K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean …
As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security
issues related to MCIS have become increasingly important. Therefore, the development …
issues related to MCIS have become increasingly important. Therefore, the development …
Convolution Neural Network‐Based Higher Accurate Intrusion Identification System for the Network Security and Communication
With the development of communication systems, information securities remain one of the
main concerns for the last few years. The smart devices are connected to communicate …
main concerns for the last few years. The smart devices are connected to communicate …
Multicriteria decision and machine learning algorithms for component security evaluation: library‐based overview
J Zhang, S Nazir, A Huang… - Security and …, 2020 - Wiley Online Library
Components are the significant part of a system which plays an important role in the
functionality of the system. Components are the reusable part of a system which are already …
functionality of the system. Components are the reusable part of a system which are already …
[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its
applicability as a 21st‐century business tool and its survivability in a security threat‐infested …
applicability as a 21st‐century business tool and its survivability in a security threat‐infested …
Consumer preference structure of online privacy concerns in an IoT environment
Due to the development of the Internet of Things (IoT) and IoT environments, various
concerns have been raised regarding personal information infringement and leakage. To …
concerns have been raised regarding personal information infringement and leakage. To …
Secure and sustainable predictive framework for IoT-based multimedia services using machine learning
In modern years, the Internet of Things (IoT) has gained tremendous growth and
development in various sectors because of its scalability, self-configuring, and …
development in various sectors because of its scalability, self-configuring, and …
Ensuring privacy policy compliance of wearables with iot regulations
In an era where wearables, particularly those in non-hospital settings, collect and transmit
sensitive personal data, it is imperative to implement stringent privacy safeguards. The …
sensitive personal data, it is imperative to implement stringent privacy safeguards. The …
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling
multiple parties to train a model collaboratively without sharing their data. With the upcoming …
multiple parties to train a model collaboratively without sharing their data. With the upcoming …
Wireless Technology Security and Privacy: A Comprehensive Study
H Azam, M Tan, LT Pin, MA Syahmi, ALW Qian… - 2023 - preprints.org
Since the advent of the Internet, there has been a significant shift from wired to wireless
communication between devices. The volume of data transmitted has surged, primarily …
communication between devices. The volume of data transmitted has surged, primarily …
The internet of medical things in healthcare management: a review
The widespread adoption of Internet of Things (IoT) technologies across various domains
has given rise to the Internet of Medical Things (IoMT), which has significantly enhanced the …
has given rise to the Internet of Medical Things (IoMT), which has significantly enhanced the …