{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:17Z","timestamp":1750306937659,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,12]]},"DOI":"10.1145\/2390317.2390325","type":"proceedings-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T16:42:56Z","timestamp":1352306576000},"page":"46-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Attacks and countermeasures in wireless cellular networks"],"prefix":"10.1145","author":[{"given":"Eralda","family":"Caushaj","sequence":"first","affiliation":[{"name":"Oakland University"}]},{"given":"Huirong","family":"Fu","sequence":"additional","affiliation":[{"name":"Oakland University"}]},{"given":"Haissam","family":"Badih","sequence":"additional","affiliation":[{"name":"Oakland University"}]},{"given":"Ishwar","family":"Sethi","sequence":"additional","affiliation":[{"name":"Oakland University"}]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[{"name":"Cleveland State University"}]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Microsoft Tag Mobile statistics and facts {accessed July 13 2012}.  Microsoft Tag Mobile statistics and facts {accessed July 13 2012}."},{"key":"e_1_3_2_1_2_1","unstructured":"Aaron Smith A Look at Internet Use on Mobile Phones PewResearchCenter Publications June 26 2012.  Aaron Smith A Look at Internet Use on Mobile Phones PewResearchCenter Publications June 26 2012."},{"volume-title":"Mobile Commerce Daily","year":"2012","author":"Tode Chantal","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Venkataram Wireless & Mobile N\/W Security. Tata McGraw-Hill Education 2010.  Venkataram Wireless & Mobile N\/W Security. Tata McGraw-Hill Education 2010."},{"key":"e_1_3_2_1_5_1","unstructured":"James F. Kurose and Keith W. Ross Computer Networking A Top-Down Approach Addison Wesley fifth edition 2009.   James F. Kurose and Keith W. Ross Computer Networking A Top-Down Approach Addison Wesley fifth edition 2009."},{"issue":"7","key":"e_1_3_2_1_6_1","volume":"7","author":"Beaubrun Ronald","year":"2007","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"David C. Plummer An Ethernet Address Resolution Protocol or Converting Network Protocol Addresses RFC 826 November 1982.   David C. Plummer An Ethernet Address Resolution Protocol or Converting Network Protocol Addresses RFC 826 November 1982.","DOI":"10.17487\/rfc0826"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"O. Okamoto M. Maruyama and T. Sajima Forwarding Media Access Control (MAC) Frames over Multiple Access Protocol over Synchronous Optical Network\/Synchronous Digital Hierarchy (MAPOS) NTT Laboratories and Sun Microsystems RFC 3422 November 2002.   O. Okamoto M. Maruyama and T. Sajima Forwarding Media Access Control (MAC) Frames over Multiple Access Protocol over Synchronous Optical Network\/Synchronous Digital Hierarchy (MAPOS) NTT Laboratories and Sun Microsystems RFC 3422 November 2002.","DOI":"10.17487\/rfc3422"},{"key":"e_1_3_2_1_10_1","unstructured":"Internet Protocol RFC 791 {accessed June 5 2012}.  Internet Protocol RFC 791 {accessed June 5 2012}."},{"key":"e_1_3_2_1_11_1","first-page":"2275","volume-title":"2000 IEEE International Conference","volume":"3","author":"Lau"},{"key":"e_1_3_2_1_12_1","first-page":"543","volume-title":"Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems","author":"Stephen","year":"2004"},{"key":"e_1_3_2_1_13_1","unstructured":"Thomas Phelps To Root or Not to Root {accessed July 12 2012}.  Thomas Phelps To Root or Not to Root {accessed July 12 2012}."},{"key":"e_1_3_2_1_14_1","unstructured":"Dennis Distler and Joel Esler Performing Egress Filtering SANS Institute InfoSec Reading Room August 19 2008.  Dennis Distler and Joel Esler Performing Egress Filtering SANS Institute InfoSec Reading Room August 19 2008."},{"first-page":"352","volume-title":"Computer Communications and Networks, 2007. ICCCN 2007. Proceedings of 16th International Conference on Digital Object Identifier.","author":"Dai Hui","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"R. Muraleedharan and Lisa Ann Osadciw \"Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System \" SPIE 12 May 2006.  R. Muraleedharan and Lisa Ann Osadciw \"Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System \" SPIE 12 May 2006.","DOI":"10.1117\/12.666330"},{"volume-title":"Cambridge University Press","year":"2005","author":"Peake Tom M.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Kwang-Cheng Chen Ramjee Prasad \"Cognitive Radio Networks\". John Wiley & Sons Jun 30 2009.  Kwang-Cheng Chen Ramjee Prasad \"Cognitive Radio Networks\". John Wiley & Sons Jun 30 2009.","DOI":"10.1002\/9780470742020"},{"key":"e_1_3_2_1_20_1","unstructured":"Mark Lin An Overview of Session Hijacking at the Network and Application Levels SANS Institute InfoSec Reading Room.  Mark Lin An Overview of Session Hijacking at the Network and Application Levels SANS Institute InfoSec Reading Room."},{"key":"e_1_3_2_1_21_1","unstructured":"Ronald L. Rivest The RC5 Encryption Algorithm MIT March 20 1997.  Ronald L. Rivest The RC5 Encryption Algorithm MIT March 20 1997."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(02)00106-1"},{"volume-title":"Microsoft Corporation","year":"2006","author":"Meier J. D.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"e_1_3_2_1_25_1","unstructured":"S. Kent and R. Atkinson Security Architecture for the Internet Protocol {accessed July 25 2012}.  S. Kent and R. Atkinson Security Architecture for the Internet Protocol {accessed July 25 2012}."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"A. Okmianski \"Transmission of Syslog Messages over UDP.\" Cisco Systems Inc. March 2009.  A. Okmianski \"Transmission of Syslog Messages over UDP.\" Cisco Systems Inc. March 2009.","DOI":"10.17487\/rfc5426"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Fenton J. \"Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)\" Cisco Systems Inc. September 2006.  Fenton J. \"Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)\" Cisco Systems Inc. September 2006.","DOI":"10.17487\/rfc4686"}],"event":{"name":"InfoSecCD'12: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD'12"},"container-title":["Proceedings of the 2012 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2390317.2390325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:46Z","timestamp":1750235746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390317.2390325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":26,"alternative-id":["10.1145\/2390317.2390325","10.1145\/2390317"],"URL":"https:\/\/doi.org\/10.1145\/2390317.2390325","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"2012-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}