Results 181 to 190 of about 209,427 (235)
Some of the next articles are maybe not open access.

Reactive WiFi honeypot

2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2021
Attackers move throughout all environments. They conduct reconnaissance, scan networks, and seek misconfigured and vulnerable stations. This aspect is especially true for wireless networks. As the COVID-19 pandemic pushed numerous employees to conduct business-related tasks over the home network, the WiFi spectrum's protection has become more critical ...
Constantin Nila   +3 more
openaire   +1 more source

WiFi in Licensed Band (WiFi-Lic)

IEEE Communications Letters, 2016
This letter proposes a novel idea targeting WiFi users operating in the Long Term Evolution (LTE) licensed band, which we refer to as WiFi-Lic. It aims to address the coexistence challenge, by considering a scenario where WiFi users are able to exploit licensed LTE uplink band.
Shahid Mumtaz   +4 more
openaire   +2 more sources

Sharing your Urban Residential WiFi (UR-WiFi)

2006 IEEE 63rd Vehicular Technology Conference, 2006
Cheap and ubiquitous broadband wireless access is what most of the operators are aiming for. This paper analyses an innovative proposal to extend the traditional fixed coverage offered by residential broadband into an urban wireless coverage using urban residential wireless fidelity (UR-WiFi) project.
Kawade, Santosh   +3 more
openaire   +2 more sources

WiFi iLocate: WiFi based indoor localization for smartphone

2014 Wireless Telecommunications Symposium, 2014
In recent years, the increasing popularity of smartphones has promoted the development of location-aware applications. However, highly accurate indoor localization by smartphones remains an open problem. In this paper, we present WiFi iLocate — a system that can help track the location and movement of a smartphone user in indoor environments.
Xiang He 0006   +3 more
openaire   +1 more source

WiFi exposed

XRDS: Crossroads, The ACM Magazine for Students, 2004
Over the past few years, IEEE 802.11 wireless networks have become increasingly widely deployed. Wireless LANs can be found in coffee shops, airports, hospitals, and all major institutes. However, as for conventional wired networks, the spread of such networks may have been faster than the diffusion of security knowledge about them.
openaire   +1 more source

LegoFi the wifi building blocks!

Proceedings of the Workshop on Mobility in the Evolving Internet Architecture, 2016
The increasing demand for flexibility in WiFi network deployments along with more stringent requirements on performance and security stand in stark contrast to today's ossified and expensive WiFi architecture. In particular, today's WiFi networks consists of a large number of control and data plane network functions that are either bundled into a ...
Julius Schulz-Zander   +4 more
openaire   +2 more sources

3D-WiFi: 3D Localization With Commodity WiFi

IEEE Sensors Journal, 2019
Recently, 3D localization has attracted intense interests with its enabled applications, such as smart healthcare, smart home, and smart robots. Conventional 3D localization technologies require to utilize the special-dedicated infrastructures with a large-scale deployment, which results in high cost.
Lingyan Zhang, Hongyu Wang
openaire   +1 more source

Antennas for WiFi Connectivity

Proceedings of the IEEE, 2012
Wireless fidelity (WiFi) is a superset of the IEEE 802.11 standards for communications over several tens of meters. A WiFi device connects to the network via an access point. The design of commercial WiFi antennas is a compromise between cost, size, manufacturability, and performance.
Zhi Ning Chen   +3 more
openaire   +1 more source

WiFi attack vectors

Communications of the ACM, 2005
The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood.
Hal Berghel, Jacob Uecker
openaire   +1 more source

Expedited forwarding for WiFi

1st International Symposium onWireless Communication Systems, 2004., 2005
It is essential to reserve resources in order to provide an acceptable quality of service in networks with real-time communication requirements. However, such reserved resources, e.g. bandwidth, may be unused as a consequence of the variations in the actual resource demands.
Fanilo Harivelo   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy