Special Issue "Advanced Methods for Decision Making and Planning in Telecommunication Systems"

A special issue of Energies (ISSN 1996-1073).

Deadline for manuscript submissions: closed (31 October 2019).

Special Issue Editors

Prof. Dr. Igor Kotenko
Website
Guest Editor
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS); Laboratory of Computer Security Problems; St. Petersburg National Research University of Information Technologies, Mechanics, and Optics (ITMO University); and the Bonch-Bruevich St. Petersburg State University of Telecommunications, Department of Secure Telecommunication Systems, St. Petersburg, Russia
Interests: cyber security; cyber physical systems; decision making and planning; artificial intelligence; big data; telecommunications
Prof. Dr. Igor Saenko
Website
Guest Editor
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences (SPIIRAS), Laboratory of Computer Security Problems, St. Petersburg, Russia
Interests: computer-based systems; information security; data processing and communications; modeling theory and mathematical statistics; information theory

Special Issue Information

Dear Colleagues,

Telecommunication systems (TCS) are playing a very important role in development of production and the economy. They are characterized by length, high-speed messaging, great branching, a high diversity of used elements, and the heterogeneity of processed information flows. As a result, the potential to implement management functions in TCS has attracted the attention of a large number of scientific researchers. Among these management functions, the functions of decision-making and planning are of the greatest complexity and higher scientific importance.

On the one hand, the increased requirements on throughput, mobility, resilience, security, and safety are imposed to management systems in modern TCS. On the other hand, the implementation of the decision-making and planning functions in modern TCS is carried out in the conditions of fuzzy and incomplete initial data, the existence of various external and internal influences, and the need to process big arrays of structured, semi-structured, and unstructured data in a limited time.

In this context, the proposed Special Issue will have to present unpublished theoretical and applied results related to the development of new approaches, models, methods, algorithms, software, and hardware for implementing the functions of decision-making and planning in modern TCS.

These results will concern a rather wide range of issues affecting the application of advanced and innovative methods of data processing, resilience, security, safety, and throughput. These results will address a fairly wide range of issues affecting the application of advanced and innovative methods for decision-making and planning in TCS.

Prof. Dr. Igor Kotenko
Prof. Dr. Igor Saenko
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Energies is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Methodology of decision-making and planning in TCS
  • Ensuring throughput
  • Ensuring mobility
  • Ensuring resilience, security, and safety
  • Formal models and techniques
  • Modeling and simulation
  • Optimization methods
  • Advanced analytics
  • Stochastic models
  • Artificial intelligence
  • Bid Data
  • Machine learning
  • Fuzzy data processing
  • Data storages
  • Data visualization
  • Bio-inspired approaches

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Method of Early Detection of Cyber-Attacks on Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
Energies 2019, 12(24), 4768; https://doi.org/10.3390/en12244768 - 13 Dec 2019
Abstract
The paper suggests a method of early detection of cyber-attacks by using DDoS attacks as an example) using the method of extreme filtering in a mode close real time. The process of decomposition of the total signal (additive superposition of attacking and legitimate [...] Read more.
The paper suggests a method of early detection of cyber-attacks by using DDoS attacks as an example) using the method of extreme filtering in a mode close real time. The process of decomposition of the total signal (additive superposition of attacking and legitimate effects) and its decomposition using the method of extreme filtering is simulated. A profile model of a stochastic network is proposed. This allows to specify the influence of the intruder on the network using probabilistic-time characteristics. Experimental evaluation of metrics characterizing the cyber-attack is given. It is demonstrated how obtained values of metrics confirm the process of attack preparation, for instance the large-scaled telecommunication network, which includes the proposed method for early detection of attacks, has a recovery time of no more than 9 s, and the parameters of quality of service remain in an acceptable range. Full article
Show Figures

Figure 1

Open AccessArticle
Reputation and Trust Approach for Security and Safety Assurance in Intersection Management System
Energies 2019, 12(23), 4527; https://doi.org/10.3390/en12234527 - 28 Nov 2019
Cited by 1
Abstract
Crossroads are the main traffic jam generators in densely populated cities. Unmanned vehicles and intelligent transportation systems can significantly reduce congestion and improve road safety by eliminating the main cause of traffic accidents—the human factor. However, full confidence in their safety is necessary. [...] Read more.
Crossroads are the main traffic jam generators in densely populated cities. Unmanned vehicles and intelligent transportation systems can significantly reduce congestion and improve road safety by eliminating the main cause of traffic accidents—the human factor. However, full confidence in their safety is necessary. This paper addresses the contextual data integrity problem, when an unmanned autonomous vehicle transmits incorrect data due to technical problems, or malicious attacks. We propose an approach based on trust and reputation that allows detecting vehicles transmitting bogus data. To verify the feasibility of the approach on practice, we conducted both software and physical simulations using the model of intersection and unmanned autonomous vehicle models. The simulation results show that the approach applied allows detecting vehicles with bogus data and excluding them from the group, thus increasing the safety of the intersection traversal by other vehicles. Full article
Show Figures

Graphical abstract

Back to TopTop