Due to the unreliability of wired communications and the risks of controlling the process of transmitting data besides the complications that affecting data protection and the high costs of systems infrastructure, led to use wireless communications instead of wires media, but these networks are vulnerable towards illegal attacks. The side effects of these attacks are modifying data or penetrate the security system and discover its weaknesses, which leads to great material losses. These risks and difficulties led to the reluctance of wires communications and propose intelligent techniques and robust encryption algorithms for preventing data transmitted over wireless networks to keep it safe from cyber security attacks. So, there is a persist...
With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected...
[[abstract]]A wireless sensor network relay selection algorithm to balance between power consumption...
The proposed work is a new technique for protecting the transmitted data via WLAN from eavesdropping...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
A wireless Ad-hoc network is a collection of mobile nodes that can be deployed without the need for ...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
Abstract: Problem statement: Secure data aggregation is a challenging task in wireless sensor networ...
This paper reports an experience on the application of fuzzy reasoning to the fast assessment of the...
Nodes are deployed randomly in the network area of the WSN. data transmission from source to destina...
A wireless Ad-hoc network is a group of wireless devices that communicate with each other without ut...
Sensor nodes may be easily compromised and seized by adversaries, because they are disseminated in h...
With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...
ABSTRACT This paper evaluates the security of wireless communication network based on the fuzzy log...
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected...
[[abstract]]A wireless sensor network relay selection algorithm to balance between power consumption...
The proposed work is a new technique for protecting the transmitted data via WLAN from eavesdropping...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
A wireless Ad-hoc network is a collection of mobile nodes that can be deployed without the need for ...
The need to increase information sharing in the Internet of Things (IoT) applications made the risk-...
Abstract: Problem statement: Secure data aggregation is a challenging task in wireless sensor networ...
This paper reports an experience on the application of fuzzy reasoning to the fast assessment of the...
Nodes are deployed randomly in the network area of the WSN. data transmission from source to destina...
A wireless Ad-hoc network is a group of wireless devices that communicate with each other without ut...
Sensor nodes may be easily compromised and seized by adversaries, because they are disseminated in h...
With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range...
This paper introduces a procedural method based on the fuzzy logic and set theory, which analyzes th...
Objectives: This paper presents a new methodology for analyzing the vulnerability of power systems i...