Shin, 2022 - Google Patents
A Study on 5G Security Activities in JapanShin, 2022
- Document ID
- 16334272105649243155
- Author
- Shin S
- Publication year
- Publication venue
- International Symposium on Mobile Internet Security
External Links
Snippet
With enhanced mobile broadband, massive machine-type communications, and ultra- reliable and low-latency communications, 5G is expected to create new services that have never been imagined before in a variety of sectors. In this paper, we survey recent activities …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | A survey on security issues in services communication of Microservices‐enabled fog applications | |
Ali et al. | Internet of things security, device authentication and access control: a review | |
Scarfone et al. | Guide to intrusion detection and prevention systems (idps) | |
Bello et al. | On sustained zero trust conceptualization security for mobile core networks in 5g and beyond | |
Alcaraz et al. | Critical control system protection in the 21st century | |
US11197160B2 (en) | System and method for rogue access point detection | |
Holtrup et al. | 5g system security analysis | |
Sabella et al. | MEC security: Status of standards support and future evolutions | |
Scarfone et al. | Sp 800-94. guide to intrusion detection and prevention systems (idps) | |
Vidhani et al. | Security Challenges in 5G Network: A technical features survey and analysis | |
Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
Kumbhare et al. | Security aspects of cloud, fog, and edge computing | |
Bobelin | Zero Trust in the Context of IoT: Industrial Literature Review, Trends, and Challenges. | |
Aich et al. | Study on cloud security risk and remedy | |
Monshizadeh et al. | Cloudification and security implications of TaaS | |
Adăscăliţei | Smartphones and IoT security | |
Ruebsamen et al. | Enhancing mobile device security by security level integration in a cloud proxy | |
Shin | A Study on 5G Security Activities in Japan | |
Jeyakumar et al. | Security challenges and solutions for cloud radio access networks | |
Sun et al. | Towards 5G Zero Trusted Air Interface Architecture | |
Kumar et al. | IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements | |
Sobh et al. | Securing hybrid architecture of cloudlet computing in 5G networks enabling IoT and mobile wireless devices | |
Zwarico | O‐RAN Security | |
Husić et al. | 5g security threats and countermeasures: An operator perspective | |
Balti et al. | Security assessment solutions for IoT devices |