Search

Your search keyword '"C.2.0"' showing total 86 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0" Publisher arxiv Remove constraint Publisher: arxiv
86 results on '"C.2.0"'

Search Results

1. Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA

2. Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

3. The Effect of Length on Key Fingerprint Verification Security and Usability

4. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

5. Six Questions about 6G

6. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

7. Prepare your video for streaming with Segue

8. Four Algorithms on the Swapped Dragonfly

9. Exploring GPU Stream-Aware Message Passing using Triggered Operations

10. Techno-Economic Assessment Models for 5G

11. Global Systems Performance Analysis For Mobile Communications (GSM) using Cellular Network CODECS

12. PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams

13. RFID Exploitation and Countermeasures

14. An Event-based Parameter Switching Method for Controlling Cybersecurity Dynamics

15. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment

16. mmWall: A Reconfigurable Metamaterial Surface for mmWave Networks

17. A Distributed Trust Framework for Privacy-Preserving Machine Learning

18. Cloudless Friend-to-Friend Middleware for Smartphones

19. Toward A Network-Assisted Approach for Effective Ransomware Detection

20. Techno-Economic Assessment in Communications: Models for Access Network Technologies

21. Model for Techno-Economic Assessment of Access Technologies. Doctoral Dissertation for PhD, Telecommunications Engineering (EECS)

22. A Link Generator for Increasing the Utility of OpenAPI-to-GraphQL Translations

23. DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

24. Contention Window Optimization in IEEE 802.11ax Networks with Deep Reinforcement Learning

25. Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks

26. Proof of file access in a private P2P network using blockchain

27. Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

28. Security Rating Metrics for Distributed Wireless Systems

29. Sequence-to-Sequence Natural Language to Humanoid Robot Sign Language

30. Revisiting LTE LAA: Channel Access, QoS, and Coexistence with WiFi

31. Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio

32. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

33. Effective Caching for the Secure Content Distribution in Information-Centric Networking

34. A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks

35. PIDS - A Behavioral Framework for Analysis and Detection of Network Printer Attacks

36. Das Internet-Adressbuch bedroht unsere Privatsph��re

37. A Covert Data Transport Protocol

38. Proceedings of the 4th OMNeT++ Community Summit, University of Bremen - Germany, September 7-8, 2017

39. Graph Analytics for anomaly detection in homogeneous wireless networks - A Simulation Approach

40. Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness

41. Cloaker Catcher: A Client-based Cloaking Detection System

42. An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

43. HEAP: Reliable Assessment of BGP Hijacking Attacks

44. Length Matters: Clustering System Log Messages using Length of Words

45. Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

46. Anarchy in Tor: Performance Cost of Decentralization

47. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions

48. Evaluation of Contactless Smartcard Antennas

49. Proceedings of the 2nd OMNeT++ Community Summit, IBM Research - Zurich, Switzerland, September 3-4, 2015

50. Multiple Configurations LT Codes

Catalog

Books, media, physical & digital resources