Research Article

Security Threats to Voice Services in 5G Standalone Networks

Figure 2

The process of registering to IMS.