A comprehensive review on the users' identity privacy for 5G networks

MM Saeed, MK Hasan, AJ Obaid, RA Saeed… - IET …, 2022 - Wiley Online Library
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …

[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.

JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …

Anomaly detection in 6G networks using machine learning methods

MM Saeed, RA Saeed, M Abdelhaq, R Alsaqour… - Electronics, 2023 - mdpi.com
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …

[PDF][PDF] A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks.

S Rani, A Sangwan, K Kumar, K Nisar… - … Materials & Continua, 2023 - cdn.techscience.cn
In recent years, there has been a rapid growth in Underwater Wireless Sensor Networks
(UWSNs). The focus of research in this area is now on solving the problems associated with …

Green machine learning approach for QoS improvement in cellular communications

MM Saeed, RA Saeed, MA Azim, ES Ali… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
Green cellular communications are becoming an important approach due to large-scale and
complex radio networks. Due to the dynamic cellular network behaviors related to …

A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability

B Zahednejad, H Teng, S Kosari… - International Journal of …, 2023 - Wiley Online Library
With the rapid development of Internet of Things (IoT), designing a secure two‐factor
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …

Data Security and Privacy in the Age of AI and Digital Twins

MMA Saeed, RA Saeed, ZE Ahmed - Digital Twin Technology and AI …, 2024 - igi-global.com
Data security and privacy have emerged as businesses struggle with the growing
digitization of operations and the abundance of data in the age of artificial intelligence and …

Attacks Detection in 6G Wireless Networks using Machine Learning

MM Saeed, RA Saeed, ASA Gaid… - … on Computer and …, 2023 - ieeexplore.ieee.org
Unlike the fifth generation (5G), which is well recognized for network cloudification with
micro-service-oriented design, the sixth generation (6G) of networks is directly tied to …

Machine Learning Techniques for Detecting DDOS Attacks

MM Saeed, HNR Mohammed… - … on Emerging Smart …, 2023 - ieeexplore.ieee.org
The development witnessed by the world of science and technology and the emergence of
the Internet, where cybersecurity has become one of the most important areas that are …

Efficient Deep Post-Decision State Learning for Privacy-Conscious Offloading in MEC-Enabled 6G Networks

MM Saeed, RA Mokhtar, MS Elbasheir… - … Internet of Things …, 2024 - ieeexplore.ieee.org
With the growing demand for data-intensive applications, offloading tasks to multi-access
edge computing (MEC) servers has become essential. However, privacy concerns arise as …