Sign in

Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment.

Seongmin ParkSekwon KimKyungho SonHwankuk KimJunyoung ParkKangbin Yim
Published in: Int. J. Web Grid Serv. (2017)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • security measures
  • grid computing environment
  • cyber attacks
  • mobile devices
  • database
  • application layer
  • security breaches