메뉴 건너뛰기




Volumn 36, Issue 2, 2006, Pages 53-56

Unwanted traffic in 3G networks

Author keywords

3G; Cellular networks; Unwanted traffic

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER NETWORKS; GROUND PENETRATING RADAR SYSTEMS; LARGE SCALE SYSTEMS; ROBUSTNESS (CONTROL SYSTEMS); ROUTERS;

EID: 33646894468     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1129582.1129596     Document Type: Article
Times cited : (33)

References (18)
  • 1
    • 33646879720 scopus 로고    scopus 로고
    • DARWIN home page http://userver.ftw.at/~ricciato/darwin.
    • DARWIN Home Page
  • 2
    • 33646874283 scopus 로고    scopus 로고
    • Attacks and counter measures in 2.5G and 3G cellular IP networks
    • June
    • A. Bavosa. Attacks and Counter Measures in 2.5G and 3G Cellular IP Networks. Juniper White Paper, June 2004. Online at www.juniper.net/solutions/ literature/white.papers/200074.pdf.
    • (2004) Juniper White Paper
    • Bavosa, A.1
  • 5
    • 33646889001 scopus 로고    scopus 로고
    • Instant ciphertextonly cryptanalysis of GSM encrypted communications
    • August
    • E. Barkan, E. Biham, N. Keller. Instant CiphertextOnly Cryptanalysis of GSM Encrypted Communications. Crypto 2003, Santa Barbara, CA, August 2003.
    • (2003) Crypto 2003, Santa Barbara, CA
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 6
    • 33845951462 scopus 로고    scopus 로고
    • On the impact of unwanted traffic onto a 3G network
    • February. Available online from [1]
    • F. Ricciato, P. Svoboda, E. Hasenleithner, W. Fleischer. On the Impact of Unwanted Traffic onto a 3G Network. Technical Report FTW-TR-2006-006, February 2006. Available online from [1].
    • (2006) Technical Report , vol.FTW-TR-2006-006
    • Ricciato, F.1    Svoboda, P.2    Hasenleithner, E.3    Fleischer, W.4
  • 7
    • 1842815892 scopus 로고    scopus 로고
    • An introduction ro access security in UMTS
    • G. M. Koien. An Introduction ro Access Security in UMTS. IEEE Wireless Communications, 11(1), 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1
    • Koien, G.M.1
  • 11
    • 0000188718 scopus 로고    scopus 로고
    • HOT: Robustness and design in complex systems
    • J. M. Carlson, J. Doyle. HOT: Robustness and design in complex systems. Phys. Rev. Let., 84(11), 2000.
    • (2000) Phys. Rev. Let. , vol.84 , Issue.11
    • Carlson, J.M.1    Doyle, J.2
  • 12
    • 2142708221 scopus 로고    scopus 로고
    • Implementing and testing a virus throttle
    • May
    • J. Twycross, M. M. Williamson. Implementing and testing a virus throttle. Tech. Report HPL-2003-103, May 2003. Online www.hpl.hp.com/techreports/2003.
    • (2003) Tech. Report , vol.HPL-2003-103
    • Twycross, J.1    Williamson, M.M.2
  • 15
    • 33646858932 scopus 로고    scopus 로고
    • GPRS wireless security: Not ready for prime time
    • June
    • 0. Whitehouse. GPRS Wireless Security: Not Ready For Prime Time. Research Report by stake, June 2002. Online at www.atstake.com/research/reports.
    • (2002) Research Report by Stake
    • Whitehouse, O.1
  • 16
    • 14944369649 scopus 로고    scopus 로고
    • Characteristics of Internet background radiation
    • October
    • R. Pang et al. Characteristics of Internet Background Radiation. IMC'04, Taormina, Italy, October 2004.
    • (2004) IMC'04, Taormina, Italy
    • Pang, R.1
  • 17
    • 33645793289 scopus 로고    scopus 로고
    • Why cell phones will dominate the future Internet
    • April
    • S. Keshav. Why Cell Phones Will Dominate the Future Internet. Computer Communication Review, 35(2), April 2005.
    • (2005) Computer Communication Review , vol.35 , Issue.2
    • Keshav, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.