Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

[HTML][HTML] Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of …, 2017 - journalofcloudcomputing …
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

A survey on FinTech

K Gai, M Qiu, X Sun - Journal of Network and Computer Applications, 2018 - Elsevier
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term covers a large …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning

A Azmoodeh, A Dehghantanha… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …

A survey on 5G: The next generation of mobile communication

N Panwar, S Sharma, AK Singh - Physical Communication, 2016 - Elsevier
The rapidly increasing number of mobile devices, voluminous data, and higher data rate are
pushing to rethink the current generation of the cellular mobile communication. The next or …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
With the increasing utilization of the Internet and its provided services, an increase in cyber-
attacks to exploit the information occurs. A technology to store and maintain user's …

[HTML][HTML] Insights into financial technology (FinTech): a bibliometric and visual study

B Li, Z Xu - Financial innovation, 2021 - Springer
This paper conducted a comprehensive analysis based on bibliometrics and science
mapping analysis. First, 848 publications were obtained from Web of Science. Their …

Intelligent cryptography approach for secure distributed big data storage in cloud computing

Y Li, K Gai, L Qiu, M Qiu, H Zhao - Information Sciences, 2017 - Elsevier
Implementing cloud computing empowers numerous paths for Web-based service offerings
to meet diverse needs. However, the data security and privacy has become a critical issue …