Philip Branch

Orcid: 0000-0003-2188-1452

According to our database1, Philip Branch authored at least 71 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluation of Correlation between Temperature of IoT Microcontroller Devices and Blockchain Energy Consumption in Wireless Sensor Networks.
Sensors, July, 2023

Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks.
Future Internet, 2023

Evaluation of Blockchain Networks' Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks.
Future Internet, 2023

Blockchain health sensor network performance analysis on low powered microcontroller devices.
Proceedings of the IEEE International Systems Conference, 2023

A LoRa-Based Monitoring System for Agriculture.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Functional Programming for the Internet of Things: A LoRa-MQTT Gateway written in Elixir.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

A Novel Approach to Collision Avoidance in LoRa Networks.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

Fall Prediction Amongst the Elderly Using Data from an Ambient Assisted Living System.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
Measurements and Models of 915 MHz LoRa Radio Propagation in an Underground Gold Mine.
Sensors, 2022

LoRa Based Linear Network Applications, Design Considerations and Open Challenges: A Review.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Use of blockchain in health sensor networks to secure information integrity and accountability.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

2021
Fifth Generation Cellular Networks for Underground Block Cave Mining: A Position Paper.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

Propagation Measurements and Models of 915 MHz LoRa Radio in a Block Cave Gold Mine.
Proceedings of the International Conference on Information Networking, 2021

2020
An Internet-of-Things Solution to Assist Independent Living and Social Connectedness in Elderly.
ACM Trans. Soc. Comput., 2020

Adaptive Chunklets and AQM for Higher-Performance Content Streaming.
ACM Trans. Multim. Comput. Commun. Appl., 2020

A comprehensive survey of anomaly detection techniques for high dimensional big data.
J. Big Data, 2020

Identifying OSPF LSA falsification attacks through non-linear analysis.
Comput. Networks, 2020

Using Educational Data Mining to Test the Validity of Learning Style Theory.
Proceedings of the IEEE International Conference on Teaching, 2020

Detecting Bottleneck Use of PIE or FQ-CoDel Active Queue Management During DASH-like Content Streaming.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

A LoRa Based Wireless Relay Network for Actuator Data.
Proceedings of the 2020 International Conference on Information Networking, 2020

A LoRa Relay Based System for Detonating Explosives in Underground Mines.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

Estimation of Locally Relevant Subspace in High-dimensional Data.
Proceedings of the Australasian Computer Science Week, 2020

2019
A Survey of Delay-Based and Hybrid TCP Congestion Control Algorithms.
IEEE Commun. Surv. Tutorials, 2019

Detection of Insider Attacks Against Interior Routing Protocols.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Adaptive Clustering for Outlier Identification in High-Dimensional Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Elicitation of Candidate Subspaces in High-Dimensional Data.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

HalleyAssist: A Personalised Internet of Things Technology to Assist the Elderly in Daily Living.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Identifying OSPF Anomalies Using Recurrence Quantification Analysis.
CoRR, 2018

A Survey of Round Trip Time Prediction Systems.
IEEE Commun. Surv. Tutorials, 2018

2017
Using Active Queue Management to Assist IoT Application Flows in Home Broadband Networks.
IEEE Internet Things J., 2017

A Survey of Rate Adaptation Techniques for Dynamic Adaptive Streaming Over HTTP.
IEEE Commun. Surv. Tutorials, 2017

BGP Anomaly Detection Techniques: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Recurrence behaviour of BGP traffic.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

2016
The Impact of Active Queue Management on DASH-Based Content Delivery.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

2015
Detecting BGP instability using Recurrence Quantification Analysis (RQA).
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2014
UPTIME: an IMS-based mobility framework for next generation mobile networks.
Wirel. Networks, 2014

2013
The Ex-Gaussian distribution as a model of first-person shooter game traffic.
Multim. Syst., 2013

Exploring urban traffic flow dynamics.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Exploting Per User Information for Supercomputing Workload Prediction Requires Care.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
Timely and continuous machine-learning-based classification for interactive IP traffic.
IEEE/ACM Trans. Netw., 2012

Applying temporal feedback to rapid identification of BitTorrent traffic.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Rapid and generalized identification of packetized voice traffic flows.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

PRIME: Pre-registration for IMS Mobility Enhancement.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

2011
Capacity of Temperature-Based Covert Channels.
IEEE Commun. Lett., 2011

Inferring the time-zones of prefixes and autonomous systems by monitoring game server discovery traffic.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2011

Stealthier Inter-packet Timing Covert Channels.
Proceedings of the NETWORKING 2011, 2011

Dynamic codec with priority for voice over IP in WLAN.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

2010
Conservative Soft Handoff for Heterogeneous Wireless Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Minimising Disruption Caused by Online FPS Game Server Discovery in a Wireless Network.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Rapid Identification of BitTorrent traffic.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

2009
Rapid identification of Skype traffic flows.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

Reliable transmission over covert channels in first person shooter multiplayer games.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A generalised prediction model of first person shooter game traffic.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Comparative analysis of evolving software systems using the Gini coefficient.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
An ARMA(1, 1) prediction model of first person shooter game traffic.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Covert channels in multiplayer first person shooter online games.
Proceedings of the LCN 2008, 2008

A Markov Model of Server to Client IP Traffic in First Person Shooter Games.
Proceedings of IEEE International Conference on Communications, 2008

2007
A survey of covert channels and countermeasures in computer network protocols.
IEEE Commun. Surv. Tutorials, 2007

Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials].
IEEE Commun. Mag., 2007

ARMA(1, 1) modeling of Quake4 Server to client game traffic.
Proceedings of the 6th Workshop on Network and System Support for Games, 2007

An Empirical Evaluation of IP Time To Live Covert Channels.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Predictive Lawful Interception in Mobile IPv6 Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Time-series Modelling of Server to Client IP Packet Length in First Person Shooter Games.
Proceedings of the 15th IEEE International Conference on Networks, 2007

2006
Extrapolating server to client IP traffic from empirical measurements of first person shooter games.
Proceedings of the 5th Workshop on Network and System Support for Games, 2006

2005
Distribution of first person shooter online multiplayer games.
Int. J. Adv. Media Commun., 2005

Experimental validation of the random waypoint mobility model through a real world mobility trace for large geographical areas.
Proceedings of the 8th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2005

2004
A synthetic traffic model for Quake3.
Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, 2004

1999
Congestion Control for Interactive Video-on-Demand over ATM.
Real Time Imaging, 1999

A client caching scheme for interactive video-on-demand.
Proceedings of the IEEE International Conference on Networks 1999, 1999

Modeling interactive behaviour of a video based multimedia system.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
Bandwidth allocation for interactive video-on-demand.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998


  Loading...