Matches in SemOpenAlex for { <https://semopenalex.org/work/W4221036596> ?p ?o ?g. }
- W4221036596 endingPage "2017" @default.
- W4221036596 startingPage "2017" @default.
- W4221036596 abstract "Today's advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible." @default.
- W4221036596 created "2022-04-03" @default.
- W4221036596 creator A5015732743 @default.
- W4221036596 creator A5021038611 @default.
- W4221036596 creator A5028327054 @default.
- W4221036596 creator A5052179681 @default.
- W4221036596 creator A5073849385 @default.
- W4221036596 creator A5091679175 @default.
- W4221036596 date "2022-03-04" @default.
- W4221036596 modified "2023-10-05" @default.
- W4221036596 title "A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks" @default.
- W4221036596 cites W1152223117 @default.
- W4221036596 cites W1549663027 @default.
- W4221036596 cites W181997537 @default.
- W4221036596 cites W1840004984 @default.
- W4221036596 cites W1872088533 @default.
- W4221036596 cites W1916259515 @default.
- W4221036596 cites W194881704 @default.
- W4221036596 cites W1982848031 @default.
- W4221036596 cites W1985020045 @default.
- W4221036596 cites W1998399571 @default.
- W4221036596 cites W2000667443 @default.
- W4221036596 cites W2012546067 @default.
- W4221036596 cites W2014784356 @default.
- W4221036596 cites W2017809722 @default.
- W4221036596 cites W2037026906 @default.
- W4221036596 cites W2037104605 @default.
- W4221036596 cites W2043093854 @default.
- W4221036596 cites W2049188895 @default.
- W4221036596 cites W2099940443 @default.
- W4221036596 cites W2111072639 @default.
- W4221036596 cites W2117646649 @default.
- W4221036596 cites W2118050553 @default.
- W4221036596 cites W2123841179 @default.
- W4221036596 cites W2141409867 @default.
- W4221036596 cites W2146277225 @default.
- W4221036596 cites W2154358621 @default.
- W4221036596 cites W2159473903 @default.
- W4221036596 cites W2168894297 @default.
- W4221036596 cites W2191006491 @default.
- W4221036596 cites W2292027249 @default.
- W4221036596 cites W2334810998 @default.
- W4221036596 cites W2343317594 @default.
- W4221036596 cites W2486454425 @default.
- W4221036596 cites W2511505324 @default.
- W4221036596 cites W2516066574 @default.
- W4221036596 cites W2528158016 @default.
- W4221036596 cites W2546298334 @default.
- W4221036596 cites W2562947506 @default.
- W4221036596 cites W2573665256 @default.
- W4221036596 cites W2594717275 @default.
- W4221036596 cites W2595170736 @default.
- W4221036596 cites W2601682974 @default.
- W4221036596 cites W2605050598 @default.
- W4221036596 cites W2606697812 @default.
- W4221036596 cites W2612558585 @default.
- W4221036596 cites W2615509641 @default.
- W4221036596 cites W2617931713 @default.
- W4221036596 cites W2746170296 @default.
- W4221036596 cites W2772412867 @default.
- W4221036596 cites W2783664444 @default.
- W4221036596 cites W2793130454 @default.
- W4221036596 cites W2806203604 @default.
- W4221036596 cites W2807319534 @default.
- W4221036596 cites W2810408029 @default.
- W4221036596 cites W2810602325 @default.
- W4221036596 cites W2810749629 @default.
- W4221036596 cites W2861867928 @default.
- W4221036596 cites W2886038574 @default.
- W4221036596 cites W2889522674 @default.
- W4221036596 cites W2890608797 @default.
- W4221036596 cites W2897202335 @default.
- W4221036596 cites W2898035736 @default.
- W4221036596 cites W2908954810 @default.
- W4221036596 cites W2913461836 @default.
- W4221036596 cites W2914453659 @default.
- W4221036596 cites W2922223057 @default.
- W4221036596 cites W2922507528 @default.
- W4221036596 cites W2929803724 @default.
- W4221036596 cites W2934285053 @default.
- W4221036596 cites W2934302500 @default.
- W4221036596 cites W2944014533 @default.
- W4221036596 cites W2944858588 @default.
- W4221036596 cites W2950457020 @default.
- W4221036596 cites W2951835514 @default.
- W4221036596 cites W2962883549 @default.
- W4221036596 cites W2963516518 @default.
- W4221036596 cites W2963518686 @default.
- W4221036596 cites W2963721752 @default.
- W4221036596 cites W2964338222 @default.
- W4221036596 cites W2966906412 @default.
- W4221036596 cites W2969519626 @default.
- W4221036596 cites W2969540857 @default.
- W4221036596 cites W2971074067 @default.
- W4221036596 cites W2971276144 @default.
- W4221036596 cites W2972189363 @default.
- W4221036596 cites W2980576170 @default.
- W4221036596 cites W2980702394 @default.