Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

Ioannis Broustis, Ganapathy S. Sundaram, Harish Viswanathan. Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks. Bell Labs Technical Journal, 17(1):125-140, 2012. [doi]

@article{BroustisSV12,
  title = {Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks},
  author = {Ioannis Broustis and Ganapathy S. Sundaram and Harish Viswanathan},
  year = {2012},
  doi = {10.1002/bltj.21527},
  url = {http://dx.doi.org/10.1002/bltj.21527},
  researchr = {https://researchr.org/publication/BroustisSV12},
  cites = {0},
  citedby = {0},
  journal = {Bell Labs Technical Journal},
  volume = {17},
  number = {1},
  pages = {125-140},
}