Login / Signup

Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.

Evangelos BitsikasChristina Pöpper
Published in: ACSAC (2021)
Keyphrases
  • security vulnerabilities
  • neural network
  • information security
  • search engine