{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:01:37Z","timestamp":1730232097005,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883435","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"907-913","source":"Crossref","is-referenced-by-count":3,"title":["Firecycle: A scalable test bed for large-scale LTE security research"],"prefix":"10.1109","author":[{"given":"Jill","family":"Jermyn","sequence":"first","affiliation":[]},{"given":"Roger Piqueras","family":"Jover","sequence":"additional","affiliation":[]},{"given":"Mikhail","family":"Istomin","sequence":"additional","affiliation":[]},{"given":"Ilona","family":"Murynets","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665790"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161304"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.010"},{"key":"15","article-title":"The Android im app that brought T-Mobile's network to its knees","author":"dano","year":"2010","journal-title":"Fierce Wireless"},{"key":"16","article-title":"DoCoMo demands Google's help with signalling storm","author":"gabriel","year":"2012","journal-title":"Rethink Wireless"},{"key":"13","article-title":"Security attacks against the availability of lte mobility networks: Overview and research directions","author":"piqueras jover","year":"2013","journal-title":"IEEE Global Wireless Summit-Wireless Personal Multimedia Communications Symposium (GWS-WPMC)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"journal-title":"Nationwide Public Safety Broadband Network","year":"2012","key":"11"},{"journal-title":"Army Examines Feasibility of Integrating 4G LTE with Tactical Network","year":"2012","author":"thompson","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2386995.2387024"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655108"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2012.6266084"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2091660"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307659"},{"key":"28","first-page":"1","article-title":"An empirical workload model for driving wide-area TCP\/ip network simulations","volume":"3","author":"danzig","year":"1992","journal-title":"Internetworking Research and Experience"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/9780470742891"},{"journal-title":"The Guardian","article-title":"Mobile internet devices will outnumber humans this year","year":"2013","key":"3"},{"journal-title":"More than 50 Billion Connected Devices","year":"2011","key":"2"},{"journal-title":"OPNET System in the Loop","year":"0","key":"10"},{"journal-title":"Global Mobile Statistics","year":"2013","key":"1"},{"volume":"8200","journal-title":"Evolved Universal Terrestrial Radio Access (EUTRA)-Radio Resource Control (RRC)-Protocol Specification","year":"2012","key":"30"},{"journal-title":"McAfee Threats Report Second Quarter","year":"2013","key":"7"},{"key":"6","article-title":"Firm is accused of sending spam, and fight jams internet","author":"markoff","year":"2013","journal-title":"The New York Times"},{"key":"32","volume":"9110","author":"sesia","year":"2012","journal-title":"Evolved Universal Terrestrial Radio Access (E-UTRA)-User Equipment (UE) Procedures in Idle Mode"},{"key":"5","article-title":"Major banks hit with biggest cyberattacks in history","author":"goldman","year":"2012","journal-title":"CNN Money"},{"key":"31","volume":"1140","author":"sesia","year":"2013","journal-title":"Evolved Universal Terrestrial Radio Access Network (EUTRAN) S1 Application Protocol (S1AP)"},{"journal-title":"GSM and 3G Security","year":"2001","author":"gadaix","key":"4"},{"journal-title":"OPNET Modeler","year":"0","key":"9"},{"journal-title":"The OpenBTS Project","year":"0","key":"8"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883435.pdf?arnumber=6883435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T16:52:42Z","timestamp":1496681562000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883435","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}