


default search action
Annales des Télécommunications, Volume 77
Volume 77, Number 1-2, February 2022
- Maria Potop-Butucaru, Ariel Orda, Maurice Herlihy, Stefano Secci:
Special issue on blockchain networks and distributed protocols. 1-2 - Oded Noam, Ori Rottenstreich
:
Realizing privacy aspects in blockchain networks. 3-12 - Saima Zafar
, K. M. Bhatti, M. Shabbir, Fabiha Hashmat, Ali Hammad Akbar:
Integration of blockchain and Internet of Things: challenges and solutions. 13-32 - Pravin Pawar, Neeraj Parolia, Sameer Shinde, Thierry Oscar Edoh, Madhusudan Singh
:
eHealthChain - a blockchain-based personal health information management system. 33-45 - Vincent Messie
, Gaël Fromentoux, Nathalie Labidurie Omnès, Benoit Radier, Sandrine Vaton
, Isabel Amigo
:
BALAdIN: truthfulness in collaborative access networks with distributed ledgers. 47-59 - Maya Leshkowitz, Olivia Benattasse, Oded Wertheim, Ori Rottenstreich
:
Scalable blockchain execution via parallel block validation. 61-76 - Serguei Popov
, Sebastian Müller:
Voting-based probabilistic consensuses and their applications in distributed ledgers. 77-99 - Antonio Emerson Barros Tomaz
, José Cláudio do Nascimento, José Neuman de Souza:
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest. 101-118
Volume 77, Number 3-4, April 2022
- Swati Rawal, Sahadeo Padhye
, Debiao He:
Lattice-based undeniable signature scheme. 119-126 - Van Phu Tuan
, Hyung Yun Kong:
Secrecy sum rate maximization for UAV-aided NOMA communication systems. 127-138 - Alex Borges Vieira, Wallace Nascimento Paraizo, Luciano Jerez Chaves, Luiz H. A. Correia, Edelberto Franco Silva
:
An SDN-based energy-aware traffic management mechanism. 139-150 - Supriya Aggarwal
:
Product of two Gaussian Q-functions as sum of exponentials and its applications. 151-161 - Muhammad Muaaz
, Ali Chelli, Martin Wulf Gerdes, Matthias Pätzold:
Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems. 163-175 - Mustafa Namdar
, Arif Basgumus
, Sultan Aldirmaz Çolak, Eylem Erdogan
, Hakan Alakoca, Seda Ustunbas, Lutfiye Durak-Ata:
Iterative interference alignment with spatial hole sensing in MIMO cognitive radio networks. 177-185 - Ba Cao Nguyen
, Xuan Nam Tran
, Dinh Tan Tran:
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments. 187-200 - Abdelwahab Boualouache
, Thomas Engel:
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing. 201-220 - Zahi Nakad, Mohammad Ali Sayed
, Anthony Yaghi, Harag Margossian
, Wissam Fawaz
:
A novel offline indoor acoustic synchronization protocol: experimental analysis. 221-236 - Gang Zhang, Jiangtao Dong
, Lifang He:
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing. 237-250
Volume 77, Number 5-6, June 2022
- Selma Boumerdassi, Ruben H. Milocco, Leïla Saïdane, Nicolas Puech:
Machine learning for networking. 251-252 - Miguel Landry Foko Sindjoung
, Pascale Minet
:
Estimating and predicting link quality in wireless IoT networks. 253-265 - V. Ch Sekhar Rao Rayavarapu
, Arunanshu Mahapatro
:
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers. 267-280 - Golshan Famitafreshi
, Cristina Cano
:
Achieving proportional fairness in WiFi networks via bandit convex optimization. 281-295 - Ons Aouedi
, Kandaraj Piamrat, Salima Hamma, Menuka Perera Jayasuriya Kuranage:
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network. 297-309 - Adel Djama
, Badis Djamaa
, Mustapha Réda Senouci, Nabil Khemache:
LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks. 311-330 - Adda Boualem
, Hacène Fouchal
, Marwane Ayaida, Cyril De Runz:
Fibonacci tiles strategy for optimal coverage in IoT networks. 331-344 - Abdallah Sobehy
, Éric Renault, Paul Mühlethaler:
Generalization aspect of accurate machine learning models for CSI-based localization. 345-357 - Samuel A. Ajila
, Chung-Horng Lung
, Anurag Das:
Analysis of error-based machine learning algorithms in network anomaly detection and categorization. 359-370 - Arnaud Rosay
, Kévin Riou
, Florent Carlier
, Pascal Leroux
:
Multi-layer perceptron for network intrusion detection. 371-394 - Ola Salman
, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab
:
Mutated traffic detection and recovery: an adversarial generative deep learning approach. 395-406 - Martín Panza
, Diego Madariaga
, Javier Bustos-Jiménez:
Extracting human behavior patterns from DNS traffic. 407-420 - Diogo Ferreira
, Carlos R. Senna
, Paulo Salvador
, Luís Cortesão, Cristina Pires, Rui Pedro, Susana Sargento
:
Prediction of low accessibility in 4G networks. 421-435 - Taku Wakui
, Takao Kondo
, Fumio Teraoka:
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN. 437-454
Volume 77, Number 7-8, August 2022
- Diogo Menezes Ferrazani Mattos, Dianne Scherly Varela de Medeiros, Daniel Mossé:
Enabling technologies for running IoT applications on the cloud. 455-456 - Silvio E. Quincozes
