메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1017-1022

Signalling storms in 3G mobile networks

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIORAL RESEARCH; MARKOV PROCESSES; MATHEMATICAL MODELS; WIRELESS NETWORKS;

EID: 84907001513     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2014.6883453     Document Type: Conference Paper
Times cited : (38)

References (28)
  • 3
    • 68449104742 scopus 로고    scopus 로고
    • On the detection of signaling DoS attacks on 3G/WiMax wireless networks
    • Oct
    • P. P. C. Lee, T. Bu, and T. Woo, "On the detection of signaling DoS attacks on 3G/WiMax wireless networks," Comput. Netw., vol. 53, no. 15, pp. 2601-2616, Oct 2009.
    • (2009) Comput. Netw. , vol.53 , Issue.15 , pp. 2601-2616
    • Lee, P.P.C.1    Bu, T.2    Woo, T.3
  • 4
    • 74849109011 scopus 로고    scopus 로고
    • A review of DoS attack models for 3G cellular networks from a system-design perspective
    • Mar
    • F. Ricciato, A. Coluccia, and A. D'Alconzo, "A review of DoS attack models for 3G cellular networks from a system-design perspective," Comput. Commun., vol. 33, no. 5, pp. 551-558, Mar 2010.
    • (2010) Comput. Commun. , vol.33 , Issue.5 , pp. 551-558
    • Ricciato, F.1    Coluccia, A.2    D'Alconzo, A.3
  • 5
    • 33846199593 scopus 로고    scopus 로고
    • A self-aware approach to denial of service defence
    • Apr
    • E. Gelenbe and G. Loukas, "A self-aware approach to denial of service defence," Comput. Netw., vol. 51, no. 5, pp. 1299-1314, Apr 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.5 , pp. 1299-1314
    • Gelenbe, E.1    Loukas, G.2
  • 6
    • 67650079730 scopus 로고    scopus 로고
    • Steps towards self-aware networks
    • Jul
    • E. Gelenbe, "Steps towards self-aware networks," Commun. ACM, vol. 52, no. 7, pp. 66-75, Jul 2009.
    • (2009) Commun. ACM , vol.52 , Issue.7 , pp. 66-75
    • Gelenbe, E.1
  • 7
    • 36749023984 scopus 로고    scopus 로고
    • Dealing with software viruses: A biological paradigm
    • Sep
    • -, "Dealing with software viruses: A biological paradigm," Inf. Secur. Tech. Rep., vol. 12, no. 4, pp. 242-250, Sep 2007.
    • (2007) Inf. Secur. Tech. Rep. , vol.12 , Issue.4 , pp. 242-250
    • Gelenbe, E.1
  • 8
    • 84864669613 scopus 로고    scopus 로고
    • Packet delay and energy consumption in non-homogeneous networks
    • Aug
    • O. H. Abdelrahman and E. Gelenbe, "Packet delay and energy consumption in non-homogeneous networks," Comput. J., vol. 55, no. 8, pp. 950-964, Aug 2012.
    • (2012) Comput. J. , vol.55 , Issue.8 , pp. 950-964
    • Abdelrahman, O.H.1    Gelenbe, E.2
  • 9
    • 54949100002 scopus 로고    scopus 로고
    • Discovering parameter setting in 3G networks via active measurements
    • Oct
    • A. Barbuzzi, F. Ricciato, and G. Boggia, "Discovering parameter setting in 3G networks via active measurements," IEEE Commun. Lett., vol. 12, no. 10, pp. 730-732, Oct 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 730-732
    • Barbuzzi, A.1    Ricciato, F.2    Boggia, G.3
  • 10
    • 78650860703 scopus 로고    scopus 로고
    • Characterizing radio resource allocation for 3G networks
    • Melbourne, Australia, Nov
    • F. Qian et al., "Characterizing radio resource allocation for 3G networks," in Proc. 10th Internet Measurement Conf. (IMC'10), Melbourne, Australia, Nov 2010, pp. 137-150.
    • (2010) Proc. 10th Internet Measurement Conf. (IMC'10) , pp. 137-150
    • Qian, F.1
  • 11
    • 85180802643 scopus 로고    scopus 로고
    • You can run, but you can't hide: Exposing network location for targeted DoS attacks in cellular networks
    • San Diego, CA, Feb
    • Z. Qian et al., "You can run, but you can't hide: Exposing network location for targeted DoS attacks in cellular networks," in Proc. Network and Distributed System Security Symp. (NDSS'12), San Diego, CA, Feb 2012, pp. 1-16.
    • (2012) Proc. Network and Distributed System Security Symp. (NDSS'12) , pp. 1-16
    • Qian, Z.1
  • 12
    • 80053141283 scopus 로고    scopus 로고
