Attacks and Threats Verification Based on 4G/5G Security Architecture.
Lie YangChien-Erh WengHsing-Chung ChenYang-Cheng-Kuang ChenYung-Cheng YaoPublished in: IMIS (2023)
Keyphrases
- insider threat
- security architecture
- security mechanisms
- access control
- security model
- security threats
- intrusion detection system
- denial of service attacks
- simulation platform
- security policies
- data integrity
- countermeasures
- security issues
- operating system
- data security
- information security
- multi agent systems