-
1
-
-
70350650693
-
Signaling-oriented DoS attacks in UMTS Networks
-
Springer, Berlin
-
G. Kambourakis, C. Kolias, S. Gritzalis, J.H. Park, Signaling-oriented DoS attacks in UMTS Networks, in: Proceedings of the ISA 2009 Third International Conference on Information Security and Assurance, Seoul, Korea, LNCS, vol. 5576, Springer, Berlin, 2009, pp. 280-289.
-
(2009)
Proceedings of the ISA 2009 Third International Conference on Information Security and Assurance, Seoul, Korea, LNCS
, vol.5576
, pp. 280-289
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Park, J.H.4
-
2
-
-
78751648500
-
-
Kazumi Algorithm Specification, ETSI TS 135 202 V7.0.0 (accessed13.01.08)
-
Kazumi Algorithm Specification, ETSI TS 135 202 V7.0.0. < http://www.etsi.org/website/document/algorithms/ts-135202v070000p.pdf > (accessed 13.01.08).
-
-
-
-
4
-
-
11244304396
-
A man-in-the-middle attack on UMTS
-
U. Meyer, S. Wetzel, A man-in-the-middle attack on UMTS, in: Proceedings of the WiSe'04, Philadelphia, PA, USA, October 2004, pp. 90-97.
-
(2004)
Proceedings of the WiSe'04, Philadelphia, PA, USA, October
, pp. 90-97
-
-
Meyer, U.1
Wetzel, S.2
-
6
-
-
78149401077
-
-
3GPP Technical Specification, 3GPP (Release 8), TS 33.102 V8.3.0, June
-
3GPP Technical Specification, 3GPP, 3G Security; Security Architecture (Release 8), TS 33.102 V8.3.0, June 2009.
-
(2009)
3G Security; Security Architecture
-
-
-
7
-
-
78751650253
-
Information Technology; Security Techniques; Entity Authentication
-
ISO/IEC 9798-4 1999
-
ISO/IEC 9798-4 (1999). Information Technology; Security Techniques; Entity Authentication. Part 4: Mechanisms Using a Cryptographic Check Function, 1999.
-
(1999)
Part 4: Mechanisms Using A Cryptographic Check Function
-
-
-
8
-
-
57749208412
-
Vulnerabilities of UMTS access domain security architecture
-
M. Khan, A. Ahmed, A.R. Cheema, Vulnerabilities of UMTS access domain security architecture, in: Proceedings of the Ninth ACIS International Conference on Software Engineering, Networking, and Parallel/Distributed Computing, Phuket, Thailand, August 2008, pp. 350-355.
-
(2008)
Proceedings of the Ninth ACIS International Conference on Software Engineering, Networking, and Parallel/Distributed Computing, Phuket, Thailand, August
, pp. 350-355
-
-
Khan, M.1
Ahmed, A.2
Cheema, A.R.3
-
9
-
-
0012453383
-
-
3GPP TR 33.900 (1.2.0) January
-
3GPP TR 33.900 (1.2.0), A Guide to 3G Security, January 2000.
-
(2000)
A Guide to 3G Security
-
-
-
11
-
-
78751647675
-
-
June
-
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz (Eds.), Extensible Authentication Protocol (EAP), RFC 3748, June 2004.
-
(2004)
Extensible Authentication Protocol (EAP), RFC
, vol.3748
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
12
-
-
70449878083
-
Exception triggered DoS attacks on wireless networks
-
Portugal, IEEE Press, New York
-
Y. Zhao, S. Vemuri, J. Chen, Y. Chen, H. Zhou, Z. (Judy) Fu, Exception triggered DoS attacks on wireless networks, in: Proceedings of International Conference on Dependable Systems and Networks (DSN-2009), Portugal, IEEE Press, New York.
-
Proceedings of International Conference on Dependable Systems and Networks (DSN-2009)
-
-
Zhao, Y.1
Vemuri, S.2
Chen, J.3
Chen, Y.4
Zhou, H.5
Fu, Z.6
-
13
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of the Sixth ACM MobiHoc, ACM, New York, 2005, pp. 46-57.
-
(2005)
Proceedings of the Sixth ACM MobiHoc, ACM, New York
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
14
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
IEEE Press, New York, May-June
-
W. Xu, K. Ma, W. Trappe, Y. Zhang, Jamming sensor networks: attack and defense strategies, IEEE Network, vol. 20(3), IEEE Press, New York, May-June 2006, pp. 41-47.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
15
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
D.C. Nash, T.L. Martin, D.S. Ha, M.S. Hsiao, Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices, in: Proceedings of the third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), 2005, pp. 141-145.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05)
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
17
-
-
1642307979
-
Prevention of cooperative black hole attack in wireless ad hoc networks
-
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, K. Nygard, Prevention of cooperative black hole attack in wireless ad hoc networks, in: Proceedings of the 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA, 2003, pp. 570-575.
-
(2003)
Proceedings of the 2003 International Conference on Wireless Networks (ICWN'03), Las Vegas, Nevada, USA
, pp. 570-575
-
-
Ramaswamy, S.1
Fu, H.2
Sreekantaradhya, M.3
Dixon, J.4
Nygard, K.5
-
18
-
-
77953095994
-
Black hole attack in mobile ad hoc networks
-
M. Al-Shurman, S.M. Yoo, S. Park, Black hole attack in mobile ad hoc networks, in: Proceedings of the 42nd ACM Annual Southeast Regional Conference, ACM, New York, 2004, pp. 96-97.
