Results 21 to 30 of about 4,484,297 (341)
Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme [PDF]
Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station(BS) in a hierarchical
Anubrata Chanda+2 more
doaj +1 more source
Credibility in Online Social Networks: A Survey
The importance of information credibility in society cannot be underestimated given that it is at the heart of all decision-making. Generally, more information is better; however, knowing the value of this information is essential for the decision-making
Majed Alrubaian+5 more
doaj +1 more source
RLAuth: A Risk-Based Authentication System Using Reinforcement Learning
Conventional authentication systems, that are used to protect most modern mobile applications, are faced with usability and security problems related to their static and one-shot nature.
Claudy Picard, Samuel Pierre
doaj +1 more source
Unlicensed cellular networks are being deployed worldwide by cellular operators to meet the rising data demands. However, the unlicensed band has existing incumbents such as Wi-Fi and radar systems.
Srikant Manas Kala+4 more
doaj +1 more source
Emerging 5G cellular networks are expected to face a dramatic increase in the volume of mobile traffic and IoT user requests due to the massive growth in mobile devices and the emergence of new compute-intensive applications.
L. A. Haibeh, M. Yagoub, A. Jarray
semanticscholar +1 more source
Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj +1 more source
Cloud and mobile edge computing (MEC) provides a wide range of computing services for mobile applications. In particular, mobile edge computing enables a computing and storage infrastructure provisioned closely to the end-users at the edge of a cellular ...
Mohammed Maray, Junaid Shuja
semanticscholar +1 more source
Sybil Defense Techniques in Online Social Networks: A Survey
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi+5 more
doaj +1 more source
Proceedings Ninth International Workshop on Foundations of Mobile Computing [PDF]
Mobile communication has become a vigorous field of research in computer science, due to the wide spreading of mobile technologies, applications and services. The intertwining of communication, computation and mobility constantly poses new challenges to algorithmic design in this area. The Foundations of Mobile Computing (FOMC) workshop is dedicated to
arxiv +1 more source
Smooth Complete Coverage Trajectory Planning Algorithm for a Nonholonomic Robot
The complete coverage path planning is a process of finding a path which ensures that a mobile robot completely covers the entire environment while following the planned path.
Ana Šelek+3 more
doaj +1 more source