Academic literature on the topic 'LTE Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LTE Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "LTE Security"
IANCU, Laura. "An Overview of LTE Security." International Journal of Information Security and Cybercrime 1, no. 2 (2012): 48–57. http://dx.doi.org/10.19107/ijisc.2012.02.06.
Full textHe, Limei, Zheng Yan, and Mohammed Atiquzzaman. "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey." IEEE Access 6 (2018): 4220–42. http://dx.doi.org/10.1109/access.2018.2792534.
Full textKim, Daegeon, Do Hyung Gu, and Huy Kang Kim. "Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment." Security and Communication Networks 2020 (December 7, 2020): 1–13. http://dx.doi.org/10.1155/2020/8869418.
Full textKhan, Shaikhul Arefin, Md Mokarram Hossain Chowdhury, and Uthso Nandy. "LTE/LTE-A Based Advanced Wireless Networks." Journal of Engineering Research and Reports 25, no. 10 (2023): 195–99. http://dx.doi.org/10.9734/jerr/2023/v25i101012.
Full textFan, Xin Xin, Teng Wu, and Guang Gong. "An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks." Applied Mechanics and Materials 490-491 (January 2014): 1436–50. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1436.
Full textPremchander, Dr Tudi. "Survey on Vulnerability of 4G/LTE Network Security and Improvements." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1736–41. http://dx.doi.org/10.22214/ijraset.2022.42666.
Full textWang, Jin, Zhongqi Zhang, Yongjun Ren, Bin Li, and Jeong-Uk Kim. "Issues toward Networks Architecture Security for LTE and LTE-A Networks." International Journal of Security and Its Applications 8, no. 4 (2014): 17–24. http://dx.doi.org/10.14257/ijsia.2014.8.4.02.
Full textCao, Jin, Maode Ma, Hui Li, Yueyu Zhang, and Zhenxing Luo. "A Survey on Security Aspects for LTE and LTE-A Networks." IEEE Communications Surveys & Tutorials 16, no. 1 (2014): 283–302. http://dx.doi.org/10.1109/surv.2013.041513.00174.
Full textPanda, Prabhat Kumar, and Sudipta Chattopadhyay. "An improved authentication and security scheme for LTE/LTE-A networks." Journal of Ambient Intelligence and Humanized Computing 11, no. 5 (2019): 2163–85. http://dx.doi.org/10.1007/s12652-019-01248-8.
Full textHuang, Lian Fen, and Hang Liu. "Research and Implementation of IPSEC Based on TD-LTE System." Applied Mechanics and Materials 427-429 (September 2013): 2783–86. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2783.
Full textDissertations / Theses on the topic "LTE Security"
Hussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Full textDeMarinis, Nicholas AF. "On LTE Security: Closing the Gap Between Standards and Implementation." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/791.
Full textPfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.
Full textAlzaabi, Mohamed Abdulla Hasan Saif. "New cryptanalysis and modelling for wireless networking." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/17115.
Full textShahriar, Chowdhury M. R. "Resilient Waveform Design for OFDM-MIMO Communication Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56973.
Full textPestrea, Anna. "Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176074.
Full textBETTASSA, COPET PIERGIUSEPPE. "User-friendly Formal Methods for Security-aware Applications and Protocols." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644847.
Full textParvez, Imtiaz. "Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3879.
Full textLegonkov, Pavel, and Vasily Prokopov. "Small Cell Wireless Backhaul in Mobile Heterogeneous Networks." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99010.
Full textPotnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.
Full textBooks on the topic "LTE Security"
Forsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470973271.
Full textForsberg, Dan, Günther Horn, Wolf-Dietrich Moeller, and Valtteri Niemi. LTE Security. John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781118380642.
Full textUnited States. Federal Bureau of Investigation., ed. FBI Personnel Security Polygraph Program. U.S. Justice, Federal Bureau of Investigation, 2003.
Find full textWhite, Jonathan Randall. Terrorism and homeland security. 6th ed. Wadsworth Cengage Learning, 2009.
Find full textJane, Pulkingham, and Ternowetsky Gordon W, eds. Remaking Canadian social policy: Social security in the late 1990s. Fernwood Publishing, 1996.
Find full textCerexhe, Peter. It's never too late: To achieve financial security - start today. Allen & Unwin, 2006.
Find full textPeterson, Richard Lewis. The real social security problem: What everyone must know before it is too late. Financial Economics Publications, 1998.
Find full textSkinner, Kiron K. Executive and Congressional use of security linkage during the late 1970s. RAND, 1994.
Find full textBook chapters on the topic "LTE Security"
Penttinen, Jyrki T. J. "LTE/SAE Security." In The LTE/SAE Deployment Handbook. John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119954187.ch11.
