Research Article

Policy-Based Security Management System for 5G Heterogeneous Networks

Figure 8

Snapshot of the security management system after detecting a malicious event.