{"id":"https://openalex.org/W1971990316","doi":"https://doi.org/10.1145/2642687.2642688","title":"Storms in mobile networks","display_name":"Storms in mobile networks","publication_year":2014,"publication_date":"2014-09-17","ids":{"openalex":"https://openalex.org/W1971990316","doi":"https://doi.org/10.1145/2642687.2642688","mag":"1971990316"},"language":"en","primary_location":{"id":"doi:10.1145/2642687.2642688","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642687.2642688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1411.1280","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002188320","display_name":"G\u00f6k\u00e7e G\u00f6rbil","orcid":"https://orcid.org/0000-0002-1766-8539"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gokce Gorbil","raw_affiliation_strings":["Imperial College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021165934","display_name":"Omer H. Abdelrahman","orcid":"https://orcid.org/0000-0001-9582-3250"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Omer H. Abdelrahman","raw_affiliation_strings":["Imperial College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074413858","display_name":"Erol Gelenbe","orcid":"https://orcid.org/0000-0001-9688-2201"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Erol Gelenbe","raw_affiliation_strings":["Imperial College London, London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London, London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002188320"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":4.4161,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.94982038,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/storm","display_name":"Storm","score":0.6967145204544067},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6185511350631714},{"id":"https://openalex.org/keywords/meteorology","display_name":"Meteorology","score":0.27014636993408203},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.1379368007183075}],"concepts":[{"id":"https://openalex.org/C105306849","wikidata":"https://www.wikidata.org/wiki/Q81054","display_name":"Storm","level":2,"score":0.6967145204544067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6185511350631714},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.27014636993408203},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.1379368007183075}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/2642687.2642688","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2642687.2642688","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1411.1280","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1411.1280","pdf_url":"https://arxiv.org/pdf/1411.1280","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.762.4805","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.762.4805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://arxiv.org/pdf/1411.1280.pdf","raw_type":"text"},{"id":"pmh:oai:spiral.imperial.ac.uk:10044/1/77702","is_oa":false,"landing_page_url":"http://hdl.handle.net/10044/1/77702","pdf_url":null,"source":{"id":"https://openalex.org/S4306401396","display_name":"Spiral (Imperial College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I47508984","host_organization_name":"Imperial College London","host_organization_lineage":["https://openalex.org/I47508984"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th ACM symposium on QoS and security for wireless and mobile networks","raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1411.1280","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1411.1280","pdf_url":"https://arxiv.org/pdf/1411.1280","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G7621198454","display_name":null,"funder_award_id":"317888","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338370","display_name":"FP7 Information and Communication Technologies","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1995405963","https://openalex.org/W1998451262","https://openalex.org/W2003574034","https://openalex.org/W2006908712","https://openalex.org/W2012427422","https://openalex.org/W2013542590","https://openalex.org/W2013566131","https://openalex.org/W2021926456","https://openalex.org/W2028319341","https://openalex.org/W2033442522","https://openalex.org/W2038360730","https://openalex.org/W2039568132","https://openalex.org/W2040049909","https://openalex.org/W2044871439","https://openalex.org/W2045183416","https://openalex.org/W2059040514","https://openalex.org/W2107187535","https://openalex.org/W2111656300","https://openalex.org/W2111704751","https://openalex.org/W2113000322","https://openalex.org/W2114936722","https://openalex.org/W2124806945","https://openalex.org/W2125011234","https://openalex.org/W2129281072","https://openalex.org/W2131493006","https://openalex.org/W2136271187","https://openalex.org/W2142145056","https://openalex.org/W2142198750","https://openalex.org/W2144190599","https://openalex.org/W2150843819","https://openalex.org/W2157053558","https://openalex.org/W2159494053","https://openalex.org/W2164558192","https://openalex.org/W2164693138","https://openalex.org/W2258160109","https://openalex.org/W2312246656","https://openalex.org/W2342091124","https://openalex.org/W2401472080","https://openalex.org/W2950539479","https://openalex.org/W2951281088","https://openalex.org/W3023580939","https://openalex.org/W3101581741","https://openalex.org/W3163372212"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Mobile":[0],"networks":[1],"are":[2],"vulnerable":[3],"to":[4,46,71,89,116],"signalling":[5,42,68],"attacks":[6,120],"and":[7,26,54,112,124],"storms":[8,43,69],"caused":[9],"by":[10],"traffic":[11,53],"that":[12,75,104],"overloads":[13],"the":[14,30,39,47,55,96,106],"control":[15,83],"plane":[16],"through":[17],"excessive":[18],"signalling,":[19,113],"which":[20,101],"can":[21,121],"be":[22,122],"introduced":[23],"via":[24],"malware":[25],"mobile":[27,37,62],"botnets.":[28],"With":[29],"advent":[31],"of":[32,51,58,109],"machine-to-machine":[33],"(M2M)":[34],"communications":[35],"over":[36],"networks,":[38],"potential":[40],"for":[41],"increases":[44],"due":[45,70],"normally":[48],"periodic":[49],"nature":[50],"M2M":[52],"sheer":[56],"number":[57],"communicating":[59],"nodes.":[60],"Several":[61],"network":[63],"operators":[64],"have":[65],"also":[66],"experienced":[67],"poorly":[72],"designed":[73],"applications":[74],"result":[76],"in":[77],"service":[78],"outage.":[79],"The":[80],"radio":[81],"resource":[82],"(RRC)":[84],"protocol":[85],"is":[86],"particularly":[87],"susceptible":[88],"such":[90,119],"attacks,":[91],"motivating":[92],"this":[93],"work":[94],"within":[95],"EU":[97],"FP7":[98],"NEMESYS":[99],"project":[100],"presents":[102],"simulations":[103],"clarify":[105],"temporal":[107],"dynamics":[108],"user":[110],"behavior":[111],"allowing":[114],"us":[115],"suggest":[117],"how":[118],"detected":[123],"mitigated.":[125]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
