{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:21:02Z","timestamp":1742916062851,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319226347"},{"type":"electronic","value":"9783319226354"}],"license":[{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-22635-4_9","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T14:44:03Z","timestamp":1438613043000},"page":"105-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Bandwidth Usage\u2014Based Detection of Signaling Attacks"],"prefix":"10.1007","author":[{"given":"Mihajlo","family":"Pavloski","sequence":"first","affiliation":[]},{"given":"G\u00f6k\u00e7e","family":"G\u00f6rbil","sequence":"additional","affiliation":[]},{"given":"Erol","family":"Gelenbe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"key":"9_CR1","unstructured":"Mobile Cyber Threats. Joint Report. http:\/\/securelist.com\/analysis\/publications\/66978\/mobile-cyber-threats-a-joint-study-by-kaspersky-lab-and-interpol\/ (Oct 2014)"},{"key":"9_CR2","unstructured":"Cisco visual networking index: Global mobile data traffic forecast update, 2014\u20132019. White Paper. http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11-520862.pdf (Feb 2015)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Abdelrahman, O.H., Gelenbe, E.: Signalling storms in 3G mobile networks. In: Proceedings of IEEE International Conference on Communications (ICC\u201914), Communication and Information Systems Security Symposium, pp. 1017\u20131022. Sydney, Australia. http:\/\/dx.doi.org\/10.1109\/ICC.2014.6883453 (2014)","DOI":"10.1109\/ICC.2014.6883453"},{"issue":"5","key":"9_CR4","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1016\/j.comnet.2006.09.009","volume":"51","author":"Erol Gelenbe","year":"2007","unstructured":"Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299\u20131314 (2007). http:\/\/dx.doi.org\/10.1016\/j.comnet.2006.09.009","journal-title":"Computer Networks"},{"key":"9_CR5","unstructured":"Gabriel, C.: DoCoMo demands Google\u2019s help with signalling storm. http:\/\/www.rethink-wireless.com\/2012\/01\/30\/docomo-demands-googles-signalling-storm.htm (Jun 2012)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Gellman, M., Loukas, G.: Defending networks against denial of service attacks. In: Carapezza, E. (ed.) Proceedings of the Conference on Optics\/Photonics in Security and Defence (SPIE), Unmanned\/Unattended Sensors and Sensor Networks, vol. 5611, pp. 233\u2013243. London, UK (October 2004)","DOI":"10.1117\/12.578502"},{"key":"9_CR7","unstructured":"Gelenbe, E., Abdelrahman, O.H.: Time-outs and counters against storms (Aug 2014), unpublished"},{"key":"9_CR8","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/978-3-319-01604-7_36","volume-title":"Information Sciences and Systems 2013","author":"Erol Gelenbe","year":"2013","unstructured":"Gelenbe, E., G\u00f6rbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., Lyberopoulos, G.L.: NEMESYS: enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013\u2014Proceedings of the 28th International Symposium on Computer and Information Sciences, ISCIS 2013, Paris, France, October 28\u201329, 2013. Lecture Notes in Electrical Engineering, vol. 264, pp. 369\u2013378. Springer, New york. http:\/\/dx.doi.org\/10.1007\/978-3-319-01604-7_36 (2013)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., G\u00f6rbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., Lyberopoulos, G.L.: Security for smart mobile networks: The NEMESYS approach. In: 2013 International Conference on Privacy and Security in Mobile Systems, PRISMS 2013, Atlantic City, NJ, USA, June 24\u201327, 2013. pp. 1\u20138. IEEE (2013). http:\/\/dx.doi.org\/10.1109\/PRISMS.2013.6927181","DOI":"10.1109\/PRISMS.2013.6927181"},{"issue":"5","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.comnet.2006.09.009","volume":"51","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299\u20131314 (2007)","journal-title":"Comput. Netw."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Gorbil, G., Abdelrahman, O.H., Gelenbe, E.: Storms in mobile networks. In: Proceedings of the 9th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet\u201914). pp. 119\u2013126. http:\/\/dx.doi.org\/10.1145\/2642687.2642688 (Sep 2014)","DOI":"10.1145\/2642687.2642688"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Gorbil, G., Abdelrahman, O.H., Pavloski, M., Gelenbe, E.: Modeling and analysis of RRC-based signaling storms in 3G networks. IEEE Trans. Emerg. Top. Comput. Spec. Issue Emerg. Top. Cyber Secur. PP(99), 1\u201314 (2015). http:\/\/dx.doi.org\/10.1109\/TETC.2015.2389662","DOI":"10.1109\/TETC.2015.2389662"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Mulliner, C., Seifert, J.P.: Rise of the iBots: owning a telco network. In: Proceedings of 5th International Conference on Malicious and Unwanted Software (MALWARE\u201910). pp. 71\u201380 (Oct 2010)","DOI":"10.1109\/MALWARE.2010.5665790"},{"key":"9_CR14","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/978-3-319-09465-6_17","volume-title":"Information Sciences and Systems 2014","author":"Mihajlo Pavloski","year":"2014","unstructured":"Pavloski, M., Gelenbe, E.: Mitigating for signalling attacks in UMTS networks. In: Czachrski, T., Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2014, pp. 159\u2013165. Springer International Publishing, New York. http:\/\/dx.doi.org\/10.1007\/978-3-319-09465-6_17 (2014)"},{"key":"9_CR15","unstructured":"Ramachandran, S.: Web metrics: Size and number of resources. https:\/\/developers.google.com\/speed\/articles\/web-metrics (May 2010)"},{"key":"9_CR16","unstructured":"Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: Proc. 1st Inter. Conf. on Simulation Tools and Techniques for Communications, Networks and Systems W\u2019shops (Simutools\u201908). pp. 60:1\u201360:10 (Mar 2008)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Sciences and Systems 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22635-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T21:27:30Z","timestamp":1674250050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22635-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,4]]},"ISBN":["9783319226347","9783319226354"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22635-4_9","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015,8,4]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}