On energy efficient resource allocation in shared RANs: Survey and qualitative analysis

F Marzouk, JP Barraca… - … Communications Surveys & …, 2020 - ieeexplore.ieee.org
An expansion of services and unprecedented traffic growth is anticipated in future networks,
aligned with the adoption of the long-awaited Fifth Generation (5G) of mobile …

SDN as a defence mechanism: a comprehensive survey

B Ayodele, V Buttigieg - International Journal of Information Security, 2024 - Springer
Investing in cybersecurity is increasingly considered a significant area and aspect a
business or organisation should seriously consider. Some of these security solutions are …

Blockchain based integrated security measure for reliable service delegation in 6G communication environment

G Manogaran, BS Rawal, V Saravanan… - Computer …, 2020 - Elsevier
Sixth generation (6G) communication environment is unfolded in the recent years in order to
provide high throughput less latency services for the mobile users. This environment …

Detection of economic denial of sustainability (EDoS) threats in self-organizing networks

MAS Monge, JM Vidal, GM Pérez - Computer Communications, 2019 - Elsevier
This paper reviews the threat of economic denial of sustainability on recent communication
networks and discusses their adaptation to emergent scenarios suited for self-organization …

A novel approach to efficient resource allocation in load-balanced cellular networks using hierarchical DRL

AM Rahimi, A Ziaeddini, S Gonglee - Journal of Ambient Intelligence and …, 2022 - Springer
Abstract 5G wireless networks require highly spectral-efficient multiple access techniques,
which play an important role in determining the performance of mobile communication …

A bio-inspired reaction against cyberattacks: AIS-powered optimal countermeasures selection

P Nespoli, FG Mármol, JM Vidal - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial
role for human beings, providing essential services at astonishing speed. Nevertheless …

Low-latency cloud-fog network architecture and its load balancing strategy for medical big data

J Yang - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
In order to apply fog computing to the field of medical big data, this paper proposes a low-
latency hybrid cloud-fog network architecture for medical big data, which can solve the …

AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning

PMS Sánchez, LF Maimó, AH Celdrán, GM Pérez - Computers & Security, 2021 - Elsevier
The authentication field is evolving towards mechanisms able to keep users continuously
authenticated without the necessity of remembering or possessing authentication …

Battling against cyberattacks: Towards pre-standardization of countermeasures

P Nespoli, F Gomez Marmol, J Maestre Vidal - Cluster Computing, 2021 - Springer
Cyberattacks targeting ICT systems are becoming every day more sophisticated and
disruptive. Such malevolent actions are performed by ill-motivated entities (governments …

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

G Choudhary, V Sharma - 5G enabled secure wireless networks, 2019 - Springer
The 5G networks have the capability to provide high compatibility for the new applications,
industries, and business models. These networks can tremendously improve the quality of …