谷歌浏览器插件
订阅小程序
在清言上使用

Software Defined Security Monitoring in 5G Networks

Wiley 5G Ref(2019)

引用 0|浏览3
暂无评分
摘要
Software Defined Security Monitoring in 5G Networks Madhusanka Liyanage, Madhusanka Liyanage University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorIjaz Ahmad, Ijaz Ahmad University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorJude Okwuibe, Jude Okwuibe University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorEdgardo Montes de Oca, Edgardo Montes de Oca Montimage, Paris, FranceSearch for more papers by this authorHoang Long MAI, Hoang Long MAI Montimage, Paris, FranceSearch for more papers by this authorOscar López Perez, Oscar López Perez Nextel S.A., Bilbao, SpainSearch for more papers by this authorMikel Uriarte Itzazelaia, Mikel Uriarte Itzazelaia Nextel S.A., Bilbao, SpainSearch for more papers by this author Madhusanka Liyanage, Madhusanka Liyanage University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorIjaz Ahmad, Ijaz Ahmad University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorJude Okwuibe, Jude Okwuibe University of Oulu, Centre for Wireless Communication, Oulu, FinlandSearch for more papers by this authorEdgardo Montes de Oca, Edgardo Montes de Oca Montimage, Paris, FranceSearch for more papers by this authorHoang Long MAI, Hoang Long MAI Montimage, Paris, FranceSearch for more papers by this authorOscar López Perez, Oscar López Perez Nextel S.A., Bilbao, SpainSearch for more papers by this authorMikel Uriarte Itzazelaia, Mikel Uriarte Itzazelaia Nextel S.A., Bilbao, SpainSearch for more papers by this author First published: 29 December 2019 https://doi.org/10.1002/9781119471509.w5GRef256 Reproduced with permission from Software Defined Security Monitoring in 5G Networks, Edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov and Mika Ylianttila, A Comprehensive Guide to 5G Security, John Wiley & Sons Ltd, © 2018. Read the full textAboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinked InRedditWechat Wiley 5G Ref: The Essential 5G Reference OnlineBrowse other articles of this reference work:BROWSE BY TOPICBROWSE A-Z RelatedInformation
更多
查看译文
关键词
monitoring,security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要