default search action
ITNAC 2019: Auckland, New Zealand
- 29th International Telecommunication Networks and Applications Conference, ITNAC 2019, Auckland, New Zealand, November 27-29, 2019. IEEE 2019, ISBN 978-1-7281-3673-8
- Jun O. Seo, Sathiamoorthy Manoharan, Ulrich Speidel:
Steganalysis of Storage-based Covert Channels Using Entropy. 1-6 - Da-Ren Chen, Hao-Yen Chang, Ye-Zheng Chen:
Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routing. 1-6 - Yong Jin, Masahiko Tomoishi:
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes. 1-7 - Vaibhav Fanibhare, Nurul I. Sarkar, Adnan Al-Anbuky:
A Cloud-Based Traffic Flow Framework for Tactile Internet using SDN and Fog Computing. 1-6 - Jing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao:
Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems. 1-6 - Xue Jun Li, Maode Ma, Yi Lin Yen:
Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning. 1-6 - Darryn Wells, Fakhrul Alam, Yi Chen, Robert Abbel, Kate Parker:
Development of a Supply Chain Product Monitoring Network. 1-4 - Saad Aslam, Fakhrul Alam, Syed Faraz Hasan, Mohammad A. Rashid:
Decentralized Interference Mitigation Technique for D2D Networks Using Game Theory Optimization. 1-7 - Firas Al-Ali, Thilina Doremure Gamage, Hewa W. T. S. Nanayakkara, Farhad Mehdipour, Sayan Kumar Ray:
Supercomputer Networks in the Datacenter: Benchmarking the Evolution of Communication Granularity from Macroscale down to Nanoscale. 1-6 - Youngbok Cho:
Dynamic RNN -CNN based Malware Classifier for Deep Learning Algorithm. 1-6 - Xue Jun Li, Maode Ma, Narayanan Arjun:
An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks. 1-6 - Saad Aslam, Fakhrul Alam, Syed Faraz Hasan, Mohammad A. Rashid:
Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D Enabled 5G Networks. 1-7 - Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Bobby Yang:
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature. 1-4 - Byoungjo Choi, Stevan Berber:
Rate Matching Pattern Estimation. 1-3 - Eiichiro Kawaguchi, Hikaru Kasuga, Norihiko Shinomiya:
Unsplittable flow Edge Load factor Balancing in SDN using P4 Runtime. 1-6 - Lely Hiryanto, Sieteng Soh, Kwan-Wu Chin, Mihai M. Lazarescu:
Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget Constraint. 1-7 - Dawood Sheniar, Nabeel Hadaad, Ron Addie:
The Inference Graph of Cybersecurity Rules. 1-6 - Baden Parr, Daniel Konings, Mathew Legg, Fakhrul Alam:
Early Warning System with Real Time Tilt Monitoring. 1-3 - Zhongyang Yu, Boon-Chong Seet:
Performance Analysis of Random Backoff based D2D Discovery in Cellular Networks. 1-6 - Rais Rizal Yunus, Husna Zainol Abidin, Fadhlan Hafizhelmi Kamaru Zaman, Syahrul Afzal Che Abdullah:
Outdoor Signal Performance of LoRaWAN Technology for Campus-Scale IoT Connectivity. 1-6 - Amir Hossein Moravejosharieh, Francisco Claudio Araujo Palmeira:
Load-balancing In Software-Defined Networking: An Investigation On Influential System Parameters. 1-6 - Muhsiul Hassan, Nazmus Shaker Nafi, Nguyen Vo, Rahul Thakkar, Mark A. Gregory:
Analysis of Staircase Power Distributions for Reduced Number of Power Levels for 5G Planar Array Antenna Analog Beamforming. 1-4 - Hideaki Yoshino, Kenko Ota, Takefumi Hiraguri:
Adaptive Control of Nonstatistical Sensor Data Aggregation to Minimize Latency in IoT Gateways. 1-6 - Lincy Elizebeth Jim, Mark A. Gregory:
Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree. 1-6 - Nils Rodday, Raphael Labaca Castro, Klement Streit, Gabi Dreo Rodosek:
Evaluating TCP Connection Healthiness. 1-4 - Fariza Sabrina:
A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT. 1-7 - Archana Banepali, Rajan Kadel, Deepani B. Guruge, Sharly Joana Halder:
Design and Implementation of Wi-Fi Based Attendance System Using Raspberry Pi. 1-6 - Syeda Kanwal Zaidi, Syed Faraz Hasan, Xiang Gui:
A Novel Relaying Mechanism for Multi-Cast Transmission with Ground-Aerial NOMA. 1-6 - Marianne Cherrington, Joan Lu, David Airehrour, Fadi A. Thabtah, Qiang Xu, Samaneh Madanian:
Feature Selection: Multi-source and Multi-view Data Limitations, Capabilities and Potentials. 1-6 - Hamad Alotaibi, Shuo Li, Mark A. Gregory:
Utilising SDN to Counter BGP Convergence Delays. 1-6 - Adnan Ghaffar, Xue Jun Li, Boon-Chong Seet, Wahaj Abbas Awan, Niamat Hussain:
