-
1
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
Alexandria, Virginia, US, November
-
W. Enck, P. Traynor, P. McDaniel, T. La Porta, Exploiting open functionality in SMS-capable cellular networks, in: Proceedings of the ACM CCS'05, Alexandria, Virginia, US, November 2005.
-
(2005)
Proceedings of the ACM CCS'05
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
4
-
-
34247488845
-
Impact of paging channel overloads or attacks on a cellular network
-
Los Angeles, USA, September
-
J. Serror, H. Zang, J.C. Bolot, Impact of paging channel overloads or attacks on a cellular network, in: Proceedings of the ACM WiSe'06, Los Angeles, USA, September 2006.
-
(2006)
Proceedings of the ACM WiSe'06
-
-
Serror, J.1
Zang, H.2
Bolot, J.C.3
-
5
-
-
34548310426
-
-
P. Lee, T. Bu, T. Woo, On the detection of signaling DoS attacks on 3G wireless networks, in: IEEE INFOCOM 2007, Phoenix, USA, April 2007.
-
P. Lee, T. Bu, T. Woo, On the detection of signaling DoS attacks on 3G wireless networks, in: IEEE INFOCOM 2007, Phoenix, USA, April 2007.
-
-
-
-
6
-
-
84871061297
-
On attack causality in Internet-connected cellular networks
-
Boston, MA, August
-
P. Traynor, P. McDaniel, T. La Porta, On attack causality in Internet-connected cellular networks, in: Proceedings of the 16th USENIX Security Symposium (SECURITY), Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (SECURITY)
-
-
Traynor, P.1
McDaniel, P.2
La Porta, T.3
-
8
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
Igure V.M., and Williams R.D. Taxonomies of attacks and vulnerabilities in computer systems. IEEE Communications Surveys 10 1, Q1 (2008)
-
(2008)
IEEE Communications Surveys
, vol.10
, Issue.1 Q1
-
-
Igure, V.M.1
Williams, R.D.2
-
9
-
-
54949100002
-
Discovering parameter setting in 3G networks via active measurements
-
Barbuzzi A., Ricciato F., and Boggia G. Discovering parameter setting in 3G networks via active measurements. IEEE Communications Letters 12 10 (2008)
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
-
-
Barbuzzi, A.1
Ricciato, F.2
Boggia, G.3
-
10
-
-
0000188718
-
Highly optimized tolerance: robustness and design in complex systems
-
Carlson J., and Doyle J. Highly optimized tolerance: robustness and design in complex systems. Physical Review Letters 84 11 (2000)
-
(2000)
Physical Review Letters
, vol.84
, Issue.11
-
-
Carlson, J.1
Doyle, J.2
-
11
-
-
77950265846
-
Internet security meets the IP multimedia subsystem: An overview
-
11 September, doi:10.1002/sec.142
-
A. Berger, I. Gojmerac, O. Jung, Internet security meets the IP multimedia subsystem: an overview, in: Security and Communication Networks, Wiley, New York, Available online 11 September 2009, doi:10.1002/sec.142.
-
(2009)
Security and Communication Networks, Wiley, New York, Available online
-
-
Berger, A.1
Gojmerac, I.2
Jung, O.3
-
12
-
-
85056847447
-
A taxonomy of cyber attacks on 3G networks
-
Atlanta, GA, USA, May 19-20
-
K. Kotapati, P. Liu, Y. Sun, T.F. LaPorta, A taxonomy of cyber attacks on 3G networks, in: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005.
-
(2005)
IEEE International Conference on Intelligence and Security Informatics, ISI
-
-
Kotapati, K.1
Liu, P.2
Sun, Y.3
LaPorta, T.F.4
-
14
-
-
3543113439
-
A framework for classifying denial of service attacks
-
New York, USA
-
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of the SIGCOMM'03, New York, USA, 2003.
-
(2003)
Proceedings of the SIGCOMM'03
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
15
-
-
74849126022
-
-
S. Bali, S. Machiraju, H. Zang, V. Frostl, A measurement study of scheduler-based attacks in 3G wireless networks, in: IEEE PAM, 2007.
