[go: up one dir, main page]

Shin, 2022 - Google Patents

A Study on 5G Security Activities in Japan

Shin, 2022

Document ID
16334272105649243155
Author
Shin S
Publication year
Publication venue
International Symposium on Mobile Internet Security

External Links

Snippet

With enhanced mobile broadband, massive machine-type communications, and ultra- reliable and low-latency communications, 5G is expected to create new services that have never been imagined before in a variety of sectors. In this paper, we survey recent activities …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Yu et al. A survey on security issues in services communication of Microservices‐enabled fog applications
Ali et al. Internet of things security, device authentication and access control: a review
Scarfone et al. Guide to intrusion detection and prevention systems (idps)
Bello et al. On sustained zero trust conceptualization security for mobile core networks in 5g and beyond
Alcaraz et al. Critical control system protection in the 21st century
US11197160B2 (en) System and method for rogue access point detection
Holtrup et al. 5g system security analysis
Sabella et al. MEC security: Status of standards support and future evolutions
Scarfone et al. Sp 800-94. guide to intrusion detection and prevention systems (idps)
Vidhani et al. Security Challenges in 5G Network: A technical features survey and analysis
Thankappan et al. A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
Kumbhare et al. Security aspects of cloud, fog, and edge computing
Bobelin Zero Trust in the Context of IoT: Industrial Literature Review, Trends, and Challenges.
Aich et al. Study on cloud security risk and remedy
Monshizadeh et al. Cloudification and security implications of TaaS
Adăscăliţei Smartphones and IoT security
Ruebsamen et al. Enhancing mobile device security by security level integration in a cloud proxy
Shin A Study on 5G Security Activities in Japan
Jeyakumar et al. Security challenges and solutions for cloud radio access networks
Sun et al. Towards 5G Zero Trusted Air Interface Architecture
Kumar et al. IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
Sobh et al. Securing hybrid architecture of cloudlet computing in 5G networks enabling IoT and mobile wireless devices
Zwarico O‐RAN Security
Husić et al. 5g security threats and countermeasures: An operator perspective
Balti et al. Security assessment solutions for IoT devices