[1]
A. Ahlawat and S. Kumar, “Investigating Various Possible Attacks and Vulnerabilties in LTE”, Int. J. Comp. Sci. Eng., vol. 6, no. 3, pp. 389–395, Nov. 2025.