[HTML][HTML] Ml-based 5g network slicing security: A comprehensive survey

R Dangi, A Jadhav, G Choudhary, N Dragoni… - Future Internet, 2022 - mdpi.com
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband
and communication services. There has been a continuing advancement from 4G to 5G …

Network slicing security: Challenges and directions

VA Cunha, E da Silva, MB de Carvalho… - Internet Technology …, 2019 - Wiley Online Library
Network slicing emerges as a key technology in next generation networks, boosted by the
integration of software‐defined networking and network functions virtualization. However …

[HTML][HTML] Readability research: An interdisciplinary approach

S Beier, S Berlow, E Boucaud… - … and Trends® in …, 2022 - nowpublishers.com
The control provided by digital displays over how visual information is presented to readers
has the potential to improve reading for each and every reader, regardless of ability or …

QRscript: Embedding a Programming Language in QR codes to support Decision and Management

S Scanzio, G Cena, A Valenzano - 2022 IEEE 27th …, 2022 - ieeexplore.ieee.org
Embedding a programming language in a QR code is a new and extremely promising
opportunity, as it makes devices and objects smarter without necessarily requiring an …

Security-aware Service Function Chaining and Embedding with Asymmetric Dedicated Protection

B Wang, J Li, S Cao, E Guler, D Zheng - IEEE Access, 2024 - ieeexplore.ieee.org
In the 5G and beyond 5G networks, achieving security-aware data transmission needs to
convert clients' requests into a service function chain (SFC), each service function (SF) …

The role of security orchestrator in network slicing for future networks

S Wijethilaka, M Liyanage - Journal of Communications and …, 2023 - ieeexplore.ieee.org
The traditional paradigm of connecting mobile devices over the telecommunication networks
for voice communication has evolved to a myriad of novel applications with heterogeneous …

Towards service function chaining and embedding for multi-security guarantee levels

B Wang, X Cao, C Peng, J Li… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
In the emerging 5G networks, achieving security-aware data transmission needs to
converting clients' requests into a service function chain (SFC), each service function (SF) of …

Modelling and automatic mapping of cyber security requirements for industrial applications: Survey, problem exposition, and research focus

M Ehrlich, L Wisniewski, H Trsek… - 2018 14th ieee …, 2018 - ieeexplore.ieee.org
The rapid process of digitalisation has an advanced impact on the industrial automation and
manufacturing domain. In order to support all the upcoming technologies and paradigm …

Virtual network embedding based on security level with VNF placement

D Dwiardhika, T Tachibana - Security and Communication …, 2019 - Wiley Online Library
In this paper, in order to embed virtual networks by considering network security, we
propose a virtual network embedding based on security level with VNF placement. In this …

Optimal construction of service function chains based on security level for improving network security

D Dwiardhika, T Tachibana - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, in order to improve network security, we propose an optimal placement of
security virtual network function (security VNF) for service function chains based on the …