# Bibliography on telecommunication security :::info * Copy the paper citation from Google Scholar for uniform format. * Link to openly available PDF doocument for the paper if possible. ::: ## Table of Contents [TOC] ## Caller ID spoofing ### Mustafa, H., Xu, W., Sadeghi, A. R., & Schulz, S. (2014, June). You can call but you can't hide: detecting caller id spoofing attacks. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (pp. 168-179). IEEE. Free access of the [paper](https://www.researchgate.net/publication/263847197_You_Can_Call_but_You_Can't_Hide_Detecting_Caller_ID_Spoofing_Attacks) ## Fighting spams ### Kouam, Anne Josiane, Aline Carneiro Viana, and Alain Tchana. "SIMBox bypass frauds in cellular networks: Strategies, evolution, detection, and future directions." IEEE Communications Surveys & Tutorials (2021). Free Access of the [paper](https://hal.inria.fr/hal-03105845/document) ### Reaves, Bradley, et al. "Sending out an sms: Characterizing the security of the sms ecosystem with public gateways." 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. Free access of the [paper](https://www.cise.ufl.edu/~traynor/papers/reaves-sp16.pdf) ## Survey papers ### Kilinc, H. Hakan, and Tugrul Yanik. "A survey of SIP authentication and key agreement schemes." IEEE Communications Surveys & Tutorials 16.2 (2013): 1005-1023.