5G Security Threat Assessment in Real Networks.
Seongmin ParkDaeun KimYoungkwon ParkHyungJin ChoDowon KimSungMoon KwonPublished in: Sensors (2021)
Keyphrases
- information security
- security policies
- security mechanisms
- security requirements
- security issues
- statistical databases
- network security
- information assurance
- intrusion detection
- functional requirements
- security measures
- security management
- data security
- security systems
- cyber attacks
- access control
- security vulnerabilities
- high security
- security threats
- authentication protocol
- data sets
- data encryption
- user authentication
- smart card
- key management
- risk analysis
- neural network
- genetic algorithm
- case study
- electronic commerce