default search action
Internet Technology Letters, Volume 3
Volume 3, Number 1, January 2020
- Luigi Alfredo Grieco:
Editorial of the Founder EiC "The first two years of Internet Technology Letters". - Sulav Malla
, Ken Christensen:
HPC in the cloud: Performance comparison of function as a service (FaaS) vs infrastructure as a service (IaaS). - Chiara Caiazza, Valerio Luconi
, Alessio Vecchio
:
TCP-based traceroute: An evaluation of different probing methods. - Anirudh Paranjothi
, Mohammed Atiquzzaman, Mohammad S. Khan
:
PMCD: Platoon - Merging approach for cooperative driving. - Cristian H. Martins de Souza
, Marcilio O. O. Lemos
, Felipe Sampaio Dantas da Silva, Robinson L. Souza Alves:
On detecting and mitigating phishing attacks through featureless machine learning techniques. - Amitangshu Pal
:
Modeling wireless interference in presence of dependent interferers. - Pranav Kumar Singh
, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
An efficient blockchain-based approach for cooperative decision making in swarm robotics. - Mohammed Shabbir Ali
, Jun Zhang
, Houda Labiod
:
How relative mobility affects the aggregate throughput of VANET cluster? - Leandros Maglaras
, Tiago Cruz
, Mohamed Amine Ferrag
, Helge Janicke:
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Volume 3, Number 2, March 2020
- Georgios Z. Papadopoulos
, Xenofon Fafoutis
, Pascal Thubert:
Multi-Source Time Synchronization in IEEE Std 802.15.4-2015 TSCH Networks. - Rolando Herrero
:
6LoWPAN fragmentation in the context of IoT based media real time communication. - Shreshth Tuli
, Shikhar Tuli, Gurleen Wander, Praneet Wander, Sukhpal Singh Gill
, Schahram Dustdar
, Rizos Sakellariou, Omer F. Rana
:
Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions. - Gang Zhao, Bingbing Di
, Hui He, Wenjuan Zhu:
Digital education transaction object authentication service based on blockchain technology. - Henry E. Baidoo-Williams, Muhammad Mahboob Ur Rahman
, Qammer H. Abbasi:
Channel impulse response-based source localization in a diffusion-based molecular communication system. - Radion Bikmukhamedov
, Adel Nadeev, Guido Maione, Domenico Striccoli:
Comparison of HMM and RNN models for network traffic modeling. - Hao Wu
:
Hard decision of the zero a posteriori LLR in 5G NR.
- Giulia Tresca, Francesco Vista
, Pietro Boccadoro
:
Experimenting LoRa-compliant solutions in Real-World Scenarios.
Volume 3, Number 3, May 2020
- João Batista da Silva
, Felipe Sampaio Dantas da Silva
, Emidio P. Neto
, Marcilio O. O. Lemos
, Augusto Neto
:
Benchmarking of mainstream SDN controllers over open off-the-shelf software-switches. - Seyed Mohsen Hosseini
, Raffaele Carli
, Graziana Cavone
, Mariagrazia Dotoli
:
Distributed control of electric vehicle fleets considering grid congestion and battery degradation. - Kashish Bansal, Kashish Mittal, Gautam Ahuja, Ashima Singh, Sukhpal Singh Gill
:
DeepBus: Machine learning based real time pothole detection system for smart transportation using IoT. - David A. Schmidt, Mohammad S. Khan
, Brian T. Bennett:
Spline-based intrusion detection for VANET utilizing knot flow classification. - Jacques Bou Abdo, Rayane El Sibai
, Krishna Kambhampaty, Jacques Demerjian
:
Permissionless reputation-based consensus algorithm for blockchain. - Notom Ajaykumar
, Mrinal Sarvagya, Parag Parandkar:
A novel security algorithm ECC-L for wireless sensor network. - Moinak Maiti
, Yaroslav Vyklyuk
, Darko Vukovic
:
Cryptocurrencies chaotic co-movement forecasting with neural networks.
- Sabrina Sicari
, Alessandra Rizzardi
, Alberto Coen-Porisini:
Smart certification: protecting the originality of the product in the eyewear sector.
Volume 3, Number 4, July 2020
Editorial
- Georgios Z. Papadopoulos
, Fabrice Theoleyre
, Xavier Vilajosana
:
Industrial Internet of Things: Specificities and challenges.
