Discussion on a new paradigm of endogenous security towards 6G networks.
Xinsheng JiJiangxing WuLiang JinKaizhi HuangYajun ChenXiaoli SunWei YouShumin HuoJing YangPublished in: Frontiers Inf. Technol. Electron. Eng. (2022)
Keyphrases
- information security
- computer networks
- network security
- information assurance
- access control
- enterprise network
- complex networks
- statistical databases
- network size
- computer security
- heterogeneous networks
- security requirements
- security problems
- security policies
- intrusion detection
- security issues
- security threats
- network structure
- key management
- security systems
- security properties
- network management
- functional requirements
- neural network
- network analysis
- end to end
- social networks