-
21
-
22
FD-IDS: Federated Learning with Knowledge Distillation for Intrusion Detection in Non-IID IoT Environments
Published 2025-07-01Get full text
Article -
23
A Study on Strategic Provisioning of Cloud Computing Services
Published 2014-01-01Get full text
Article -
24
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01Get full text
Article -
25
A hybrid super learner ensemble for phishing detection on mobile devices
Published 2025-05-01“…Furthermore, many of these techniques are unsuitable for mobile devices, which face additional constraints, such as limited RAM, smaller screen sizes, and lower computational power. …”
Get full text
Article -
26
A Continuous Authentication Approach for Mobile Crowdsourcing Based on Federated Learning
Published 2024-01-01Get full text
Article -
27
A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications
Published 2013-04-01Get full text
Article -
28
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01“…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. This feature could be computed and transmitted efficiently using mobile computing devices. …”
Get full text
Article -
29
Lightweight Interpretable Deep Learning Model for Nutrient Analysis in Mobile Health Applications
Published 2025-06-01“…Current mobile nutrient analysis applications face critical limitations: sophisticated deep learning models require substantial computational resources unsuitable for budget devices, while lightweight solutions sacrifice accuracy and lack interpretability necessary for user trust. …”
Get full text
Article -
30
Secure and efficient cloudlet networks: blockchain integration with agent-based proof of trust mechanism
Published 2025-03-01“…Abstract Data security in mobile environments has become a critical concern, driven by the growing demand for mobile services and the proliferation of data-intensive applications such as online gaming, virtual reality, and augmented reality. …”
Get full text
Article -
31
A Human Tracking System for the Rocker-Bogie Mobile Robot Utilizing the YOLOv8 Network
Published 2025-05-01“…Nowadays, mobile robots are applied in a variety of fields to assist humans in doing complicated work such as disaster situations, rescue missions, security and tracking systems, military campaigns, and planetary discovery. …”
Get full text
Article -
32
Lightweight and Security-Enhanced Key Agreement Protocol Using PUF for IoD Environments
Published 2025-06-01“…Furthermore, this work demonstrates that the proposed protocol offers better performance and security by comparing the computational and communication costs and security features with those of relevant protocols.…”
Get full text
Article -
33
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
Get full text
Article -
34
Decentralizing Democracy: Secure and Transparent E-Voting Systems with Blockchain Technology in the Context of Palestine
Published 2024-10-01“…Developed to support the existing voting system in the state of Palestine, VoteChain aims to provide secure e-voting with features such as auditability, verifiability, accuracy, privacy, flexibility, transparency, mobility, availability, convenience, data integrity, and distribution of authority. …”
Get full text
Article -
35
Innovating Cybersecurity in Tanzanian Academia: A Mobile Tool for Combatting Social Engineering Threats
Published 2025-03-01Get full text
Article -
36
Mobile-Commerce Usage Challenges among University Students in Uganda: A Case of Kabale University.
Published 2020“…The results further showed that music, gaming and banking were most frequently accessed mobile services online however Cost of maintaining operating Internet, Preference for 'feel and touch' features of products, Security Challenges, Slow speed of the Internet, Lack of Credit Cards and Payment Systems were cited among the key challenges though skilled manpower was not a challenge to students. …”
Get full text
Article -
37
A novel routing protocol for content-based publish/subscribe model in mobile sensor networks
Published 2019-09-01Get full text
Article -
38
-
39
-
40