Author:
Yakar Engin,Kilinc H. Hakan
Reference10 articles.
1. Code of Federal Regulations. (2023) ”Regulation: Title 47 Chapter I Subchapter A Part 9: 911 Requirements.” https://www.ecfr.gov/current/title-47/chapter-I/subchapter-A/part-9.
2. Yang, Hu and Taki, Batoul and Bajwa, Waheed and Talasila, Manoop and Mantan, Mukesh and Aftab, Syed. (2022). ”A Machine Learning-Driven Analysis of Phantom E911 Calls.” WiSec’22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks 69-74.
3. Mirsky, Yisroel and Guri, Mordechai. (2020). ”DDoS Attacks on 9-1-1 Emergency Services.” IEEE Transactions on Dependable and Secure Computing. PP(99): 1-1.
4. ”Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures.";Hu;GetMobile: Mobile Comp. and Comm.,2023
5. Hu, Yiwen and Chen, Min-Yue and Tu, Guan-Hua and Li, Chi-Yu and Wang, Sihan and Shi, Jingwen and Xie, Tian and Xiao, Li and Peng, Chunyi, and Tan, Zhaowei and Lu, Songwu. (2022). ”Uncovering insecure designs of cellular emergency services (911).” In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (MobiCom ‘22)., New York, NY, USA, 703-715.