-
1
-
-
84889360833
-
Physical layer on the radio path: General description
-
3rd Generation Partnership Project
-
3rd Generation Partnership Project. Physical layer on the radio path: general description. Technical report 3GPP ts 05.01. v8.9.0, 1999.
-
(1999)
Technical Report 3GPP Ts 05.01. v8.9.0
-
-
-
6
-
-
84864431942
-
-
The Wireless Association, December
-
CTIA - The Wireless Association. Wireless quick facts, December 2010. http://www.ctia.org/consumerinfo/service/index.cfm/AID/10323.
-
(2010)
Wireless Quick Facts
-
-
-
7
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
Oct
-
D. Dagon, T. Martin, and T. Starner. Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing, 3(4):11 - 15, Oct 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
8
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
New York, NY, USA. ACM Press
-
C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes. Can you infect me now?: malware propagation in mobile phone networks. In Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pages 61-68, New York, NY, USA, 2007. ACM Press.
-
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM '07
, vol.2007
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
9
-
-
85084096782
-
Why mobile-to-mobile wireless malware won't cause a storm
-
Berkeley, CA, USA. USENIX Association
-
N. Husted and S. Myers. Why mobile-to-mobile wireless malware won't cause a storm. In Proceedings of the 4th USENIX conference on Largescale exploits and emergent threats, LEET'11, pages 7-7, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 4th USENIX Conference on Largescale Exploits and Emergent Threats, LEET'11
, pp. 7-7
-
-
Husted, N.1
Myers, S.2
-
10
-
-
79955622287
-
WCDMA RACH channel medium access control performance
-
IEEE, September
-
J. Huusko, T. Peramaki, P. Jarvensivu, and M. Jurvansuu. WCDMA RACH channel medium access control performance. In Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, volume 3, pages 2636-2639. IEEE, September 2003.
-
(2003)
Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on
, vol.3
, pp. 2636-2639
-
-
Huusko, J.1
Peramaki, T.2
Jarvensivu, P.3
Jurvansuu, M.4
-
11
-
-
0038483826
-
Emergence of scaling in random networks
-
B. A. L. and A. R. Emergence of scaling in random networks. In Pervasive Computing, IEEE, volume 286, pages 509-512, 1999.
-
(1999)
Pervasive Computing, IEEE
, vol.286
, pp. 509-512
-
-
-
13
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
vol.3, Apr
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: requirements for containing self-propagating code. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pages 1901 - 1910 vol.3, Apr 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
19
-
-
77956567216
-
Modeling and analysis of internet worm propagation
-
Aug
-
F. Su, Z. Lin, and Y. Ma. Modeling and analysis of internet worm propagation. The Journal of China Universities of Posts and Telecommunications, 17(4):63-68, Aug 2010.
-
(2010)
The Journal of China Universities of Posts and Telecommunications
, vol.17
, Issue.4
, pp. 63-68
-
-
Su, F.1
Lin, Z.2
Ma, Y.3
-
20
-
-
77749328265
-
Modeling email worm propagation using game theory
-
IEEE, Nov
-
X. Sun, Y. Liu, and J. Wang. Modeling email worm propagation using game theory. In Multimedia Information Networking and Security, 2009. MINES '09. International Conference on, volume 1, pages 388 -392. IEEE, Nov 2009.
-
(2009)
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
, vol.1
, pp. 388-392
-
-
Sun, X.1
Liu, Y.2
Wang, J.3
-
21
-
-
84872005029
-
Characterizing the security implications of third-party emergency alert systems over cellular text messaging services
-
P. Traynor. Characterizing the security implications of third-party emergency alert systems over cellular text messaging services. Mobile Computing, IEEE Transactions on, PP(99):1, 2011.
-
(2011)
Mobile Computing, IEEE Transactions on
, vol.PP
, Issue.99
, pp. 1
-
-
Traynor, P.1
-
22
-
-
55849122324
-
Exploiting open functionality in sms-capable cellular networks
-
Amsterdam, The Netherlands, December
-
P. Traynor, W. Enck, P. Mcdaniel, and T. La Porta. Exploiting open functionality in sms-capable cellular networks. In J. Comput. Secur., volume 16, pages 713-742, Amsterdam, The Netherlands, December 2008.
-
(2008)
J. Comput. Secur.
, vol.16
, pp. 713-742
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
23
-
-
61449199429
-
Mitigating attacks on open functionality in sms-capable cellular networks
-
Piscataway, NJ, USA, February. IEEE Press
-
P. Traynor, W. Enck, P. McDaniel, and T. L. Porta. Mitigating attacks on open functionality in sms-capable cellular networks. In IEEE/ACM Transactions on Networking, volume 17, pages 40-53, Piscataway, NJ, USA, February 2009. IEEE Press.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, pp. 40-53
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
24
-
-
84871061297
-
On attack causality in internet-connected cellular networks
-
16, Berkeley, CA, USA. USENIX Association
-
P. Traynor, P. McDaniel, and T. La Porta. On attack causality in internet-connected cellular networks. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 21:1-21:16, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, vol.21
, pp. 1-21
-
-
Traynor, P.1
McDaniel, P.2
La Porta, T.3
-
25
-
-
0003584022
-
-
United States Census Bureau. State and county quickfacts, 2009. http://quickfacts.census.gov/qfd/states/11000.html.
-
(2009)
State and County Quickfacts
-
-
-
30
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
New York, NY, USA. ACM
-
G. Yan, G. Chen, S. Eidenbenz, and N. Li. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 196-206, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11
, pp. 196-206
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
|