Login / Signup
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Yuwei Zheng
Lin Huang
Haoqi Shan
Jun Li
Qing Yang
Wenyuan Xu
Published in:
CNS (2017)
Keyphrases
</>
quality of service
computer science
pricing model
long term evolution
computer simulation
fourth generation
internet access
decision making
sensor networks
video streaming
real time
signal processing
wireless communication
energy saving
dynamic range