Browse Items (3575 total)

Vehicular ad hoc networks (VANETs) are mainly used in the intelligent transportation field for smart applications. VANETS received maximum concentration among the researchers in academic research. Providing traffic safety at the time of high mobility…

As an object of Western public and media interest, Laos still appears to be an overlooked and unnoticed country. In a sense, it remains in the shadow of its larger neighbours Vietnam and Thailand, who capture the world’s attention in the context of…

An interesting paradigm is a metaverse which represents the next generation of using the internet to improve human lives and provide a new way to communicate by building a system that let the user represented by their avatar to work, socialize and…

Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet their students’ needs and make knowledge delivery easier. The technology could play a pivotal role in extending the…

Although, there are several literatures pertaining to the security issues in the use of mobile apps, these literatures do not sufficiently address issues about the security challenges in the use of mobile educational app. Hence, this work attempts to…

 Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in…

Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important field has…

The telecommunication industry is the leading industry in big data trends as this industry has the most capable infrastructure for big data. However, the adoption of big data in telecommunication services also raises important security and privacy…

The article examines the processes of memory securitization in the RussianFederation and Latvia during the coronavirus crisis. The key factor thatallowed the authors to make such a statement about the problem was thetemporary coincidence of the…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2