iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CNS.2015.7346856
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:35:47Z","timestamp":1730208947416,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346856","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:19:48Z","timestamp":1449595188000},"page":"442-450","source":"Crossref","is-referenced-by-count":18,"title":["How voice call technology poses security threats in 4G LTE networks"],"prefix":"10.1109","author":[{"given":"Guan-Hua","family":"Tu","sequence":"first","affiliation":[]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume":"18","journal-title":"obile radio interface layer 3 specification Radio Resource Control (RRC) protocol","year":"2012","key":"ref10"},{"volume":"301","journal-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS) Stage 3","year":"2013","key":"ref11"},{"journal-title":"Nearly half a billion lte connections world-wide","year":"2015","author":"america","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588662"},{"first-page":"2013","article-title":"Cisco Visual Networking Index. Global Mobile Data Traffic Forecast Update","year":"2014","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23118"},{"journal-title":"IEEE WTC","article-title":"Improvement on the VoLTE (Voice over LTE) Domain Handover with Operator's Vision","year":"2012","author":"koshimizu","key":"ref16"},{"journal-title":"Calls Blacklist - Call Blocker available at Google Play","year":"0","author":"lee","key":"ref17"},{"journal-title":"NDSS","article-title":"Arapinis, Loretta Ilaria Mancini. Privacy through pseudonymity in mobile telephony systems","year":"2014","author":"myrto","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831301"},{"journal-title":"Mobicom","article-title":"How Voice Calls Affect Data in Operational LTE Networks","year":"2013","author":"tu","key":"ref28"},{"journal-title":"Global LTE Network Forecasts and Assumptions","year":"2013","key":"ref4"},{"journal-title":"Usenix Security","article-title":"Porta. On Attack Causality in Internet-Connected Cellular Networks","year":"2007","author":"traynor","key":"ref27"},{"journal-title":"Voice over LTE","year":"0","key":"ref3"},{"year":"2014","key":"ref6","article-title":"4G America:3G\/4G Deployment Status"},{"journal-title":"VoLTE Changing the Conversation","year":"2013","key":"ref5"},{"volume":"272","journal-title":"CSFB in EPS","year":"2012","key":"ref8"},{"volume":"331","journal-title":"Radio Resource Control (RRC)","year":"2006","key":"ref7"},{"year":"0","key":"ref2","article-title":"Signalling System"},{"volume":"8","journal-title":"Core Network Protocols","year":"2012","key":"ref9"},{"journal-title":"The Monsoons","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879159"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"journal-title":"RFC 3261","year":"2002","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"journal-title":"Mobicom","article-title":"Porta. Mitigating Attacks on Open Functionality in SMS-capable Cellular Networks","year":"2006","author":"traynor","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129596"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346856.pdf?arnumber=7346856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:47:39Z","timestamp":1490388459000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":28,"URL":"http:\/\/dx.doi.org\/10.1109\/cns.2015.7346856","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}