{"id":"https://openalex.org/W2621004193","doi":"https://doi.org/10.1145/3019612.3019721","title":"Observation-based detection of femtocell attacks in wireless mobile networks","display_name":"Observation-based detection of femtocell attacks in wireless mobile networks","publication_year":2017,"publication_date":"2017-04-03","ids":{"openalex":"https://openalex.org/W2621004193","doi":"https://doi.org/10.1145/3019612.3019721","mag":"2621004193"},"language":"en","primary_location":{"id":"doi:10.1145/3019612.3019721","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3019612.3019721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070175154","display_name":"Mohamed Jacem Guezguez","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mohamed Jacem Guezguez","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056170858","display_name":"Slim Rekhis","orcid":"https://orcid.org/0000-0002-6507-6300"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Slim Rekhis","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113487171","display_name":"Noureddine Boudriga","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Noureddine Boudriga","raw_affiliation_strings":["University of Carthage, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070175154"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.9246,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74767129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"529","last_page":"534"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/femtocell","display_name":"Femtocell","score":0.9690549373626709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7050783634185791},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6426992416381836},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.6231874227523804},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5861448645591736},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5806620717048645},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43633797764778137},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.41984865069389343},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3320104479789734}],"concepts":[{"id":"https://openalex.org/C152504517","wikidata":"https://www.wikidata.org/wiki/Q572455","display_name":"Femtocell","level":3,"score":0.9690549373626709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7050783634185791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6426992416381836},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6231874227523804},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5861448645591736},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5806620717048645},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43633797764778137},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.41984865069389343},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3320104479789734}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3019612.3019721","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3019612.3019721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2045673642","https://openalex.org/W2064819263","https://openalex.org/W2072399850","https://openalex.org/W2332985111","https://openalex.org/W2406195999","https://openalex.org/W2951281088"],"related_works":["https://openalex.org/W2052892589","https://openalex.org/W2153023023","https://openalex.org/W2137662009","https://openalex.org/W2303288554","https://openalex.org/W3033750547","https://openalex.org/W2029216794","https://openalex.org/W4386698331","https://openalex.org/W2047225036","https://openalex.org/W2138314731","https://openalex.org/W2029263917"],"abstract_inverted_index":{"Nowadays,":[0],"the":[1,37,44,49,53],"emergence":[2],"of":[3,6],"femtocells":[4],"is":[5],"great":[7],"interest":[8],"to":[9,14,62],"Mobile":[10],"Network":[11],"Operators":[12],"(MNOs)":[13],"improve":[15],"their":[16],"radio":[17],"coverage":[18],"and":[19,64,69],"financial":[20],"revenue.":[21],"However,":[22],"these":[23,57],"low-cost":[24],"base":[25],"stations":[26],"may":[27],"introduce":[28],"several":[29],"security":[30,67],"issues":[31],"that":[32],"do":[33],"not":[34],"only":[35],"threaten":[36],"MNO":[38],"infrastructure,":[39],"but":[40],"could":[41],"also":[42],"violate":[43],"subscribers'":[45],"privacy.":[46],"Moreover,":[47],"with":[48],"recent":[50],"smartphone":[51],"developments,":[52],"MNOs":[54],"can":[55],"use":[56],"devices":[58],"as":[59],"resources-rich":[60],"sensors":[61],"collect":[63],"monitor":[65],"relevant":[66],"data,":[68],"detect":[70],"attacks":[71],"on":[72],"femtocells.":[73]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
