Skip to content
Home » Blogposts

Blogposts

VREM-FL: Mobility-Aware Computation-Scheduling Co-Design for Vehicular Federated Learning

This paper examines how federated learning (FL) can be made more reliable and efficient in vehicular environments, where vehicles act as learning clients while continuously moving across the road network. Mobility creates challenges such as fluctuating wireless connectivity, variable computation… Read More »VREM-FL: Mobility-Aware Computation-Scheduling Co-Design for Vehicular Federated Learning

Image-Based Frequency-Domain Analysis for Robust DDoS Detection in SDN

Software-Defined Networking (SDN) offers flexibility and centralized control, but this same architecture makes SDN controllers highly vulnerable to Distributed Denial of Service (DDoS) attacks. When attackers flood the controller with Packet-In messages—often using spoofed IP addresses—they can degrade performance or… Read More »Image-Based Frequency-Domain Analysis for Robust DDoS Detection in SDN

Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

As drones become increasingly embedded in civilian systems—from environmental monitoring to disaster relief—the security of their wireless links has emerged as a critical concern. Spoofing and jamming attacks can interfere with navigation or inject false messages, making robust authentication mechanisms… Read More »Challenge-Response to Authenticate Drone Communications: A Game Theoretic Approach

ADMM-Based Training for Spiking Neural Networks

Training spiking neural networks (SNNs) remains a longstanding challenge due to their non-differentiable spike activation functions. Most existing approaches adapt methods designed for traditional artificial neural networks, such as backpropagation with surrogate gradients. While widely used, these surrogate techniques introduce… Read More »ADMM-Based Training for Spiking Neural Networks

A Comparative Study of DDoS Attack Detection in Traditional Networks and SDN Using Time and Frequency Domain Features

This paper investigates how effectively Distributed Denial-of-Service (DDoS) attacks can be detected in two different network architectures—traditional networks and Software-Defined Networking (SDN)—by using both time-domain and frequency-domain features. While earlier research has mostly relied on statistical or time-based characteristics of… Read More »A Comparative Study of DDoS Attack Detection in Traditional Networks and SDN Using Time and Frequency Domain Features

Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum

This paper presents a security framework designed for the emerging Cloud Continuum, where cloud, edge, and extreme-edge environments operate together to support next-generation 6G services. As networks become more distributed and dynamic, traditional static security mechanisms struggle to keep pace.… Read More »Securing Networks of the Future: A Programmable Security Monitoring Platform for Cloud Continuum

Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation

This paper presents an improved framework for physical-layer authentication (PLA) in multiuser wireless environments, where channel variations, measurement noise, and interference can make it difficult to reliably distinguish legitimate users from attackers. Traditional CSI-based authentication methods often suffer in such… Read More »Enhanced Multiuser CSI-Based Physical Layer Authentication Based on Information Reconciliation

A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions

This survey examines how Explainable AI (XAI) can strengthen security in 5G and future 6G networks, where AI models increasingly drive tasks such as intrusion detection, traffic classification, PHY-layer authentication, and anomaly detection. While these models offer strong performance, their… Read More »A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions