Research on terminal security of 5G network under different attack scenes.
Jiang ZhuShishun ZhuZi WangPublished in: iSCI (2022)
Keyphrases
- security measures
- cyber attacks
- fault injection
- denial of service attacks
- buffer overflow
- countermeasures
- forensic analysis
- enterprise network
- security vulnerabilities
- security threats
- dos attacks
- malicious nodes
- access control
- denial of service
- network structure
- security problems
- security management
- information security
- computer security
- authentication protocol
- network management
- trust relationships
- authentication mechanism
- computer networks
- attack graphs
- wireless sensor networks
- intrusion detection
- key exchange protocol
- network security
- attack scenarios
- ddos attacks
- cyber security
- security requirements
- data encryption
- social networks
- virtual private network
- attack graph
- network configuration
- security risks
- network services
- user authentication
- network topologies
- security mechanisms
- security issues
- peer to peer