Sign in

Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks.

Ioannis BroustisGanapathy S. SundaramHarish Viswanathan
Published in: Bell Labs Tech. J. (2012)
Keyphrases
  • cellular networks
  • mobile devices
  • wireless networks