


default search action
Annales des Télécommunications, Volume 79
Volume 79, Number 1-2, February 2024
- Duc-Tuyen Ta, Nhan Nguyen-Thanh, Duy H. N. Nguyen, Van-Tam Nguyen:

A game-theoretical paradigm for collaborative and distributed power control in wireless networks. 1-14 - Athanasios Karapantelakis

, Pegah Alizadeh, Abdulrahman Alabassi, Kaushik Dey, Alexandros Nikou:
Generative AI in mobile networks: a survey. 15-33 - Sourour Dhifaoui, Chiraz Houaidia

, Leïla Azouz Saïdane:
Computing paradigms for smart farming in the era of drones: a systematic review. 35-59 - Kongyang Chen

, Yao Huang, Yiwen Wang, Xiaoxue Zhang, Bing Mi, Yu Wang:
Privacy preserving machine unlearning for smart cities. 61-72 - Amer A. Sallam

, Noran Aklan, Norhan Aklan, Taha H. Rassem
:
A dense memory representation using bitmap data structure for improving NDN push-traffic model. 73-83 - Changhong Yu, Zhong Ye, Yinghui He

, Ming Gao, Haiyan Luo, Guanding Yu
:
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming. 85-100 - Mustafa Mulla

, Ali Hakan Ulusoy
, Ahmet Rizaner, Hasan Amca:
A low-complexity iterative algorithm for multiuser millimeter-wave systems. 101-110 - Adel Salah Ould Khaoua

, Abdelmadjid Boukra
, Fella Bey
:
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks. 111-130 
Volume 79, Number 3-4, April 2024
- Marie-José Montpetit, Walter Cerroni:

ICIN 2023 special issue - Emergence of the data and intelligence networking across the edge-cloud continuum. 131-133 - Juan José López Escobar

, Rebeca P. Díaz Redondo
, Felipe J. Gil-Castiñeira
:
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison. 135-148 - Ziad Tlaiss

, Alexandre Ferrieux, Isabel Amigo, Isabelle Hamchaoui, Sandrine Vaton:
Automated slow-start detection for anomaly root cause analysis and BBR identification. 149-163 - Mays F. Al-Naday

, Vlad Dobre, Martin Reed, Salman Toor, Bruno Volckaert, Filip De Turck:
Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems. 165-178 - Shogo Saito

, Kei Fujimoto
, Akinori Shiraga
:
Low-latency remote-offloading system for accelerator. 179-196 - Mustafa Tüker, Emre Karakis, Müge Sayit

, Stuart Clayman
:
Using packet trimming at the edge for in-network video quality adaption. 197-210 - Kai Takahashi, Shigeo Shioda

:
Distributed congestion control method for sending safety messages to vehicles at a set target distance. 211-225 - Houssam ElBouanani

, Chadi Barakat, Walid Dabbous, Thierry Turletti:
Troubleshooting distributed network emulation. 227-239 - Alejandro Antonio Moreno Sancho

, Antonio Pastor
, Ignacio Dominguez Martinez-Casanueva
, Daniel González-Sánchez
, Luis Bellido Triana
:
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection. 241-256 - Saif Zabarah

, Omar Naman, Mohammad A. Salahuddin, Raouf Boutaba, Samer Al-Kiswany:
An approach for detecting multi-institution attacks. 257-270 - Roman-Valentyn Tkachuk

, Dragos Ilie, Remi Robert, Victor R. Kebande, Kurt Tutschku
:
On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace. 271-288 
Volume 79, Number 5-6, June 2024
- Tahira Batool, Atiq Ahmed

, Dominique Gaïti:
Two level data centric aggregation scheme for wireless sensor networks. 289-299 - Ivan Palamà

, Stefania Bartoletti, Giuseppe Bianchi, Nicola Blefari-Melazzi:
Experimental assessment of SDR-based 5G positioning: methodologies and insights. 301-313 - Wided Hadj Alouane:

Semi-blind AF transmission in secure NOMA systems. 315-325 - Bibekananda Panda

, Poonam Singh:
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems. 327-341 - Asmad Bin Abdul Razzaque

, Hassaan Khaliq Qureshi, Andrea Baiocchi:
The role of SIC on the design of next generation multiple access. 343-360 - Ibrahim Sammour

, Gérard Chalhoub
, Gil De Sousa
:
Capacity aware Wi-Fi networks deployment. 361-379 - Geo Francis E

, S. Sheeja
:
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system. 381-396 - Victor M. Garcia Martinez, Moisés R. N. Ribeiro

, Vinícius F. S. Mota:
Wi-Fi faces the new wireless ecosystem: a critical review. 397-413 - Ritika Yaduvanshi, Shivendu Mishra

, Nimisha Yadav, Prince Rajpoot
:
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems. 415-436 - Omar Abu-Ella

:
On the capacity of multiple antenna systems. 437-446 - Arif Basgumus, Fatih Kocak, Mustafa Namdar

:
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels. 447-453 
Volume 79, Number 7-8, August 2024
- Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung:

