X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
gsm (8) 8
privacy (8) 8
imsi catcher (7) 7
imsi-catcher (6) 6
security (5) 5
imsi catchers (4) 4
mobile communication (4) 4
3gpp (3) 3
heimnetzwerk (3) 3
mobiltelefon (3) 3
surveillance (3) 3
telecommunications (3) 3
authentication (2) 2
catchers (2) 2
computer science (2) 2
dataskydd (2) 2
echr (2) 2
eprivacy (2) 2
ether (2) 2
eu-law (2) 2
europakonventionen (2) 2
geheimhaltung (2) 2
gsm/umts (2) 2
human rights (2) 2
information technology (2) 2
integritet (2) 2
interception (2) 2
jamming system (2) 2
juridik (2) 2
law (2) 2
legalitet (2) 2
legality (2) 2
lte security (2) 2
metadata (2) 2
mobile communications (2) 2
mobile handsets (2) 2
mobiles gerät (2) 2
obscurity (2) 2
police (2) 2
police methods (2) 2
policing (2) 2
polis (2) 2
protocols (2) 2
pseudonym (2) 2
software defined radio (2) 2
sverige (2) 2
sweden (2) 2
technology law (2) 2
övervakning (2) 2
213 electronic, automation and communications engineering, electronics (1) 1
4g/lte security (1) 1
abhören (1) 1
anomaly detection (1) 1
authentifizierung (1) 1
base stations (1) 1
basisstation (1) 1
cell phones (1) 1
cell site simulator (1) 1
cell-site simulator (1) 1
cellular networks (1) 1
cellular surveillance (1) 1
cellular telephones (1) 1
computer architecture (1) 1
computer communication networks (1) 1
computer information security (1) 1
computer science - cryptography and security (1) 1
conferences (1) 1
consortia (1) 1
constraining (1) 1
criminal evidence (1) 1
crowdsource (1) 1
denial-of-service (1) 1
detectors (1) 1
detektorsystem (1) 1
electronic computers. computer science (1) 1
electronic mail (1) 1
emergency management (1) 1
emergency support system (1) 1
encryption (1) 1
engineering, electrical & electronic (1) 1
eps (1) 1
ethics (1) 1
fake base station (1) 1
field study (1) 1
field tests (1) 1
geography, physical (1) 1
global positioning system (1) 1
gsm tester (1) 1
handover (1) 1
identification and classification (1) 1
identity (1) 1
identity privacy (1) 1
imsi (1) 1
imsi catcher detection (1) 1
imsi catching (1) 1
information storage and retrieval (1) 1
information systems applications (1) 1
informationsquelle (1) 1
infrastruktur (1) 1
instandhaltung (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


International Review of Law, Computers & Technology, ISSN 1360-0869, 09/2019, Volume 33, Issue 3, pp. 349 - 371
...: not only when and where the state's capacities are deployed, but also what those capacities are. Taking as an example the situation of 'IMSI catchers' - devices which permit... 
Secrecy | IMSI catchers | surveillance | Catchers | Interception | Surveillance | Legislation
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10446, pp. 235 - 246
Conference Proceeding
Proceedings on Privacy Enhancing Technologies, ISSN 2299-0984, 07/2017, Volume 2017, Issue 3, pp. 39 - 56
Cell-site simulators, also known as IMSI-catchers and stingrays, are used around the world by governments and criminals to track and eavesdrop on cell phones... 
cell-site simulator | cellular surveillance | stingray | crowdsource | ridesharing | IMSI-catcher
Journal Article
Proceedings of the 22nd ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2015, Volume 2015-, pp. 340 - 351
...Defeating IMSI Catchers Fabian van den Broek Institute for Computing and Information Sciences Radboud University Nijmegen, The Netherlands. f.vandenbroek... 
3GPP | privacy | IMSI catching | Privacy
Conference Proceeding
IEICE Transactions on Communications, ISSN 0916-8516, 03/2015, Volume E98B, Issue 3, pp. 494 - 501
In this paper, we design a stealthy GSM phone identity catcher. As the GSM protocols do not mandate the authentication of BSes (Base Stations) to MSes (Mobile Stations... 
GSM | Stealthy IMSI catcher | Man-in-the-middle attacks | TELECOMMUNICATIONS | man-in-the-middle attacks | stealthy IMSI catcher | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 05/2019, pp. 1 - 6
Mobile communications are not trustful as many people think about it. The IMSI catcher device is one of the most effective threats that can compromise the security of mobile communications... 
