Author:
Racic Radmilo,Ma Denys,Chen Hao
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ghost calls from operational 4G call systems;Proceedings of the 26th Annual International Conference on Mobile Computing and Networking;2020-04-16
2. Mobile Security and Privacy;Encyclopedia of Wireless Networks;2020
3. Mobile Security and Privacy;Encyclopedia of Wireless Networks;2019
4. Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2018
5. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks;Intelligent Distributed Computing XI;2017-10-05