Study and investigation on 5G technology: A systematic review
In wireless communication, Fifth Generation (5G) Technology is a recent generation of
mobile networks. In this paper, evaluations in the field of mobile communication technology …
mobile networks. In this paper, evaluations in the field of mobile communication technology …
Comprehensive review on misbehavior detection for vehicular ad hoc networks
X Xu, Y Wang, P Wang - Journal of Advanced Transportation, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong
demand for security because the data sent in VANETs influence vehicles' behavior. Existing …
demand for security because the data sent in VANETs influence vehicles' behavior. Existing …
Machine-learning-assisted security and privacy provisioning for edge computing: A survey
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …
millions of sensors and provide services at the device end. The broad vision of EC integrates …
Cyber security challenges in aviation communication, navigation, and surveillance
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment
Abstract Cognitive Internet of Things (CIoT) supports the organizations to learn from the
information (data) arriving from various connected devices, sensors, machines and other …
information (data) arriving from various connected devices, sensors, machines and other …
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
Implantable internet of things medical devices (IoTMD) has drawn a disruptive
transformation in the healthcare domain. It has improved the services of healthcare …
transformation in the healthcare domain. It has improved the services of healthcare …
[PDF][PDF] Cybsersecurity issues in robotics
Cybersecurity in Robotics is a rapidly develo** area that draws attention from practitioners
and researchers. An increase in cyber-attacks, combined with the development of …
and researchers. An increase in cyber-attacks, combined with the development of …
Jamming detection in IoT wireless networks: An edge-AI based approach
Wireless enabling technologies in critical infrastructures are increasing the efficiency of
communications. In the era of 5G and beyond, more technologies will be allowed to connect …
communications. In the era of 5G and beyond, more technologies will be allowed to connect …
A jamming attack detection technique for opportunistic networks
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of …
restrictions, with intermittent connectivity. These nodes are subject to various types of …
Group key agreement protocol among terminals of the intelligent information system for mobile edge computing
Q Zhang, L Zhu, R Wang, J Li, J Yuan… - … Journal of Intelligent …, 2022 - Wiley Online Library
Security communication and information sharing among mobile devices are important
application technologies of the intelligent information system (IIS). Because IIS is vulnerable …
application technologies of the intelligent information system (IIS). Because IIS is vulnerable …