A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet imposes to deepen the investigation of security aspects. In parallel, their power constrained …
Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness when attacking a mobile device, an effective approach is the use of …
Abstract Wireless Sensor Networks (WSN) pose several problems in terms of scalability and energy consumption. Many of them have been treated in the literature by means of …
M Wang, L Zhu, LT Yang, M Lin… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The promising Industrial Internet of Things (IIoT) consisting of heterogeneous resource- restricted IoT nodes recently has attracted great attention from both academia and industry …
Advances of information and communication technologies in medical areas have led to the emergence of wireless body area network (WBAN). The high accessibility of media in WBAN …
Network covert channels are hidden communication channels in computer networks. They influence several factors of the cybersecurity economy. For instance, by improving the …
W Lin, T Huang, X Li, F Shi, X Wang… - ACM Transactions on …, 2021 - dl.acm.org
In addition to the stationary mobile edge computing (MEC) servers, a few MEC surrogates that possess a certain mobility and computation capacity, eg, flying unmanned aerial …
WiFi communication should be possible only between devices inside the same network. However, we find that all existing WiFi devices send back acknowledgments (ACKs) to even …
M Zhou, L Han, H Lu, C Fu - Mobile networks and applications, 2021 - Springer
With the acceleration of the Internet of things (IoT) construction, the security and energy consumption of IoT will become an import factor restricting the overall development of the …