|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Jie Zhang, Qiao Wang, Paul Mitchell and Hamed Ahmadi
Integrated access and backhaul (IAB) networks offer transformative benefits, primarily their deployment flexibility in locations where fixed backhaul faces logistical or financial challenges. This flexibility is further enhanced by IAB?s inherent ability...
ver más
|
|
|
|
|
|
|
Jie Zhang, Qiao Wang, Paul Mitchell and Hamed Ahmadi
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Muhammad Sheraz, Teong Chee Chuah, Mardeni Bin Roslee, Manzoor Ahmed, Amjad Iqbal and Ala?a Al-Habashna
Data caching is a promising technique to alleviate the data traffic burden from the backhaul and minimize data access delay. However, the cache capacity constraint poses a significant challenge to obtaining content through the cache resource that degrade...
ver más
|
|
|
|
|
|
|
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit...
ver más
|
|
|
|
|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
Emma Fitzgerald and Michal Pióro
Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent s...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo...
ver más
|
|
|
|