Survey on multi-access edge computing security and privacy
P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
[HTML][HTML] Open RAN security: Challenges and opportunities
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …
(Radio Access Network), which defines interfaces that support inter-operation between …
[HTML][HTML] A survey on security in internet of things with a focus on the impact of emerging technologies
P Williams, IK Dutta, H Daoud, M Bayoumi - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) have opened the door to a world of unlimited possibilities for
implementations in varied sectors in society, but it also has many challenges. One of those …
implementations in varied sectors in society, but it also has many challenges. One of those …
A review of security standards and frameworks for IoT-based smart environments
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …
cities is becoming fundamentally essential to implementing the correct control measures and …
[HTML][HTML] Digitalization in omnichannel healthcare supply chain businesses: The role of smart wearable devices
The advancement in technology has fostered the prevalence of the Internet of Things (IoT),
which enhances healthcare business quality, offers a seamless customer experience, and …
which enhances healthcare business quality, offers a seamless customer experience, and …
Dependable intrusion detection system for IoT: A deep transfer learning based approach
Security concerns for Internet of Things (IoT) applications have been alarming because of
their widespread use in different enterprise systems. The potential threats to these …
their widespread use in different enterprise systems. The potential threats to these …
[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …
increase of network data and placed a high computation complexity across various …
Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks
With simple connectivity and fast-growing demand of smart devices and networks, IoT has
become more prone to cyber attacks. In order to detect and prevent cyber attacks in IoT …
become more prone to cyber attacks. In order to detect and prevent cyber attacks in IoT …
[HTML][HTML] IoT-based solutions to monitor water level, leakage, and motor control for smart water tanks
Today, a large portion of the human population around the globe has no access to
freshwater for drinking, cooking, and other domestic applications. Water resources in …
freshwater for drinking, cooking, and other domestic applications. Water resources in …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …