Logo
Please use this identifier to cite or link to this item: http://20.198.91.3:8080/jspui/handle/123456789/9078
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorBarik, Mridul Sankar-
dc.contributor.authorMal, Satarupa-
dc.date.accessioned2025-10-30T10:20:22Z-
dc.date.available2025-10-30T10:20:22Z-
dc.date.issued2023-
dc.date.submitted2023-
dc.identifier.otherDC3837-
dc.identifier.urihttp://20.198.91.3:8080/jspui/handle/123456789/9078-
dc.description.abstractThe fifth generation mobile communication (5G) is a fascinating technology to everyone, from common man to the industry. In comparison to the the previous generation (4G), it is meant to deliver higher multi-Gpbs peak data speed, ultra-low latency, more reliability, massive network capacity, increased availability and more uniform user experience to more users. It is supposed to design to connect virtually everyone and everything together including machines, objects and devices. Vis-a-vis the security of 5G system is of paramount importance. This thesis elaborates the threats and vulnerabilities in 5G network related to security. It also presents some threat models at the end.en_US
dc.format.extent[x],41 p.en_US
dc.language.isoenen_US
dc.publisherJadavpur University, Kolkata, West Bengalen_US
dc.subjectmobile communication (5G)en_US
dc.subjectprevious generation (4G)en_US
dc.titleThreats and vulnerabilities in 5g networksen_US
dc.typeTexten_US
dc.departmentJadavpur University, Dept. of Computer Technologyen_US
Appears in Collections:Dissertations

Files in This Item:
File Description SizeFormat 
M.Tech (Computer Science and Engineering) Satarupa Mal.pdf1.55 MBAdobe PDFView/Open


Items in IR@JU are protected by copyright, with all rights reserved, unless otherwise indicated.