Hypothetical Mobile Kill Chain in APT Operations Targeting Cellular Networks

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{187766,
        author = {VUNA VENKATA VIDYASAGAR and AVALA CHAKRAPANI and BONI VENKAT RAO},
        title = {Hypothetical Mobile Kill Chain in APT Operations Targeting Cellular Networks},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {6},
        pages = {6733-6742},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=187766},
        abstract = {},
        keywords = {Tower-Dump, FOMO Malware, Snake-Mate Intrusion, Mobile-Renaissance, Job-Sequence, Cyber-Physical Forensics, Mobile Security, C2 traffic, OSINT, Digital Forensics.},
        month = {November},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 12
  • Issue: 6
  • PageNo: 6733-6742

Hypothetical Mobile Kill Chain in APT Operations Targeting Cellular Networks

Related Articles