Anomaly detection in 6G networks using machine learning methods

MM Saeed, RA Saeed, M Abdelhaq, R Alsaqour… - Electronics, 2023 - mdpi.com
While the cloudification of networks with a micro-services-oriented design is a well-known
feature of 5G, the 6G era of networks is closely related to intelligent network orchestration …

The rise of ransomware: A review of attacks, detection techniques, and future challenges

S Kamil, HSAS Norul, A Firdaus… - … on Business Analytics …, 2022 - ieeexplore.ieee.org
Cybersecurity is important in the field of information technology. One most recent pressing
issue is information security. When we think of cybersecurity, the first thing that comes to …

Making cities smarter: IoT and SDN applications, challenges, and future trends

W Shafik - Opportunities and challenges of industrial IoT in 5G …, 2023 - igi-global.com
The internet of things (IoT) entails all devices that can get onto the internet. This is mainly
because of the technological advancement. This exponential growth of IoT increases on the …

Exploring secure V2X communication networks for human-Centric security and privacy in Smart cities

V Rishiwal, U Agarwal, A Alotaibi, S Tanwar… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) and advanced human-centred technologies have seen rapid
expansion in smart city applications, including smart enterprises, homes, and vehicular …

Attacks detection in 6g wireless networks using machine learning

MM Saeed, RA Saeed, ASA Gaid… - … on Computer and …, 2023 - ieeexplore.ieee.org
Unlike the fifth generation (5G), which is well recognized for network cloudification with
micro-service-oriented design, the sixth generation (6G) of networks is directly tied to …

Data security and privacy in the age of AI and digital twins

MMA Saeed, RA Saeed, ZE Ahmed - Digital twin technology and AI …, 2024 - igi-global.com
Data security and privacy have emerged as businesses struggle with the growing
digitization of operations and the abundance of data in the age of artificial intelligence and …

Navigation and Trajectory Planning Techniques for Unmanned Aerial Vehicles Swarm

NM Elfatih, ES Ali, RA Saeed - Artificial Intelligence for Robotics and …, 2023 - Springer
Navigation and trajectory planning algorithms is one of the most important issues in
unmanned aerial vehicle (UAV) and robotics. Recently, UAV swarm or flying ad-hoc network …

Data-driven techniques and security issues in wireless networks

MM Saeed, ES Ali, RA Saeed - Data-Driven Intelligence in …, 2023 - taylorfrancis.com
The data-Driven Technique is a method that employs real-world data to acquire insight into
system behavior. It allows for the examination of small, simple systems as well as large …

5G Evolution and Supply Chain Security in MENA Region: Challenges and Opportunities

H Altaleb, F Beatrix, F Azemi… - 2024 IEEE 22nd World …, 2024 - ieeexplore.ieee.org
This Article highlights the rapid evolution of mobile technology from 4G to 5G, particularly in
the Middle East and North Africa (MENA) region. By 2030, 5G is expected to dominate with …

Latest advances on security architecture for 5G technology and services

KO Shobowale, Z Mukhtar, B Yahaya… - … Journal of Software …, 2023 - journal.ump.edu.my
Latest Advances on Security Architecture for 5G Technology and Services Page 1
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING & COMPUTER SYSTEMS (IJSECS) …