Author:
Rupprecht David,Kohls Katharina,Holz Thorsten,Popper Christina
Cited by
99 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Examining Cryptography and Randomness Failures in Open-Source Cellular Cores;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
2. Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
3. PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
4. Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
5. Det-RAN: Data-Driven Cross-Layer Real-Time Attack Detection in 5G Open RANs;IEEE INFOCOM 2024 - IEEE Conference on Computer Communications;2024-05-20