| [1] | Cappella, N.. Fake Mobile Base Stations Used to Spread Malware in China. [Online]. Available: https://thestack.com/security/2017/03/23/fake-mobile-base-stations-used-to-spread-malware-in-china/ [Accessed Aug. 20, 2017]. |
| |
| [2] | Zhang, C.. Malicious Base Station and Detecting Malicious Base Station Signal. Communications System Design, 2014, pp. 59-64. |
| |
| [3] | Borgaonkar, R., Martin, A., Park, S., Shaik, A., Seifert, J.-P.. White-Stingray: Evaluating IMSI Catechers Detection Applications. In: 11th USENIX Workshop on Offensive Technologies, 2017. |
| |
| [4] | Kang, A., Lee, J. D., Kang, W. M., Barolli, L., Park, J. H.. Security Considerations for Smart Phone Smishing Attacks. In: Jeong H., S. Obaidat M., Yen N., Park J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. |
| |
| [5] | ChinaDaily. 124 Arrested for Cross-Border Telecom Fraud [Online]. Available: http://www.chinadaily.com.cn/china/2017-07/27/content_30267342.htm [Accessed Aug. 20, 2017]. |
| |
| [6] | ChinaDaily. 77 Telecom Fraud Suspects Returned to China from Fiji [Online]. Available: http://www.chinadaily.com.cn/china/2017-08/05/content_30349375.htm. [Accessed Aug. 20, 2017]. |
| |
| [7] | Hilas, C. S.. Designing an Expert System for Fraud Detection in Private Telecommunications Networks. Expert Systems with Applications, 2009, 36 (9): pp. 11559-11569. |
| |
| [8] | Bergholz, A., Paaß, G., Reichartz, F., Strobel, S., Chang, J. H.. Improved Phishing Detection using Model-Based Features. In: Fifth Conference on Email and Anti-Spam, 2008. |
| |
| [9] | Joo, J. W., Moon, S. Y., Singh, S., Park, J. H.. S-Detector: an Enhanced Security Model for Detecting Smishing Attack for Mobile Computing. Telecommunication Systems, 2017, 66(1): pp. 29-38. |
| |
| [10] | Ney, P., Smith, I., Cadamuro, G., Kohno, T.. SeaGlass: Enabling City-Wide IMSI-Catcher Detection. In: Proceedings on Privacy Enhancing Technologies, 2017(3). |
| |
| [11] | Li, Z., Wang, W., Wilson, C., Chen, J., Qian, C., Jung, T., Zhang, L., Liu, K., Li, X., Liu, Y.. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. In: 23rd Network and Distributed System Security Symposium, 2017. |
| |
| [12] | Meng, J.. Detection and Location of GSM Pseudo Base Station Based on Software Defined Radio. Master Thesis, 2016, Lanzhou Jiaotong University. |
| |
| [13] | Goldberg, Y., Levy, O.. word2vec Explained: Deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722, 2014. |
| |
| [14] | ChinaVis 2017. [Online]. Available: http://chinavis.org/2017/challenge.html. [Accessed Aug. 20, 2017]. |
| |
| [15] | Ester, M., Kriegel, H. P., Sander, J., Xu, X.. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: 2nd International Conference on Knowledge Discovery and Data Mining, 1996, pp. 226-231. |
| |