Login / Signup
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs.
Harsh Sanjay Pacherkar
Guanhua Yan
Published in:
WISEC (2024)
Keyphrases
</>
network security
attack detection
intrusion detection system
intrusion detection
computer networks
network traffic
anomaly detection
cyber attacks
traffic analysis
security policies
cyber security
multistage
dos attacks
risk assessment
computer systems
data processing
metadata
real time
databases
training data