{"id":"https://openalex.org/W3111204124","doi":"https://doi.org/10.1109/access.2020.3045322","title":"On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats","display_name":"On Identifying Threats and Quantifying Cybersecurity Risks of Mnos Deploying Heterogeneous Rats","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3111204124","doi":"https://doi.org/10.1109/access.2020.3045322","mag":"3111204124"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3045322","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045322","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296264.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296264.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080093097","display_name":"Anna Angelogianni","orcid":"https://orcid.org/0000-0002-0009-4479"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Anna Angelogianni","raw_affiliation_strings":["Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079427072","display_name":"Ilias Politis","orcid":"https://orcid.org/0000-0002-1083-0345"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ilias Politis","raw_affiliation_strings":["Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016033898","display_name":"Farnaz Mohammadi","orcid":null},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Farnaz Mohammadi","raw_affiliation_strings":["Passau Institute of Digital Security, University of Passau, Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Passau Institute of Digital Security, University of Passau, Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032247032","display_name":"Christos Xenakis","orcid":"https://orcid.org/0000-0001-6718-122X"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Xenakis","raw_affiliation_strings":["Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Systems Security Laboratory (SSL), University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080093097"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.3695,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82156352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"224677","last_page":"224701"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7742195129394531},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7206039428710938},{"id":"https://openalex.org/keywords/downgrade","display_name":"Downgrade","score":0.641703724861145},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5458179116249084},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.49290966987609863},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4878809452056885},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4569024443626404},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4163643717765808},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.41508686542510986},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.30682817101478577},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.20312833786010742}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7742195129394531},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7206039428710938},{"id":"https://openalex.org/C2779628075","wikidata":"https://www.wikidata.org/wiki/Q1253258","display_name":"Downgrade","level":2,"score":0.641703724861145},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5458179116249084},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.49290966987609863},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4878809452056885},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4569024443626404},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4163643717765808},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.41508686542510986},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.30682817101478577},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.20312833786010742},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3045322","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045322","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296264.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:441e5e4373774583b7e8c00ebe9d8915","is_oa":true,"landing_page_url":"https://doaj.org/article/441e5e4373774583b7e8c00ebe9d8915","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 224677-224701 (2020)","raw_type":"article"},{"id":"pmh:oai:zenodo.org:4446739","is_oa":true,"landing_page_url":"https://zenodo.org/record/4446739","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE ACCESS 8 224677 - 224701","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3045322","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045322","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296264.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1372473002","display_name":"a cyberSecurity Platform for vIrtualiseD 5G cybEr Range services","funder_award_id":"833685","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G1635887503","display_name":null,"funder_award_id":"833685","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G1958799907","display_name":null,"funder_award_id":"823997","funder_id":"https://openalex.org/F4320338337","funder_display_name":"H2020 Marie Sk\u0142odowska-Curie