CSNet 2022 special issue - decentralized and data-driven security in networking. 455-456 - Cherifa Hamroun

, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle:
A review on lexical based malicious domain name detection methods. 457-473 - Diego Canizio Lopes

, André Nasserala, Ian Vilar Bastos
, Igor Monteiro Moraes:
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks. 475-486 - Javier Jose Diaz Rivera, Waleed Akbar, Talha Ahmed Khan, Muhammad Afaq, Wang-Cheol Song:

Zt &t: secure service session management using blockchain-based tokens in zero trust networks. 487-505 - Fábio César Schuartz

, Mauro Fonseca, Anelise Munaretto:
A distributed platform for intrusion detection system using data stream mining in a big data environment. 507-521 - Govinda Mohini G. Bezerra, Nicollas Rodrigues de Oliveira, Tadeu N. Ferreira, Diogo M. F. Mattos:

A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks. 523-535 - Vagner Ereno Quincozes, Silvio E. Quincozes

, Diego G. Passos
, Célio Vinicius N. de Albuquerque, Daniel Mossé:
Towards feature engineering for intrusion detection in IEC-61850 communication networks. 537-551 - Yao Li, Xiaochao Wei

, Guopeng Cai, Hao Wang:
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing. 553-565 - Princewill Kum Kumson, Mahmoud Aldababsa, Khalid Yahya

, Mahmoud Obaid, Allam Abumwais:
Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks. 567-576 - Sunil Sharma, Minakshi Sharma:

A novel technique to reduce Near-Far problem in multi-user VDSL network. 577-584 - Nathanaël Denis

, Sophie Chabridon, Maryline Laurent:
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control. 585-601 
Volume 79, Number 9-10, October 2024
- Raouf Boutaba, Guy Pujolle, Amina Boudendir, Abdallah Shami, Daniel Benevides da Costa:

Editorial of 6GNet 2023 special issue. 603-604 - Marius Corici

, Fabian Eichhorn
, Hauke Buhr, Thomas Magedanz:
Organic 6G networks: ultra-flexibility through extensive stateless functional split. 605-619 - Marius Corici

, Elena-Ramona Modroiu, Fabian Eichhorn
, Eric Troudt, Thomas Magedanz:
Towards efficient conflict mitigation in the converged 6G Open RAN control plane. 621-631 - Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy:

Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface. 633-648 - Rodrigo S. Couto

, Pedro Cruz, Roberto Gonçalves Pacheco, Vivian Maria S. Souza, Miguel Elias M. Campista, Luís Henrique M. K. Costa:
A survey of public datasets for O-RAN: fostering the development of machine learning models. 649-662 - Leyli Karaçay, Zakaria Laaroussi, Sonika Ujjwal, Elif Ustundag Soykan:

Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting. 663-677 - Ramin Fuladi, Tuncer Baykas, Emin Anarim:

The use of statistical features for low-rate denial-of-service attack detection. 679-691 - Nicollas Rodrigues de Oliveira, Dianne S. V. Medeiros, Igor M. Moraes, Martin Andreoni, Diogo M. F. Mattos:

Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts. 693-706 
Volume 79, Number 11-12, December 2024
- Carol Fung, Augusto Neto, Nur Zincir-Heywood, Changqing Luo:

CSNet 2023 special issue - the resilient networked systems. 707-709 - Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm I. Heywood:

Large language models and unsupervised feature learning: implications for log analysis. 711-729 - Halvor Nybø Risto, Olaf Hallan Graven

:
Fixed-text keystroke dynamics authentication data set - collection and analysis. 731-743 - Antoine Fressancourt, Luigi Iannone, Mael Kerichard:

A deeper look at Ariadne: a privacy-preserving network layer protocol. 745-762 - Germán Rodríguez-Galán, Jenny Torres:

Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing. 763-802 - Michael Kouremetis, Dean Lawrence, Ron Alford, Zoe Cheuvront, David Davila, Benjamin Geyer, Trevor Haigh, Ethan Michalak, Rachel Murphy, Gianpaolo Russo:

Mirage: cyber deception against autonomous cyber attacks in emulation and simulation. 803-817 - Zhiyuan Wei

, Usman Rauf, Fadi Mohsen:
E-Watcher: insider threat monitoring and detection for enhanced security. 819-831 - Maede Ashouri-Talouki, Nafiseh Kahani, Masoud Barati, Zomorod Abedini:

A revocable attribute-based access control with non-monotonic access structure. 833-842 - Rosa Pericàs-Gornals

, Macià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal, Jaume Ramis-Bibiloni
:
Digital credentials management system using rejectable soulbound tokens. 843-855 - Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri:

Implementing the principle of least administrative privilege on operating systems: challenges and perspectives. 857-880 - Daniel Alejandro Maldonado-Ruiz

, Alan Pulval-Dady, Yulin Shi, Zhe Wang, Nour El Madhoun
, Jenny Torres:
NestedChain: "Blockchain-inside-a-Blockchain" new generation prototype. 881-899 - Renato Souza Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes:

Inferring the confidence level of BGP-based distributed intrusion detection systems alarms. 901-912 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














