Master in Computer Networks and IoT Systems – Cnam, Paris, France
Master in Computer Networks and IoT Systems – Cnam, Paris, France
Menu
Home
Master program
Master Internships
Scholarship Opportunities
FAQ
Sponsors
Planning & Logistics
M1 Planning
M2 Planning
Teachers
Admission
Application form
Tuition Fees
Double Degrees
Application form
Academic year 2024/2025
Teachers' publications
ABD-HFL: Byzantine-resistant Decentralized Hierarchical Federated Learning
Deep Reinforcement Learning for Joint Energy Saving and Traffic Handling in xG RAN
Comment Saboter l'Apprentissage Collectif par Commérage
GeoGiant: Vers une géolocalisation d'adresses IP à l'échelle grâce aux géants d'Internet
Improving NDN Resilience: A Novel Mitigation Mechanism Against Cache Pollution Attack
Elevator: Self-* and Persistent Hub Sampling Service in Unstructured Peer-to-Peer Networks
Flexible Association and Placement for Open-RAN
Network Slice Robustness with Function Sets
Distributed computation of temporal twins in periodic undirected time-varying graphs
Joint RSS and Ranging Fingerprint for LoRa Indoor Localization
Generative Adversarial Networks based Data Recovery for Indoor Localization
Data Poisoning Attacks in Gossip Learning
Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions
Security Challenges and Countermeasures in Blockchain’s Peer-to-Peer Architecture
Privacy Preserving Federated Learning: A Novel Approach for Combining Differential Privacy and Homomorphic Encryption
A Bitcoin-Based Digital Identity Model for the Internet of Things
SurvCaus : Representation Balancing for Survival Causal Inference
Data Poisoning Attacks in Gossip Learning
The wide-field, multiplexed, spectroscopic facility WEAVE: Survey design, overview, and simulated implementation
Liability and Trust Analysis Framework for Multi-Actor Dynamic Microservices
The PLATO Mission
Information Security Theory and Practice
iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT
A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols
Mobile, Secure, and Programmable Networking
A Novel Image Encryption Technique Using Modified Grain-128
Q-ICAN: A Q-learning based Cache Pollution Attack Mitigation Approach for Named Data Networking
SMEs, R &D financing, and credit shocks
Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction Approach
Enhancing Precision and Robustness in Indoor Localization Using Temporal and Spatial Features for BLE Fingerprinting
Informal caregivers of elderly patients in France: their behavior as trusted persons and their knowledge of this concept
Minimizing energy consumption by joint radio and computing resource allocation in Cloud-RAN
Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm
Formal Validation of ADR Protocol in LoraWan Network Using Event-b
Tools for Ground-Truth-Free Passive Client Density Mapping in MAC-Randomized Outdoor WiFi Networks
Marche sans escale dans un graphe temporel
Vers des mesures haute fréquence d'internet plus éthiques
ELoRa: End-to-end Emulation of Massive IoT LoRaWAN Infrastructures
Game Theoretical Analysis of DAG-Ledgers Backbone