{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T20:35:45Z","timestamp":1723322145459},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465568","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T08:29:54Z","timestamp":1362126594000},"source":"Crossref","is-referenced-by-count":21,"title":["Detecting MS initiated signaling DDoS attacks in 3G\/4G wireless networks"],"prefix":"10.1109","author":[{"given":"Aman","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Tanmay","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Soshant","family":"Bali","sequence":"additional","affiliation":[]},{"given":"Sanjit","family":"Kaul","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665790"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.008"},{"key":"12","year":"0","journal-title":"Tellabs Smartcore 9100 WIMAX Gateway"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.015"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"Anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"Proc Recent Advances in Intrusion Detection (RAID 2001)"},{"key":"1","article-title":"On the detection of signaling DOS attacks on 3G wireless networks","author":"patrick","year":"2007","journal-title":"IEEE INFOCOM"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161304"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"key":"6","article-title":"You can run but you cant hide: Exposing network location for targeted DoS attacks in cellular networks","author":"qian","year":"2012","journal-title":"Proc 10th Ann Network and Distributed System Security Symp (NDSS)"},{"key":"5","article-title":"Defending against DoS attacks on 3G cellular networks via randomization method","author":"wu","year":"0","journal-title":"20IO International Coriference on Educational and Information Technology (ICEIT 2010"},{"key":"4","author":"traynor","year":"2009","journal-title":"On Cellular Botnets Measuring the Impact of Malicious Devices on A Cellular Network Core CCS09"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"8","first-page":"1519","article-title":"An untold story of middleboxes in cellular networks","author":"wang","year":"2011","journal-title":"SIGCOMM"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2013,1,7]]},"end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465568.pdf?arnumber=6465568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:29:52Z","timestamp":1498019392000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6465568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465568","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}