2023
DOI: 10.1007/978-981-19-7874-6_59
|View full text |Cite
|
Sign up to set email alerts
|

Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 67 publications
0
27
0
Order By: Relevance
“…Intent-Based Interfaces [108], [113]- [115] Information Exposure Intercepting information of intents by an unauthorized entities to compromise system security objectives(e.g. ., privacy, confidentiality [116] .This may lead to the launch of other attacks…”
Section: Deception On Attacks Intends To Tamper Transmitted Datamentioning
confidence: 99%
“…Intent-Based Interfaces [108], [113]- [115] Information Exposure Intercepting information of intents by an unauthorized entities to compromise system security objectives(e.g. ., privacy, confidentiality [116] .This may lead to the launch of other attacks…”
Section: Deception On Attacks Intends To Tamper Transmitted Datamentioning
confidence: 99%
“…Unfortunately, security requirements are frequently developed independently of other requirements engineering activities [206]. As a result, many vital security requirements [207] are often ignored, with the requirement engineers focusing only on functional requirements. To curb this, numerous security requirement engineering frameworks [65], [70], [72], techniques [68], processes [63], [71] and methodologies [67] have been proposed over the recent past.…”
Section: Research Gaps and Recommendationsmentioning
confidence: 99%
“…Thereafter, final security reviews and audits are performed during the secure deployment phase, in which customer satisfaction is vital. Some of the prescriptive actions to increase security [252] during the deployment phase of SDLC are identified in [48], [29], [149], [239], [253], [254]. Before deploying software, administrators must understand the software's security stance such that some of the identified faults that were not addressed previously are revisited, prioritized, and corrected after deployment.…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%