460609. Networking and communications
Title | 460609. Networking and communications |
---|---|
Parent | 4606. Distributed computing and systems software |
Latest research outputs
Sort by Date Title
Applied Deep Learning for Artificial Intelligence-enabled Wireless Communication
Davey, Christopher P. 2024. Applied Deep Learning for Artificial Intelligence-enabled Wireless Communication. PhD by Publication Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/zq1z6PhD by Publication
CrossDeFi: A Novel Cross-Chain Communication Protocol
Mohammed Abdul, Shezon Saleem, Shrestha, Anup and Yong, Jianming. 2024. "CrossDeFi: A Novel Cross-Chain Communication Protocol." Future Internet. 16 (9). https://doi.org/10.3390/fi16090314Article
Inference of Social Network Behavior from Internet Traffic Traces
Albdair, Mostfa, Addie, Ronald G. and Fatseas, David. 2016. "Inference of Social Network Behavior from Internet Traffic Traces." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 United States. https://doi.org/10.1109/ATNAC.2016.7878773Paper
An efficient and secure itinerary-based data aggregation algorithm for WSNs
Wang, Taochun, Zhang, Ji, Luo, Yonglong, Zuo, Kaizhong and Ding, Xintao. 2017. "An efficient and secure itinerary-based data aggregation algorithm for WSNs." 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). Sydney, Australia 01 - 04 Aug 2017 United States. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268Paper
Proximity Coordinated Random Access (PCRA) for M2M applications in LTE-A
Brown, Jason and Khan, Jamil. 2018. "Proximity Coordinated Random Access (PCRA) for M2M applications in LTE-A." 28th International Telecommunication Networks and Application Conference: Experiments and Proofs in Web-service Security (ITNAC 2018). Sydney, Australia 21 - 23 Nov 2018 New York, United States.Paper
Guidance law for a surveillance UAV swarm tracking a high capability malicious UAV
Brown, Jason and Raj, Nawin. 2021. "Guidance law for a surveillance UAV swarm tracking a high capability malicious UAV." 2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob 2021). Bandung, Indonesia 08 - 10 Apr 2021 United States. https://doi.org/10.1109/APWiMob51111.2021.9435240Paper
The Impact of Initial Swarm Formation for Tracking of a High Capability Malicious UAV
Brown, Jason and Raj, Nawin. 2021. "The Impact of Initial Swarm Formation for Tracking of a High Capability Malicious UAV." International IOT, Electronics and Mechatronics Conference (IEMTRONICS 2021). Toronto, Canada 21 - 24 Apr 2021 Piscataway, United States. https://doi.org/10.1109/IEMTRONICS52119.2021.9422506Paper
Predictive Tracking of a High Capability Malicious UAV
Brown, Jason and Raj, Nawin. 2021. "Predictive Tracking of a High Capability Malicious UAV." IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC 2021). Las Vegas, United States 27 - 30 Jan 2021 Piscataway, United States. https://doi.org/10.1109/CCWC51732.2021.9376137Paper
Outlier detection in indoor localization and Internet of Things (IoT) using machine learning
Bhatti, Mansoor Ahmed, Riaz, Rabia, Rizvi, Sanam Shahla, Shokat, Sana, Riaz, Farina and Kwon, Se Jin. 2020. "Outlier detection in indoor localization and Internet of Things (IoT) using machine learning." Journal of Communications and Networks. 22 (3), pp. 236-243. https://doi.org/10.1109/JCN.2020.000018Article
Designing of cell coverage in light fidelity
Riaz, Rabia, Rizvi, Sanam Shehla, Riaz, Farina, Shokat, Sana and Mughall, Naveed Akbar. 2018. "Designing of cell coverage in light fidelity." International Journal of Advanced Computer Science and Applications. 9 (3), pp. 44-53. https://doi.org/10.14569/IJACSA.2018.090308Article
Coexistence and Interference Mitigation for WPANs and WLANs From Traditional Approaches to Deep Learning: A Review
Chen, Dong, Zhuang, Yuan, Huai, Jianzhu, Sun, Xiao, Yang, Xiansheng, Javed, Muhammed, Brown, Jason, Sheng, Zhenguo and Thompson, John. 2021. "Coexistence and Interference Mitigation for WPANs and WLANs From Traditional Approaches to Deep Learning: A Review." IEEE Sensors Journal. 21 (22), pp. 25561-25589. https://doi.org/10.1109/JSEN.2021.3117399Article
Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm
Arnold, Christopher and Brown, Jason. 2020. "Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm." 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON 2020). New York City, United States 28 - 31 Oct 2020 Piscataway, United States. https://doi.org/10.1109/UEMCON51285.2020.9298062Paper
Software Defined Networking Managed Hybrid IoT as a Service
