{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:34Z","timestamp":1763468314042,"version":"3.41.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346856","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"442-450","source":"Crossref","is-referenced-by-count":18,"title":["How voice call technology poses security threats in 4G LTE networks"],"prefix":"10.1109","author":[{"given":"Guan-Hua","family":"Tu","sequence":"first","affiliation":[]},{"given":"Chi-Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume":"18","journal-title":"obile radio interface layer 3 specification Radio Resource Control (RRC) protocol","year":"2012","key":"ref10"},{"volume":"301","journal-title":"Non-Access-Stratum (NAS) Protocol for Evolved Packet System (EPS) Stage 3","year":"2013","key":"ref11"},{"journal-title":"Nearly half a billion lte connections world-wide","year":"2015","author":"america","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588662"},{"first-page":"2013","article-title":"Cisco Visual Networking Index. Global Mobile Data Traffic Forecast Update","year":"2014","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23118"},{"key":"ref16","article-title":"Improvement on the VoLTE (Voice over LTE) Domain Handover with Operator's Vision","author":"koshimizu","year":"2012","journal-title":"IEEE WTC"},{"journal-title":"Calls Blacklist - Call Blocker available at Google Play","year":"0","author":"lee","key":"ref17"},{"key":"ref18","article-title":"Arapinis, Loretta Ilaria Mancini. Privacy through pseudonymity in mobile telephony systems","author":"myrto","year":"2014","journal-title":"NDSS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831301"},{"key":"ref28","article-title":"How Voice Calls Affect Data in Operational LTE Networks","author":"tu","year":"2013","journal-title":"Mobicom"},{"journal-title":"Global LTE Network Forecasts and Assumptions","year":"2013","key":"ref4"},{"key":"ref27","article-title":"Porta. On Attack Causality in Internet-Connected Cellular Networks","author":"traynor","year":"2007","journal-title":"Usenix Security"},{"journal-title":"Voice over LTE","year":"0","key":"ref3"},{"year":"2014","key":"ref6","article-title":"4G America:3G\/4G Deployment Status"},{"journal-title":"VoLTE Changing the Conversation","year":"2013","key":"ref5"},{"volume":"272","journal-title":"CSFB in EPS","year":"2012","key":"ref8"},{"volume":"331","journal-title":"Radio Resource Control (RRC)","year":"2006","key":"ref7"},{"year":"0","key":"ref2","article-title":"Signalling System"},{"volume":"8","journal-title":"Core Network Protocols","year":"2012","key":"ref9"},{"journal-title":"The Monsoons","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382220"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879159"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660346"},{"journal-title":"RFC 3261","year":"2002","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/1161089.1161111","article-title":"Porta. Mitigating Attacks on Open Functionality in SMS-capable Cellular Networks","author":"traynor","year":"2006","journal-title":"Mobicom"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129596"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346856.pdf?arnumber=7346856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T17:57:37Z","timestamp":1748714257000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346856","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}