{"id":"https://openalex.org/W2114149439","doi":"https://doi.org/10.1145/2386995.2387024","title":"Signaling oriented denial of service on LTE networks","display_name":"Signaling oriented denial of service on LTE networks","publication_year":2012,"publication_date":"2012-10-24","ids":{"openalex":"https://openalex.org/W2114149439","doi":"https://doi.org/10.1145/2386995.2387024","mag":"2114149439"},"language":"en","primary_location":{"id":"doi:10.1145/2386995.2387024","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2386995.2387024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM international symposium on Mobility management and wireless access","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014723344","display_name":"Ramzi Bassil","orcid":null},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Ramzi Bassil","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061146388","display_name":"Imad H. Elhajj","orcid":"https://orcid.org/0000-0002-6461-4699"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Imad Elhajj","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074578100","display_name":"Ayman Kayssi","orcid":"https://orcid.org/0000-0002-0569-1395"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ayman Kayssi","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014723344"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":2.4822,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.90022915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7477811574935913},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7100598216056824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6724364757537842},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6321147084236145},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5272485613822937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5092145204544067},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42060309648513794},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.41888612508773804},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14814162254333496},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10568627715110779}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7477811574935913},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7100598216056824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6724364757537842},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6321147084236145},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5272485613822937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5092145204544067},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42060309648513794},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.41888612508773804},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14814162254333496},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10568627715110779},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2386995.2387024","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2386995.2387024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM international symposium on Mobility management and wireless access","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1509184609","https://openalex.org/W1511526715","https://openalex.org/W1998451262","https://openalex.org/W2014199851","https://openalex.org/W2021926456","https://openalex.org/W2098563793","https://openalex.org/W2113878409","https://openalex.org/W2115026336","https://openalex.org/W2124806945","https://openalex.org/W2127365896","https://openalex.org/W2132559723","https://openalex.org/W2492629870","https://openalex.org/W6655988468","https://openalex.org/W6678742378"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Long":[0],"Term":[1],"Evolution":[2],"(LTE)":[3],"is":[4,19,48,118,161],"seen":[5],"as":[6],"the":[7,12,20,34,41,51,55,63,74,82,105,123,138],"key":[8],"enabler":[9],"for":[10],"delivering":[11],"fourth":[13],"generation":[14],"of":[15,54,62,89,92,104],"mobile":[16,37],"broadband":[17],"and":[18,39,122,141],"first":[21],"cellular":[22],"network":[23],"primarily":[24],"designed":[25],"based":[26],"on":[27,73,137],"IP.":[28],"Thus,":[29],"telecom":[30],"operators":[31],"must":[32],"support":[33],"diverse":[35],"IP-based":[36],"applications":[38,46],"all":[40],"overhead":[42,107],"associated":[43],"with":[44],"such":[45,159],"which":[47],"mainly":[49],"in":[50,120],"a":[52,66,87,90,131,150],"result":[53],"increased":[56],"signaling":[57,64,96,106,124],"traffic.":[58],"By":[59],"taking":[60],"advantage":[61,103],"overhead,":[65],"malicious":[67],"user":[68],"can":[69,154],"cause":[70],"severe":[71],"overload":[72],"operator's":[75,139],"infrastructure":[76],"denying":[77],"legitimate":[78,143],"users":[79],"from":[80,145],"accessing":[81],"network.":[83],"This":[84],"work":[85],"presents":[86],"study":[88],"denial":[91],"service":[93],"(DoS)":[94],"oriented":[95],"attack":[97,116,133],"against":[98],"LTE":[99],"networks":[100],"that":[101,130,153],"takes":[102],"required":[108],"to":[109,157],"set":[110],"up":[111],"dedicated":[112],"radio":[113],"bearers.":[114],"The":[115],"scenario":[117],"simulated":[119],"OPNET,":[121],"traces":[125],"are":[126],"analyzed.":[127],"Results":[128],"show":[129],"well-coordinated":[132],"creates":[134],"significant":[135],"stress":[136],"resources":[140],"inhibits":[142],"subscribers":[144],"obtaining":[146],"proper":[147],"services.":[148],"Then,":[149],"detection":[151],"mechanism":[152],"be":[155],"used":[156],"thwart":[158],"attacks":[160],"proposed.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
