Results 91 to 100 of about 4,454 (182)
Context storage using NoSQL [PDF]
With the ubiquity and pervasiveness of mobile computing, together with the increasing number of social networks, end-users have learned to live and share all kinds of information about themselves. As an example, Facebook reports that it has currently 500
Gomes, Diogo +2 more
core
Messaging Protocols for IoT Systems-A Pragmatic Comparison. [PDF]
Wytrębowicz J, Cabaj K, Krawiec J.
europepmc +1 more source
Smart Timetable Service Based on Crowdsensed Data [PDF]
The rapid technological development and the introduction of smart services make it possible for modern cities to offer an enhanced perception of city life for their inhabitants.
Farkas, Károly
core
Performance Analysis of Xmpp-Based vs Non-Xmpp Centralized Test Frameworks
This study presents a comparative performance analysis between XMPP-based and non-XMPP centralized test frameworks, focusing on their efficiency, scalability, and real-time communication capabilities in software testing environments. The eXtensible Messaging and Presence Protocol (XMPP) has emerged as a promising candidate for test automation due to ...
openaire +1 more source
MU-IoT: A New IoT Intrusion Dataset for Network and Application Layer Attacks Analysis
As the growth of IoT networks increases exponentially, the number of cyber attacks is also increasing on IoT networks day-by-day. This results in the vital requirement of cyber security mechanisms to secure IoT networks from cyberattacks. To build such a
Urikhimbam Boby Clinton, Nazrul Hoque
doaj +1 more source
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages. [PDF]
Ferraz Junior N +3 more
europepmc +1 more source
VoIP Client for Android Operating System [PDF]
Import 05/08/2014V současnosti dochází k vysoké penetraci platformy Android na trhu s chytrými telefony. Vzhledem k popularitě této platformy, její jednoduchosti, otevřenosti a rychlosti psaní kódu se Android stává ideální platformou pro vývoj klienta ...
Boháč, Daniel
core
Instant Messaging Network Analysis and Reconstruction (XMPP and MSN) [PDF]
Tato práce se věnuje zkoumání protokolů sloužích ke komunikaci mezi uživateli. Na základě analýzy ze zachycené komunikace jsou vybrány nejdůležitější elementy.
Zduba, Andreas
core
Το fuzzing είναι μια τεχνική για την εύρεση αδυναμιών στο λογισμικό στέλνοντας ¨παραμορφωμένα¨ δεδομένα ως είσοδο σε αυτό χρησιμοποιώντας έναν αυτοματοποιημένο τρόπο. Η εύρεση και η κατάργηση των αδυναμιών αυτών είναι σημαντική για τους προγραμματιστές καθώς η εκμετάλλευσή τους από κακόβουλους χρήστες μπορεί να προκαλέσει κενά ασφάλειας.
openaire +1 more source
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. [PDF]
Astorga J +3 more
europepmc +1 more source

