Cited By
View all- Pacherkar HYan GKim YKim JKoushanfar FRasmussen K(2024)PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance GraphsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656129(254-264)Online publication date: 27-May-2024
- Chen MHu YTu GLi CWang SShi JXie THsu RXiao LPeng CTan ZLu S(2024)Taming the Insecurity of Cellular Emergency Services (9–1-1): From Vulnerabilities to Secure DesignsIEEE/ACM Transactions on Networking10.1109/TNET.2024.337929232:4(3076-3091)Online publication date: Aug-2024
- Wang SXie TChen MTu GLi CLei XChou PHsieh FHu YXiao LPeng C(2024)Dissecting Operational Cellular IoT Service Security: Attacks and DefensesIEEE/ACM Transactions on Networking10.1109/TNET.2023.331355732:2(1229-1244)Online publication date: Apr-2024
- Show More Cited By