Security Use-Cases for Countering Threats of CLA and UAV in 6G.
Kijung BongJonghyun KimPublished in: ICEA (2021)
Keyphrases
- information security
- security issues
- security measures
- security threats
- cyber security
- computer security
- security services
- cyber attacks
- security breaches
- security vulnerabilities
- countermeasures
- denial of service attacks
- national security
- security mechanisms
- network security
- intrusion detection
- critical infrastructure
- learning automata
- security management
- security systems
- security requirements
- case base
- information systems
- security problems
- path planning
- key management
- sensitive data
- security policies
- security risks
- access control
- malicious attacks
- case based reasoning
- cyber crime
- insider attacks
- reinforcement learning