Research, Analysis, and Implementation of Security Attacks in 5G and IoT
| dc.contributor.author | Jingade, Saurabh | |
| dc.contributor.other | Kaur, Sandeep (Supervisor) | |
| dc.date.accessioned | 2025-05-01T01:52:23Z | |
| dc.date.available | 2025-05-01T01:52:23Z | |
| dc.date.issued | 2021-10-06 | |
| dc.description | Mobile cellular networks have been evolving over decades now. We are already in the era of 5G which is being implemented as non-standalone (i.e., over the present 4G LTE network). Hence, it is important to research the possible upcoming developments in 5G with respect to its architecture and how it can be implemented alone (i.e., in a standalone manner). (As cited in abstract.) *Publication date not found. | |
| dc.identifier.doi | https://doi.org/10.7939/r3-ndb3-3b68 | |
| dc.language.iso | en | |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | |
| dc.subject | Cellular networks | |
| dc.subject | Mobile networks security | |
| dc.title | Research, Analysis, and Implementation of Security Attacks in 5G and IoT | |
| dc.type | http://purl.org/coar/resource_type/c_93fc | |
| ual.jupiterAccess | http://terms.library.ualberta.ca/public |
Files
Original bundle
1 - 1 of 1
