Rule Anomaly-Free Mechanism of Security Function Chaining in 5G
To meet the urgent security demands, 5G aims to deploy virtualized and programmable security services and defense potential threats in real time. With the development of network function virtualization and software-defined networking, security functions can be dynamically and flexibly chained to cop...
Main Authors: | Guanwen Li, Huachun Zhou, Bohao Feng, Guanglei Li, Hongke Zhang, Teng Hu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8305470/ |
Similar Items
-
Application-aware and Dynamic Security Function Chaining for Mobile Networks
by: Guanglei Li, et al.
Published: (2017-11-01) -
Mining Security Risks from Massive Datasets
by: Liu, Fang
Published: (2017) -
Low Latency Security Function Chain Embedding Across Multiple Domains
by: Qi Xu, et al.
Published: (2018-01-01) -
Supply Chain Security. Tools, Trends, and Techniques : Toyota and Honda cases
by: Klimova, Nadezda, et al.
Published: (2011) -
A Security Monitoring Framework for Mobile Devices
by: António Lima, et al.
Published: (2020-07-01)