Login / Signup
Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing.
Marian Gusatu
Ruxandra F. Olimid
Published in:
CoRR (2021)
Keyphrases
</>
access control
denial of service attacks
information security
data security
security patterns
edge detection
intrusion detection
statistical databases
security requirements
security mechanisms
ddos attacks
role based access control
security problems
factor authentication
network security