Wireless Networking

The term “graphical password” refers to a user authentication method where pictorial information is used for validation, instead of an alphanumerical password. This method poses many challenges, such as memo ability (which refers to how easy the password is to remember), usability, and security, since graphical passwords may tend to be visually simple and easily forged. Graphical passwords have become popular due to the proliferation of touch screen devices, in particular smart phones and tablets.

Categories:
48 Views

Tourism receipts worldwide are not expected to recover to 2019 levels until 2023. In 

the first half of this year, tourist arrivals fell globally by more than 65 percent, with a near halt 

since April—compared with 8 percent during the global financial crisis and 17 percent amid 

the SARS epidemic of 2003, according to ongoing IMF research on tourism in a post-pandemic 

world. Because of pandemic we faces the different struggles specially the business closed. 

that’s why country’s economy decrease, at first many company need to reduce their employee. 

Categories:
75 Views

This dataset used in the research paper "JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks." The research was conducted by Ioannis Panitsas, Yagmur Yigit, Leandros Tassiulas, Leandros Maglaras, and Berk Canberk from Yale University and Edinburgh Napier University.

For any inquiries, please contact Ioannis Panitsas at ioannis.panitsas@yale.edu.

 

Categories:
237 Views

The increasing prevalence of encrypted traffic in

modern networks poses significant challenges for network security,

particularly in detecting and classifying malicious activities

and application signatures. To overcome this issue, deep learning

has turned out to be a promising candidate owing to its ability

to learn complex data patterns. In this work, we present a

deep learning-based novel and robust framework for encrypted

traffic analysis (ETA) which leverages the power of Bidirectional

Categories:
194 Views

In our research, we generate datasets utilizing two key statistical models: the Poisson Process Distribution and the Beta Distribution. These models are employed to simulate and analyze various aspects of Quality of Service (QoS) in Internet of Things (IoT) environments, with a particular emphasis on wireless communications. By leveraging these distributions, our study aims to optimize resource allocation, improve reliability, and ensure that QoS requirements are met in complex and dynamic wireless communication scenarios within IoT ecosystems.

Categories:
249 Views

Intrusion detection in Unmanned Aerial Vehicle (UAV) networks is crucial for maintaining the security and integrity of autonomous operations. However, the effectiveness of intrusion detection systems (IDS) is often compromised by the scarcity and imbalance of available datasets, which limits the ability to train accurate and reliable machine learning models. To address these challenges, we present the "CTGAN-Enhanced Dataset for UAV Network Intrusion Detection", a meticulously curated and augmented dataset designed to improve the performance of IDS in UAV environments.

 

Categories:
1038 Views

The dataset accompanies the study titled “Rate Adaptation Algorithms in WLANs: A Comparative Analysis of Iwl-Mvm-Rs and Minstrel-HT Under Different Frame Error Causes.” This dataset contains simulation results that evaluate the performance of the Iwl-Mvm-Rs and Minstrel-HT Rate Adaptation Algorithms (RAAs) under varying frame error conditions, specifically low Signal-to-Noise Ratio (SNR) and collision-induced errors.

The data was generated using ns-3 simulations across four scenarios:

Categories:
38 Views

This dataset consists of network packet traces collected in 2023 on the 5G infrastructure deployed at Chalmers University of Technology.

The dataset includes 1,912 pcap files, distributed across 8 folders. Each pcap file captures 1 minute of encrypted network traffic generated by one of the following 8 popular mobile applications:

Categories:
726 Views

The TiHAN-V2X Dataset was collected in Hyderabad, India, across various Vehicle-to-Everything (V2X) communication types, including Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Infrastructure-to-Vehicle (I2V), and Vehicle-to-Cloud (V2C). The dataset offers comprehensive data for evaluating communication performance under different environmental and road conditions, including urban, rural, and highway scenarios.

Categories:
865 Views

The Unified Multimodal Network Intrusion Detection System (UM-NIDS) dataset is a comprehensive, standardized dataset that integrates network flow data, packet payload information, and contextual features, making it highly suitable for machine learning-based intrusion detection models. This dataset addresses key limitations in existing NIDS datasets, such as inconsistent feature sets and the lack of payload or time-window-based contextual features.

Categories:
1395 Views

Pages