-
1
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01“…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. …”
Get full text
Article -
2
Pediatric resident use, perceptions, and desires for improvement of a clinical secure messaging application
Published 2024-01-01Get full text
Article -
3
Wireless Security Threats
Published 2013-12-01“…Mobile devices are the new frontier for viruses, spam and other potential security threats. …”
Get full text
Article -
4
Feature selection‐based android malware adversarial sample generation and detection method
Published 2021-11-01Get full text
Article -
5
-
6
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS
Published 2022-06-01Get full text
Article -
7
R‐DP: A risk‐adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things
Published 2022-09-01“…However, the data contain a wealth of sensitive information about devices' environmental situation and collective activities, which draws a flock of adversaries and poses an unprecedented security challenge. Furthermore, sensing gadgets deployed in the IIoT device are usually resource‐constrained and often do not have adequate 3C resources (i.e. communication, computing, caching) to run sophisticated privacy‐preserving methods, making them easier targets for attacks in data sharing. …”
Get full text
Article -
8
Location deployment of depots and resource relocation for connected car-sharing systems through mobile edge computing
Published 2017-06-01“…Mobile edge computing supports the connected cars to ensure real-time, interactive, secured, and distributed services for customers. …”
Get full text
Article -
9
Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique
Published 2025-05-01“…Computational efficiency is maximized through the implementation of MobileNetV3, a thin convolutional neural network optimized for mobile and edge devices. …”
Get full text
Article -
10
Development of CoAP protocol for communication in mobile robotic systems using IoT technique
Published 2025-03-01Get full text
Article -
11
Study and Developing a Network Security Prototype Based on Agent Technology
Published 2013-12-01Get full text
Article -
12
EVMCSDLT: Electric vehicle mobile charging system using distributed ledger technology
Published 2025-12-01Get full text
Article -
13
Mobile Accelerometer Applications in Core Muscle Rehabilitation and Pre-Operative Assessment
Published 2024-11-01Get full text
Article -
14
ABA-IDS: Attention-Based Autoencoder for Intrusion Detection in Assistive Mobility Robotic Network
Published 2025-01-01Get full text
Article -
15
A Hybrid Deep Learning Paradigm for Robust Feature Extraction and Classification for Cataracts
Published 2025-04-01Get full text
Article -
16
-
17
-
18
Liveness Detection in Computer Vision: Transformer-Based Self-Supervised Learning for Face Anti-Spoofing
Published 2024-01-01Get full text
Article -
19
-
20
Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security
Published 2025-07-01Get full text
Article