[HTML][HTML] Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies
J Cunha, P Ferreira, EM Castro, PC Oliveira… - Future Internet, 2024 - mdpi.com
The rapid development of 5G networks and the anticipation of 6G technologies have
ushered in an era of highly customizable network environments facilitated by the innovative …
ushered in an era of highly customizable network environments facilitated by the innovative …
[HTML][HTML] Towards a Reference Architecture for Cargo Ports
VM Romero, EB Fernandez - Future Internet, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are physical systems whose operations are coordinated,
monitored, and controlled by computing and communication functions. These systems are …
monitored, and controlled by computing and communication functions. These systems are …
[HTML][HTML] Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security
AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …
Securing the Future of Web-Enabled IoT: A Critical Analysis of Web of Things Security.
KM Albarrak - Applied Sciences (2076-3417), 2024 - search.ebscohost.com
Abstract The Web of Things (WoT) represents a significant advancement on the Internet of
Things (IoT), where web technologies are integrated to enhance device interoperability and …
Things (IoT), where web technologies are integrated to enhance device interoperability and …
Design security architecture for unmanned aerial vehicles by 5G cloud network based implementation of SDN with NFV and AI
A recent progression of unmanned aerial vehicles (UAV) augmentation its employments for
different applications. It's also vulnerable to being, stolen, lost, stray, or destroyed at status of …
different applications. It's also vulnerable to being, stolen, lost, stray, or destroyed at status of …
[HTML][HTML] Advanced Topics and Smart Systems for Wireless Communications and Networks
Telecommunication has shaped our civilization and fueled economic growth significantly
throughout human history. Wireless communication technologies have continuously …
throughout human history. Wireless communication technologies have continuously …
[HTML][HTML] Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization
AK Alnaim - Future Internet, 2022 - mdpi.com
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-
efficient transition of the hardware infrastructure into a flexible and reliable software platform …
efficient transition of the hardware infrastructure into a flexible and reliable software platform …
[PDF][PDF] Application of Network Function Virtualization in Modern Computer Environments
Ž BOJOVI - 2024 - nowpublishers.com
The intensive growth of the Internet continues with the increase in the number of users.
According to some statistics (https://www. demandsage. com/interne t-user-statistics/), in …
According to some statistics (https://www. demandsage. com/interne t-user-statistics/), in …
The State of Security in Sdn, Nfv, and Network Slicing
AK Alnaim, EB Fernandez - Nfv, and Network Slicing, 2023 - papers.ssrn.com
Abstract 5G, the current generation of communication networks is based on the stan-dards
deftned by 3GPP and other organizations (ETSI, ENISA, NGNM). These standards deftne …
deftned by 3GPP and other organizations (ETSI, ENISA, NGNM). These standards deftne …
A Systematic Review for Misuses Attack Detection based on Data Mining in NFV
Network Function Virtualization could be a quickly advancing innovation that guarantees to
revolutionize the way networks are planned, sent, and overseen. However, as with any …
revolutionize the way networks are planned, sent, and overseen. However, as with any …