Wi-Fi meets ML: A survey on improving IEEE 802.11 performance with machine learning
Wireless local area networks (WLANs) empowered by IEEE 802.11 (Wi-Fi) hold a dominant
position in providing Internet access thanks to their freedom of deployment and configuration …
position in providing Internet access thanks to their freedom of deployment and configuration …
Real-time identification of rogue WiFi connections using environment-independent physical features
WiFi has become a pervasive communication medium in connecting various devices of
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …
A case study of WiFi sniffing performance evaluation
Mobile devices regularly broadcast WiFi probe requests in order to discover available
proximal WiFi access points for connection. A probe request, sent automatically in the active …
proximal WiFi access points for connection. A probe request, sent automatically in the active …
Mobile crowd computing: potential, architecture, requirements, challenges, and applications
Owing to the enormous advancement in miniature hardware, modern smart mobile devices
(SMDs) have become computationally powerful. Mobile crowd computing (MCC) is the …
(SMDs) have become computationally powerful. Mobile crowd computing (MCC) is the …
[PDF][PDF] Research Online
VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …
technique has been used in some cryptographic applications as well as in cryptanalysis. For …
Wi-go: accurate and scalable vehicle positioning using wifi fine timing measurement
Driver assistance and vehicular automation would greatly benefit from uninterrupted lane-
level vehicle positioning, especially in challenging environments like metropolitan cities. In …
level vehicle positioning, especially in challenging environments like metropolitan cities. In …
Real-time identification of rogue WiFi connections in the wild
WiFi connections are vulnerable to simulated attacks from rogue access points (APs) or
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …
[BOOK][B] An introduction to computer networks
PL Dorlan - 2016 - biblioteca.unisced.edu.mz
6 Abstract Sliding Windows 141 6.1 Building Reliable Transport: Stop-and-
Wait.......................... 141 6.2 SlidingWindows......................................... 145 6.3 …
Wait.......................... 141 6.2 SlidingWindows......................................... 145 6.3 …
NEMa: A novel energy-efficient mobility management protocol for 5G/6G-enabled sustainable vehicular networks
As the advancement of 5G and the emergence of 6G technologies unfolds, it is anticipated to
support a diverse set of technologies, services, energy resources, and storage capabilities …
support a diverse set of technologies, services, energy resources, and storage capabilities …
Server placement for edge computing: A robust submodular maximization approach
In this work, we study the problem of R obust S erver P lacement (RSP) for edge computing,
ie, in the presence of uncertain edge server failures, how to determine a server placement …
ie, in the presence of uncertain edge server failures, how to determine a server placement …