UAKA-D2D: Universal authentication and key agreement protocol in D2D communications

M Wang, Z Yan, V Niemi - Mobile networks and Applications, 2017 - Springer
… introduced by 3GPP for LTE network in Release 8. It enables … Session Key Generation
process by sending a D2D session … core network entities participate in key generation process. …

Ubar: Towards fully end-to-end task-oriented dialog system with gpt-2

Y Yang, Y Li, X Quan - Proceedings of the AAAI conference on artificial …, 2021 - ojs.aaai.org
… , we show how UBAR models the process of a task-oriented dialog session. In the first turn t
= 0… the number of matched entities under the constraints of the belief state of the current turn. …

[图书][B] 5G core networks: powering digitalization

S Rommer, P Hedman, M Olsson, L Frid, S Sultana… - 2019 - books.google.com
… The network will release and trigger the device to reestablish new sessions as the device
moves around in the network. The network decides to release the session based on operator …

A security awareness and protection system for 5G smart healthcare based on zero-trust architecture

B Chen, S Qiao, J Zhao, D Liu, X Shi… - IEEE internet of …, 2020 - ieeexplore.ieee.org
… concept that assumes all entities involved are not trustable unless … Our zero-trust system
reduces network topologies by shutting … Besides, our system isolates connections between the …

Cloud RAN and MEC: A perfect pairing

A Reznik, LMC Murillo, F Fontes, C Turyagyenda… - 2018 - nru.uncst.go.ug
… (MEC-MANO) entities, which enable applications to run as … provided using techniques such
as network based trilateration … associated temporary identities for each connection session

[PDF][PDF] Developing software for multi-access edge computing

D Sabella, V Sukhomlinov, L Trang, S Kekki… - ETSI white …, 2019 - cloud.report
… API to reserve networking resources in the MEC system (more details … Figure 4 highlights the
entities involved in application … system allows the relocation of the user context for a session

Modeling and evaluation of software defined networking based 5G core network architecture

A Abdulghaffar, A Mahmoud, M Abu-Amara… - IEEE …, 2021 - ieeexplore.ieee.org
… The authors in [24] utilize LTE network entities to propose a … -UPF) connected to the T-NG-RAN
and then sending a session … to release its resources once the handover procedure is …

Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection

M Sarhan, S Layeghy, N Moustafa… - … of Network and Systems …, 2023 - Springer
… IID datasets are used, each representing a unique network environment and attack classes.
… requires a central entity to collect, store, and analyse network data samples collected from …

Detecting insider threats using radish: A system for real-time anomaly detection in heterogeneous data streams

B Böse, B Avasarala, S Tirthapura… - IEEE Systems …, 2017 - ieeexplore.ieee.org
… when an intrusion detection system monitors network activity to … specific to the user or entity
involved. Multiple Tier 1 events are … sessions, that are determined directly from the associated

Incorporating user micro-behaviors and item knowledge into multi-task learning for session-based recommendation

W Meng, D Yang, Y Xiao - Proceedings of the 43rd international ACM …, 2020 - dl.acm.org
… a session. The existing algorithms include Markov-based models and deep neural network
(… to different relations between entities in KGs, but it is still collaborative filtering (CF for short) …