Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions

    Heejae Park1, Tri-Hai Nguyen2, Laihyuk Park1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 13-41, 2024, DOI:10.32604/cmes.2024.052394 - 20 August 2024

    Abstract The emergence of various technologies such as terahertz communications, Reconfigurable Intelligent Surfaces (RIS), and AI-powered communication services will burden network operators with rising infrastructure costs. Recently, the Open Radio Access Network (O-RAN) has been introduced as a solution for growing financial and operational burdens in Beyond 5G (B5G) and 6G networks. O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs. By disaggregating conventional Base Band Units (BBUs) into O-RAN Distributed Units (O-DU) and O-RAN Centralized Units (O-CU), O-RAN offers greater flexibility for upgrades and network automation. However, this openness introduces new security More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610 - 22 March 2021

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437 - 01 March 2021

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques More >

Displaying 1-10 on page 1 of 3. Per Page