A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions.
Filippo DolenteRosario Giuseppe GarroppoMichele PaganoPublished in: Future Internet (2024)
Keyphrases
- open source
- network structure
- risk assessment
- peer to peer
- open source software
- decision making
- buffer overflow
- cooperative game
- network management
- network model
- network traffic
- complex networks
- wireless sensor networks
- network design
- generation process
- case study
- learning algorithm
- computer networks
- efficient implementation
- end to end
- network architecture
- software engineering
- open source projects
- security risks