بحث بسيط
السجلات المعروضة 151 -- 160 من 205
An enhanced public key infrastructure to secure smart grid wireless communication networks
(2014 , Article)
It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
A measurement study on the topologies of BitTorrent networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ...
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Bringing Deep Learning at the Edge of Information-Centric Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Various Internet solutions take their power processing and analysis from cloud computing services. Internet of Things (IoT) applications started discovering the benefits of computing, processing, and analysis on the device ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Millimeter-wave multimedia communications: Challenges, methodology, and applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The worldwide opening of a massive amount of unlicensed millimeter-wave spectrum has triggered great interest in developing high-bit-rate multimedia services and applications. Specific challenges for mmWave communication ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
An Efficient Distributed Trust Model for Wireless Sensor Networks
(
IEEE Computer Society
, 2015 , Article)
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ...
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)
A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ...