{"title":"6G应用的安全与隐私入侵检测技术","authors":"Priya Kohli, Sachin Sharma, Priya Matta","doi":"10.1109/ICSCCC58608.2023.10176740","DOIUrl":null,"url":null,"abstract":"With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Intrusion Detection Techniques For Security and Privacy of 6G Applications\",\"authors\":\"Priya Kohli, Sachin Sharma, Priya Matta\",\"doi\":\"10.1109/ICSCCC58608.2023.10176740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.\",\"PeriodicalId\":359466,\"journal\":{\"name\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCCC58608.2023.10176740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC58608.2023.10176740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Intrusion Detection Techniques For Security and Privacy of 6G Applications
With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.