Edge, Peter, Davar, Zara and Zhang, Zhongwei. 2019. "Software Defined Networking Managed Hybrid IoT as a Service." Makhijani, Kiran (ed.) Fifteenth International Conference on Networking and Services (ICNS 2019). Athens, Greece 02 - 06 Jun 2019 Wilmington, United States.Paper
Spectrum sharing for wireless communication subject to regulatory constraints on power
Alhasnawi, Mohammad Kaisb Layous. 2020. Spectrum sharing for wireless communication subject to regulatory constraints on power. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/fax9-n428PhD Thesis
Better Service from Understanding the Social Network Behaviour in the Internet
Albdair, Mostfa, Addie, Ronald G. and Kist, Alexander. 2019. "Better Service from Understanding the Social Network Behaviour in the Internet." 2018 IEEE Region 10 Conference (TENCON 2018). Jeju, South Korea 28 - 31 Oct 2018 Piscataway, United States. https://doi.org/10.1109/TENCON.2018.8650301Paper
Interference mitigation techniques for a dense heterogeneous area network in machine-to-machine communications
Chen, Dong, Khan, Jamil, Javed, Muhammad Awais and Brown, Jason. 2019. "Interference mitigation techniques for a dense heterogeneous area network in machine-to-machine communications ." Transactions on Emerging Telecommunications Technologies. 30 (12), pp. 1-24. https://doi.org/10.1002/ett.3763Article
The Protege effect: learning from the experience of graduates in an online community of practice
van Galen-Dickie, Marianne. 2020. The Protege effect: learning from the experience of graduates in an online community of practice. Doctorate other than PhD Doctor of Professional Studies. University of Southern Queensland. https://doi.org/10.26192/fvpp-3627Doctorate other than PhD
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490Article
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902Article
Resource provisioning for a multi-layered network
Xing, Chang, Addie, Ronald G., Peng, Yu, Lin, Ronping, Li, Fan, Hu, Wenjie, Abramov, Vyacheslav M. and Zukerman, Moshe. 2019. "Resource provisioning for a multi-layered network." IEEE Access. 7 (1), pp. 16226-16245. https://doi.org/10.1109/ACCESS.2019.2894396Article
An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control
Chen, Fulong, Luo, Yonglong, Zhang, Ji, Zhu, Junru, Zhang, Ziyang, Zhao, Chuanxin and Wang, Taochun. 2018. "An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control." World Wide Web. 21 (1), pp. 33-57. https://doi.org/10.1007/s11280-017-0455-zArticle
Blocking analysis of persistent resource allocations for M2M applications in wireless systems
Brown, Jason, Afrin, Nusrat and Khan, Jamil. 2016. "Blocking analysis of persistent resource allocations for M2M applications in wireless systems ." Transactions on Emerging Telecommunications Technologies. 27 (11), pp. 1513-1529. https://doi.org/10.1002/ett.3091Article
Network anomaly detection by using a time-decay closed frequent pattern
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian, Sharma, Nabin, Sajjanhar, Atul and Blumenstein, Michael. 2019. "Network anomaly detection by using a time-decay closed frequent pattern." Information (Basel). 10 (8). https://doi.org/10.3390/info10080262Article
Multi-task network anomaly detection using federated learning
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian and Yu, Shui. 2019. "Multi-task network anomaly detection using federated learning." 10th international symposium on information and communication technology (SoICT 2019). Hanoi, Viet Nam 04 - 06 Dec 2019 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3368926.3369705Paper
Estimation and application of social network behaviour from network traffic
Albdair, Mostfa Mohsin. 2018. Estimation and application of social network behaviour from network traffic. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5f62f10677b5ePhD Thesis
Key performance aspects of an LTE FDD based Smart Grid communications network
Brown, Jason and Khan, Jamil. 2013. "Key performance aspects of an LTE FDD based Smart Grid communications network." Computer Communications. 36 (5), pp. 551-561. https://doi.org/10.1016/j.comcom.2012.12.007Article
Comparison of QoS optimisation techniques in adaptive smart device peer-to-peer overlay networks
Maiti, Ananda, Maxwell, Andrew and Kist, Alexander. 2021. "Comparison of QoS optimisation techniques in adaptive smart device peer-to-peer overlay networks." International Journal of Parallel, Emergent and Distributed Systems. 36 (6), pp. 668-686. https://doi.org/10.1080/17445760.2018.1441840Article
Cross-layer optimisation of quality of experience for video traffic
