Back to the Future. Cross-Protocol Attacks in the Era of 5G
Intruders are attacking mobile networks from all possible angles, in part by leveraging multiple protocols in combined attacks. In this presentation, I will describe …
by Black Hat
simple network management protocol