5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach

RA Khan, HU Khan, HS Alwageed… - IEEE Open Journal …, 2025 - ieeexplore.ieee.org
The advent of Fifth-Generation (5G) networks has introduced significant security challenges
due to increased complexity and diverse use cases. Conventional threat models may fall …

Unraveling trust management in cybersecurity: insights from a systematic literature review

A Pigola, F de Souza Meirelles - Information Technology and …, 2024 - Springer
This paper presents the findings of a systematic literature review aimed at elucidating the
key anchors, strategies, methods, and techniques pertinent to trust management (TM) in …

Building Trust in the Era of 6G: A Level of Trust Assessment Function for Cloud Continuum

JMJ Valero, JAO Lucena, AAP Perales… - 2024 Joint European …, 2024 - ieeexplore.ieee.org
Sixth-Generation Wireless Networks are conceived as dynamic and self-management
scenarios that support end-users to cover their business and network requirements. Endless …

A Socio-Economic Approach towards Trustworthy 6G Marketplaces of Softwarized Resources

L Jagadeesan, I Malanchini… - 2024 IEEE 100th …, 2024 - ieeexplore.ieee.org
6G provides the promise of sophisticated services dynamically created through the
composition of softwarized resources such as holograms, sensing and related vehicular …

Exploring trust management across different network environments

A Angom, N Kar, P Biswas, A Das… - Data Science & …, 2025 - books.google.com
Trust Management (TM) plays a crucial role in the realm of cyber-security as it is
indispensable in the process of mitigating risks associated with cyber threats. It involves …