Abstract is missing.
- Uberization of NOMA Wireless Network Resource Sharing: A Driver-Passenger Game-Theoretic ApproachYutong Song, Wei Wang, Kazem Sohraby. 1-6 [doi]
- Achieving Low Probability of Interference in Spread Spectrum Cognitive Radio NetworksKyle Watters, Edward J. Coyle. 1-6 [doi]
- Interference Mitigation in Dynamic TDD MIMO Interference ChannelsAmel Tibhirt, Dirk Slock, Yi Yuan-Wu. 7-12 [doi]
- Performance Evaluation of Contention-based Channel Access for mmWave Sidelink CommunicationsAlessandro Brighenti, Matteo Drago, Tommaso Zugno, Michele Zorzi, Paolo Casari. 13-18 [doi]
- Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network TrafficFelix Klement, Henrich C. Pöhls, Stefan Katzenbeisser 0001. 19-25 [doi]
- Device Onboarding in Eclipse Arrowhead Using Power of Attorney Based AuthorizationSreelakshmi Vattaparambil Sudarsan, Olov Schelén, Ulf Bodin, Nicklas Nyström. 26-32 [doi]
- Implementation of Failure Recovery in Emergency IoT Applications Using D2D in LoRa/LoRaWANKalpit Dilip Ballal, Radheshyam Singh, Stanley Chukwuebuka Nwabuona, Lars Dittmann, Sarah Ruepp. 41-46 [doi]
- A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoTQuang-Duy Nguyen, Saadia Dhouib, Patrick Bellot. 47-52 [doi]
- Towards an IoT Framework for Wellness AssessmentKatherine McLeod, Petros Spachos. 53-58 [doi]
- Analysis of Power Consumption in 4G VoLTE and 5G VoNR Over IMS NetworkCaio B. Bezerra De Souza, Jussif J. Abularach Arnez, Tarcisio Fernandes, Cassio A. Tavares Alves, Janislley Oliveira de Sousa. 59-64 [doi]
- Hybrid SIC with Residual Error Factor in Wireless Powered CommunicationsJhenifer de O. Melo, Francisco Rafael Marques Lima. 65-70 [doi]
- Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated NetworksRakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu 0001, Zehui Xiong. 71-76 [doi]
- Exploiting Machine Learning for the Performance Analysis of a Mobile Hotspot with a Call Admission Control MechanismIrene P. Keramidi, Dimitris Uzunidis, Marinos Vlasakis, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios. 77-82 [doi]
- Resource Optimization of SFC Embedding for IoT Networks Using Quantum ComputingMahzabeen Emu, Salimur Choudhury, Kai Salomaa. 83-88 [doi]
- Power Control in massive MIMO Networks Using Transfer Learning with Deep Neural NetworksNeda Ahmadi, Iosif Mporas, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, John M. Senior. 89-93 [doi]
- Smart home's energy management applying the deep deterministic policy gradient and clusteringIoannis Zenginis, John S. Vardakas, Kostas Ramantas, Christos V. Verikoukis. 94-99 [doi]
- A compact simple circular disk printed monopole Antenna for multiple applicationsMohamed Lamine Bouknia, Rami Zegadi, Djamel Sayad, Chemseddine Zebiri, Issa T. E. Elfergani, Jonathan Rodriguez 0001, Ifiok E. Otung, Raed Abd-Alhameed. 100-103 [doi]
- Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical StructuresRami Zegadi, Mohamed Lamine Bouknia, Djamel Sayad, Chemseddine Zebiri, Issa T. E. Elfergani, Jonathan Rodriguez 0001, Zoran Vujicic, Raed Abd-Alhameed. 104-107 [doi]
- A Federated DRL Approach for Smart Micro-Grid Energy Control with Distributed Energy ResourcesFarhad Rezazadeh, Nikolaos G. Bartzoudis. 108-114 [doi]
- Fine-grained Augmentation for RF Fingerprinting under Impaired ChannelsOmer Melih Gul, Michel Kulhandjian, Burak Kantarci, Azzedine Touazi, Cliff Ellement, Claude D'Amours. 115-120 [doi]
- Design of a Smart Metering Device with Edge Computing for Monitoring Silicon Photovoltaic PanelsGonzalo García-Valle, Silvia Colodrero, Victor Cuadrat, Guillermo Gutiérrez, Sirio Beneitez, Sergio Martínez-Navas. 121-127 [doi]
- User Mobility Dataset for 5G Networks Based on GPS GeolocationSiham Bouchelaghem, Hakim Boudjelaba, Mawloud Omar, Mourad Amad. 128-133 [doi]
- Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on SmartphonesMaria Papaioannou, Georgios Zachos, Georgios Mantas, Aliyah Essop, Abdulkareem Karasuwa, Jonathan Rodriguez 0001. 134-139 [doi]
- Robust Network Intrusion Detection Systems for Outlier DetectionRohan Desai, T. G. Venkatesh 0001. 140-146 [doi]
- Integration of Backscatter Communication with Multi-cell NOMA: A Spectral Efficiency Optimization under Imperfect SICWali Ullah Khan, Eva Lagunas, Asad Mahmood, Zain Ali, Symeon Chatzinotas, Björn Ottersten, Octavia A. Dobre. 147-152 [doi]
- A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2XHouda Hafi, Wahabou Abdou. 153-158 [doi]
- Quality of Service Aware Scheduling in Mixed Traffic Wireless NetworksAreen Shiyahin, Stefan Schwarz, Markus Rupp. 159-165 [doi]
- M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loTEric Gyamfi, Anca Jurcut. 166-172 [doi]
- Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID DevicesMaria Papaioannou, Georgios Mantas, Aliyah Essop, Victor Sucasas, Najwa Aaraj, Jonathan Rodriguez 0001. 173-178 [doi]
- Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things NetworksGeorgios Zachos, Georgios Mantas, Ismael Essop, Kyriakos Porfyrakis, José Carlos Ribeiro, Jonathan Rodriguez 0001. 179-183 [doi]
- Secure Two-Way Communications Between UAVs and Control Center in IoV 5G CommunicationAndreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, George Mastorakis, Evangelos Pallis. 184-189 [doi]
- Elastic Load Balancing in Software Defined Satellite NetworksDavide Adami, Stefano Giordano, Michele Pagano. 207-212 [doi]
- Joint Content Placement and Secure Lightpath Provisioning in EONs Supporting Anycast TrafficGiannis Savva, Konstantinos Manousakis, Vasilis Sourlas, Georgios Ellinas. 213-218 [doi]
- A Pragmatic and Realistic Approach for Providing Adapted Transport Services for All ApplicationsEzechiel Tape, Samir Medjiah, Christophe Chassot. 219-225 [doi]
- Performance Study of High-Efficiency IEEE 802.11ax WLAN Standard Using NS-3 SimulatorAparna Behara, T. G. Venkatesh 0001. 226-231 [doi]
- A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-SurveillanceDjamila Zamouche, Sofiane Aissani, Kahina Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar. 232-237 [doi]
- Lightweight YOLOV4 algorithm for underwater whale detectionLili He 0002, Defeng Du, Hongtao Bai, Kai Wang. 927-934 [doi]