{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T20:24:48Z","timestamp":1725395088113},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccitechnology.2013.6579561","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:36Z","timestamp":1377709896000},"page":"262-268","source":"Crossref","is-referenced-by-count":3,"title":["A resource reservation attack against LTE networks"],"prefix":"10.1109","author":[{"given":"Ramzi","family":"Bassil","sequence":"first","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Digital is calling the analog: Robust prevention of dial attacks","author":"kapravelos","year":"2009","journal-title":"Fourth ICSP"},{"journal-title":"OPNET","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4785383"},{"journal-title":"Fundamentals of LTE","year":"2010","author":"ghosh","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2011.6126684"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/wicom.2011.6036685"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2011.5876467"},{"journal-title":"A Distributed Architecture for Spam Mitigation on 4G Mobile Networks","year":"2011","author":"bou harb","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.710"},{"key":"8","first-page":"1","article-title":"Quality of service management in hybrid optical-LTE access networks","author":"giuntini","year":"2011","journal-title":"2011 Future Network & Mobile Summit FutureNetw"}],"event":{"name":"2013 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2013,6,19]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 Third International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573243\/6579508\/06579561.pdf?arnumber=6579561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:57:15Z","timestamp":1490201835000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iccitechnology.2013.6579561","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}