相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Multiagent Deep-Reinforcement-Learning-Based Virtual Resource Allocation Through Network Function Virtualization in Internet of Things
Hurmat Ali Shah et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems
Chunjie Zhou et al.
PROCEEDINGS OF THE IEEE (2021)
Deep Reinforcement Learning-Based Dynamic Resource Management for Mobile Edge Computing in Industrial Internet of Things
Ying Chen et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Intelligent Resource Slicing for eMBB and URLLC Coexistence in 5G and Beyond: A Deep Reinforcement Learning Based Approach
Madyan Alsenwi et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)
Priority-Based Dynamic Resource Allocation Scheme in Network Slicing
Haneul Ko et al.
35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021) (2021)
Playback of 5G and Beyond Measured MIMO Channels by an ANN-Based Modeling and Simulation Framework
Xiongwen Zhao et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)
Analysis of Traffic Performance on Network Slicing Using Complex Network Theory
Wanqing Guan et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Optimal Virtual Network Function Deployment for 5G Network Slicing in a Hybrid Cloud Infrastructure
Antonio De Domenico et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks
Zhengyi Shang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Rabia Khan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Cost and Security-Aware Resource Allocation in Optical Data Center Networks
Bo Yi et al.
IEEE COMMUNICATIONS LETTERS (2019)
Security for 5G and Beyond
Ijaz Ahmad et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures
Montida Pattaranantakul et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
A Formal Analysis of 5G Authentication
David Basin et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
The Cybersecurity Landscape in Industrial Control Systems
Stephen McLaughlin et al.
PROCEEDINGS OF THE IEEE (2016)
A Survey on Interfaces to Network Security Functions in Network Virtualization
Hyunsu Jang et al.
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015 (2015)
Heterogeneous Hierarchical Coloured Petri Net Software/Hardware Architectural View of Embedded System based on System Behaviours
Mahdi Sahlabadi et al.
4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013) (2013)