Attacking O-RAN Interfaces: Threat Modeling, Analysis and Practical Experimentation | Publicación