-
1
-
-
55849146161
-
-
Denial of service attacks, Technical report, October
-
Denial of service attacks, Technical report, CERT Coordination Center, October 1997, http://www.cert.org/tech_tips/denia_of_service.html.
-
(1997)
-
-
-
2
-
-
84882789559
-
-
December 31, 2003
-
Mobile networks facing overload, December 31, 2003, http://www. gateway2rassia.com/st/art_187902.php.
-
Mobile networks facing overload
-
-
-
4
-
-
84889360833
-
Physical layer on the radio path; general description
-
3rd Generation Partnership Project, Technical report 3GPPTS 05.01 v8.9.0
-
3rd Generation Partnership Project, Physical layer on the radio path; general description, Technical report 3GPPTS 05.01 v8.9.0.
-
-
-
-
5
-
-
55849121822
-
-
3rd Generation Partnership Project, Technical realization of the short message service sms, Technical report 3GPP TS 03.40 v7.5.0
-
3rd Generation Partnership Project, Technical realization of the short message service (sms), Technical report 3GPP TS 03.40 v7.5.0.
-
-
-
-
8
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
S. Bellovin, Security problems in the TCP/IP protocol suite, Computer Communications Review 19(2) (1989), 32-48.
-
(1989)
Computer Communications Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.1
-
10
-
-
55849087875
-
-
S. Buckingham, What is GPRS?, 2000, http://www.gsmworld.com/technology/ gprs/intro.shtml#5.
-
(2000)
What is GPRS
-
-
Buckingham, S.1
-
11
-
-
0041331445
-
Text messaging as a cause of sleep interruption in adolescents, evidence from a crosssectional study
-
J.V.D. Bulck, Text messaging as a cause of sleep interruption in adolescents, evidence from a crosssectional study, Journal of Sleep Research 12(3) (2003), 263.
-
(2003)
Journal of Sleep Research
, vol.12
, Issue.3
, pp. 263
-
-
Bulck, J.V.D.1
-
12
-
-
85084163920
-
Exploiting gray-box knowledge of buffer-cache management
-
N. Burnett, J. Bent, A. Arpaci-Dusseau and R. Arpaci-Dusseau, Exploiting gray-box knowledge of buffer-cache management, in: Proceedings of USENIX Annual Technical Conference, 2002, pp. 29-44.
-
(2002)
Proceedings of USENIX Annual Technical Conference
, pp. 29-44
-
-
Burnett, N.1
Bent, J.2
Arpaci-Dusseau, A.3
Arpaci-Dusseau, R.4
-
13
-
-
4444317270
-
Defending against an internet-based attack on the physical world
-
S. Byers, A. Rubin and D. Kormann, Defending against an internet-based attack on the physical world, ACM Transactions on Internet Technology (TOIT) 4(3) (2004), 239-254.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, vol.4
, Issue.3
, pp. 239-254
-
-
Byers, S.1
Rubin, A.2
Kormann, D.3
-
14
-
-
55849150075
-
-
A. Choong, Wireless watch: Jammed, September 7, 2004, http://asia.cnet.com/reviews/handphones/wirelesswatch/0,39020107,39186280,00. htm.
-
A. Choong, Wireless watch: Jammed, September 7, 2004, http://asia.cnet.com/reviews/handphones/wirelesswatch/0,39020107,39186280,00. htm.
-
-
-
-
17
-
-
33745804129
-
A study in mobile messaging: The evolution of messaging in mobile networks, and how to efficiently and effectively manage the growing messaging traffic
-
Technical report
-
Cisco Systems Whitepaper, A study in mobile messaging: The evolution of messaging in mobile networks, and how to efficiently and effectively manage the growing messaging traffic, Technical report, 2004, http://www.cisco.com/warp/ public/cc/so/neso/mbwlso/mbmsg_wp.pdf.
-
(2004)
-
-
-
18
-
-
55849132083
-
-
Computer Associates
-
Computer Associates, Carko, http://www3.ca.com/securityadvisor/pest/pest. aspx?id=453075555.
-
Carko
-
-
-
19
-
-
33745798663
-
COSMOTE and the 'Athens 2004' Olympic sponsorship
-
Technical report
-
COSMOTE Whitepaper, COSMOTE and the 'Athens 2004' Olympic sponsorship, Technical report, 2003, http://www.cosmote.gr/content/en/attached_files/ investorrelations/COSMOTE_Annual_Report_2003_77-84.pdf.
-
(2003)
-
-
-
22
-
-
55849145750
-
-
F-Secure Corporation, December 2004
-
F-Secure Corporation, F-Secure virus descriptions: Cabir.h, December 2004, http://www.f-secure.com/v-descs/cabir_h.shtml.
-
F-Secure virus descriptions: Cabir.h
-
-
-
23
-
-
55849091639
-
-
F-Secure Corporation, January 2005
-
F-Secure Corporation, F-Secure virus descriptions: Skulls.a, January 2005, http://www.f-secure.com/v-descs/skulls.shtml.
-
F-Secure virus descriptions: Skulls.a
-
-
-
25
-
-
0003976889
-
Trends in denial of service attack technology
-
Technical report, October
-
K. Houle and G. Weaver, Trends in denial of service attack technology, Technical report, CERT Coordination Center, October 2001, http://www.cert.org/ archive/pdf/DoS_trends.pdf.
