Five disruptive technology directions for 5G, IEEE Communications Magazine, vol.52, issue.2, pp.74-80, 2014. ,
DOI : 10.1109/MCOM.2014.6736746
Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap, IEEE Communications Magazine, vol.53, issue.9, pp.32-40, 2015. ,
DOI : 10.1109/MCOM.2015.7263370
URL : http://arxiv.org/abs/1509.09299
Performance Analysis of M2M Communication Networks for QoS-Differentiated Smart Grid Applications, 2015 IEEE Globecom Workshops (GC Wkshps), pp.1-6, 2015. ,
DOI : 10.1109/GLOCOMW.2015.7414116
5G: Future Mobile Technology-Vision 2020, International Journal of Computer Applications, vol.54, issue.17, pp.6-10, 2012. ,
DOI : 10.5120/8656-2264
Seven ways that HetNets are a cellular paradigm shift, IEEE Communications Magazine, vol.51, issue.3, pp.136-144, 2013. ,
DOI : 10.1109/MCOM.2013.6476878
URL : http://www.ece.utexas.edu/%7Ejandrews/pubs/And_HetNet_CommMag2012_v3.pdf
Scenarios for 5G mobile and wireless communications: the vision of the METIS project, IEEE Communications Magazine, vol.52, issue.5, pp.26-35, 2014. ,
DOI : 10.1109/MCOM.2014.6815890
A novel learning mechanism for traffic offloading with small cell as a service, 2015 IEEE International Conference on Communications (ICC), 2015. ,
DOI : 10.1109/ICC.2015.7249424
System architecture and aspects of SESAME: Small cEllS coordinAtion for Multi-tenancy and Edge services, 2nd IEEE Conference on Network Softwarization (NetSoft), Workshop on Software Defined 5G Networks (Soft5G), 2016. ,
A 5G infrastructure for anything-as-a-service, J. of Telecommun. Syst. & Manag, vol.3, issue.2, pp.1-10, 2014. ,
Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014. ,
DOI : 10.1145/2677046.2677052
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. arXiv preprint arXiv:1602, p.484, 2016. ,
Network function virtualization: Challenges and opportunities for innovations, IEEE Communications Magazine, vol.53, issue.2, pp.90-97, 2015. ,
DOI : 10.1109/MCOM.2015.7045396
Network function virtualization in the multi-tenant cloud, IEEE Netw, vol.29, issue.3, pp.42-47, 2015. ,
Link-level access cloud architecture design based on SDN for 5G networks, IEEE Network, vol.29, issue.2, pp.24-31, 2015. ,
DOI : 10.1109/MNET.2015.7064899
Integrating network function virtualization with SDR and SDN for 4G/5G networks, IEEE Network, vol.29, issue.3, pp.54-59, 2015. ,
DOI : 10.1109/MNET.2015.7113226
Security for 5G Communications. Fundamentals of 5G Mobile Netw, 2015. ,
DOI : 10.1002/9781118867464.ch9
Unified Security Architecture Research for 5G Wireless System, 2014 11th Web Information System and Application Conference, 2014. ,
DOI : 10.1109/WISA.2014.25
Safeguarding 5G wireless communication networks using physical layer security, IEEE Communications Magazine, vol.53, issue.4, pp.20-27, 2015. ,
DOI : 10.1109/MCOM.2015.7081071
URL : https://hal.archives-ouvertes.fr/hal-01270541
Authentication handover and privacy protection in 5G hetnets using software-defined networking, IEEE Communications Magazine, vol.53, issue.4, pp.28-35, 2015. ,
DOI : 10.1109/MCOM.2015.7081072
A softwaredefined architecture for next-generation cellular networks, IEEE Int. Conf. on Commun. (ICC), 2016. ,
DOI : 10.1109/icc.2016.7511018
Mobileflow: Toward software-defined mobile networks, IEEE Communications Magazine, vol.51, issue.7, pp.44-53, 2013. ,
DOI : 10.1109/MCOM.2013.6553677
Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells, Mobile Networks and Applications, pp.1-11, 2016. ,
DOI : 10.1109/MNET.2015.7340423
Physical attacks and tamper resistance. Introduction to Hardware Security and Trust, pp.143-173, 2012. ,
DOI : 10.1007/978-1-4419-8080-9_7
Security Guidance for Critical Areas of Focus in Cloud Computing V2, 2009. ,
A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011. ,
DOI : 10.1016/j.jnca.2010.07.006
Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software, vol.86, issue.9, pp.2263-2268, 2013. ,
DOI : 10.1016/j.jss.2012.12.025
Addressing cloud computing security issues, Future Generation Computer Systems, vol.28, issue.3, pp.583-592, 2012. ,
DOI : 10.1016/j.future.2010.12.006
A framework to support selection of cloud providers based on security and privacy requirements, Journal of Systems and Software, vol.86, issue.9, pp.2276-2293, 2013. ,
DOI : 10.1016/j.jss.2013.03.011
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
DOI : 10.1109/TIT.1983.1056650
