Author:
Afzal Rafia,Murugesan Raja Kumar
Reference12 articles.
1. GSM Association: The mobile economy. Technical report, 35 (2018). https://doi.org/10.5121/ijcsit.2015.7409
2. ETSI: 3GPP Technical Specification 29.272 (2019). https://www.etsi.org/deliver/etsi_ts/129200_129299/129272/15.04.00_60/ts_129272v150400p.pdf
3. International Telecommunication Union(ITU)-T: ITU Workshop on SS7 Security. Technical report, International Telecommunication Union(ITU)-T (2016). http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201606/Pages/default.aspx
4. Jensen, K., Nguyen, H.T., Do, T.V., Årnes, A.: A big data analytics approach to combat telecommunication vulnerabilities. Clust. Comput. 20(3), 2363–2374 (2017). https://doi.org/10.1007/s10586-017-0811-x
5. Mahdizadeh, M.S., Bahrak, B.: A regression framework for predicting user’s next location using call detail records. Comput. Netw. 183, 107618 (2020)