信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 196-198.doi: 10.3969/j.issn.1671-1122.2014.09.045
• Orginal Article • Previous Articles Next Articles
ZHOU Zhi-tong, XIA Zi-yan, XING Jia-shuai, LI Zhen-ni
Received:
2014-08-06
Online:
2014-09-01
CLC Number:
ZHOU Zhi-tong, XIA Zi-yan, XING Jia-shuai, LI Zhen-ni. Fake Base Station Recognition and Locating Technology Research[J]. 信息网络安全, 2014, 14(9): 196-198.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.09.045
[1] 浙江推动地方立法阻击伪基站[EB/OL].http://pinpai.china.com.cn/zhejiang/20140213/325_5471430.html. [2] Meyer U, Wetzel S. On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks[C]//Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium on. IEEE, 2004, (4): 2876-2883. [3] Dalela C, Dalela M P P K. Tuning of COST-231 hata model for radio wave propagation predictions[J]. Computer Science and Information Technology (CS & IT), 2012, (10) : 255-267. [4] Arias J, Zuloaga A, Lázaro J, et al. Malguki: an RSSI based ad hoc location algorithm[J]. Microprocessors and Microsystems, 2004, 28(8): 403-409. [5] 乔钢柱,曾建潮. 一种适用于动态环境的改进RSSI定位方法[J]. 计算机研究与发展,2010,(02):111-114. [6] 王伟,陈岱,周勇. 基于测距修正和位置校正的RSSI定位算法[J]. 计算机工程与设计,2011,(02):409-412,622. [7] 李再煜. RSSI定位原理的研究与实现[J]. 无线电工程,2013,(07):8-10. [8] 余幸杰,高能,江伟玉. 云计算中的身份认证技术研究[J]. 信息网络安全,2012,(08):71-74. [9] 王伟,高能,江丽娜. 云计算安全需求分析研究[J]. 信息网络安全,2012,(08):75-78. [10] 张大军,李运发,郑周. 云计算中数据资源的安全共享机制[J]. 信息网络安全,2012,(08):79-82. [11] 海然. 云计算风险分析[J]. 信息网络安全,2012,(08):94-96. [12] 李美云,李剑,黄超. 基于同态加密的可信云存储平台[J]. 信息网络安全,2012,(09):35-40. [13] 滕萍. 云计算技术发展分析及其应用研究[J]. 信息网络安全,2012,(11):89-91. [14] 孙志丹,邹哲峰,刘鹏. 基于云计算技术的信息安全试验系统设计与实现[J]. 信息网络安全,2012,(12):50-52. [15] 任伟. 无线网络安全问题初探[J]. 信息网络安全,2012,(01):10-13. [16] 王雷. RFID芯片在物联网应用中的设计与研究[J]. 信息网络安全,2012,(05):64-67. [17] 邹蕾,张先锋. 人工智能及其发展应用[J]. 信息网络安全,2012,(02):11-13. |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||