Login / Signup
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.
Seongmin Park
Sekwon Kim
Kyungho Son
Hwankuk Kim
Junyoung Park
Kangbin Yim
Published in:
Int. J. Web Grid Serv. (2017)
Keyphrases
</>
countermeasures
information security
power analysis
security measures
grid computing environment
cyber attacks
mobile devices
database
application layer
security breaches