Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security 2018
DOI: 10.5220/0006662700170028
|View full text |Cite
|
Sign up to set email alerts
|

Micro-Segmenting 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…NFV enables customization and isolation of applicationspecific functions. Consequently, collected privacy and confidentiality-critical data flows can be isolated into own network slices [138]. Similarly, ML functions can be application-specific and isolated.…”
Section: ) Security Solutions For Sdnmentioning
confidence: 99%
“…NFV enables customization and isolation of applicationspecific functions. Consequently, collected privacy and confidentiality-critical data flows can be isolated into own network slices [138]. Similarly, ML functions can be application-specific and isolated.…”
Section: ) Security Solutions For Sdnmentioning
confidence: 99%
“…Analysis of user profile based on social networks, user behavior in social networks provides a lot of useful information [8]. Machine learning management is important, because the human user must understand the neural network, aimed at the study of consumer needs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…-it is important to maintain the popularity of a brand or brand at a high level, which requires an increase in such a resource as the reputation, as some authors point out, of a new type of capital [8,16,23];…”
Section: Figure 1: Classification Of Business Models By Degree Of Integration Into E-business [4]mentioning
confidence: 99%