Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (11)
- California Polytechnic State University, San Luis Obispo (10)
- Singapore Management University (7)
- University of Pennsylvania Carey Law School (5)
- Old Dominion University (4)
-
- SelectedWorks (4)
- Georgia Southern University (2)
- University of Massachusetts Amherst (2)
- University of Nebraska - Lincoln (2)
- University of Nevada, Las Vegas (2)
- University of Tennessee, Knoxville (2)
- Air Force Institute of Technology (1)
- Boise State University (1)
- Eastern Michigan University (1)
- Edith Cowan University (1)
- Minnesota State University, Mankato (1)
- Munster Technological University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Syracuse University (1)
- Tennessee State University (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of New Mexico (1)
- Vocational Training Council (1)
- Washington University in St. Louis (1)
- Keyword
-
- Security of Wireless Networks (4)
- Security (3)
- Technology (3)
- Cloud computing (2)
- Cluster (2)
-
- Cognitive radio networks (2)
- Computer science (2)
- Data (2)
- ETD (2)
- Engineering (2)
- Fault tolerance (2)
- Innovation (2)
- Internet (2)
- Mobile devices (2)
- Networking (2)
- Presentations (2)
- Secrecy (2)
- Teaching Evaluation (2)
- Telecommunications law and policy (2)
- VDSL (2)
- Wifi (2)
- Wireless ad hoc networks (2)
- Wireless sensor networks (2)
- #KRKTR (1)
- 4G LTE (1)
- 4G Long Term Evolution (LTE) (1)
- AERO (1)
- AODV (1)
- API (1)
- APRS (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (7)
- All Faculty Scholarship (5)
- Hong-Ning Dai (5)
- Computer Engineering (4)
- Doctoral Dissertations (4)
-
- Computer Science Theses & Dissertations (2)
- Computer and Electronics Engineering: Dissertations, Theses, and Student Research (2)
- Electronic Theses and Dissertations (2)
- Hwee-Joo Kam (2)
- Masoud Shakiba (2)
- Master's Theses (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- All Computer Science and Engineering Research (1)
- Boise State University Theses and Dissertations (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- Computer Science Faculty Research (1)
- Computer Science Presentations (1)
- Dissertations - ALL (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Electrical Engineering (1)
- Graduate Theses and Dissertations (1)
- Independent Study Project (ISP) Collection (1)
- Jacob Johnsen, MSc (1)
- Maurice Dawson (1)
- Mechanical Engineering (1)
- Physics (1)
- Practical Social and Industrial Research Symposium (1)
- Rana Asif Rehman (1)
- Research outputs 2014 to 2021 (1)
- Reza Vaezi (1)
Articles 61 - 65 of 65
Full-Text Articles in Computer Engineering
Teaching Evaluation (Spring 2014), Hwee-Joo Kam
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …
Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang
Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow fading environment. Most of previous studies have only concentrated on protecting the confidential communications at both the transmitters and the receivers and little attention has been paid on investigating the eavesdropping behaviors done by the malicious nodes. We therefore investigate the eavesdropping success rate of eavesdroppers equipped with various antenna models under various channels conditions, such as the path loss effect and the shadow fading effect. In particular, we formulate the eavesdropping attack problem with consideration of both simplistic directional antenna models and realistic antenna models. …
An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao
An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao
Hong-Ning Dai
This paper concerns the eavesdropping problem from the eavesdroppers’ perspective, which is new since most of previous studies only concentrate on the good nodes. We propose an analytical framework to investigate the eavesdropping attacks, taking account into various channel conditions and antenna models. Our extensive numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect and the antenna models; particularly, they imply that using directional antennas at eavesdroppers can increase the probability of eavesdropping attacks when the path loss effect is less notable. This study is helpful for us to …
Student Feedback (Spring 2014), Hwee-Joo Kam