Process Mining and User Privacy in D2D and IoT Networks
<p>As the communication industry is moving towards the 5th generation (5G) of cellular networks and beyond, the traffic it carries is also becoming a mixture of higher and lower data rate rate traffic originating from cellular users and Internet-of-Things (IoT) networks, respectively. The main...
Saved in:
| Main Author: | Muhammad Usman (14150391) (author) |
|---|---|
| Other Authors: | Marwa Qaraqe (10135172) (author), Muhammad Rizwan Asghar (14150394) (author), Imran Shafique Ansari (14150397) (author) |
| Published: |
2019
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study
by: Usman Khalil (7820876)
Published: (2025) -
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
by: Syeda Nazia Ashraf (17541222)
Published: (2023) -
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
by: Muhammad Maaz (5600600)
Published: (2024) -
Edge intelligence for network intrusion prevention in IoT ecosystem
by: Mansura Habiba (17808302)
Published: (2023) -
Intrusion detection system using distributed multilevel discriminator in GAN for IoT system
by: M. Poongodi (14158869)
Published: (2023)