[HTML][HTML] Open RAN security: Challenges and opportunities
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …
(Radio Access Network), which defines interfaces that support inter-operation between …
MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …
existing scope of science. The concepts of automated driving, augmented-reality, and …
Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G
J Wang, H Han, H Li, S He… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Due to high capacity and fast transmission speed, 5G plays a key role in modern electronic
infrastructure. Meanwhile, sparse tensor factorization (STF) is a useful tool for dimension …
infrastructure. Meanwhile, sparse tensor factorization (STF) is a useful tool for dimension …
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges
Next‐generation wireless communication networks, in particular, the densified 5G will bring
many developments to the existing telecommunications industry. The key benefits will be the …
many developments to the existing telecommunications industry. The key benefits will be the …
Strategic analysis and development plan design on digital transformation in the energy industry: A global perspective
P Liu, C Lu - International Journal of Energy Research, 2021 - Wiley Online Library
This paper conducts strategic analysis and development plan design of energy digital
transformation from a global perspective. First, this paper analyzes the reasons for the digital …
transformation from a global perspective. First, this paper analyzes the reasons for the digital …
Machine learning for 5G security: Architecture, recent advances, and challenges
The granularization of crucial network functions implementation using software-centric, and
virtualized approaches in 5G networks have brought forth unprecedented security …
virtualized approaches in 5G networks have brought forth unprecedented security …
Bio-inspired network security for 5G-enabled IoT applications
K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …
Multi-layer attack graph analysis in the 5g edge network using a dynamic hexagonal fuzzy method
HA Kholidy - Sensors, 2021 - mdpi.com
Overall, 5G networks are expected to become the backbone of many critical IT applications.
With 5G, new tech advancements and innovation are expected; 5G currently operates on …
With 5G, new tech advancements and innovation are expected; 5G currently operates on …
Network slicing security controls and assurance for verticals
T Wichary, J Mongay Batalla, CX Mavromoustakis… - Electronics, 2022 - mdpi.com
This paper focuses on the security challenges of network slice implementation in 5G
networks. We propose that network slice controllers support security by enabling security …
networks. We propose that network slice controllers support security by enabling security …
Cyber security threats for 5G networks
JP Mohan, N Sugunaraj… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
The fifth-generation mobile network (5G) services have the potential to provide high-speed
connectivity to a large user base with excellent benchmarks on low latencies, large capacity …
connectivity to a large user base with excellent benchmarks on low latencies, large capacity …