Author:
Pell Robert,Moschoyiannis Sotiris,Shojafar Mohammad
Reference32 articles.
1. Gurtov, 5g security: Analysis of threats and solutions;I Ahmad;2017 IEEE Conference on Standards for Communications and Networking (CSCN),2017
2. A survey on security and privacy of 5g technologies: Potential solutions, recent advancements, and future directions;R Khan;IEEE Communications Surveys & Tutorials,2019
3. Model-based security testing: An empirical study on oauth 2.0 implementations;R Yang;Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security,2016
4. On access control, capabilities, their equivalence, and confused deputy attacks;V Rajani;IEEE 29th Computer Security Foundations Symposium (CSF),2016