N Islam, MF Zia, D Syed - … and Considerations on the Evolution of …, 2023 - igi-global.com
Cognitive radio ad hoc network (CRAHN) is an emerging discipline of network computing. It combines the advantages of cognitive radio networks and mobile ad hoc networks. This …
Electronic health record (EHR) security is a multidomain job that includes authentication, privacy protection, document storage security, etc. Trusted access control requires …
VK Prasad, D Dansana, BK Mishra… - ECS Transactions, 2022 - iopscience.iop.org
Cloud computing encompasses the products supplied as services over the Internet and the computer applications that power the data centers that deliver such services. Software as a …
The primary user emulation attack (PUEA) is one of the most common attacks affecting the physical layer of the cognitive radio network (CRN). In this attack, a malicious user or a …
EA Mityukov, AV Zatonsky, PV Plekhov, A Fajar… - researchgate.net
Cloud computing encompasses the products supplied as services over the Internet and the computer applications that power the data centers that deliver such services. Software as a …
The primary user emulation attack (PUEA) is one of the most common attacks affecting the physical layer of the cognitive radio network (CRN). In this attack, a malicious user or a …