© 2018 Elsevier Ltd Currently, there is no any effective security solution which can detect cyber-attacks against 5G networks where multitenancy and user mobility are some unique characteristics that impose significant challenges over such security solutions. This paper focuses on addressing a transversal detection system to be able to protect at the same time, infrastructures, tenants and 5G users in both edge and core network segments of the 5G multi-tenant infrastructures. A novel approach which significantly extends the capabilities of a commonly used IDS, to accurately identify attacking nodes in a 5G network, regardless of multiple network traffic encapsulations, has been proposed in this paper. The proposed approach is suitable to be...
© 2019 Elsevier Inc. The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireles...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
© 2018 Elsevier Ltd Currently, there is no any effective security solution which can detect cyber-at...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
This paper investigates the effect of common war-driving on wireless network. Different war-driving ...
© 2017, Springer Science+Business Media, LLC. Collusion attacks are among the major security concern...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
© 2015 IPSJ. Wireless networks are spreading continuously, filling our homes and the world around us...
Network intrusion detection systems and antivirus software are essential in detecting malicious netw...
© 1972-2012 IEEE. In this paper, we analyze pilot contamination (PC) attacks on a multi-cell massive...
© 2016 IEEE. Cyber-Attacks are on the rise due to the increased usage of social networking applicati...
Copyright © 2017 John Wiley & Sons, Ltd. The intensity in the requirements of Internet of Things and...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2019 Elsevier Inc. The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireles...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...
© 2018 Elsevier Ltd Currently, there is no any effective security solution which can detect cyber-at...
© 2017 IEEE. This paper discusses the problem of collusion attacks in Internet of Things (IoT) envir...
This paper investigates the effect of common war-driving on wireless network. Different war-driving ...
© 2017, Springer Science+Business Media, LLC. Collusion attacks are among the major security concern...
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance...
© 2015 IPSJ. Wireless networks are spreading continuously, filling our homes and the world around us...
Network intrusion detection systems and antivirus software are essential in detecting malicious netw...
© 1972-2012 IEEE. In this paper, we analyze pilot contamination (PC) attacks on a multi-cell massive...
© 2016 IEEE. Cyber-Attacks are on the rise due to the increased usage of social networking applicati...
Copyright © 2017 John Wiley & Sons, Ltd. The intensity in the requirements of Internet of Things and...
© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering....
Internet‐of‐Thing (IoT) is a rapid‐emerging technology that exploits the concept of internetwork to ...
© 2019 Elsevier Inc. The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireles...
The Internet of Things (IoT), which has accelerated the digital transformation technology revolution...
Wireless Networks lack clear boundaries which leads to security concerns and vulnerabilities to nume...