首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Telecommunication systems

缩写:TELECOMMUN SYST

ISSN:1018-4864

e-ISSN:1572-9451

IF/分区:2.3/Q3

文章目录 更多期刊信息

共收录本刊相关文章索引10
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Aggelos Skoufis,Georgios Chatzithanasis,Georgia Dede et al. Aggelos Skoufis et al.
Recent years have seen an increasing need for higher broadband connections, fueled by novel applications including fifth generation wireless networks (5G). The European Commission is working on achieving specific milestones regarding the de...
Sivaraman Eswaran,Prasad Honnavalli Sivaraman Eswaran
Today's modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology c...
Palak Bagga,Ashok Kumar Das,Vinay Chamola et al. Palak Bagga et al.
With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of...
Wladimir Gonçalves de Morais,Carlos Eduardo Maffini Santos,Carlos Marcelo Pedroso Wladimir Gonçalves de Morais
Video streaming currently dominates global Internet traffic. Live streaming broadcasts events in real-time, with very different characteristics compared to video-on-demand (VoD), being more sensitive to variations in delay, jitter, and pack...
Abdul Basit,Maham Zafar,Xuan Liu et al. Abdul Basit et al.
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., use...
Harsha Kumara Kalutarage,Hoang Nga Nguyen,Siraj Ahmed Shaikh Harsha Kumara Kalutarage
App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rathe...
Emma Fitzgerald,Ulf Körner,Bjorn Landfeldt Emma Fitzgerald
TO-DCF, a new backoff scheme for 802.11, has the potential to significantly increase throughput in dense wireless LANs while also opportunistically favouring nodes with heavier traffic loads and/or better channel conditions. In this paper w...
Guohui Li,Ping Fan,Ling Yuan Guohui Li
Recent research has focused on Continuous K-Nearest Neighbor (CKNN) query over moving objects in road networks. A CKNN query is to find among all moving objects the K-Nearest Neighbors (KNNs) of a moving query point within a given time inte...