Search

Your search keyword '"C.2.0"' showing total 735 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
735 results on '"C.2.0"'

Search Results

51. Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

52. The Swapped Dragonfly

53. Six Questions about 6G

54. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

55. Attention-Based Model and Deep Reinforcement Learning for Distribution of Event Processing Tasks

56. A User Centric Blockage Model for Wireless Networks

57. Centralization is about Control, not Protocols (Position Paper)

58. NSF Broadband Research 2020 Report

59. Scheduling Algorithms for Age of Information Differentiation with Random Arrivals

60. Worst-case Delay Bounds in Time-Sensitive Networks with Packet Replication and Elimination

61. RFID Exploitation and Countermeasures

62. An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

63. PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams

64. Decentralized Collaborative Video Caching in 5G Small-Cell Base Station Cellular Networks

65. Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks

66. Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection

67. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment

68. Large Scale Measurement on the Adoption of Encrypted DNS

69. Global Systems Performance Analysis For Mobile Communications (GSM) using Cellular Network CODECS

70. Cyber Security in Cloud: Risk Assessment Models

71. MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

72. Performance Characteristics of the BlueField-2 SmartNIC

73. An Event-based Parameter Switching Method for Controlling Cybersecurity Dynamics

74. Techno-Economic Assessment Models for 5G

75. Arraymetrics: Authentication Through Chaotic Antenna Array Geometries

76. InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

77. Content Placement in Networks of Similarity Caches

78. TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems

79. mmWall: A Reconfigurable Metamaterial Surface for mmWave Networks

80. DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

81. Application-Based Coexistence of Different Waveforms on Non-orthogonal Multiple Access

82. Toward A Network-Assisted Approach for Effective Ransomware Detection

83. On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice

84. New approach to MPI program execution time prediction

85. Downlink channel access performance of NR-U: Impact of numerology and mini-slots on coexistence with Wi-Fi in the 5 GHz band

86. Model for Techno-Economic Assessment of Access Technologies. Doctoral Dissertation for PhD, Telecommunications Engineering (EECS)

87. Multi-functional Coexistence of Radar-Sensing and Communication Waveforms

88. Optimised allgatherv, reduce_scatter and allreduce communication in message-passing systems

89. Techno-Economic Assessment in Communications: Models for Access Network Technologies

90. A Distributed Trust Framework for Privacy-Preserving Machine Learning

91. A Link Generator for Increasing the Utility of OpenAPI-to-GraphQL Translations

92. Testing Compilers for Programmable Switches Through Switch Hardware Simulation

93. Towards Federated Learning With Byzantine-Robust Client Weighting

94. A Proposed IoT Smart Trap using Computer Vision for Sustainable Pest Control in Coffee Culture

95. Research of Caller ID Spoofing Launch, Detection, and Defense

96. Waveform-Domain NOMA: The Future of Multiple Access

97. Contention Window Optimization in IEEE 802.11ax Networks with Deep Reinforcement Learning

98. Reducing Precoder/Channel Mismatch and Enhancing Secrecy in Practical MIMO Systems Using Artificial Signals

99. On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks

100. Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process

Catalog

Books, media, physical & digital resources