<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000301461</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-3-5004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Implementation of Best Practices for the Management of Radio-Electronic Signal Blocking Systems: A Case Study at the Ministry of Justice, Peru]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez-Sánchez]]></surname>
<given-names><![CDATA[Fernando]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gamboa-Cruzado]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Chanona-Hernández]]></surname>
<given-names><![CDATA[Liliana]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Mayor de San Marcos Facultad de Ingeniería de Sistemas e Informática ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Peru</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Politécnico Nacional ESIMEZ ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>3</numero>
<fpage>1461</fpage>
<lpage>1482</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000301461&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000301461&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000301461&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The current management of radio-electronic signal blocking systems in penitentiary environments faces significant challenges, such as inefficiency in signal disruption, non-compliance with authorized signal standards, and the generation of social tensions in nearby communities. The purpose of this study is to apply Best Practices that refine the operability of such systems in penal centers, in order to minimize unauthorized communications from these facilities, optimize signal penetration within them, and mitigate protests from the surrounding population. To this end, the FRS Methodology based on the PMBok methodology, as well as the PDCA Method and the ITIL Methodology were created and utilized; a case study was conducted in a group of penal establishments in Peru, where the methodology has been implemented. In this paper, three key indicators have been addressed, and through the implementation of the FRS methodology, the established objectives have been achieved. The results obtained exhibit behavior within the expected range, allowing us to conclude that the FRS methodology can improve the management process of radio-electronic signal blocking systems in penal institutions.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Best practices]]></kwd>
<kwd lng="en"><![CDATA[jamming]]></kwd>
<kwd lng="en"><![CDATA[interference]]></kwd>
<kwd lng="en"><![CDATA[radio-electronic signal blocking]]></kwd>
<kwd lng="en"><![CDATA[penal establishments]]></kwd>
<kwd lng="en"><![CDATA[downlink]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Putra]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Budiman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Malewa]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Cahyadi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Taruk]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hairah]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[4G LTE experience: reference signal received power, noise ratio and quality]]></source>
<year>2021</year>
<conf-name><![CDATA[ 3rd East Indonesia Conference on Computer and Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>139-44</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wanis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaheen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Samir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The impact of different jamming techniques on ofdm communication systems]]></source>
<year>2018</year>
<volume>11</volume>
<numero>11</numero>
<conf-name><![CDATA[ The International Conference on Electrical Engineering]]></conf-name>
<conf-loc> </conf-loc>
<issue>11</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jasim]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamil]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Alhyani]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of different jamming techniques on ofdm communication systems]]></article-title>
<source><![CDATA[International Journal Of Latest Technology In Engineering AND Management]]></source>
<year>2018</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>16-22</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mert]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kurt]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A countermeasure against smart jamming attacks on lte synchronization signals]]></article-title>
<source><![CDATA[Journal of Communications]]></source>
<year>2020</year>
<volume>15</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>626-32</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[El-Keyi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ureten]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Yanikomeroglu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yensen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lte for public safety networks: synchronization in the presence of jamming]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2017</year>
<volume>5</volume>
<page-range>20800-13</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bazzo]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Barros]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Takaki]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Carrillo]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Seki]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[4G/LTE networks for mission-critical operations: a cognitive radio approach]]></article-title>
<source><![CDATA[Telecommunications and Information Technology]]></source>
<year>2017</year>
<volume>1</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>51-64</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shabana]]></surname>
<given-names><![CDATA[G. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaheen]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Samir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emulation of optimized noise jamming impact on the lte downlink using systemvue]]></source>
<year>2021</year>
<conf-name><![CDATA[ 10th International Conference on Intelligent Computing and Information Systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>105-15</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krutitsky]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity - Introduction to Jamming]]></source>
<year>2022</year>
<publisher-name><![CDATA[ResearchGate]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Baddeley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bariah]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopez]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lunardi]]></surname>
