ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Computing
Pure sciences
Education
Research
Social Sciences
Architecture and Urbanism
Biology
Economy
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Ukraine
Brazil
Austria
Switzerland
Romania
Canada
Spain
South Africa
all records (71)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
29.637  Articles
1 of 2.965 pages  |  10  records  |  more records»
Wireless sensor networks have become an increasingly important area for research and application. Compared to traditional networks, its security faces many unfavorable factors such as severe resource constraints, inability to secure the wireless medium, p... see more

Cyberspace plays a prominent role in our social, economic and civic welfare and cyber security issues are of paramount importance today. Growing reliance of the intertwined military and civilian applications on wireless computer networks makes these netwo... see more

Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Rou... see more

Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel intelligent approach that takes ad... see more

Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited res... see more

Ransomware is a dangerous malware that blocks access to data through encryption, and it exploits device vulnerabilities to perform chain attacks from one system to another. This study results in modeling the threat of ransomware attacks using Bayesian Net... see more

Cognitive Radio Networks (CRNs) have been conceived to improve the efficiency of accessing the spectrum. However, these networks are prone to various kinds of attacks and failures that can compromise the security and performance of their users. One of the... see more

We propose a novel method to detect and locate a Man-in-the-Middle attack in a fixed wireless network by analyzing round-trip time and measured received signal strength from fixed access points. The proposed method was implemented as a client-side applica... see more

1 of 2.965 pages  |  10  records  |  more records»