Graph database based security protection mechanism of 5G network data flow
As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combini...
Saved in:
| Main Authors: | Li SU, Li LU, Xing ZHANG, Chang LIU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2021-04-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021058/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security Vision of 5G
by: Hongru Zhu, et al.
Published: (2014-11-01) -
Fact-Checking 5G Security: Bridging the Gap Between Expectations and Reality
by: Oscar Lasierra, et al.
Published: (2025-01-01) -
Overview and prospect of 5G security
by: Zhiqiang YANG, et al.
Published: (2020-12-01) -
Triple-layered security system: reliable and secured image communications over 5G and beyond networks
by: Tarek Srour, et al.
Published: (2025-08-01) -
EU’s strategy and practice of 5G network security
by: Feng GUO, et al.
Published: (2020-06-01)