Annales des Telecommunications/Annals of Telecommunications
短名 | Ann. Telecommun. |
Journal Impact | 1.95 |
国际分区 | TELECOMMUNICATIONS(Q3) |
期刊索引 | SCI Q3中科院 4 区 |
ISSN | 0003-4347, 1958-9395 |
h-index | 45 |
国内分区 | 计算机科学(4区)计算机科学电信学(4区) |
ANNALS OF TELECOMMUNICATIONS 是一份国际期刊,出版电信领域的原始同行评审论文。它涵盖了现代电信的所有重要分支,从数字通信到通信网络和互联网,再到软件、协议和服务、用途和经济学。如此广泛的主题说明了计算机、通信、内容管理中的基础技术通过电信迅速融合,从而形成了信息和知识社会。因此,该期刊为交流欧洲和国际科学界学术界和工业界取得的研究成果和技术成果提供了一个媒介。
期刊主页投稿网址涉及主题 | 哲学计算机科学物理艺术人文学科工程类数学电信 |
出版信息 | 出版商: Springer Paris,出版周期: Bimonthly,期刊类型: journal |
基本数据 | 创刊年份: 1946,原创研究文献占比: 97.44%,自引率:5.60%, Gold OA占比: 12.73% |
平均审稿周期 | 网友分享经验:平均3.0个月 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
On the (in)efficiency of fuzzing network protocols
2024-8-13
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts
2024-8-9
Joint MEC selection and wireless resource allocation in 5G RAN
2024-7-23
Investigation of LDPC codes with interleaving for 5G wireless networks
2024-7-23
Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism
2024-7-23
Deep learning based channel estimation in PLC systems
2024-7-20
Throughput and latency targeted RL spectrum allocation in heterogeneous OTN
2024-7-17
Discreet: distributed delivery service with context-aware cooperation
2024-7-11
A revocable attribute-based access control with non-monotonic access structure
2024-7-10
CSNet 2022 special issue—decentralized and data-driven security in networking
2024-7-1
A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks
2024-6-26
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms
2024-6-18
Impact of phase modulator on the performance of Costas loop
2024-6-17
A review on lexical based malicious domain name detection methods
2024-6-13
A distributed platform for intrusion detection system using data stream mining in a big data environment
2024-6-8
Reliable feature selection for adversarially robust cyber-attack detection
2024-6-7
A dynamic AI-based algorithm selection for Virtual Network Embedding
2024-6-4
Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network
2024-5-29
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models
2024-5-22
Towards efficient conflict mitigation in the converged 6G Open RAN control plane
2024-5-16
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives
2024-5-16
Fixed-text keystroke dynamics authentication data set—collection and analysis
2024-5-15
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts
2024-5-10
Digital credentials management system using rejectable soulbound tokens
2024-4-23
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks
2024-4-18
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing
2024-4-18
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks
2024-4-18
Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface
2024-4-18
Organic 6G networks: ultra-flexibility through extensive stateless functional split
2024-4-12
Performance evaluation of DFT/DCT/DST-based SC-FDMA systems in the presence of CFOs for wireless images transmission
2024-4-11
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting
2024-4-5
A survey of public datasets for O-RAN: fostering the development of machine learning models
2024-4-5
The use of statistical features for low-rate denial-of-service attack detection
2024-4-5
E-Watcher: insider threat monitoring and detection for enhanced security
2024-4-4
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype
2024-4-4
Large language models and unsupervised feature learning: implications for log analysis
2024-4-4
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum
2024-4-1
Generating practical adversarial examples against learning-based network intrusion detection systems
2024-3-27
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
2024-3-22
Mirage: cyber deception against autonomous cyber attacks in emulation and simulation
2024-3-13
A deeper look at Ariadne: a privacy-preserving network layer protocol
2024-3-13
Efficient representation of disoccluded regions in 3D video coding
2024-3-12
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks
2024-2-29
Orthogonal beamforming technique for massive MIMO systems
2024-2-21
Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators
2024-2-21
Troubleshooting distributed network emulation
2024-2-19
Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications
2024-2-16
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network
2024-2-13
Towards feature engineering for intrusion detection in IEC–61850 communication networks
2024-2-3
Zt &t: secure service session management using blockchain-based tokens in zero trust networks.
2024-2-3
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远