Abstract is missing.
- Security Aspects and Vulnerabilities in Authentication Process WiFi Calling - RF measurementsCristian Capota, Simona Halunga, Octavian Fratu, Eugen Stancu, Popescu Madalin. 1-5 [doi]
- Analysis and Optimization of the Network Throughput in IEEE 802.15.13 based Visible Light Communication NetworksYusuf Bulbul, Mohammed Elamassie, Tuncer Baykas, Murat Uysal. 1-6 [doi]
- Predictive Model for Software Vulnerability Management in Telecommunication InfrastructuresAndrei Avadanei, Lucian Nitescu, Ioan Constantin, Cristian Patachia-Sultanoiu. 1-5 [doi]
- NLOS Links Detection Algorithm for Improved 5G NR Indoor PositioningSergey Sosnin, Artyom Lomayev, Alexey Khoryaev. 1-6 [doi]
- Modeling and Analysis for HARQ-Aided NOMA Scheme Using Markov-Based ApproachRaed T. Al-Zubi, Khalid A. Darabkh, Yazid M. Khattabi, Mohannad T. Abu Issa. 1-6 [doi]
- Authentication Protocol for Enhanced Security of the Automatic Identification SystemRobert E. Litts, Dimitrie C. Popescu, Otilia Popescu. 1-6 [doi]
- Comparative Performance Evaluation of VLC, LTE and WLAN Technologies in Indoor EnvironmentsArooba Zeshan, Mehdi Karbalayghareh, Farshad Miramirkhani, Murat Uysal, Tuncer Baykas. 1-6 [doi]
- Use Case of a Management and Orchestration for Network Functions Virtualization in a VoIP TestbedBenjamin Kone, Ahmed Dooguy KORA, Robert Botez, Iustin-Alexandru Ivanciu, Virgil Dobrota. 1-5 [doi]
- An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNetShaikhum Monira, Upama Kabir, Mosarrat Jahan, Uchswas Paul. 1-6 [doi]
- A Quality-of-Service Scenario Awareness for Use-Cases of Open-Source Management and Control System Hub in Edge ComputingAndra-Isabela-Elena Ciobanu, Eugen Borcoci, Marius-Constantin Vochin. 1-5 [doi]
- Exploiting a Virtual Load Balancer with SDN-NFV FrameworkMd Fahad Monir, Dan Pan. 1-6 [doi]
- BER Performance Comparison of AF and DF Assisted Relay Selection Schemes in Cooperative NOMA SystemsInci Umakoglu, Mustafa Namdar, Arif Basgumus, Ferdi Kara, Hakan Kaya, Halim Yanikomeroglu. 1-6 [doi]
- Channel Reconstruction Based Multiuser Precoding with Limited FeedbackMert Ozates, Mohammad Kazemi, Çagri Göken, Tolga M. Duman. 1-6 [doi]
- Estimating Capture Probabilities for Complex Topologies in 2D Molecular Communication via Diffusion Channel using Artificial Neural NetworksHalil Umut Ozdemir, Halil Ibrahim Orhan, Meriç Turan, Baris Büyüktas, H. Birkan Yilmaz. 1-6 [doi]
- MiSTA: Threshold-ALOHA with Mini SlotsMutlu Ahmetoglu, Orhan Tahir Yavascan, Elif Uysal. 1-6 [doi]
- Effect of Wind on the Connectivity and Safety of Large Scale UAV SwarmsBiruk E. Tegicho, Tsinuel N. Geleta, Tadilo Endeshaw, Abdullah Eroglu, William W. Edmonson, Girma Bitsuamlak. 1-6 [doi]
- Adaptive MAC Protocols for IoT Edge Computing Architectures with Event-Triggered TrafficVasileios Asteriou, Georgios I. Papadimitriou, Petros Nicopolitidis. 1-6 [doi]
- Security Solution for Cloud Based on Software Defined NetworkingNaina Patrascu, Alina Dartu, Tudor Cornea, Serban Georgica Obreja, Marina Ciurezu, Alexandru Brumaru. 1-6 [doi]
- Generalized Schematic Successive Cancellation Decoding for Polar CodesKarim El-Abbasy, Ramy F. Taki ElDin, Salwa El-Ramly, Bassant Abdelhamid. 1-6 [doi]
- G-Cloud Briefcase - Electronic Archive for Academic Certificates and General Certificates of Education Documents Using Public Private Hyperspace for E-Government Library Services Based on NOSQL DatabasesMircea Cristian Stana, Nicolae Goga, Constantin Viorel Marian, Ramona Popa, Catalina-Mihaela Vulpe, Cristian Taslitchi. 1-5 [doi]
