{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:28:01Z","timestamp":1765960081720,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372967","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["4G and 5G"],"prefix":"10.1145","author":[{"given":"Omerani","family":"Hanane","sequence":"first","affiliation":[{"name":"Networks and Telecommunication systems department, National School of Applied Sciences\/University Ibn Tofail, Kenitra Morocco"}]},{"given":"Mazri","family":"Tomader","sequence":"additional","affiliation":[{"name":"Networks and Telecommunications department, National School of Applied Sciences\/University Ibn Tofail, Kenitra Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Advances and Challenges in 4G Wireless Networks\", 10(3), 978-1-4244-7574-2\/10\/$26.00 \u00a9 2010 IEEE","author":"Seddigh N.","year":"2010","unstructured":"N. Seddigh ( 2010 ).\" Security Advances and Challenges in 4G Wireless Networks\", 10(3), 978-1-4244-7574-2\/10\/$26.00 \u00a9 2010 IEEE . N. Seddigh (2010).\"Security Advances and Challenges in 4G Wireless Networks\", 10(3), 978-1-4244-7574-2\/10\/$26.00 \u00a9 2010 IEEE."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE Communications Magazine \u00b7","author":"Bou-Harb Elias","year":"2013","unstructured":"Elias Bou-Harb , \" Communication Security for Smart Grid Distribution Networks\" , IEEE Communications Magazine \u00b7 January 2013 42, 0163-6804\/13\/$25.00 \u00a9 2013 IEEE Elias Bou-Harb, \"Communication Security for Smart Grid Distribution Networks\", IEEE Communications Magazine \u00b7 January 201342, 0163-6804\/13\/$25.00 \u00a9 2013 IEEE"},{"key":"e_1_3_2_1_3_1","first-page":"1144","volume":"424","author":"Forsberg Dan","unstructured":"Dan Forsberg , ENHANCING SECURITY AND PRIVACY IN 3GPP E- UTRAN RADIO INTERFACE, 1- 424 4- 1144 - 1140 \/07\/$25.00 \u00a92007 IEEE. Dan Forsberg, ENHANCING SECURITY AND PRIVACY IN 3GPP E-UTRAN RADIO INTERFACE, 1-4244-1144-0\/07\/$25.00 \u00a92007 IEEE.","journal-title":"UTRAN RADIO INTERFACE, 1-"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081072"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118867464.ch9"},{"key":"e_1_3_2_1_6_1","unstructured":"Monica Paolini Wireless security in LTE networks Senza Fili Consulting \u00a9 2012 Senza Fili Consulting \u00b7 www.senzafiliconsulting.com  Monica Paolini Wireless security in LTE networks Senza Fili Consulting \u00a9 2012 Senza Fili Consulting \u00b7 www.senzafiliconsulting.com"},{"key":"e_1_3_2_1_7_1","volume":"20142014","author":"Piqueras Jover","unstructured":"Piqueras Jover et al. : Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security 20142014 :7. Piqueras Jover et al.: Enhancing the security of LTE networks against jamming attacks. EURASIP Journal on Information Security 20142014:7.","journal-title":"EURASIP Journal on Information Security"},{"key":"e_1_3_2_1_8_1","volume-title":"Conference Paper \u00b7","author":"Jover Roger Piqueras","year":"2013","unstructured":"Roger Piqueras Jover , Security Attacks Against the Availability of LTE Mobility Networks : Overview and Research , Conference Paper \u00b7 January 2013 , Roger Piqueras Jover, Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research, Conference Paper \u00b7 January 2013,"},{"key":"e_1_3_2_1_9_1","unstructured":"Igor Bilogrevic Security Issues in Next Generation Mobile Networks: LTE and Femtocells.  Igor Bilogrevic Security Issues in Next Generation Mobile Networks: LTE and Femtocells."},{"key":"e_1_3_2_1_10_1","volume-title":"Copyright (c) IARIA","author":"Vintil\u0103 Cristina-Elena","year":"2011","unstructured":"Cristina-Elena Vintil\u0103 , Security Analysis of LTE Access Network , Copyright (c) IARIA , 2011 , ISBN :978-1-61208-113-7 Cristina-Elena Vintil\u0103, Security Analysis of LTE Access Network, Copyright (c) IARIA, 2011, ISBN:978-1-61208-113-7"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume":"97","author":"Xiehua Li","unstructured":"Li Xiehua , Security Enhanced Authentication and Key Agreement Protocol for LTE\/ SAE Network , 97 8- 1 - 4244 -6252-0\/11\/$26.00 \u00a92011 IEEE Li Xiehua, Security Enhanced Authentication and Key Agreement Protocol for LTE\/SAE Network, 978-1-4244-6252-0\/11\/$26.00 \u00a92011 IEEE","journal-title":"SAE Network"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume":"97","author":"Ahmad Ijaz","unstructured":"Ijaz Ahmad , 5 G Security: Analysis of Threats and Solutions , 97 8- 1 - 5386 -3070-9\/17\/$31.00 \u00a92017 IEEE Ijaz Ahmad, 5G Security: Analysis of Threats and Solutions, 978-1-5386-3070-9\/17\/$31.00 \u00a92017 IEEE","journal-title":"Solutions"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372967"}},"subtitle":["Security and privacy analysis"],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":12,"alternative-id":["10.1145\/3372938.3372967","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372967","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}