The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is an effective approach for organizing computing resource which can improve service capability of WMNs remarkably. However, some drawbacks of wireless networks exist inherently make the cloud computing in WMNs insecure with various threats. In this paper, a novel hierarchical framework which is more compatible for cloud computing in WMNs is proposed, a completed security architecture...
Cloud services can greatly enhance the computing capability of mobile devices. Mobile users can rely on the cloud to perform computationally intensive operations such as searching, data mining, and multimedia processing. In this paper, we propose a new mobile cloud framework called MobiCloud. In addition to providing traditional computation services, MobiCloud also enhances the operation of the ad...
This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization...
In this paper, the authors address issues regarding the attacks on mobile networks. Firstly, the mobile network security is described as well as the risk to be faced with mobile network. Then it follows with the some issues in mobile network security and attack. The authors then reviewed previous work in understanding mobile network attacks and the popular attacks on mobile network namely the bluetooth...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.