{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:46:27Z","timestamp":1725680787981},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300448"},{"type":"electronic","value":"9783642300455"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30045-5_24","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T04:33:29Z","timestamp":1337056409000},"page":"318-330","source":"Crossref","is-referenced-by-count":11,"title":["A Panoramic View of 3G Data\/Control-Plane Traffic: Mobile Device Perspective"],"prefix":"10.1007","author":[{"given":"Xiuqiang","family":"He","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lujia","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cheng","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John C. S.","family":"Lui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Cisco. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010\u20132015 (February 2011)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"D\u2019Alconzo, A., Coluccia, A., Ricciato, F., Romirer-Maierhofer, P.: A Distribution-Based Approach to Anomaly Detection for 3G Mobile Networks. In: IEEE Globecom (2009)","DOI":"10.1109\/GLOCOM.2009.5425651"},{"key":"24_CR3","unstructured":"DARWIN, \n                    \n                      http:\/\/userver.ftw.at\/~ricciato\/darwin\/"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J. Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM\u00a051, 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"24_CR5","unstructured":"Dreger, H., Feldmann, A., Mai, M., Paxson, V., Sommer, R.: Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In: Proc. of USENIX Security Symp. (2006)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Falaki, H., Lymberopoulos, D., Mahajan, R., Kandula, S., Estrin, D.: A First Look at Traffic on Smartphones. In: Proc. of ACM IMC (November 2010)","DOI":"10.1145\/1879141.1879176"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in Smartphone Usage. In: Proc. of ACM MobiSys (June 2010)","DOI":"10.1145\/1814433.1814453"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-19260-9_18","volume-title":"Passive and Active Measurement","author":"A. Gember","year":"2011","unstructured":"Gember, A., Anand, A., Akella, A.: A Comparative Study of Handheld and Non-handheld Traffic in Campus Wi-Fi Networks. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol.\u00a06579, pp. 173\u2013183. Springer, Heidelberg (2011)"},{"key":"24_CR9","unstructured":"Hadoop, \n                    \n                      http:\/\/hadoop.apache.org\/"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Huang, J., Xu, Q., Tiwana, B., Mao, Z.M., Zhang, M., Bahl, P.: Anatomizing Application Performance Differences on Smartphones. In: Proc. of ACM MobiSys (2010)","DOI":"10.1145\/1814433.1814452"},{"key":"24_CR11","unstructured":"Huawei. MSCG hierarchical DPI solution (2011), \n                    \n                      http:\/\/www.huawei.com\/products\/datacomm\/catalog.do?id=1219"},{"key":"24_CR12","unstructured":"IDC. Worldwide Smartphone Market Expected to Grow 55% in 2011 and Approach Shipments of One Billion in 2015, According to IDC (June 2011), \n                    \n                      http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS22871611"},{"key":"24_CR13","unstructured":"IMEI lookup, \n                    \n                      http:\/\/imei-number.com\/imei-lookup\/"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1007\/11753810_105","volume-title":"NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems","author":"J. Kilpi","year":"2006","unstructured":"Kilpi, J., Lassila, P.E.: Micro- and Macroscopic Analysis of RTT Variability in GPRS and UMTS Networks. In: Boavida, F., Plagemann, T., Stiller, B., Westphal, C., Monteiro, E. (eds.) NETWORKING 2006. LNCS, vol.\u00a03976, pp. 1176\u20131181. Springer, Heidelberg (2006)"},{"key":"24_CR15","unstructured":"Kingsley-Hughes, A.: iOS 4.2 Supports Network Controlled Fast Dormancy (December 2010), \n                    \n                      http:\/\/www.zdnet.com\/blog\/hardware\/ios-42-supports-network-controlled-fast-dormancy\/10586"},{"issue":"15","key":"24_CR16","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1016\/j.comnet.2009.05.008","volume":"53","author":"P.P.C. Lee","year":"2009","unstructured":"Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G\/WiMax wireless networks. Computer Networks\u00a053(15), 2601\u20132616 (2009)","journal-title":"Computer Networks"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-12334-4_17","volume-title":"Passive and Active Measurement","author":"G. Maier","year":"2010","unstructured":"Maier, G., Schneider, F., Feldmann, A.: A First Look at Mobile Hand-Held Device Traffic. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol.\u00a06032, pp. 161\u2013170. Springer, Heidelberg (2010)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Paul, U., Subramanian, A.P., Buddhikot, M.M., Das, S.R.: Understanding Traffic Dynamics in Cellular Data Networks. In: Proc. of IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935313"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Qian, F., Wang, Z., Gerber, A., Mao, Z.M., Sen, S., Spatscheck, O.: Characterizing Radio Resource Allocation for 3G Networks. In: Proc. of ACM IMC (2010)","DOI":"10.1145\/1879141.1879159"},{"key":"24_CR20","unstructured":"radiorraiders, \n                    \n                      http:\/\/www.radioraiders.com\/gsm-IMEI-TAC.php\/"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Ricciato, F., Vacirca, F., Karner, M.: Bottleneck detection in UMTS via TCP passive monitoring: a real case. In: Proc. of ACM CoNEXT (October 2005)","DOI":"10.1145\/1095921.1095949"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Ridoux, J., Nucci, A., Veitch, D.: Seeing the difference in IP traffic: wireless versus wireline. In: Proc. of IEEE INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.292"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Q., Erman, J., Gerber, A., Mao, Z.M., Pang, J., Venkataraman, S.: Identifying Diverse Usage Behaviors of Smartphone Apps. In: Proc. of ACM IMC (November 2011)","DOI":"10.1145\/2068816.2068847"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30045-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:40:43Z","timestamp":1558312843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30045-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300448","9783642300455"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30045-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}