A comprehensive review on the users' identity privacy for 5G networks
Fifth Generation (5G) is the final generation in mobile communications, with minimum
latency, high data throughput, and extra coverage. The 5G network must guarantee very …
latency, high data throughput, and extra coverage. The 5G network must guarantee very …
[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian… - … Materials & Continua, 2022 - cdn.techscience.cn
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …
applications. The user uploads the data in the cloud has less security due to the unreliable …
Anomaly detection in 6G networks using machine learning methods
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …
[PDF][PDF] A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks.
In recent years, there has been a rapid growth in Underwater Wireless Sensor Networks
(UWSNs). The focus of research in this area is now on solving the problems associated with …
(UWSNs). The focus of research in this area is now on solving the problems associated with …
Green machine learning approach for QoS improvement in cellular communications
Green cellular communications are becoming an important approach due to large-scale and
complex radio networks. Due to the dynamic cellular network behaviors related to …
complex radio networks. Due to the dynamic cellular network behaviors related to …
A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability
B Zahednejad, H Teng, S Kosari… - International Journal of …, 2023 - Wiley Online Library
With the rapid development of Internet of Things (IoT), designing a secure two‐factor
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …
Data Security and Privacy in the Age of AI and Digital Twins
Data security and privacy have emerged as businesses struggle with the growing
digitization of operations and the abundance of data in the age of artificial intelligence and …
digitization of operations and the abundance of data in the age of artificial intelligence and …
Attacks Detection in 6G Wireless Networks using Machine Learning
Unlike the fifth generation (5G), which is well recognized for network cloudification with
micro-service-oriented design, the sixth generation (6G) of networks is directly tied to …
micro-service-oriented design, the sixth generation (6G) of networks is directly tied to …
Machine Learning Techniques for Detecting DDOS Attacks
MM Saeed, HNR Mohammed… - … on Emerging Smart …, 2023 - ieeexplore.ieee.org
The development witnessed by the world of science and technology and the emergence of
the Internet, where cybersecurity has become one of the most important areas that are …
the Internet, where cybersecurity has become one of the most important areas that are …
Efficient Deep Post-Decision State Learning for Privacy-Conscious Offloading in MEC-Enabled 6G Networks
MM Saeed, RA Mokhtar, MS Elbasheir… - … Internet of Things …, 2024 - ieeexplore.ieee.org
With the growing demand for data-intensive applications, offloading tasks to multi-access
edge computing (MEC) servers has become essential. However, privacy concerns arise as …
edge computing (MEC) servers has become essential. However, privacy concerns arise as …