Compact Multiband Frequency Reconfigurable Antenna for 5G Communications. 1-3 - Abdullah Omar Arafat, Mark A. Gregory:
A Weight Based Channel Scheduling for LTE-A Femtocells. 1-5 - Liwei Yang, Wenjie Zhang, Lining Deng, Junning Zhang:
Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous Systems. 1-6 - Shakil Ahmed, Mohammad A. Rashid, Fakhrul Alam, Bapon Fakhruddin:
A Disaster Response Framework Based on IoT and D2D Communication under 5G Network Technology. 1-6 - Jofina Jijin, Boon-Chong Seet, Peter Han Joo Chong:
Blockchain Enabled Opportunistic Fog-based Radio Access Network: A Position Paper. 1-3 - Saadullah Kalwar, Kwan-Wu Chin, Luyao Wang:
An Orientation Aware Learning MAC for Multi-UAVs Networks. 1-4 - Md. Akbar Hossain, Sayan Kumar Ray, Seyed Reza Shahamiri:
A Context-Aware and Technology-Assisted Informal Caregiver Selection Method to support Medical Emergency. 1-6 - Anh Tuyen Le, Le Chung Tran, Xiaojing Huang, Y. Jay Guo:
Analog Least Mean Square Loop for Self-Interference Cancellation: Implementation and Measurements. 1-6 - Hoang Do, Mark A. Gregory, Shuo Li:
SDN-based Wireless Access Networks Utilising BBR TCP Congestion Control. 1-8 - Yawen Zheng, Kwan-Wu Chin, Luyao Wang:
Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite Links. 1-6 - Zhenjie Tan, Hua Qu, Jihong Zhao, Shiyu Zhou, Wenjie Wang:
UAV-aided Data Collection in Self Organized IoT Network for Social Augmented Reality. 1-7 - Samundra Deep, Xi Zheng:
Leveraging CNN and Transfer Learning for Vision-based Human Activity Recognition. 1-4 - Paul Zanna, Peter J. Radcliffe, Karina Gomez Chavez:
A Method for Comparing OpenFlow and P4. 1-3 - Michael Santamaria, Alan Marchiori:
Demystifying LoRa WAN Security and Capacity. 1-7 - Debraj Basu, Xiang Gui, Yi Zhang, Avishek Nag:
Non-Centralised and Non-GPS Navigation Mechanism using IoT sensors: challenges and trade-offs. 1-6 - Nguyen Canh Thang, Minho Park:
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function Chaining. 1-6 - Seong Su Keum, Cheol Hwan Lee, Soon Ju Kang:
Device to Device Collaboration Architecture for Real- Time Identification of User and Abnormal Activities in Home. 1-3 - Arslan Rasheed, Asim Anwar, Arun Kumar, Peter Han Joo Chong, Xue Jun Li:
Hierarchical Architecture for Computational Offloading in Autonomous Vehicle Environment. 1-6 - Sadia Qureshi, Robin Braun:
Mininet Topology: Mirror of the Optical Switch Fabric. 1-6 - Yuya Ota, Norihiko Shinomiya:
A proposal of information diffusion model using information vitality. 1-3 - Humaira Abdul Salam, Franco Davoli, Andreas Timm-Giel:
Improving Prediction Accuracy for Power Consumption in Virtual Environments. 1-6 - Shakir Ullah, Saeed Ur Rehman, Peter Hoon Joon Chong:
Performance Analysis of Defused VLC Channel for Mobile Environment. 1-6 - Tomohiro Kiguchi, Ran Sun, Hiromasa Habuchi, Yusuke Kozawa:
Frame Synchronization Performance of Optical-Wireless Hybrid BPPM-OOK System. 1-6 - Keisuke Manaka, Liyuan Chen, Hiromasa Habuchi, Yusuke Kozawa:
Theoretical Analysis of Equal-Weight (2, 2) VSS on VN-CSK Illumination Light Communication. 1-6 - Yawen Zheng, Kwan-Wu Chin:
Link Scheduling for Data Collection in SIC-Capable UAV Networks. 1-6 - Chenchen Liu, Yuyang Zheng, Zhengyu Zhang, Weilong Ren:
Relay Selection Scheme for Energy Harvesting IoT Networks with Direct Link. 1-4 - Dai-Lun Chiang, JihHsiang Yang, Ziyuan Huang, Feipei Lai:
Music Response Based on Real-time Facial Expression Recognition. 1-3 - David Soldani:
5G and the Future of Security in ICT. 1-8 - Jerzy Konorski:
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting. 1-7 - Minh Pham, Doan B. Hoang, Zenon Chaczko:
Realization of congestion-aware energy-aware virtual link embedding. 1-6 - Hakilo Sabit, Peter Han Joo Chong, Jeff Kilby:
Ambient Intelligence for Smart Home using The Internet of Things. 1-3 - James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, Paul S. Haskell-Dowland:
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 1-6 - Xiaowen Huang, Wenjie Zhang, Liwei Yang, Chai Kiat Yeo, Shengyu Chen:
Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio Networks. 1-6 - Ar Kar Kyaw, Brian Cusack, Raymond Lutui:
Digital Forensic Readiness In Wireless Medical Systems. 1-6 - Hao Wu, Huayong Wang:
Decoding Latency of LDPC Codes in 5G NR. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.