{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:30:12Z","timestamp":1743010212140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031222948"},{"type":"electronic","value":"9783031222955"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22295-5_5","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T02:36:12Z","timestamp":1672540572000},"page":"80-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["IMSI Probing: Possibilities and\u00a0Limitations"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Brunke","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Beidenhauser","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Hartmut","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Reti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"5_CR1","unstructured":"Amarisoft: Amari callbox (2022). https:\/\/www.amarisoft.com"},{"key":"5_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221","volume-title":"New Privacy Issues in Mobile Telephony: Fix and Verification","author":"M Arapinis","year":"2012","unstructured":"Arapinis, M., et al.: New Privacy Issues in Mobile Telephony: Fix and Verification. CCS, North Carolina, USA (2012)"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Bui, N., Widmer, J.: Owl: a reliable online watcher for LTE control channel measurements. In: Proceedings of the 5th Workshop on All Things Cellular: Operations, Applications and Challenges, pp. 25\u201330. ATC 2016, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2980055.2980057","DOI":"10.1145\/2980055.2980057"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Falkenberg, R., Ide, C., Wietfeld, C.: Client-based control channel analysis for connectivity estimation in LTE networks. In: 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/VTCFall.2016.7880932","DOI":"10.1109\/VTCFall.2016.7880932"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Falkenberg, R., Wietfeld, C.: FALCON: an accurate real-time monitor for client-based mobile network data analytics. In: 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, Waikoloa, Hawaii, USA (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9014096, https:\/\/arxiv.org\/abs\/1907.10110","DOI":"10.1109\/GLOBECOM38437.2019.9014096"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Hong, B., Bae, S., Kim, Y.: GUTI reallocation demystified: cellular location tracking with changing temporary identifier. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23349"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/2740070.2626320","volume":"44","author":"S Kumar","year":"2014","unstructured":"Kumar, S., Hamed, E., Katabi, D., Erran Li, L.: LTE radio analytics made easy and accessible. SIGCOMM Comput. Commun. Rev. 44(4), 211\u2013222 (2014). https:\/\/doi.org\/10.1145\/2740070.2626320","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"5_CR8","unstructured":"Kune, D.F., Koelndorfer, J., Hopper, N., Kim, Y.: Location leaks on the GSM air interface. ISOC NDSS (2012)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-65127-9_19","volume-title":"Computer Network Security","author":"SF Mj\u00f8lsnes","year":"2017","unstructured":"Mj\u00f8lsnes, S.F., Olimid, R.F.: Easy 4G\/LTE IMSI catchers for non-programmers. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 235\u2013246. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65127-9_19"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Nie, S., Zhang, Y., Wan, T., Duan, H., Li, S.: Measuring the deployment of 5g security enhancement. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 169\u2013174. WiSec 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3507657.3528559","DOI":"10.1145\/3507657.3528559"},{"key":"5_CR11","unstructured":"OpenAirInterface software alliance: openairinterface (2022). https:\/\/openairinterface.org"},{"key":"5_CR12","unstructured":"P1sec: QCSuper (2022). https:\/\/github.com\/P1sec\/QCSuper"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., Seifert, J.P.: Practical attacks against privacy and availability in 4g\/LTE mobile communication systems. NDSS16 (2016)","DOI":"10.14722\/ndss.2016.23236"},{"key":"5_CR14","unstructured":"Software Radio Systems: srsRAN (2022). https:\/\/github.com\/srsran\/srsRAN"},{"key":"5_CR15","unstructured":"Zalani, R.: Screen time statistics 2021: your smartphone is hurting you (2021). https:\/\/elitecontentmarketer.com\/screen-time-statistics\/"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22295-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T02:41:10Z","timestamp":1672540870000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22295-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031222948","9783031222955"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22295-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Reykjavic","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iceland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nordsec2022.ru.is\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}