On energy efficient resource allocation in shared RANs: Survey and qualitative analysis
F Marzouk, JP Barraca… - … Communications Surveys & …, 2020 - ieeexplore.ieee.org
An expansion of services and unprecedented traffic growth is anticipated in future networks,
aligned with the adoption of the long-awaited Fifth Generation (5G) of mobile …
aligned with the adoption of the long-awaited Fifth Generation (5G) of mobile …
SDN as a defence mechanism: a comprehensive survey
B Ayodele, V Buttigieg - International Journal of Information Security, 2024 - Springer
Investing in cybersecurity is increasingly considered a significant area and aspect a
business or organisation should seriously consider. Some of these security solutions are …
business or organisation should seriously consider. Some of these security solutions are …
Blockchain based integrated security measure for reliable service delegation in 6G communication environment
G Manogaran, BS Rawal, V Saravanan… - Computer …, 2020 - Elsevier
Sixth generation (6G) communication environment is unfolded in the recent years in order to
provide high throughput less latency services for the mobile users. This environment …
provide high throughput less latency services for the mobile users. This environment …
Detection of economic denial of sustainability (EDoS) threats in self-organizing networks
This paper reviews the threat of economic denial of sustainability on recent communication
networks and discusses their adaptation to emergent scenarios suited for self-organization …
networks and discusses their adaptation to emergent scenarios suited for self-organization …
A novel approach to efficient resource allocation in load-balanced cellular networks using hierarchical DRL
AM Rahimi, A Ziaeddini, S Gonglee - Journal of Ambient Intelligence and …, 2022 - Springer
Abstract 5G wireless networks require highly spectral-efficient multiple access techniques,
which play an important role in determining the performance of mobile communication …
which play an important role in determining the performance of mobile communication …
A bio-inspired reaction against cyberattacks: AIS-powered optimal countermeasures selection
Nowadays, Information and Communication Technology (ICT) infrastructures play a crucial
role for human beings, providing essential services at astonishing speed. Nevertheless …
role for human beings, providing essential services at astonishing speed. Nevertheless …
Low-latency cloud-fog network architecture and its load balancing strategy for medical big data
J Yang - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
In order to apply fog computing to the field of medical big data, this paper proposes a low-
latency hybrid cloud-fog network architecture for medical big data, which can solve the …
latency hybrid cloud-fog network architecture for medical big data, which can solve the …
AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning
The authentication field is evolving towards mechanisms able to keep users continuously
authenticated without the necessity of remembering or possessing authentication …
authenticated without the necessity of remembering or possessing authentication …
Battling against cyberattacks: Towards pre-standardization of countermeasures
Cyberattacks targeting ICT systems are becoming every day more sophisticated and
disruptive. Such malevolent actions are performed by ill-motivated entities (governments …
disruptive. Such malevolent actions are performed by ill-motivated entities (governments …
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
G Choudhary, V Sharma - 5G enabled secure wireless networks, 2019 - Springer
The 5G networks have the capability to provide high compatibility for the new applications,
industries, and business models. These networks can tremendously improve the quality of …
industries, and business models. These networks can tremendously improve the quality of …