Annales des Telecommunications/Annals of Telecommunications

短名Ann. Telecommun.
Journal Impact1.95
国际分区TELECOMMUNICATIONS(Q3)
期刊索引SCI Q3中科院 4 区
ISSN0003-4347, 1958-9395
h-index45
国内分区计算机科学(4区)计算机科学电信学(4区)

ANNALS OF TELECOMMUNICATIONS 是一份国际期刊,出版电信领域的原始同行评审论文。它涵盖了现代电信的所有重要分支,从数字通信到通信网络和互联网,再到软件、协议和服务、用途和经济学。如此广泛的主题说明了计算机、通信、内容管理中的基础技术通过电信迅速融合,从而形成了信息和知识社会。因此,该期刊为交流欧洲和国际科学界学术界和工业界取得的研究成果和技术成果提供了一个媒介。

期刊主页投稿网址
涉及主题哲学计算机科学物理艺术人文学科工程类数学电信
出版信息出版商: Springer Paris出版周期: Bimonthly期刊类型: journal
基本数据创刊年份: 1946原创研究文献占比97.44%自引率:5.60%Gold OA占比: 12.73%
平均审稿周期 网友分享经验:平均3.0个月
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

On the (in)efficiency of fuzzing network protocols

2024-8-13

Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts

2024-8-9

Joint MEC selection and wireless resource allocation in 5G RAN

2024-7-23

Investigation of LDPC codes with interleaving for 5G wireless networks

2024-7-23

Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism

2024-7-23

Deep learning based channel estimation in PLC systems

2024-7-20

Throughput and latency targeted RL spectrum allocation in heterogeneous OTN

2024-7-17

Discreet: distributed delivery service with context-aware cooperation

2024-7-11

A revocable attribute-based access control with non-monotonic access structure

2024-7-10

CSNet 2022 special issue—decentralized and data-driven security in networking

2024-7-1

A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks

2024-6-26

Inferring the confidence level of BGP-based distributed intrusion detection systems alarms

2024-6-18

Impact of phase modulator on the performance of Costas loop

2024-6-17

A review on lexical based malicious domain name detection methods

2024-6-13

A distributed platform for intrusion detection system using data stream mining in a big data environment

2024-6-8

Reliable feature selection for adversarially robust cyber-attack detection

2024-6-7

A dynamic AI-based algorithm selection for Virtual Network Embedding

2024-6-4

Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network

2024-5-29

RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models

2024-5-22

Towards efficient conflict mitigation in the converged 6G Open RAN control plane

2024-5-16

Implementing the principle of least administrative privilege on operating systems: challenges and perspectives

2024-5-16

Fixed-text keystroke dynamics authentication data set—collection and analysis

2024-5-15

Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts

2024-5-10

Digital credentials management system using rejectable soulbound tokens

2024-4-23

FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks

2024-4-18

Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing

2024-4-18

A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks

2024-4-18

Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface

2024-4-18

Organic 6G networks: ultra-flexibility through extensive stateless functional split

2024-4-12

Performance evaluation of DFT/DCT/DST-based SC-FDMA systems in the presence of CFOs for wireless images transmission

2024-4-11

Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting

2024-4-5

A survey of public datasets for O-RAN: fostering the development of machine learning models

2024-4-5

The use of statistical features for low-rate denial-of-service attack detection

2024-4-5

E-Watcher: insider threat monitoring and detection for enhanced security

2024-4-4

NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype

2024-4-4

Large language models and unsupervised feature learning: implications for log analysis

2024-4-4

ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum

2024-4-1

Generating practical adversarial examples against learning-based network intrusion detection systems

2024-3-27

AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels

2024-3-22

Mirage: cyber deception against autonomous cyber attacks in emulation and simulation

2024-3-13

A deeper look at Ariadne: a privacy-preserving network layer protocol

2024-3-13

Efficient representation of disoccluded regions in 3D video coding

2024-3-12

Evaluating pending interest table performance under the collusive interest flooding attack in named data networks

2024-2-29

Orthogonal beamforming technique for massive MIMO systems

2024-2-21

Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators

2024-2-21

Troubleshooting distributed network emulation

2024-2-19

Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications

2024-2-16

Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network

2024-2-13

Towards feature engineering for intrusion detection in IEC–61850 communication networks

2024-2-3

Zt &t: secure service session management using blockchain-based tokens in zero trust networks.

2024-2-3

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司