Internet of things: Survey on security
D Mendez Mena, I Papapanagiotou… - … Security Journal: A …, 2018 - Taylor & Francis
ABSTRACT The Internet of things (IoT) is intended for ubiquitous connectivity among
different entities or “things”. While it provides effective and efficient solutions to many real …
different entities or “things”. While it provides effective and efficient solutions to many real …
Security advances and challenges in 4G wireless networks
This paper presents a study of security advances and challenges associated with emergent
4G wireless technologies. The paper makes a number of contributions to the field. First, it …
4G wireless technologies. The paper makes a number of contributions to the field. First, it …
Internet of things: Survey on security and privacy
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities
or" things". While its purpose is to provide effective and efficient solutions, security of the …
or" things". While its purpose is to provide effective and efficient solutions, security of the …
Recursive estimation of structure and motion using relative orientation constraints
A Azarbayejani, B Horowitz… - Proceedings of IEEE …, 1993 - ieeexplore.ieee.org
A recursive estimation technique for recovering the 3-D motion and pointwise structure of an
object is presented. It is based on the use of relative orientation constraints in a local …
object is presented. It is based on the use of relative orientation constraints in a local …
Linearly constrained bimatrix games in wireless communications
K Firouzbakht, G Noubir… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We develop a linearly constrained bimatrix game framework that can be used to model
many practical problems in many disciplines, including jamming in packetized wireless …
many practical problems in many disciplines, including jamming in packetized wireless …
[PDF][PDF] Novel approaches to enhance mobile WiMAX security
Abstract The IEEE 802.16 Working Group on Broadband Wireless Access Standards
released IEEE 802.16-2004 which is a standardized technology for supporting broadband …
released IEEE 802.16-2004 which is a standardized technology for supporting broadband …
Efficient exploration of on-chip bus architectures and memory allocation
Separation between computation and communication in system design allows the system
designer to explore the communication architecture independently of component selection …
designer to explore the communication architecture independently of component selection …
QoS-aware distributed security architecture for 4G multihop wireless networks
P Rengaraju, CH Lung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Vehicular communications have received a great deal of attention in recent years due to the
demand for multimedia applications during travel and for improvements in safety. Safety …
demand for multimedia applications during travel and for improvements in safety. Safety …
Mobile WiMAX network security threats and solutions: A survey
IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of
WiMAX such as high speed internet facility over a long distance, quality of service …
WiMAX such as high speed internet facility over a long distance, quality of service …
Evolution of cellular systems
S Shahabuddin, S Rahaman, F Rehman… - … Guide to 5G Security, 2018 - Wiley Online Library
This chapter covers the brief and comprehensive analysis of evolution of cellular systems
from 1st generation to 4th generation mobile cellular systems. It also covers the basic …
from 1st generation to 4th generation mobile cellular systems. It also covers the basic …