An Avant-Garde African Vulture Optimization (A2VO) based Deep RNN-LSTM Model for 5G-IoT Security
G Ramasubramanian… - Journal of Advanced …, 2023 - semarakilmu.com.my
In current days, 5G is more essential for the Internet of Things (IoT) systems, since it offers a
quicker network with more capacity to address communication needs. The frequency range …
quicker network with more capacity to address communication needs. The frequency range …
WITHDRAWN: Design of Group Key Agreement Method Based on Elliptic Curve Cryptography in New Energy Extensive Access Security Protection
H Yang, Y Zhang - Heliyon, 2024 - cell.com
Aiming at the security problem of power system communication network under the condition
of extensive access of new energy, we design the group key agreement method based on …
of extensive access of new energy, we design the group key agreement method based on …
Sdn+ K8s Routing Optimization Strategy in 5G Cloud Edge Collaboration Scenario
C Yan, S Sheng - IEEE Access, 2023 - ieeexplore.ieee.org
The cloud-edge-collaboration framework in the 5G scenario emerged as the times
develo**. The horizontal and vertical disassembly of computing power is particularly …
develo**. The horizontal and vertical disassembly of computing power is particularly …
Securing healthcare data: A federated learning framework with hybrid encryption in cluster environments<? pag\vspace*{-12pt}?>
C Srivenkateswaran… - … and Health Care, 2024 - journals.sagepub.com
<? show [AQ ID= GQ2 POS=-20pt]?><? show [AQ ID= GQ5 POS= 12pt]?> The study's novel
contribution is the development and evaluation of a hybrid encryption scheme combining …
contribution is the development and evaluation of a hybrid encryption scheme combining …
Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier For Secured Big Data Communication
V Saravanan - INFOCOMP Journal of Computer Science, 2024 - infocomp.dcc.ufla.br
The application of big data analytics and related technologies like the Internet of Things (IoT)
facilitates user intentions and behaviors as well as operational decision-making. Security is …
facilitates user intentions and behaviors as well as operational decision-making. Security is …
Ephemeral Resilient Signcryption and Piecewise Deep Belief Network forReliable with QoS aware Streaming Social Media Data Transmissionin 5G Network
N SURESH, P KANMANI - International Journal of Pharmacy Research & …, 2024 - ijprt.org
Abstract Fifth Generation Mobile Network (5G) is supported by wireless network services to
offer extensive data transmission to improve device-to-device transportation quality, as well …
offer extensive data transmission to improve device-to-device transportation quality, as well …