A Survey of DDoS Attack and Defense Technologies in Multi-Access Edge Computing
Y Ma, L Liu, Z Liu, F Li, Q Xie, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …
edge, where servers with computation and storage capabilities are placed in proximity to …
[PDF][PDF] Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach.
A Hermosilla, J Gallego-Madrid… - … in Engineering & …, 2024 - researchgate.net
ABSTRACT As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly
prevalent, ensuring not only network security but also the security and reliability of the …
prevalent, ensuring not only network security but also the security and reliability of the …
Network Slicing solutions for Internet of Vehicles (IoV) Networks: A Review
A Arbaoui, S Abdelatif… - 2024 6th International …, 2024 - ieeexplore.ieee.org
The implementation of network slicing services, designed to fulfill the diverse requirements
of each Vehicle-to-Everything (V2X) use case, has significantly facilitated the expansion of …
of each Vehicle-to-Everything (V2X) use case, has significantly facilitated the expansion of …
Network Extensions to Support Robust Secured and Efficient Connectivity Services for V2X Scenario
This paper introduces enhanced network control and management methods for Over-the-Air
Vehicular Software Updates (OTAVSUs), emphasizing robust connectivity, security …
Vehicular Software Updates (OTAVSUs), emphasizing robust connectivity, security …
Misbehaviour detection and trustworthy collaboration in vehicular communication networks
MRM Sedar - 2024 - upcommons.upc.edu
(English) The integration of advanced wireless technologies, eg, cellular and IEEE 802.11 p,
in modern vehicles enables vehicle-to-everything (V2X) communication, fostering the next …
in modern vehicles enables vehicle-to-everything (V2X) communication, fostering the next …
Closed Loop Automation Platform for Intelligent Security Operations with TeraFlowSDN and OSM
Presentación de PowerPoint Page 1 Closed Loop Automation Platform for Intelligent Security
Operations with TeraFlowSDN and OSM Abstract The objective is to explore the design of a …
Operations with TeraFlowSDN and OSM Abstract The objective is to explore the design of a …