Skip to main content

Showing 1–3 of 3 results for author: Sookhak, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.03832  [pdf, other

    cs.NI eess.SP

    Joint position and trajectory optimization of flying base station in 5G cellular networks, based on users' current and predicted location

    Authors: Mehdi Sookhak, Amir Hossein Mohajerzadeh

    Abstract: Nowadays, Unmanned Aerial Vehicles (UAVs) have been significantly improved, and one of their most important applications is to provide temporary coverage for cellular users. Static Base Station cannot service all users due to temporary crashes because of temporary events such as ground BS breakdowns, bad weather conditions, natural disasters, transmission errors, etc., drones equipped with small c… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  2. arXiv:1903.12079  [pdf

    cs.CY cs.CR

    Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations

    Authors: Nader Sohrabi Safa, Carsten Maple, Steve Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak

    Abstract: Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information as… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Journal ref: Future Generation Computer Systems (FGCS) 2019

  3. arXiv:1111.6539  [pdf

    cs.NI

    Secure Geographic Routing Protocols: Issues and Approaches

    Authors: Mehdi sookhak, Ramin Karimi, Mahboobeh Haghparast, Ismail Fauzi ISnin

    Abstract: In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

    Submitted 28 November, 2011; originally announced November 2011.

    Comments: 8 pages

    Journal ref: International Journal of Computer Science Issues 8(4): 382-389 (2011)