51 | -- | 52 | . Guest Editorial: Security Architecture and Technologies for 5G |
53 | -- | 60 | Jiaqi Li, Zhifeng Zhao, Rongpeng Li. Machine learning-based IDS for software-defined 5G network |
61 | -- | 67 | Jiaxin Zeng, Yuanlong Cao, Fenfen Ke, Minghe Huang, Guanghe Zhang, Wei Lu. Performance evaluation of secure multipath retransmission mechanism in next generation heterogeneous communication systems |
68 | -- | 73 | Ping Xie, Moli Zhang, Gaoyuan Zhang, Ruijuan Zheng, Ling Xing, Qingtao Wu. On physical-layer security for primary system in underlay cognitive radio networks |
74 | -- | 84 | Vu Viet Hoang Pham, Shui Yu, Keshav Sood, Lei Cui. Privacy issues in social networks and analysis: a comprehensive survey |
85 | -- | 90 | Juan Du, Ping Xie, Junlong Zhu, Ruijuan Zheng, Qingtao Wu, Mingchuan Zhang. Method for detecting abnormal behaviour of users based on selective clustering ensemble |