Toward Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments.
Felix KlementWuhao LiuStefan KatzenbeisserPublished in: IEEE J. Sel. Areas Commun. (2024)
Keyphrases
- detection method
- prior knowledge
- experimental evaluation
- computational cost
- similarity measure
- preprocessing
- significant improvement
- main contribution
- support vector machine svm
- high accuracy
- dynamic programming
- objective function
- data sets
- optimization method
- segmentation method
- clustering method
- high precision
- optimization algorithm
- fully automatic
- model selection
- mutual information
- input image
- mobile robot
- computational complexity
- multiscale
- information systems
- machine learning