5G mobile networks: reviewing security control correctness for mischievous activity
Article highlights Propose Control-Risk-Correctness (CRC) method for mobile telecommunications networks. Use CRC for simplified risk analysis in mobile networks and apply it on various trust boundaries. Identify elevated risk rating for trust boundaries.
Main Authors: | Eric Yocam, Amjad Gawanmeh, Ahmad Alomari, Wathiq Mansoor |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer
2022-10-01
|
Series: | SN Applied Sciences |
Subjects: | |
Online Access: | https://doi.org/10.1007/s42452-022-05193-8 |
Similar Items
-
Digital Risk Assessment Framework for Individuals: Analysis and Recommendations
by: Suadad Muammar, et al.
Published: (2023-01-01) -
Risks of Mergers and Acquisitions Processes
by: Skitsko Volodymyr I., et al.
Published: (2017-06-01) -
THE MODEL FOR RISK ASSESSMENT ERP-SYSTEMS INFORMATION SECURITY
by: V. S. Oladko, et al.
Published: (2016-12-01) -
THE THEORY OF SECURITY AND INSECURITY (Part II)
by: Colonel (ret.) Professor engineer Eugen SITEANU, PhD
Published: (2020-12-01) -
DIRECTIONS OF SECURING THE BANKING SYSTEM OF UKRAINE AGAINST THREAT TO ITS FINANCIAL SECURITY AND ELIMINATING RISKS IN THIS SPHERE
by: Anastasya Lagno
Published: (2022-12-01)