A Denial of Service Attack to GSM Networks via Attach Procedure
暂无分享,去创建一个
[1] Jemal H. Abawajy. Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings , 2009, ISA.
[2] Georgios Kambourakis,et al. Signaling-Oriented DoS Attacks in UMTS Networks , 2009, ISA.
[3] H. Holma,et al. Connection Setup Delay for Packet Switched Services , 2005 .
[4] Alfredo De Santis,et al. Do You Trust Your Phone? , 2009, EC-Web.
[5] A Min Tjoa,et al. E-Commerce and Web Technologies , 2002, Lecture Notes in Computer Science.
[6] Francesco Palmieri,et al. A botnet-based command and control approach relying on swarm intelligence , 2014, J. Netw. Comput. Appl..
[7] Patrick D. McDaniel,et al. On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.
[8] Alessandro Armando,et al. Breaking and fixing the Android Launching Flow , 2013, Comput. Secur..
[9] Mauro Migliardi,et al. Memory Support Through Pervasive and Mobile Systems , 2014 .
[10] Christopher Kruegel. Proceedings of the 2007 ACM workshop on Recurring malcode , 2007, CCS 2007.
[11] Steven Furnell,et al. Information Security and Privacy Research , 2012, IFIP Advances in Information and Communication Technology.
[12] K.W. Derr,et al. Nightmares with Mobile Devices are Just around the Corner! , 2007, 2007 IEEE International Conference on Portable Information Devices.
[13] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[14] Lorenzo Chiari,et al. Smartphone-based applications for investigating falls and mobility , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[15] Naim Dahnoun,et al. Studies in Computational Intelligence , 2013 .
[16] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[17] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[18] Umberto Ferraro Petrillo,et al. Engineering a secure mobile messaging framework , 2012, Comput. Secur..
[19] Muzammil Khan,et al. Vulnerabilities of UMTS Access Domain Security Architecture , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[20] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[21] Jean-Pierre Seifert,et al. Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[22] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[23] Umberto Ferraro Petrillo,et al. An Extensible Framework for Efficient Secure SMS , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[24] Giuseppe Cattaneo,et al. SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[25] Francesco Vatalaro,et al. Performance evaluation of GSM robustness against smart jamming attacks , 2012, 2012 5th International Symposium on Communications, Control and Signal Processing.
[26] Gunnar Heine,et al. GSM Networks: Protocols, Terminology and Implementation , 1998 .
[27] Alessandro Armando,et al. Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.
[28] Nataraj Kuntagod,et al. Mobile decision support system for outreach health worker , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[29] Umberto Ferraro Petrillo,et al. SPEECH: Secure Personal End-to-End Communication with Handheld , 2006, ISSE.
[30] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[31] Jane W.-S. Liu,et al. Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor , 2009, 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering.
[32] Antti Toskala,et al. Wcdma for Umts , 2002 .
[33] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.