Toward integrating intelligence and programmability in open radio access networks: A comprehensive survey

A Arnaz, J Lipman, M Abolhasan, M Hiltunen - Ieee Access, 2022 - ieeexplore.ieee.org
Open RAN is an emerging vision and an advancement of the Radio Access Network (RAN).
Its purpose is to implement a vendor and network-generation agnostic RAN, provide …

Airborne wireless sensor networks for airplane monitoring system

S Gao, X Dai, Y Hang, Y Guo… - … and Mobile Computing, 2018 - Wiley Online Library
In traditional airplane monitoring system (AMS), data sensed from strain, vibration,
ultrasound of structures or temperature, and humidity in cabin environment are transmitted to …

An SDNFV-based DDoS defense technology for smart cities

C Xu, H Lin, Y Wu, X Guo, W Lin - IEEE Access, 2019 - ieeexplore.ieee.org
A software defined networking (SDN)-enabled smart city is a new paradigm that can
effectively improve the cost efficiency and flexibility of data management through data …

Vulnerabilities analysis and defense based on MAS method in fast dynamic wireless networks

I Burlachenko, I Zhuravska… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
Corporate and large-scale organizations utilize computer network technologies and dismiss
the importance of networks security. The main wireless networks vulnerabilities exploitered …

Taxonomy and future threat of rogue access point for wireless network

KC Patel, A Patel - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …

Rogue access point: The WLAN threat

KC Patel, A Patel - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Due to the wireless airspace's limited size and capacity and its restriction to network teams,
numerous businesses and organisations involved in wireless security have fought and …

[PDF][PDF] N-tier modelling of robust key management for secure data aggregation in wireless sensor network

J Metan, KNN Murthy - International Journal of Electrical and Computer …, 2019 - core.ac.uk
Security problems in Wireless Sensor Network (WSN) have been researched from more
than a decade. There are various security approaches being evolving towards resisting …

Next-Generation Communication Networks: Wired or Wireless—A Big Question!

M Malhotra, IK Aulakh - ICT Analysis and Applications: Proceedings of …, 2020 - Springer
Network is called as a good network if the packet/data delivery is on time or delay rate is as
much as it can be tolerated but if the delay rate is high then the network resources are being …

Network Intrusion Detection using Deep Learning

L Sama - 2022 - vuir.vu.edu.au
As network size expands rapidly, network intrusions become more frequent, dynamic, and
sophisticated. The topic of how to detect intrusions in such a vast network is crucial and …

COMPARISON OF SOFTWARE AND HARDWARE BASED INTRUSION PREVENTION SYSTEMS

C Yardımcı, M Ersoy - International Journal of 3D Printing Technologies … - dergipark.org.tr
In this study, attacks in three different scenarios were organized by Nmap and H**3 tools
on the virtual Kali server to physical servers running two software-based, open source …