Control frameworks in network emulation testbeds: A survey
The network emulation testbed is a promising research area because it provides a platform
to fulfill testing requirements, creating emulated environments for conducting experiments …
to fulfill testing requirements, creating emulated environments for conducting experiments …
Software Testing applied to the Development of IoT Systems: preliminary results
Software testing is a fundamental activity of the broader software engineering process.
Internet of Things (IoT) testing activities present unique characteristics that make their …
Internet of Things (IoT) testing activities present unique characteristics that make their …
Adaptive entropy theory polymerization method for path optimization in edge computing educational systems
G Luo, Z Chen - Journal of Intelligent & Fuzzy Systems, 2021 - content.iospress.com
In this paper, through the edge computing application path, the educational evaluation
system was optimized using the adaptive entropy theory polymerization method which …
system was optimized using the adaptive entropy theory polymerization method which …
Wi-trust: Computational trust and reputation management for stronger hotspot 2.0 security
JM Seigneur - Journal of ICT Standardization, 2016 - ieeexplore.ieee.org
In its list of top ten smartphone risks, the European Union Agency for Network and
Information Security ranks network spoofing attacks as number 6. In this paper, we present …
Information Security ranks network spoofing attacks as number 6. In this paper, we present …
Special issue on future Internet Testbeds-Part I
Special issue on Future Internet Testbeds - Part I | Computer Networks: The International Journal
of Computer and Telecommunications Networking skip to main content ACM Digital Library …
of Computer and Telecommunications Networking skip to main content ACM Digital Library …
[HTML][HTML] 2 Computational Trust and Reputation Management to Mitigate Remaining Hotspots Security Holes
JM Seigneur - journals.riverpublishers.com
In this section, we first explain how computational trust based on the human notion of trust is
different from the traditional concept of trust in computer security and what is reputation …
different from the traditional concept of trust in computer security and what is reputation …
Wi-trust: Improving Wi-Fi hotspots trustworthiness with computational trust management
JM Seigneur - 2015 ITU kaleidoscope: Trust in the information …, 2015 - ieeexplore.ieee.org
In its list of top ten smartphone risks, the European Union Agency for Network and
Information Security ranks Network Spoofing Attacks as number 6. In this paper, we present …
Information Security ranks Network Spoofing Attacks as number 6. In this paper, we present …
Wireless Outdoor Network Planning for a Smart City Pilot
This paper detail the process of radio frequency network planning and design for PASMO
pilot project, an open living lab for cooperative ITS and smart cities, starting from analyzing …
pilot project, an open living lab for cooperative ITS and smart cities, starting from analyzing …
A generic approach to network experiment automation
A Quereilhac - 2015 - theses.hal.science
This thesis proposes a generic approach to automate network experiments for scenarios
involving any networking technology on any type of network evaluation platform. The …
involving any networking technology on any type of network evaluation platform. The …