- Anchor Placement in TOA based Wireless Localization Networks via Convex RelaxationCuneyd Ozturk, Sinan Gezici. 1-6 [doi]
- Advanced 5G Architectures for Future NetApps and VerticalsCristian Patachia-Sultanoiu, Ion Bogdan, George Suciu, Alexandru Vulpe, Oana Badita, Bogdan Rusti. 1-6 [doi]
- Circuit with directional coupler properties, in microstrip technology, for 2.4GHz ISM band applicationsGiban Laura Elena, Popovici Eduard Cristian. 1-6 [doi]
- Service Selection using EthereumHemant Kumar Srivastava, Ravi Yadav, Gaurav Baranwal. 1-3 [doi]
- A Primitive Cipher with Machine LearningXian Liu. 1-6 [doi]
- Testing Scenarios for off-the-shelf 5G devicesRazvan Craciunescu, Cristian Patachia-Sultanoiu, Octavian Fratu, Ion Bogdan. 1-4 [doi]
- Effect of Downlink Energy Transfer Scheduling on SDMA and TDMA Uplink TransmissionIbrahim Pehlivan, Sinem Coleri. 1-5 [doi]
- Error Performance of Uplink SIMO-NOMA with Joint Maximum-Likelihood and Adaptive M-PSKHichem Semira, Ferdi Kara. 1-6 [doi]
- An Efficient Beam Search Algorithm for mmWave Massive MIMONeeta Jha, Saptarshi Chaudhuri, Jyotsna Bapat, Debabrata Das. 1-6 [doi]
- Development of an Android application for user exposure assessment to electromagnetic fields emitted by an IEEE 802.11ax clientAndreea Buda, Annamaria Sârbu. 1-5 [doi]
- Aspects regarding the customized analysis of emission security risks for certain types of compromising signalsMircea Popescu, Razvan Bartusica. 1-6 [doi]
- PrEmISES - optimizing the Semantically-Enabled data used by small and medium enterprisesRamona Cristina Popa, Constantin Viorel Marian, Nicolae Goga. 1-5 [doi]
- Implementation of a Click Based IDS on SDN-NFV Architecture and Performance EvaluationMd Fahad Monir, Ryhan Uddin, Dan Pan. 1-6 [doi]
- A Hybrid Machine Learning based Phishing Website Detection Technique through Dimensionality ReductionNusrath Tabassum, Farhin Faiza Neha, Md. Shohrab Hossain, Husnu S. Narman. 1-6 [doi]
- A practical controlled NLMS algorithm for network echo cancellationCristian Anghel, Cristian Stanciu, Constantin Paleologu. 1-5 [doi]
- Study of millimeter waves in 5GAna-Maria Nedelcu, Alexandru Martian, Eduard Cristian Popovici. 1-4 [doi]
- Geometric Constellation Shaping Using Initialized AutoencodersAmir Omidi, Ming Zeng 0002, Jiachuan Lin, Leslie A. Rusch. 1-5 [doi]
- Passive Side-Channel Interference Estimation for WiFi NetworksAysun Gurur Onalan, Mehmet Hakan Kurtoglu, Eren Soyak. 1-6 [doi]
- An Experimental Study on the Influence of Human Movement in Indoor Radio Channel at 28GHzMohamed Benzaghta, Remziye Busra Coruk, Bengisu Yalcinkaya, Ali Kara. 1-3 [doi]
- DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centersConstantin Viorel Marian. 1-5 [doi]
- AUV Trajectory Optimization for an Optical Underwater Sensor Network in the Presence of Ocean CurrentsKhadijeh Ali Mahmoodi, Murat Uysal. 1-6 [doi]
- On Delay Sensitivity Clusters of Microgrid Data Aggregation Under LTE-A LinksHalil Deniz, Murat Simsek, Burak Kantarci. 1-6 [doi]
- Vulnerabilities of UMTS-LTE Authentication Process - Theoretical and Practical Aspects during RF MeasurementsCristian Capota, Simona Halunga, Eugen Stancu, Popescu Madalin. 1-5 [doi]
- Performance of Deep Learning Methods in DF Based Cooperative Communication SystemsBilgehan Akdemir, Muhammet Ali Karabulut, Haci Ilhan. 1-6 [doi]
- Convolutional Neural Networks for audio classification on ultra low power IoT devicesAlessandro Andreadis, Giovanni Giambene, Riccardo Zambon. 1-6 [doi]
