[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey

AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos - Internet of Things, 2022 - Elsevier
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z Jin - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

[PDF][PDF] Distributed reflection denial of service attack: A critical review

RR Nuiaa, S Manickam… - International Journal of …, 2021 - researchgate.net
As the world becomes increasingly connected and the number of users grows exponentially
and “things” go online, the prospect of cyberspace becoming a significant target for …

DDoS attacks detection in 5G networks: hybrid model with statistical and higher-order statistical features

D Dahiya - Cybernetics and Systems, 2023 - Taylor & Francis
Numerous factors are causing wireless networks to carry an increasing volume of traffic,
which is developing quickly. The 5 G mobile networks target a variety of new used cases that …

Challenges and Opportunities in Mobile Network Security for Vertical Applications: A Survey

Á Sobrinho, M Vilarim, A Barbosa… - ACM Computing …, 2023 - dl.acm.org
Ensuring the security of vertical applications in fifth-generation (5G) mobile communication
systems and previous generations is crucial. These systems must prioritize maintaining the …

Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey

K Chaitanya, S Narayanan - 2023 IEEE International Students' …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSN) playa significant role in the collection and transmission of
data. The principal data collectors and broadcasters are small wireless sensor nodes. As a …

Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary

A Yudhana, I Riadi - MATRIK: Jurnal …, 2022 - journal.universitasbumigora.ac.id
Forensik jaringan sangat dibutuhkan dalam mempertahankan kinerja jaringan komputer
dari serangan Distributed Denial of Service (DDoS). Penelitian ini bertujuan untuk …

Preventing DRDoS attacks in 5G networks: a new source IP address validation approach

X Chen, W Feng, Y Ma, N Ge… - GLOBECOM 2020-2020 …, 2020 - ieeexplore.ieee.org
Distributed Reflection Denial of Service (DRDoS) attack has become one of the most serious
threats to Internet security. With the ongoing development of 5G, a massive number of …

A Dynamic Framework for Internet-Based Network Time Protocol

KAA Gamage, A Sajid, OS Sonbul, M Rashid, AY Jaffar - Sensors, 2024 - mdpi.com
Time synchronization is vital for accurate data collection and processing in sensor networks.
Sensors in these networks often operate under fluctuating conditions. However, an accurate …

[HTML][HTML] DFMS: Differential flow management scheme for denial of service impact mitigation in 5G communications

P Sakthibalan, K Devarajan - Journal of King Saud University-Computer …, 2022 - Elsevier
Abstract Quality of Service (QoS) in a fifth-generation communication network is leveraged
through its interoperable information communication technologies. This interoperability …