Embedded systems security: Threats, vulnerabilities, and attack taxonomy, 2015 13th Annual Conference on Privacy, Security and Trust (PST), 2015. ,
DOI : 10.1109/PST.2015.7232966
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128, Periodica Mathematica Hungarica, vol.34, issue.12, pp.205-227, 2012. ,
DOI : 10.1109/TC.1985.1676518
A Denial of Service Attack to GSM Networks via Attach Procedure, International Conference on Availability, Reliability, and Security, pp.361-376, 2013. ,
DOI : 10.1007/978-3-642-40588-4_25
URL : https://hal.archives-ouvertes.fr/hal-01506555
A denial of service attack to UMTS networks using SIM-less devices, IEEE Transactions on Dependable and Secure Computing, vol.11, issue.3, pp.280-291, 2014. ,
Denial-of-Service Attacks in Wireless Networks Using Off-the-Shelf Hardware, Distributed, Ambient, and Pervasive Interactions, pp.427-438, 2014. ,
DOI : 10.1007/978-3-319-07788-8_40
Bring your own device, securely, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, 2013. ,
DOI : 10.1145/2480362.2480707
MoCFI: A framework to mitigate control-flow attacks on smartphones, Annu. Netw. & Distr. Syst. Secur. Symp, 2012. ,
Research of defense scheme against buffer overflow attack in embedded system, Journal of Computer Applications, vol.32, issue.12, 2012. ,
DOI : 10.3724/SP.J.1087.2012.03449
SoftNet: A software defined decentralized mobile network architecture toward 5G, IEEE Network, vol.29, issue.2, pp.16-22, 2015. ,
DOI : 10.1109/MNET.2015.7064898
On the security of software-defined next-generation cellular networks, In: IEICE Inf. and Commun. Tech. Forum (ICTF), 2016. ,
Virtualization, Communications of the ACM, vol.54, issue.1, pp.61-65, 2011. ,
DOI : 10.1145/1866739.1866754
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.17
Implementing TLS with Verified Cryptographic Security, 2013 IEEE Symposium on Security and Privacy, 2013. ,
DOI : 10.1109/SP.2013.37
URL : https://hal.archives-ouvertes.fr/hal-00863373
Hardware security: Threat models and metrics, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2013. ,
DOI : 10.1109/ICCAD.2013.6691207
Towards device-to-user authentication, Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia, MUM '15, pp.131-135, 2015. ,
DOI : 10.1109/ICMU.2015.7061059
Characterizing hypervisor vulnerabilities in cloud computing servers, Proceedings of the 2013 international workshop on Security in cloud computing, Cloud Computing '13, pp.3-10, 2013. ,
DOI : 10.1145/2484402.2484406
Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, 2011. ,
DOI : 10.1145/1972551.1972552
Virtualization Security Assessment, Information Security Journal: A Global Perspective, vol.18, issue.3, pp.124-130, 2009. ,
DOI : 10.1080/19393550902791440
Distributed mobility management for future 5G networks: overview and analysis of existing approaches, IEEE Communications Magazine, vol.53, issue.1, pp.142-149, 2015. ,
DOI : 10.1109/MCOM.2015.7010527
When crowdsourcing meets mobile sensing: a social network perspective, IEEE Communications Magazine, vol.53, issue.10, pp.157-163, 2015. ,
DOI : 10.1109/MCOM.2015.7295478
URL : http://arxiv.org/abs/1508.00299
Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world, IEEE Network, vol.29, issue.2, pp.40-45, 2015. ,
DOI : 10.1109/MNET.2015.7064901
Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.43
Network Store, Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture, MobiArch '15, 2015. ,
DOI : 10.1145/2789168.2789178
URL : https://hal.archives-ouvertes.fr/hal-01296747
Emerging technologies and research challenges for 5G wireless networks, IEEE Wireless Communications, vol.21, issue.2, pp.106-112, 2014. ,
DOI : 10.1109/MWC.2014.6812298
URL : http://arxiv.org/pdf/1402.6474
Virtualization security for cloud computing service, 2011 International Conference on Cloud and Service Computing, pp.174-179, 2011. ,
DOI : 10.1109/CSC.2011.6138516
Detecting malware signatures in a thin hypervisor, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, p.27, 2012. ,
DOI : 10.1145/2245276.2232070
File Parsing Vulnerability Detection with Symbolic Execution, 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012. ,
DOI : 10.1109/TASE.2012.13
Software-Defined Mobile Networks Security, Mobile Networks and Applications, vol.53, issue.4, pp.1-15, 2015. ,
DOI : 10.1145/2684793.2684797
IoT Enablers and Their Security and Privacy Issues, Internet of Things (IoT) in 5G Mobile Technologies, pp.449-482, 2016. ,
DOI : 10.1007/978-3-319-30913-2_19