Full textRemy, Jean-Gabriel, and Charlotte Letamendia. "LTE Security. SIM/USIM Subsystem." In LTE Standards. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043508.ch4.
Full textJang, Uijin, Hyungmin Lim, and Hyungjoo Kim. "Security Scheme for LTE Initial Attach." In Ubiquitous Computing Application and Wireless Sensor. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9618-7_6.
Full textAlt, Stephanie, Pierre-Alain Fouque, Gilles Macario-rat, Cristina Onete, and Benjamin Richard. "A Cryptographic Analysis of UMTS/LTE AKA." In Applied Cryptography and Network Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39555-5_2.
Full textVachhani, Khyati. "Security Threats Against LTE Networks: A Survey." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_18.
Full textMoustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_119.
Full textMoustafa, Nour, and Jiankun Hu. "Security and Privacy in 4G/LTE Network." In Encyclopedia of Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_119-1.
Full textSingh, Isha, Silke Holtmanns, and Raimo Kantola. "Roaming Interface Signaling Security for LTE Networks." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_16.
Full textLu, Shujie, Jia Yu, and Ji Zhu. "Properties Emulation on TD-LTE Electric Power Wireless Private." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_49.
Full textFang, Kaiming, and Guanhua Yan. "Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_2.
Full textConference papers on the topic "LTE Security"
Chlosta, Merlin, David Rupprecht, Thorsten Holz, and Christina Pöpper. "LTE security disabled." In WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2019. http://dx.doi.org/10.1145/3317549.3324927.
Full textZhu, Li, Hang Qin, Huaqing Mao, and Zhiwen Hu. "Research on 3GPP LTE Security Architecture." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478647.
Full textSamy, Islam, Loukas Lazos, Yong Xiao, Ming Li, and Marwan Krunz. "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2018. http://dx.doi.org/10.1145/3212480.3212485.
Full textSiwach, Gautam, and Amir Esmailpour. "LTE Security potential vulnerability and algorithm enhancements." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900948.
Full textLiyanage, Madhusanka, Ijaz Ahmad, Mika Ylianttila, Andrei Gurtov, Ahmed Bux Abro, and Edgardo Montes de Oca. "Leveraging LTE security with SDN and NFV." In 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS). IEEE, 2015. http://dx.doi.org/10.1109/iciinfs.2015.7399014.
Full textKIM, HWANGUK, and SEKWON KIM. "Security Vulnerabilities and Threats of LTE Networks." In International Conference on Advances in Computing, Control and Networking - ACCN 2015. Institute of Research Engineers and Doctors, 2015. http://dx.doi.org/10.15224/978-1-63248-038-5-78.
Full textZhiyuan Shi, Zhiliang Ji, Zhibin Gao, and Lianfen Huang. "Layered security approach in LTE and simulation." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5276930.
Full textLiu Hui and Bai Shuo. "Research and implementation of LTE NAS security." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5607551.
Full textRupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Popper. "Breaking LTE on Layer Two." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00006.
Full textOulaourf, Sanaa, Abdelfatteh Haidine, and Hassan Ouahmane. "Review on using game theory in resource allocation for LTE/LTE-Advanced." In 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS). IEEE, 2016. http://dx.doi.org/10.1109/acosis.2016.7843946.
Full textReports on the topic "LTE Security"
Cichonski, Jeffrey, Joshua M. Franklin, and Michael Bartock. Guide to LTE security. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-187.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126563.
Full textAntinozzi, Isabella, and Simon Brawley. UK-EU relations and European security. Parliamentary Office of Science and Technology, 2024. http://dx.doi.org/10.58248/hs74.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Item Inventories. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126564.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Quantifying Late Detection in MC&A for Bulk Processes. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1126565.
Full textGalang, Ivory Myka. Is Food Supply Accessible, Affordable, and Stable? The State of Food Security in the Philippines. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.21.
Full textAssaye, Abebaw, and Dawit Alemu. Impact of COVID-19 on Food Systems and Rural Livelihoods in Fogera Plain, Ethiopia - Round 2 Report . Institute of Development Studies (IDS), 2020. http://dx.doi.org/10.19088/apra.2020.021.
Full textMotel-Klingebiel, Andreas, and Gerhard Naegele. Exclusion and inequality in late working life in the political context of the EU. Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/9789179293215.
Full textKugler, Adriana. The Incidence of Job Security Regulations on Labor Market Flexibility and Compliance in Colombia: Evidence from the 1990 Reform. Inter-American Development Bank, 2000. http://dx.doi.org/10.18235/0011242.
Full textBelporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.
Full text