An exhaustive survey on security and privacy issues in Healthcare 4.0
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …
A systematic review on NOMA variants for 5G and beyond
Over the last few years, interference has been a major hurdle for successfully implementing
various end-user applications in the fifth-generation (5G) of wireless networks. During this …
various end-user applications in the fifth-generation (5G) of wireless networks. During this …
The duo of artificial intelligence and big data for industry 4.0: Applications, techniques, challenges, and future research directions
The increasing need for economic, safe, and sustainable smart manufacturing combined
with novel technological enablers has paved the way for artificial intelligence (AI) and big …
with novel technological enablers has paved the way for artificial intelligence (AI) and big …
Blockchain envisioned UAV networks: Challenges, solutions, and comparisons
Abstract Unmanned Aerial Vehicles (UAV) or drones is a technology with a huge potential
for proving different efficient solutions in the smart city. It has been mostly adopted by …
for proving different efficient solutions in the smart city. It has been mostly adopted by …
Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are
increasing exponentially. However, framing resilient and correct smart contracts (SCs) for …
increasing exponentially. However, framing resilient and correct smart contracts (SCs) for …
Metaomnicity: Toward immersive urban metaverse cyberspaces using smart city digital twins
K Kuru - IEEE Access, 2023 - ieeexplore.ieee.org
The movie—The Matrix (1999)—boosted our imagination about how further we can be
immersed within the cyber world, ie, how further the cyber world can be indistinguishable …
immersed within the cyber world, ie, how further the cyber world can be indistinguishable …
Machine learning models for secure data analytics: A taxonomy and threat model
In recent years, rapid technological advancements in smart devices and their usage in a
wide range of applications exponentially increases the data generated from these devices …
wide range of applications exponentially increases the data generated from these devices …
[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
Optimal 5G network slicing using machine learning and deep learning concepts
Network slicing is predetermined to hold up the diversity of emerging applications with
enhanced performance and flexibility requirements in the way of splitting the physical …
enhanced performance and flexibility requirements in the way of splitting the physical …
A taxonomy of AI techniques for 6G communication networks
With 6G flagship program launched by the University of Oulu, Finland, for full future
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …