Login / Signup
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures.
Pasika Ranaweera
Anca Jurcut
Madhusanka Liyanage
Published in:
ACM Comput. Surv. (2022)
Keyphrases
</>
countermeasures
security vulnerabilities
information security
sql injection
intrusion detection
power analysis
security measures
data mining
efficient computation
information systems
network traffic
penetration testing