|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB...
ver más
|
|
|
|
|
|
|
René Lozi
Since its original publication in 1978, Lozi?s chaotic map has been thoroughly explored and continues to be. Hundreds of publications have analyzed its particular structure and applied its properties in many fields (e.g., improvement of physical devices,...
ver más
|
|
|
|
|
|
|
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and...
ver más
|
|
|
|
|
|
|
Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today?s i...
ver más
|
|
|
|
|
|
|
Weijie Zhang, Lanping Zhang, Xixi Zhang, Yu Wang, Pengfei Liu and Guan Gui
Network traffic classification (NTC) has attracted great attention in many applications such as secure communications, intrusion detection systems. The existing NTC methods based on supervised learning rely on sufficient labeled datasets in the training ...
ver más
|
|
|
|
|
|
|
Athanasios Koulianos and Antonios Litke
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surv...
ver más
|
|
|
|
|
|
|
Hyounhee Koo, Changho Ryoo and Wooseong Kim
The growing significance of ubiquitous 6G connectivity within the maritime sector is a consequence of its evolution into an era characterized by the adoption of autonomous ships. This evolution necessitates the development of adaptable communication capa...
ver más
|
|
|
|
|
|
|
Mohamed Torky, Tarek Gaber, Essam Goda, Vaclav Snasel and Aboul Ella Hassanien
Blockchain has found many applications, apart from Bitcoin, in different fields and it has the potential to be very useful in the satellite communications and space industries. Decentralized and secure protocols for processing and manipulating space tran...
ver más
|
|
|
|
|
|
|
Karam Eddine Bilami and Pascal LORENZ
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their...
ver más
|
|
|
|