Qadir, Qahhar Muhammad. 2016. Cross-layer optimisation of quality of experience for video traffic. PhD Thesis Doctor of Philosophy. University of Southern Queensland.PhD Thesis
Data mining in IoT: data analysis for a new paradigm on the Internet
Wlodarczak, Peter, Ally, Mustafa and Soar, Jeffrey. 2017. "Data mining in IoT: data analysis for a new paradigm on the Internet." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3115866Paper
A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks
Zhou, Xujuan, Soar, Jeffrey, Gururajan, Raj, Wu, Zhangguang and Wu, Weimin. 2017. "A Cross - layer Optimization of Video Transmission Based on Packet Loss Rate in 802.11e Wireless Networks." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 United States. https://doi.org/10.1145/3106426.3109445Paper
Building an end-to-end ISP broadband infrastructure as an advanced networking subject
Miles, Christopher Raymond and Chan, Ka Ching. 2016. "Building an end-to-end ISP broadband infrastructure as an advanced networking subject." Computer Applications in Engineering Education. 24 (1), pp. 16-26. https://doi.org/10.1002/cae.21667Article
An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
Sahi, Aqeel, Lai, David, Li, Yan and Diykh, Mohammed. 2017. "An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment ." IEEE Access. 5, pp. 6036-6048. https://doi.org/10.1109/ACCESS.2017.2688460Article
An energy efficient TCP DoS attacks mitigation method in cloud computing
Sahi, Aqeel, Lai, David and Li, Yan. 2017. "An energy efficient TCP DoS attacks mitigation method in cloud computing." Al-Jumaily, Adel Ali, Barifcani, Ahmed and Al-Jumaily, Ahmed (ed.) 1st MoHESR and HCED Iraqi Scholars Conference in Australasia 2017 (ISCA 2017). Melbourne, Australia 05 - 06 Dec 2017 Melbourne, Australia.Paper
Minimum node degree of k-connected vehicular ad hoc networks in highway scenarios
Xiong, Wei, Jingjing, Xu, Li, Yan, Wan, Xiangkui and Jin, Liang. 2016. "Minimum node degree of k-connected vehicular ad hoc networks in highway scenarios." Eurasip Journal on Wireless Communications and Networking. 32, pp. 1-10. https://doi.org/10.1186/s13638-016-0529-0Article
A quality of experience-aware cross-layer architecture for optimizing video streaming services
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2016. "A quality of experience-aware cross-layer architecture for optimizing video streaming services." Computer Networks. 102, pp. 38-49. https://doi.org/10.1016/j.comnet.2016.02.030Article
Special Section on Rural and Remote ICT: Broadband Rural, Regional and National Impacts
Lane, Michael, Middleton, Catherine, Zarnekow, Ruediger and Alam, Khorshed. 2016. "Special Section on Rural and Remote ICT: Broadband Rural, Regional and National Impacts ." Australasian Journal of Information Systems. 20, pp. 1-2. https://doi.org/10.3127/ajis.v20i0.1474Editorial
Node allocation in peer-to-peer overlay networks based remote instrumentation with smart devices
Maiti, Ananda, Maxwell, Andrew D. and Kist, Alexander A.. 2016. "Node allocation in peer-to-peer overlay networks based remote instrumentation with smart devices." 26th International Telecommunication Networks and Applications Conference (ITNAC 2016). Dunedin, New Zealand 07 - 09 Dec 2016 New Zealand. https://doi.org/10.1109/ATNAC.2016.7878807Paper
Using gamification to create opportunities for engagement, collaboration and communication in a peer-to-peer environment for making and using remote access labs
Orwin, Lindy, Kist, Alexander A., Maxwell, Andrew D. and Maiti, Ananda. 2016. "Using gamification to create opportunities for engagement, collaboration and communication in a peer-to-peer environment for making and using remote access labs." 3rd Experiment@International Conference 2015 (exp.at'15). Ponta Delgada, Portugal 02 - 04 Jun 2015 https://doi.org/10.1109/EXPAT.2015.7463271Paper
IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems
Zhang, Zhongwei. 2014. "IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems." Grana, Manuel, Toro, Carlos, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 2nd KES International Conference on Innovation in Medicine and Healthcare (InMed 2014): Smart Medical and Healthcare Systems. San Sebastian, Spain 09 - 11 Jul 2014 Amsterdam, Netherlands. https://doi.org/10.3233/978-1-61499-474-9-125Paper
The impact of learning technologies on workload
Ryan, Yoni, Hinton, Leone and Lamont Mills, Andrea. 2011. "The impact of learning technologies on workload." Williams, Gary, Statham, Peta, Brown, Noel and Cleland, B. (ed.) 28th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2011). Hobart, Australia 04 - 07 Dec 2011 Australia.Other