An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.
Shadab KalhoroFarhan Bashir ShaikhAnam KalhoroJunaid Ur Rehman AbbasiRamesh Kumar AyyasamyPublished in: ISC Int. J. Inf. Secur. (2024)
Keyphrases
- security threats
- security problems
- attack scenarios
- security mechanisms
- intrusion detection and prevention
- security measures
- java card
- cyber attacks
- computer security
- security protocols
- denial of service attacks
- security risks
- countermeasures
- security vulnerabilities
- security breaches
- information security
- security issues
- stream cipher
- chosen plaintext
- security flaws
- future trends
- fault injection
- intrusion detection
- cryptographic algorithms
- access control
- security requirements
- malicious users
- malicious attacks
- network security
- insider attacks
- cryptographic protocols
- current status
- data mining
- intrusion prevention
- biometric template
- identity management
- network services
- security and privacy issues
- attack detection
- smart card
- book discusses
- intrusion detection system
- security management
- malicious nodes
- security policies
- identity theft