Network and System Security 2014
DOI: 10.1016/b978-0-12-416689-9.00011-3
|View full text |Cite
|
Sign up to set email alerts
|

Cellular Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Furthermore, in the mobile network context, we can observe similar problems because the smart devices that operate in this environment inherit the security risks that characterize the Internet-based devices (e.g., desktop computers, laptops, and so on), such as the ones above. In addition, there are a series of more specific risks related to this context [ 29 ], such as, for instance, those related to bot-net-based attacks [ 30 ], or those that jeopardize user privacy [ 31 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Furthermore, in the mobile network context, we can observe similar problems because the smart devices that operate in this environment inherit the security risks that characterize the Internet-based devices (e.g., desktop computers, laptops, and so on), such as the ones above. In addition, there are a series of more specific risks related to this context [ 29 ], such as, for instance, those related to bot-net-based attacks [ 30 ], or those that jeopardize user privacy [ 31 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Also in the mobile network context we can observe similar problems, because the smart devices that operate in this environment inherit the security risks that characterize the Internet-based devices (e.g., desktop computer, laptop, and so on), such as the aforementioned ones. In addition, there are a series of more specific risks related to this context [40] such as, for instance, those related to the bot-net-based attacks [68], or those that jeopardize the user privacy [23].…”
Section: Security Aspectsmentioning
confidence: 99%