Telemedicine Monitoring System Based on Fog/Edge Computing: A Survey

Q He, Z **, Z Feng, Y Teng, L Ma… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Telemedicine Monitoring (TM) integrates mobile communication technology and Internet of
Things (IoT) technology for health monitoring and data management. Amidst the escalating …

Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

AK Alnaim - International Journal of Information Security, 2024 - Springer
Abstract 5G, the current generation of communication networks is based on the standards
defined by 3GPP and other organizations (ETSI, ENISA, NGMN). These standards define …

Provably efficient security-aware service function tree composing and embedding in multi-vendor networks

D Zheng, H **ng, L Feng, X Cao - Computer Networks, 2024 - Elsevier
Multicast greatly benefits many emerging applications such as federated learning,
metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services …

Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective.

B Zahran, N Ahmed, AR Alzoubaidi… - … Journal of Advanced …, 2024 - search.ebscohost.com
Abstract Network Function Virtualization (NFV) delivers numerous benefits to customers
since it is a cost-effective evolution of legacy networks, allowing for rapid network …

Cost optimization in security-aware service function chain deployment with diverse vendors

D Zheng, X Liu, W Tang, H Xu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …

Machine learning algorithms for enhancing intrusion detection within SDN/NFV

A Sahbi, F Jaidi, A Bouhoula - 2023 International Wireless …, 2023 - ieeexplore.ieee.org
Emerging networks envisage to establish a modern digital society that tends to be more
valuable on both social and economic levels. The objective is to resolve current network …

Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks

C Wang, D Zheng, X Liu, W Tang, H Xu, X Cao - Computer Networks, 2025 - Elsevier
Frequent cyber-attacks compel service providers to employ security-aware service functions
(S-SFs) while delivering network services. Typically, one S-SF can be implemented by …

Offline and real-time policy-based management for virtualized services: Conflict and redundancy detection, and automated resolution

H Suwi, N Kara, OA Wahab, C Edstrom… - Journal of Network and …, 2024 - Springer
Abstract Network Function Virtualization (NFV) is a new technology that allows service
providers to improve the cost efficiency of network service provisioning. This is …

Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover

A Prayogi, RF Aji - Jurnal RESTI (Rekayasa Sistem dan Teknologi …, 2023 - jurnal.iaii.or.id
The Covid-19 pandemic has kept almost everyone at home and forced them to perform
online activities using their mobile gadgets. Penetration of the Internet and mobile use is …

Agile Software Development with Secure and Scrum-Centric Approach

Ö Kasım - AJIT-e: Academic Journal of Information Technology, 2024 - dergipark.org.tr
The fulfillment of agile models is crucial for ensuring that a software development project's
tasks are completed efficiently and collaboratively. The definitions of the project architecture …