R Verma, S Chandra - Int. J. Comput. Sci. Eng, 2019 - researchgate.net
Recently, the idea of Internet of Things is seeking much attention because of its vast potential in the area of wireless transmission. IoT interlinks plentiful of heterogeneous …
M Alshehri, B Panda - 2019 3rd Cyber Security in Networking …, 2019 - ieeexplore.ieee.org
People have used cloud computing approach to store their data remotely. As auspicious as this approach is, it brings forth many challenges: from data security to time latency issues …
S Kitisriworapan, A Jansang… - 2019 16th International …, 2019 - ieeexplore.ieee.org
The unauthorized access is an important security threat in wireless networks. However, a user that might be deceived for connecting to a rouge access point is also quite dangerous …
AAN Patwary, N Hossain, MA Sami - Am. J. Eng. Res, 2019 - researchgate.net
Recently, the concept of fog computing has attracting much attention due to the huge potential. Fog uses the Internet as a key infrastructure to interconnect numerous …
Today's smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc communication mechanism for mobile devices) that allows users to establish a …
Wireless internet access has become common throughout the world. IEEE 802.11 Wireless fidelity (Wi-Fi) is now a common internet access standard almost becoming a requirement in …