Design guidelines for blockchain-assisted 5G-UAV networks

M Aloqaily, O Bouachir, A Boukerche… - IEEE network, 2021 - ieeexplore.ieee.org
Fifth generation (5G) wireless networks are designed to meet various end-user quality of
service (QoS) requirements through high data rates (typically of gigabits per second) and …

Urldeepdetect: A deep learning approach for detecting malicious urls using semantic vector models

S Afzal, M Asim, AR Javed, MO Beg, T Baker - Journal of Network and …, 2021 - Springer
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts
have been used as weapons for luring susceptible Internet users into executing malicious …

Reconfigurable and intelligent ultrawideband angular sensing: Prototype design and validation

H Joshi, SJ Darak, M Alaee-Kerahroodi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of beyond-licensed spectrum sharing in FR1 (0.45-6 GHz) and FR2 (24-52
GHz) along with the multi-antenna narrow-beam-based directional transmissions demand a …