Maximizing Security and Efficiency in 5G Networks by Means of Quantum Cryptography and Network Slicing Concepts.
Sergiy DorozhynskyiIhor ZakutynskyiMyroslav RyabyyAnatolii SkurativskyiPublished in: IDAACS (2023)
Keyphrases
- network structure
- enterprise network
- information security
- network model
- network size
- network topologies
- complex networks
- computer networks
- security issues
- network parameters
- network management
- security threats
- cellular networks
- telecommunication networks
- community structure
- network design
- heterogeneous networks
- social networks
- counter propagation
- ns simulator
- real world networks
- network resources
- network nodes
- transport network
- information diffusion
- cyber attacks
- fully connected
- internet traffic
- network traffic
- internet service providers
- communication networks
- scale free
- security measures
- optical networks
- elliptic curve cryptography
- link prediction
- security mechanisms
- network layer
- connectionist networks
- cryptographic algorithms
- recurrent networks
- ip addresses
- network analysis
- wireless sensor networks
- access control
- intrusion detection
- wireless networks
- network security
- community detection
- security policies
- small world
- centrality measures
- security level
- cryptographic protocols
- power law
- social network analysis
- mobile nodes
- encryption algorithms
- peer to peer