Unveiling the hidden dangers of public IP addresses in 4G/LTE cellular data networks
暂无分享,去创建一个
[1] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[2] Feng Qian,et al. A close examination of performance and power characteristics of 4G LTE networks , 2012, MobiSys '12.
[3] R. Gupta,et al. Protection from paging and signaling attack in 3G CDMA networks , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).
[4] Songwu Lu,et al. Can we pay for what we get in 3G data access? , 2012, Mobicom '12.
[5] Yin Xu,et al. An End-to-End Measurement Study of Modern Cellular Data Networks , 2014, PAM.
[6] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.
[7] Hao Chen,et al. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.
[8] Darren Mcqueen. The momentum behind LTE adoption [sGPP LTE] , 2009, IEEE Communications Magazine.
[9] Yongdae Kim,et al. Towards accurate accounting of cellular data for TCP retransmission , 2013, HotMobile '13.
[10] Ayman I. Kayssi,et al. Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.
[11] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[12] Fabio Ricciato,et al. A review of DoS attack models for 3G cellular networks from a system-design perspective , 2010, Comput. Commun..
[13] Jukka K. Nurminen,et al. The Effect of Unwanted Internet Traffic on Cellular Phone Energy Consumption , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[14] Feng Qian,et al. An in-depth study of LTE: effect of network protocol and application behavior on performance , 2013, SIGCOMM.
[15] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[16] Roger Piqueras Jover,et al. Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[17] Wan S. Yi,et al. A Practical Attack on Mobile Data Network Using IP Spoofing , 2013 .