{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:52:51Z","timestamp":1761630771598},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740306","type":"proceedings-article","created":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T22:01:22Z","timestamp":1480975282000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["A Network Based IMSI Catcher Detection"],"prefix":"10.1109","author":[{"given":"Simen","family":"Steig","sequence":"first","affiliation":[]},{"given":"Andre","family":"Aarnes","sequence":"additional","affiliation":[]},{"given":"Thanh","family":"Van Do","sequence":"additional","affiliation":[]},{"given":"Hai Thanh","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Method and apparatus for determining neighbour cell beacon frequencies in mobile networks","year":"2006","author":"hurst","key":"ref10"},{"journal-title":"Wideband GSM sniffing Chaos Communications Congress (27C3)","year":"2010","author":"nohl","key":"ref11"},{"key":"ref12","article-title":"Breaking GSM phone privacy","author":"nohl","year":"2010","journal-title":"Blackhat 2010"},{"journal-title":"Getting started with OpenBTS","year":"0","author":"ledema","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1368846"},{"journal-title":"GSM 04 08","article-title":"Digital cellular telecommunications system (phase 2+); Mobile radio interface layer 3 specification","year":"1996","key":"ref15"},{"journal-title":"3GPP TS 43 020","article-title":"Security-related network functions","year":"0","key":"ref16"},{"journal-title":"GSM 03 03","article-title":"Digital cellular telecommunications system (Phase 2+); Numbering, addressing and identification","year":"1996","key":"ref17"},{"journal-title":"USRP B200","year":"0","key":"ref18"},{"journal-title":"USRP N200","year":"0","key":"ref19"},{"year":"0","key":"ref4"},{"journal-title":"Detecting IMSI-Catcher Using Soft Computing in Communications in Computer and Information Science","year":"0","author":"thanh van","key":"ref3"},{"journal-title":"GSMK debuts new security systems to protect mobile network operators against eavsdropping and fraud","year":"0","key":"ref6"},{"journal-title":"Android IMSI-Catcher Detector (#AIMSICD)","year":"0","key":"ref5"},{"journal-title":"Protect yourself from cell phone interception","year":"0","key":"ref8"},{"journal-title":"Digital Cellular Telecommunications System (Phase 2+) Radio Subsystem Link Control","year":"1996","key":"ref7"},{"journal-title":"Thoresen Secret surveillance of Norway's leaders detected","year":"2104","author":"foss","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664272"},{"key":"ref1","article-title":"Strong Authentication for Web services with Mobile Universal Identity in Lecture Notes in Computer Science","author":"van do","year":"0","journal-title":"Mobile Web and Intelligent Information Systems"},{"journal-title":"OpenBTS","year":"0","key":"ref20"},{"key":"ref22","article-title":"An investigation into the claims of imsi catchers use in oslo in late 2014","author":"laboratory","year":"2015","journal-title":"Technical Report"},{"journal-title":"Rise of the IMSI Catcher Media Fields Journal","year":"2016","author":"parks","key":"ref21"},{"journal-title":"Surveillance and IMSI Catchers","year":"2014","author":"rosberg","key":"ref24"},{"journal-title":"Mobile network forensic analysis","year":"2015","author":"delma","key":"ref23"},{"journal-title":"Chinese cops cuff 1 500 in fake base station spam raid","year":"2014","author":"muncaster","key":"ref25"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740306.pdf?arnumber=7740306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T01:39:35Z","timestamp":1589593175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7740306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740306","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}