共 22 条
[1]
Ajijola A, 2014, WOR CONGR INTERNET, P66, DOI 10.1109/WorldCIS.2014.7028169
[2]
Threats Against the Virtual Machine Environment of NFV
[J].
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS),
2019,
[4]
Dahlman E., 2018, 5G NR NEXT GENERATIO, DOI [10.1016/C2017-0-01347-2, DOI 10.1016/C2017-0-01347-2]
[5]
Dutta Ashutosh, 2020, 2020 IEEE 3rd 5G World Forum (5GWF), P109, DOI 10.1109/5GWF49715.2020.9221122
[7]
Ellison D, 2019, 2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P83, DOI [10.1109/ains47559.2019.8968696, 10.1109/AINS47559.2019.8968696]
[8]
Fernandez E. B., 2019, 2 INT C COMP APPL IN, DOI [10.1109/CAIS.2019.8769449, DOI 10.1109/CAIS.2019.8769449]
[9]
Gallagher J.C., 2019, 5 GENERATION 5G TELE