Wi-Fi meets ML: A survey on improving IEEE 802.11 performance with machine learning

S Szott, K Kosek-Szott, P Gawłowicz… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Wireless local area networks (WLANs) empowered by IEEE 802.11 (Wi-Fi) hold a dominant
position in providing Internet access thanks to their freedom of deployment and configuration …

Real-time identification of rogue WiFi connections using environment-independent physical features

P Liu, P Yang, WZ Song, Y Yan… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
WiFi has become a pervasive communication medium in connecting various devices of
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …

A case study of WiFi sniffing performance evaluation

Y Li, J Barthelemy, S Sun, P Perez, B Moran - IEEE Access, 2020 - ieeexplore.ieee.org
Mobile devices regularly broadcast WiFi probe requests in order to discover available
proximal WiFi access points for connection. A probe request, sent automatically in the active …

Mobile crowd computing: potential, architecture, requirements, challenges, and applications

PKD Pramanik, S Pal, P Choudhury - The Journal of Supercomputing, 2024 - Springer
Owing to the enormous advancement in miniature hardware, modern smart mobile devices
(SMDs) have become computationally powerful. Mobile crowd computing (MCC) is the …

[PDF][PDF] Research Online

VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …

Wi-go: accurate and scalable vehicle positioning using wifi fine timing measurement

M Ibrahim, A Rostami, B Yu, H Liu, M Jawahar… - Proceedings of the 18th …, 2020 - dl.acm.org
Driver assistance and vehicular automation would greatly benefit from uninterrupted lane-
level vehicle positioning, especially in challenging environments like metropolitan cities. In …

Real-time identification of rogue WiFi connections in the wild

D Yan, Y Yan, P Yang, WZ Song… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
WiFi connections are vulnerable to simulated attacks from rogue access points (APs) or
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …

[BOOK][B] An introduction to computer networks

PL Dorlan - 2016 - biblioteca.unisced.edu.mz
6 Abstract Sliding Windows 141 6.1 Building Reliable Transport: Stop-and-
Wait.......................... 141 6.2 SlidingWindows......................................... 145 6.3 …

NEMa: A novel energy-efficient mobility management protocol for 5G/6G-enabled sustainable vehicular networks

N Aljeri, A Boukerche - Computer Networks, 2024 - Elsevier
As the advancement of 5G and the emergence of 6G technologies unfolds, it is anticipated to
support a diverse set of technologies, services, energy resources, and storage capabilities …

Server placement for edge computing: A robust submodular maximization approach

Y Qu, L Wang, H Dai, W Wang, C Dong… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this work, we study the problem of R obust S erver P lacement (RSP) for edge computing,
ie, in the presence of uncertain edge server failures, how to determine a server placement …