Industry 5.0 is coming: A survey on intelligent nextG wireless networks as technological enablers

S Zeb, A Mahmood, SA Khowaja, K Dev… - arXiv preprint arXiv …, 2022 - arxiv.org
Industry 5.0 vision, a step toward the next industrial revolution and enhancement to Industry
4.0, envisioned the new goals of resilient, sustainable, and human-centric approaches in …

[HTML][HTML] Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey

S Zeb, A Mahmood, SA Khowaja, K Dev… - Journal of Network and …, 2023 - Elsevier
Abstract Industry 5.0 vision, a step toward the next industrial revolution and enhancement to
Industry 4.0, conceives the new goals of resilient, sustainable, and human-centric …

A systematic literature review of authorization and access control requirements and current state of the art for different database models

AKYS Mohamed, D Auer, D Hofer… - International Journal of …, 2024 - emerald.com
Purpose Data protection requirements heavily increased due to the rising awareness of data
security, legal requirements and technological developments. Today, NoSQL databases are …

A study of NoSQL query injection in Neo4j

D Van Landuyt, V Wijshoff, W Joosen - Computers & Security, 2024 - Elsevier
Query injection refers to a class of attack types that involve the insertion of maliciously
crafted query parameters in database query operations, and/or API calls. Although these …

Enabling attribute-based access control in NoSQL databases

E Gupta, S Sural, J Vaidya… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
NoSQL databases are being increasingly used for efficient management of high volumes of
unstructured data in applications like information retrieval, natural language processing …

An intermediate representation for rewriting cypher queries

D Hofer, A Mohamed, S Nadschläger… - … Conference on Database …, 2023 - Springer
Some of the current graph database systems provide built-in authorization and access
control features. However, many authorization requirements demand for more sophisticated …

Authorization and access control for different database models: Requirements and current state of the art

A Mohamed, D Auer, D Hofer, J Küng - International Conference on Future …, 2022 - Springer
Traditional SQL-based data stores have been the market leaders for decades. However,
they have drawbacks with today's massive and highly connected data due to their low …

A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol

A Al-Allawee, P Lorenz, A Abouaissa, M Abualhaj - Network, 2022 - mdpi.com
Real-time communication has witnessed a dramatic increase in recent years in user daily
usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to …

Big Data and its Future

M Milli, M Milli - Data Science with Semantic Technologies, 2023 - taylorfrancis.com
Big data is related to many different fields, and it has been studied frequently in the past
decades. Therefore, interdisciplinary cooperation is required to understand what big data …

Developing an Efficient Secure Query Processing Algorithm for Unstructured Data on Encrypted Databases

MA Fouly, THA Soliman… - 2022 10th International …, 2022 - ieeexplore.ieee.org
A few years ago, information size increased unexpectedly and a data explosion happened.
In this world of growing information, a change in database generation may also be required …