Jeevan Kumar Manda

Independent

SCHOLARLY PAPERS

39

DOWNLOADS

1,518

TOTAL CITATIONS

4

Scholarly Papers (39)

Abstract:

Loading...

AI, threat intelligence, telecom security, real-time detection, cybersecurity, machine learning, predictive analytics, automation, data privacy, natural language processing, big data analytics, incident response, security operations, anomaly detection, data breaches, DDoS attacks, insider threats, security operations centers, intelligence gathering, ethical considerations, blockchain, quantum computing, emerging technologies, proactive threat management, skill gap, integration challenges

Abstract:

Loading...

Quantum Computing, Post-Quantum Cryptography, Telecom Networks, Quantum-Safe Solutions, Cryptographic Technologies, Security, Implementation Challenges, Quantum Threats, RSA, ECC, Lattice-based Cryptography, Code-based Cryptography, Multivariate Polynomial Cryptography, Hash-based Signatures, NIST, Data Confidentiality, Data Integrity, Migration Strategies, Compliance Considerations, Research and Development, Network Security

3.
Downloads 109 (541,062)
Citation 1

Abstract:

Loading...

Blockchain, Identity Management, Telecom Services, Decentralized Solutions, Data Security, User Privacy, Identity Verification, Regulatory Compliance, Digital Identity, Telecom Industry Innovation, Self-Sovereign Identity, Data Breaches, Identity Theft, Smart Contracts, Consensus Mechanisms, Cryptographic Principles, Digital Wallets, Customer Onboarding, Compliance Laws, AI Integration, IoT Solutions, Scalability Challenges, Telecom Innovation, Secure Transactions, Customer Trust, Operational Efficiency

Abstract:

Loading...

Digital transformation, telecom infrastructure, operational strategies, telecom industry, technology integration, network modernization, 5G, IoT, cloud computing, AI

Abstract:

Loading...

Augmented Reality, AR technologies, Telecom Maintenance, Remote Maintenance, Troubleshooting, Telecom Infrastructure, Real-Time Collaboration, Infrastructure Management, Operational Efficiency, Cost Savings, Technician Training, Data Visualization, Remote Assistance, AR Applications, Integration with AI, IoT, 5G, Change Management, Safety in Maintenance, Industry Trends, Future Innovations, Workforce Development, Data Security, Telecom Operators

Abstract:

Loading...

Legacy telecom systems, cybersecurity, aging infrastructure, cyber threats, tailored strategies, network security

Abstract:

Loading...

Privacy-preserving technologies, telecom data analytics, differential privacy, customer data protection, data privacy regulations, privacy techniques, telecom industry, data analytics, secure data handling, customer trust

8.
Downloads 60 (773,393)

Abstract:

Loading...

Sustainable data centers, energy efficiency, telecom industry, green technology, renewable energy, carbon footprint reduction, energy management, sustainable infrastructure, eco-friendly telecom solutions, innovative data center designs

Abstract:

Loading...

Next-generation firewalls, telecom networks, cyber threats, firewall technology, security solutions, data breaches, regulatory compliance, intrusion prevention, network security, deployment strategies, industry best practices, cybersecurity, threat intelligence, firewall features, telecom infrastructure

10.

5G-enabled Smart Cities: Security and Privacy Considerations 

Number of pages: 17 Posted: 14 Feb 2025
Jeevan Kumar Manda
Independent
Downloads 51 (837,654)

Abstract:

Loading...

5G, smart cities, security, privacy, IoT, infrastructure, urban security, data protection, cybersecurity, privacy-preserving technologies, regulatory compliance, smart city services, surveillance, consent, encryption, differential privacy

Abstract:

Loading...

Data center optimization, Telecom industry, Cost reduction, Energy efficiency, Cooling systems, Server optimization, Virtualization, Automation

Abstract:

Loading...

Sustainability, 5G network infrastructure, eco-friendly technologies, carbon footprint reduction, energy consumption, telecommunications, renewable energy, energy-efficient hardware, network deployment, environmental impact, cooling techniques, operational efficiency, green technology, sustainable practices, 5G deployment

Abstract:

Loading...

Remote work, telecommunications, cybersecurity, data protection, secure access, VPN, MFA, encryption, employee training, regulatory compliance

Abstract:

Loading...

Cloud migration, telecom providers, best practices, cloud-based environments, telecom services, cloud infrastructure, migration strategies, telecom industry, cloud projects, cloud considerations

Abstract:

Loading...

Cloud security, telecom providers, security frameworks, best practices, service delivery, operations, zero trust architecture, encryption, identity and access management, continuous monitoring, compliance, regulatory standards, customer data protection, cyber threats, security posture

16.

Integration Challenges of IoT in Telecom Networks: Analyzing Technical and Security Challenges Associated with Integrating IoT Devices into Telecom Networks, Drawing on your Expertise in Network Integration and IoT Security Protocols

International Journal of Novel Research and Development (IJNRD), Volume 2, Issue 3 March 2017
Number of pages: 17 Posted: 02 Jan 2025
Jeevan Kumar Manda
Independent
Downloads 28 (1,057,889)

Abstract:

Loading...

IoT Integration, Telecom Networks, Network Security, Technical Challenges, IoT Security Protocols, Network Integration, Cybersecurity, Internet of Things, Data Privacy, Network Infrastructure

Abstract:

Loading...

5G networks, cybersecurity, resilience, advanced cyber threats, network architecture, security frameworks, next-generation networks

Abstract:

Loading...

5G Networks, Infrastructure Management, Telecom Infrastructure, Deployment Optimization, Maintenance Strategies, Network Performance, Telecom Industry, Best Practices

Abstract:

Loading...

DevSecOps, telecom, software development, security integration, continuous integration, continuous deployment, security culture, agile methodologies, risk management, automation, compliance, infrastructure as code, security tools, best practices, case studies, telecommunications industry, DevOps practices, secure service delivery

Abstract:

Loading...

AI, Predictive Maintenance, Telecom Networks, Proactive Maintenance, Fault Prediction, Operational Efficiency, Downtime Reduction, Service Quality, Predictive Analytics, AI Techniques

Abstract:

Loading...

Hybrid cloud, telecom sector, cloud adoption, deployment strategies, service delivery, operational efficiency, scalability, flexibility, cost optimization, network function virtualization (NFV), 5G network slicing, data security, compliance, disaster recovery, business continuity, integration, interoperability, complex environments, cloud-native applications, microservices architecture, containerization, continuous monitoring, edge computing, AI, IoT, emerging technologies, telecom operations

Abstract:

Loading...

Cloud migration, telecom providers, best practices, cloud-based environments, telecom services, cloud infrastructure, migration strategies, telecom industry, cloud projects, cloud considerations

Abstract:

Loading...

Edge computing, cybersecurity challenges, telecom networks, data security, privacy risks, network threats, distributed architecture, edge security protocols, device management, Zero Trust, data encryption, access control, SD-WAN, network slicing, IoT security, 5G networks, real-time processing, physical security, disaster recovery, AI in cybersecurity, threat detection, compliance, network segmentation

Abstract:

Loading...

Zero Trust Architecture, telecom security, insider threats, network security, security architecture, continuous monitoring, least privilege access, verification, microsegmentation, authentication, authorization, threat detection, data analytics, compliance, governance, user experience, security assessment, security posture, implementation challenges, cultural resistance, technological limitations, budget constraints, identity and access management, real-time monitoring, operational integrity, data protection, and evolving threat landscape

Abstract:

Loading...

IoT Security, Telecom Security, IoT Risk Management, Device Authentication, Network Segmentation, Data Encryption, Regulatory Compliance, IoT Framework, Telecom Operators, IoT Device Protection, Cybersecurity, Privacy, Vulnerability Management, Patch Automation, Zero Trust, Data Governance, Secure Application Development, DevSecOps, Artificial Intelligence, Machine Learning, Blockchain, Quantum-Resistant Cryptography, Threat Detection

Abstract:

Loading...

Big Data Analytics, Telecom Operations, Network Management, Operational Efficiency, Analytics-Driven Decision-Making, Telecom Environments

Abstract:

Loading...

IoT Security, Telecom Networks, Security Frameworks, Risk Management, IoT Devices, Network Security Protocols, Cybersecurity

Abstract:

Loading...

Blockchain Technology, Telecom Billing, Fraud Prevention, Transparency, Security, Telecom Industry, Distributed Ledger, Smart Contracts, Digital Identity, Data Integrity

Abstract:

Loading...

Sustainable practices, telecom data centers, green technologies, environmental impact, energy efficiency, renewable energy, cooling technologies, virtualization, sustainability

Abstract:

Loading...

Data Privacy, Telecom Companies, GDPR, Compliance Strategies, Operational Impact, Data Protection, Regulatory Compliance, Telecom Operations

Abstract:

Loading...

Blockchain, Telecom, Supply Chain Management, Transparency, Security, Data Integrity, Smart Contracts, Decentralized Ledger, Telecom Vendors, Counterfeit Prevention, Product Provenance, Asset Management, Operational Efficiency, Fraud Prevention, Telecom Infrastructure, Blockchain Integration, Public Blockchain, Private Blockchain, Consortium Blockchain, Regulatory Compliance, AI, IoT, Edge Computing, Sustainability, Interoperability, Standardization, Emerging Technologies, Environmental Impact, Cost Savings, Vendor Accountability, ERP Systems, Telecom Supply Chain Challenges

Abstract:

Loading...

Cybersecurity, Automation, Telecom, Incident Response, Threat Detection, Machine Learning, Threat Intelligence, Automated Response, Security Orchestration, Security Automation, Network Security, Telecom Operations, Cyber Threats, SOC, Security Tools

Abstract:

Loading...

Edge computing, telecom networks, latency-sensitive applications, network optimization, edge deployments, telecom services, 5G, network latency, real-time processing, distributed computing

Abstract:

Loading...

SDN, telecom networks, network agility, network scalability, SDN benefits, SDN challenges, telecom innovation, network management, SDN implementation, future of telecom

Abstract:

Loading...

List of relevant terms such as Ethical Hacking, Penetration Testing, Telecom Security, Vulnerability Assessment, Cybersecurity, Risk Mitigation, Security Testing

Abstract:

Loading...

Data Privacy, GDPR Compliance, Telecommunications, Customer Information Management, Regulatory Compliance, Data Protection, Data Handling Practices, Telecom Industry, Data Breaches, Privacy Regulations, Risk Management, Compliance Strategies, Customer Data, Information Security, Telecom Data Management

37.

AI-driven Network Orchestration in 5G Networks: Leveraging AI and Machine Learning for Dynamic Network Orchestration and Optimization in 5G Environments

International Journal of Multidisciplinary and Current Educational Research (IJMCER) ||Volume|| 4 ||Issue|| 2 ||Pages 356-365 ||2022||
Posted: 02 Jan 2025
Jeevan Kumar Manda
Independent

Abstract:

Loading...

AI-driven network orchestration, 5G network optimization, machine learning in telecommunications, dynamic network management, predictive analytics, reinforcement learning, neural networks, network slicing, resource allocation, AI in telemedicine, autonomous vehicles, industrial IoT, smart manufacturing, edge AI, network scalability, quality of service (QoS), quality of experience (QoE), data privacy in 5G, future trends in AI and 5G, network security, AI for network resource management, telecommunications innovation, 5G network architecture, and real-time network adjustments

38.

AI And Machine Learning In Network Automation: Harnessing AI and Machine Learning Technologies to Automate Network Management Tasks and Enhance Operational Efficiency in Telecom, Based On Your Proficiency in AI-Driven Automation Initiatives

International Journal of Multidisciplinary and Current Educational Research (IJMCER), Volume 1, Issue 4, Pages 48-58, 2019
Posted: 02 Jan 2025
Jeevan Kumar Manda
Independent

Abstract:

Loading...

Artificial Intelligence, Machine Learning, Network Automation, Telecom, Operational Efficiency, Predictive Analytics, Real-time Monitoring, Automated Troubleshooting, AI-driven Automation, Case Studies

39.

5G Network Slicing: Use Cases and Security Implications

Posted: 30 Oct 2024
Jeevan Kumar Manda
Independent

Abstract:

Loading...

5G, network slicing, security implications, telemedicine, remote surgery, autonomous vehicles, public safety, smart cities, slice isolation, multi-tenancy, cybersecurity, data integrity, privacy, performance optimization, mobile network, virtualization, secure infrastructure, multi-slice networks, real-time applications, end-to-end encryption