{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:35:23Z","timestamp":1765280123765},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811391545"},{"type":"electronic","value":"9789811391552"}],"license":[{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-13-9155-2_8","type":"book-chapter","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T02:03:04Z","timestamp":1560391384000},"page":"87-94","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Mobile Communication Systems: Evolution and Security"],"prefix":"10.1007","author":[{"given":"Teresa","family":"Guarda","sequence":"first","affiliation":[]},{"given":"Maria Fernanda","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Avelino","family":"Victor","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Lilian","family":"Molina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G evolution: HSPA and LTE for mobile broadband. Academic Press (2010)","key":"8_CR1","DOI":"10.1587\/transcom.E92.B.1432"},{"doi-asserted-by":"crossref","unstructured":"Rupprecht, D., Kohls, K., Holz, T., P\u00f6pper, C.: Breaking LTE on layer two. In: IEEE Symposium on Security & Privacy, pp. 2\u201316 (2019)","key":"8_CR2","DOI":"10.1109\/SP.2019.00006"},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2016.7470940","volume":"54","author":"P Rost","year":"2016","unstructured":"Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Sayadi, B.: Mobile network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84\u201391 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"8_CR4","first-page":"152","volume":"1","author":"P Gupta","year":"2013","unstructured":"Gupta, P.: Evolvement of mobile generations: 1G to 5G. Int. J. Technol. Res. Eng. 1, 152\u2013157 (2013)","journal-title":"Int. J. Technol. Res. Eng."},{"doi-asserted-by":"crossref","unstructured":"Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., Uusitalo, M.A.: Recent advancements in M2M communications in 4G networks and evolution towards 5G. In: 18th International Conference on Intelligence in Next Generation Networks (ICIN) (2015)","key":"8_CR5","DOI":"10.1109\/ICIN.2015.7073806"},{"unstructured":"Dahlman, E., Parkvall, S., Skold, J.: 4G, LTE-advanced Pro and the road to 5G. Academic Press (2016)","key":"8_CR6"},{"doi-asserted-by":"crossref","unstructured":"Sun, K., Kim, Y.: Gap analysis for adapting the distributed mobility management model in 4G\/5G mobile networks. In: IEEE Conference on Network Softwarization (NetSoft) (2017)","key":"8_CR7","DOI":"10.1109\/NETSOFT.2017.8004218"},{"issue":"1","key":"8_CR8","first-page":"38","volume":"11","author":"AB Garba","year":"2015","unstructured":"Garba, A.B., Armarego, J., Murray, D., Kenworthy, W.: Review of the information security and privacy challenges in bring your own device (BYOD) environments. J. Inf. Priv. Secur. 11(1), 38\u201354 (2015)","journal-title":"J. Inf. Priv. Secur."},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","volume":"26","author":"S Li","year":"2016","unstructured":"Li, S., Tryfonas, T., Li, H.: The internet of things: a security point of view. Internet Res. 26(2), 337\u2013359 (2016)","journal-title":"Internet Res."},{"doi-asserted-by":"crossref","unstructured":"Maxim, M., Pollino, D.: Wireless Security. McGraw-Hill\/Osborne (2002)","key":"8_CR10","DOI":"10.1016\/S1353-4858(02)00119-8"},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/JPROC.2005.862321","volume":"94","author":"H Yang","year":"2006","unstructured":"Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proc. IEEE 94(2), 442\u2013454 (2006)","journal-title":"Proc. IEEE"},{"unstructured":"Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Workshop, pp. 78\u201383 (2003)","key":"8_CR12"},{"issue":"4","key":"8_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2016.82","volume":"14","author":"M Liyanage","year":"2016","unstructured":"Liyanage, M., Abro, A.B., Ylianttila, M., Gurtov, A.: Opportunities and challenges of software-defined mobile networks in network security. IEEE Secur. Priv. 14(4), 34\u201344 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"4543","DOI":"10.1109\/ACCESS.2016.2601009","volume":"4","author":"S Mavoungou","year":"2016","unstructured":"Mavoungou, S., Kaddoum, G., Taha, M., Matar, G.: Survey on threats and attacks on mo-bile networks. IEEE Access 4, 4543\u20134572 (2016)","journal-title":"IEEE Access"}],"container-title":["Smart Innovation, Systems and Technologies","Developments and Advances in Defense and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9155-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T12:41:32Z","timestamp":1663677692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9155-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,14]]},"ISBN":["9789811391545","9789811391552"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9155-2_8","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2019,6,14]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}