2013
DOI: 10.1007/s00607-013-0325-1
|View full text |Cite
|
Sign up to set email alerts
|

Detecting bad information in mobile wireless networks based on the wireless application protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Smartphones are now commonly used to record video with HD quality and have Internet access for sharing on the social clouds such as Facebook, Twitter, Tumblr, and Google Plus [1]. Users upload and share HD videos on social clouds but social clouds compress video files for fast loading of the web page, save storage because of a large amount of video data, and provide QoS delivery of video streaming over low-bandwidth networks [2][3][4]. The purpose of video compression is efficiently reducing visual data by avoiding the loss of visual quality due to compression [5].…”
Section: Introductionmentioning
confidence: 99%
“…Smartphones are now commonly used to record video with HD quality and have Internet access for sharing on the social clouds such as Facebook, Twitter, Tumblr, and Google Plus [1]. Users upload and share HD videos on social clouds but social clouds compress video files for fast loading of the web page, save storage because of a large amount of video data, and provide QoS delivery of video streaming over low-bandwidth networks [2][3][4]. The purpose of video compression is efficiently reducing visual data by avoiding the loss of visual quality due to compression [5].…”
Section: Introductionmentioning
confidence: 99%
“…In the future work, we plan to add the fuzzy sets during the test generation process, which can better simulate the actions of intruder of a network system. Some real network protocols, such as RADIUS and the protocol used in [ 26 ], are going to be considered. And the more complex experiments [ 27 ] are going to be defined.…”
Section: Discussionmentioning
confidence: 99%
“…However, because of broadcast nature of wireless communication, dynamic topology, mobility, signal channel instability, and so forth [1], they are also vulnerable to various security threats and attacks such as DoS (Denial of Service), counterfeiting, tampering, leakage, interference, network flooding, eavesdropping, and traffic analysis [2]. Particularly, with the popularity of intelligent terminals, some bad information, such as obscenity information, viruses, and Trojans, becomes more and more widespread [3]. This bad information not only occupies lots of user's traffic, but also endangers the privacy of users.…”
Section: Introductionmentioning
confidence: 99%