Characterizing Encrypted Application Traffic through Cellular Radio Interface Protocol

MR Islam, RH Anwar, S Mastorakis… - arXiv preprint arXiv …, 2024 - arxiv.org
Modern applications are end-to-end encrypted to prevent data from being read or secretly
modified. 5G tech nology provides ubiquitous access to these applications without …

Signal definition and resource management techniques for upcoming communication and broadcasting systems

CA Nour - 2020 - imt-atlantique.hal.science
My research activities have addressed 3 main topics. The first targets devising algorithms for
coded modulations. It was the subject of 9 supervised PhDs and one post-doc. The work …