Abstract is missing.
- Attacks Against Security Context in 5G NetworkZhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu. 3-17 [doi]
- A Systematic Approach to Security Management in the MonB5G ArchitectureSlawomir Kuklinski, Jacek Wytrebowicz. 18-32 [doi]
- A Study on 5G Security Activities in JapanSeongHan Shin. 33-47 [doi]
- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G NetworksBorja Bordel, Ramón Alcarria, Joaquín Chung, Ivan Armuelles Voinov. 48-62 [doi]
- Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security VulnerabilitiesDowon Kim, Ilsun You, Seongmin Park, SungMoon Kwon. 63-81 [doi]
- Parameters Transfer Framework for Multi-domain Fake News DetectionRafal Kozik, Krzysztof Samp, Michal Choras, Marek Pawlicki. 85-96 [doi]
- Security SFC Path Selection Using Deep Reinforcement LearningShuangxing Deng, Man Li, Qi Guo, Huachun Zhou. 97-107 [doi]
- Data Sub-sampling Method for Developing Personalized Human Activity Model Based on Incremental LearningJeongbin Lee, Jaewoong Kang, Mye M. Sohn. 108-121 [doi]
- A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge BaseOuyang Liu, Kun Li, Ziwei Yin, Huachun Zhou. 122-133 [doi]
- Recent Challenges in a New Distributed Learning ParadigmSandi Rahmadika, Bayu Ramadhani Fajri, Geovanne Farell, Ahmaddul Hadi, Khairi Budayawan. 134-144 [doi]
- Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 BitsS. K. Karthika, Kunwar Singh. 147-164 [doi]
- Blind Decryption and Private Information DeliveryAkihiro Yamamura. 165-179 [doi]
- Using Machine Learning for Detecting Timing Side-Channel Attacks in SDNFaizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, Chau Nguyen. 180-194 [doi]
- A Token-Based Access Control Mechanism for the Internet of Things Using BlockchainYuzheng Yang, Zhe Tu, Haoxiang Song, Huachun Zhou. 195-206 [doi]
- DyBAnd: Dynamic Behavior Based Android Malware DetectionShashank Jaiswal, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni. 209-219 [doi]
- The Enhancement of FlexE Network Performance Based on Network Calculus TheoryKaiqiang Gao, Zhihui Wang, Juan Pan, Yuhang Pang, Lei Wei, Song Jiang. 220-230 [doi]
- Security Consideration of Each Layers in a Cloud-Native EnvironmentYoungsoo Kim, Cheolhee Park, YongYoon Shin. 231-242 [doi]
- Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and DefenseShih-Ting Chiu, Heru Susanto, Fang-Yie Leu. 243-253 [doi]
- Enhanced MQTT Method with IoT Data Priority Controls for Scalability and Realiability on Early Landslide Warning SystemNoriki Uchida, Shigeyuki Endo, Tomoyuki Ishida, Hiroaki Yuze, Yoshitaka Shibata. 257-267 [doi]
- Blockchain-Based Terminal Access Control in Software Defined NetworkBingcheng Jiang, Qian He, Qi Pan, Mingliu He. 268-279 [doi]
- A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction FeaturesRuichi Yan, Guohua Tian, Shichong Tan, Zhengtao Jiang. 280-291 [doi]
- A Blockchain-Based Framework for Audio Copyright DepositionRidong Huang, Jianmao Xiao, Jing Zhao, Jiangyu Wang, Yuhang Zhang, Siqi Chen, Jianyu Zou, Yuanlong Cao, Youliang Ma. 292-307 [doi]
- A Trust-Based Blockchain System for Secured Migration of BLE Devices in IoT NetworksErukala Suresh Babu, Aswani Devi Aguru, Bhukya Padma. 308-322 [doi]
- Web API Verifier for IoTtalk and Its ApplicationsWen-Yu Lin, Min-Zheng Shieh, Yi-Bing Lin. 323-337 [doi]