Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Security in software defined networks: A survey

I Ahmad, S Namal, M Ylianttila… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Software defined networking (SDN) decouples the network control and data planes. The
network intelligence and state are logically centralized and the underlying network …

SDN security review: Threat taxonomy, implications, and open challenges

M Rahouti, K Xiong, Y Xin… - IEEE …, 2022 - ieeexplore.ieee.org
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible,
and programmatically efficient configuration of networks to revolutionize network control and …

5G security: Analysis of threats and solutions

I Ahmad, T Kumar, M Liyanage… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
5G will provide broadband access everywhere, entertain higher user mobility, and enable
connectivity of massive number of devices (eg Internet of Things (IoT)) in an ultrareliable and …

A systematic review on distributed denial of service attack defense mechanisms in programmable networks

BL Dalmazo, JA Marques, LR Costa… - … Journal of Network …, 2021 - Wiley Online Library
Design flaws and vulnerabilities inherent to network protocols, devices, and services make
Distributed Denial of Service (DDoS) a persisting threat in the cyberspace, despite decades …

A survey of across social networks user identification

L Xing, K Deng, H Wu, P Xie, HV Zhao, F Gao - IEEE Access, 2019 - ieeexplore.ieee.org
With the popularization of the Internet and the arrival of the big data era, numerous different
social networks (SNs) have emerged to satisfy users' social needs and offer them rich …

Security & privacy in software defined networks, issues, challenges and cost of developed solutions: a systematic literature review

N Ahmed, KA Bakar, FT Zuhra, T Kehkashan… - International Journal of …, 2022 - Springer
Due to fast development in digital systems, the traditional network architecture is becoming
inadequate for the requirements of new technologies such as Cloud Computing, Internet of …

Traffic scheduling for deep packet inspection in software‐defined networks

H Huang, P Li, S Guo - Concurrency and computation: practice …, 2017 - Wiley Online Library
Deep packet inspection (DPI) is important for network security. In this paper, we consider a
software‐defined network where several DPI proxy nodes are available for serving flows …

Future internets escape the simulator

M Berman, P Demeester, JW Lee, K Nagaraja… - Communications of the …, 2015 - dl.acm.org
Future internets escape the simulator Page 1 78 COMMUNICATIONS OF THE ACM | JUNE
2015 | VOL. 58 | NO. 6 review articles IMA GE B Y OMEL CHENK O DOI:10.1145/2699392 …

Improving software defined cognitive and secure networking

I Ahmad - arXiv preprint arXiv:2007.05296, 2020 - arxiv.org
Traditional communication networks consist of large sets of vendor-specific manually
configurable devices which are hardwired with specific control logic or algorithms. The …