Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Jamal, Tauseef"'
Interaction between devices, people, and the Internet has given birth to a new digital communication model, the Internet of Things (IoT). The seamless network of these smart devices is the core of this IoT model. However, on the other hand, integrati
Externí odkaz:
http://arxiv.org/abs/2202.04121
Now a days, UAVs such as drones are greatly used for various purposes like that of capturing and target detection from ariel imagery etc. Easy access of these small ariel vehicles to public can cause serious security threats. For instance, critical p
Externí odkaz:
http://arxiv.org/abs/2201.03243
Publikováno v:
In Engineering Applications of Artificial Intelligence July 2024 133 Part C
Malicious activities in cyberspace have gone further than simply hacking machines and spreading viruses. It has become a challenge for a nations survival and hence has evolved to cyber warfare. Malware is a key component of cyber-crime, and its analy
Externí odkaz:
http://arxiv.org/abs/2107.04008
Extensive research has been done to achieve better throughput and reliability in wireless networks, with focus on multiple-input multiple-output systems. Recently, cooperative networking techniques have been investigated to increase the performance o
Externí odkaz:
http://arxiv.org/abs/1911.07764
Wireless Body Area Network (WBAN) refers to short-range, wireless communications near or inside a human body. WBAN is emerging solution to cater the needs of local and remote health care related facility. Medical and non-medical applications have bee
Externí odkaz:
http://arxiv.org/abs/1911.04330
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Cooperative networking brings performance improvement to most of the issues in wireless networks, such as fading or delay due to slow stations. However, due to cooperation when data is relayed via other nodes, there network is more prone to attacks.
Externí odkaz:
http://arxiv.org/abs/1812.04935
Widely deployed wireless network devices use a shared medium to communicate among mobile nodes. WLAN uses virtual carrier sensing mechanism to solve issues like hidden node problem, while this mechanism is vulnerable to DOS attacks e.g., RTS attack.
Externí odkaz:
http://arxiv.org/abs/1811.11128
In Denial of Service (DoS) attack the network resources are either delayed or refused to be assigned to the requested user [1]. This may occurs due to verity of reasons, could be intentionally or unintentionally. The unintentional case is quite hard
Externí odkaz:
http://arxiv.org/abs/1810.11070