Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
LCN
LCN 2024
Generate Citations
2024 IEEE 49th Conference on Local Computer Networks (LCN)
Oct. 8 2024 to Oct. 10 2024
Normandy, France
ISBN: 979-8-3503-8800-8
Table of Contents
LCN 2024 Copyright Page
Freely available from IEEE.
pp. i-i
LCN 2024 Message from the General Chair
Freely available from IEEE.
pp. i-ii
LCN 2024 Welcome from the Technical Program Committee
Freely available from IEEE.
pp. i-i
LCN 2024 Message from the Demo Chair
Freely available from IEEE.
pp. i-i
LCN 2024 Organizing Committee
Freely available from IEEE.
pp. i-i
LCN 2024 Steering Committee
Freely available from IEEE.
pp. i-i
LCN 2024 Technical Program Committee
Freely available from IEEE.
pp. i-iii
LCN 2024 List of Accepted Papers
Freely available from IEEE.
pp. i-iv
LCN 2024 Best Paper Awards for Prior IEEE LCN Conferences
Freely available from IEEE.
pp. i-iii
LCN 2024 Panel Discussion
Freely available from IEEE.
pp. i-i
LCN 2024 Panel Discussion
Freely available from IEEE.
pp. i-i
LCN 2024 Panel Discussion
Freely available from IEEE.
pp. i-i
RF-AcSense: Device-Free Activity Localization and Recognition via Passive RFID Tag Array
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Shaoyi Zhu
,
Hanfei Lv
,
Weiqing Huang
Polar-QUIC: Adaptive Packet-Level Polar Coding-Assisted QUIC in Satellite Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yang Liu
,
Fangzheng Feng
,
Miaoran Peng
,
Zhaoyang Wang
,
Ting Bi
,
Tao Jiang
Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Niruth Bogahawatta
,
Yasiru Senarath Karunanayaka
,
Suranga Seneviratne
,
Kanchana Thilakarathna
,
Rahat Masood
,
Salil Kanhere
,
Aruna Seneviratne
Accurate Identification of IoT Devices in the Presence of Wireless Channel Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bhagyashri Tushir
,
Vikram K Ramanna
,
Yuhong Liu
,
Behnam Dezfouli
Collaborative Edge Caching and Dynamic Bitrate Adaptation for SHVC-based VR Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Siyang Chen
,
Luyao Chen
,
Yong Tang
,
Wenyong Wang
BandSeer: Bandwidth Prediction for Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Birkan Denizer
,
Olaf Landsiedel
Plausibly Deniable Content Discovery for Bitswap Using Random Walks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Manuel Wedler
,
Erik Daniel
,
Florian Tschorsch
ULTRA: UWB-based Localization and TRAcking through A-DBSCAN and Bayesian Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Zijun Han
,
Jinzhu Chen
,
Fan Bai
UMCC: Uncoupling Multipath Congestion Control through Shared Bottleneck Detection in Path-Aware Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Marten Gartner
,
David Hausheer
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Denis Donadel
,
Francesco Marchiori
,
Luca Pajola
,
Mauro Conti
Optimal Caching Strategy for Data Freshness in IoT Applications with Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Surabhi Sharma
,
Ajay Chaudhary
,
Sateesh K. Peddoju
Continuous Select-and-Prune Incremental Learning for Encrypted Traffic Classification in Distributed SDN Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Son Duong
,
Hai-Anh Tran
,
Truong X. Tran
Transparent TSN for Agnostic End-hosts via P4-based Traffic Characterization at Switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Cornelia Brülhart
,
Nurefşan Sertbaş Bülbül
,
Nils Ole Tippenhauer
,
Mathias Fischer
Deep Learning for Reducing Redundancy in Madrid’s Traffic Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Leyuan Ding
,
Praboda Rajapaksha
,
Roberto Minerva
,
Noel Crespi
Trustable Network Intrusion Detection System through Wisdomnet and Uncertainty Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abhinav Vij
,
Hai-Anh Tran
,
Truong X. Tran
DDoS Attack Detection and Mitigation in 5G Networks using P4 and SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Diana Pineda Andrade
,
Kemal Akkaya
,
Alexander Perez-Pons
,
Selcuk Uluagac
,
Abdulhadi Sahin
Intelligent Hopping Mechanism for Deception Defense Scenarios Based on Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yazhuo Gao
,
Lin Yang
,
Ran Zhu
,
Feng Yang
,
Yining Cao
,
Long Zhang
HPDNS: A High-Performance Domain Name Service Architecture Based on In-Network Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xingyu Li
,
Shuyong Zhu
NEP-IDS: a Network Intrusion Detection System Based on Entropy Prediction Error
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Andrea Augello
