{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:04:59Z","timestamp":1757779499433,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T00:00:00Z","timestamp":1351036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,24]]},"DOI":"10.1145\/2386995.2387024","type":"proceedings-article","created":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T18:44:56Z","timestamp":1351104296000},"page":"153-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Signaling oriented denial of service on LTE networks"],"prefix":"10.1145","author":[{"given":"Ramzi","family":"Bassil","sequence":"first","affiliation":[{"name":"American University of Beirut, Beirut, Lebanon"}]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[{"name":"American University of Beirut, Beirut, Lebanon"}]},{"given":"Imad","family":"Elhajj","sequence":"additional","affiliation":[{"name":"American University of Beirut, Beirut, Lebanon"}]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[{"name":"American University of Beirut, Beirut, Lebanon"}]}],"member":"320","published-online":{"date-parts":[[2012,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Guining Geng; Guoai Xu; Miao Zhang; Yixian Yang; Guang Yang \"An improved SMS based heterogeneous mobile botnet model \" 2011 IEEE International Conference on Information and Automation (ICIA) pp.198--202 6--8 June 2011.  Guining Geng; Guoai Xu; Miao Zhang; Yixian Yang; Guang Yang \"An improved SMS based heterogeneous mobile botnet model \" 2011 IEEE International Conference on Information and Automation (ICIA) pp.198--202 6--8 June 2011.","DOI":"10.1109\/ICINFA.2011.5948987"},{"key":"e_1_3_2_1_3_1","first-page":"71","article-title":"Rise of the iBots: Owning a telco network","author":"Mulliner C.","year":"2010","unstructured":"Mulliner , C. ; Seifert , J.-P. , \" Rise of the iBots: Owning a telco network ,\" 5th International Conference on Malicious and Unwanted Software (MALWARE) , pp. 71 -- 80 , 19--20 Oct. 2010 . Mulliner, C.; Seifert, J.-P., \"Rise of the iBots: Owning a telco network,\" 5th International Conference on Malicious and Unwanted Software (MALWARE), pp.71--80, 19--20 Oct. 2010.","journal-title":"5th International Conference on Malicious and Unwanted Software (MALWARE)"},{"key":"e_1_3_2_1_4_1","first-page":"37","volume-title":"Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009","author":"Ruste Flo A.","year":"2009","unstructured":"Ruste Flo A. ; Josang A. , \" Consequences of Botnets Spreading to Mobile Devices\" , Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009 ), pp. 37 -- 43 , Oslo , October 2009 . Ruste Flo A.; Josang A., \"Consequences of Botnets Spreading to Mobile Devices\", Proceedings of the 14th Nordic Conference on Secure IT Systems (NordSec 2009), pp. 37--43, Oslo, October 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925939"},{"key":"e_1_3_2_1_6_1","volume-title":"Wiley Online Library","author":"Traynor P.","year":"2010","unstructured":"Traynor P. ; Amrutkar C. ; Rao V. ; Jaeger T. ; McDaniel P. ; La Porta T. , \" From mobile phones to responsible devices,\" Security and Communication Networks , Wiley Online Library , 2010 . Traynor P.; Amrutkar C.; Rao V.; Jaeger T.; McDaniel P.; La Porta T., \"From mobile phones to responsible devices,\" Security and Communication Networks, Wiley Online Library, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_29"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"IEEE Global Telecommunications Conference, 2009. GLOBECOM 2009.","author":"D'Alconzo A.","year":"2009","unstructured":"D'Alconzo , A. ; Coluccia , A. ; Ricciato , F. ; Romirer-Maierhofer , P. , \"A Distribution-Based Approach to Anomaly Detection and Application to 3 G Mobile Traffic ,\" IEEE Global Telecommunications Conference, 2009. GLOBECOM 2009. pp. 1 -- 8 , Nov. 30 2009 -Dec. 4 2009. D'Alconzo, A.; Coluccia, A.; Ricciato, F.; Romirer-Maierhofer, P., \"A Distribution-Based Approach to Anomaly Detection and Application to 3G Mobile Traffic,\" IEEE Global Telecommunications Conference, 2009. GLOBECOM 2009. pp.1--8, Nov. 30 2009-Dec. 4 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"key":"e_1_3_2_1_11_1","unstructured":"Santosh Kumar Dornal \"LTE Whitepaper\" available at http:\/\/wirednwireless.blogspot.com  Santosh Kumar Dornal \"LTE Whitepaper\" available at http:\/\/wirednwireless.blogspot.com"},{"key":"e_1_3_2_1_12_1","volume-title":"Lte-Advanced and Wimax: Towards Imt-Advanced Networks","author":"Najah Abu Ali M.","year":"2012","unstructured":"Najah Abu Ali ; Abd-Elhamid M. Taha ; Hossam S. Hassanein , Lte , Lte-Advanced and Wimax: Towards Imt-Advanced Networks , Wiley , 2012 . Najah Abu Ali; Abd-Elhamid M. Taha; Hossam S. Hassanein, Lte, Lte-Advanced and Wimax: Towards Imt-Advanced Networks, Wiley, 2012."},{"key":"e_1_3_2_1_13_1","unstructured":"Tom Nolle; \"4G LTE wireless transition: Examining the services advantages\" available at http:\/\/searchtelecom.techtarget.com\/tip\/4G-LTE-wireless-transition-Examining-the-services-advantages.  Tom Nolle; \"4G LTE wireless transition: Examining the services advantages\" available at http:\/\/searchtelecom.techtarget.com\/tip\/4G-LTE-wireless-transition-Examining-the-services-advantages."},{"key":"e_1_3_2_1_14_1","unstructured":"OPNET Technologies Inc. http:\/\/www.opnet.com.  OPNET Technologies Inc. http:\/\/www.opnet.com."}],"event":{"name":"MSWiM '12: The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Paphos Cyprus","acronym":"MSWiM '12"},"container-title":["Proceedings of the 10th ACM international symposium on Mobility management and wireless access"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2386995.2387024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2386995.2387024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:02Z","timestamp":1750239242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2386995.2387024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,24]]},"references-count":14,"alternative-id":["10.1145\/2386995.2387024","10.1145\/2386995"],"URL":"https:\/\/doi.org\/10.1145\/2386995.2387024","relation":{},"subject":[],"published":{"date-parts":[[2012,10,24]]},"assertion":[{"value":"2012-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}