Attacks Against Security Context in 5G Network.
Zhiwei CuiBaojiang CuiLi SuHaitao DuHongxin WangJunsong FuPublished in: MobiSec (2022)
Keyphrases
- security threats
- security measures
- cyber attacks
- denial of service attacks
- security problems
- intrusion prevention
- intrusion detection and prevention
- fault injection
- buffer overflow
- traffic analysis
- security risks
- network security
- computer networks
- security mechanisms
- security issues
- network administrators
- intrusion detection
- computer security
- java card
- network management
- countermeasures
- network attacks
- cyber security
- malicious traffic
- security policies
- security breaches
- security protocols
- intrusion detection system
- malicious nodes
- network traffic
- key management
- dos attacks
- virtual private network
- forensic analysis
- communication networks
- secure routing
- malicious users
- access control
- context aware
- attack scenarios
- peer to peer
- network structure
- security vulnerabilities
- denial of service
- malicious attacks
- smart card
- security management
- wireless sensor networks
- security requirements