Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Shadab Kalhoro; Farhan Bashir Shaikh; Anam Kalhoro; Junaid Ur Rehman Abbasi; Ramesh Kumar Ayyasamy

Volume 16, Issue 1 , January 2024, , Pages 17-35

https://doi.org/10.22042/isecure.2023.354872.829

Abstract
  With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in the ...  Read More

A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain

Joel E. Cordeiro Junior; Marcelo S. Alencar; José V. dos Santos Filho; Karcius D. R. Assis

Volume 11, Issue 3 , August 2019, , Pages 123-130

https://doi.org/10.22042/isecure.2019.11.0.16

Abstract
  This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their ...  Read More