Network slicing of multi-access edge computing (MEC) resources is expect...
The unprecedented requirements of IoT networks have made fine-grained
op...
We expose a new security leak for smartphone users, which allows to stol...
Radio access network (RAN) slicing realizes a vision where physical netw...
Undetectable wireless transmissions are fundamental to avoid eavesdroppe...
Radio fingerprinting provides a reliable and energy-efficient IoT
authen...
In advanced jamming, the adversary intentionally concentrates the availa...
One of the key challenges to the IoT's success is how to secure and anon...
The explosion of 5G networks and the Internet of Things will result in a...
The notions of softwarization and virtualization of the radio access net...
The Internet of Things (IoT) is expected to require more effective and
e...
The reliability of information in participatory sensing (PS) systems lar...
Mobile crowdsensing harnesses the sensing power of modern smartphones to...
Mobile crowdsensing allows data collection at a scale and pace that was ...
Radio access network (RAN) slicing is an effective methodology to dynami...
The Internet of Things (IoT) realizes a vision where billions of
interco...