Research, Analysis, and Implementation of Security Attacks in 5G and IoT

dc.contributor.authorJingade, Saurabh
dc.contributor.otherKaur, Sandeep (Supervisor)
dc.date.accessioned2025-05-01T01:52:23Z
dc.date.available2025-05-01T01:52:23Z
dc.date.issued2021-10-06
dc.descriptionMobile cellular networks have been evolving over decades now. We are already in the era of 5G which is being implemented as non-standalone (i.e., over the present 4G LTE network). Hence, it is important to research the possible upcoming developments in 5G with respect to its architecture and how it can be implemented alone (i.e., in a standalone manner). (As cited in abstract.) *Publication date not found.
dc.identifier.doihttps://doi.org/10.7939/r3-ndb3-3b68
dc.language.isoen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/
dc.subjectCellular networks
dc.subjectMobile networks security
dc.titleResearch, Analysis, and Implementation of Security Attacks in 5G and IoT
dc.typehttp://purl.org/coar/resource_type/c_93fc
ual.jupiterAccesshttp://terms.library.ualberta.ca/public

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Jingade.pdf
Size:
5.7 MB
Format:
Adobe Portable Document Format