ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2201.06080
  4. Cited By
Evaluating the Security of Open Radio Access Networks

Evaluating the Security of Open Radio Access Networks

16 January 2022
D. Mimran
Ron Bitton
Y. Kfir
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
A. Shabtai
ArXivPDFHTML

Papers citing "Evaluating the Security of Open Radio Access Networks"

10 / 10 papers shown
Title
How Did That Get In My Phone? Unwanted App Distribution on Android
  Devices
How Did That Get In My Phone? Unwanted App Distribution on Android Devices
Platon Kotzias
Juan Caballero
Leyla Bilge
MedIm
74
36
0
20 Oct 2020
Security Architecture for Trustworthy Systems in 5G Era
Security Architecture for Trustworthy Systems in 5G Era
Takayuki Sasaki
S. Karino
Mikiya Tani
K. Nakajima
Koki Tomita
Norio Yamagaki
18
3
0
29 Jul 2020
Authentication, Access Control, Privacy, Threats and Trust Management
  Towards Securing Fog Computing Environments: A Review
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
Abdullah Al-Noman Patwary
Anmin Fu
R. Naha
S. Battula
Saurabh Garg
Md Anwarul Kaium Patwary
E. Aghasian
26
27
0
01 Mar 2020
Security and Protocol Exploit Analysis of the 5G Specifications
Security and Protocol Exploit Analysis of the 5G Specifications
Roger Piqueras Jover
Vuk Marojevic
44
82
0
18 Sep 2018
Stealing Hyperparameters in Machine Learning
Stealing Hyperparameters in Machine Learning
Binghui Wang
Neil Zhenqiang Gong
AAML
134
464
0
14 Feb 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
71
2,181
0
03 Jan 2018
Security for 4G and 5G Cellular Networks: A Survey of Existing
  Authentication and Privacy-preserving Schemes
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
M. Ferrag
Leandros A. Maglaras
A. Argyriou
Dimitrios Kosmanos
Helge Janicke
52
215
0
14 Aug 2017
Systematic Classification of Side-Channel Attacks: A Case Study for
  Mobile Devices
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
53
214
0
11 Nov 2016
An Analysis of the Cloud Computing Security Problem
An Analysis of the Cloud Computing Security Problem
Mohamed Almorsy
J. Grundy
Ingo Müller
45
447
0
05 Sep 2016
A Survey on Wireless Security: Technical Challenges, Recent Advances and
  Future Trends
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
Yulong Zou
Jia Zhu
Xianbin Wang
L. Hanzo
40
1,155
0
29 May 2015
1