![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Internet Technology Letters, Volume 2
Volume 2, Number 1, January 2019
- Hu Yuan
, Carsten Maple, Yi Lu, Tim Watson:
Peer-assisted location authentication and access control for wireless networks. - Michele Nati
, Simon Mayer
, Angelo Capossele
, Paolo Missier
:
Toward trusted open data and services. - Pietro Tedeschi
, Giuseppe Piro
, Jose Antonio Sanchez Murillo, Nemanja Ignjatov, Michal Pilc, Kaspar Lebloch, Gennaro Boggia:
Blockchain as a service: Securing bartering functionalities in the H2020 symbIoTe framework. - Kashyap Kammachi Sreedhar
, Igor D. D. Curcio
:
Omnidirectional video delivery with decoder instance reduction. - Mithun Mukherjee, Jaime Lloret
, Yunrong Lv:
Leveraging light-fidelity for internet of light: State-of-the-art and research challenges. - Luiz M. Matheus
, Letícia Pires, Alex Borges Vieira, Luiz Filipe M. Vieira
, Marcos Augusto M. Vieira
, José Augusto Miranda Nacif
:
The internet of light: Impact of colors in LED-to-LED visible light communication systems. - Emanuele Goldoni, Luca Prando, Anna Vizziello
, Pietro Savazzi, Paolo Gamba:
Experimental data set analysis of RSSI-based indoor and outdoor localization in LoRa networks. - Pietro Di Gennaro, Domenico Lofù, Daniele Vitanio, Pietro Tedeschi
, Pietro Boccadoro
:
WaterS: A Sigfox-compliant prototype for water monitoring. - Nick Gregorio, Janahan Mathanamohan, Qusay H. Mahmoud
, May AlTaei:
Hacking in the cloud. - Nicolas Seydoux
, Khalil Drira, Nathalie Hernandez, Thierry Monteil:
Reasoning on the edge or in the cloud?
Volume 2, Number 2, March 2019
- Alfredo Grieco:
Celebrating the first year of Internet Technology Letters.
- Maurizio Aiello, Maurizio Mongelli, Marco Muselli, Damiano Verda
:
Unsupervised learning and rule extraction for Domain Name Server tunneling detection. - Emilien Bourdy
, Kandaraj Piamrat
, Michel Herbin:
Big Data: An incoming challenge for vehicular ad-hoc networking. - Qusay H. Mahmoud
, Michael Lescisin, May AlTaei:
Research challenges and opportunities in blockchain and cryptocurrencies. - Sabrina Sicari
, Alessandra Rizzardi, Alberto Coen-Porisini:
Smart transport and logistics: A Node-RED implementation. - Wali Ullah Khan
:
Maximizing physical layer security in relay-assisted multicarrier nonorthogonal multiple access transmission. - Gianmarco Baldini
, Raimondo Giuliani, Franc Dimc:
Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots. - Vijayakumar Singanamalla, Rizwan Patan, Mohammed S. Khan
, Suresh Kallam
:
Reliable and energy-efficient emergency transmission in wireless sensor networks. - Angelo Altamura, Francesco Inchingolo, Gianvito Mevoli, Pietro Boccadoro
:
SAFE: Smart helmet for advanced factory environment.
Volume 2, Number 3, May 2019
- Obituary: Prof. Mario Gerla (Arona, 21 February 1943 - Los Angeles, 9 February 2019).
- Claus Pahl
, Nabil El Ioini, Sven Helmer, Brian Lee:
A semantic pattern for trusted orchestration in IoT edge clouds.
- Simona Colucci
, Francesco M. Donini
, Eugenio Di Sciascio:
Checking compliance of semantic web applications with RDFS-semantics.
- Waixi Liu, Jun Cai, Yu Wang, Qing Chun Chen, Dong Tang:
Mix-flow scheduling using deep reinforcement learning for software-defined data-center networks. - Shihab S. Hazari, Qusay H. Mahmoud
:
Comparative evaluation of consensus mechanisms in cryptocurrencies. - André V. dos S. Cunha, Luiz Filipe M. Vieira
:
SOAN: Self-organizing aerial networks. - Janmoni Borah
, Md. Anwar Hussain, Joyatri Bora:
Effect on energy efficiency with small cell deployment in heterogeneous cellular networks. - Dipti Dash
, Debarshi Kumar Sanyal
:
Steiner system-based topology-transparent priority scheduling for wireless ad hoc networks. - Sadia Nazneen, Md. Monwar Jahan Chowdhury, Saifur Rahman Sabuj
:
Analysis of delay-sensitive performance in cognitive wireless sensor networks.
