{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:29:52Z","timestamp":1754195392704,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_1","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fake Base Station Detection and\u00a0Localization in\u00a05G Network: A Proof of\u00a0Concept"],"prefix":"10.1007","author":[{"given":"Danmarl","family":"Butad","sequence":"first","affiliation":[]},{"given":"Steven Matthew","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Harlee","family":"Tudtud","sequence":"additional","affiliation":[]},{"given":"Alvin Joseph","family":"Macapagal","sequence":"additional","affiliation":[]},{"given":"Philip Virgil","family":"Astillo","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Choudhary","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"1_CR1","unstructured":"Non-standalone 5g-nr vs standalone 5g nr. https:\/\/www.everythingrf.com\/community\/non-standalone-5g-nr-vs-standalone-5g-nr (2019). Accessed 14 March 2024"},{"key":"1_CR2","unstructured":"LTE RSSI, RSRP and RSRG measurement. https:\/\/www.cablefree.net\/wirelesstechnology\/4glte\/rsrp-rsrq-measurement-lte\/ (2020). Accessed 10 August-2023"},{"key":"1_CR3","unstructured":"This is how to calculate percent error. https:\/\/www.thoughtco.com\/how-to-calculate-percent-error-609584# (2020). Accessed 22 April 2022"},{"key":"1_CR4","unstructured":"A hybrid solution for 3D location and time synchronization in WSN (2017)"},{"key":"1_CR5","unstructured":"An algebraic solution to the multilateration problem (2015)"},{"key":"1_CR6","unstructured":"Arvindpdmn: 5G UE measurements and reporting. https:\/\/devopedia.org\/5g-ue-measurements-and-reporting (2021). Accessed 22 April 2022"},{"key":"1_CR7","unstructured":"ASIA, I.C.A.O., OFFICE, P.: Multilateration (mlat) concept of use. 1.0 (2007)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: Imsi-catch me if you can: Imsi-catcher-catchers (2014). Accessed 22 April 2022","DOI":"10.1145\/2664243.2664272"},{"key":"1_CR9","unstructured":"Ericsson: What is 5G? how will it transform our world? https:\/\/www.ericsson.com\/en\/5g (2020). Accessed 9 July 2022"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Karacay, L., et al.: A network-based positioning method to locate false base stations. https:\/\/doi.org\/10.1109\/access.2021.3103673 (2021). Accessed 23 April 2021","DOI":"10.1109\/access.2021.3103673"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"119100","DOI":"10.1109\/ACCESS.2021.3107308","volume":"9","author":"J Kim","year":"2021","unstructured":"Kim, J., et al.: A formally verified security scheme for inter-gnb-du handover in 5g vehicle-to-everything. IEEE Access 9, 119100\u2013119117 (2021)","journal-title":"IEEE Access"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, W., Liu, Y.: Fbs-radar: Uncovering fake base stations at scale in the wild. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/fbs-radar-uncovering-fake-base-stations-scale-wild\/ (2017). Accessed 22 April 2022","DOI":"10.14722\/ndss.2017.23098"},{"key":"1_CR13","unstructured":"RF, E.: Non-standalone 5g-nr vs standalone 5g nr. https:\/\/www.everythingrf.com\/community\/non-standalone-5g-nr-vs-standalone-5g-nr (2019). Accessed 25 July 2023"},{"key":"1_CR14","unstructured":"Techopedia: Handover(ho). https:\/\/www.techopedia.com\/definition\/19726\/handover-ho (2013). Accessed 22 April 2022"},{"key":"1_CR15","unstructured":"Wan, T.: False base station or IMSI catcher: What you need to know (2019). Accessed 22 April 2022"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:02:20Z","timestamp":1720717340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}