Toward 6G Security: Technology Trends, Threats, and Solutions.
Dong-Hyun JeJungsoo JungSunghyun ChoiPublished in: IEEE Commun. Stand. Mag. (2021)
Keyphrases
- information security
- security issues
- security measures
- computer security
- security threats
- security vulnerabilities
- cyber security
- security breaches
- intrusion detection
- data encryption
- denial of service attacks
- network security
- cyber attacks
- security requirements
- critical infrastructure
- case study
- optimal solution
- countermeasures
- security services
- insider attacks
- buffer overflow
- information systems
- security architecture
- identity theft
- intrusion detection system
- cyber crime
- security mechanisms
- sensitive data
- security policies