Early Access PapersVolume 21 - Issue 2✔︎ Completed and published in ArchivesOpen Call ArticlesComparative Analysis of SMOTE and ROSE Oversampling Techniques for kNN-Based Autonomous Vehicle Behavior ModelingCeline Serbouh Touazi, Iness Ahriz, Ndeye Niang, Alain PipernoPages: 132-143| PDF (3.90 MiB) | 2025-04-24 |0 views| 0 CrossRef citations0Views0CrossRef citationsGenerating an Iris-based Seed for Key-pairs in a Blockchain PlatformMarco Fiore, Federico Carrozzino, Gianvito Coppola, Gianni Guariglia, Marina MongielloPages: 144-155| PDF (6.83 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsEnhancing Network Security: A Study on Classification Models for Intrusion Detection SystemsAbeer Abd Alhameed Mahmood, Azhar A. Hadi, Wasan Hashim Al-MasoodyPages: 156-165| PDF (1.31 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsExperimental Evaluation of Open-Source-based VoNR and OTT Voice Services in 5G SA Network DeploymentsElena-Ramona Modroiu, Joyce Mwangama, Marius Corici, Thomas MagedanzPages: 166-177| PDF (3.39 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsAI-Generated Questions in Context: A Contextualized Investigation Using Platform Data, Student Feedback, and Faculty ObservationsRachel Van Campenhout, Benny G. Johnson, Michelle Clark, Melissa Deininger, Shannon Harper, Kelly Odenweller, Erin WilgenbuschPages: 178-188| PDF (1.65 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsAn Approach Based on Sum Product Networks for Code Smells DetectionMostefai AbdelkaderPages: 189-200| PDF (2.84 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citationsComprehensive Modeling and Evaluation of Carrier Aggregation Effects on Network Performance Across Diverse ApplicationsZuhor Maher Ismail, Saad Ahmed AyoobPages: 201-209| PDF (1.28 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citationsEncryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor NetworkHaneen Mohammed Hussein, Ali Qasim Hanoon, Afrah Thamer AbdullahPages: 210-219| PDF (1.58 MiB) | 2025-05-21 |0 views| 0 CrossRef citations0Views0CrossRef citationsSparse-Recovery-Based Channel Estimation in Orthogonal Time-Frequency Space Modulation for High-Mobility Scenarios in 5G and BeyondSundaresan Sabapathy, Surendar Maruthu, Deepika SasiPages: 220-228| PDF (7.97 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citationsInvestigate the Use of Deep Learning in IoT Attack DetectionMohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar LaimechePages: 229-239| PDF (1.80 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citationsSpecial Issue on Smart and Sustainable EnvironmentsParticipatory Design of Visual Analytics Tools for Different Target GroupsMilena Vuckovic, Dawid Wolosiuk, Johanna SchmidtPages: 240-249| PDF (2.88 MiB) | 2025-05-19 |0 views| 0 CrossRef citations0Views0CrossRef citations
Comparative Analysis of SMOTE and ROSE Oversampling Techniques for kNN-Based Autonomous Vehicle Behavior ModelingCeline Serbouh Touazi, Iness Ahriz, Ndeye Niang, Alain PipernoPages: 132-143| PDF (3.90 MiB) | 2025-04-24 |0 views| 0 CrossRef citations0Views0CrossRef citations
Generating an Iris-based Seed for Key-pairs in a Blockchain PlatformMarco Fiore, Federico Carrozzino, Gianvito Coppola, Gianni Guariglia, Marina MongielloPages: 144-155| PDF (6.83 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
Enhancing Network Security: A Study on Classification Models for Intrusion Detection SystemsAbeer Abd Alhameed Mahmood, Azhar A. Hadi, Wasan Hashim Al-MasoodyPages: 156-165| PDF (1.31 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
Experimental Evaluation of Open-Source-based VoNR and OTT Voice Services in 5G SA Network DeploymentsElena-Ramona Modroiu, Joyce Mwangama, Marius Corici, Thomas MagedanzPages: 166-177| PDF (3.39 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
AI-Generated Questions in Context: A Contextualized Investigation Using Platform Data, Student Feedback, and Faculty ObservationsRachel Van Campenhout, Benny G. Johnson, Michelle Clark, Melissa Deininger, Shannon Harper, Kelly Odenweller, Erin WilgenbuschPages: 178-188| PDF (1.65 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
An Approach Based on Sum Product Networks for Code Smells DetectionMostefai AbdelkaderPages: 189-200| PDF (2.84 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citations
Comprehensive Modeling and Evaluation of Carrier Aggregation Effects on Network Performance Across Diverse ApplicationsZuhor Maher Ismail, Saad Ahmed AyoobPages: 201-209| PDF (1.28 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citations
Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor NetworkHaneen Mohammed Hussein, Ali Qasim Hanoon, Afrah Thamer AbdullahPages: 210-219| PDF (1.58 MiB) | 2025-05-21 |0 views| 0 CrossRef citations0Views0CrossRef citations
Sparse-Recovery-Based Channel Estimation in Orthogonal Time-Frequency Space Modulation for High-Mobility Scenarios in 5G and BeyondSundaresan Sabapathy, Surendar Maruthu, Deepika SasiPages: 220-228| PDF (7.97 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citations
Investigate the Use of Deep Learning in IoT Attack DetectionMohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar LaimechePages: 229-239| PDF (1.80 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citations
Participatory Design of Visual Analytics Tools for Different Target GroupsMilena Vuckovic, Dawid Wolosiuk, Johanna SchmidtPages: 240-249| PDF (2.88 MiB) | 2025-05-19 |0 views| 0 CrossRef citations0Views0CrossRef citations