Login / Signup
Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.
Evangelos Bitsikas
Christina Pöpper
Published in:
ACSAC (2021)
Keyphrases
</>
security vulnerabilities
neural network
information security
search engine