5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
The advent of Fifth-Generation (5G) networks has introduced significant security challenges
due to increased complexity and diverse use cases. Conventional threat models may fall …
due to increased complexity and diverse use cases. Conventional threat models may fall …
Unraveling trust management in cybersecurity: insights from a systematic literature review
This paper presents the findings of a systematic literature review aimed at elucidating the
key anchors, strategies, methods, and techniques pertinent to trust management (TM) in …
key anchors, strategies, methods, and techniques pertinent to trust management (TM) in …
Building Trust in the Era of 6G: A Level of Trust Assessment Function for Cloud Continuum
JMJ Valero, JAO Lucena, AAP Perales… - 2024 Joint European …, 2024 - ieeexplore.ieee.org
Sixth-Generation Wireless Networks are conceived as dynamic and self-management
scenarios that support end-users to cover their business and network requirements. Endless …
scenarios that support end-users to cover their business and network requirements. Endless …
A Socio-Economic Approach towards Trustworthy 6G Marketplaces of Softwarized Resources
6G provides the promise of sophisticated services dynamically created through the
composition of softwarized resources such as holograms, sensing and related vehicular …
composition of softwarized resources such as holograms, sensing and related vehicular …
Exploring trust management across different network environments
A Angom, N Kar, P Biswas, A Das… - Data Science & …, 2025 - books.google.com
Trust Management (TM) plays a crucial role in the realm of cyber-security as it is
indispensable in the process of mitigating risks associated with cyber threats. It involves …
indispensable in the process of mitigating risks associated with cyber threats. It involves …