{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:27:03Z","timestamp":1764401223007,"version":"3.46.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11253532","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"163-168","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Analysis Of Wi-Fi And Lte Networks For Secure Smartphone Design"],"prefix":"10.1109","author":[{"given":"Aigul","family":"Shaikhanova","sequence":"first","affiliation":[{"name":"WebTotem LLP,Astana,Kazakhstan"}]},{"given":"Yerbolsyn","family":"Jilkibayev","sequence":"additional","affiliation":[{"name":"WebTotem LLP,Astana,Kazakhstan"}]},{"given":"Yernat","family":"Atanbayev","sequence":"additional","affiliation":[{"name":"WebTotem LLP,Astana,Kazakhstan"}]},{"given":"Kamil","family":"Ayapbergenov","sequence":"additional","affiliation":[{"name":"WebTotem LLP,Astana,Kazakhstan"}]},{"given":"Konstantin","family":"Malakhov","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"}]},{"given":"Aizhan","family":"Tokkuliyeva","sequence":"additional","affiliation":[{"name":"WebTotem LLP,Astana,Kazakhstan"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Cyber Security Report 2023, Check Point Cyber Hub, [Online]"},{"key":"ref2","first-page":"1","article-title":"Attacking phone privacy","volume":"2010","author":"Nohl","year":"2010","journal-title":"Black Hat USA"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08147-7_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3322931"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485833"},{"article-title":"A survey on smartphones security: software vulnerabilities, malware, and attacks","year":"2020","author":"Ahvanooey","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833639"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"ref11","first-page":"304","author":"Proletarsky","year":"2017","journal-title":"Technology of modern wireless Wi-Fi networks"},{"key":"ref12","first-page":"128","article-title":"Osnovy proektirovaniya sotovykh seti mobil\u2019nogo svyazi [Fundamentals of designing cellular networks of mobile communications]","volume-title":"Popov Valentin Ivanovich, Skudnov Vladimir Alekseevich","author":"Popov","year":"2018"},{"key":"ref13","first-page":"1737","article-title":"Pretty good phone privacy","volume-title":"Proc. 30th USENIX Security Symp","author":"Schmitt"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418230"},{"year":"2024","key":"ref16","article-title":"Aircrack-ng. Simple WEP crack"},{"key":"ref17","article-title":"LTE Redirection Attack-Forcing Targeted LTE Cellphone into Unsafe Network","author":"Lin","year":"2016","journal-title":"Unicorn Team-Radio and Hardware Security Research"},{"volume-title":"Discover Wi-Fi Security","year":"2024","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2003.94282"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2995509"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11253532.pdf?arnumber=11253532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:24:08Z","timestamp":1764401048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11253532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11253532","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}