Location spoofing attack detection with pre-installed sensors in mobile devicesCost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM PlatformAn Analysis of 5 Million OpenPGP KeysSecuring Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSECAn Energy-Efficient Data Acquisition Technique for Hierarchical Cluster-Based Wireless Sensor NetworksBLE Indoor Positioning System Using RSSI-based TrilaterationTechnological Innovation Capability Evaluation of High-Tech Firms Using Conjunctive and Disjunctive Belief Rule-Based Expert System: A Comparative StudyD-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android MalwarePacket Probing Study to Assess Sustainability in Available Bandwidth Measurements: Case of High-Speed Cellular NetworksOn the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications