Comparative Analysis between Security Models for Enhancement of Network Security in 6G Technology

dc.contributor.authorFahim, Fazla Azim, T173029
dc.date.accessioned2023-05-15T08:16:52Z
dc.date.available2023-05-15T08:16:52Z
dc.date.issued2022-11
dc.description.abstractThe research into 6G technology is still in its beginnings. Theoretically, researchers are still exploring this. The development of network security in 6G technology is now at a very early stage. There are so some restrictions. The main area of our research focuses on 6G network security. We detail every element of network security in our research, including which security model improves network security. Previous research publications have not offered many security models, nor have they provided a comprehensive knowledge of network security or how to enhance it. We provide the three most practical and trustworthy models in our study. To properly explain and evaluate those models, we apply the S.W.O.T analysis method. We can then choose the more dependable model, that provides greater data privacy and is simpler to manage.en_US
dc.identifier.urihttp://dspace.iiuc.ac.bd:8080/xmlui/handle/123456789/6369
dc.language.isoen_USen_US
dc.publisherDepartment of Electronic and Telecommunication Engineeringen_US
dc.titleComparative Analysis between Security Models for Enhancement of Network Security in 6G Technologyen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
T173029_Thesis Book_compressed.pdf
Size:
1.17 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: