Login / Signup

Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments.

Felix KlementAlessandro BrighenteMichele PoleseMauro ContiStefan Katzenbeisser
Published in: NetSoft (2024)
Keyphrases
  • information security
  • identity management
  • countermeasures
  • decision trees
  • attack graphs
  • database
  • end users
  • building blocks
  • smart card
  • design considerations
  • support environment
  • buffer overflow