Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2019
DASHbed: a testbed framework for large scale empirical evaluation of real-time DASH in wireless scenarios
MMSys '19: Proceedings of the 10th ACM Multimedia Systems ConferencePages 285–290https://doi.org/10.1145/3304109.3325813Recent years have witnessed an explosion of multimedia traffic carried over the Internet. Video-on-demand and live streaming services are the most dominant services. To ensure growth, many streaming providers have invested considerable time and effort ...
- research-articleOctober 2018
A Flexible Software Framework for Real-World Experiments and Temperature-Controlled Testbeds
WiNTECH '18: Proceedings of the 12th International Workshop on Wireless Network Testbeds, Experimental Evaluation & CharacterizationPages 30–37https://doi.org/10.1145/3267204.3267207Both reliability and robustness are required for applicationsin the field of wireless sensor networks and the internet ofthings. Testbeds are a usefool tool to verify both hardwareand software concepts under realistic conditions. However,existing ...
- research-articleApril 2017
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things
IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and SecurityPages 3–10https://doi.org/10.1145/3055245.3055251The exponential increase of Internet of Things (IoT) devices have resulted in a range of new and unanticipated vulnerabilities associated with their use. IoT devices from smart homes to smart enterprises can easily be compromised. One of the major ...
- research-articleDecember 2016
Advanced Security Testbed Framework for Wearable IoT Devices
ACM Transactions on Internet Technology (TOIT), Volume 16, Issue 4Article No.: 26, Pages 1–25https://doi.org/10.1145/2981546Analyzing the security of Wearable Internet-of-Things (WIoT) devices is considered a complex task due to their heterogeneous nature. In addition, there is currently no mechanism that performs security testing for WIoT devices in different contexts. In ...