-
(2004)
Proceedings of the 42nd ACM Annual Southeast Regional Conference, ACM, New York
, pp. 96-97
-
-
Al-Shurman, M.1
Yoo, S.M.2
Park, S.3
-
19
-
-
0036793924
-
Denial of service in sensor networks
-
IEEE Press, New York, October
-
A.D. Wood, J.A. Stankovic, Denial of service in sensor networks, IEEE Computer, vol. 35(10), IEEE Press, New York, October 2002, pp. 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
20
-
-
0036343692
-
Detecting SYN flooding attacks
-
IEEE, New York
-
H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol 3, IEEE, New York, 2002, pp. 1530-1539.
-
(2002)
Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
22
-
-
34548860915
-
Client puzzles based on quasi-partial collisions against DoS attacks in UMTS
-
Y. Lei, S. Pierre, A. Quintero, Client puzzles based on quasi-partial collisions against DoS attacks in UMTS, in: Proceedings of the 64th IEEE Vehicular Technology Conference, IEEE, New York, 2006, pp. 1-5.
-
(2006)
Proceedings of the 64th IEEE Vehicular Technology Conference, IEEE, New York
, pp. 1-5
-
-
Lei, Y.1
Pierre, S.2
Quintero, A.3
-
24
-
-
78751646631
-
Towards actively defending from DoS arracks in UMTS-WLAN
-
H. Qu, Q. Cheng, E. Yaprak, and L.Y. Wang Towards actively defending from DoS arracks in UMTS-WLAN Ubiquitous Computing and Communication Journal 3 3 2008 1 6
-
(2008)
Ubiquitous Computing and Communication Journal
, vol.3
, Issue.3
, pp. 1-6
-
-
Qu, H.1
Cheng, Q.2
Yaprak, E.3
Wang, L.Y.4
-
25
-
-
0037984544
-
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler, SIP: Session Initiation Protocol, RFC 3261, June 2002.
-
(2002)
SIP: Session Initiation Protocol, RFC 3261, June
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
26
-
-
46749114456
-
Protecting IP Multimedia Subsystem (IMS) service delivery platform from time independent attacks
-
M. Sher, T. Magedanz, Protecting IP Multimedia Subsystem (IMS) service delivery platform from time independent attacks, in: Proceedings of the Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Press, New York, pp. 171-176.
-
Proceedings of the Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Press, New York
, pp. 171-176
-
-
Sher, M.1
Magedanz, T.2
-
27
-
-
77955711784
-
Security threats and solutions for application server of IP Multimedia Subsystem (IMS-AS)
-
M. Sher, S. Wu, T. Magedanz, Security threats and solutions for application server of IP Multimedia Subsystem (IMS-AS), in: IEEE/IST MonAM2006 - Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen, Germany, 2006.
-
(2006)
IEEE/IST MonAM2006 - Workshop on Monitoring, Attack Detection and Mitigation, Tuebingen, Germany
-
-
Sher, M.1
Wu, S.2
Magedanz, T.3
-
28
-
-
66749192137
-
Securing IMS against novel threats
-
S. Wahl, K. Rieck, P. Laskov, P. Domschitz, and K.-R. Müller Securing IMS against novel threats Bell Labs Technical Journal 14 1 2009 243 258
-
(2009)
Bell Labs Technical Journal
, vol.14
, Issue.1
, pp. 243-258
-
-
Wahl, S.1
Rieck, K.2
Laskov, P.3
Domschitz, P.4
Müller, K.-R.5
-
29
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
IEEE Press, New York
-
D. Geneiatakis, A. Dagiouklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem, Survey of security vulnerabilities in session initiation protocol, IEEE Communications Surveys and Tutorials, vol. 8(3), IEEE Press, New York, 2006, pp. 68-81.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiouklas, A.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
Sisalem, D.7
-
30
-
-
33750013256
-
Denial of service attacks targeting a SIP VoIP infrastructure: Attack scenarios and prevention mechanisms
-
D. Sisalem, J. Kuthan, S. Ehlert, Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms, IEEE Network, IEEE Press, New York, September/October 2006, pp. 26-31.
-
(2006)
IEEE Network, IEEE Press, New York, September/October
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
31
-
-
78751649684
-
-
3GPP, Generic Bootstrapping Architecture (GBA) (Rel. 7), TS 33.220 V7, 2005
-
3GPP, Generic Bootstrapping Architecture (GBA) (Rel. 7), TS 33.220 V7, 2005.
-
-
-
-
32
-
-
78751648097
-
-
3GPP, Generic Authentication Architecture (GAA); Access to Network Application Functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) (Rel.7), TS 33.222 V7, 2005
-
3GPP, Generic Authentication Architecture (GAA); Access to Network Application Functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) (Rel.7), TS 33.222 V7, 2005.
-
-
-
-
33
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, E. Felten, New client puzzle outsourcing techniques for DoS resistance, in: Proceedings of the Computer and Communications Security, 2004, pp. 246-256.
-
(2004)
Proceedings of the Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
-
34
-
-
25644445353
-
The design and implementation of network puzzles
-
W. Feng, E. Kaiser, W. Feng, A. Luu, The design and implementation of network puzzles, in: Proceedings of the INFOCOM, IEEE Press, New York, 2005, pp. 2372-2382.
-
(2005)
Proceedings of the INFOCOM, IEEE Press, New York
, pp. 2372-2382
-
-
Feng, W.1
Kaiser, E.2
Feng, W.3
Luu, A.4
|