5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMS
dc.creator | Sh. R, G’ulomov | |
dc.creator | A. A, Sulaymonov | |
dc.creator | M. X., Baymatova | |
dc.date | 2023-06-08 | |
dc.date.accessioned | 2023-08-21T09:08:18Z | |
dc.date.available | 2023-08-21T09:08:18Z | |
dc.description | The development of 5G networks has brought about a new era of high-speed data transmission and connectivity, enabling us to communicate and interact with each other in ways that were previously impossible. However, with this increased connectivity comes an increased risk of cyber threats and security breaches. The security challenges associated with 5G networks are complex and require robust security techniques and algorithms to ensure the safety and privacy of users' data. This article explores the various security threats in 5G networks and discusses the different security techniques and algorithms that can be used to mitigate these threats. The article highlights the importance of developing effective security measures for 5G networks to ensure the protection of sensitive information and the continuity of services. | en-US |
dc.format | application/pdf | |
dc.identifier | https://univerpubl.com/index.php/horizon/article/view/1923 | |
dc.identifier.uri | http://dspace.umsida.ac.id/handle/123456789/22839 | |
dc.language | eng | |
dc.publisher | Universal Publishing INC. | en-US |
dc.relation | https://univerpubl.com/index.php/horizon/article/view/1923/1675 | |
dc.source | Horizon: Journal of Humanity and Artificial Intelligence; Vol. 2 No. 6 (2023): Horizon: Journal of Humanity and Artificial Intelligence; 12-16 | en-US |
dc.source | 2835-3064 | |
dc.source | 2835-3064 | |
dc.subject | 5G networks | en-US |
dc.subject | models | en-US |
dc.subject | algorithms | en-US |
dc.subject | security techniques | en-US |
dc.subject | cyber threats | en-US |
dc.title | 5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMS | en-US |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | Peer-reviewed Article | en-US |