- Moufida Maimour
:
Impact of interference aware metrics on iterative multipath routing for industrial WSN. - Yasuyuki Tanaka
, Keoma Brun-Laguna, Thomas Watteyne:
Trace-based simulation for 6TiSCH. - Georgios Z. Papadopoulos
, Fabrice Theoleyre
, Pascal Thubert
:
Operations, administration and maintenance (OAM ) features for reliable and available wireless (RAW ) networks. - Martin Haubro, Charalampos Orfanidis, George Oikonomou
, Xenofon Fafoutis
:
TSCH-over-LoRA : long range and reliable IPv6 multi-hop networks for the internet of things. - Tengfei Chang
, Malisa Vucinic, Xavier Vilajosana-Guillen
, Diego Dujovne, Thomas Watteyne:
6TiSCH minimal scheduling function: Performance evaluation.
Volume 3, Number 5, September 2020
- Ana Flávia dos Reis
, Glauber Brante
, Rafaela de Paula Parisotto, Richard D. Souza
, Paulo H. V. Klaine, João Pedro Battistella Nadas, Muhammad Ali Imran
:
Energy efficiency analysis of Drone Small Cells positioning based on reinforcement learning. - Giuseppe Ribezzo
, Luca De Cicco
, Vittorio Palmisano, Saverio Mascolo:
A DASH 360° immersive video streaming control system. - Shreshth Tuli
, Sukhpal Singh Gill
, Giuliano Casale, Nicholas R. Jennings
:
iThermoFog: IoT-Fog based automatic thermal profile creation for cloud data centers using artificial intelligence techniques. - Priyatosh Mandal
:
On the analysis of policy control function of 4G LTE-A. - Angelo Coluccia
:
On the probabilistic modeling of fake news (hoax) persistency in online social networks and the role of debunking and filtering. - Rayane El Sibai
, Jacques Bou Abdo, Chady Abou Jaoude, Jacques Demerjian
, Joseph Assaker, Abdallah Makhoul:
Efficient anomaly detection on sampled data streams with contaminated phase I data. - Arash Ostovar
:
Cooperative spectrum sensing optimal threshold selection in cognitive radio networks. - Poonam Yadav, Rajesh Kumar, Sandeep Kumar
:
Effective capacity analysis over generalized lognormal shadowed composite fading channels.
- Matteo Bogo, Jacopo Soldani
, Davide Neri, Antonio Brogi
:
Fine-grained management of cloud-native applications, based on TOSCA. - Shishir Muralidhara
, Niharika Hegde
:
Air quality monitoring and gas leakage detection with automatic shut-off using wireless sensor-actuator networks.
Volume 3, Number 6, November 2020
Editorial
- Daniel Corujo, Augusto Neto
, Seil Jeon:
Internet technology letters special section on mobility support in slice-based network control for heterogeneous environment 2019.
- Akshatha Nayak Manjeshwar
, Pranav Jha
, Abhay Karandikar, Prasanna Chaporkar:
Enhanced UE slice availability and mobility through multi-connectivity in 5G multi-RAT networks. - Vitor A. Cunha
, Daniel Corujo
, João Paulo Barraca
, Rui L. Aguiar
:
MTD to set network slice security as a KPI. - Kiril Antevski
, Carlos J. Bernardos
:
Federation of 5G services using distributed ledger technologies†. - Flávio Meneses
, Daniel Corujo
, Rui L. Aguiar
:
Virtualization of customer equipment: Challenges and opportunities. - João Aires
, Paulo Duarte, Bruno Parreira, Sérgio Figueiredo
:
An orchestrated 5G-enabled deep vCDN system. - Kay Hänsge
, Dirk Trossen, Sebastian Robitzsch, Michael J. Boniface
, Stephen C. Phillips
:
5G service delivery platform: 360 VR vertical as an example.
- Moayad Aloqaily
, Thar Baker
, Ammar Rayes
, Yaser Jararweh
, Ismaeel Al Ridhawi
:
Editorial.
- Ammar Muthanna
, Regina Shamilova, Abdelhamied A. Ateya
, Alexander Paramonov, Mohammad Hammoudeh
:
A mobile edge computing/software-defined networking-enabled architecture for vehicular networks. - Muhammad Zeeshan Khan, Muhammad Usman Ghani Khan, Omer Irshad, Razi Iqbal
:
Deep learning and blockchain fusion for detecting driver's behavior in smart vehicles. - Noura Aljeri
, Azzedine Boukerche:
Fog-enabled vehicular networks: A new challenge for mobility management. - Binod Vaidya
, Hussein T. Mouftah:
Dynamic wireless charging for CAEV taxi fleet in urban environment. - Michele Bonanni, Francesco Chiti
, Romano Fantacci:
Mobile Mist Computing for the Internet of Vehicles†.
- Corrigendum: Peer-assisted content delivery network by vehicular clouds: Algorithm and evaluation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.