{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:24:35Z","timestamp":1730215475461,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1109\/ecai58194.2023.10194110","type":"proceedings-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:33:22Z","timestamp":1690997602000},"page":"01-06","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent Blocking System for Mobile Communications Initiated by Unauthorized Users"],"prefix":"10.1109","author":[{"given":"Eduard-Marian","family":"B\u0103dul\u0103","sequence":"first","affiliation":[{"name":"Doctoral School of Electronics, Telecommunications and Information Technology, University Politehnica of Bucharest,Bucharest,Romania"}]},{"given":"Simona","family":"Halunga","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest,Telecommunications Department of the Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest,Telecommunications Department of the Faculty of Electronics, Telecommunications and Information Technology,Bucharest,Romania"}]},{"given":"Mircea","family":"Popescu","sequence":"additional","affiliation":[{"name":"National Institute for Research and Development in Electrical Engineering ICPE-CA,Bucharest,Romania"}]}],"member":"263","reference":[{"journal-title":"FDD vs TDD Technology","year":"2023","key":"ref13"},{"key":"ref12","first-page":"4","article-title":"LTE-A 3CC Carrier Aggregation","author":"tanner","year":"2016","journal-title":"Helsinki Metropolia University of Applied Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8300057"},{"key":"ref14","article-title":"Vulnerabilities of LTE and LTE-Advanced Communication","volume":"9 2014","author":"mahmud","year":"2014","journal-title":"Rohde & Schwarz"},{"journal-title":"LTE MIMO theory and practice","year":"2013","author":"brydon","key":"ref11"},{"journal-title":"LTE Network Infrastructure and Elements","year":"2023","key":"ref10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-020-01702-8"},{"key":"ref1","first-page":"108532","volume":"201","author":"yu","year":"2021","journal-title":"Improving 4G\/5G air interface security A survey of existing attacks on different LTE layers"},{"journal-title":"About Ettus Research","year":"2023","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290364"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.60"},{"journal-title":"About GNU radio","year":"2023","key":"ref18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WAMICON57636.2023.10124912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.09.027"},{"journal-title":"Lte-an Introduction","year":"2023","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.108209"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75075-6_47"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9824968"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"}],"event":{"name":"2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2023,6,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10193876\/10193857\/10194110.pdf?arnumber=10194110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:42:54Z","timestamp":1692639774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10194110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ecai58194.2023.10194110","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}