An Avant-Garde African Vulture Optimization (A2VO) based Deep RNN-LSTM Model for 5G-IoT Security

G Ramasubramanian… - Journal of Advanced …, 2023 - semarakilmu.com.my
In current days, 5G is more essential for the Internet of Things (IoT) systems, since it offers a
quicker network with more capacity to address communication needs. The frequency range …

WITHDRAWN: Design of Group Key Agreement Method Based on Elliptic Curve Cryptography in New Energy Extensive Access Security Protection

H Yang, Y Zhang - Heliyon, 2024 - cell.com
Aiming at the security problem of power system communication network under the condition
of extensive access of new energy, we design the group key agreement method based on …

Sdn+ K8s Routing Optimization Strategy in 5G Cloud Edge Collaboration Scenario

C Yan, S Sheng - IEEE Access, 2023 - ieeexplore.ieee.org
The cloud-edge-collaboration framework in the 5G scenario emerged as the times
developing. The horizontal and vertical disassembly of computing power is particularly …

Securing healthcare data: A federated learning framework with hybrid encryption in cluster environments<? pag\vspace*{-12pt}?>

C Srivenkateswaran… - … and Health Care, 2024 - journals.sagepub.com
<? show [AQ ID= GQ2 POS=-20pt]?><? show [AQ ID= GQ5 POS= 12pt]?> The study's novel
contribution is the development and evaluation of a hybrid encryption scheme combining …

Ephemeral Resilient Signcryption and Piecewise Deep Belief Network forReliable with QoS aware Streaming Social Media Data Transmissionin 5G Network

N SURESH, P KANMANI - International Journal of Pharmacy Research & …, 2024 - ijprt.org
Abstract Fifth Generation Mobile Network (5G) is supported by wireless network services to
offer extensive data transmission to improve device-to-device transportation quality, as well …

Chi-Square Detective Ensembled Cardinal Gradient Bootstrap Aggregating Classifier For Secured Big Data Communication

V Saravanan - INFOCOMP Journal of Computer Science, 2024 - infocomp.dcc.ufla.br
The application of big data analytics and related technologies like the Internet of Things (IoT)
facilitates user intentions and behaviors as well as operational decision-making. Security is …