A tutorial on privacy, rcm and its implications in wlan

D Ficara, RG Garroppo, J Henry - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
The proliferation of Wi-Fi devices has led to the rise of privacy concerns related to MAC
Address-based systems used for people tracking and localization across various …

Physical layer security for 6G: Toward achieving intelligent native security at layer-1

I Ara, B Kelley - IEEE Access, 2024 - ieeexplore.ieee.org
This paper lays the foundations for Physical Layer Security (PLS) as a native 6G
communication operation mode. 6G mobile network will enable intelligent applications …

[HTML][HTML] Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case

ÁJ Varela-Vaca, RM Gasca, D Iglesias… - Internet of Things, 2024 - Elsevier
Collaboration of business processes is essential for business-to-business (B2B) processes.
Collaboration is interesting and important in connecting the digital context with the physical …

A metamodeling approach for structuring and organizing cloud forensics domain

R Al-Mugerrn, A Al-Dhaqm… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Metamodeling is a technique that can be utilized in general to integrate and define models
from various cloud computing research areas. Metamodeling method is applicable in a wide …

Artificial intelligence cyber security strategy

X Feng, Y Feng, ES Dawam - … , Intl Conf on Cloud and Big Data …, 2020 - ieeexplore.ieee.org
Nowadays, STEM (science, technology, engineering and mathematics) have never been
treated so seriously before. Artificial Intelligence (AI) has played an important role currently …

Revenue forecasting in smart retail based on customer clustering analysis

V Golderzahi, HKK Pao - Internet of Things, 2024 - Elsevier
Understanding your customers is among one of the most important strategies to boost retail
profit. In this research, we propose a WiFi-based sensing method to analyze customer …

Cross hashing: Anonymizing encounters in decentralised contact tracing protocols

J Ali, V Dyo - 2021 International Conference on Information …, 2021 - ieeexplore.ieee.org
During the COVID-19 (SARS-CoV-2) epidemic, Contact Tracing emerged as an essential
tool for managing the epidemic. App-based solutions have emerged for Contact Tracing …

Cybersecurity using artificial intelligence

VA Oluwasusi, F Al-Turjman - Artificial Intelligence of Things (AIoT), 2025 - Elsevier
Abstract STEM (science, technology, engineering, and mathematics) are now taken
extremely seriously. Currently, artificial intelligence (AI) has a significant impact on STEM …

Is that traffic light tracking you? A case study on a municipal surveillance technology in Seattle

C Spiess - IEEE Transactions on Technology and Society, 2021 - ieeexplore.ieee.org
WiFi/Bluetooth MAC address collection can be used for the purpose of real-time travel
calculations for traffic engineering. Seattle is one such city to have deployed this technology …

MAC address anonymization for crowd counting

JF Determe, S Azzagnuni, F Horlin, P De Doncker - Algorithms, 2022 - mdpi.com
Research has shown that counting WiFi packets called probe requests (PRs) implicitly
provides a proxy for the number of people in an area. In this paper, we discuss a crowd …