Author:
Tian Zengshan,Li Weiguang,Yao Yujia
Reference8 articles.
1. Cattaneo, G., De Maio, G., Faruolo, P., et al.: A review of security attacks on the GSM standard. In: Information and Communication Technology-EurAsia Conference, pp. 507–512. Springer, Heidelberg (2013)
2. Song, Y., Zhou, K., Chen, X.: Fake BTS attacks of GSM system on software radio platform. JNW 7(2), 275–281 (2012)
3. ISO/IEC 9798-4: Information Technology; Security Techniques; Entity Authentication Part 4: Mechanisms using a cryptographic check function (1999)
4. Kambourakis, G., Kolias, C., Gritzalis S., et al.: Signaling-oriented DoS attacks in UMTS networks. International Conference on Information Security and Assurance, pp. 280–289. Springer, Heidelberg (2009)
5. Ricciato, F., Coluccia, A., Dalconzo, A.: A review of DoS attack models for 3G cellular networks from a system-design perspective. Comput. Commun. 33(5), 551–558 (2010)