Security for 5G and Beyond.
Ijaz AhmadShahriar ShahabuddinTanesh KumarJude OkwuibeAndrei V. GurtovMika YlianttilaPublished in: IEEE Commun. Surv. Tutorials (2019)
Keyphrases
- information security
- network security
- security issues
- information assurance
- security systems
- intrusion detection
- functional requirements
- computer security
- security requirements
- access control
- neural network
- security problems
- statistical databases
- security policies
- real time
- authentication protocol
- security management
- security mechanisms
- key management
- social networks
- security model
- security level
- security vulnerabilities
- databases