Zobrazeno 1 - 10
of 16
pro vyhledávání: '"E. Paul Ratazzi"'
Publikováno v:
2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC).
Publikováno v:
ICC 2022 - IEEE International Conference on Communications.
Publikováno v:
GLOBECOM
Nowadays, The Internet of Things (IoT) has been widely used in various fields due to its smart sensing and communication capabilities. IoT devices serve as bridges for the cyber system to interact with the physical environment by providing various us
Publikováno v:
ICC
Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in communication technologies. The capabilities of IoT also enable its important role in homeland security and tactical missions, including Reconnaissance, Intel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::50646f5254fe6347350608071ed3b106
http://arxiv.org/abs/1902.03282
http://arxiv.org/abs/1902.03282
Publikováno v:
ICC
Along with the development of wireless communication technology, a mass of mobile devices are gaining stronger sensing capability, which brings a novel paradigm to light: participatory sensing networks (PSNs). PSNs can greatly reduce the cost of wire
Publikováno v:
ICNC
Software-defined radio (SDR) enables the flexible and efficient use of spectrum, which is a key technology to maintain high quality wireless services in the future. However, the flexibility of SDR brings serious security concerns of malicious attacks
Publikováno v:
MILCOM
The large number of malicious files that are produced daily outpaces the current capacity of malware analysis and detection. For example, Intel Security Labs reported that during the second quarter of 2016, their system found more than 40M of new mal
Publikováno v:
2014 IEEE Military Communications Conference.
Every day thousands of malware are released online. The vast majority of these malware employ some kind of obfuscation ranging from simple XOR encryption, to more sophisticated anti-analysis, packing and encryption techniques. Dynamic analysis method
Publikováno v:
Defense Transformation and Net-Centric Systems 2012.
Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both t
Publikováno v:
AINA Workshops
Due to the rapid emergence of Information Technology, cloud computing provides assorted advantages to service providers, developers, organizations, and customers with respect to scalability, flexibility, cost-effectiveness, and availability. However,