Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?
暂无分享,去创建一个
Wei You | Yu Zhao | Xinxin Hu | Caixia Liu | Shuxin Liu | Caixia Liu | Wei You | Xinxin Hu | Shuxin Liu | Yu Zhao
[1] Anant V. Nimkar,et al. Man-in-the-middle attack in HTTP/2 , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).
[2] A. Benjebbour,et al. Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.
[3] Xiqi Gao,et al. Cellular architecture and key technologies for 5G wireless communication networks , 2014, IEEE Communications Magazine.
[4] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[5] AKHIL GUPTA,et al. A Survey of 5G Network: Architecture and Emerging Technologies , 2015, IEEE Access.
[6] Elisa Bertino,et al. LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE , 2018, NDSS.
[7] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[8] A.R. Modarressi,et al. Signaling System No.7: a tutorial , 1990, IEEE Communications Magazine.
[9] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[10] Roberto Peon,et al. HPACK: Header Compression for HTTP/2 , 2015, RFC.
[11] Security challenges and opportunities for 5 G mobile networks , 2017 .
[12] Huaiyu Dai,et al. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.
[13] Martin Thomson,et al. Hypertext Transfer Protocol Version 2 (HTTP/2) , 2015, RFC.
[14] Hu Aiqun,et al. FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.