5G security challenges and solutions: a review by OSI layers

S Sullivan, A Brighente, SAP Kumar, M Conti - Ieee Access, 2021 - ieeexplore.ieee.org
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G

IH Abdulqadder, D Zou, IT Aziz - Future Generation Computer Systems, 2023 - Elsevier
Software-defined networking (SDN) has increased the need for security due to the
participation of illegitimate packets resulting from poor processing times and inadequate …

NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks

J Andrade-Hoz, JM Alcaraz-Calero… - … of Communications and …, 2024 - ieeexplore.ieee.org
The next generation of network capabilities coupled with artificial intelligence (AI) can
provide innovative solutions for network control and self-optimisation. Network control …

Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis

DP Acharjya, NSS Ahmed - Peer-to-Peer Networking and Applications, 2021 - Springer
The propagation of 5G, beyond 5G and Internet of Everything (IoE) networks are the key
business force for future networks and its various applications. These networks have been …

Developing policy hierarchies for an effective distributed systems and network management: a case study in a videoconference service

S Mitropoulos - International Journal of Communication …, 2024 - inderscienceonline.com
Large-scale distribution systems and network management depend on complex
relationships that are strongly related to the managerial roles, which depend on the …

Fast user authentication in 5G heterogeneous networks using RLAC-FNN and blockchain technology for handoff delay reduction

SV Manjaragi, SV Saboji - Wireless Networks, 2023 - Springer
In the fifth generation (5G), ultra-dense heterogeneous network (UDHN) is considered as a
prominent technology to resolve network system problems. It is challenged to provide secure …

Optimisation techniques in policy hierarchies for managing distributed systems and networks

S Mitropoulos - International Journal of Communication …, 2024 - inderscienceonline.com
Large-scale distributed system management is an emerging task for all modern networked
organisations. In this direction, corporate management systems are usually organised into …

IT governance and enterprise security policy in the 6G era

MA Nafchi, ZA Shahraki - Next-Generation Enterprise Security and …, 2022 - taylorfrancis.com
With the complexity of human–machine interactions, the concerns of various users in this
interaction have also increased. In the 6G generation, users are witnessing the introduction …

[图书][B] Next-Generation Enterprise Security and Governance

M Ahmed, N Moustafa, A Barkat, P Haskell-Dowland - 2022 - books.google.com
The Internet is making our daily lives as digital as possible, and this new era is called the
Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the …

Conflict resolution in management policies: case study in cloud computing and internet of things

S Mitropoulos - … Journal of Information Privacy, Security and …, 2021 - inderscienceonline.com
Policy conflicts detection and resolution in distributed management systems are very crucial
issues which strongly influence the efficiency of management. In this paper, first the …