— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Although extensive studies have been conducted on online social networks (OSNs), it is not clear how to characterize information propagation and social influence, two types of impo...
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and...
Abstract-- Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and locationaware services [1]. The ability to disseminate information ...