A bibliometric approach to quantitatively assess current research trends in 5G security
暂无分享,去创建一个
Junaid Arshad | Muhammad Mubashir Khan | M. Najmul Islam Farooqui | J. Arshad | M. M. Khan | M. Farooqui
[1] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[2] Chaomei Chen,et al. The proximity of co-citation , 2011, Scientometrics.
[3] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[4] Tanesh Kumar,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[5] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.
[6] Emmanuel Bertin,et al. A survey on authentication and access control for mobile networks: from 4G to 5G , 2019, Annals of Telecommunications.
[7] Hui Li,et al. A Survey on Security Aspects for 3GPP 5G Networks , 2020, IEEE Communications Surveys & Tutorials.
[8] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[9] Xihua Liu,et al. Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks , 2019, Mobile Networks and Applications.
[10] Adlen Ksentini,et al. Toward Slicing-Enabled Multi-Access Edge Computing in 5G , 2020, IEEE Network.
[11] Jisun Jung. International Research Collaboration among Academics in China and South Korea , 2012 .
[12] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[13] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[14] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[15] Ying Ding,et al. Scientific collaboration and endorsement: Network analysis of coauthorship and citation networks , 2011, J. Informetrics.
[16] Yongjun Ren,et al. Blockchain-based trust establishment mechanism in the internet of multimedia things , 2020, Multimedia Tools and Applications.
[17] Andrei Gurtov,et al. Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.
[18] Prabhakar Krishnan,et al. A lightweight authentication scheme for 5G mobile communications: a dynamic key approach , 2021, Journal of Ambient Intelligence and Humanized Computing.
[19] Sabrina Sicari,et al. 5G In the internet of things era: An overview on security and privacy challenges , 2020, Comput. Networks.
[20] Ludo Waltman,et al. Software survey: VOSviewer, a computer program for bibliometric mapping , 2009, Scientometrics.
[21] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[22] Yan Xu,et al. Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks , 2020, IEEE Transactions on Vehicular Technology.
[23] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[24] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[25] Jean Pierre Courtial,et al. A coword analysis of scientometrics , 1994, Scientometrics.
[26] Shunliang Zhang,et al. Towards secure 5G networks: A Survey , 2019, Comput. Networks.
[27] Georgios Mantas,et al. Key Management for Beyond 5G Mobile Small Cells: A Survey , 2019, IEEE Access.
[28] Sanjeev Jain,et al. Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.
[29] Jean Pierre Courtial,et al. Historical scientometrics? Mapping over 70 years of biological safety research with coword analysis , 1993, Scientometrics.
[30] Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[31] Emmanuel Bertin,et al. 5G-SSAAC: Slice-specific Authentication and Access Control in 5G , 2019, 2019 IEEE Conference on Network Softwarization (NetSoft).
[32] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[33] Zibin Zheng,et al. Blockchain for Internet of Things: A Survey , 2019, IEEE Internet of Things Journal.
[34] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[35] Lin Zhang,et al. A privacy preserving scheme for vehicle-to-everything communications using 5G mobile edge computing , 2020, Comput. Networks.
[36] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[37] Diana Pamela Moya Osorio,et al. Survey on physical layer security for 5G wireless networks , 2020, Annals of Telecommunications.
[38] Henry G. Small,et al. Co-citation in the scientific literature: A new measure of the relationship between two documents , 1973, J. Am. Soc. Inf. Sci..
[39] Johan A. Wallin,et al. The bibliometric analysis of scholarly production: How great is the impact? , 2015, Scientometrics.
[40] Bo Yi,et al. A comprehensive survey of Network Function Virtualization , 2018, Comput. Networks.
[41] Vahid Garousi,et al. A systematic literature review of literature reviews in software testing , 2016, Inf. Softw. Technol..
[42] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[43] Min Chen,et al. Cognitive Internet of Vehicles , 2018, Comput. Commun..
[44] Ruxandra F. Olimid,et al. 5G Network Slicing: A Security Overview , 2020, IEEE Access.
[45] Min Chen,et al. Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.
[46] S. N. Singh,et al. Mapping the intellectual structure of scientometrics: a co-word analysis of the journal Scientometrics (2005–2010) , 2014, Scientometrics.
[47] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[48] Nor Badrul Anuar,et al. The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..