[HTML][HTML] A comprehensive study on the role of machine learning in 5G security: Challenges, technologies, and solutions

HN Fakhouri, S Alawadi, FM Awaysheh, IB Hani… - Electronics, 2023 - mdpi.com
Fifth-generation (5G) mobile networks have already marked their presence globally,
revolutionizing entertainment, business, healthcare, and other domains. While this leap …

5G core network control plane: Network security challenges and solution requirements

R Patil, Z Tian, M Gurusamy, J McCloud - Computer Communications, 2024 - Elsevier
The control plane of the 5G Core Network (5GCN) is essential for ensuring reliable and high-
performance 5G communication. It provides critical network services such as authentication …

An overview of artificial intelligence for 5G/6G wireless networks security

A Ahammadi, WH Hassan… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) wireless technologies provide a higher capability for millions of
devices to be connected with low latency and high-speed transmission. However, having a …

SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning

T Saha, N Aaraj, N Ajjarapu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being
deployed across multiple functionalities, ranging from healthcare devices and wearables to …

QoS-aware content delivery in 5G-enabled edge computing: Learning-based approaches

EF Maleki, W Ma, L Mashayekhy… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The increasing demand for high-volume multimedia services through mobile user
equipment (UEs) has imposed a significant burden on mobile networks. To cope with this …

[HTML][HTML] Architecture for self-evolution of 6G core network based on intelligent decision making

L Lu, C Liu, C Zhang, Z Hu, S Lin, Z Liu, M Zhang, X Liu… - Electronics, 2023 - mdpi.com
The rapid progress of 6G mobile communication technologies has sparked a great deal
research interests. The 6G core network architecture faces formidable challenges due to the …

Machine learning-based efficient and generalizable cybersecurity frameworks

T Saha - 2022 - search.proquest.com
Cyber-attacks are becoming more convoluted and complex every day. Thus, constant
vigilance is necessary to protect the confidentiality, integrity, and availability of digital …

Artificial intelligence for system security assurance: A systematic literature review

SF Wen, A Shukla, B Katt - International Journal of Information Security, 2025 - Springer
Abstract System Security Assurance (SSA) has emerged as a critical methodology for
organizations to verify the trustworthiness of their systems by evaluating security measures …

Nlp-based cross-layer 5g vulnerabilities detection via fuzzing generated run-time profiling

Z Wang, Y Wang - 2023 IEEE 12th International Conference on …, 2023 - ieeexplore.ieee.org
The effectiveness and efficiency of 5G software stack vulnerability and unintended behavior
detection are essential for 5G assurance, especially for its applications in critical …

[HTML][HTML] Graph-based multi-label classification for WiFi network traffic analysis

G Granato, A Martino, A Baiocchi, A Rizzi - Applied Sciences, 2022 - mdpi.com
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated
tools relying on a large number of features. Mathematical modeling is extremely difficult …