A Survey of DDoS Attack and Defense Technologies in Multi-Access Edge Computing

Y Ma, L Liu, Z Liu, F Li, Q Xie, K Chen… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is a novel service paradigm located at the network's
edge, where servers with computation and storage capabilities are placed in proximity to …

[PDF][PDF] Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach.

A Hermosilla, J Gallego-Madrid… - … in Engineering & …, 2024 - researchgate.net
ABSTRACT As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly
prevalent, ensuring not only network security but also the security and reliability of the …

Network Slicing solutions for Internet of Vehicles (IoV) Networks: A Review

A Arbaoui, S Abdelatif… - 2024 6th International …, 2024 - ieeexplore.ieee.org
The implementation of network slicing services, designed to fulfill the diverse requirements
of each Vehicle-to-Everything (V2X) use case, has significantly facilitated the expansion of …

Network Extensions to Support Robust Secured and Efficient Connectivity Services for V2X Scenario

A Abishek, R Vilalta, L Gifre, P Alemany… - 2024 24th …, 2024 - ieeexplore.ieee.org
This paper introduces enhanced network control and management methods for Over-the-Air
Vehicular Software Updates (OTAVSUs), emphasizing robust connectivity, security …

Misbehaviour detection and trustworthy collaboration in vehicular communication networks

MRM Sedar - 2024 - upcommons.upc.edu
(English) The integration of advanced wireless technologies, eg, cellular and IEEE 802.11 p,
in modern vehicles enables vehicle-to-everything (V2X) communication, fostering the next …

Closed Loop Automation Platform for Intelligent Security Operations with TeraFlowSDN and OSM

A Abishek, R Vilalta, L Gifre, R Muñoz - docbox.etsi.org
Presentación de PowerPoint Page 1 Closed Loop Automation Platform for Intelligent Security
Operations with TeraFlowSDN and OSM Abstract The objective is to explore the design of a …