- (Withdrawn) Retracted: Data-Rate Performance Analysis of Massive MIMO in Fading Environment with Imperfect CSI.
Volume 2, Number 4, July 2019
- Daniel Corujo
, Augusto Neto
, Seil Jeon:
Internet Technology Letters special section on mobility support in slice-based network control for heterogeneous environment.
- Lewis Tseng
, Juan Mantica, James DeAntonis, Takamasa Higuchi, Onur Altintas:
Peer-assisted content delivery network by vehicular clouds: Algorithm and evaluation. - Francesco Tusa
, Stuart Clayman, Dario Valocchi, Alex Galis:
Hierarchical service providers on sliced infrastructure. - Alisson Medeiros, Augusto Neto
, Silvio Sampaio
, Rafael Pasquini, Javier Baliosian:
End-to-end elasticity control of cloud-network slices. - Flávio Meneses
, Rui Silva, Daniel Corujo
, Augusto Neto
, Rui L. Aguiar
:
Dynamic network slice resources reconfiguration in heterogeneous mobility environments. - Christian Grasso
, Giovanni Schembra
:
5G-Hander: A network service for handover detection in 5G networks.
- Luca De Cicco
, Saverio Mascolo, Vittorio Palmisano, Giuseppe Ribezzo:
Reducing the network bandwidth requirements for 360∘ immersive video streaming. - Selma Sbit
, Dadi Mohamed Bechir, Belgacem Chibani Rhaimi:
Interference reduction in long-term evolution-advanced by frequency and power domains.
Volume 2, Number 5, September 2019
- Mohamed Naoufal Mahfoudi
, Gayatri Sivadoss, Othmane B. Korachi, Thierry Turletti, Walid Dabbous:
Joint range extension and localization for low-power wide-area network. - Cornelius Chidubem Agbo
, Qusay H. Mahmoud
:
Comparison of blockchain frameworks for healthcare applications. - Sayed Chhattan Shah
:
Private mobile edge cloud for 5G network applications.
- Enrico Gregori, Valerio Luconi
, Alessio Vecchio:
Net neutrality in mobile broadband: A European study based on a large scale testbed. - Domenico Rotondi
, Marco Saltarella
, Gaetano Giordano, Francesco Pellecchia:
Distributed ledger technology and European Union General Data Protection Regulation compliance in a flexible working context.
- Dawer Saeed, Razi Iqbal, Hafiz Husnain Raza Sherazi
, Muhammad Usman Ghani Khan:
Evaluating Near-Field Communication tag security for identity theft prevention. - Zakaria Maamar
, Ejub Kajan, Muhammad Asim
, Thar Baker Shamsa:
Open challenges in vetting the internet-of-things. - Kyong-Jin Sok
, Gon Hong, Chongil Rim, Unjin Pak, Kinam Sin:
A collision window tree algorithm improved by fixed-window and parallel-matching schemes.
- Vitor A. Cunha
, Eduardo da Silva
, Marcio Barbosa de Carvalho
, Daniel Corujo
, João Paulo Barraca
, Diogo Gomes
, Lisandro Zambenedetti Granville
, Rui L. Aguiar
:
Network slicing security: Challenges and directions.
Volume 2, Number 6, November 2019
- Sherali Zeadally
, Jacques Bou Abdo:
Blockchain: Trends and future opportunities.
- Farzaneh Abazari
, Flavio Esposito, Hassan Takabi, Hamid Hosseinvand, Tommaso Pecorella
:
Teaching software-defined network security through malicious tenant detection. - Alessia Cagnano
, Hafiz Husnain Raza Sherazi
, Enrico De Tuglie:
Communication system architecture of an industrial-scale microgrid: A case study.
- Simone Borreggine, Pietro Serafino, Pietro Boccadoro
:
Indoor proximity detection: The case study of a smart pet door. - Makan Zamanipour
:
PHY-layer Security of MIMO-NOMA with SWIPT. - Hemanta Kumar Sahu
, Pravas R. Sahu:
Space shift keying modulation under spectrum sharing over Nakagami-m fading. - Shaik Mohammed Ali, Hemanta Kumar Sahu
:
SSK modulation performance with relay selection and selection combining. - Imran Khan
, Tanweer Ali
, Geetha Dundesh Devanagavi, Kumbhashi R. Sudhindra, Rajashekhar C. Biradar:
A compact multiband band slot antenna for wireless applications.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.