Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Nirnimesh Ghose"'
Publikováno v:
IEEE Transactions on Mobile Computing. 21:612-628
Many IoT devices lack the necessary interfaces (keyboards, screens) for entering passwords or changing default ones. For these devices, bootstrapping trust can be challenging. We address the problem of device pairing in the absence of any shared secr
Publikováno v:
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC).
Publikováno v:
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN).
Publikováno v:
2022 IEEE Conference on Communications and Network Security (CNS).
Publikováno v:
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
Publikováno v:
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Cooperative vehicle platooning significantly improves highway safety, fuel efficiency, and traffic flow. In this model, a set of vehicles move in line formation and coordinate acceleration, braking, and steering using a combination of physical sensin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef94375f44fdd244061e24e5cc3da709
http://arxiv.org/abs/2107.09863
http://arxiv.org/abs/2107.09863
Publikováno v:
WISEC
Minute hardware imperfections in the radio-frequency circuitry of a wireless device can be leveraged as a unique fingerprint. Radio fingerprinting is a way of distinguishing a device from others of the same type at the physical layer by utilizing the
Publikováno v:
IEEE Transactions on Mobile Computing. 17:688-702
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by sending messages to a fusion center or via direct messag
Publikováno v:
SpringSim
The limited information on the cyberattacks available in the unclassified regime, hardens standardizing the analysis. We address the problem of modeling and analyzing cyberattacks using a multimodal graph approach. We formulate the stages, actors, an