A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory

Y Wu, HN Dai, H Wang, Z **ong… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Network slicing has been widely agreed as a promising technique to accommodate diverse
services for the Industrial Internet of Things (IIoT). Smart transportation, smart energy, and …

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

H Kheddar, Y Himeur, AI Awad - Journal of Network and Computer …, 2023 - Elsevier
Globally, the external internet is increasingly being connected to industrial control systems.
As a result, there is an immediate need to protect these networks from a variety of threats …

FH-ACO: Fuzzy heuristic-based ant colony optimization for joint virtual network function placement and routing

M Shokouhifar - Applied Soft Computing, 2021 - Elsevier
Network function virtualization (NFV) is a new networking paradigm, which replaces the
specific-purpose hardware appliances with software virtualization to perform network …

A survey on machine learning techniques for massive MIMO configurations: Application areas, performance limitations and future challenges

PK Gkonis - IEEE Access, 2022 - ieeexplore.ieee.org
The deployment of fifth-generation (5G) broadband wireless cellular networks has enabled
the support of highly demanding applications, paving the way towards global broadband …

Reinforcement-Learning-Based Intrusion Detection in Communication Networks: A Review

H Kheddar, DW Dawoud, AI Awad… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Modern communication networks have to meet the performance requirements of
contemporary industrial control systems (ICSs), which are increasingly being connected to …

BCTrustFrame: enhancing trust management via blockchain and IPFS in 6G era

W Li, W Meng - IEEE Network, 2022 - ieeexplore.ieee.org
Beginning in 2030, sixth generation (6G) mobile communication is expected to play a key
role by collecting billions of things, humans, and robots, resulting in zettabytes of digital …

[PDF][PDF] Deep transfer learning applications in intrusion detection systems: A comprehensive review

H Kheddar, Y Himeur, AI Awad - arxiv preprint arxiv …, 2023 - research.uaeu.ac.ae
Globally, the external Internet is increasingly being connected to the contemporary industrial
control system. As a result, there is an immediate need to protect the network from several …

IQ-impaired wireless-powered modify-and-forward relaying for IoT networks: An in-depth physical-layer security analysis

X Li, H Qi, DT Do, Z Hui, Y Ding… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the large-scale commercialization of 5G networks, the era of Internet of Things (IoT),
which is oriented toward the Internet of Everything (IoE), is coming. Under the circumstance …

How low can you go? A limbo dance for low-latency network functions

S Gallenmüller, F Wiedner, J Naab, G Carle - Journal of Network and …, 2023 - Springer
Throughput is a commonly used performance indicator for networks. However, throughput
may be considered insignificant if data is outdated or networks become unpredictable or …

Security enhanced authentication protocol for space-ground integrated railway networks

Y Wang, W Zhang, X Wang, MK Khan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Software Defined Network (SDN)-based space-ground integrated railway
communication networks have attracted widespread attention from academia and industry …