DDoS Attacks in Experimental LTE Networks
暂无分享,去创建一个
[1] Aman Gupta,et al. Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[2] Ghizlane Orhanou,et al. Attacks on Android banking applications , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[3] Georges Kaddoum,et al. Survey on Threats and Attacks on Mobile Networks , 2016, IEEE Access.
[4] Roger Piqueras Jover,et al. Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[5] Thorsten Holz,et al. Breaking LTE on Layer Two , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[6] Roger Piqueras Jover,et al. LTE security, protocol exploits and location tracking experimentation with low-cost software radio , 2016, ArXiv.
[7] Jinsung Lee,et al. This is Your President Speaking: Spoofing Alerts in 4G LTE Networks , 2019, MobiSys.
[8] Terry Boult,et al. Critical security review and study of DDoS attacks on LTE mobile network , 2014, 2014 IEEE Asia Pacific Conference on Wireless and Mobile.
[9] Edgar Weippl,et al. On Security Research Towards Future Mobile Network Generations , 2017, IEEE Communications Surveys & Tutorials.
[10] Roger Piqueras Jover,et al. CSAI: Open-Source Cellular Radio Access Network Security Analysis Instrument , 2020, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
[11] Maurizio Aiello,et al. Understanding DDoS Attacks from Mobile Devices , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[12] Wenye Wang,et al. LTE Is Vulnerable: Implementing Identity Spoofing and Denial-of-Service Attacks in LTE Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[13] Wei You,et al. A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security , 2019, IEEE Access.
[14] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[15] Ravishankar Borgaonkar,et al. New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols , 2019, IACR Cryptol. ePrint Arch..
[16] Masood Khosroshahy,et al. Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).
[17] Jean-Pierre Seifert,et al. White-Stingray: Evaluating IMSI Catchers Detection Applications , 2017, WOOT.
[18] Jean-Pierre Seifert,et al. New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities , 2019, WiSec.
[19] Hai Thanh Nguyen,et al. A Network Based IMSI Catcher Detection , 2016, 2016 6th International Conference on IT Convergence and Security (ICITCS).
[20] Jean-Pierre Seifert,et al. On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks , 2018, WISEC.
[21] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[22] Shin-Ming Cheng,et al. Toward Large-Scale Rogue Base Station Attacks Using Container-Based Virtualization , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).