{"id":"https://openalex.org/W2026310363","doi":"https://doi.org/10.5220/0005019802060212","title":"Signaling Attacks in Mobile Telephony","display_name":"Signaling Attacks in Mobile Telephony","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2026310363","doi":"https://doi.org/10.5220/0005019802060212","mag":"2026310363"},"language":"en","primary_location":{"id":"doi:10.5220/0005019802060212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005019802060212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005019802060212","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029814139","display_name":"Mihajlo Pavloski","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mihajlo Pavloski","raw_affiliation_strings":["Imperial College, United Kingdom","Department of Electrical & Electronic Engineering, Intelligent Systems and Networks Group, Imperial College, London SW7 2AZ, U.K"],"affiliations":[{"raw_affiliation_string":"Imperial College, United Kingdom","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Department of Electrical & Electronic Engineering, Intelligent Systems and Networks Group, Imperial College, London SW7 2AZ, U.K","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074413858","display_name":"Erol Gelenbe","orcid":"https://orcid.org/0000-0001-9688-2201"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Erol Gelenbe","raw_affiliation_strings":["Imperial College, United Kingdom","Department of Electrical & Electronic Engineering, Intelligent Systems and Networks Group, Imperial College, London SW7 2AZ, U.K"],"affiliations":[{"raw_affiliation_string":"Imperial College, United Kingdom","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Department of Electrical & Electronic Engineering, Intelligent Systems and Networks Group, Imperial College, London SW7 2AZ, U.K","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029814139"],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":1.724,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.86099307,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"206","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10974","display_name":"Advanced Queuing Theory Analysis","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.8817592859268188},{"id":"https://openalex.org/keywords/telephony","display_name":"Telephony","score":0.7499855756759644},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7120093107223511},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7092868089675903},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.638380765914917},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5217812657356262},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5173784494400024},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5074014067649841},{"id":"https://openalex.org/keywords/customised-applications-for-mobile-networks-enhanced-logic","display_name":"Customised Applications for Mobile networks Enhanced Logic","score":0.47899267077445984},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.3895361125469208},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.356828510761261},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3295552134513855},{"id":"https://openalex.org/keywords/gsm-services","display_name":"GSM services","score":0.15922725200653076}],"concepts":[{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.8817592859268188},{"id":"https://openalex.org/C195358072","wikidata":"https://www.wikidata.org/wiki/Q944584","display_name":"Telephony","level":2,"score":0.7499855756759644},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7120093107223511},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7092868089675903},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.638380765914917},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5217812657356262},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5173784494400024},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5074014067649841},{"id":"https://openalex.org/C124505010","wikidata":"https://www.wikidata.org/wiki/Q1146276","display_name":"Customised Applications for Mobile networks Enhanced Logic","level":5,"score":0.47899267077445984},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.3895361125469208},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.356828510761261},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3295552134513855},{"id":"https://openalex.org/C205789325","wikidata":"https://www.wikidata.org/wiki/Q15811187","display_name":"GSM services","level":4,"score":0.15922725200653076}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005019802060212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005019802060212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005019802060212","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005019802060212","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W908422167","https://openalex.org/W1492692090","https://openalex.org/W1495107674","https://openalex.org/W1495920968","https://openalex.org/W1963988347","https://openalex.org/W1971990316","https://openalex.org/W1978666836","https://openalex.org/W1995405963","https://openalex.org/W1998451262","https://openalex.org/W2000838098","https://openalex.org/W2003436900","https://openalex.org/W2006908712","https://openalex.org/W2008735155","https://openalex.org/W2013566131","https://openalex.org/W2014620519","https://openalex.org/W2014825211","https://openalex.org/W2030593476","https://openalex.org/W2039568132","https://openalex.org/W2044871439","https://openalex.org/W2056377128","https://openalex.org/W2059040514","https://openalex.org/W2062534260","https://openalex.org/W2091602573","https://openalex.org/W2094055697","https://openalex.org/W2101854212","https://openalex.org/W2108453210","https://openalex.org/W2111656300","https://openalex.org/W2119603638","https://openalex.org/W2120538693","https://openalex.org/W2124806945","https://openalex.org/W2130095783","https://openalex.org/W2137740704","https://openalex.org/W2144190599","https://openalex.org/W2147374078","https://openalex.org/W2150843819","https://openalex.org/W2159494053","https://openalex.org/W2164256494","https://openalex.org/W2175808708","https://openalex.org/W2257526813","https://openalex.org/W2261202047","https://openalex.org/W2295497434","https://openalex.org/W2309899186","https://openalex.org/W2312246656","https://openalex.org/W2397892449","https://openalex.org/W2564379116","https://openalex.org/W2568916212","https://openalex.org/W2990879431","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2134259195","https://openalex.org/W2330816391","https://openalex.org/W1908492833","https://openalex.org/W2137821348","https://openalex.org/W1479721463","https://openalex.org/W2126882182","https://openalex.org/W2129945940","https://openalex.org/W2171344243","https://openalex.org/W2316805292","https://openalex.org/W2554323769"],"abstract_inverted_index":{"Mobile":[0],"telephony":[1],"based":[2,82],"on":[3,83],"UMTS":[4,90],"uses":[5],"finite-state":[6],"control":[7,49],"schemes":[8,19],"for":[9,13],"wireless":[10],"channels":[11],"and":[12,29,44,68,117],"signaling":[14,46],"across":[15,47],"the":[16,27,38,48,63,74,77,106,109,118],"network.":[17,119],"These":[18],"are":[20,30,60],"used":[21],"systematically":[22],"in":[23],"various":[24],"phases":[25],"of":[26,65,76,88,108],"communication":[28],"vulnerable":[31],"to":[32,62,104],"attacks":[33],"that":[34,71,92],"can":[35,72,100],"bring":[36],"down":[37],"network":[39],"through":[40],"unjustified":[41],"bandwidth":[42],"allocation":[43],"excessive":[45],"plane.":[50],"In":[51],"this":[52],"paper":[53],"we":[54],"identify":[55],"those":[56],"system":[57,91],"parameters":[58,99],"which":[59],"critical":[61],"success":[64],"such":[66],"attacks,":[67,95],"propose":[69],"changes":[70],"limit":[73],"effect":[75,107],"attack.":[78],"The":[79],"approach":[80],"is":[81,93],"establishing":[84],"a":[85,89],"mathematical":[86],"model":[87],"undergoing":[94],"andon":[96],"showing":[97],"how":[98],"be":[101],"optimally":[102],"modified":[103],"minimise":[105],"attack":[110],"as":[111],"experienced":[112],"by":[113],"he":[114],"mobile":[115],"device":[116]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
