-
4
-
-
84889329608
-
-
3rd Generation Partnership Project. GSM/EDGE Radio Access Network; General PAcket Radio Service GPRS; Technical Report 3GPP TS 43.064 v7.2.0
-
3rd Generation Partnership Project. GSM/EDGE Radio Access Network; General PAcket Radio Service (GPRS); Overall description of the GPRS radio interface; Stage 2. Technical Report 3GPP TS 43.064 v7.2.0.
-
Overall Description of the GPRS Radio Interface; Stage 2
-
-
-
5
-
-
84889360833
-
-
3rd Generation Partnership Project. Technical Report 3GPP TS 04.18 v8.26.0
-
3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 04.18 v8.26.0.
-
Physical Layer on the Radio Path; General Description
-
-
-
9
-
-
0031208074
-
Paging strategy optimization in personal communication systems
-
A. Abutaleb and V. O. Li. Paging strategy optimization in personal communication systems. Wireless Networks, 3(3):195–204, 1997.
-
(1997)
Wireless Networks
, vol.3
, Issue.3
, pp. 195-204
-
-
Abutaleb, A.1
Li, V.O.2
-
12
-
-
80052862897
-
Rethinking the design of the internet: The end-to-end arguments vs: The brave new world
-
M. Blumenthal and D. Clark. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world. ACM Transactions on Internet Technology (TOIT), 1(1):70–109, 2001.
-
(2001)
ACM Transactions on Internet Technology (TOIT)
, vol.1
, Issue.1
, pp. 70-109
-
-
Blumenthal, M.1
Clark, D.2
-
13
-
-
4444317270
-
Defending against an internet-based attack on the physical world
-
August
-
S. Byers, A. Rubin, and D. Kormann. Defending Against an Internet-based Attack on the Physical World. ACM Transactions on Internet Technology (TOIT), 4(3):239–254, August 2004.
-
(2004)
ACM Transactions on Internet Technology (TOIT)
, vol.4
, Issue.3
, pp. 239-254
-
-
Byers, S.1
Rubin, A.2
Kormann, D.3
-
14
-
-
85077697312
-
-
Cingular Wireless. Cingular Wireless. http://www.cingular.com/, 2007.
-
(2007)
Cingular Wireless
-
-
-
17
-
-
0036461496
-
DNS root servers: Protecting the internet
-
R. Farrow. DNS Root Servers: Protecting the Internet. Network Magazine, 2003.
-
(2003)
Network Magazine
-
-
Farrow, R.1
-
19
-
-
84860034639
-
-
February 5
-
C. Haney. NAI is latest DoS victim. http://security.itworld.com/4339/NWW116617_02-05-2001/page_1.html, February 5 2001.
-
(2001)
NAI Is Latest DoS Victim
-
-
Haney, C.1
-
25
-
-
1042298621
-
Optimal sequential paging in cellular wireless networks
-
B. Krishnamachari, R.-H. Gau, S. B. Wicker, and Z. J. Haas. Optimal sequential paging in cellular wireless networks. Wireless Networks, 10(2):121–131, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.2
, pp. 121-131
-
-
Krishnamachari, B.1
Gau, R.-H.2
Wicker, S.B.3
Haas, Z.J.4
-
30
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4), July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
33
-
-
11244316626
-
Advanced quality of service strategies for GERAN mobile radio networks
-
R. Mullner, C. F. Ball, K. Ivanov, and H. Winkler. Advanced quality of service strategies for GERAN mobile radio networks. In IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2004.
-
(2004)
IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
-
-
Mullner, R.1
Ball, C.F.2
Ivanov, K.3
Winkler, H.4
-
38
-
-
0002521870
-
Active networking and end-to-end arguments
-
May/June
-
D. Reed, J. Saltzer, and D. Clark. Active Networking and End-To-End Arguments. IEEE Network, 12(3):67–71, May/June 1998.
-
(1998)
IEEE Network
, vol.12
, Issue.3
, pp. 67-71
-
-
Reed, D.1
Saltzer, J.2
Clark, D.3
-
40
-
-
33751026898
-
Yahoo attributes a lengthy service failure to an attack
-
February 8
-
M. Richtel. Yahoo Attributes a Lengthy Service Failure to an Attack. The New York Times, February 8 2000.
-
(2000)
The New York Times
-
-
Richtel, M.1
-
41
-
-
33751031776
-
Al-jazeera sites hit with denial-of-service attacks
-
March 26
-
P. Roberts. Al-Jazeera Sites Hit With Denial-of-Service Attacks. PCWorld Magazine, March 26 2003.
-
(2003)
PCWorld Magazine
-
-
Roberts, P.1
-
42
-
-
84976845043
-
End-to-end arguments in system design
-
J. H. Saltzer, D. P. Reed, and D. D. Clark. End-To-End Arguments In System Design. ACM Transactions on Computer Systems, 2(4):277–288, 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
43
-
-
0033650584
-
Practical network support for IP traceback
-
October
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proceedings of ACM SIGCOMM, pages 295–306, October 2000.
-
(2000)
Proceedings of ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
46
-
-
33745777451
-
MOVE: An end-to-end solution to network denial of service
-
A. Stavrou, A. Keromytis, J. Nieh, V. Misra, and D. Rubenstein. MOVE: An End-to-End Solution To Network Denial of Service. In Proceedings of Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Stavrou, A.1
Keromytis, A.2
Nieh, J.3
Misra, V.4
Rubenstein, D.5
-
48
-
-
0003584226
-
-
United States Census Bureau. United States Census 2000. http://www.census.gov/main/www/cen2000.html, 2000.
-
(2000)
United States Census 2000
-
-
-
49
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In Proceedings of Eurocrypt, pages 294–311, 2003.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
50
-
-
2942728016
-
Telling humans and computers apart automatically
-
L. von Ahn, M. Blum, and J. Langford. Telling humans and computers apart automatically. Communications of the ACM, 47(2):56–60, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
von Ahn, L.1
Blum, M.2
Langford, J.3
-
52
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
B. Waters, A. Juels, J. Halderman, and E. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pages 246–256, 2004.
-
(2004)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.3
Felten, E.4
|