Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On security research towards future mobile network generations
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …
network generations have been revealed that threaten users as well as network providers. In …
Breaking LTE on layer two
Long Term Evolution (LTE) is the latest mobile communication standard and has a pivotal
role in our information society: LTE combines performance goals with modern security …
role in our information society: LTE combines performance goals with modern security …
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
In the past decade, the security of cellular networks has been increasingly under scrutiny,
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
leading to the discovery of numerous vulnerabilities that expose the network and its users to …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
LTE/LTE-A network security data collection and analysis for security measurement: A survey
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …
Breaking and fixing volte: Exploiting hidden data channels and mis-implementations
Long Term Evolution (LTE) is becoming the dominant cellular networking technology,
shifting the cellular network away from its circuit-switched legacy towards a packet-switched …
shifting the cellular network away from its circuit-switched legacy towards a packet-switched …
[HTML][HTML] Threat modeling framework for mobile communication systems
This paper presents a domain-specific threat-modeling framework for the cellular mobile
networks. We survey known attacks against mobile communication and organize them into …
networks. We survey known attacks against mobile communication and organize them into …
Transparent AAA security design for low-latency MEC-integrated cellular networks
Multi-access edge computing (MEC) is a key enabler for low-latency services in the cellular
network. It enables service requests to be served at the edge without reaching the Internet …
network. It enables service requests to be served at the edge without reaching the Internet …
PROV5GC: Hardening 5G core network security with attack detection and attribution based on provenance graphs
HS Pacherkar, G Yan - Proceedings of the 17th ACM Conference on …, 2024 - dl.acm.org
As 5G networks become part of the critical infrastructures whose dysfunctions can cause
severe damages to society, their security has been increasingly scrutinized. Recent works …
severe damages to society, their security has been increasingly scrutinized. Recent works …
How can IoT services pose new security threats in operational cellular networks?
Carriers are rolling out Internet of Things (IoT) services including various IoT devices and
use scenarios. Compared with conventional non-IoT devices such as smartphones and …
use scenarios. Compared with conventional non-IoT devices such as smartphones and …