{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:11:08Z","timestamp":1729678268662,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6363738","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:17:44Z","timestamp":1354580264000},"page":"960-965","source":"Crossref","is-referenced-by-count":3,"title":["How an SMS-based malware infection will get throttled by the wireless link"],"prefix":"10.1109","author":[{"given":"Ilona","family":"Murynets","sequence":"first","affiliation":[]},{"given":"Roger Piqueras","family":"Jover","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(09)60489-1"},{"key":"17","article-title":"Computer virus propagation models","author":"serazzi","year":"2003","journal-title":"Tutorials of the 11th IEEE\/ACM International Symposium on Modeling Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS03)"},{"journal-title":"15 Years of Text Messages A 'Cultural Phenomenon","year":"2007","author":"shannon","key":"18"},{"journal-title":"Google Removes 21 Malware Apps from Android Market","year":"2011","author":"pachal","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359550"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"journal-title":"Technical Report Technical Information Bulletin 03-2 NCS TIB 03-2","article-title":"SMS over SS7","year":"2003","key":"14"},{"key":"11","first-page":"509","article-title":"Emergence of scaling in random networks","volume":"286","year":"1999","journal-title":"Pervasive Computing IEEE"},{"journal-title":"Pirated Android App Uses Shame As Tool","year":"2011","author":"li","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.120"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.13"},{"key":"22","doi-asserted-by":"crossref","first-page":"713","DOI":"10.3233\/JCS-2007-0308","article-title":"Exploiting open functionality in sms-capable cellular networks","volume":"16","author":"traynor","year":"2008","journal-title":"J Comput Secur"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"key":"24","first-page":"1","article-title":"On attack causality in internet-connected cellular networks","volume":"21","author":"traynor","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"journal-title":"State & County QuickFacts","year":"2009","key":"25"},{"journal-title":"Medium Access Control (MAC) Protocol Specification 3GPP TS 25 231 Version 3 17 0 Release 1999 v8 9 0","year":"1999","key":"26"},{"journal-title":"Physical Layer Procedures (FDD) 3GPP TS 25 214 Version 3 17 0 Release 1999 v8 9 0","year":"1999","key":"27"},{"journal-title":"Physical Channels and Mapping of Transport Channels onto Physical Channels (FDD) 3GPP TS 25 211 Version 3 12 0 Release 1999 v3 12 0","year":"2002","key":"28"},{"journal-title":"Radio Resource Control (RRC) Protocol Specification 3GPP TS 25 331 Version 9 5 0 Release 9 v8 9 0","year":"2011","key":"29"},{"journal-title":"The Mathematical Theory of Infectious Diseases and Its Applications","year":"1975","author":"bailey","key":"3"},{"journal-title":"More Than 50 Android Apps Found Infected with Rootkit Malware","year":"2011","author":"arthur","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2003.1259207"},{"journal-title":"Technical Report 3GPP Ts 05 01 v8 9 0","article-title":"Physical layer on the radio path: General description","year":"1999","key":"1"},{"key":"30","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1145\/1966913.1966939","article-title":"Malware propagation in online social networks: Nature, dynamics, and defense implications","author":"yan","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ASIACCS '11"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.21"},{"journal-title":"Wireless Quick Facts","year":"2010","key":"6"},{"key":"5","article-title":"A silent SMS denial of service (DoS) attack","author":"croft","year":"2007","journal-title":"Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007) Proceedings"},{"journal-title":"Apple Patches IPhone SMS Security Hole with Software Update","year":"2009","author":"chen","key":"4"},{"key":"9","first-page":"7","article-title":"Why mobile-to-mobile wireless malware won't cause a storm","author":"husted","year":"2011","journal-title":"Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats LEET'11"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314402"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06363738.pdf?arnumber=6363738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T09:53:06Z","timestamp":1562406786000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6363738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6363738","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}