Intelligent Security Management and Control in the IoT. Mohamed-Aymen Chalouf

Чтение книги онлайн.

Читать онлайн книгу Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf страница 22

Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf

Скачать книгу

[Accessed 14 October 2020].

      Jeon, W.S., Seo, S.B., Jeong, D.G. (2018). Effective frequency hopping pattern for ToA estimation in NB-IoT random access. IEEE Transactions on Vehicular Technology, 67(10), 10150–10154.

      Jiang, N., Deng, Y., Condoluci, M., Guo, W., Nallanathan, A., Dohler, M. (2018). RACH preamble repetition in NB-IoT network. IEEE Communications Letters, 22(6), 1244–1247.

      Jin, H., Toor, W.T., Jung, B.C., Seo, J.B. (2017). Recursive pseudo-Bayesian access class barring for M2M communications in LTE systems. IEEE Transactions on Vehicular Technology, 66(9), 8595–8599.

      Kafle, V.P., Fukushima, Y., Harai, H. (2016). Internet of Things standardization in ITU and prospective networking technologies. IEEE Communications Magazine, 54(9), 43–49.

      Lin, X., Adhikary, A., Wang, Y.-E. (2016). Random access preamble design and detection for 3GPP narrowband IoT systems. IEEE Wireless Communications Letters, 5(6), 640–643.

      Liu, J., Agiwal, M., Qu, M., Jin, H. (2020). Online control of preamble groups with priority in massive IoT networks. IEEE Journal on Selected Areas in Communications. doi:10.1109/JSAC.2020.3018964.

      Migabo, E.M., Djouani, K.D., Kurien, A.M. (2020). The narrowband Internet of Things (NB-IoT) resources management performance state of art, challenges, and opportunities. IEEE Access, 8, 97658–97675, doi: 10.1109/ACCESS.2020.2995938.

      Mwakwata, C.B., Malik, H., Mahtab Alam, M., Le Moullec, Y., Parand, S., Mumtaz, S. (2019). Narrowband Internet of Thing (NB-IoT): From Physical (PHY) and Media Access Control (MAC) layers perspectives. Sensors, 19(11), 2613.

      Narayanan, S., Tsolkas, D., Passas, N., Merakos, L. (2018). NB-IoT: A candidate technology for massive IoT in the 5G era. In IEEE 23rd International Workshop on Computer Aided Modeling Design of Communication Links and Network (CAMAD). IEEE, Barcelona.

      Park, A. and Lim, X. (2016). Adaptive access class barring method for machine generated communications. Mobile Information Systems, 1–6. doi:10.1155/2016/6923542.

      Ray, B. (2017). NB-IoT case studies. Link-labs [Online]. Available at: https://www.link-labs.com/blog/nb-iot-case-studies [Accessed 14 October 2020].

      Rolnick, D., Veit, A., Belongie, S.J., Shavit, N. (2017). Deep learning is robust to massive label noise [Online]. Available at: https://arxiv.org/abs/1705.10694 [Accessed 14 October 2020].

      Savaux, V., Le Guen, M., Kanj, M. (2020). A tutorial on NB-IoT physical layer design. IEEE Communications Surveys & Tutorials, 22(4).

      Sun, Y., Tong, F., Zhang, Z., He, S. (2017). Throughput modeling and analysis of random access in narrow-band Internet of Things. IEEE Internet of Things, 5(3), 1485–1493.

      Sutton, R.S. and Barto, A.G. (2019). Reinforcement Learning: An Introduction, 2nd edition. MIT Press, Cambridge.

      Thrun, S. and Schwartz, A. (1993). Issues in using function approximation for reinforcement learning. In Proceedings of the 1993 Connectionist Models Summer School, Mozer, M., Smolensky, P., Touretzky, D., Elman, J., Weigend, A. (eds). Lawrence Erlbaum, Hillsdale.

      Toor, W.T. and Jin, H. (2017). Comparative study of access class barring and extended access barring for machine type communications. In International Conference on Information and Communication Technology Convergence (ICTC). KICS, IEEE, Jeju Island, 12.

      Wang, Y.-P.-E., Lin, X., Adhikary, A., Grovlen, A., Sui, Y., Blankenship, Y., Bergman, J., Razaghi, H.S. (2017). A primer on 3GPP narrowband Internet of Things. IEEE Communications Magazine, 55(3), 117–123.

      Zhang, J., Xie, D., Wang, X. (2020). TARA: An efficient random access mechanism for NB-IoT by exploiting TA value difference in collided preambles. IEEE Transactions on Mobile Computing. doi: 10.1109/TMC.2020.3019224.

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7R4qUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAACUcAgAAAgAA HAJQAAxTYW1pIE1lbmFzY2UcAgUACExheW91dCAxADhCSU0EJQAAAAAAELX3qB9z4ksiHblsoQqR Gig4QklNBDoAAAAAAOUAAAAQAAAAAQAAAAAAC3ByaW50T3V0cHV0AAAABQAAAABQc3RTYm9vbAEA AAAASW50ZWVudW0AAAAASW50ZQAAAABDbHJtAAAAD3ByaW50U2l4dGVlbkJpdGJvb2wAAAAAC3By aW50ZXJOYW1lVEVYVAAAAAEAAAAAAA9wcmludFByb29mU2V0dXBPYmpjAAAADABQAHIAbwBvAGYA IABTAGUAdAB1AHAAAAAAAApwcm9vZlNldHVwAAAAAQAAAABCbHRuZW51bQAAAAxidWlsdGluUHJv b2YAAAAJcHJvb2ZDTVlLADhCSU0EOwAAAAACLQAAABAAAAABAAAAAAAScHJpbnRPdXRwdXRPcHRp b25zAAAAFwAAAABDcHRuYm9vbAAAAAAAQ2xicmJvb2wAAAAAAFJnc01ib29sAAAAAABDcm5DYm9v bAAAAAAAQ250Q2Jvb2wAAAAAAExibHNib29sAAAAAABOZ3R2Ym9vbAAAAAAARW1sRGJvb2wAAAAA AEludHJib29sAAAAAABCY2tnT2JqYwAAAAEAAAAAAABSR0JDAAAAAwAAAABSZCAgZG91YkBv4AAA AAAAAAAAAEdybiBkb3ViQG/gAAAAAAAAAAAAQmwgIGRvdWJAb+AAAAAAAAAAAABCcmRUVW50RiNS bHQAAAAAAAAAAAAAAABCbGQgVW50RiNSbHQAAAAAAAAAAAAAAABSc2x0VW50RiNQeGxAcsAAAAAA AAA

Скачать книгу