    • An untold story of middleboxes in cellular networks
    • Toronto, Canada, Aug
    • Z. Wang et al., "An untold story of middleboxes in cellular networks," in Proc. ACM SIGCOMM, Toronto, Canada, Aug 2011, pp. 374-385.
    • (2011) Proc. ACM SIGCOMM , pp. 374-385
    • Wang, Z.1
  • 13
    • 84870240986 scopus 로고    scopus 로고
    • Large scale simulation for human evacuation and rescue
    • E. Gelenbe and F.-J. Wu, "Large scale simulation for human evacuation and rescue," Comput. Math. Appl., vol. 64, no. 12, pp. 3869-3880, 2012.
    • (2012) Comput. Math. Appl. , vol.64 , Issue.12 , pp. 3869-3880
    • Gelenbe, E.1    Wu, F.-J.2
  • 14
    • 84906998692 scopus 로고    scopus 로고
    • Understanding smartphone behavior in the network
    • White paper, Jan
    • Nokia Siemens Networks Smart Labs, "Understanding smartphone behavior in the network," White paper, Jan 2011. [Online]. Available: http://www.nokiasiemensnetworks.com/sites/default/files/document/Smart Lab WhitePaper 27012011 low-res.pdf
    • (2011) Nokia Siemens Networks Smart Labs
  • 15
    • 84893346474 scopus 로고    scopus 로고
    • Feb
    • GSMA, "Smarter apps for smarter phones!" Feb 2012. [Online]. Available: http://www.gsma.com/technicalprojects/wp-content/uploads/2012/04/ gsmasmarterappsforsmarterphones0112v.0.14.pdf
    • (2012) Smarter Apps for Smarter Phones!
  • 18
    • 84906995210 scopus 로고    scopus 로고
    • Rethink Wireless, Jan
    • Rethink Wireless, "DoCoMo demands Google's help with signalling storm," Jan 2012. [Online]. Available: http://www.rethink-wireless.com/ 2012/01/30/docomo-demands-googles-signalling-storm.htm
    • (2012) DoCoMo Demands Google's Help with Signalling Storm
  • 20
    • 84886361448 scopus 로고    scopus 로고
    • Arbor Networks
    • Arbor Networks, "Worldwide infrastructure security report," 2012. [Online]. Available: http://www.arbornetworks.com/research/infrastructure- security-report
    • (2012) Worldwide Infrastructure Security Report
  • 22
    • 84907004988 scopus 로고    scopus 로고
    • Kaspersky Lab, Tech. Rep., Feb
    • D. Maslennikov, "Mobile malware evolution: Part 6," Kaspersky Lab, Tech. Rep., Feb 2013. [Online]. Available: http://www.securelist.com/en/ analysis/204792283/Mobile Malware Evolution Part 6
    • (2013) Mobile Malware Evolution: Part 6
    • Maslennikov, D.1
  • 24
    • 59649120644 scopus 로고    scopus 로고
    • Comparative analysis of energysaving techniques in 3GPP and 3GPP2 systems
    • Jan
    • J.-H. Yeh, J.-C. Chen, and C.-C. Lee, "Comparative analysis of energysaving techniques in 3GPP and 3GPP2 systems," IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 432-448, Jan 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.1 , pp. 432-448
    • Yeh, J.-H.1    Chen, J.-C.2    Lee, C.-C.3
  • 25
    • 84892400345 scopus 로고    scopus 로고
    • Smart-phone energy consumption vs. 3G signaling load: The influence of application traffic patterns
    • Genoa, Italy, Sep
    • C. Schwartz et al., "Smart-phone energy consumption vs. 3G signaling load: The influence of application traffic patterns," in Proc. 24th Tyrrhenian Int. W'shop Digital Communications (TIWDC'13), Genoa, Italy, Sep 2013, pp. 1-6.
    • (2013) Proc. 24th Tyrrhenian Int. W'Shop Digital Communications (TIWDC'13) , pp. 1-6
    • Schwartz, C.1
  • 27
    • 84899707456 scopus 로고    scopus 로고
    • NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem
    • Springer
    • E. Gelenbe et al., "NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem," in Proc. ISCIS'13, ser. LNEE, vol. 264. Springer, 2013, pp. 369-378.
    • (2013) Proc. ISCIS'13, Ser. LNEE , vol.264 , pp. 369-378
    • Gelenbe, E.1
  • 28
    • 84875648991 scopus 로고    scopus 로고
    • White paper, Jul
    • GSMA, "Fast dormancy best practises," White paper, Jul 2011. [Online]. Available: http://www.gsma.com/newsroom/ts18-v10-tsg-prd-fast- dormancy-best-practices
    • (2011) Fast Dormancy Best Practises


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.