Technoeconomic assessment of an FTTH network investment in the Greek telecommunications market [0.03%]
希腊电信市场FTTH网络投资的技术经济评估
Aggelos Skoufis,Georgios Chatzithanasis,Georgia Dede et al.
Aggelos Skoufis et al.
Recent years have seen an increasing need for higher broadband connections, fueled by novel applications including fifth generation wireless networks (5G). The European Commission is working on achieving specific milestones regarding the de...
Private 5G networks: a survey on enabling technologies, deployment models, use cases and research directions [0.03%]
私有5G网络研究:使能技术、部署模式、应用场景和研究方向综述
Sivaraman Eswaran,Prasad Honnavalli
Sivaraman Eswaran
Today's modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology c...
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions [0.03%]
区块链物联网应用访问控制技术研究综述与未来方向展望
Palak Bagga,Ashok Kumar Das,Vinay Chamola et al.
Palak Bagga et al.
With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of...
Muhammad Khurram Khan
Muhammad Khurram Khan
Application of active queue management for real-time adaptive video streaming [0.03%]
主动队列管理在实时自适应视频流传输中的应用
Wladimir Gonçalves de Morais,Carlos Eduardo Maffini Santos,Carlos Marcelo Pedroso
Wladimir Gonçalves de Morais
Video streaming currently dominates global Internet traffic. Live streaming broadcasts events in real-time, with very different characteristics compared to video-on-demand (VoD), being more sensitive to variations in delay, jitter, and pack...
Muhammad Khurram Khan
Muhammad Khurram Khan
A comprehensive survey of AI-enabled phishing attacks detection techniques [0.03%]
基于人工智能的网络钓鱼攻击检测技术综述
Abdul Basit,Maham Zafar,Xuan Liu et al.
Abdul Basit et al.
In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client's sensitive data (i.e., use...
Harsha Kumara Kalutarage,Hoang Nga Nguyen,Siraj Ahmed Shaikh
Harsha Kumara Kalutarage
App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rathe...
An analytic model for Throughput Optimal Distributed Coordination Function (TO-DCF) [0.03%]
一种吞吐量最优的分布式协调函数(TO-DCF)分析模型
Emma Fitzgerald,Ulf Körner,Bjorn Landfeldt
Emma Fitzgerald
TO-DCF, a new backoff scheme for 802.11, has the potential to significantly increase throughput in dense wireless LANs while also opportunistically favouring nodes with heavier traffic loads and/or better channel conditions. In this paper w...
Continuous K-Nearest Neighbor Processing Based on Speed and Direction of Moving Objects in a Road Network [0.03%]
基于道路网络中移动对象速度和方向的连续K近邻处理
Guohui Li,Ping Fan,Ling Yuan
Guohui Li
Recent research has focused on Continuous K-Nearest Neighbor (CKNN) query over moving objects in road networks. A CKNN query is to find among all moving objects the K-Nearest Neighbors (KNNs) of a moving query point within a given time inte...