Research Article

Security Threats to Voice Services in 5G Standalone Networks

Figure 9

The procedure of voice monitoring attack.