{"id":"https://openalex.org/W2560674110","doi":"https://doi.org/10.1109/icitcs.2016.7740306","title":"A Network Based IMSI Catcher Detection","display_name":"A Network Based IMSI Catcher Detection","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2560674110","doi":"https://doi.org/10.1109/icitcs.2016.7740306","mag":"2560674110"},"language":"en","primary_location":{"id":"doi:10.1109/icitcs.2016.7740306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066076934","display_name":"Simen Steig","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Simen Steig","raw_affiliation_strings":["NTNU, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"NTNU, Gj\u00f8vik, Norway","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040468448","display_name":"Andre Aarnes","orcid":null},"institutions":[{"id":"https://openalex.org/I2800413675","display_name":"Telenor (Norway)","ror":"https://ror.org/02jsp2z03","country_code":"NO","type":"company","lineage":["https://openalex.org/I2800413675"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Andre Aarnes","raw_affiliation_strings":["Telenor, NTNU, Trondheim, NO"],"affiliations":[{"raw_affiliation_string":"Telenor, NTNU, Trondheim, NO","institution_ids":["https://openalex.org/I2800413675"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101511221","display_name":"Thanh Do","orcid":"https://orcid.org/0000-0001-9893-5725"},"institutions":[{"id":"https://openalex.org/I4210105718","display_name":"Trondheim Kommune","ror":"https://ror.org/01gjtys23","country_code":"NO","type":"government","lineage":["https://openalex.org/I4210105718"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Thanh Van Do","raw_affiliation_strings":["Norges teknisk-naturvitenskapelige universitet, Trondheim, NO"],"affiliations":[{"raw_affiliation_string":"Norges teknisk-naturvitenskapelige universitet, Trondheim, NO","institution_ids":["https://openalex.org/I4210105718"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101729015","display_name":"Hai T. Nguyen","orcid":"https://orcid.org/0000-0003-1644-4522"},"institutions":[{"id":"https://openalex.org/I2800413675","display_name":"Telenor (Norway)","ror":"https://ror.org/02jsp2z03","country_code":"NO","type":"company","lineage":["https://openalex.org/I2800413675"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Hai Thanh Nguyen","raw_affiliation_strings":["Telenor and NTNU, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Telenor and NTNU, Oslo, Norway","institution_ids":["https://openalex.org/I2800413675"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066076934"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.78,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.89724891,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679309248924255},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.6739555597305298},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6145952939987183},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5285265445709229},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.4354480504989624},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.42957448959350586},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4148789346218109},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.255531370639801},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1712070107460022}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679309248924255},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.6739555597305298},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6145952939987183},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5285265445709229},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.4354480504989624},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.42957448959350586},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4148789346218109},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.255531370639801},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1712070107460022}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitcs.2016.7740306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1592966710","https://openalex.org/W1878194061","https://openalex.org/W2093972407","https://openalex.org/W2242979811"],"related_works":["https://openalex.org/W2121322687","https://openalex.org/W2089411671","https://openalex.org/W2303288554","https://openalex.org/W2368680194","https://openalex.org/W1600996659","https://openalex.org/W2142972685","https://openalex.org/W3033750547","https://openalex.org/W2029216794","https://openalex.org/W2047225036","https://openalex.org/W4386698331"],"abstract_inverted_index":{"The":[0,71,81,127],"weaknesses":[1],"of":[2,47,53,108,129,135,141],"2G":[3],"combined":[4],"with":[5,44],"the":[6,13,45,51,133,142,146],"need":[7],"for":[8,40,65],"backward":[9],"compatibility":[10],"make":[11],"all":[12,136],"mobile":[14],"networks":[15],"2G,":[16],"3G":[17],"and":[18,38,50,103,123,145],"4G":[19],"vulnerable":[20],"to":[21,34,60,121],"Man-in-the-":[22],"Middle":[23],"attacks":[24],"using":[25],"fake":[26],"base":[27],"stations":[28],"(\"IMSI":[29],"Catchers\").":[30],"Such":[31],"equipment":[32,152],"used":[33],"be":[35],"quite":[36],"expensive":[37,102],"unaffordable":[39],"most":[41],"people.":[42],"However,":[43],"fall":[46],"hardware":[48],"prices":[49],"emergence":[52],"open":[54],"source":[55],"software,":[56],"it":[57],"is":[58,85,153],"possible":[59],"build":[61],"an":[62],"IMSI":[63,125],"catcher":[64],"less":[66],"than":[67],"two":[68],"thousand":[69],"dollars.":[70],"user":[72],"privacy":[73],"has":[74],"never":[75],"before":[76],"been":[77],"threatened":[78],"as":[79],"today.":[80],"existing":[82,118],"detection":[83,114],"systems":[84,99],"based":[86],"on":[87,91,138],"software":[88],"applications":[89],"installed":[90],"smartphones":[92],"or":[93],"special":[94],"dedicated":[95],"stand-alone":[96],"systems.":[97],"These":[98],"are":[100],"both":[101],"have":[104],"a":[105,112],"limited":[106],"range":[107],"detection.":[109],"We":[110],"propose":[111],"new":[113],"method":[115,131],"that":[116],"uses":[117],"GSM":[119],"infrastructure":[120],"identify":[122],"detect":[124],"Catchers.":[126],"benefits":[128],"this":[130],"include":[132],"protection":[134],"users":[137],"total":[139],"coverage":[140],"operator's":[143],"network":[144],"cost":[147],"saving":[148],"since":[149],"no":[150],"extra":[151],"required.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
