5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMS

dc.creatorSh. R, G’ulomov
dc.creatorA. A, Sulaymonov
dc.creatorM. X., Baymatova
dc.date2023-06-08
dc.date.accessioned2023-08-21T09:08:18Z
dc.date.available2023-08-21T09:08:18Z
dc.descriptionThe development of 5G networks has brought about a new era of high-speed data transmission and connectivity, enabling us to communicate and interact with each other in ways that were previously impossible. However, with this increased connectivity comes an increased risk of cyber threats and security breaches. The security challenges associated with 5G networks are complex and require robust security techniques and algorithms to ensure the safety and privacy of users' data. This article explores the various security threats in 5G networks and discusses the different security techniques and algorithms that can be used to mitigate these threats. The article highlights the importance of developing effective security measures for 5G networks to ensure the protection of sensitive information and the continuity of services.en-US
dc.formatapplication/pdf
dc.identifierhttps://univerpubl.com/index.php/horizon/article/view/1923
dc.identifier.urihttp://dspace.umsida.ac.id/handle/123456789/22839
dc.languageeng
dc.publisherUniversal Publishing INC.en-US
dc.relationhttps://univerpubl.com/index.php/horizon/article/view/1923/1675
dc.sourceHorizon: Journal of Humanity and Artificial Intelligence; Vol. 2 No. 6 (2023): Horizon: Journal of Humanity and Artificial Intelligence; 12-16en-US
dc.source2835-3064
dc.source2835-3064
dc.subject5G networksen-US
dc.subjectmodelsen-US
dc.subjectalgorithmsen-US
dc.subjectsecurity techniquesen-US
dc.subjectcyber threatsen-US
dc.title5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMSen-US
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Articleen-US
Files