{"id":1180,"date":"2022-12-11T22:04:10","date_gmt":"2022-12-11T22:04:10","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=1180"},"modified":"2022-12-11T22:06:52","modified_gmt":"2022-12-11T22:06:52","slug":"wireless-security","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/12\/11\/wireless-security\/","title":{"rendered":"Wireless Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul><\/ul>\n<ul><\/ul>\n<ul>\n<li><span style=\"font-size: medium\">W Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cAdmission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System\u201d, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109\/JSYST.2022.3207019ireless Security.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cWhen Agile Security Meets 5G\u201d, IEEE Access, Volume 8, pages 166212 \u2013 166225, September 2020.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cOptimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks\u201d, IEEE Systems Journal, July 2020, pages 1-12.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, Periklis Chatzimi, \u201cEdge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure\u201d, 2022 IEEE International Conference on Communications (ICC2022), 16-20 May 2022, Seoul, Republic of Korea, pp. 847-852, doi: 10.1109\/ICC45855.2022.9838679.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cSecurity- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems\u201d, 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication (WIDECOM 2020), Springer-Lecture Notes on Data Engineering and Communications Technologies, vol. 51, Toronto, Canada, May 6-8, 2020.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, L. Barolli, \u201cMalware Detection Using Machine Learning Models\u201d, 23-rd International Conference on Network-Based Information Systems (NBiS-2020), August 31st &#8211; September 2nd, 2020, Victoria, Canada.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>W Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cAdmission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System\u201d, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109\/JSYST.2022.3207019ireless Security. Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p><span style=\"font-weight: 400;\">W Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cAdmission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System\u201d, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109\/JSYST.2022.3207019ireless Security<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cWhen Agile Security Meets 5G\u201d, IEEE Access, Volume 8, pages 166212 \u2013 166225, September 2020<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cOptimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks\u201d, IEEE Systems Journal, July 2020, pages 1-12.<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, Periklis Chatzimi, \u201cEdge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure\u201d, 2022 IEEE International Conference on Communications (ICC2022), 16-20 May 2022, Seoul, Republic of Korea, pp. 847-852, doi: 10.1109\/ICC45855.2022.9838679.<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cSecurity- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems\u201d, 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication (WIDECOM 2020), Springer-Lecture Notes on Data Engineering and Communications Technologies, vol. 51, Toronto, Canada, May 6-8, 2020.<\/span><\/p><p><span style=\"font-weight: 400;\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, L. Barolli, \u201cMalware Detection Using Machine Learning Models\u201d, 23-rd International Conference on Network-Based Information Systems (NBiS-2020), August 31st - September 2nd, 2020, Victoria, Canada.<\/span><\/p>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-1180","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=1180"}],"version-history":[{"count":5,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1180\/revisions"}],"predecessor-version":[{"id":1185,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/1180\/revisions\/1185"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=1180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=1180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=1180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}