-
1
-
-
34247488845
-
Impact of paging channel overloads or attacks on a cellular network
-
LA, CA, Sep
-
J. Serror, H. Zang, and J. C. Bolot, "Impact of paging channel overloads or attacks on a cellular network," in Proc. 5th ACM W'shop Wireless Security (WiSe'06), LA, CA, Sep 2006, pp. 75-84.
-
(2006)
Proc. 5th ACM w'Shop Wireless Security (WiSe'06)
, pp. 75-84
-
-
Serror, J.1
Zang, H.2
Bolot, J.C.3
-
2
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
Alexandria, VA, Nov
-
W. Enck, P. Traynor, P. McDaniel, and T. La Porta, "Exploiting open functionality in SMS-capable cellular networks," in Proc. 12th ACM Conf. Computer and Communications security (CCS'05), Alexandria, VA, Nov 2005, pp. 393-404.
-
(2005)
Proc. 12th ACM Conf. Computer and Communications Security (CCS'05)
, pp. 393-404
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
3
-
-
68449104742
-
On the detection of signaling DoS attacks on 3G/WiMax wireless networks
-
Oct
-
P. P. C. Lee, T. Bu, and T. Woo, "On the detection of signaling DoS attacks on 3G/WiMax wireless networks," Comput. Netw., vol. 53, no. 15, pp. 2601-2616, Oct 2009.
-
(2009)
Comput. Netw.
, vol.53
, Issue.15
, pp. 2601-2616
-
-
Lee, P.P.C.1
Bu, T.2
Woo, T.3
-
4
-
-
74849109011
-
A review of DoS attack models for 3G cellular networks from a system-design perspective
-
Mar
-
F. Ricciato, A. Coluccia, and A. D'Alconzo, "A review of DoS attack models for 3G cellular networks from a system-design perspective," Comput. Commun., vol. 33, no. 5, pp. 551-558, Mar 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.5
, pp. 551-558
-
-
Ricciato, F.1
Coluccia, A.2
D'Alconzo, A.3
-
5
-
-
33846199593
-
A self-aware approach to denial of service defence
-
Apr
-
E. Gelenbe and G. Loukas, "A self-aware approach to denial of service defence," Comput. Netw., vol. 51, no. 5, pp. 1299-1314, Apr 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.5
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
-
6
-
-
67650079730
-
Steps towards self-aware networks
-
Jul
-
E. Gelenbe, "Steps towards self-aware networks," Commun. ACM, vol. 52, no. 7, pp. 66-75, Jul 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.7
, pp. 66-75
-
-
Gelenbe, E.1
-
7
-
-
36749023984
-
Dealing with software viruses: A biological paradigm
-
Sep
-
-, "Dealing with software viruses: A biological paradigm," Inf. Secur. Tech. Rep., vol. 12, no. 4, pp. 242-250, Sep 2007.
-
(2007)
Inf. Secur. Tech. Rep.
, vol.12
, Issue.4
, pp. 242-250
-
-
Gelenbe, E.1
-
8
-
-
84864669613
-
Packet delay and energy consumption in non-homogeneous networks
-
Aug
-
O. H. Abdelrahman and E. Gelenbe, "Packet delay and energy consumption in non-homogeneous networks," Comput. J., vol. 55, no. 8, pp. 950-964, Aug 2012.
-
(2012)
Comput. J.
, vol.55
, Issue.8
, pp. 950-964
-
-
Abdelrahman, O.H.1
Gelenbe, E.2
-
9
-
-
54949100002
-
Discovering parameter setting in 3G networks via active measurements
-
Oct
-
A. Barbuzzi, F. Ricciato, and G. Boggia, "Discovering parameter setting in 3G networks via active measurements," IEEE Commun. Lett., vol. 12, no. 10, pp. 730-732, Oct 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 730-732
-
-
Barbuzzi, A.1
Ricciato, F.2
Boggia, G.3
-
10
-
-
78650860703
-
Characterizing radio resource allocation for 3G networks
-
Melbourne, Australia, Nov
-
F. Qian et al., "Characterizing radio resource allocation for 3G networks," in Proc. 10th Internet Measurement Conf. (IMC'10), Melbourne, Australia, Nov 2010, pp. 137-150.
-
(2010)
Proc. 10th Internet Measurement Conf. (IMC'10)
, pp. 137-150
-
-
Qian, F.1
-
11
-
-
85180802643
-
You can run, but you can't hide: Exposing network location for targeted DoS attacks in cellular networks
-
San Diego, CA, Feb
-
Z. Qian et al., "You can run, but you can't hide: Exposing network location for targeted DoS attacks in cellular networks," in Proc. Network and Distributed System Security Symp. (NDSS'12), San Diego, CA, Feb 2012, pp. 1-16.
-
(2012)
Proc. Network and Distributed System Security Symp. (NDSS'12)
, pp. 1-16
-
-
Qian, Z.1
-
12
-
-
80053141283
-
An untold story of middleboxes in cellular networks
-
Toronto, Canada, Aug
-
Z. Wang et al., "An untold story of middleboxes in cellular networks," in Proc. ACM SIGCOMM, Toronto, Canada, Aug 2011, pp. 374-385.
-
(2011)
Proc. ACM SIGCOMM
, pp. 374-385
-
-
Wang, Z.1
-
13
-
-
84870240986
-
Large scale simulation for human evacuation and rescue
-
E. Gelenbe and F.-J. Wu, "Large scale simulation for human evacuation and rescue," Comput. Math. Appl., vol. 64, no. 12, pp. 3869-3880, 2012.
-
(2012)
Comput. Math. Appl.
