共 50 条
- [21] Security analysis of network access control implementations RELIABILITY, RISK AND SAFETY: THEORY AND APPLICATIONS VOLS 1-3, 2010, : 1907 - 1914
- [22] Secure Dynamic Routing Protocols based on Cross-Layer Network Security Evaluation 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 303 - 308
- [23] A Novel Multiple Access Scheme with Physical Layer Security 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 36 - 40
- [24] The Evaluation Model for Network Security 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 690 - 694
- [25] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security Array, 2022, 16
- [26] Penetration testing - An useful form of computer network security testing ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4458 - 4460
- [27] Trust management and network layer security protocols SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
- [29] Quantum photonic network and physical layer security PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2017, 375 (2099):
- [30] Cognitive Security in Software Define Network Layer JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 69 - 74