References
- AfricaEuropeAlliance. (2019). New Africa-Europe digital economy partnership. https://www.tralac.org/documents/resources/external-relations/eu/2865-new-africa-europe-digital-economy-partnership-report-of-the-eu-au-digital-economy-task-force-june-2019/file.html
- Agrawal, J., Patel, R., Mor, P., Dubey, P., & Keller, J. (2015). Evolution of mobile communication network: From 1g to 4g. International Journal of Multidisciplinary and Current Research, 3, 1100–14.
- Akerele, T. (2018). Cyber threats on African subjects. https://www.ict.org.il/Article/2275/Cyber_threats_on_African_subjects#gsc.tab=0
- Akyildiz, I. F., Gutierrez-Estevez, D. M., Balakrishnan, R., & Chavarria-Reyes, E. (2014). Lte-advanced and the evolution to beyond 4g (b4g) systems. Physical Communication, 10, 31–60. https://doi.org/10.1016/j.phycom.2013.11.009
- Akyildiz, I. F., Gutierrez-Estevez, D. M., & Reyes, E. C. (2010). The evolution to 4g cellular systems: Lte-advanced. Physical Communication, 3(4), 217–244. https://doi.org/10.1016/j.phycom.2010.08.001
- Allen, N. (2021). Africa’s evolving cyber threatst. https://africacenter.org/spotlight/africa-evolving-cyber-threats/
- Asmare, F. M., Geremew, F. M., Ayalew, L. G., & Tan, S. C. (2022). A survey on 3g mobile network traffic performance and analysis in Ethiopia. Cogent Engineering, 9(1), 2005506. https://doi.org/10.1080/23311916.2021.2005506
- Baken, D. (2013). Cyber warfare and Nigeria’s vulnerability. E-International Relations, 3. https://www.e-ir.info/2013/11/03/cyber-warfare-and-nigerias-vulnerability/
- Bargh, M., Hulsebosch, R., Eertink, E., Laganier, J., Zugenmaier, A., & Prasad, A. (2007). UMTS-AKA and EAP-AKA inter-working for fast handovers in all-ip networks. Proceedings of the IEEE Globecom Workshops (pp. 1–6). IEEE. https://doi.org/10.1109/GLOCOMW.2007.4437814
- Bikos, A. N., & Sklavos, N. (2012). Lte/sae security issues on 4g wireless networks. IEEE Security & Privacy, 11(2), 55–62. https://doi.org/10.1109/MSP.2012.136
- BSA. (2016). Bsa global software survey 2016. https://globalstudy.bsa.org/2016/
- Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2013). A survey on security aspects for lte and lte-a networks. IEEE Communications Surveys & Tutorials, 16(1), 283–302. https://doi.org/10.1109/SURV.2013.041513.00174
- Cimpanu, C. (2017). Gigantic 100,000-strong botnet used to hijack traffic meant for Brazilian banks. https://www.zdnet.com/article/gigantic-100000-strong-botnet-used-to-hijack-traffic-meant-for-brazilian-banks/
- C. S. A. of Singapore. (2017). Security-by-designframework. https://www.csa.gov.sg/-/media/Csa/Documents/Legislation_Supplementary_References/Security_By_Design_Framework_Checklist.xlsx
- Deibert, R. J., Rohozinski, R., Manchanda, A., Villeneuve, N., & Walton, G. (2009). Tracking ghostnet: Investigating a cyber espionage network. Munk Center for International Studies, University of Toronto.
- Europeancommission., “Joint communication to the European parliament and the council - resilience, deterrence and defence: Building strong cybersecurity for the eu (join(2017)450).” https://ec.europa.eu/home-affairs/pages/document/joint-communication-european-parliament-and-council-resilience-deterrence-and-defence-building_en, 2017
- Frattasi, S., Fathi, H., Fitzek, F. H., Prasad, R., & Katz, M. D. (2006). Defining 4g technology from the users perspective. IEEE Network, 20(1), 35–41. https://doi.org/10.1109/MNET.2006.1580917
- Grabosky, P. (2015). Organized cybercrime and national security. In Smith, Russell G., Cheung, Ray Chak-Chung, Lau, Laurie Yiu-Chung (Eds.), Cybercrime Risks and Responses (pp. 67–80). Springer. https://doi.org/10.1057/9781137474162_5.
- Hao, S., Zhang, Y., Wang, H., & Stavrou, A. (2018). {End-Users} get maneuvered: Empirical analysis of redirection hijacking in content delivery networks. Proceedings of the 27th USENIX Security Symposium (USENIX Security 18) (pp. 1129–1145).
- He, L., Yan, Z., & Atiquzzaman, M. (2018). Lte/lte-a network security data collection and analysis for security measurement: A survey. IEEE Access, 6, 4220–4242. https://doi.org/10.1109/ACCESS.2018.2792534
- Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys (CSUR), 52(2), 1–40. https://doi.org/10.1145/3303771
- Horn, G., & Howard, P. (2000). An introduction to the security features of 3gpp and third generation mobile communications systems. IEEE VTS 51st Vehicular Technology Conf.
