|
|
|
Ayman Khalil and Besma Zeddini
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or...
ver más
|
|
|
|
|
|
|
Mattia G. Bergomi and Massimo Ferri
Among the various generalizations of persistent topology, that based on rank functions and leading to indexing-aware functions appears to be particularly suited to catching graph-theoretical properties without the need for a simplicial construction and a...
ver más
|
|
|
|
|
|
|
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu...
ver más
|
|
|
|
|
|
|
Yi Zhang, Lanxin Qiu, Yangzhou Xu, Xinjia Wang, Shengjie Wang, Agyemang Paul and Zhefu Wu
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing alg...
ver más
|
|
|
|
|
|
|
Weizhi Meng, Thanassis Giannetsos and Christian D. Jensen
The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to computation and comm...
ver más
|
|
|
|
|
|
|
Sangeetha Ramaswamy and Usha Devi Gandhi
A subset of Wireless Sensor Networks, Wireless Body Area Networks (WBAN) is an emerging technology. WBAN is a collection of tiny pieces of wireless body sensors with small computational capability, communicating short distances using ZigBee or Bluetooth,...
ver más
|
|
|
|
|
|
|
Juncal Alonso, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya and Iñaki Etxaniz
The current IT market is more and more dominated by the ?cloud continuum?. In the ?traditional? cloud, computing resources are typically homogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are wi...
ver más
|
|
|
|
|
|
|
Thebiga M,Suji R Pramila
Pág. pp. 42 - 65
This Mobile adhoc networks is a perpetual and autogenous organization without framework, and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework assistance, reliable data distribution is a demanding process in mobile adhoc netwo...
ver más
|
|
|
|
|
|
|
Tasos Bakogiannis, Ioannis Mytilinis, Katerina Doka and Georgios Goumas
Cloud computing offerings traditionally originate from a handful of large and well established providers, which monopolize the market, preventing small players and individuals from having a share. As a result, the few, blindly and perforce trusted entiti...
ver más
|
|
|
|
|
|
|
L Raghavendar Raju,C R K Reddy
Pág. pp. 40 - 51
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect...
ver más
|
|
|
|