|
|
|
Yan Wang, Fei Ji, Quansheng Guan, Hao Zhao, Kexing Yao and Weiqi Chen
Due to the space?time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers. These op...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|
|
|
|
Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial o...
ver más
|
|
|
|
|
|
|
Suleiman Abahussein, Dayong Ye, Congcong Zhu, Zishuo Cheng, Umer Siddique and Sheng Shen
Online food delivery services today are considered an essential service that gets significant attention worldwide. Many companies and individuals are involved in this field as it offers good income and numerous jobs to the community. In this research, we...
ver más
|
|
|
|
|
|
|
Khaled Almiani, Mutaz Abu Alrub, Young Choon Lee, Taha H. Rashidi and Amirmohammad Pasdar
As a critical factor in ensuring the growth of the electronic auction (e-auction) domain, the privacy and security of the participants (sellers and buyers) must always be guaranteed. Traditionally, auction data, including participant details, are stored ...
ver más
|
|
|
|
|
|
|
Kavitha Srinivasan, Sainath Prasanna, Rohit Midha, Shraddhaa Mohan
Pág. 1 - 20
Advances have been made in the field of Machine Learning showing that it is an effective tool that can be used for solving real world problems. This success is hugely attributed to the availability of accessible data which is not the case for many fields...
ver más
|
|
|
|
|
|
|
Lingtong Min, Jiawei Li, Yixin He and Weiguang Wang
This paper investigates the secure rate-splitting multiple access (RSMA) cooperation for the maritime cognitive unmanned aerial vehicle (UAV) network. Specifically, we first take into account the primary privacy information and the secondary maritime UAV...
ver más
|
|
|
|
|
|
|
Vasilios Patsias, Petros Amanatidis, Dimitris Karampatzakis, Thomas Lagkas, Kalliopi Michalakopoulou and Alexandros Nikitas
Task allocation in edge computing refers to the process of distributing tasks among the various nodes in an edge computing network. The main challenges in task allocation include determining the optimal location for each task based on the requirements su...
ver más
|
|
|
|
|
|
|
Nahla El-Haggar, Lobna Amouri, Albandari Alsumayt, Fatemah H. Alghamedy and Sumayh S. Aljameel
The progress made in Information and Communication Technologies (ICT) has played a crucial role in turning the Internet of Things (IoT) into a reality. IoT is an emerging technology that refers to networks of interconnected and Internet-enabled objects e...
ver más
|
|
|
|