- Detecting indicators of compromise in web applications using access logsIonut Cernica, Nirvana Popescu, Razvan Craciunescu. 1-5 [doi]
- Vulnerabilities of UMTS-LTE Authentication Process - Theoretical and Practical Aspects during RF MeasurementsCristian Capota, Simona Halunga, Eugen Stancu, Popescu Madalin. 1-5 [doi]
- Implementation and Evaluation of Age-Aware Downlink Scheduling PoliciesTahir Kerem Oguz, Elif Uysal, Tolga Girici. 1-3 [doi]
- Evaluating the Performance of Over-the-Air Time Synchronization for 5G and TSN IntegrationHaochuan Shi, Adnan Aijaz, Nan Jiang. 1-6 [doi]
- Statistical Analysis of the Low-Bit Quantizer's Output in Presence of Multipath Fading EffectsAleksey S. Gvozdarev, Yury A. Bryukhanov. 1-6 [doi]
- Conceptualization of an Intelligent HL7 Application based on Questionnaire Generation and EditingRazvan Sfat, Iuliana Marin, Nicolae Goga, Ramona Popa, Ion Cristian Darla, Constantin Viorel Marian. 1-4 [doi]
- Fog Computing and D2D Networks IntegrationMustafa Khaleel Hamadani, Eugen Borcoci. 1-6 [doi]
- A Technique for Passive Ionosphere Sounding based on Machine Learning AlgorithmsMircea Stanic, Radu Mitran. 1-7 [doi]
- Machine Learning based Software-Defined Networking Traffic Classification SystemAlexandru Vulpe, Ionut Girla, Razvan Craciunescu, Madalina Georgiana Berceanu. 1-5 [doi]
- Communication Secrecy in Offshore Wind FarmsXian Liu. 1-6 [doi]
- Experimental analysis of PCPB-2: Comprehensive Energy-Efficient Approach to Distributed Workload Processing in Communication NetworksLarysa Globa, Nataliia Gvozdetska. 1-3 [doi]
- Mixer Imbalance Correction in Wireless OFDM SystemsChris Hall, Ivan Djordjevic. 1-6 [doi]
- Position Estimation in Visible Light Systems in the Presence of Malicious LED TransmittersFurkan Kokdogan, Sinan Gezici. 1-6 [doi]
- Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity ThreatsPaul Cotae, Nii Emil Alexander Reindorf. 1-6 [doi]
- Federated learning through model gossiping in wireless sensor networksJ. S. Mertens, Laura Galluccio, Giacomo Morabito. 1-6 [doi]
- Resource Allocation for Vehicle Platooning in 5G NR-V2X via Deep Reinforcement LearningLiu Cao, Hao Yin. 1-7 [doi]
- Modulation Diversity in a Two-Way Cooperative System with an Energy Harvesting RelayM. Ajmal Khan, Ahmed Ammar. 1-6 [doi]
- Impact of Imperfect Channel Estimation on 5G-NRAysegül Ilay Tunali, Hakan Ali Çirpan. 1-6 [doi]
- Impact of Critical Node Failures on Lifetime of UWSNs with Incomplete Secure ConnectivityBurak Emre Un, Huseyin Ugur Yildiz, Bülent Tavli. 1-6 [doi]
- Evaluation of electromagnetic field exposure in the vicinity of mobile phone base stationsMarius Nedelcu, Teodor Petrescu, Victor Nitu. 1-5 [doi]
- RF Based UAV Detection and Defense Systems: Survey and a Novel SolutionAlexandru Martian, Florin-Lucian Chiper, Razvan Craciunescu, Calin Vladeanu, Octavian Fratu, Ion Marghescu. 1-4 [doi]
- A Case Study in Anticipating Insider Vulnerabilities Using Psychological ProfilingSergiu Eftimie, Vlad Cotenescu, Radu Moinescu, Ciprian Racuciu, Dragos Glavan. 1-4 [doi]
- Radio-frequency transport platform for video camerasBadula Eduard-Marian, Octavian Fratu. 1-5 [doi]
- Joint Channel Estimation and Passive Beamforming for Reconfigurable Intelligent Surface Aided Multi-user Massive MIMO SystemYicheng Xu, Hongyun Chu, Pingping Xu. 1-3 [doi]
- Uniquely Decodable Ternary Codes via Augmented Sylvester-Hadamard MatricesMichel Kulhandjian, Hovannes Kulhandjian, Claude D'Amours. 1-6 [doi]
- Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-CaseEvren Çatak, Ferhat Özgür Çatak, Arild Moldsvor. 1-6 [doi]