[1] M. Saberi, B. Madadi, and S. M. Pournaghi, “LTE NETWORK SECURITY,” ISBN 978-600-124-474-2, 2015.##
[2] K. Farooq, “LTE for 4G Mobile Broadband, Air Interface Technologies and Performance,” Cambridge University Press, 2009##.
[3] S. S. Dhruv, “A tutorial on lte evolved utran (eutran) an lte self organizing networks,” the university of texas at arlington, December 2010.##
[4] F. Dan, H. Gunther, M. Wolf-Dietrich, and N. Valtteri, “LTE SECURITY”, John Wiley and Sons Ltd, ISBN 978-1-118-35558-9 © 2013, 2013.##
[5] C. Jin, M. H. L. Maode, and Z. Yueyu, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE Communications Surveys & tutorials, accepted for publication##.
[6] M. Al-Humaigani, D. Dunn, and D. Brown, ”Security Transition Roadmap to 4G and Future Generations Wireless Networks,” Proc. 41st.##
[7] “Southeastern Symposium on System Theory,” (SSST 2009), March 2009, pp. 94-97, 2009.##
[8] M. Aiash, G. Mapp, A. Lasebae, and R. Phan, “Providing Securityin 4G Systems: Unveiling the Challenges,” Proc. Sixth Advanced International Conference on Telecommunications (AICT), pp. 439-444, May 2010.##
[9] Y. Park and T. Park, “A Survey of Security Threats on 4G Networks,” Proc. IEEE Globecom Workshops, pp. 1-6, Nov. 2007##.
[10] “3rd Generation Partnership Project,” Technical Specification Group Services and System Aspects, Rationale and track of security decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution, (SAE), (Rel 9), 3GPP TR 33.821 V9.0.0, June 2009##
[11] D. Forsberg, “LTE Key Management Analysis with Session Keys Context,” Computer Communications, vol. 33, no. 16, pp. 1907-1915, Octomber 2010.##
[12] D. Forsberg, L. Huang, K. Tsuyoshi, and S. Alanara, “Enhancing Security and Privacy in 3GPP E-UTRAN Radio Interface,” Proc. Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1-5, Septmber 2007.##
[13] T. Ahmed, D. Barankanira, S. Antoine, X. Huang, and H. Duvocelle, “Inter-system Mobility in Evolved Packet System (EPS): Connecting Non-3GPP Accesses,” Proc. Intelligence in Next Generation Networks (ICIN), pp. 1-6, Oct. 2010.##
[14] D. Yu and W. Wen, “Non-access-stratum Request Attack in E-UTRAN,” Proc. Computing, Communications and Applications Conference (Com-ComAp), pp. 48-53, January 2012.##
[15] M. Purkhiabani and A. Salahi, “Enhanced Authentication and Key Agreement Procedure of Next Generation Evolved Mobile Networks,” Proc IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 557-563, May 2011.##
[16] G. M. Koien, “Mutual Entity Authentication for LTE,” Proc 7th International Wireless Communications and Mobile, Computing Conference (IWCMC), p. 689, July 2011.##