-
(2001)
-
-
Houle, K.1
Weaver, G.2
-
26
-
-
55849111438
-
Intel Whitepaper, SMS messaging in SS7 networks: Optimizing revenue with modular components
-
Technical report
-
Intel Whitepaper, SMS messaging in SS7 networks: Optimizing revenue with modular components, Technical report, 2003, http://www.intel.com/network/csp/ pdf/8706wp.pdf.
-
(2003)
-
-
-
29
-
-
0035703693
-
Fast and robust signaling overload control
-
November
-
S. Kasera, J. Pinheiro, C.L.M. Karaul, A. Hari and T.L. Porta, Fast and robust signaling overload control, in : Proceedings IEEE Conference on Network Protocols (ICNP), November 2001, pp. 323-331.
-
(2001)
Proceedings IEEE Conference on Network Protocols (ICNP)
, pp. 323-331
-
-
Kasera, S.1
Pinheiro, J.2
Karaul, C.L.M.3
Hari, A.4
Porta, T.L.5
-
30
-
-
23844516018
-
Securing ss7 telecommunications networks
-
G. Lorenz, T. Moore, G. Manes, J. Hale and S. Shenoi, Securing ss7 telecommunications networks, in: Proceedings of the IEEE Workshop on Information Assurance and Security, 2001.
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
-
-
Lorenz, G.1
Moore, T.2
Manes, G.3
Hale, J.4
Shenoi, S.5
-
31
-
-
55849094994
-
-
S. Makris, Athens 2004 games: The extreme makeover Olympics!, April 2005, Slides presented at CQR 2005 Workshop, St. Petersburg Beach, FL, USA.
-
S. Makris, Athens 2004 games: The "extreme makeover" Olympics!, April 2005, Slides presented at CQR 2005 Workshop, St. Petersburg Beach, FL, USA.
-
-
-
-
33
-
-
84882775670
-
-
March 15, 2001
-
S. Marwaha, Will success spoil sms?, March 15, 2001, http:// wirelessreview.com/mag/wireless_success_spoil_sms/.
-
Will success spoil sms
-
-
Marwaha, S.1
-
35
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, Inside the slammer worm, IEEE Security and Privacy 1(4) (2003), 33-39.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
36
-
-
33745774860
-
Signalling system 7 network security
-
August 4-7
-
T. Moore, T. Kosloff, J. Keller, G. Manes and S. Shenoi, Signalling system 7 network security, in: Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems, August 4-7, 2002.
-
(2002)
Proceedings of the IEEE 45th Midwest Symposium on Circuits and Systems
-
-
Moore, T.1
Kosloff, T.2
Keller, J.3
Manes, G.4
Shenoi, S.5
-
39
-
-
33745790961
-
SMS over SS7
-
National Communications System, 03-2 NCS TIB 03-2, December 2003
-
National Communications System, SMS over SS7, Technical Report Technical Information Bulletin 03-2 (NCS TIB 03-2), December 2003, http://www.ncs.gov/ library/tech_bulletins/2003/tib_03-2.pdf.
-
Technical Report Technical Information Bulletin
-
-
-
40
-
-
55849107273
-
-
Nextel, Text messaging, http://www.nextel.com/en/services/messaging/ text_messaging.shtml.
-
Text messaging
-
-
-
41
-
-
55849102002
-
-
J. Pearce, Mobile firms gear up for new years text-fest, December 30, 2003, http://news.zdnet.co.uk/communications/networks/0,39020345,39118812.00. htm.
-
J. Pearce, Mobile firms gear up for new years text-fest, December 30, 2003, http://news.zdnet.co.uk/communications/networks/0,39020345,39118812.00. htm.
-
-
-
-
42
-
-
55849153438
-
-
H. Project, The honeynet project, 2005, http://project.honeynet.org.
-
H. Project, The honeynet project, 2005, http://project.honeynet.org.
-
-
-
-
45
-
-
0033650584
-
Practical network support for IP traceback
-
October
-
S. Savage, D. Wetherall, A. Karlin and T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, October 2000, pp. 295-306.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
46
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society, May
-
C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram and D. Zamboni, Analysis of a denial of service attack on TCP, in: Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society, May 1997, pp. 208-223.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
49
-
-
55849090562
-
Standard, Short messaging service for spread spectrum systems
-
Telecommunication Industry Association/Electronic Industries Association TIA/EIA, Technical report ANSI/TIA/EIA-637-A-1999
-
Telecommunication Industry Association/Electronic Industries Association (TIA/EIA) Standard, Short messaging service for spread spectrum systems, Technical report ANSI/TIA/EIA-637-A-1999.
-
-
-
-
53
-
-
55849150074
-
From mobile phones to responsible devices
-
Technical report NAS-TR-0059-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA
-
P. Traynor, V. Rao, T. Jaeger, P. McDaniel and T. La Porta, From mobile phones to responsible devices, Technical report NAS-TR-0059-2006, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, 2007.
-
(2007)
-
-
Traynor, P.1
Rao, V.2
Jaeger, T.3
McDaniel, P.4
La Porta, T.5
-
54
-
-
55849151206
-
-
United States Census Bureau, United States Census
-
United States Census Bureau, United States Census 2000, 2000, http://www.census.gov/main/www/cen2000.html.
-
(2000)
, vol.2000
-
-
-
57
-
-
35248831179
-
Using hard AI problems for security
-
CAPTCHA
-
L. von Ahn, M. Blum, N. Hopper and J. Langford, CAPTCHA: Using hard AI problems for security, in: Proceedings of Eurocrypt, 2003, pp. 294-311.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
|