共 24 条
[1]
A. K. K. A, 2022, Journal of Communications, V17, P287
[2]
Overview of 5G Security Challenges and Solutions
[J].
IEEE Communications Standards Magazine,
2018, 2 (01)
:36-43
[3]
[Anonymous], 2017, MINIMUM REQUIREMENTS
[4]
A Formal Analysis of 5G Authentication
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1383-1396
[5]
Beale Jay, 2006, Wireshark & Ethereal network protocol analyzer toolkit
[8]
Dillinger M., 2005, Software defined radio: Architectures, systems and functions
[9]
Engelhardt M., 2022, arXiv
[10]
Foruhandeh Mahsa, 2020, WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, P242, DOI 10.1145/3395351.3399353