Latest Communications of International Proceedings articles

31
Dec
2025

Identity Protection in Managing Access to Public Cloud Services: Lessons from Phishing Simulation Tests

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
Digital identities have become an integral component of using online services in both personal and professional contexts. They constitute the primary mechanism for authenticating access to cloud computing services, where confidential information is often processed. Unauthorized access to such data can result in severe financial,…
31
Dec
2025

Design and Experimental Evaluation of a Low-Cost Rogue Access Point Based on SOHO Hardware

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
This paper presents the hardware and software possibilities of constructing a Rogue Access Point (RAP) using commonly available SOHO-class devices. The work has an analytical and experimental character and focuses on assessing the practicality of low-cost solutions, selection criteria, and limitations resulting from the use…
31
Dec
2025

Comparative Analysis of the Effectiveness of Machine Learning Algorithms Used for WLAN Network Protection

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
The rapid development of wireless technologies and the growing dependency on WLAN infrastructures have significantly increased the surface of potential cyber threats. Among these, Evil Twin and Rogue Access Point attacks remain some of the most persistent and dangerous due to their ability to mimic…
31
Dec
2025

VoIP Network and Protocols in IoT Applications

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
This paper presents the application of VoIP technology in the Internet of Things (IoT) environment, with particular emphasis on the integration possibilities of both technologies. The potential of using Raspberry Pi as a VoIP server and as a control hub for smart offices and homes is…
31
Dec
2025

A Penetration Testing Platform: Three Testing Tools

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
The aim of this article is to take a deeper look at penetration testing, its theoretical and practical sides, by reviewing existing solutions and creating custom tools that can be used during such tests. Therefore, we present three pentesting tools tested on a dedicated platform:…
31
Dec
2025

Analysis of Existing Localization Methods

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
The article presents an overview of modern methods for locating electromagnetic signal sources, which are used in many fields, such as autonomous navigation, robotics, logistics, security, and military operations. The basic groups of methods are presented, classified according to their operating principles: methods based on…
31
Dec
2025

Unifying Aleatoric and Epistemic Uncertainty in Investment Evaluation

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
In software architecture design, proper attention is often not paid to the relationships between elements across diagrams. However, IT designers, more or less consciously, introduce elements representing the same object instance in different diagrams with nearly identical names. These relationships are called consistency rules and…
31
Dec
2025

Methods for Measuring and Evaluating Performance in Next-Generation Cellular Networks

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
Modern industrial environments require reliable, low-latency communication, often exceeding the capabilities of public mobile networks. Private 5G networks address these needs by enabling full control over transmission parameters and security. This paper presents the planning, testing and optimisation of such a network and evaluates its…
31
Dec
2025

IoT Device Classification Methodes Based on Network Traffic

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
The rapid growth of Internet of Things (IoT) devices in smart cities produces substantial and heterogeneous network traffic, creating significant challenges for security and management. Accurate device classification is crucial for protecting networks against threats, such as malicious devices, and for facilitating efficient resource allocation…
31
Dec
2025

Multi-Sensor Fusion for Indoor Positioning System

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
Diverse sources of radio signal interference and the complex topology of multi-level indoor structures often impede reliable position tracking. Therefore, a solution based on a Pedestrian Dead-Reckoning (PDR) navigation module utilizing high-frequency data from Inertial Measurement Unit (IMU), as well as two complementary technologies: Bluetooth…