Articles with "security technology" as a keyword



Photo from archive.org

Overview of 5G security technology

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9426-4

Abstract: The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of… read more here.

Keywords: security technology; technology; overview security; security ... See more keywords
Photo by alexkixa from unsplash

Systematic Review on Identification and Prediction of Deep Learning-Based Cyber Security Technology and Convergence Fields

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14040683

Abstract: Recently, as core technologies leading the fourth industrial revolution, such as the Internet of Things (IoT), 5G, the cloud, and big data, have promoted smart convergence across national socio-economic infrastructures, cyber systems are expanding and… read more here.

Keywords: technology; security technology; convergence fields; security ... See more keywords