A comprehensive survey on 6G and beyond: Enabling technologies, opportunities of machine learning and challenges

AT Jawad, R Maaloul, L Chaari - Computer Networks, 2023 - Elsevier
Multiple nations are now in the process of launching 5G mobile networks. All of the telecoms
industry has been revolutionized by the concept of 5G networks. Since late 2018 …

Data security in smart devices: Advancement, constraints and future recommendations

Z Wenhua, M Kamrul Hasan, AF Ismail, Z Yanke… - IET …, 2023 - Wiley Online Library
Network security protocols are implemented to address network security challenges.
Computer networks and applications have advanced and developed significantly in recent …

Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems

AK Sutrala, MS Obaidat, S Saha, AK Das… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …

A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning

M Nkongolo, JP Van Deventer, SM Kasongo, SR Zahra… - Electronics, 2022 - mdpi.com
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …

Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks

JB Awotunde, S Misra - Illumination of artificial intelligence in cybersecurity …, 2022 - Springer
Security has been a concern in recent years, especially in the Internet of Things (IoT) system
environment, where security and privacy are of great importance. Our lives have significantly …

SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber–physical systems

A Irshad, GA Mallah, M Bilal… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of thriving information and communications technology (ICT) and cyber–
physical systems (CPSs) has spawned several innovative applications, such as remote …

Ugransome1819: A novel dataset for anomaly detection and zero-day threats

M Nkongolo, JP Van Deventer, SM Kasongo - Information, 2021 - mdpi.com
This research attempts to introduce the production methodology of an anomaly detection
dataset using ten desirable requirements. Subsequently, the article presents the produced …

Blockchain and NFTs for time-bound access and monetization of private data

M Madine, K Salah, R Jayaraman, A Battah… - IEEE …, 2022 - ieeexplore.ieee.org
Digital data has enabled organizations to anticipate future threats, opportunities, and trends.
However, digital data owners do not know how their data is accessed, shared, and …

Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks

NS Shaji, T Jain, R Muthalagu, PM Pawar - Computers & Security, 2023 - Elsevier
Abstract This paper proposes Deep-Discovery, an Intrusion Detection System (IDS), to
perform Anomaly Discovery in Software-Defined Networking (SDN) using Artificial Neural …

[PDF][PDF] Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm.

VJ Raymond, RJR Raj, J Retna - Comput. Syst. Sci. Eng., 2023 - cdn.techscience.cn
Android devices are popularly available in the commercial market at different price levels for
various levels of customers. The Android stack is more vulnerable compared to other …