Beltiukov et al., 2023
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| De Keersmaeker et al. | A survey of public IoT datasets for network security research | |
| Suomalainen et al. | Machine learning threatens 5G security | |
| Talal et al. | Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review | |
| Abbas et al. | Mobile edge computing: A survey | |
| Nguyen et al. | Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks | |
| Alcaraz et al. | Security of industrial sensor network-based remote substations in the context of the internet of things | |
| Soldani et al. | ebpf: A new approach to cloud-native observability, networking and security for current (5g) and future mobile networks (6g and beyond) | |
| Al Shuhaimi et al. | Software defined network as solution to overcome security challenges in IoT | |
| Gkonis et al. | Leveraging network data analytics function and machine learning for data collection, resource optimization, security and privacy in 6G networks | |
| Bekri et al. | Internet of things management based on software defined networking: a survey | |
| Kalnoor et al. | RETRACTED ARTICLE: IoT-based smart environment using intelligent intrusion detection system | |
| Qiao et al. | Characterizing flow, application, and user behavior in mobile networks: A framework for mobile big data | |
| Beltiukov et al. | Pinot: Programmable infrastructure for networking | |
| Alam et al. | IoT virtualization: A survey of software definition & function virtualization techniques for internet of things | |
| US20210152578A1 (en) | System and method for protecting a communication device against identification outside a computer network by routing traffic through a smart hub | |
| US11647000B2 (en) | System and method for protecting a communication device against identification outside a computer network by generating random and normalized non-IoT traffic | |
| Mirdula et al. | MUD enabled deep learning framework for anomaly detection in IoT integrated smart building | |
| Tapan | Efficient service for next generation network slicing architecture and mobile traffic analysis using machine learning technique | |
| Prabhu | OVERVIEW-FOG COMPUTING AND INTERNET-OF-THINGS (IOT). | |
| Zhong et al. | Security and Privacy for Next-Generation Wireless Networks | |
| Shuba et al. | Antmonitor: A system for on-device mobile network monitoring and its applications | |
| Gupta et al. | Fog computing& IoT: Overview, architecture and applications | |
| Liu et al. | Federated learning on 5g edge for industrial internet of things | |
| Gentile et al. | Safeguarding sensitive data in the era of IoT: a study on security protocols for distributed measurement systems | |
| Sivan et al. | Analysis of location data leakage in the Internet traffic of Android-based mobile devices |