Cited By
View all- Pacherkar HYan GKim YKim JKoushanfar FRasmussen K(2024)PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance GraphsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656129(254-264)Online publication date: 27-May-2024
- zhang hzhuang lwei dhuang wli j(2024)Passive traffic analysis based on resource occupancy of mobile communication uplink control channelThird International Conference on Algorithms, Microchips, and Network Applications (AMNA 2024)10.1117/12.3031911(9)Online publication date: 8-Jun-2024
- Hoang TPark CSon MOh TBae SAhn JOh BKim YBoureanu ISchneider SReaves BTippenhauer N(2023)LTESniffer: An Open-source LTE Downlink/Uplink EavesdropperProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590196(43-48)Online publication date: 29-May-2023
- Show More Cited By