,
Giuseppe Lo Re
,
Daniele Peri
,
Partheepan Thiyagalingam
ActiveDNS: Is There Room for DNS Optimization Beyond CDNs?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Yue Wang
,
Changhua Pei
,
Zexin Wang
,
Yingqiang Wang
,
Guo Chen
,
Yuchao Zhang
,
Yi Li
,
Jingjing Li
,
Jianhui Li
,
Gaogang Xie
Extending Boundaries with WiLong: A Field Study on Long-Range Wi-Fi Mesh Custom Solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Kavin Kumar Thangadorai
,
Monika Prakash
,
Michael Baddeley
,
Anshul Pandey
,
Krishna M. Sivalingam
Blocking-Waived Estimation: Improving the Worst-Case End-To-End Delay Analysis in Switched Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Lijie Yang
,
Théo Docquier
,
Ludovic Thomas
,
Ye-Qiong Song
Single-Anchor Indoor Localization Using Multi-Frequency RSSI Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jannis Mast
,
Thomas Hänel
,
Nils Aschenbruck
Flow Migration for Service Function Chains: Preserving External-Ordering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ranjan Patowary
,
Gautam Barua
,
Radhika Sukapuram
Blockchain-inspired Incentive Mechanism for Trust-aware Offloading in Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ahmed Alioua
,
Nesrine Bouchemal
,
Randa Mati
,
Mohamed-Lamine Messai
Live Long and Prosper – On the Potential of Segment Routing Midpoint Optimization to Improve Network Robustness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Alexander Brundiers
,
Timmy Schüller
,
Nils Aschenbruck
Failure Resilient Green Traffic Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Daniel Otten
,
Nils Aschenbruck
Science DMZ Networks: How Different Are They Really?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Emily Mutter
,
Susmit Shannigrahi
Detecting Network Anomalies in NetFlow Traffic with Machine Learning Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Quôc Vo
,
Philippe Ea
,
Osman Salem
,
Ahmed Mehaoua
GoNP: Graph of Network Patterns for Device Identification using UDP Application Layer Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lalith Medury
,
Farah Kandah
Research on Security Protection Evasion Mechanism Based on IPv6 Fragment Headers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Bin Lin
,
Liancheng Zhang
,
Yi Guo
,
Hongtao Zhang
,
Yakai Fang
Monty: A Framework for Latency-aware Multi-flow ATSSS Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Alexander Rabitsch
,
Per Hurtig
,
Stefan Alfredsson
,
Anna Brunstrom
AI/ML-Based IDS as 5G Core Network Function in the Control Plane for IP/non-IP CIoT Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Tan Nhat Linh Le
,
Boussad Ait Salem
,
Dave Appadoo
,
Nadjib Aitsaadi
,
Xiaojiang Du
Improving Centralized Intrusion Detection with Hardware Operational Metrics in Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Alexandre Marques Carrer
,
Cíntia Borges Margi
CLEVER: Crafting Intelligent MISP for Cyber Threat Intelligence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Han Wang
,
Alfonso Iacovazzi
,
Seonghyun Kim
,
Shahid Raza
Data-Driven and Privacy-Preserving Cooperation in Decentralized Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Francesco Malandrino
,
Carlos Barroso Fernandez
,
Carlos J. Bernardos Cano
,
Carla Fabiana Chiasserini
,
Antonio De La Oliva
,
Mahyar Onsori
PTN-IDS: Prototypical Network Solution for the Few-shot Detection in Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Nadia Niknami
,
Vahid Mahzoon
,
Jie Wu
MIME: Mobility-Induced Dynamic Matching for Partial Offloading in Vehicular Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mahmuda Akter
,
Debjyoti Sengupta
,
Anurag Satpathy
,
Sajal K. Das
Passive Device-free Indoor Movement Detection using WiFi Time-of-Flight Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Sascha Rösler
,
Anatolij Zubow
,
Falko Dressier
Inference Load-Aware Orchestration for Hierarchical Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Anna Lackinger
,
Pantelis A. Frangoudis
,
Ivan Čilić
,
Alireza Furutanpey
,
Ilir Murturi
,
Ivana Podnar Žarko
,
Schahram Dustdar
Security and Privacy for Fat Intra-Body Communication: Mechanisms and Protocol Stack
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Johan Engstrand
,
Konrad-Felix Krentz
,
Noor Badariah Asan
,
Madhushanka Padmal
,
Wenqing Yan
,
Laya Joseph
,
Pramod Rangaiah
,
Bappaditya Mandal
,
Christian Rohner
,
Maria Mani
,
Robin Augustine
,
