Default Cover Image

2019 29th International Telecommunication Networks and Applications Conference (ITNAC)

Nov. 27 2019 to Nov. 29 2019

Auckland, New Zealand

ISBN: 978-1-7281-3673-8

Table of Contents

IndexFreely available from IEEE.pp. 1-1
Welcome MessageFreely available from IEEE.pp. 1-1
Technical Program Committee WelcomeFreely available from IEEE.pp. 1-2
CommitteesFreely available from IEEE.pp. 1-2
SponsorsFreely available from IEEE.pp. 1-6
Keynote SpeakersFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
ProgramFreely available from IEEE.pp. 1-27
Technical Program CommitteeFreely available from IEEE.pp. 1-5
Additional ReviewersFreely available from IEEE.pp. 1-1
AuthorsFreely available from IEEE.pp. 1-5
Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Realization of congestion-aware energy-aware virtual link embeddingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Max-cut and min-flow theorem for coal-transportation networks based on fault-tolerant routingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Encryption Algorithm to Prevent Domain Name System Cache Poisoning AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN SettingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Adaptive Control of Nonstatistical Sensor Data Aggregation to Minimize Latency in IoT GatewaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Relay Selection Scheme for Energy Harvesting IoT Networks with Direct LinkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Frame Synchronization Performance of Optical-Wireless Hybrid BPPM-OOK SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Novel Entitlement-based Blockchain-enabled Security Architecture for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Method for Comparing OpenFlow and P4Full-text access may be available. Sign in or learn about subscription options.pp. 1-3
Development of a Supply Chain Product Monitoring NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Detecting IRC-based Botnets by Network Traffic Analysis Through Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Compact Multiband Frequency Reconfigurable Antenna for 5G CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Design and Implementation of Wi-Fi Based Attendance System Using Raspberry PiFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Demystifying LoRa WAN Security and CapacityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Music Response Based on Real-time Facial Expression RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR CodesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Early Warning System with Real Time Tilt MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Unsplittable flow Edge Load factor Balancing in SDN using P4 RuntimeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Dynamic Resource Allocation for Visible Light Communications (VLC)- WiFi Heterogeneous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Download Traffic Scheduling for CubeSats Swarms with Inter-Satellite LinksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Mininet Topology: Mirror of the Optical Switch FabricFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Leveraging CNN and Transfer Learning for Vision-based Human Activity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Performance Analysis of Defused VLC Channel for Mobile EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Detecting Compromised Switches And Middlebox-Bypass Attacks In Service Function ChainingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Link Scheduling for Data Collection in SIC-Capable UAV NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Blockchain Enabled Opportunistic Fog-based Radio Access Network: A Position PaperFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Improving Prediction Accuracy for Power Consumption in Virtual EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A proposal of information diffusion model using information vitalityFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
An Orientation Aware Learning MAC for Multi-UAVs NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
UAV-aided Data Collection in Self Organized IoT Network for Social Augmented RealityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Decoding Latency of LDPC Codes in 5G NRFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Evaluating TCP Connection HealthinessFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Novel Relaying Mechanism for Multi-Cast Transmission with Ground-Aerial NOMAFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance Analysis of Random Backoff based D2D Discovery in Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Non-Centralised and Non-GPS Navigation Mechanism using IoT sensors: challenges and trade-offsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
The Inference Graph of Cybersecurity RulesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Ambient Intelligence for Smart Home using The Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Steganalysis of Storage-based Covert Channels Using EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Dynamic RNN -CNN based Malware Classifier for Deep Learning AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Rate Matching Pattern EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
SDN-based Wireless Access Networks Utilising BBR TCP Congestion ControlFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Digital Forensic Readiness In Wireless Medical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Utilising SDN to Counter BGP Convergence DelaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improvised MANET Selfish Node Detection using Artificial Immune System based Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Weight Based Channel Scheduling for LTE-A FemtocellsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Cloud-Based Traffic Flow Framework for Tactile Internet using SDN and Fog ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
5G and the Future of Security in ICTFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Showing 76 out of 76