Annals of Telecommunications

Papers
(The TQCC of Annals of Telecommunications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Analysis of the impact of correlated channels on the outage performance of a NOMA-based covert IOS network100
Troubleshooting distributed network emulation70
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments57
Generative AI in mobile networks: a survey51
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts45
Optimizing resource allocation in 5G-V2X communication: adaptive strategies for enhanced QoS in intelligent transportation systems27
On enhancing the transmission efficiency of modulated UWB signals under different emission standards26
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis26
A dynamic AI-based algorithm selection for Virtual Network Embedding18
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection17
Efficient bimodal emotion recognition system based on speech/text embeddings and ensemble learning fusion17
A revocable attribute-based access control with non-monotonic access structure16
An FCM-based hybrid method for DDoS attack detection in resource-constrained devices16
Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels13
Towards greener digital infrastructures for ICT and vertical markets13
A bi-objective optimization model for segment routing traffic engineering12
Distributed congestion control method for sending safety messages to vehicles at a set target distance11
Redefining data collection: energy-conscious path optimization for sustainable wireless sensor networks11
Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain10
Joint MEC selection and wireless resource allocation in 5G RAN10
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures9
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming9
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting9
Semi-blind AF transmission in secure NOMA systems9
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison9
Blind retrieval of signals via analytical and sequential determination of separation angles8
Automated slow-start detection for anomaly root cause analysis and BBR identification8
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks8
Wi-Fi faces the new wireless ecosystem: a critical review7
Accurate channel estimation using effective support vector initialization for off-grid partially coherent compressive phase retrieval in mmWave MIMO systems for beyond 5G applications7
Explainable artificial intelligence for cybersecurity: a literature survey7
Digital sufficiency: conceptual considerations for ICTs on a finite planet7
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models7
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives7
Improving channel equalization in cell-free MIMO networks using reconfigurable intelligent surfaces and in-context learning6
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population6
On the quality of WebRTC-based videoconferencing under adverse and mobility scenarios6
Investigation of LDPC codes with interleaving for 5G wireless networks6
Interactions between artificial intelligence and cybersecurity to protect future networks6
End-to-end trusted computing architecture for vehicular over-the-air updates6
SBRC 2024 special issue—cross-layer advances for resilient and intelligent communication systems6
A security and performance analysis of proof-based consensus protocols5
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms5
A deeper look at Ariadne: a privacy-preserving network layer protocol5
Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits5
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning5
A low-complexity iterative algorithm for multiuser millimeter-wave systems5
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum5
$${l_{1/2}}$$-FRSVT-based channel estimation algorithm for mmWave massive MIMO systems in quantum optimization5
Towards programmable IoT with ActiveNDN5
An approach for detecting multi-institution attacks5
Nested-C protocol: consensus protocol designed for NestedChain4
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype4
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network4
On the interoperability of verifiable credentials: simple universal verifier (SUV)4
PAPR reduction using constrained convex optimization for vector OFDM4
Carbon footprint of cloud, edge, and Internet of Edges4
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks4
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles4
Proximity service for vehicular passengers: modeling and analyzing D2D implementation for VoIP application using vehicular mobility models4
Lightweight certificateless authenticated key agreement protocol for IIoT4
0.92232489585876