Prasad et al., 2009 - Google Patents
The top 10 list for terabit speed wireless personal servicesPrasad et al., 2009
- Document ID
- 18328797464530185456
- Author
- Prasad R
- Pruthi P
- Ramareddy K
- Publication year
- Publication venue
- Wireless personal communications
External Links
Snippet
The need for very high-speed (100 Gigabit to Terabit) wireless networks is less than a decade away. It is being driven by content rich multi-channel high-resolution video, gaming, virtual reality, collaboration, and other non-typical applications such as defense and warfare …
- 238000005516 engineering process 0 abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fire et al. | Online social networks: threats and solutions | |
CN110521172A (en) | For handling the method and system of of short duration content-message | |
US11895144B2 (en) | Systems and methods for network security | |
Albrecht et al. | Collective Information Security in {Large-Scale} Urban Protests: the Case of Hong Kong | |
Van Puyvelde et al. | Cybersecurity: politics, governance and conflict in cyberspace | |
Turner et al. | A promising integration of sdn and blockchain for iot networks: A survey | |
Mawgoud et al. | Security threats of social internet of things in the higher education environment | |
Al-Muhtadi et al. | Misty clouds—A layered cloud platform for online user anonymity in Social Internet of Things | |
Zhang et al. | The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review | |
Rajawat et al. | Scheme invisible internet protocol (I2P) using blockchain techniques for tracking darkweb user activities | |
Nyasvisvo et al. | Phishing attacks: A security challenge for university students studying remotely | |
Etuh et al. | Social Media Networks Attacks and their Preventive Mechanisms: A Review | |
Landau | Categorizing uses of communications metadata: Systematizing knowledge and presenting a path for privacy | |
Prasad et al. | The top 10 list for terabit speed wireless personal services | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Gekker | Legionnaires of chaos:‘Anonymous’ and governmental oversight of the Internet | |
Kumar et al. | Online social networks: Privacy challenges and proposed security framework for facebook | |
Fatima et al. | AI-Powered Phishing Detection and Mitigation for IoT-Based Smart Home Security | |
Fraser | A Next Generation Internet Architecture | |
Mahalle et al. | Authorization and Access Control: Foundations, Frameworks, and Applications | |
Shackelford et al. | Forks in the Digital Road: Key Decisions in the History of the Internet | |
Al Shakosh | Cybersecurity awareness among Swedish young adults in usage of public Wi-Fi networks | |
Annamalai et al. | Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms | |
Ahmad | Internet of Things: Tapping into security and privacy issues associated with the internet of things | |
Mawgoud et al. | Security Threats of Social Internet of Things in the Higher Education |