Research Article

Security Threats to Voice Services in 5G Standalone Networks

Figure 7

The validation of IMS server vulnerabilities.