Default Cover Image

2020 30th International Telecommunication Networks and Applications Conference (ITNAC)

Nov. 25 2020 to Nov. 27 2020

Melbourne, Australia

ISBN: 978-1-7281-8827-0

Table of Contents

Copyright PageFreely available from IEEE.pp. i-i
ITNAC 2020 TOCFreely available from IEEE.pp. i-iii
Welcome MessageFreely available from IEEE.pp. i-i
Technical Program Committee WelcomeFreely available from IEEE.pp. i-ii
ITNAC 2020 CommitteesFreely available from IEEE.pp. i-ii
Keynote Speakers [3 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. i-iv
ITNAC 2020 ProgramFreely available from IEEE.pp. i-xvi
Technical Program CommitteeFreely available from IEEE.pp. i-iv
Additional ReviewersFreely available from IEEE.pp. i-i
ITNAC 2020 Authors IndexFreely available from IEEE.pp. i-iii
WP4: A P4 Programmable IEEE 802.11 Data PlaneFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Framework for a Decentralized WebFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Link Scheduling in Rechargeable Wireless Sensor Networks with Battery Memory EffectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Energy-Efficient and QoS-aware UAV Communication using Reactive RF Band AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On-Demand Blind Packet ForwardingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Cuckoo Prefix: A Hash Set for Compressed IP BlocklistsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Emulating Low Probability of Detection AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Smart Attendance System in an Enterprise-Based Access Point EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Network Anomaly Detection Using LightGBM: A Gradient Boosting ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Detecting Network Intrusion through Anomalous Packet IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Investigation on Core Network LatencyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Constraint-Based Rerouting mechanism to address Congestion in Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Indigenous Big Data Implications in New ZealandFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
QNOC Isochronous Router with Efficient Dynamic Virtual channel and Error TerminationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
OFDM-IM Performance Evaluation Under Jamming AttackFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A distributed algorithm for range-based localization in sparse wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor FieldFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Integrated Game Theoretic-Grey Relational Analysis Handover Method for Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Quintuple Band Antenna Design Using Stacked Series Array For Millimeter WaveFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Road Crack Detection Using Gaussian Mixture Model for Diverse Illumination ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Military Mobile Network Design: mHealth, IoT and Low Power Wide Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Features of Human-Centred Algorithm DesignFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Reference-free Detection of LSB Steganography Using Histogram AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Dynamic Bandwidth Allocation (DBA) Algorithm for Passive Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Software-Defined Vehicular Networks: A Cooperative Approach for Computational OffloadingFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Mitigation of Fake Data Content Poisoning Attacks in NDN via BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Energy-Efficient Systems for Smart Sensor CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Showing 47 out of 47