5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions.
Muhammad AdilHoubing SongMuhammad Khurram KhanAhmed FaroukZhanpeng JinPublished in: J. Netw. Comput. Appl. (2024)
Keyphrases
- security and privacy issues
- security problems
- security concerns
- security issues
- lessons learned
- information security
- ubiquitous and pervasive
- intrusion detection
- radio frequency identification rfid
- open systems
- security requirements
- access control
- recent trends
- security policies
- security threats
- computing infrastructure
- innovative approaches
- data mining
- network security
- future trends
- technical solutions
- information processing systems
- intelligence community
- intrusion detection and prevention
- emerging technologies
- intellectual property protection
- computer networks
- design principles
- key issues
- identity management
- st century
- network services
- academic researchers
- legal issues
- statistical databases
- advanced technologies
- security mechanisms
- technological solutions
- information technology
- enabling technologies
- information systems
- privacy issues
- real world
- cyber security