While 5G is at the early deployment state around the globe, the research and industrial communities have already started concentrating their efforts on formulating the overall 6G …
M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the Internet of Things (IoT), decentralized approaches for trust management are gaining …
G Bavassano, C Ferrari, A Tei - Research in Transportation Business & …, 2020 - Elsevier
Despite its historical resilience to innovation, several novel technologies (eg IoT, AIS data, and automation) have recently been introduced in the maritime sector: the majority of them …
In recent times, ransomware has become the most significant cyber-attack targeting individuals, enterprises, healthcare industries, and the Internet of Things (IoT). Existing …
G Wang, C Li, Y Huang, X Wang, Y Luo - Knowledge-Based Systems, 2022 - Elsevier
The emergence of mobile edge computing can provide technical support for the development of Internet services and for coping with massive data traffic, thereby reducing …
T Alyas, K Alissa, M Alqahtani, T Faiz… - Mobile Information …, 2022 - Wiley Online Library
This rapidly changing digital world is always sensitive to improving security and resilience to protect the inhabitants of this ecosystem in terms of data, processes, repositories …
The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent …
L Huang, Q Zhu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Recent incidents such as the Colonial Pipeline ransomware attack and the SolarWinds hack have shown that traditional defense techniques are becoming insufficient to deter …
Cyber security faces challenges in detecting and mitigating complex attacks. Security solutions have employed Attack Graphs (AGs) for modeling multi-stage attacks, but …