798   Artículos

 
en línea
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jie Zhang, Qiao Wang, Paul Mitchell and Hamed Ahmadi    
Integrated access and backhaul (IAB) networks offer transformative benefits, primarily their deployment flexibility in locations where fixed backhaul faces logistical or financial challenges. This flexibility is further enhanced by IAB?s inherent ability... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jie Zhang, Qiao Wang, Paul Mitchell and Hamed Ahmadi    
Revista: Information    Formato: Electrónico

 
en línea
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Muhammad Sheraz, Teong Chee Chuah, Mardeni Bin Roslee, Manzoor Ahmed, Amjad Iqbal and Ala?a Al-Habashna    
Data caching is a promising technique to alleviate the data traffic burden from the backhaul and minimize data access delay. However, the cache capacity constraint poses a significant challenge to obtaining content through the cache resource that degrade... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu    
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano    
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Emma Fitzgerald and Michal Pióro    
Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed    
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin    
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 47     Siguiente »