李宏佳, 王利明, 徐震, 杨畅 - Journal of Cyber Security 信息安全 …, 2018 - 159.226.95.92
… evolution features and systematically analyze security requirements from five perspectives,
namely, the user/terminal, the network, the radio access, the application and service, and the …