透過您的圖書館登入
IP:3.141.100.120

並列摘要


Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement of security and privacy of mobile operators. A threat model was created, according to which countermeasures tailored to the specific environment of a mobile operator are proposed.

並列關鍵字

Mobile operators security vulnerabilities

被引用紀錄


Yong, L. J. (2015). 有號和帶負值支配問題的演算法及複雜度 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2015.00359
Chang, Y. M. (2010). 於光纖同軸混合型網路上自動救援纜線數據機出廠資料之方法 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2010.00362
Pontaza, R. (2016). p-向量, p-陣列與密碼協定 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU201610198
卓慧中(2012)。參與相思樹黃酮醇生合成之酵素基因選殖與特性分析〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2012.00812
陳昱翰(2009)。針對智慧型視覺辨識應用之大腦啟發演算法及架構設計〔博士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2009.00867

延伸閱讀