Research Article

Towards 5G Security Analysis against Null Security Algorithms Used in Normal Communication

Figure 8

Flowchart of the anomaly detection method.