您当前的位置:
首页 >
文章列表页 >
Analysis and countermeasures of the fraud using cloned SIM card and network vulnerability
更新时间:2026-04-20
    • Analysis and countermeasures of the fraud using cloned SIM card and network vulnerability

    • Vol. 24, Issue 2, Pages: 15-21(2011)
    • DOI:10.13992/j.cnki.tetas.2011.02.004    

      CLC: TN929.5
    • Published:2011

    移动端阅览

  • 曾俊强. Analysis and countermeasures of the fraud using cloned SIM card and network vulnerability[J]. 2011, 24(2): 15-21. DOI: 10.13992/j.cnki.tetas.2011.02.004.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

120

下载量

4

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Study on the double live problem China Mobile clone card
Analysis of new-type fake base station
Based on the users’ perception of the WCDMA network location update optimization
Research in the control of spam message
TD-SCDMA location update on the impact of connect successful rates

Related Author

周忠良
徐海东
刘斐
田野
韩永涛
张永
吴振奎
田刚

Related Institution

中国移动通信集团河南有限公司
中国移动通信集团公司研究院
中国移动通信集团公司
中国联通福建分公司网优中心
中国移动通信集团陕西有限公司
0