frequency Coordination(AFC) System. 1-4 - Khondaker Musfakus Salehin, Travis Ricker, Yi Wang, Alex Chen, Eiji Oki:

A Machine Learning Approach to Estimating Queuing Delay on Routers: The Multiple-Hop Case. 1-4 - Chung-Ming Huang, Yen-Hung Wu, Duy-Tuan Dao:

Reliability-considered Multi-platoon's Groupcasting using the Resource Sharing Method. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