- Imani, A., Keshavarz-Haddad, A., Eslami, M., & Haghighat, J. (2018). Security challenges and attacks in m2m communications. Proceedings of the 9th International Symposium on Telecommunications (IST) (pp. 264–269). IEEE. https://doi.org/10.1109/ISTEL.2018.8661044
- Khan, A. H., Qadeer, M. A., Ansari, J. A., & Waheed, S. (2009). 4g as a next generation wireless network. Proceedings of the 2009 International conference on future computer and communication (pp. 334–338). IEEE. https://doi.org/10.1109/ICFCC.2009.108
- Krasniqi, F., Maraj, A., & Blaka, E. (2018). Performance analysis of mobile 4g/lte networks. Proceedings of the South-Eastern European Design Automation, Computer Engineering, Computer Networks and Society Media Conference (SEEDA_CECNSM) (pp. 1–5). IEEE. https://doi.org/10.23919/SEEDACECNSM.2018.8544937
- Kshetri, N. (2010). Diffusion and effects of cyber-crime in developing economies. Third World Quarterly, 31(7), 1057–1079. https://doi.org/10.1080/01436597.2010.518752
- Kshetri, N. (2019). Cybercrime and cybersecurity in Africa. Journal of Global Information Technology Management. https://doi.org/10.1080/1097198X.2019.1603527
- Kumar, P. M., & Gandhi, U. D. (2018). A novel three-tier internet of things architecture with machine learning algorithm for early detection of heart diseases. Computers & Electrical Engineering, 65, 222–235. https://doi.org/10.1016/j.compeleceng.2017.09.001
- Lewis, J. A., & Baker, S. (2013). The economic impact of cybercrime and cyber espionage. McAfee, An Intel Company Group. https://www.csis.org/analysis/economic-impact-cybercrime-and-cyber-espionage
- Limor Kessem, M. K. (2015). Meet the pezao trojan: Brazil’s got malware. https://securityintelligence.com/meet-the-pezao-trojan-brazils-got-malware/
- Li, C.-Y., Tu, G.-H., Peng, C., Yuan, Z., Li, Y., Lu, S., & Wang, X., “Insecurity of voice solution volte in lte mobile networks,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 316–327, 2015.
- Macaulay, T. (2013). The 7 deadly threats to 4g. In McAfee: Santa Clara, CA (pp. 1-16). USA. http://www.webtorials.com/main/resource/papers/McAfee/paper20/7-deadly-threats-4g.pdf
- Mihret, E., & Haile, G. (2021). 4g, 5g, 6g, 7g and future mobile technologies. J Comp Sci Info Technol, 9(2), 75. https://www.imedpub.com/articles/4g-5g-6g-7g-and-future-mobile-technologies.pdf
- Nduati, H. (2018). Cyber security in emerging financial markets. CGAP Background Documents. https://www.findevgateway.org/sites/default/files/publications/files/cybersecurity_in_emerging_markets_06-30_0.pdf
- Oğul, M., & Baktır, S. (2013). Practical attacks on mobile cellular networks and possible countermeasures. Future Internet, 5(4), 474–489. https://doi.org/10.3390/fi5040474
- Park, Y., & Park, T. (2007). A survey of security threats on 4g networks. Proceedings of the IEEE Globecom workshops (pp. 1–6). IEEE. https://doi.org/10.1109/GLOCOMW.2007.4437813
- Putz, S., & Schmitz, R. (2000). Secure interoperation between 2g and 3g mobile radio networks. https://doi.org/10.1049/cp:20000007
- Schia, N. N. (2018). The cyber frontier and digital pitfalls in the global south. Third World Quarterly, 39(5), 821–837. https://doi.org/10.1080/01436597.2017.1408403
- Schoenherr, J. R., & Thomson, R. (2020). Insider threat detection: A solution in search of a problem. Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1–7). IEEE. https://doi.org/10.1109/CyberSecurity49315.2020.9138862
- Seddigh, N., Nandy, B., Makkar, R., & Beaumont, J.-F. (2010). Security advances and challenges in 4g wireless networks. Proceedings of the Eighth International Conference on Privacy, Security and Trust (pp. 62–71). IEEE.
- Serianu. (2017). Demystifying Africa’s cyber security poverty line. https://www.serianu.com/downloads/KenyaCyberSecurityReport2017.pdf
- Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2015). Practical attacks against privacy and availability in 4g/lte mobile communication systems. https://doi.org/10.14722/NDSS.2016.23236
- Shin, M., Ma, J., Mishra, A., & Arbaugh, W. A. (2006). Wireless network security and interworking. Proceedings of the IEEE (Vol. 94, no. 2, pp. 455–466).
- Sullivan, B. (2007). Who’s behind criminal “bot” networks? https://www.unl.edu/eskridge/cyberbot3.htm
- Symantec. (2016). Cyber crime and cyber security trends in Africa. https://securitydelta.nl/media/com_hsd/report/135/document/Cyber-security-trends-report-Africa-en.pdf
- Symantec. (2017). Internet security threat report. https://docs.broadcom.com/doc/istr-22-2017-en/
- Thakur, K., Ali, M. L., Jiang, N., & Qiu, M. (2016). Impact of cyber-attacks on critical infrastructure. Proceedings of theIEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 183–186). IEEE. https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.22
- UNODC. (2013). Comprehensive study on cybercrime. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
- Vachhani, K. (2018). Security threats against lte networks: A survey. Proceedings of the International Symposium on Security in Computing and Communication (pp. 242–256).Singapore. Springer. https://doi.org/10.1007/978-981-13-5826-5_18
- Warner, J. (2011). Understanding cyber-crime in Ghana: A view from below. International Journal of Cyber Criminology, 5(1), 736–749. https://archive.org/details/2011_07_01_Understanding_Cyber_Crime_in_Ghana_A_View_from_Below_Warner/mode/1up?view=theater
- Weichbroth, P., Łysik, Ł., & Li, Q. (2020). Mobile security: Threats and best practices. Mobile Information Systems, 2020, 1–15. https://doi.org/10.1155/2020/8828078
- Worldbank. (2017). Combatting cybercrime. https://documents1.worldbank.org/curated/en/355401535144740611/pdf/129637-WP-PUBLIC-worldbank-combating-cybercrime-toolkit.pdf
- Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3gpp authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734–742. https://doi.org/10.1109/TWC.2004.842941