default search action
Internet Technology Letters, Volume 2
Volume 2, Number 1, January 2019
- Hu Yuan, Carsten Maple, Yi Lu, Tim Watson:
Peer-assisted location authentication and access control for wireless networks. - Michele Nati, Simon Mayer, Angelo Capossele, Paolo Missier:
Toward trusted open data and services. - Pietro Tedeschi, Giuseppe Piro, Jose Antonio Sanchez Murillo, Nemanja Ignjatov, Michal Pilc, Kaspar Lebloch, Gennaro Boggia:
Blockchain as a service: Securing bartering functionalities in the H2020 symbIoTe framework. - Kashyap Kammachi Sreedhar, Igor D. D. Curcio:
Omnidirectional video delivery with decoder instance reduction. - Mithun Mukherjee, Jaime Lloret, Yunrong Lv:
Leveraging light-fidelity for internet of light: State-of-the-art and research challenges. - Luiz M. Matheus, Letícia Pires, Alex Borges Vieira, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira, José Augusto Miranda Nacif:
The internet of light: Impact of colors in LED-to-LED visible light communication systems. - Emanuele Goldoni, Luca Prando, Anna Vizziello, Pietro Savazzi, Paolo Gamba:
Experimental data set analysis of RSSI-based indoor and outdoor localization in LoRa networks. - Pietro Di Gennaro, Domenico Lofù, Daniele Vitanio, Pietro Tedeschi, Pietro Boccadoro:
WaterS: A Sigfox-compliant prototype for water monitoring. - Nick Gregorio, Janahan Mathanamohan, Qusay H. Mahmoud, May AlTaei:
Hacking in the cloud. - Nicolas Seydoux, Khalil Drira, Nathalie Hernandez, Thierry Monteil:
Reasoning on the edge or in the cloud?
Volume 2, Number 2, March 2019
- Alfredo Grieco:
Celebrating the first year of Internet Technology Letters.
- Maurizio Aiello, Maurizio Mongelli, Marco Muselli, Damiano Verda:
Unsupervised learning and rule extraction for Domain Name Server tunneling detection. - Emilien Bourdy, Kandaraj Piamrat, Michel Herbin:
Big Data: An incoming challenge for vehicular ad-hoc networking. - Qusay H. Mahmoud, Michael Lescisin, May AlTaei:
Research challenges and opportunities in blockchain and cryptocurrencies. - Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Smart transport and logistics: A Node-RED implementation. - Wali Ullah Khan:
Maximizing physical layer security in relay-assisted multicarrier nonorthogonal multiple access transmission. - Gianmarco Baldini, Raimondo Giuliani, Franc Dimc:
Physical layer authentication of Internet of Things wireless devices using convolutional neural networks and recurrence plots. - Vijayakumar Singanamalla, Rizwan Patan, Mohammed S. Khan, Suresh Kallam:
Reliable and energy-efficient emergency transmission in wireless sensor networks. - Angelo Altamura, Francesco Inchingolo, Gianvito Mevoli, Pietro Boccadoro:
SAFE: Smart helmet for advanced factory environment.
Volume 2, Number 3, May 2019
- Obituary: Prof. Mario Gerla (Arona, 21 February 1943 - Los Angeles, 9 February 2019).
- Claus Pahl, Nabil El Ioini, Sven Helmer, Brian Lee:
A semantic pattern for trusted orchestration in IoT edge clouds.
- Simona Colucci, Francesco M. Donini, Eugenio Di Sciascio:
Checking compliance of semantic web applications with RDFS-semantics.
- Waixi Liu, Jun Cai, Yu Wang, Qing Chun Chen, Dong Tang:
Mix-flow scheduling using deep reinforcement learning for software-defined data-center networks. - Shihab S. Hazari, Qusay H. Mahmoud:
Comparative evaluation of consensus mechanisms in cryptocurrencies. - André V. dos S. Cunha, Luiz Filipe M. Vieira:
SOAN: Self-organizing aerial networks. - Janmoni Borah, Md. Anwar Hussain, Joyatri Bora:
Effect on energy efficiency with small cell deployment in heterogeneous cellular networks. - Dipti Dash, Debarshi Kumar Sanyal:
Steiner system-based topology-transparent priority scheduling for wireless ad hoc networks. - Sadia Nazneen, Md. Monwar Jahan Chowdhury, Saifur Rahman Sabuj:
Analysis of delay-sensitive performance in cognitive wireless sensor networks.
