5G Mobile Networks Security Landscape and Major Risks
暂无分享,去创建一个
[1] Jani Suomalainen,et al. Machine Learning Threatens 5G Security , 2020, IEEE Access.
[2] Eman Hammad,et al. 5G Security Challenges and Opportunities: A System Approach , 2020, 2020 IEEE 3rd 5G World Forum (5GWF).
[3] Junaid Qadir,et al. Black-box Adversarial Machine Learning Attack on Network Traffic Classification , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[4] Junaid Qadir,et al. The Adversarial Machine Learning Conundrum: Can the Insecurity of ML Become the Achilles' Heel of Cognitive Networks? , 2019, IEEE Network.
[5] Chris Hankin,et al. Adversarial Machine Learning Beyond the Image Domain , 2019, DAC.
[6] Siddique Latif,et al. Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems , 2019, 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC).
[7] Junaid Qadir,et al. Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward , 2019, IEEE Communications Surveys & Tutorials.
[8] Byrav Ramamurthy,et al. Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[9] Thorsten Holz,et al. Breaking LTE on Layer Two , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[10] Nils Ole Tippenhauer,et al. Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android , 2019, NDSS.
[11] Binh Nguyen,et al. ECHO: A Reliable Distributed Cellular Core Network for Hyper-scale Public Clouds , 2018, MobiCom.
[12] Adam Doupé,et al. AIM-SDN: Attacking Information Mismanagement in SDN-datastores , 2018, CCS.
[13] Lei Xu,et al. Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era , 2018, CCS.
[14] Daniel L. Marino,et al. An Adversarial Approach for Explainable AI in Intrusion Detection Systems , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[15] Vuk Marojevic,et al. Security and Protocol Exploit Analysis of the 5G Specifications , 2018, IEEE Access.
[16] Gregory Blanc,et al. Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service , 2018, ARES.
[17] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[18] Felix Klaedtke,et al. A Security Architecture for 5G Networks , 2018, IEEE Access.
[19] M. Ylianttila,et al. Overview of 5G Security Challenges and Solutions , 2018, IEEE Communications Standards Magazine.
[20] Prateek Mittal,et al. DARTS: Deceiving Autonomous Cars with Toxic Signs , 2018, ArXiv.
[21] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[22] Fabio Roli,et al. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning , 2017, Pattern Recognit..
[23] Jordi Pérez-Romero,et al. Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN , 2017, Comput. Stand. Interfaces.
[24] Edgar Weippl,et al. On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.
[25] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[26] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[27] Raimo Kantola,et al. Enhancing Security of Software Defined Mobile Networks , 2017, IEEE Access.
[28] Ayman I. Kayssi,et al. Multi-level security for the 5G/IoT ubiquitous network , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).
[29] Mahesh K. Marina,et al. FlexRAN: A Flexible and Programmable Platform for Software-Defined Radio Access Networks , 2016, CoNEXT.
[30] Min Chen,et al. Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.
[31] Andrei V. Gurtov,et al. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.
[32] Kartik Palani,et al. Invisible and forgotten: Zero-day blooms in the IoT , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[33] Sakir Sezer,et al. A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.
[34] Mohsen Guizani,et al. Securing software defined wireless networks , 2016, IEEE Communications Magazine.
[35] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[36] Raimo Kantola,et al. Security for Future Software Defined Mobile Networks , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[37] Tuomas Aura,et al. Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[38] Ejaz Ahmed,et al. Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.
[39] Sakir Sezer,et al. Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .
[40] Roger Piqueras Jover,et al. Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[41] Mark Ryan,et al. New privacy issues in mobile telephony: fix and verification , 2012, CCS.
[42] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[43] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[44] Patrick D. McDaniel,et al. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT , 2019, NDSS.
[45] Elisa Bertino,et al. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.
[46] Dave Levin,et al. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet , 2019, NDSS.
[47] Robert H. Deng,et al. Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment , 2019, NDSS.
[48] Zhiqiang Lin,et al. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.
[49] Kay Römer,et al. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud , 2017, NDSS.