GSM | Cellular networks | Base stations | Shape | Poles and towers | Fake base station | Computer architecture | Mobile network security | IMSI catcher | Mobile handsets | Mobile privacy | Cell site simulator
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10717, pp. 347 - 366
Conference Proceeding
Computer Law & Security Review: The International Journal of Technology Law and Practice, ISSN 0267-3649, 12/2016, Volume 32, Issue 6, pp. 852 - 867
In this article the qualitative requirements of legality under the European Convention on Human Rights are analyzed as they apply to the use of ‘IMSI-catchers... 
Sweden | Law | Surveillance | Ether | ECHR | Police | Obscurity | Legality | IMSI-catcher | Mobile devices | Usage | Privacy, Right of | Laws, regulations and rules | Identification and classification | Global Positioning System
Journal Article
Communications in Computer and Information Science, ISSN 1865-0929, 2015, Volume 545, pp. 129 - 140
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11322, pp. 95 - 119
Conference Proceeding
2016, Volume 32, Issue 6
In this article the qualitative requirements of legality under the European Convention on Human Rights are analyzed as they apply to the use of ‘IMSI-catchers... 
Law | integritet | EU-law | Juridik (exklusive juridik och samhälle) | ECHR | Metadata | Policing | Security | Legality | Police methods | Juridik | Privacy | Sweden | legalitet | Mobile communications | dataskydd | Obscurity | Social Sciences | Ether | Law (excluding Law and Society) | övervakning | polis | Police | IMSI-catcher | Samhällsvetenskap | Technology law | ePrivacy | Surveillance | sverige | Europakonventionen
Publication
International Journal of Digital Earth, ISSN 1753-8947, 04/2015, Volume 8, Issue 4, pp. 259 - 272
.... An International Mobile Subscriber Identity (IMSI) catcher was proposed as a nontraditional method for cell phone-based people localization... 
IMSI catcher | field tests | sensor web enablement | emergency support system | GEOGRAPHY, PHYSICAL | REMOTE SENSING | Sensors | Product introduction | Cellular telephones | Methods | Field study | Consortia | Cell phones | Emergency management | Catchers | Localization | Position (location) | Constraining
Journal Article
2018 3rd International Conference on System Reliability and Safety (ICSRS), 11/2018, pp. 109 - 114
Current security issues in mobile networks have great impact on user privacy. With the focus directed to signaling protocols security, network security and air... 
GSM | IMSI Catcher | user privacy | sniffing | telecom | wireless | tracking | leakage
Conference Proceeding
Proceedings of the Romanian Academy Series A - Mathematics Physics Technical Sciences Information Science, ISSN 1454-9069, 2017, Volume 18, pp. 361 - 370
The security of mobile communication is of great interest nowadays because of the wide spread and extensive use of mobile communication worldwide. Although LTE... 
Imsi catchers | Privacy | Mobile communication | Software defined radio | Mobile applications | LTE | IMSI Catchers | Mobile Applications | MULTIDISCIPLINARY SCIENCES | Mobile Communication | Software Defined Radio
Journal Article
Journal of Networks, ISSN 1796-2056, 2012, Volume 7, Issue 2, pp. 275 - 281
Journal Article
ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017, Volume 4, pp. 507 - 512
Conference Proceeding
2014 22nd Telecommunications Forum Telfor (TELFOR), 11/2014, pp. 99 - 102
One of the weaknesses of a GSM network is a lack of two-way authentication. For years, this weakness has been abused using IMSI catcher... 
GSM | Handover | Mobile communication | IMSI catcher | Software | OpenBTS | Electronic mail | USRP | Security
Conference Proceeding
2015 IEEE 81st Vehicular Technology Conference (VTC Spring), ISSN 1550-2252, 05/2015, Volume 2015, pp. 1 - 5
Despite the rapid change in cellular technologies, Mobile Network Operators (MNOs) keep a high percentage of their deployed infrastructure using Global System... 
GSM | Mobile communication | Protocols | Encryption | Authentication | Standards | SDR | Privacy | Man-in-the-middle attack | Security | IMSI-catcher
Conference Proceeding
2010 International Conference on Multimedia Information Networking and Security, ISSN 2162-8998, 11/2010, pp. 813 - 815
This paper presents a new GSM/UMTS jamming system which is intended to be placed in a restricted area for security purpose. A pseudo base station was... 
GSM | Real time systems | jamming system | Detectors | Mobile communication | Telecommunication standards | Mobile handsets | Jamming | GSM/UMTS | IMSI-catcher | Jamming system
Conference Proceeding
2011, Communications in Computer and Information Science, ISBN 9783642217708, Volume 160
In this paper, we present and explain both the theoretical and the practical background of mobile phone interception using a GSM tester, providing valuable... 
Information Systems Applications (incl.Internet) | Systems and Data Security | Computer Science | Information Storage and Retrieval | System Performance and Evaluation | Management of Computing and Information Systems | Computer Communication Networks | GSM | GSM tester | IMSI catcher | interception | mobile phone security
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.