Investigating vulnerabilities in GSM security | IEEE Conference Publication | IEEE Xplore