Thiemo Voigt
Seek and Classify: End-to-end Joint Spectrum Segmentation and Classification for Multi-signal Wideband Spectrum Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Prashant Subedi
,
Sangwon Shin
,
Mehmet C. Vuran
Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jie Lin
,
Hoi-Kwong Lo
,
Jacob Johannsson
,
Mattia Montagna
,
Manfred von Willich
Multimodal Machine Learning Algorithm for Enhanced Signal Modulation Recognition in Wireless Communication Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Bojun Zhang
Third Eye: Inferring the State of Your Smartphone Through Wi-Fi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abhishek Kumar Mishra
,
Mathieu Cunche
CSUM: A Novel Mechanism for Updating CubeSat while Preserving Authenticity and Integrity
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ankit Gangwal
,
Aashish Paliwal
Is Deep Learning a Better Option than Random Forest for Encrypted Traffic Classification?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Philippe Ea
,
Quôc Vo
,
Osman Salem
,
Ahmed Mehaoua
A Lightweight Caching Decision Scheme with a Caching-Resource-Utilization-Based Strategy for Information-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yuanhang Li
,
Shuang Ouyang
,
Jiaxian Lv
Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Uzma Maroof
,
Gustavo Batista
,
Arash Shaghaghi
,
Sanjay Jha
Variable-length Field Extraction for Unknown Binary Network Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Xiuwen Sun
,
Huiying Li
,
Yu Chen
,
Jie Cui
,
Hong Zhong
EFSC: an Efficient, Flexible and Secure Trading System for Computing Power Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Qunyang Lin
,
Luyang Liu
,
Hongyin Zhu
,
Haonan Tong
,
Chuang Zhang
DOT: Towards Fast Decision Tree Packet Classification by Optimizing Rule Partitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Long Huang
,
Longlong Zhu
,
Jiashuo Yu
,
Xinyang Chen
,
Linying Zheng
,
Dong Zhang
,
Chunming Wu
Multi-source Trust Model Based on Blockchain and IoT Edge Task Collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sikai He
,
Jian Chen
,
Peiyun Zhang
,
Zhangjie Fu
Impact of PTB Message Usage on Path MTU Discovery for QUIC
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Timo Völker
,
Michael Tüxen
A Quantum Access Points Selection Algorithm for Large-Scale Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ahmed Shokry
,
Moustafa Youssef
MTFS: a Moving Target Defense-Enabled File System for Malware Mitigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jan von der Assen
,
Alberto Huertas Celdrán
,
Rinor Sefa
,
Burkhard Stiller
,
Gérôme Bovet
Automated Machine Learning Configuration to Learn Intrusion Detectors on Attack-Free Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Omar Anser
,
Jérôme François
,
Isabelle Chrisment
CardSketch: Shift Attention for Network-wide Cardinality Telemetry
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hanze Chen
,
Zhengyan Zhou
,
Xinyang Chen
,
Pengpai Shi
,
Yanni Wu
,
Longlong Zhu
,
Haodong Chen
,
Dong Zhang
,
Chunming Wu
StarReact: Detecting Important Network Changes in BFT Protocols with Star-Based Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Martin Nischwitz
,
Marko Esche
,
Florian Tschorsch
SynCoDel: Network-Assisted Synchronization of Video and Haptic Streams for Teleoperations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mingyu Ma
,
Yushan Yang
,
Tung V. Doan
,
Osel Lhamo
,
Frank H. P. Fitzek
,
Giang T. Nguyen
Evidence Theory-Based Trust Management for the Social Internet of Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Nasrin Shamaeian
,
Dirk Pesch
Evaluating Drill-Down DDoS Destination Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Timon Krack
,
Samuel Kopmann
,
Martina Zitterbart
Thresh-Hold: Assessment of Threshold Cryptography in Leader-Based Consensus
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Richard von Seck
,
Filip Rezabek
,
Georg Carle
Improving Residential Safety by Multiple Sensors on Multiple Nodes for Joint Emergency Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Artur Sterz
,
Markus Sommer
,
Kevin Lüttge
,
Bernd Freisleben
WoFS: A Write-only File System for Privacy-aware Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Philipp Jahn
,
Markus Sommer
,
Artur Sterz
,
Jonas Höchst
,
Bernd Freisleben
Enhancing Geographic Greedy Routing in Sparse LDACS Air-to-Air Networks through k-Hop Neighborhood Exploitation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Musab Ahmed
