5G Core Security in Edge Networks: A Vulnerability Assessment Approach.
Hisham A. KholidyAndrew KaramJames L. SidoranMohammad Ashiqur RahmanPublished in: ISCC (2021)
Keyphrases
- risk assessment
- security vulnerabilities
- information security
- network security
- social networks
- edge detection
- security issues
- buffer overflow
- enterprise network
- security risks
- statistical databases
- edge detector
- network design
- computer security
- security problems
- intrusion detection
- weighted graph
- security mechanisms
- security analysis
- computer networks
- security measures
- network structure
- lightweight
- penetration testing