Discovering Network Control Vulnerabilities and Policies in Evolving Networks
暂无分享,去创建一个
[1] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[2] Richard Clayton,et al. Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.
[3] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[4] Jeffrey Knockel,et al. Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance , 2011, FOCI.
[5] Ayman I. Kayssi,et al. Signaling oriented denial of service on LTE networks , 2012, MobiWac '12.
[6] Minaxi Gupta,et al. Inferring Mechanics of Web Censorship Around the World , 2012, FOCI.
[7] Yasir Zaki,et al. Influence of future M2M communication on the LTE system , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[8] Vern Paxson,et al. SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[9] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[10] Nick Feamster,et al. Examining How the Great Firewall Discovers Hidden Circumvention Servers , 2015, Internet Measurement Conference.
[11] Lusheng Ji,et al. Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic , 2013, IEEE/ACM Transactions on Networking.
[12] Dan S. Wallach,et al. Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations , 2012, FOCI.
[13] Margaret Martonosi,et al. Human mobility modeling at metropolitan scales , 2012, MobiSys '12.
[14] Roger Piqueras Jover,et al. Security attacks against the availability of LTE mobility networks: Overview and research directions , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[15] Deborah Estrin,et al. An Empirical Workload Model for Driving Wide-Area TCP/IP Network Simulations , 2001 .
[16] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[17] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[18] Vern Paxson,et al. Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion , 2013, FOCI.
[19] Georgios Kambourakis,et al. DoS attacks exploiting signaling in UMTS and IMS , 2011, Comput. Commun..
[20] Steven M. Bellovin,et al. "I don't have a photograph, but you can have my footprints.": Revealing the Demographics of Location Data , 2015, ICWSM.
[21] Jiannong Cao,et al. Special issue on the Internet of things , 2015, Pervasive and Mobile Computing.
[22] Masood Khosroshahy,et al. Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface , 2013, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).
[23] Hui Zang,et al. Impact of paging channel overloads or attacks on a cellular network , 2006, WiSe '06.
[24] Patrick P. C. Lee,et al. On the Detection of Signaling DoS Attacks on 3G Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[25] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[26] Terry V. Benzel,et al. The DETER project: Advancing the science of cyber security experimentation and test , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).
[27] Patrick D. McDaniel,et al. On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.
[28] Stefan Lindskog,et al. How China Is Blocking Tor , 2012, ArXiv.
[29] J. Seifert,et al. Rise of the iBots : 0 wning a telco network , 2010 .
[30] Christian Wietfeld,et al. Influence of M2M communication on the physical resource utilization of LTE , 2012, Wireless Telecommunications Symposium 2012.
[31] Zhuoqing Morley Mao,et al. Internet Censorship in China: Where Does the Filtering Occur? , 2011, PAM.
[32] Hao Chen,et al. Exploiting Opportunistic Scheduling in Cellular Data Networks , 2008, NDSS.
[33] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[34] Paul S. Henry,et al. Directions for future cellular mobile network architecture , 2012, First Monday.
[35] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[36] Xin Jin,et al. SoftCell: Taking Control of Cellular Core Networks , 2013, ArXiv.
[37] Giuseppe Piro,et al. Simulating LTE Cellular Systems: An Open-Source Framework , 2011, IEEE Transactions on Vehicular Technology.
[38] Feng Qian,et al. Characterizing radio resource allocation for 3G networks , 2010, IMC '10.
[39] Peter A. Dinda,et al. Characterizing and modeling user activity on smartphones: summary , 2010, SIGMETRICS '10.
[40] Roy T. Fielding,et al. Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing , 2014, RFC.
[41] Boris Nechaev,et al. Netalyzr: illuminating the edge network , 2010, IMC '10.
[42] Manpreet Singh,et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[43] Jian Jiang,et al. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations , 2016, CCS.
[44] Hyoung-Kee Choi,et al. Evaluation of authentication signaling loads in 3GPP LTE/SAE networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.