Graph database based security protection mechanism of 5G network data flow
As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combini...
Saved in:
Main Authors: | Li SU, Li LU, Xing ZHANG, Chang LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2021-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security Vision of 5G
by: Hongru Zhu, et al.
Published: (2014-11-01) -
Overview and prospect of 5G security
by: Zhiqiang YANG, et al.
Published: (2020-12-01) -
5G-based smart airport network security scheme design and security analysis
by: Xinxin XING, et al.
Published: (2023-10-01) -
EU’s strategy and practice of 5G network security
by: Feng GUO, et al.
Published: (2020-06-01) -
Data security and protection techniques in big data:a survey
by: Kai-min WEI, et al.
Published: (2016-04-01)