Cited By
View all- Chen YYao YWang XXu DYue CLiu XChen KTang HLiu B(2021)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00104(1197-1214)Online publication date: May-2021
- Mowafi YAlaqarbeh TAlazrai R(2019)Putting Context in the Network Access of Mobile Applications Using Fuzzy Analytic Hierarchy ProcessInternational Journal of Decision Support System Technology10.4018/IJDSST.201904010211:2(13-26)Online publication date: Apr-2019
- Li YKim KVlachou CXie JWu JHall W(2019)Bridging the data charging gap in the cellular edgeProceedings of the ACM Special Interest Group on Data Communication10.1145/3341302.3342074(15-28)Online publication date: 19-Aug-2019
- Show More Cited By