بحث بسيط
السجلات المعروضة 1 -- 10 من 75
An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Underwater acoustic sensor networks (UASNs) have been widely used in many applications where a variable number of sensor nodes collaborate with each other to perform monitoring tasks. A trust model plays an important role ...
A Fatigue Measuring Protocol for Wireless Body Area Sensor Networks
(
Springer New York LLC
, 2015 , Article)
As players and soldiers preform strenuous exercises and do difficult and tiring duties, they are usually the common victims of muscular fatigue. Keeping this in mind, we propose FAtigue MEasurement (FAME) protocol for ...
G-RAT | A novel graphical randomized authentication technique for consumer smart devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
How to govern the non-cooperative amateur drones?
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, amateur UAVs have become more and more popular. This is due to the decreasing cost and growing range of applications such as weather monitoring, cargo transport and recreational purposes. However, ...
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this paper, we propose a joint channel allocation and power control algorithm by using cognitive radio non-orthogonal multiple access (CR-NOMA) for femtocell users (FUs). The aim is to maximize the sum rate of the FUs ...
A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Underwater acoustic sensor networks (UASNs) have been widely applied in underwater scenarios where numerous anchoring or floating sensor nodes collaborate in performing some specific assignments, such as information ...
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ...
Long-Term Power Procurement Scheduling Method for Smart-Grid Powered Communication Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the emergence of smart grids, adopting dynamic energy pricing models has become both possible and desirable. With such a pricing dynamicity, great savings in energy costs can be achieved in telecommunication systems ...
Secure UAV communication networks over 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless communications can leverage UAVs to provide ubiquitous connectivity to different device types. Recently, integrating UAVs into a macro cell network is drawing unprecedented interest for supplementing terrestrial ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...