Return to Article Details Security analysis of telecommunication networks of the 5G generation Download Download PDF