Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond

A Imanbayev, S Tynymbayev, R Odarchenko… - Sensors, 2022 - mdpi.com
The introduction of fifth generation mobile networks is underway all over the world which
makes many people think about the security of the network from any hacking. Over the past …

Machine learning modelling of a membrane capacitive deionization (MCDI) system for prediction of long-term system performance and optimization of process control …

Y Zhu, B Lian, Y Wang, C Miller, C Bales, J Fletcher… - Water Research, 2022 - Elsevier
Abstract Membrane Capacitive Deionization (MCDI) is a promising electrochemical
technique for water desalination. Previous studies have confirrmed the effectiveness of …

[PDF][PDF] PSAP-WSN: a provably secure authentication protocol for 5g-based wireless sensor networks

X Li, S Liu, S Kumari, CM Chen - CMES—Comput. Model. Eng …, 2023 - cdn.techscience.cn
Nowadays, the widespread application of 5G has promoted rapid development in different
areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of …

Green machine learning approach for QoS improvement in cellular communications

MM Saeed, RA Saeed, MA Azim, ES Ali… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
Green cellular communications are becoming an important approach due to large-scale and
complex radio networks. Due to the dynamic cellular network behaviors related to …

Energy efficient resource allocation method for 5G access network based on reinforcement learning algorithm

S Zhao - Sustainable Energy Technologies and Assessments, 2023 - Elsevier
Abstract Edge computing and IIoT (Industrial Internet of Things) are two representative
application scenarios in 5G (5th Generation) mobile communication technology network …

A Systematic Literature Review on 5G Security

I Sahni, A Kaur - arXiv preprint arXiv:2212.03299, 2022 - arxiv.org
It is expected that the creation of next-generation wireless networks would result in the
availability of high-speed and low-latency connectivity for every part of our life. As a result, it …

[PDF][PDF] Latest advances on security architecture for 5G technology and services

KO Shobowale, Z Mukhtar, B Yahaya… - … Journal of Software …, 2023 - journal.ump.edu.my
Latest Advances on Security Architecture for 5G Technology and Services Page 1
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING & COMPUTER SYSTEMS (IJSECS) …

A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments

G Nebbione, MC Calzarossa - IEEE Access, 2023 - ieeexplore.ieee.org
The pervasiveness of complex technological infrastructures and services coupled with the
continuously evolving threat landscape poses new sophisticated security risks. These risks …

Real-time intrusion detection and prevention system for 5G and beyond software-defined networks

R Bocu, M Iavich - Symmetry, 2022 - mdpi.com
The philosophy of the IoT world is becoming important for a projected, always-connected
world. The 5G networks will significantly improve the value of 4G networks in the day-to-day …

[PDF][PDF] 5G-SPECTOR: An O-RAN Compliant Layer-3 Cellular Attack Detection Service

H Wen, P Porras, V Yegneswaran… - Proceedings of the …, 2024 - cse.ohio-state.edu
Over the past several years, the mobile security community has discovered a wide variety of
exploits against link and session-establishment protocols. These exploits can be …