Machine learning models for secure data analytics: A taxonomy and threat model

R Gupta, S Tanwar, S Tyagi, N Kumar - Computer Communications, 2020 - Elsevier
In recent years, rapid technological advancements in smart devices and their usage in a
wide range of applications exponentially increases the data generated from these devices …

Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - Journal of Network and Computer …, 2022 - Elsevier
Physical layer security (PLS) has proven to be a potential solution for enhancing the security
performance of future 5G networks, which promises to fulfill the demands of increasing user …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

Device to device communication: A survey

MK Pedhadiya, RK Jha, HG Bhatt - Journal of Network and Computer …, 2019 - Elsevier
With the advanced communication technology, the number of users and applications are
increasing exponentially leading towards the scarcity of resources and an increase in power …

A survey on energy efficient 5G green network with a planned multi-tier architecture

IB Sofi, A Gupta - Journal of Network and Computer Applications, 2018 - Elsevier
In 5G green network, a serving of the major purposes or demands that should be tended to,
are extended capacity, improved information rate, reduced latency, and better quality of …

Attack categorisation for IoT applications in critical infrastructures, a survey

E Staddon, V Loscri, N Mitton - applied sciences, 2021 - mdpi.com
With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the
number of attack possibilities increases. Furthermore, with the incorporation of the IoT into …

Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network

A Gupta, RK Jha, P Gandotra… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
All over the world, there is a gigantic stir in the number of subscribers which gave rise to
numerous challenges, like interference management and capacity enhancement. The …

Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network

R Devi, RK Jha, A Gupta, S Jain, P Kumar - AEU-International Journal of …, 2017 - Elsevier
In the present scenario, the demand for extended coverage, low latency and increased data
rate is the need of the hour. Many emerging 5G technologies like massive Multiple Input …

[PDF][PDF] Secure Protocols And Virtual Private Networks: An Evaluation.

R Angelo - Issues in Information Systems, 2019 - iacis.org
Network protocols are by their design insecure and open to threats from cybercriminals.
Secure network protocols, such as L2TP, IPsec, TLS, and OpenVPN need to be …

Attack modeling and intrusion detection system for 5G wireless communication network

A Gupta, RK Jha, S Jain - International Journal of …, 2017 - Wiley Online Library
Research has been going around the globe to overcome the challenges that are associated
with the increase in the number of users, such as interference management, load sharing …