Research Article

Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication

Figure 5

Threat model instrumentor.