Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

Social Network Spam Detection Based on ALBERT and Combination of Bi‐LSTM with Self‐Attention

G Xu, D Zhou, J Liu - Security and Communication Networks, 2021 - Wiley Online Library
Social networks are full of spams and spammers. Although social network platforms have
established a variety of strategies to prevent the spread of spam, strict information review …

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

G Choudhary, V Sharma - 5G enabled secure wireless networks, 2019 - Springer
The 5G networks have the capability to provide high compatibility for the new applications,
industries, and business models. These networks can tremendously improve the quality of …

AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs

Z Tan, DK Wu, T Gao, I You, V Sharma - Future Generation Computer …, 2019 - Elsevier
The openness and virtuality of Online Social Networks (OSNs) make it a hotbed of rapid
propagation for various kinds of frauds and erroneous information. Ergo, there is an exigent …

5G wireless P2MP backhaul security protocol: An adaptive approach

J Kim, G Choudhary, J Heo, DG Duguma… - EURASIP Journal on …, 2019 - Springer
Abstract 5G has introduced various emerging demands for new services and technologies
that raised the bar for quality of service, latency, handovers, and data rates. Such diverse …

A Deep Dive Into Cybersecurity Risk Assessment and Countermeasures in Online Social Networks

A Zineddine, Y Belfaik, Y Sadqi - Risk Assessment and …, 2024 - igi-global.com
In the evolving realm of online social networks (OSNs), assessing cybersecurity risks and
implementing effective countermeasures are crucial for practitioners. This chapter confronts …

Aggregate authentication for massive Internet of Things in 5G networks

A Syalim, B Anggorojati, J Baek, D Gerbi… - Mobile Internet Security …, 2020 - Springer
Abstract Massive Internet of Things (IoT) applications are characterized by a massive
number of low-powered devices with small data storage. In those applications …

LSTM Based Advanced Fake News Detection

Aditya, V Sihag, G Choudhary - International Conference on Information …, 2021 - Springer
The digital era is proliferating, and we are in a time where we interact with lots of information
in many ways. Life has become more sensitive with social media, and in the present …

[PDF][PDF] Literature Review on Current security Issues in Pervasive Computing

R Jothi, M Nikila, S Gowri - researchgate.net
There has been a third wave of computing, and ubiquitous computing and communication
has arisen from that wave. Pervasive computing and communication works with the …