, vol.64
, Issue.12
, pp. 3869-3880
-
-
Gelenbe, E.1
Wu, F.-J.2
-
14
-
-
84906998692
-
Understanding smartphone behavior in the network
-
White paper, Jan
-
Nokia Siemens Networks Smart Labs, "Understanding smartphone behavior in the network," White paper, Jan 2011. [Online]. Available: http://www.nokiasiemensnetworks.com/sites/default/files/document/Smart Lab WhitePaper 27012011 low-res.pdf
-
(2011)
Nokia Siemens Networks Smart Labs
-
-
-
15
-
-
84893346474
-
-
Feb
-
GSMA, "Smarter apps for smarter phones!" Feb 2012. [Online]. Available: http://www.gsma.com/technicalprojects/wp-content/uploads/2012/04/ gsmasmarterappsforsmarterphones0112v.0.14.pdf
-
(2012)
Smarter Apps for Smarter Phones!
-
-
-
18
-
-
84906995210
-
-
Rethink Wireless, Jan
-
Rethink Wireless, "DoCoMo demands Google's help with signalling storm," Jan 2012. [Online]. Available: http://www.rethink-wireless.com/ 2012/01/30/docomo-demands-googles-signalling-storm.htm
-
(2012)
DoCoMo Demands Google's Help with Signalling Storm
-
-
-
20
-
-
84886361448
-
-
Arbor Networks
-
Arbor Networks, "Worldwide infrastructure security report," 2012. [Online]. Available: http://www.arbornetworks.com/research/infrastructure- security-report
-
(2012)
Worldwide Infrastructure Security Report
-
-
-
21
-
-
33845951462
-
On the impact of unwanted traffic onto a 3G network
-
Lyon, France, Jun
-
F. Ricciato, P. Svoboda, E. Hasenleithner, and W. Fleischer, "On the impact of unwanted traffic onto a 3G network," in Proc. 2nd Int. W'shop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06), Lyon, France, Jun 2006, pp. 49-56.
-
(2006)
Proc. 2nd Int. W'Shop Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06)
, pp. 49-56
-
-
Ricciato, F.1
Svoboda, P.2
Hasenleithner, E.3
Fleischer, W.4
-
22
-
-
84907004988
-
-
Kaspersky Lab, Tech. Rep., Feb
-
D. Maslennikov, "Mobile malware evolution: Part 6," Kaspersky Lab, Tech. Rep., Feb 2013. [Online]. Available: http://www.securelist.com/en/ analysis/204792283/Mobile Malware Evolution Part 6
-
(2013)
Mobile Malware Evolution: Part 6
-
-
Maslennikov, D.1
-
23
-
-
34547375875
-
Energy consumption of alwayson applications in WCDMA networks
-
Dublin, Ireland, Apr
-
H. Haverinen, J. Siren, and P. Eronen, "Energy consumption of alwayson applications in WCDMA networks," in Proc. 65th IEEE Vehicular Technology Conf. (VTC'07-Spring), Dublin, Ireland, Apr 2007, pp. 964-968.
-
(2007)
Proc. 65th IEEE Vehicular Technology Conf. (VTC'07-Spring)
, pp. 964-968
-
-
Haverinen, H.1
Siren, J.2
Eronen, P.3
-
24
-
-
59649120644
-
Comparative analysis of energysaving techniques in 3GPP and 3GPP2 systems
-
Jan
-
J.-H. Yeh, J.-C. Chen, and C.-C. Lee, "Comparative analysis of energysaving techniques in 3GPP and 3GPP2 systems," IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 432-448, Jan 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.1
, pp. 432-448
-
-
Yeh, J.-H.1
Chen, J.-C.2
Lee, C.-C.3
-
25
-
-
84892400345
-
Smart-phone energy consumption vs. 3G signaling load: The influence of application traffic patterns
-
Genoa, Italy, Sep
-
C. Schwartz et al., "Smart-phone energy consumption vs. 3G signaling load: The influence of application traffic patterns," in Proc. 24th Tyrrhenian Int. W'shop Digital Communications (TIWDC'13), Genoa, Italy, Sep 2013, pp. 1-6.
-
(2013)
Proc. 24th Tyrrhenian Int. W'Shop Digital Communications (TIWDC'13)
, pp. 1-6
-
-
Schwartz, C.1
-
26
-
-
84899758650
-
Mobile network anomaly detection and mitigation: The NEMESYS approach
-
Paris, France: Springer
-
O. H. Abdelrahman, E. Gelenbe, G. Görbil, and B. Oklander, "Mobile network anomaly detection and mitigation: The NEMESYS approach," in Proc. 28th Int. Symp. Computer and Information Sciences (ISCIS'13), ser. LNEE, vol. 264. Paris, France: Springer, 2013, pp. 429-438.
-
(2013)
Proc. 28th Int. Symp. Computer and Information Sciences (ISCIS'13), Ser. LNEE
, vol.264
, pp. 429-438
-
-
Abdelrahman, O.H.1
Gelenbe, E.2
Görbil, G.3
Oklander, B.4
-
27
-
-
84899707456
-
NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem
-
Springer
-
E. Gelenbe et al., "NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem," in Proc. ISCIS'13, ser. LNEE, vol. 264. Springer, 2013, pp. 369-378.
-
(2013)
Proc. ISCIS'13, Ser. LNEE
, vol.264
, pp. 369-378
-
-
Gelenbe, E.1
-
28
-
-
84875648991
-
-
White paper, Jul
-
GSMA, "Fast dormancy best practises," White paper, Jul 2011. [Online]. Available: http://www.gsma.com/newsroom/ts18-v10-tsg-prd-fast- dormancy-best-practices
-
(2011)
Fast Dormancy Best Practises
-
-
|