Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ITNAC
ITNAC 2020
Generate Citations
2020 30th International Telecommunication Networks and Applications Conference (ITNAC)
Nov. 25 2020 to Nov. 27 2020
Melbourne, Australia
ISBN: 978-1-7281-8827-0
Table of Contents
Copyright Page
Freely available from IEEE.
pp. i-i
ITNAC 2020 TOC
Freely available from IEEE.
pp. i-iii
Welcome Message
Freely available from IEEE.
pp. i-i
Technical Program Committee Welcome
Freely available from IEEE.
pp. i-ii
ITNAC 2020 Committees
Freely available from IEEE.
pp. i-ii
Keynote Speakers [3 abstracts]
Full-text access may be available. Sign in or learn about subscription options.
pp. i-iv
ITNAC 2020 Program
Freely available from IEEE.
pp. i-xvi
Technical Program Committee
Freely available from IEEE.
pp. i-iv
Additional Reviewers
Freely available from IEEE.
pp. i-i
ITNAC 2020 Authors Index
Freely available from IEEE.
pp. i-iii
WP4: A P4 Programmable IEEE 802.11 Data Plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Paul Zanna
,
Pj Radcliffe
,
Dinesh Kumar
Framework for a Decentralized Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Raman Singh
,
Andrew Donegan
,
Hitesh Tewari
MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Araya Kibrom Desta
,
Shuji Ohira
,
Ismail Arai
,
Kazutoshi Fujikawa
Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory Effects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tony Tony
,
Sieteng Soh
,
Mihai Lazarescu
,
Kwan-Wu Chin
Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Marjan Moradi
,
Ayub Bokani
,
Jahan Hassan
Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Bo Hu
,
Benjamin Fisher
,
Alirio Guerra
,
John P.T. Mo
A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Kriangkrai Maneerat
,
Krisada Chinda
,
Charuwalee Suwatthikul
,
Ladawan Klinkusoom
,
La-or Kovavisaruch
,
Kamol Kaemarungsi
On-Demand Blind Packet Forwarding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Irfan Simsek
MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Noah Oghenefego Ogwara
,
Krassie Petrova
,
Mee Loong Bobby Yang
Performance Evaluation of UAV-Aided Mobile Networks by Means of Ray Launching Generated REMs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Silvia Mignardi
,
Maximilian J. Arpaio
,
Chiara Buratti
,
Enrico M. Vitucci
,
Franco Fuschini
,
Roberto Verdone
Cuckoo Prefix: A Hash Set for Compressed IP Blocklists
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Donovan Allen
,
Navid Shaghaghi
A Spatiotemporal Analysis of a Group-based Access Solution for Massive MTC Networks and the Stability-Scalability Trade-off
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Rasha Alkhansa
,
Hassan Ali Artail
,
Mohamad Assaad
,
Karim Kabalan
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Maryam Shahpasand
,
Leonard Hamey
,
Mohamed Ali Kaafar
,
Dinusha Vatsalan
Emulating Low Probability of Detection Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
James Yockey
,
Benjamin Campbell
,
Andrew Coyle
,
Robert Hunjet
Smart Attendance System in an Enterprise-Based Access Point Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Temitope Odewole
,
Rajan Kadel
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Md. Khairul Islam
,
Prithula Hridi
,
Md. Shohrab Hossain
,
Husnu S. Narman
Detecting Network Intrusion through Anomalous Packet Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Tanjim Munir Dipon
,
Md. Shohrab Hossain
,
Husnu S. Narman
An Investigation on Core Network Latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Uwe Bauknecht
,
Tobias Enderle
Constraint-Based Rerouting mechanism to address Congestion in Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vijaya Durga Chemalamarri
,
Robin Braun
,
Mehran Abolhasan
An End-to-End Medical Emergency Response System to Support Elderly People
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Md Akbar Hossain
,
Sayan Kumar Ray
,
Seyed Reza Shahamiri
,
Daud Ahmed
,
Garry Singh
,
Rose Arts
Indigenous Big Data Implications in New Zealand
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Marianne Cherrington
,
David Airehrour
,
Joan Lu
,
Qiang Xu
,
Steven Wade
,
Ihaka Dunn
QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error Termination
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M Lakshmi Prasad Reddy
,
Sumanth Sakkara
OFDM-IM Performance Evaluation Under Jamming Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahmet Kaplan
,
Ibrahim Altunbas
,
Gunes Karabulut Kurt
,
Mustafa Kesal
,
Defne Kucukyavuz
A distributed algorithm for range-based localization in sparse wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Quentin Vey
,
Réjane Dalcé
,
Adrien van den Bossche
,
Thierry Val
Joint Resource Allocation and Computation Offloading Strategy for D2D-assisted and NOMA-based MEC Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Umar Ajaib Khan
,
Rong Chai
,
Muhammad Junaid Tahir
,
Waleed Almughalles
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hadi Alasti
Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohanad Alhabo
,
Naveed Nawaz
,
Omer Waqar
Quintuple Band Antenna Design Using Stacked Series Array For Millimeter Wave
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rauful Nibir
,
Md Rafiqul Islam
,
Nazmus S Nafi
,
Mark A Gregory
Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Da-Ren Chen
,
Wei-Min Chiu
Multi-State Border Gateway Protocol for Multi-Domain Software Defined Networking–Based Gateways
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hamad Saud Alotaibi
,
Mark A Gregory
,
Shuo Li
,
Hoang Do
A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
James Jin Kang
Features of Human-Centred Algorithm Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Marianne Cherrington
,
David Airehrour
,
Joan Lu
,
Qiang Xu
,
David Cameron-Brown
,
Ihaka Dunn
Reference-free Detection of LSB Steganography Using Histogram Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Natiq M. Abdali
,
Zahir M. Hussain
Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Liwei Yang
,
Qi Zhang
,
Ziyi Huang
,
Wenjie Zhang
Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Syed Danial Ali Shah
,
Mark A Gregory
,
Shuo Li
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Stanislaw Baranski
,
Jerzy Konorski
Energy-Efficient Systems for Smart Sensor Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Zahir M. Hussain
Showing 47 out of 47