5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMS

Authors

  • G’ulomov Sh. R Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
  • Sulaymonov A. A Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan
  • Baymatova M. X. Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan

Keywords:

5G networks, models, algorithms, security techniques, cyber threats

Abstract

The development of 5G networks has brought about a new era of high-speed data transmission and connectivity, enabling us to communicate and interact with each other in ways that were previously impossible. However, with this increased connectivity comes an increased risk of cyber threats and security breaches. The security challenges associated with 5G networks are complex and require robust security techniques and algorithms to ensure the safety and privacy of users' data. This article explores the various security threats in 5G networks and discusses the different security techniques and algorithms that can be used to mitigate these threats. The article highlights the importance of developing effective security measures for 5G networks to ensure the protection of sensitive information and the continuity of services.

Downloads

Published

2023-06-08

How to Cite

Sh. R, G. ., A. A, S. ., & M. X., B. . (2023). 5G NETWORKS SECURITY TECHNIQUES AND ALGORITHMS. Horizon: Journal of Humanity and Artificial Intelligence, 2(6), 12–16. Retrieved from https://univerpubl.com/index.php/horizon/article/view/1923

Issue

Section

Articles