Research Article

Study on Security and Privacy in 5G-Enabled Applications

Figure 4

Risks to 5G applications in an end-to-end view.