Threat Modeling of AMI, Proceedings of the 7th International Conference on Critical Information Infrastructures Security, 2012. ,
DOI : 10.1007/978-3-642-41485-5_23
Smart metering white paper ? Best practices recommendation by Telenor Connexion, 2013. ,
Smart Grid and Smart Homes: Key Players and Pilot Projects, IEEE Industrial Electronics Magazine, vol.6, issue.4, pp.18-34, 2012. ,
DOI : 10.1109/MIE.2012.2207489
Partitioning attacks: or how to rapidly clone some GSM cards, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.31-41, 2002. ,
DOI : 10.1109/SECPRI.2002.1004360
An introduction to access security in UMTS, IEEE Wireless Communications, vol.11, issue.1, pp.8-18, 2004. ,
DOI : 10.1109/MWC.2004.1269712
UMTS security, 2003. ,
Security measures and weaknesses of the gprs security architecture, International Journal of Network Security, vol.6, issue.2, pp.158-169, 2008. ,
The security of the GSM air interface protocol, 2001. ,