Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
5G mobile networks
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Multi-Tenancy-Capable Correlation of Security Events in 5G Networks
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
multitenancy-capable correlation
5G networks
Network Security Architecture
5G mobile networks
correlation workflow
event processing
infrastructure-as-a-service cloud providers
mobile network operators
multi-tenancy management
security management
multitenancy-capable event correlation architecture
multitenancy-capable management architectures
network-slice-centric security event correlation
security management systems
software-as-a-service providers
telecommunication service providers
telecommunication services
Monitoring
network slicing
NFV
security events
telecommunication computing
5G mobile communication
Stakeholders
Correlation
pubcrawl
Resiliency
computer network management
computer architecture
mobile computing
security
telecommunication security
Cloud Computing