بحث بسيط
السجلات المعروضة 1 -- 10 من 10
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
Logic programs with ordered disjunction: First-order semantics and expressiveness
(
AAAI Publications
, 2014 , Conference Paper)
Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)
Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article Review)
The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ...
Secure service provision in smart grid communications
(2012 , Article)
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
Security and privacy in emerging networks: Part II [Guest Editorial]
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article Review)
This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
Distributed resource allocation in cloud-based wireless multimedia social networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ...
Securing vehicle-to-grid communications in the smart grid
(2013 , Article)
Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ...
An enhanced public key infrastructure to secure smart grid wireless communication networks
(2014 , Article)
It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...