1. M. Chlosta , D. Rupprecht , T. Holz , and C. Pöpper . “ LTE security disabled: misconfiguration in commercial networks”. 2019 . In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '19) . Association for Computing Machinery, New York, NY, USA, 261–266 M. Chlosta, D. Rupprecht, T. Holz, and C. Pöpper. “LTE security disabled: misconfiguration in commercial networks”. 2019. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '19). Association for Computing Machinery, New York, NY, USA, 261–266
2. I. Ahmad , T. Kumar , M. Liyanage , J. Okwuibe , M. Ylianttila and A. Gurtov , " Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine , MARCH 2018 , vol. 2 , no. 1, pp. 36 - 43 . I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila and A. Gurtov, "Overview of 5G Security Challenges and Solutions," in IEEE Communications Standards Magazine, MARCH 2018, vol. 2, no. 1, pp. 36-43.
3. S. R. Hussain , M. Echeverria , O. Chowdhury , N. Li , and E. Bertino . “ Privacy Attacks to the 4G and 5G Cellular Paging Pro-tocols Using Side Channel Information ,” in 26nd Annual Network and Distributed System Security Symposium (NDSS) , 2019 . S. R. Hussain, M. Echeverria, O. Chowdhury, N. Li, and E. Bertino. “Privacy Attacks to the 4G and 5G Cellular Paging Pro-tocols Using Side Channel Information,” in 26nd Annual Network and Distributed System Security Symposium (NDSS), 2019.
4. D. Rupprecht , “ Call me maybe: eavesdropping encrypted LTE calls with ReVoLTE”. In: 29th USENIX security symposium D. Rupprecht , “Call me maybe: eavesdropping encrypted LTE calls with ReVoLTE”. In: 29th USENIX security symposium
5. H. Kim , D. Kim , M. Kwon , H. Han , Y. Jang , D. Han , T. Kim , and Y. Kim . 2015. “Breaking and Fixing VoLTE : Exploiting Hidden Data Channels and Mis-implementations . In ACM Conference on Computer and Communications Security (CCS). H. Kim, D. Kim, M. Kwon, H. Han, Y. Jang, D. Han, T. Kim, and Y. Kim. 2015. “Breaking and Fixing VoLTE : Exploiting Hidden Data Channels and Mis-implementations. In ACM Conference on Computer and Communications Security (CCS).