Feasibility of Signaling Storms in 3G/UMTS Operational Networks
暂无分享,去创建一个
[1] Ming Zhang,et al. You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks , 2012, NDSS.
[2] Tobias Hoßfeld,et al. Angry Apps: The Impact of Network Timer Selection on Power Consumption, Signalling Load, and Web QoE , 2013, J. Comput. Networks Commun..
[3] Sanjit Krishnan Kaul,et al. Android phone based appraisal of app behavior on cell networks , 2014, MOBILESoft 2014.
[4] Pasi Eronen,et al. Energy Consumption of Always-On Applications in WCDMA Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[5] Gennaro Boggia,et al. Discovering Parameter Setting in 3G Networks via Active Measurements , 2008, IEEE Communications Letters.
[6] Hung-Yu Wei,et al. Lte-advanced and 4g Wireless Communications: Part 2 Overload Control for Machine-type-communications in Lte-advanced System Rach Procedure Signaling Flow Ue Behaviors Ran Overload Control Method , 2022 .
[7] Erol Gelenbe,et al. Storms in mobile networks , 2014, Q2SWinet '14.
[8] Erol Gelenbe,et al. Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks , 2016, IEEE Transactions on Emerging Topics in Computing.
[9] Erol Gelenbe,et al. Impact of Signaling Storms on Energy Consumption and Latency of LTE User Equipment , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[10] Erol Gelenbe,et al. Signalling storms in 3G mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[11] Dimitrios Tzovaras,et al. Security for smart mobile networks: The NEMESYS approach , 2013, 2013 IEEE Global High Tech Congress on Electronics.
[12] Feng Qian,et al. Profiling resource usage for mobile applications: a cross-layer approach , 2011, MobiSys '11.
[13] Erol Gelenbe,et al. Time-Outs and Counters Against Storms , 2014 .
[14] Erol Gelenbe,et al. Signaling attacks in mobile telephony , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).
[15] Erol Gelenbe,et al. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.
[16] Feng Qian,et al. Characterizing radio resource allocation for 3G networks , 2010, IMC '10.