5G Network Security Practices: An Overview and Survey.
Fatema Bannat WalaMariam KiranPublished in: CoRR (2024)
Keyphrases
- network security
- computer networks
- intrusion detection
- intrusion detection system
- case study
- information security
- dos attacks
- risk assessment
- network traffic
- traffic analysis
- security policies
- anomaly detection
- security protection
- ip networks
- network intrusion
- security breaches
- network administrators
- computer security
- situation assessment
- packet filtering
- end hosts
- network monitoring
- network attacks
- real time
- anti phishing
- cyber security
- electronic commerce
- metadata
- feature selection