Author of the publication

LTE/LTE-a jamming, spoofing, and sniffing: threat assessment and mitigation.

, , , , , and . IEEE Commun. Mag., 54 (4): 54-61 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and detection of SIMbox fraud in mobility networks., , , and . INFOCOM, page 1519-1526. IEEE, (2014)Crime scene investigation: SMS spam data analysis., and . Internet Measurement Conference, page 441-452. ACM, (2012)Firecycle: A scalable test bed for large-scale LTE security research., , , and . ICC, page 907-913. IEEE, (2014)Biometric Identity Based on Intra-Body Communication Channel Characteristics and Machine Learning., , , , and . Sensors, 20 (5): 1421 (2020)Detecting Malicious Activity on Smartphones Using Sensor Measurements., , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 475-487. Springer, (2015)Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.. ACM Queue, 18 (4): 37-60 (2020)LTE/LTE-a jamming, spoofing, and sniffing: threat assessment and mitigation., , , , , and . IEEE Commun. Mag., 54 (4): 54-61 (2016)Uplink Interference Mitigation for OFDMA Femtocell Networks., , and . IEEE Trans. Wirel. Commun., 11 (2): 614-625 (2012)Security attacks against the availability of LTE mobility networks: Overview and research directions.. WPMC, page 1-9. IEEE, (2013)The current state of affairs in 5G security and the main remaining security challenges.. CoRR, (2019)