Solutions to the GSM Security Weaknesses
Mohsen TooraniAli Asghar Beheshti ShiraziPublished in: CoRR (2010)
Keyphrases
- security policies
- access control
- data sets
- security patterns
- security analysis
- security mechanisms
- information security
- security vulnerabilities
- database
- security management
- mobile communication
- encryption scheme
- security issues
- benchmark problems
- end to end
- intrusion detection
- low cost
- search algorithm
- genetic algorithm
- data mining