


default search action
GIIS 2025: Dubai, United Arab Emirates
- Global Information Infrastructure and Networking Symposium, GIIS 2025, Dubai, United Arab Emirates, February 25-27, 2025. IEEE 2025, ISBN 979-8-3315-2011-3
- Dwi Andi Nurmantris, Gandeva Bayu Satrya, Achmad Munir:
Performance Evaluation of Switchable Reflective Electromagnetic Surface Efficiency for Beam Deflector Application. 1-4 - Amine Rguez, Yassine Hadjadj-Aoul, Gerardo Rubino:
A GRASP-based approach for Dynamic and Reliable Virtual Network Embedding. 1-6 - Álvaro Antônio Fonseca de Souza, Daniel F. Macedo:
Comfort Personalisation in Smart Environments Using Transfer Learning. 1-6 - Deemah H. Tashman, Soumaya Cherkaoui:
Dynamic Synergy: Leveraging RIS and Reinforcement Learning for Secure, Adaptive Underlay Cognitive Radio Networks. 1-6 - Rosy Altawil, Sawsan Al Zahr, Vincent Audebert, Laurent Decreusefond, Philippe Martins:
A Simulation on Resource Allocation Policies: URLLC Packets Loss and eMBB Packets Waiting Time. 1-5 - Júnia Maísa Oliveira, César Morais, Daniel F. Macedo, José Marcos S. Nogueira:
A Comparative Analysis of Feature Selection and Machine Learning Algorithms for Enhanced Anomaly Detection in 5G Core Networks. 1-6 - Adnan Ahmed Abi Sen, Adel Ben Mnaouer, Omar Tayan, Abdulaziz Al-Hammouri, Sanaa Askool:
A Model for Balancing Data Security and Privacy in IoT Applications. 1-6 - Lucas Costafreda, Salah-Eddine Elayoubi:
Goal-Oriented Communications for federated learning in mobile networks. 1-7 - Jiahui Xiang, Osman Salem, Ahmed Meahoua, Santichai Wicha, Pradorn Sureephong:
Secure Blockchain-based Single Sign-On with Zero-Knowledge Proof Authentication. 1-6 - Soheil Hosseini, Ignacio de Miguel, Ramon Casellas, Raul Muñoz, Evaristo J. Abril, Ramón J. Durán Barroso:
Optimizing Transceiver Usage in Multiband Elastic Optical Networks via SLA-Differentiated Protection. 1-6 - Chonghao Pei, Lotfi Mhamdi:
Dual Distillation: A Lightweight and Effective Intrusion Detection Model for IoT Security. 1-6 - Kamel Abbad, Lyes Khoukhi, Lionnel Mesnil, Alain Alliot, Inna Alliot:
Advanced Anomaly Detection for Maritime IoT Systems: Integrating Semi-Markov Processes for Robust Cybersecurity. 1-6 - Mohamed Aziz Aboud, Nawel Zangar, Rami Langar, Marion Berbineau, Jerome Madec:
Optimizing Resource Allocation and Scheduling towards FRMCS and GSM-R networks coexistence in Railway Systems. 1-7 - Badre Bousalem, Vinicius F. Silva, Selsabil-Belkis Bakhouche, Rami Langar, Sylvain Cherrier:
Detecting and Mitigating DDoS Attacks in 5G-V2X Networks: A Deep Learning-based Approach. 1-2 - Razine Missara, Hadi Yakan, Hamza Kchok, Ilhem Fajjari, Nadjib Aitsaadi:
Misbehavior Detection System in V2X 5G Edge Networks based on Transformer. 1-6 - Hamza Ejjbiri, Vasily Lubashevskiy:
Enhancement of the Edge Criticality Ranking by the Integration of Collective and Individual Information: Iterative Bridgeness with the Degree Product as a Secondary Factor. 1-6 - Patatchona Keyela
, Soumaya Cherkaoui:
Open RAN Slicing with Quantum Optimization. 1-6 - Mohammed Risal Thadathil, Nasir Saeed:
Smart Traffic Intersections: Leveraging ISAC and Millimeter-Wave for Advanced Vehicle Platooning. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.