技術摘要(英)
This technique automatically perform security auditing to the selected containers in 5G network. The tool can automatically generate the vulnerability assessment report associated with vulnerability database, and configuration compliance report.