nimbus icon indicating copy to clipboard operation
nimbus copied to clipboard

For power optimisation use case, add actions in the respective Adapters

Open nandhued opened this issue 1 year ago • 0 comments

More details needed here..

  1. Software Deployment Tools
  2. Exploit Public-Facing Application
  3. Compromise Software Supply Chain
  4. Standard Application Layer Protocol
  5. Adversary-in-the-Middle
  6. Service Based Interface
  7. Transmitted Data Manipulation
  8. Network Boundary Bridging
  9. Weaken Encryption
  10. Container Administration Command
  11. Network Function Service Discovery
  12. Network Flow Manipulation
  13. DNS Manipulation
  14. Registration of malicious network functions
  15. Unauthorized access to Network Exposure Function (NEF) via token fraud
  16. Exploit Semi-public Facing Application
  17. gNodeB Component Manipulation
  18. Radio Intelligent Controller (RIC)
  19. Rogue xApps unauthorized access
  20. Escape to Host

nandhued avatar Mar 18 '24 04:03 nandhued