<given-names><![CDATA[W. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Giacalone]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhaidat]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jamrf: performance analysis, evaluation, and implementation of rf jamming over wi-fi]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2022</year>
<volume>10</volume>
<page-range>133370-84</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vo-Huu]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vo-Huu]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Noubir]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Interleaving jamming in Wi-Fi networks]]></source>
<year>2016</year>
<conf-name><![CDATA[ 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>31-42</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lichtman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jover]]></surname>
<given-names><![CDATA[R. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Labib]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Marojevic]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[LTE/LTE-a jamming, spoofing, and sniffing: threat assessment and mitigation]]></article-title>
<source><![CDATA[IEEE Communications Magazine]]></source>
<year>2016</year>
<volume>54</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>54-61</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krenz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Brahma]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Jamming LTE signals]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Black Sea Conference on Communications and Networking]]></conf-name>
<conf-loc> </conf-loc>
<page-range>72-6</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marojevic]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance analysis of a mission-critical portable lte system in targeted rf interference]]></source>
<year>2017</year>
<conf-name><![CDATA[ 86th Vehicular Technology Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Shigli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Raja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kulkarni]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligent 2G, 3G and 4G mobile signal Jammers]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Conference on Energy Efficient Technologies for Sustainability]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pirayesh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey]]></article-title>
<source><![CDATA[IEEE Communications Surveys and Tutorials]]></source>
<year>2022</year>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>767-809</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hanzo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on wireless security: technical challenges, recent advances, and future trends]]></article-title>
<source><![CDATA[Proceedings of the IEEE]]></source>
<year>2016</year>
<volume>104</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1727-65</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gil-Jiménez]]></surname>
<given-names><![CDATA[V. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia-Armada]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernando-Gallego]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[González-Pizarro]]></surname>
<given-names><![CDATA[N. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Novel orthogonal multi-sequences for an efficient jamming on the umts signal]]></article-title>
<source><![CDATA[EURASIP Journal on Wireless Communications and Networking]]></source>
<year>2016</year>
<volume>2016</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Deniau]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Stienne]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[LTE physical layer vulnerability test to different types of jamming signals]]></source>
<year>2019</year>
<conf-name><![CDATA[ International Symposium on Electromagnetic Compatibility]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1138-43</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lichtman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Marojevic]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jover]]></surname>
<given-names><![CDATA[R. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[5G NR jamming, spoofing, and sniffing: threat assessment and mitigation]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Conference on Communications Workshops]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arjoune]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Faruque]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Smart jamming attacks in 5g new radio: a review]]></source>
<year>2020</year>
<conf-name><![CDATA[ 10th Annual Computing and Communication Workshop and Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1010-5</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skokowski]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kelner]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Malon]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma&#347;lanka]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Birutis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vazquez]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Low]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Czapiewska]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Magiera]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rajchowski]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ambroziak]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jamming and jamming mitigation for selected 5G military scenarios]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2022</year>
<volume>205</volume>
<page-range>258-67</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flores]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Poisson]]></surname>
<given-names><![CDATA[D. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Stevens]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Nieves]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Wyglinski]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation and evaluation of a smart uplink jamming attack in a public 5g network]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2023</year>
<volume>11</volume>
<page-range>75993-6007</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>GSMA</collab>
<source><![CDATA[Inhibidores de señal, uso de Jammers en prisiones]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tomasek]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attenuation of wireless communication under ieee 802.11ah]]></article-title>
<source><![CDATA[Annals of DAAAM and Proceedings]]></source>
<year>2016</year>
<page-range>838-44</page-range><publisher-name><![CDATA[DAAAM International Vienna]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aziz]]></surname>
