Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

[HTML][HTML] From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets

JR Saura, D Ribeiro-Soriano… - International Journal of …, 2021 - Elsevier
In recent years, strategies focused on data-driven innovation (DDI) have led to the
emergence and development of new products and business models in the digital market …

[PDF][PDF] 5G based Blockchain network for authentic and ethical keyword search engine.

M Poongodi, M Malviya, M Hamdi, V Vijayakumar… - IET …, 2022 - researchgate.net
The evolution of 4G telecommunication propagated various resource-crunched clients to
experience rate-effective resources at ease. However, it extends its underlying centralised …

A review of 6G autonomous intelligent transportation systems: Mechanisms, applications and challenges

X Deng, L Wang, J Gui, P Jiang, X Chen, F Zeng… - Journal of Systems …, 2023 - Elsevier
Thanks to the explosive evolution of 6G, Artificial intelligence, Blockchain, Cloud computing,
Data, and Edge computing (6G+ ABCDE), it is possible to make Intelligent Transportation …

[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations

A Mishra, YI Alzoubi, MJ Anwar, AQ Gill - Computers & Security, 2022 - Elsevier
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …

How many gigabytes per hectare are available in the digital agriculture era? A digitization footprint estimation

A Kayad, M Sozzi, DS Paraforos… - … and Electronics in …, 2022 - Elsevier
The applications of digital agriculture technologies are increasing rapidly with increased
interest from the new generation of farmers to use digital solutions. Such technologies …

[HTML][HTML] Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

[HTML][HTML] A review on secure data deduplication: Cloud storage security issue

P Prajapati, P Shah - Journal of King Saud University-Computer and …, 2022 - Elsevier
Cloud storage service providers caters to the need of organizations and individuals by
allowing them to store, transfer and backup their ever-increasing amount of data at low cost …

Explainable, domain-adaptive, and federated artificial intelligence in medicine

A Chaddad, Q Lu, J Li, Y Katib, R Kateb… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
Artificial intelligence (AI) continues to transform data analysis in many domains. Progress in
each domain is driven by a growing body of annotated data, increased computational …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …