Journal article Open Access

A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology

Elegado, Angel Nica

DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="" xmlns:adms="" xmlns:dc="" xmlns:dct="" xmlns:dctype="" xmlns:dcat="" xmlns:duv="" xmlns:foaf="" xmlns:frapo="" xmlns:geo="" xmlns:gsp="" xmlns:locn="" xmlns:org="" xmlns:owl="" xmlns:prov="" xmlns:rdfs="" xmlns:schema="" xmlns:skos="" xmlns:vcard="" xmlns:wdrs="">
  <rdf:Description rdf:about="">
    <dct:identifier rdf:datatype=""></dct:identifier>
    <foaf:page rdf:resource=""/>
        <rdf:type rdf:resource=""/>
        <foaf:name>Elegado, Angel Nica</foaf:name>
        <foaf:givenName>Angel Nica</foaf:givenName>
            <foaf:name>School of Advanced Studies, Saint Louis University, Baguio City, Philippines</foaf:name>
    <dct:title>A Review of the Development of 6th Generation Network Security Adapting Artificial Intelligence and Distributed Ledger Technology</dct:title>
    <dct:issued rdf:datatype="">2023</dct:issued>
    <dcat:keyword>6g Communications</dcat:keyword>
    <dcat:keyword>Network Security</dcat:keyword>
    <dcat:keyword>Artificial Intelligence</dcat:keyword>
    <dcat:keyword>Distributed Ledger Technology</dcat:keyword>
    <dct:issued rdf:datatype="">2023-05-31</dct:issued>
    <owl:sameAs rdf:resource=""/>
        <skos:notation rdf:datatype=""></skos:notation>
    <dct:isVersionOf rdf:resource=""/>
    <dct:description>&lt;p&gt;This paper reviews the network security in 6G applied in various emerging technologies. The content of the paper discusses the 6G, which is expected to be merged with multiple sorts of slicing enabled by new technologies and paradigms to make the system more intelligent and safeguard the network infrastructure. This literature review was performed through a systematic review using a meta-analysis review to draw a conclusion. This paper identifies the issues and challenges of the 6G network and discusses the current research areas in network security, such as AI and DLT, which were found as solutions which can be employed for security at many cybersecurity protection and defense stages. The value of these technologies is based on the benefits of autonomy, increased accuracy, and predictive capabilities for security analytics. Additionally, this study compares which approach is the most viable solution to address network security issues. The researcher wants to investigate further 6G cloud computing for future work, addressed by centralized data centers accessed via the leading network.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource=""/>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
    <dct:license rdf:resource=""/>
        <dcat:accessURL rdf:resource=""/>
        <dcat:downloadURL rdf:resource=""/>
All versions This version
Views 4141
Downloads 4040
Data volume 10.3 MB10.3 MB
Unique views 3636
Unique downloads 3636


Cite as