Security and privacy on 6g network edge: A survey
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …
A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks
A Boualouache, T Engel - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly
accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G …
accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G …
A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things
Artificial Intelligence of Medical Things (AIoMT) is a hybrid of the Internet of Medical Things
(IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …
(IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …
Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces
M Kim, J Ben-Othman, H Kim - Vehicular Communications, 2024 - Elsevier
The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability
to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion …
to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion …
AI-driven EEC for healthcare IoT: Security challenges and future research directions
Emerging edge computing (EEC) has been introduced as an innovative paradigm for the
healthcare applications of the Internet of Things (IoT) that aims to distribute the network …
healthcare applications of the Internet of Things (IoT) that aims to distribute the network …
Developing a Testbed with P4 to Generate Datasets for the Analysis of 5G-MEC Security
Service providers have now entered the implementation phase for 5G mobile
telecommunication networks. With this, the concept of Multi-access Edge Computing (MEC) …
telecommunication networks. With this, the concept of Multi-access Edge Computing (MEC) …
On cooperative federated defense to secure multi-access edge computing
H Sedjelmaci, N Ansari - IEEE Consumer Electronics Magazine, 2022 - ieeexplore.ieee.org
The research of cyber security for multiaccess edge computing (MEC) has not yet received
great interest. Specifically, the attack detection issue is considered as a major concern since …
great interest. Specifically, the attack detection issue is considered as a major concern since …
An intelligent trusted edge data production method for distributed Internet of things
J Zhang, Z Ning, H Cao - Neural Computing and Applications, 2023 - Springer
The rapid development of distributed edge intelligence in the Internet of things (IoT)
scenarios has resulted in massive edge devices continuously generating data, leading to …
scenarios has resulted in massive edge devices continuously generating data, leading to …
Semantic-based Federated Defense for Distributed Malicious Attacks
F Ullah, D Cacciagrano, CM Chen… - IEEE Consumer …, 2024 - ieeexplore.ieee.org
Consumer electronics, particularly Android, has become the leading mobile ecosystem due
to its accessibility and adaptability. However, the constant connectivity of Android apps …
to its accessibility and adaptability. However, the constant connectivity of Android apps …