# Bibliography on telecommunication security
:::info
* Copy the paper citation from Google Scholar for uniform format.
* Link to openly available PDF doocument for the paper if possible.
:::
## Table of Contents
[TOC]
## Caller ID spoofing
### Mustafa, H., Xu, W., Sadeghi, A. R., & Schulz, S. (2014, June). You can call but you can't hide: detecting caller id spoofing attacks. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (pp. 168-179). IEEE.
Free access of the [paper](https://www.researchgate.net/publication/263847197_You_Can_Call_but_You_Can't_Hide_Detecting_Caller_ID_Spoofing_Attacks)
## Fighting spams
### Kouam, Anne Josiane, Aline Carneiro Viana, and Alain Tchana. "SIMBox bypass frauds in cellular networks: Strategies, evolution, detection, and future directions." IEEE Communications Surveys & Tutorials (2021).
Free Access of the [paper](https://hal.inria.fr/hal-03105845/document)
### Reaves, Bradley, et al. "Sending out an sms: Characterizing the security of the sms ecosystem with public gateways." 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016.
Free access of the [paper](https://www.cise.ufl.edu/~traynor/papers/reaves-sp16.pdf)
## Survey papers
### Kilinc, H. Hakan, and Tugrul Yanik. "A survey of SIP authentication and key agreement schemes." IEEE Communications Surveys & Tutorials 16.2 (2013): 1005-1023.