Overview of 5G Security Challenges and Solutions
暂无分享,去创建一个
[1] Elena Dubrova,et al. Protecting IMSI and User Privacy in 5G Networks , 2016, MobiMedia.
[2] Rajashri Khanai,et al. Security frameworks for mobile cloud computing: A survey , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[3] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[4] Nicolai Kuntze,et al. Hypervisor-Based Attestation of Virtual Environments , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[5] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[6] Andrei V. Gurtov,et al. Security in Software Defined Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[7] Bernd Jaeger. Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, TrustCom 2015.
[8] Sakir Sezer,et al. Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .
[9] Vijay Varadharajan,et al. Out-VM monitoring for Malicious Network Packet Detection in cloud , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).
[10] Jemal H. Abawajy,et al. Detecting and Mitigating HX-DoS Attacks against Cloud Web Services , 2012, 2012 15th International Conference on Network-Based Information Systems.
[11] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[12] Roel Wieringa,et al. Security Implications of Virtualization: A Literature Study , 2009, 2009 International Conference on Computational Science and Engineering.