, Diego G. Passos
, Célio Vinicius N. de Albuquerque, Daniel Mossé, Luiz Satoru Ochi:
An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer. 457-471 - Kirti A. Yadav, P. Vijayakumar
:
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network. 473-489 - Melody Jamalzadeh, Mohsen Maadani
, Mojdeh Mahdavi:
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles. 491-503 - Renato Souza Silva
, Luís F. M. de Moraes:
A balanced prior knowledge model based on Beta function for evaluating DIDS performance. 505-515 - Gabriel Antonio F. Rebello
, Gustavo Franco Camilo
, Lucas C. B. Guimarães
, Lucas Airam C. de Souza
, Guilherme A. Thomaz
, Otto Carlos M. B. Duarte:
A security and performance analysis of proof-based consensus protocols. 517-537 - Lucas C. B. Guimarães
, Gabriel Antonio F. Rebello, Gustavo Franco Camilo
, Lucas Airam C. de Souza
, Otto Carlos M. B. Duarte:
A threat monitoring system for intelligent data analytics of network traffic. 539-554 - João Vitor Valle Silva, Nicollas Rodrigues de Oliveira
, Dianne S. V. Medeiros, Martin Andreoni Lopez
, Diogo M. F. Mattos:
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms. 555-571
Volume 77, Number 9-10, October 2022
- Shi Dong
, Yuanjun Xia, Tao Peng:
Traffic identification model based on generative adversarial deep convolutional network. 573-587 - Abdelouahab Bentrcia
:
Block-wise Kaczmarz successive interference cancellation: a matrix algebraic approach. 589-599 - Nadia Mouawad
, Rami Khoder, Rola Naja, Samir Tohmé:
Vertical group handover congestion game for a vehicular platoon in VLC networks. 601-610 - Rodrigo S. V. Eiras
, Rodrigo S. Couto
, Marcelo G. Rubinstein
:
Performance evaluation of an HTTP proxy implemented as a virtual network function. 611-619 - Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee
:
An improved user authentication and key agreement scheme for roaming service in ubiquitous network. 621-640 - Aymen Hasan Alawadi
, Sándor Molnár:
Oddlab: fault-tolerant aware load-balancing framework for data center networks. 641-662 - Wanjia Zheng
, Kazumasa Omote:
A study on robustness of malware detection model. 663-675 - Dimas Mavares Terán
, Kevin M. Diaz España, Laura I. Ochoa Escobar:
Full data rate space-time code selection. 677-688 - Kais Jallouli
, Mohamed Mazouzi, Jean-Philippe Diguet, Alireza Monemi, Salem Hasnaoui:
MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA. 689-702 - Ghufran Ali M. Jawad, Ali Kadhum M. Al-Qurabat
, Ali Kadhum Idrees
:
Maximizing the underwater wireless sensor networks' lifespan using BTC and MNP5 compression techniques. 703-723 - Editorial Expression of Concern: Motor imagery-based neuro-feedback system using neuronal excitation of the active synapses. 725
Volume 77, Number 11-12, December 2022
- Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang:
Interactions between artificial intelligence and cybersecurity to protect future networks. 727-729 - Maria Mushtaq
, Muhammad Muneeb Yousaf, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat
:
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection. 731-747 - Theobald de Riberolles, Yunkai Zou, Guthemberg Silvestre, Emmanuel Lochin
, Jiefu Song
:
Anomaly detection for ICS based on deep learning: a use case for aeronautical radar data. 749-761 - Mohamed Amine Merzouk
, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Investigating the practicality of adversarial evasion attacks on network intrusion detection. 763-775 - Yuki Osada, Ryusei Nagasawa, Yoshiaki Shiraishi
, Makoto Takita, Keisuke Furumoto, Takeshi Takahashi, Masami Mohri, Masakatu Morii:
Multi-labeling with topic models for searching security information. 777-788 - Fabien Charmet
, Harry Chandra Tanuwidjaja, Solayman Ayoubi
, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. 789-812 - Antonio José Silvério, Rodrigo S. Couto
, Miguel Elias M. Campista
, Luís Henrique M. K. Costa:
A bi-objective optimization model for segment routing traffic engineering. 813-824 - Juin Acharjee
, Kaushik Mandal, Sujit Kumar Mandal:
Slotted patch and ground for reducing side lobe level of planar antenna operating under higher order mode. 825-834 - Xu Lu
, Kezhou Chen, Rongjun Chen:
Balance: depolarized intelligent sensing system with multi-angle energy-saving optimized control model. 835-846 - Haidar Taki
, Chadi Abou-Rjeily:
On enhancing the transmission efficiency of modulated UWB signals under different emission standards. 847-865 - Fábio Henrique Cabrini
, Albérico de Castro Barros Filho, Douglas Braz Maciel, Filippo Valiante Filho
, Augusto José Venâncio Neto, Sergio Takeo Kofuji:
Helix Multi-layered: a context broker federation for an efficient cloud-to-things continuum. 867-879

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.