Cybersecurity threats and their mitigation approaches using Machine Learning—A Review

M Ahsan, KE Nygard, R Gomes… - … of Cybersecurity and …, 2022 - mdpi.com
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …

A comprehensive survey on the applications of blockchain for securing vehicular networks

T Alladi, V Chamola, N Sahu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Vehicular networks promise features such as traffic management, route scheduling, data
exchange, entertainment, and much more. With any large-scale technological integration …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

[HTML][HTML] Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions

D Javeed, MS Saeed, I Ahmad, M Adil, P Kumar… - Future Generation …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized various sectors by enabling
seamless device interaction. However, the proliferation of IoT devices has also raised …

A review of research on privacy protection of Internet of Vehicles based on blockchain

W Chen, H Wu, X Chen, J Chen - Journal of Sensor and Actuator …, 2022 - mdpi.com
Numerous academic and industrial fields, such as healthcare, banking, and supply chain
management, are rapidly adopting and relying on blockchain technology. It has also been …

Enhancing quantum computation via superposition of quantum gates

J Miguel-Ramiro, Z Shi, L Dellantonio, A Chan… - Physical Review A, 2023 - APS
Overcoming the influence of noise and imperfections in quantum devices is one of the main
challenges for viable quantum applications. In this article, we present different protocols …

A survey on available tools and technologies enabling quantum computing

P Singh, R Dasgupta, A Singh, H Pandey… - IEEE …, 2024 - ieeexplore.ieee.org
In the contemporary era of scientific and technical innovations, we are witnessing
remarkable progress in the realm of quantum computing. Today's phase is referred to as the …

Quantum Computing: Circuits, Algorithms, and Applications

MA Shafique, A Munir, I Latif - IEEE Access, 2024 - ieeexplore.ieee.org
Quantum computing, a transformative field that emerged from quantum mechanics and
computer science, has gained immense attention for its potential to revolutionize …

Efficient Resource Allocation for Building the Metaverse with UAVs: A Quantum Collective Reinforcement Learning Approach

Y Wang, Y He, FR Yu, B Song… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
The Metaverse offers a highly immersive virtual world where users interact with others and
objects in real time through their avatars. The integration of Internet of Things (loT) devices …

Enhancing satellite‐to‐ground communication using quantum key distribution

K Kasliwal, J PN, A Jain, RK Bahl - IET Quantum …, 2023 - Wiley Online Library
Classical Cryptography has been in use for a long time. It has been the only way of securing
people's communication. However, there are some flaws observed during the execution of …