The growth of edge computing, the Internet of Things (IoT), and cloud computing have been accompanied by new security issues evolving in the information security infrastructure …
W Li, W Meng - IEEE Network, 2022 - ieeexplore.ieee.org
Beginning in 2030, sixth generation (6G) mobile communication is expected to play a key role by collecting billions of things, humans, and robots, resulting in zettabytes of digital …
Recently, with the emergence and growth of the internet of things (IoT) as a promising vehicle for sustainable development, the concept of 'smart cities' has advanced significantly …
Insiders might have incentives and objectives opposed to those of the belonging organization. It is hard to detect them because of their privileges that partially protect them. In …
S Ranjithkumar… - Computers, Materials & …, 2022 - pdfs.semanticscholar.org
The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the …
W Li, F Tian, J Li, Y Xiang - Concurrency and Computation …, 2022 - Wiley Online Library
Network intrusions are a big security threat to current computer networks. For protection, collaborative intrusion detection networks (CIDNs) are developed attempting to reach better …
S Siddamsetti, M Srivenkatesh - Ingénierie des Systèmes d' …, 2022 - search.ebscohost.com
Significant research has been done on combining intrusion detection and blockchain to increase data privacy and find both current and future threats. This research suggests a …
K Shoraimov, I Akhmadjonov - Евразийский журнал …, 2022 - in-academy.uz
In today's world, the word malware is synonymous with mysterious programs that spread havoc and sow destruction upon the computing system it infects. These malware are …