Toward integrating intelligence and programmability in open radio access networks: A comprehensive survey

A Arnaz, J Lipman, M Abolhasan, M Hiltunen - Ieee Access, 2022 - ieeexplore.ieee.org
Open RAN is an emerging vision and an advancement of the Radio Access Network (RAN).
Its purpose is to implement a vendor and network-generation agnostic RAN, provide …

Airborne wireless sensor networks for airplane monitoring system

S Gao, X Dai, Y Hang, Y Guo… - … and Mobile Computing, 2018 - Wiley Online Library
In traditional airplane monitoring system (AMS), data sensed from strain, vibration,
ultrasound of structures or temperature, and humidity in cabin environment are transmitted to …

An SDNFV-based DDoS defense technology for smart cities

C Xu, H Lin, Y Wu, X Guo, W Lin - IEEE Access, 2019 - ieeexplore.ieee.org
A software defined networking (SDN)-enabled smart city is a new paradigm that can
effectively improve the cost efficiency and flexibility of data management through data …

Vulnerabilities analysis and defense based on MAS method in fast dynamic wireless networks

I Burlachenko, I Zhuravska… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
Corporate and large-scale organizations utilize computer network technologies and dismiss
the importance of networks security. The main wireless networks vulnerabilities exploitered …

Taxonomy and future threat of rogue access point for wireless network

KC Patel, A Patel - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …

Rogue Access Point: The WLAN Threat

KC Patel, A Patel - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Due to the wireless airspace's limited size and capacity and its restriction to network teams,
numerous businesses and organisations involved in wireless security have fought and …

不合法AP 的治理方法綜整

郭幸香, 李墨軒, 史賀文 - TANET2019 臺灣網際網路研討會, 2019 - airitilibrary.com
資通訊科技的進步, IoT 與5G 時代的來臨, 越來越高海量的無線網路傳輸服務需求,
使得普及的Wi-Fi 接入點(AP), 路由器和熱點成為高度曝露的攻擊面, 攻擊者可透過設置不合法 …

[PDF][PDF] N-tier modelling of robust key management for secure data aggregation in wireless sensor network

J Metan, KNN Murthy - International …, 2019 - download.garuda.kemdikbud.go.id
Security problems in Wireless Sensor Network (WSN) have been researched from more
than a decade. There are various security approaches being evolving towards resisting …

Next-Generation Communication Networks: Wired or Wireless—A Big Question!

M Malhotra, IK Aulakh - ICT Analysis and Applications: Proceedings of …, 2020 - Springer
Network is called as a good network if the packet/data delivery is on time or delay rate is as
much as it can be tolerated but if the delay rate is high then the network resources are being …

Network Intrusion Detection using Deep Learning

L Sama - 2022 - vuir.vu.edu.au
As network size expands rapidly, network intrusions become more frequent, dynamic, and
sophisticated. The topic of how to detect intrusions in such a vast network is crucial and …