A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …

Fbsleuth: Fake base station forensics via radio frequency fingerprinting

Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li… - Proceedings of the 2018 …, 2018 - dl.acm.org
Fake base station (FBS) crime is a type of wireless communication crime that has appeared
recently. The key to enforcing the laws on regulating FBS based crime is not only to arrest …

[HTML][HTML] Threat modeling framework for mobile communication systems

SP Rao, HY Chen, T Aura - Computers & Security, 2023 - Elsevier
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …

Predicting fault prone modules by the dempster-shafer belief networks

L Guo, B Cukic, H Singh - 18th IEEE International Conference …, 2003 - ieeexplore.ieee.org
This paper describes a novel methodology for predicting fault prone modules. The
methodology is based on Dempster-Shafer (DS) belief networks. Our approach consists of …

Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure

H Suleiman, D Svetinovic - Requirements Engineering, 2013 - Springer
This paper presents an evaluation of the security quality requirements engineering
(SQUARE) method. The evaluation of SQUARE was conducted by its application on the …

[Књига][B] Security in Wireless Communication Networks

Y Qian, F Ye, HH Chen - 2021 - books.google.com
Receive comprehensive instruction on the fundamentals of wireless security from three
leading international voices in the field Security in Wireless Communication …

Cyber attacks in cyber-physical power systems: A case study with GPRS-based SCADA systems

T Zhang, Y Wang, X Liang, Z Zhuang… - 2017 29th Chinese …, 2017 - ieeexplore.ieee.org
With the integration of computing, communication, and physical processes, the modern
power grid is becoming a large and complex cyber physical power system (CPPS). This …

Rogue base stations detection for advanced metering infrastructure based on signal strength clustering

Q Bin, C Ziwen, X Yong, H Liang, S Sheng - Ieee Access, 2019 - ieeexplore.ieee.org
The smart meters and meter collectors in Advanced Metering Infrastructure (AMI), which are
installed in every home, rely on wireless Virtual Private Network (VPN) for communicating …

A qualitative risk analysis for the GPRS technology

C Xenakis, D Apostolopoulou, A Panou… - 2008 IEEE/IFIP …, 2008 - ieeexplore.ieee.org
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS)
technology. GPRS presents several essential security weaknesses which may lead to …