Actions"},{"id":"https://openalex.org/G213964246","display_name":null,"funder_award_id":"H2020-MSCA-RISE","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3345895242","display_name":null,"funder_award_id":"H2020-MSCA","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G3477743816","display_name":null,"funder_award_id":"H2020-MSCA-RISE","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G4937468798","display_name":null,"funder_award_id":"H2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5217281290","display_name":"a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era","funder_award_id":"823997","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5317956557","display_name":null,"funder_award_id":"2020.","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5859239756","display_name":null,"funder_award_id":"MSCA-RISE","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G6870533126","display_name":null,"funder_award_id":"2014-2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7517184171","display_name":null,"funder_award_id":"H2020-MSCA-RISE-201","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G7676820783","display_name":null,"funder_award_id":"H2020-MSCA-RISE-2018","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8512683158","display_name":null,"funder_award_id":"H2020-MSCA","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8933442262","display_name":null,"funder_award_id":"-MSCA-RISE-","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G964668946","display_name":null,"funder_award_id":"H2020-EU.3.7.4-SPIDER-833685","funder_id":"https://openalex.org/F4320337669","funder_display_name":"H2020 European Institute of Innovation and Technology"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320337669","display_name":"H2020 European Institute of Innovation and Technology","ror":"https://ror.org/036dxts37"},{"id":"https://openalex.org/F4320338337","display_name":"H2020 Marie Sk\u0142odowska-Curie Actions","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3111204124.pdf","grobid_xml":"https://content.openalex.org/works/W3111204124.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W171045190","https://openalex.org/W1571721593","https://openalex.org/W1753954055","https://openalex.org/W1778464109","https://openalex.org/W1972663735","https://openalex.org/W2093972407","https://openalex.org/W2105604358","https://openalex.org/W2130475833","https://openalex.org/W2141394518","https://openalex.org/W2323346483","https://openalex.org/W2399996323","https://openalex.org/W2465112802","https://openalex.org/W2508482518","https://openalex.org/W2514396107","https://openalex.org/W2538768042","https://openalex.org/W2552540656","https://openalex.org/W2735651122","https://openalex.org/W2770424304","https://openalex.org/W2776450406","https://openalex.org/W2782681674","https://openalex.org/W2792636363","https://openalex.org/W2794045175","https://openalex.org/W2886303550","https://openalex.org/W2929535634","https://openalex.org/W2932741641","https://openalex.org/W2945154566","https://openalex.org/W2946045894","https://openalex.org/W2947003210","https://openalex.org/W2963061006","https://openalex.org/W2963139382","https://openalex.org/W2965939289","https://openalex.org/W2979061401","https://openalex.org/W2987215725","https://openalex.org/W3026221883","https://openalex.org/W3034407770","https://openalex.org/W3038328903","https://openalex.org/W3080861004","https://openalex.org/W6638269463","https://openalex.org/W6679056614","https://openalex.org/W6766295807","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W3206633188","https://openalex.org/W2041034096","https://openalex.org/W2058759559","https://openalex.org/W2392180086","https://openalex.org/W2792049201","https://openalex.org/W3124827474","https://openalex.org/W4381281138","https://openalex.org/W2522787438","https://openalex.org/W2351303197","https://openalex.org/W2244900583"],"abstract_inverted_index":{"Wireless":[0],"networks":[1,24],"constitute":[2],"a":[3,105,199,204,235],"significant":[4,226],"attack":[5,132,167],"vector":[6],"for":[7,107,128,228],"adversaries":[8,50],"due":[9,66],"to":[10,45,51,67,88,95,146,161],"their":[11,214],"wide":[12],"usage":[13],"in":[14,77],"our":[15],"everyday":[16],"life.":[17],"As":[18],"the":[19,36,46,57,61,68,78,92,108,121,125,136,163,173,209,223,242],"fifth":[20],"generation":[21],"of":[22,38,48,60,91,111,124,165,179,222,237,241],"wireless":[23,40,80,115],"reaches":[25],"maturity,":[26],"several":[27],"vulnerabilities":[28,98,112],"affecting":[29],"earlier":[30],"generations":[31],"have":[32],"been":[33,144],"resolved.":[34],"Nevertheless":[35],"coexistence":[37],"legacy":[39,238],"technologies":[41],"is":[42,188],"giving":[43],"rise":[44],"risk":[47,185],"allowing":[49],"perform":[52],"downgrade":[53],"attacks,":[54],"thus":[55],"bypassing":[56],"improved":[58],"security":[59,71],"state-of-the-art":[62],"communication":[63],"networks.":[64],"Vulnerabilities":[65],"trade-off":[69],"between":[70],"and":[72,99,118,120,157,168,176,203,213,218,239],"usability":[73],"could":[74],"also":[75],"exist":[76],"latest":[79],"networking":[81],"technologies;":[82],"hence":[83],"mobile":[84,129,149,180,229],"network":[85,181,230],"operators":[86,130,150,231],"need":[87],"be":[89],"aware":[90],"risks":[93,127],"related":[94],"both":[96],"protocol":[97],"configuration":[100],"defects.":[101],"This":[102],"paper":[103],"proposes":[104],"methodology":[106,142],"systematic":[109],"identification":[110],"associated":[113],"with":[114,208],"access":[116],"protocols":[117],"systems":[119],"quantitative":[122],"evaluation":[123,221],"resulting":[126],"using":[131],"trees,":[133],"while":[134],"considering":[135],"current":[137],"legislative":[138],"frameworks.":[139],"The":[140,183,220],"proposed":[141,184],"has":[143],"designed":[145],"aid":[147],"both,":[148],"towards":[151],"planning":[152],"more":[153],"effective":[154],"cybersecurity":[155],"strategies":[156],"adopting":[158],"efficient":[159],"defences":[160],"minimise":[162],"probability":[164],"an":[166,196],"predict":[169],"its":[170],"impact":[171,215],"on":[172],"operational,":[174],"market":[175],"business":[177],"aspects":[178],"operators.":[182],"assessment":[186],"analysis":[187],"evaluated":[189],"over":[190],"three":[191],"distinct":[192],"vertical":[193],"scenarios,":[194],"namely":[195],"emergency":[197],"call,":[198],"high-speed":[200],"train":[201],"commute":[202],"massive":[205],"public":[206],"event,":[207],"most":[210],"relevant":[211],"threats":[212],"being":[216],"measured":[217],"discussed.":[219],"model":[224],"revealed":[225],"results":[227],"that":[232],"are":[233],"deploying":[234],"mix":[236],"state":[240],"art":[243],"cellular":[244],"technologies.":[245]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
