Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research …

H Elazhary - Journal of network and computer applications, 2019 - Elsevier
Currently, we are experiencing a technological shift, which is expected to change the way
we program and interact with the world. Cloud computing and mobile computing are two …

Infrastructure for generating new ids dataset

J Uramová, P Scgeč, M Moravčík… - 2018 16th …, 2018 - ieeexplore.ieee.org
This article describes the proposal of a system that was designed for effective network
monitoring, analysis of network infiltration, and archiving of network flows for their later …

Management of cybersecurity incidents in virtual lab

J Uramová, P Segeč, J Papán… - 2020 18th international …, 2020 - ieeexplore.ieee.org
Article provides guidance on how to implement an introductory course at university during
one semester for future cybersecurity analysts, built on the basis of the Cisco Certified …

[引用][C] A Sales force automation [SFA] solution for a complexly diversified organization

M Chathuranga - 2019