{"id":"https://openalex.org/W1971573592","doi":"https://doi.org/10.1109/icc.2012.6363738","title":"How an SMS-based malware infection will get throttled by the wireless link","display_name":"How an SMS-based malware infection will get throttled by the wireless link","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W1971573592","doi":"https://doi.org/10.1109/icc.2012.6363738","mag":"1971573592"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2012.6363738","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6363738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028210590","display_name":"Ilona Murynets","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ilona Murynets","raw_affiliation_strings":["Security Research Center, AT and T Services, Inc., New York, NY, USA","AT&T Services Inc., Security Research Center, New York, NY 10007"],"affiliations":[{"raw_affiliation_string":"Security Research Center, AT and T Services, Inc., New York, NY, USA","institution_ids":[]},{"raw_affiliation_string":"AT&T Services Inc., Security Research Center, New York, NY 10007","institution_ids":["https://openalex.org/I1283103587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042587036","display_name":"Roger Piqueras Jover","orcid":"https://orcid.org/0000-0002-1420-2987"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roger Piqueras Jover","raw_affiliation_strings":["Security Research Center, AT and T Services, Inc., New York, NY, USA","AT&T Services Inc., Security Research Center, New York, NY 10007"],"affiliations":[{"raw_affiliation_string":"Security Research Center, AT and T Services, Inc., New York, NY, USA","institution_ids":[]},{"raw_affiliation_string":"AT&T Services Inc., Security Research Center, New York, NY 10007","institution_ids":["https://openalex.org/I1283103587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028210590"],"corresponding_institution_ids":["https://openalex.org/I1283103587"],"apc_list":null,"apc_paid":null,"fwci":1.0638,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76896689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"286","issue":null,"first_page":"960","last_page":"965"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8363357782363892},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.762726902961731},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7462547421455383},{"id":"https://openalex.org/keywords/gsm","display_name":"GSM","score":0.5764966011047363},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5616964101791382},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5016026496887207},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.47117334604263306},{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.45866692066192627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33733612298965454},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18630534410476685},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16777655482292175}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8363357782363892},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762726902961731},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7462547421455383},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.5764966011047363},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5616964101791382},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5016026496887207},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.47117334604263306},{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.45866692066192627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33733612298965454},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18630534410476685},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16777655482292175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2012.6363738","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2012.6363738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W63892623","https://openalex.org/W114870970","https://openalex.org/W1482497150","https://openalex.org/W1545286585","https://openalex.org/W1596254026","https://openalex.org/W1603502149","https://openalex.org/W2008620264","https://openalex.org/W2014199851","https://openalex.org/W2016763420","https://openalex.org/W2034279876","https://openalex.org/W2043370297","https://openalex.org/W2107546826","https://openalex.org/W2113755340","https://openalex.org/W2134006599","https://openalex.org/W2143119964","https://openalex.org/W2156449948","https://openalex.org/W2320448585","https://openalex.org/W6602608203","https://openalex.org/W6628731089","https://openalex.org/W6635964868"],"related_works":["https://openalex.org/W2414437988","https://openalex.org/W2170491095","https://openalex.org/W2607211056","https://openalex.org/W2508311618","https://openalex.org/W1539022699","https://openalex.org/W2992992648","https://openalex.org/W2181649187","https://openalex.org/W2027022047","https://openalex.org/W2955074738","https://openalex.org/W2117719951"],"abstract_inverted_index":{"As":[0],"smart":[1],"phones":[2],"increase":[3],"in":[4,31,51,64,93],"popularity,":[5],"they":[6],"become":[7],"an":[8,27],"attractive":[9],"target":[10],"for":[11,44],"attackers":[12],"and":[13,33,86],"spammers.":[14],"This":[15],"paper":[16,57],"presents":[17],"a":[18,65],"new":[19],"simulation":[20],"model":[21],"that":[22,42,72],"evaluates":[23],"the":[24,38,45,49,61,82,90],"effects":[25],"of":[26,48,53,60,75],"SMS-based":[28],"malware":[29,54,63,77],"infection":[30],"GSM":[32],"UMTS":[34],"networks.":[35,97],"It":[36,70],"is":[37,78],"first":[39],"known":[40],"work":[41],"accounts":[43],"wireless":[46],"link":[47],"network":[50,84],"modeling":[52],"propagation.":[55],"The":[56],"demonstrates":[58],"propagation":[59],"SMS-transmitted":[62],"densely":[66],"populated":[67],"metropolitan":[68],"area.":[69],"shows":[71],"spreading":[73],"rate":[74],"cellular":[76],"tightly":[79],"bounded":[80],"by":[81],"actual":[83],"architecture":[85],"strongly":[87],"diverges":[88],"from":[89],"pattern":[91],"seen":[92],"regular":[94],"wired":[95],"Internet-connected":[96]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
