From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem.
Angelos MichalasConstantinos PatsakisDimitrios D. VergadosDimitrios J. VergadosPublished in: CoRR (2022)
Keyphrases
- information security
- access control
- security issues
- intrusion detection
- statistical databases
- security requirements
- security protocols
- network security
- risk analysis
- information assurance
- neural network
- high security
- security threats
- security systems
- data security
- security analysis
- computer security
- key management
- risk assessment
- security policies
- wireless sensor networks