,
Konrad Fuger
,
Koojana Kuladinithi
,
Andreas Timm-Giel
Reproducible Wireless Experiments in a Containerized Environment with Hardware Access
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Désirée Rentz
,
Lukas Heindl
,
Jonas Andre
,
Georg Carle
,
Stephan Günther
Securing Blockchain-based IoT Systems with Physical Unclonable Functions and Zero-Knowledge Proofs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Daniel Commey
,
Sena Hounsinou
,
Garth V. Crosby
Securing the Internet of Robotic Things: A Federated Learning Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Matilda Nkoom
,
Daniel Commey
,
Sena G. Hounsinou
,
Garth V. Crosby
Client-Constrained Virtual Network Embedding under Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Junkai He
,
Makhlouf Hadji
,
Djamal Zeghlache
Integrating Quantum-Secured Blockchain Identity Management in Open RAN for 6G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Engin Zeydan
,
Luis Blanco
,
Josep Mangues-Bafalluy
,
Abdullah Aydeger
,
Suayb Arslan
,
Yekta Turk
ShieldDINC: Privacy-Preserving Distributed In-Network Computations with Efficient Homomorphic Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Htet Htet Hlaing
,
Hitoshi Asaeda
AScan6: IPv6 Address Fast Scanning Technology Based on Service Instance Name Association
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yakai Fang
,
Liancheng Zhang
,
Yi Guo
,
Hongtao Zhang
,
Bin Lin
AutoLoRaConfig: Automated Registration Procedure for LoRaWAN Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Vicente Torres-Sanz
,
Julio A. Sanguesa
,
Francisco J. Martinez
,
Piedad Garrido
,
Carlos T. Calafate
Exploring Effective Sensor Deployment Techniques for Dynamic Region of Interest
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Buddhima Amarathunga
,
Jyoti Sahni
,
Alvin Valera
Forte: Hybrid Traffic-Aware Scheduling for Mobile TSCH Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Iliar Rabet
,
Hossein Fotouhi
,
Mário Alves
,
Maryam Vahabi
,
Mats Björkman
B.A.T.M.A.N. Mesh Networking on ESP32’s 802.11
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Randolf Rotta
,
Julius Schulz
,
Billy Naumann
,
Navya Sneha Chatharajupalli
,
Jörg Nolte
,
Matthias Werner
Privacy Performance Trade-off in Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hari Hara Sudhan Selvam
,
Manjesh K. Hanawal
,
Sameer G. Kulkarni
Demo: Using Smart Smoke Detectors for Emergency Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-3
by
Markus Sommer
,
Artur Sterz
,
Waldemar Gellert
,
Bernd Freisleben
Demo: Secure Inventorying and Lifecycle Management of IoT Devices with DLT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Armin R. Veres
,
Daria Schumm
,
Thomas Grübl
,
Katharina O. E. Müller
,
Bruno Rodrigues
,
Burkhard Stiller
Demo: A Software Suite for ILDA Digital Network/IDN-File Recording and Playback
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Matthias Frank
Demo: The Impact of LEO Satellite Network Instabilities on the Performance of Networking Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Dominic Laniewski
,
Stefanie Thieme
,
Till Zimmermann
,
Eric Lanfer
,
Nikolas Wintering
,
Jannis Mast
,
Nils Aschenbruck
Demo: B.A.T.M.A.N. Mesh Routing on Ultra Low-Power IEEE 802.11 Modules
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Randolf Rotta
,
Navya Sneha Chatharajupalli
,
Billy Naumann
,
Julius Schulz
,
Reinhardt Karnapke
,
Matthias Werner
,
Jörg Nolte
Demo: Maritime Radar Systems under Attack. Help is on the Way!
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Frederik Basels
,
Konrad Wolsing
,
Elmar Padilla
,
Jan Bauer
Demo: LoRaWAN Coverage Assessment Using Optimal Bicycle Route Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Daniel Szafranski
,
Sinja Ulrich
,
Robert Bredereck
,
Andreas Reinhardt
Demo: Security Vulnerabilities and Network Service Disruptions with HTTP/3
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Hari Hara Sudhan Selvam
,
Sameer G. Kulkarni
Demo: Real-Time Spectrum Segmentation and Classification with Over-The-Air Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sangwon Shin
,
Prashant Subedi
,
Mehmet C. Vuran
Demo: Framework for Rapidly Reproducible Wireless Mesh Network Testbeds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sai Prabhath Koneru
,
Maciej Zawodniok
Showing 100 out of 112
Load More
Load All