Skip to main navigation
Skip to search
Skip to main content
VTT's Research Information Portal Home
Search content at VTT's Research Information Portal
Home
Profiles
Research output
Projects
Datasets
Research units
Research Infrastructures
Activities
Prizes
Press/Media
Impacts
A Comprehensive Guide to 5G Security
Madhusanka Liyanage (Editor)
,
Ijaz Ahmad
(Editor)
, Andrei Gurtov (Editor)
, Mika Ylianttila (Editor)
, Ahmad-Bux Abro (Editor)
Not published at VTT
University of Oulu
University of Linköping
Research output
:
Book/Report
›
Book (editor)
›
Professional
112
Link opens in a new tab
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'A Comprehensive Guide to 5G Security'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Mobile Networks
100%
5G Security
100%
Centricity
75%
5G Networks
50%
System Design
25%
Wireless Devices
25%
User Device
25%
Service Requirements
25%
Wireless
25%
Industrial Internet
25%
Service Model
25%
Mobile Users
25%
Internet of Things
25%
Virtual Network Operator
25%
Cybersecurity
25%
Mobile Network Operator
25%
Cloud Computing
25%
Mobile Edge Computing
25%
System Security
25%
5G Systems
25%
Expert Team
25%
Security Model
25%
Security Requirements
25%
Operational Network
25%
Preventive Maintenance
25%
Network Applications
25%
5G Mobile Networks
25%
Autonomous Cars
25%
5G Deployment
25%
Security Architecture
25%
4G LTE
25%
Remote Diagnostics
25%
Trust Model
25%
Mobile Security
25%
International Teams
25%
SIM Card
25%
Security Practices
25%
3G Network
25%
Data Center Networks
25%
Mission-critical Applications
25%
Smart Logistics
25%
Device Data
25%
Transparent Communication
25%
5G Ecosystem
25%
People-centricity
25%
Autonomous UAV
25%
User Privacy Concerns
25%
Mobile Mechanism
25%
Business Professionals
25%
Item Tracking
25%
Security Theory
25%
Future Threats
25%
Remote Health Monitoring
25%
5G Development
25%
Security Considerations
25%
Computer Science
Mobile Network
100%
Internet-Of-Things
60%
5G Mobile Communication
40%
Wireless Network
20%
Data Center
20%
Service Model
20%
Cybersecurity
20%
Cloud Computing
20%
User Privacy
20%
Security Model
20%
Privacy Concern
20%
Security Requirements
20%
Network Security
20%
Security Architecture
20%
Remote Diagnostics
20%
Multi-Access Edge Computing
20%
Mobile Network Operator
20%
Critical Application
20%
Service Requirement
20%
Network Operator
20%
Preventive Maintenance
20%
Mobile Operator
20%
Unmanned Aerial Vehicle
20%
INIS
security
100%
devices
25%
design
16%
internet
16%
cars
8%
information
8%
data
8%
resources
8%
applications
8%
ecosystems
8%
architecture
8%
implementation
8%
business
8%
monitoring
8%
sensors
8%
equipment
8%
people
8%
maintenance
8%
clouds
8%
engineers
8%