On Attacking Future 5G Networks with Adversarial Examples: Survey
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various req...
Main Authors: | Mikhail Zolotukhin, Di Zhang, Timo Hämäläinen, Parsa Miraghaei |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Network |
Subjects: | |
Online Access: | https://www.mdpi.com/2673-8732/3/1/3 |
Similar Items
-
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples
by: Mikhail Zolotukhin, et al.
Published: (2022-01-01) -
Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range
by: Alberto Mozo, et al.
Published: (2022-10-01) -
ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations [version 2; peer review: 2 approved, 1 approved with reservations]
by: R. Andrew Paskauskas
Published: (2023-03-01) -
ENISA: 5G design and architecture of global mobile networks; threats, risks, vulnerabilities; cybersecurity considerations [version 3; peer review: 2 approved, 1 approved with reservations]
by: R. Andrew Paskauskas
Published: (2023-05-01) -
Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond
by: Azamat Imanbayev, et al.
Published: (2022-12-01)