A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …
A survey on space-air-ground-sea integrated network security in 6G
Space-air-ground-sea integrated network (SAGSIN), which integrates satellite
communication networks, aerial networks, terrestrial networks, and marine communication …
communication networks, aerial networks, terrestrial networks, and marine communication …
Well-architected wireless network security
AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …
wireless network security. We examine the fundamental principles of wireless security …
Covert communications: A comprehensive survey
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …
secure techniques, covert communication emerges as a potential solution to security for …
A tutorial on extremely large-scale MIMO for 6G: Fundamentals, signal processing, and applications
Extremely large-scale multiple-input-multiple-output (XL-MIMO), which offers vast spatial
degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth …
degrees of freedom, has emerged as a potentially pivotal enabling technology for the sixth …
Enabling joint communication and radar sensing in mobile networks—A survey
Mobile network is evolving from a communication-only network towards one with joint
communication and radar/radio sensing (JCAS) capabilities, that we call perceptive mobile …
communication and radar/radio sensing (JCAS) capabilities, that we call perceptive mobile …
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
A survey of physical layer security techniques for 5G wireless networks and challenges ahead
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …
theoretic approaches has received significant research interest recently. The key idea …
Evaluating critical security issues of the IoT world: Present and future challenges
Social Internet of Things (SIoT) is a new paradigm where Internet of Things (IoT) merges
with social networks, allowing people and devices to interact, and facilitating information …
with social networks, allowing people and devices to interact, and facilitating information …