- (Withdrawn) Retracted: Data-Rate Performance Analysis of Massive MIMO in Fading Environment with Imperfect CSI.
Volume 2, Number 4, July 2019
- Daniel Corujo, Augusto Neto, Seil Jeon:
Internet Technology Letters special section on mobility support in slice-based network control for heterogeneous environment.
- Lewis Tseng, Juan Mantica, James DeAntonis, Takamasa Higuchi, Onur Altintas:
Peer-assisted content delivery network by vehicular clouds: Algorithm and evaluation. - Francesco Tusa, Stuart Clayman, Dario Valocchi, Alex Galis:
Hierarchical service providers on sliced infrastructure. - Alisson Medeiros, Augusto Neto, Silvio Sampaio, Rafael Pasquini, Javier Baliosian:
End-to-end elasticity control of cloud-network slices. - Flávio Meneses, Rui Silva, Daniel Corujo, Augusto Neto, Rui L. Aguiar:
Dynamic network slice resources reconfiguration in heterogeneous mobility environments. - Christian Grasso, Giovanni Schembra:
5G-Hander: A network service for handover detection in 5G networks.
- Luca De Cicco, Saverio Mascolo, Vittorio Palmisano, Giuseppe Ribezzo:
Reducing the network bandwidth requirements for 360∘ immersive video streaming. - Selma Sbit, Dadi Mohamed Bechir, Belgacem Chibani Rhaimi:
Interference reduction in long-term evolution-advanced by frequency and power domains.
Volume 2, Number 5, September 2019
- Mohamed Naoufal Mahfoudi, Gayatri Sivadoss, Othmane B. Korachi, Thierry Turletti, Walid Dabbous:
Joint range extension and localization for low-power wide-area network. - Cornelius Chidubem Agbo, Qusay H. Mahmoud:
Comparison of blockchain frameworks for healthcare applications. - Sayed Chhattan Shah:
Private mobile edge cloud for 5G network applications.
- Enrico Gregori, Valerio Luconi, Alessio Vecchio:
Net neutrality in mobile broadband: A European study based on a large scale testbed. - Domenico Rotondi, Marco Saltarella, Gaetano Giordano, Francesco Pellecchia:
Distributed ledger technology and European Union General Data Protection Regulation compliance in a flexible working context.
- Dawer Saeed, Razi Iqbal, Hafiz Husnain Raza Sherazi, Muhammad Usman Ghani Khan:
Evaluating Near-Field Communication tag security for identity theft prevention. - Zakaria Maamar, Ejub Kajan, Muhammad Asim, Thar Baker Shamsa:
Open challenges in vetting the internet-of-things. - Kyong-Jin Sok, Gon Hong, Chongil Rim, Unjin Pak, Kinam Sin:
A collision window tree algorithm improved by fixed-window and parallel-matching schemes.
- Vitor A. Cunha, Eduardo da Silva, Marcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes, Lisandro Zambenedetti Granville, Rui L. Aguiar:
Network slicing security: Challenges and directions.
Volume 2, Number 6, November 2019
- Sherali Zeadally, Jacques Bou Abdo:
Blockchain: Trends and future opportunities.
- Farzaneh Abazari, Flavio Esposito, Hassan Takabi, Hamid Hosseinvand, Tommaso Pecorella:
Teaching software-defined network security through malicious tenant detection. - Alessia Cagnano, Hafiz Husnain Raza Sherazi, Enrico De Tuglie:
Communication system architecture of an industrial-scale microgrid: A case study.
- Simone Borreggine, Pietro Serafino, Pietro Boccadoro:
Indoor proximity detection: The case study of a smart pet door. - Makan Zamanipour:
PHY-layer Security of MIMO-NOMA with SWIPT. - Hemanta Kumar Sahu, Pravas R. Sahu:
Space shift keying modulation under spectrum sharing over Nakagami-m fading. - Shaik Mohammed Ali, Hemanta Kumar Sahu:
SSK modulation performance with relay selection and selection combining. - Imran Khan, Tanweer Ali, Geetha Dundesh Devanagavi, Kumbhashi R. Sudhindra, Rajashekhar C. Biradar:
A compact multiband band slot antenna for wireless applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.