-
S. Bali, S. Machiraju, H. Zang, V. Frostl, A measurement study of scheduler-based attacks in 3G wireless networks, in: IEEE PAM, 2007.
-
-
-
-
16
-
-
79960869092
-
Exploiting opportunistic scheduling in cellular data networks
-
R. Racic, D. Ma, H. Chen, X. Liu, Exploiting opportunistic scheduling in cellular data networks, in: Proceedings of the 16th Annual Network & Distributed System Security (NDSS) Symposium, 2008.
-
(2008)
Proceedings of the 16th Annual Network & Distributed System Security (NDSS) Symposium
-
-
Racic, R.1
Ma, D.2
Chen, H.3
Liu, X.4
-
17
-
-
70349686596
-
-
B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao, A chain reaction DoS attack on 3G networks: analysis and defenses, in: IEEE INFOCOM, 2009.
-
B. Zhao, C. Chi, W. Gao, S. Zhu, G. Cao, A chain reaction DoS attack on 3G networks: analysis and defenses, in: IEEE INFOCOM, 2009.
-
-
-
-
19
-
-
74849104047
-
-
Taormina, Sicily, Italy, October 25-27
-
R. Pang, V. Yegneswaran, in: Characteristics of Internet Background Radiation, IMC'04, Taormina, Sicily, Italy, October 25-27, 2004.
-
(2004)
Characteristics of Internet Background Radiation, IMC'04
-
-
Pang, R.1
Yegneswaran, V.2
-
20
-
-
84948430459
-
Partitioning attacks: Or how to rapidly clone some GSM cards
-
Berkeley, CA, 12-15 May
-
J. Rao, P. Rohatgi, H. Scherzer, S. Tinguely, Partitioning attacks: or how to rapidly clone some GSM cards, in: IEEE Symposium on Security and Privacy, Berkeley, CA, 12-15 May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Rao, J.1
Rohatgi, P.2
Scherzer, H.3
Tinguely, S.4
-
21
-
-
74849083792
-
-
Philadelphia, USA, 1 October
-
U. Meyer, S. Wetzel, in: A Man-in-the-Middle Attack on UMTS, WiSe04, Philadelphia, USA, 1 October 2004.
-
(2004)
A Man-in-the-Middle Attack on UMTS, WiSe04
-
-
Meyer, U.1
Wetzel, S.2
-
22
-
-
1642344382
-
Security in third-generation mobile networks
-
Xenakis C., and Merakos L. Security in third-generation mobile networks. Computer Communications 27 (2004) 638-650
-
(2004)
Computer Communications
, vol.27
, pp. 638-650
-
-
Xenakis, C.1
Merakos, L.2
-
23
-
-
35248869678
-
Dependency relation based vulnerability analysis of 3G networks: can it identify unforeseen cascading attacks?
-
Kotapati K., Liu P., and Laporta T.F. Dependency relation based vulnerability analysis of 3G networks: can it identify unforeseen cascading attacks?. Telecommunication Systems 35 3-4 (2007)
-
(2007)
Telecommunication Systems
, vol.35
, Issue.3-4
-
-
Kotapati, K.1
Liu, P.2
Laporta, T.F.3
-
24
-
-
50049091842
-
Exploiting MMS vulnerabilities to stealthily exhaust mobile phones battery
-
Baltimore, USA
-
R. Racic, D. Ma, H. Chen, Exploiting MMS vulnerabilities to stealthily exhaust mobile phones battery, in: SECURECOMM'06, Baltimore, USA.
-
SECURECOMM'06
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
25
-
-
37849015209
-
Mining call and mobility data to improve paging efficiency in cellular networks
-
New York, USA
-
H. Zang, J.C. Bolot. Mining call and mobility data to improve paging efficiency in cellular networks, in: ACM MobiCom'07, New York, USA, 2007.
-
(2007)
ACM MobiCom'07
-
-
Zang, H.1
Bolot, J.C.2
|