Industry 5.0 is coming: A survey on intelligent nextG wireless networks as technological enablers
Industry 5.0 vision, a step toward the next industrial revolution and enhancement to Industry
4.0, envisioned the new goals of resilient, sustainable, and human-centric approaches in …
4.0, envisioned the new goals of resilient, sustainable, and human-centric approaches in …
[HTML][HTML] Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey
Abstract Industry 5.0 vision, a step toward the next industrial revolution and enhancement to
Industry 4.0, conceives the new goals of resilient, sustainable, and human-centric …
Industry 4.0, conceives the new goals of resilient, sustainable, and human-centric …
A systematic literature review of authorization and access control requirements and current state of the art for different database models
AKYS Mohamed, D Auer, D Hofer… - International Journal of …, 2024 - emerald.com
Purpose Data protection requirements heavily increased due to the rising awareness of data
security, legal requirements and technological developments. Today, NoSQL databases are …
security, legal requirements and technological developments. Today, NoSQL databases are …
A study of NoSQL query injection in Neo4j
D Van Landuyt, V Wijshoff, W Joosen - Computers & Security, 2024 - Elsevier
Query injection refers to a class of attack types that involve the insertion of maliciously
crafted query parameters in database query operations, and/or API calls. Although these …
crafted query parameters in database query operations, and/or API calls. Although these …
Enabling attribute-based access control in NoSQL databases
NoSQL databases are being increasingly used for efficient management of high volumes of
unstructured data in applications like information retrieval, natural language processing …
unstructured data in applications like information retrieval, natural language processing …
An intermediate representation for rewriting cypher queries
D Hofer, A Mohamed, S Nadschläger… - … Conference on Database …, 2023 - Springer
Some of the current graph database systems provide built-in authorization and access
control features. However, many authorization requirements demand for more sophisticated …
control features. However, many authorization requirements demand for more sophisticated …
Authorization and access control for different database models: Requirements and current state of the art
Traditional SQL-based data stores have been the market leaders for decades. However,
they have drawbacks with today's massive and highly connected data due to their low …
they have drawbacks with today's massive and highly connected data due to their low …
A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol
Real-time communication has witnessed a dramatic increase in recent years in user daily
usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to …
usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to …
Big Data and its Future
M Milli, M Milli - Data Science with Semantic Technologies, 2023 - taylorfrancis.com
Big data is related to many different fields, and it has been studied frequently in the past
decades. Therefore, interdisciplinary cooperation is required to understand what big data …
decades. Therefore, interdisciplinary cooperation is required to understand what big data …
Developing an Efficient Secure Query Processing Algorithm for Unstructured Data on Encrypted Databases
MA Fouly, THA Soliman… - 2022 10th International …, 2022 - ieeexplore.ieee.org
A few years ago, information size increased unexpectedly and a data explosion happened.
In this world of growing information, a change in database generation may also be required …
In this world of growing information, a change in database generation may also be required …