<given-names><![CDATA[F. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamma]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Stuber]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jammer-type estimation in lte with a smart jammer repeated game]]></article-title>
<source><![CDATA[IEEE Transactions on Vehicular Technology]]></source>
<year>2017</year>
<volume>66</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>7422-31</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Obaid]]></surname>
<given-names><![CDATA[H. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Wireless network behaviour during jamming attacks: simulation using opnet]]></article-title>
<source><![CDATA[Journal of Physics: Conference Series]]></source>
<year>2020</year>
<volume>1530</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>012009</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noori]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadeghi-Vilni]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jamming and antijamming in interference channels: a stochastic game approach]]></article-title>
<source><![CDATA[IET Communications]]></source>
<year>2020</year>
<volume>14</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>682-92</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Birutis]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mykkeltveit]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Practical jamming of a commercial 5g radio system at 3.6 GHz]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2022</year>
<volume>205</volume>
<page-range>58-67</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agiwal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on 4G-5G dual connectivity: road to 5G implementation]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>16193-210</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fehmi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Amr]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bahnasse]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Talea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[5G network: analysis and compare 5g NSA/5G SA]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2022</year>
<volume>203</volume>
<page-range>594-8</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LLedó]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Como aprobar el examen de PMP sin morir en el intento]]></source>
<year>2017</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[Pablo Lledó]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mulcahy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Preparación para el Examen PMP]]></source>
<year>2018</year>
<publisher-name><![CDATA[Minnetonka]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salazar-Garces]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mora-Sánchez]]></surname>
<given-names><![CDATA[N. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Romero-Black]]></surname>
<given-names><![CDATA[W. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ollague-Valarezo]]></surname>
<given-names><![CDATA[J. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Diagnóstico de la aplicación del ciclo PHVA según la ISO 9001: 2015 en la empresa INCARPALM]]></article-title>
<source><![CDATA[593 Digital Publisher CEIT]]></source>
<year>2020</year>
<volume>5</volume>
<numero>6&#8211;1</numero>
<issue>6&#8211;1</issue>
<page-range>459-72</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<collab>Axelos Limited</collab>
<source><![CDATA[Courseware ITIL 4 Foundation]]></source>
<year>2019</year>
<publisher-name><![CDATA[IT Preneurs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simpson]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[LTE RSRP, RSRQ, RSSNR and local topography profile data for RF propagation planning and network optimization in an urban propagation environment]]></article-title>
<source><![CDATA[Data in Brief]]></source>
<year>2018</year>
<volume>21</volume>
<page-range>1724-37</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez-Morales]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Casallas-Hernández]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Proyecto normativo para la reglamentación de la inhibición de señales radioeléctricas en el interior de los establecimientos penitenciarios]]></source>
<year>2017</year>
<page-range>1-30</page-range><publisher-name><![CDATA[ANE - MinTIC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsing-Yi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsung-Han]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Simulations and measurements of electric fields emitted from a LTE base station in an urban area]]></article-title>
<source><![CDATA[International Journal of Antennas and Propagation]]></source>
<year>2014</year>
<volume>2014</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pramono]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Alvionita]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ariyanto]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sulistyo]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimization of 4G LTE (long term evolution) network coverage area in sub urban]]></article-title>
<source><![CDATA[AIP Conference Proceedings]]></source>
<year>2020</year>
<volume>2217</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parra]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Botero]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pistolas contra Celulares]]></source>
<year>2021</year>
<publisher-name><![CDATA[Fundación Karisma]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cuevas-Silva]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendieta-Izquierdo]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La bioética: retos de la protesta social]]></article-title>
<source><![CDATA[Revista Latinoamericana de Bioética]]></source>
<year>2020</year>
<volume>19</volume>
<numero>37&#8211;2</numero>
<issue>37&#8211;2</issue>
<page-range>5-7</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pozo-Leon]]></surname>
<given-names><![CDATA[E. D.]]></given-names>
</name>
</person-group>
<source><![CDATA[El impacto del funcionamiento de los bloqueadores de señales inalámbricas del penal de Ayacucho en la población aledaña en el año 2020]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villamizar-Escobar]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sorzano-Rodríguez]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Movilización social ante la transformación de la red móvil en espacios urbanos en el periodo de emergencia sanitaria por COVID-19]]></article-title>
<source><![CDATA[Cuadernos de Geografía: Revista Colombiana de Geografía]]></source>
<year>2023</year>
<volume>32</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>366-81</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
